{"global":{"lastError":{},"locale":"en","locales":{"data":[{"id":"de","name":"Deutsch"},{"id":"en","name":"English"}],"loading":false,"error":false},"currency":{"id":49,"name":"EUR"},"currencies":{"data":[{"id":49,"name":"EUR"},{"id":124,"name":"RUB"},{"id":153,"name":"UAH"},{"id":155,"name":"USD"}],"loading":false,"error":false},"translations":{"implementationDetail":{"description":{"ru":"Описание","_type":"localeString","en":"Description"},"status":{"en":"Status","ru":"Статус","_type":"localeString"},"show":{"ru":"Показать ещё","_type":"localeString","en":"Show more"},"hide":{"ru":"Скрыть","_type":"localeString","en":"Hide"},"details":{"ru":"Подробности","_type":"localeString","en":"Details"},"categories":{"_type":"localeString","en":"Categories","ru":"Категории"},"additional-info":{"ru":"Дополнительная информация","_type":"localeString","en":"Additional information"},"project-was-put":{"ru":"Проект был сдан в срок","_type":"localeString","en":"The project has been delivered on schedule"},"budget-not-exceeded":{"_type":"localeString","en":"The budget has not been exceeded","ru":"Бюджет не был превышен"},"functionally-task-assignment":{"ru":"Функциональность соответствует задаче","_type":"localeString","en":"Functionality complies with task"},"similar-implementations":{"_type":"localeString","en":"Similar deployments","ru":"Схожие внедрения"},"source":{"en":"Source:","ru":"Источник:","_type":"localeString"},"price":{"en":"Price: ","ru":"Цена:","_type":"localeString"},"pluses":{"_type":"localeString","en":"Advantages","ru":"Плюсы"},"raiting":{"ru":"Общая оценка","_type":"localeString","en":"Raiting"},"user":{"_type":"localeString","en":"User","ru":"Пользователь"},"vendor":{"ru":"Производитель","_type":"localeString","en":"Vendor"},"supplier":{"_type":"localeString","en":"Supplier","ru":"Поставщик"},"product":{"ru":"Продукт","_type":"localeString","en":"Product"},"canceled":{"ru":"Отменено","_type":"localeString","en":"Canceled"},"deal-canceled":{"_type":"localeString","en":"Deal canceled","ru":"Сделка отменена"},"deal-closed":{"_type":"localeString","en":"Deal closed","ru":"Сделка закрыта"},"deal-in-progress":{"en":"Deal in progress","ru":"Сделка в процессе","_type":"localeString"},"deal-is-planned":{"en":"Deal is planned","ru":"Сделка планируется","_type":"localeString"},"finished":{"ru":"Завершено","_type":"localeString","en":"Finished"},"in-process":{"ru":"Ведется","_type":"localeString","en":"In Process"},"planned":{"_type":"localeString","en":"Planned","ru":"Планируется"},"proof-of-concept":{"_type":"localeString","en":"Proof of concept","ru":"Пилотный проект"},"stopped":{"en":"Stopped","ru":"Остановлено","_type":"localeString"},"date":{"ru":"Дата внедрения","_type":"localeString","en":"Deployment date"},"roi":{"_type":"localeString","en":"ROI","ru":"ROI"},"not-yet-converted":{"_type":"localeString","en":"Data is moderated and will be published soon. Please, try again later.","ru":"Данные модерируются и вскоре будут опубликованы. Попробуйте повторить переход через некоторое время."}},"header":{"help":{"_type":"localeString","en":"Help","de":"Hilfe","ru":"Помощь"},"how":{"_type":"localeString","en":"How does it works","de":"Wie funktioniert es","ru":"Как это работает"},"login":{"_type":"localeString","en":"Log in","de":"Einloggen","ru":"Вход"},"logout":{"_type":"localeString","en":"Sign out","ru":"Выйти"},"faq":{"ru":"FAQ","_type":"localeString","en":"FAQ","de":"FAQ"},"references":{"ru":"Мои запросы","_type":"localeString","en":"Requests","de":"References"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find-it-product":{"en":"Selection and comparison of IT product","ru":"Подбор и сравнение ИТ продукта","_type":"localeString"},"autoconfigurator":{"ru":"Калькулятор цены","_type":"localeString","en":" Price calculator"},"comparison-matrix":{"ru":"Матрица сравнения","_type":"localeString","en":"Comparison Matrix"},"roi-calculators":{"ru":"ROI калькуляторы","_type":"localeString","en":"ROI calculators"},"b4r":{"ru":"Бонус за референс","_type":"localeString","en":"Bonus for reference"},"business-booster":{"_type":"localeString","en":"Business boosting","ru":"Развитие бизнеса"},"catalogs":{"ru":"Каталоги","_type":"localeString","en":"Catalogs"},"products":{"_type":"localeString","en":"Products","ru":"Продукты"},"implementations":{"en":"Deployments","ru":"Внедрения","_type":"localeString"},"companies":{"en":"Companies","ru":"Компании","_type":"localeString"},"categories":{"en":"Categories","ru":"Категории","_type":"localeString"},"for-suppliers":{"ru":"Поставщикам","_type":"localeString","en":"For suppliers"},"blog":{"ru":"Блог","_type":"localeString","en":"Blog"},"agreements":{"en":"Deals","ru":"Сделки","_type":"localeString"},"my-account":{"_type":"localeString","en":"My account","ru":"Мой кабинет"},"register":{"ru":"Зарегистрироваться","_type":"localeString","en":"Register"},"comparison-deletion":{"_type":"localeString","en":"Deletion","ru":"Удаление"},"comparison-confirm":{"_type":"localeString","en":"Are you sure you want to delete","ru":"Подтвердите удаление"},"search-placeholder":{"ru":"Введите поисковый запрос","_type":"localeString","en":"Enter your search term"},"my-profile":{"ru":"Мои данные","_type":"localeString","en":"My profile"},"about":{"en":"About Us","_type":"localeString"},"it_catalogs":{"_type":"localeString","en":"IT catalogs"},"roi4presenter":{"_type":"localeString","en":"Roi4Presenter"},"roi4webinar":{"en":"Pitch Avatar","_type":"localeString"},"sub_it_catalogs":{"en":"Find IT product","_type":"localeString"},"sub_b4reference":{"_type":"localeString","en":"Get reference from user"},"sub_roi4presenter":{"_type":"localeString","en":"Make online presentations"},"sub_roi4webinar":{"_type":"localeString","en":"Create an avatar for the event"},"catalogs_new":{"_type":"localeString","en":"Products"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"},"it_our_it_catalogs":{"en":"Our IT Catalogs","_type":"localeString"},"it_products":{"_type":"localeString","en":"Find and compare IT products"},"it_implementations":{"_type":"localeString","en":"Learn implementation reviews"},"it_companies":{"_type":"localeString","en":"Find vendor and company-supplier"},"it_categories":{"_type":"localeString","en":"Explore IT products by category"},"it_our_products":{"en":"Our Products","_type":"localeString"},"it_it_catalogs":{"_type":"localeString","en":"IT catalogs"}},"footer":{"copyright":{"de":"Alle rechte vorbehalten","ru":"Все права защищены","_type":"localeString","en":"All rights reserved"},"company":{"ru":"О компании","_type":"localeString","en":"My Company","de":"Über die Firma"},"about":{"ru":"О нас","_type":"localeString","en":"About us","de":"Über uns"},"infocenter":{"_type":"localeString","en":"Infocenter","de":"Infocenter","ru":"Инфоцентр"},"tariffs":{"ru":"Тарифы","_type":"localeString","en":"Subscriptions","de":"Tarife"},"contact":{"_type":"localeString","en":"Contact us","de":"Kontaktiere uns","ru":"Связаться с нами"},"marketplace":{"de":"Marketplace","ru":"Marketplace","_type":"localeString","en":"Marketplace"},"products":{"de":"Produkte","ru":"Продукты","_type":"localeString","en":"Products"},"compare":{"de":"Wähle und vergleiche","ru":"Подобрать и сравнить","_type":"localeString","en":"Pick and compare"},"calculate":{"de":"Kosten berechnen","ru":"Расчитать стоимость","_type":"localeString","en":"Calculate the cost"},"get_bonus":{"_type":"localeString","en":"Bonus for reference","de":"Holen Sie sich einen Rabatt","ru":"Бонус за референс"},"salestools":{"de":"Salestools","ru":"Salestools","_type":"localeString","en":"Salestools"},"automatization":{"ru":"Автоматизация расчетов","_type":"localeString","en":"Settlement Automation","de":"Abwicklungsautomatisierung"},"roi_calcs":{"_type":"localeString","en":"ROI calculators","de":"ROI-Rechner","ru":"ROI калькуляторы"},"matrix":{"en":"Comparison matrix","de":"Vergleichsmatrix","ru":"Матрица сравнения","_type":"localeString"},"b4r":{"de":"Rebate 4 Reference","ru":"Rebate 4 Reference","_type":"localeString","en":"Rebate 4 Reference"},"our_social":{"de":"Unsere sozialen Netzwerke","ru":"Наши социальные сети","_type":"localeString","en":"Our social networks"},"subscribe":{"_type":"localeString","en":"Subscribe to newsletter","de":"Melden Sie sich für den Newsletter an","ru":"Подпишитесь на рассылку"},"subscribe_info":{"en":"and be the first to know about promotions, new features and recent software reviews","ru":"и узнавайте первыми об акциях, новых возможностях и свежих обзорах софта","_type":"localeString"},"policy":{"ru":"Политика конфиденциальности","_type":"localeString","en":"Privacy Policy"},"user_agreement":{"ru":"Пользовательское соглашение ","_type":"localeString","en":"Agreement"},"solutions":{"ru":"Возможности","_type":"localeString","en":"Solutions"},"find":{"ru":"Подбор и сравнение ИТ продукта","_type":"localeString","en":"Selection and comparison of IT product"},"quote":{"_type":"localeString","en":"Price calculator","ru":"Калькулятор цены"},"boosting":{"_type":"localeString","en":"Business boosting","ru":"Развитие бизнеса"},"4vendors":{"en":"4 vendors","ru":"поставщикам","_type":"localeString"},"blog":{"en":"blog","ru":"блог","_type":"localeString"},"pay4content":{"ru":"платим за контент","_type":"localeString","en":"we pay for content"},"categories":{"ru":"категории","_type":"localeString","en":"categories"},"showForm":{"ru":"Показать форму","_type":"localeString","en":"Show form"},"subscribe__title":{"ru":"Раз в месяц мы отправляем дайджест актуальных новостей ИТ мира!","_type":"localeString","en":"We send a digest of actual news from the IT world once in a month!"},"subscribe__email-label":{"_type":"localeString","en":"Email","ru":"Email"},"subscribe__name-label":{"_type":"localeString","en":"Name","ru":"Имя"},"subscribe__required-message":{"_type":"localeString","en":"This field is required","ru":"Это поле обязательное"},"subscribe__notify-label":{"ru":"Да, пожалуйста уведомляйте меня о новостях, событиях и предложениях","_type":"localeString","en":"Yes, please, notify me about news, events and propositions"},"subscribe__agree-label":{"ru":"Подписываясь на рассылку, вы соглашаетесь с %TERMS% и %POLICY% и даете согласие на использование файлов cookie и передачу своих персональных данных*","_type":"localeString","en":"By subscribing to the newsletter, you agree to the %TERMS% and %POLICY% and agree to the use of cookies and the transfer of your personal data"},"subscribe__submit-label":{"_type":"localeString","en":"Subscribe","ru":"Подписаться"},"subscribe__email-message":{"_type":"localeString","en":"Please, enter the valid email","ru":"Пожалуйста, введите корректный адрес электронной почты"},"subscribe__email-placeholder":{"en":"username@gmail.com","ru":"username@gmail.com","_type":"localeString"},"subscribe__name-placeholder":{"ru":"Имя Фамилия","_type":"localeString","en":"Last, first name"},"subscribe__success":{"ru":"Вы успешно подписаны на рассылку. Проверьте свой почтовый ящик.","_type":"localeString","en":"You are successfully subscribed! Check you mailbox."},"subscribe__error":{"ru":"Не удалось оформить подписку. Пожалуйста, попробуйте позднее.","_type":"localeString","en":"Subscription is unsuccessful. Please, try again later."},"roi4presenter":{"ru":"roi4presenter","_type":"localeString","en":"Roi4Presenter","de":"roi4presenter"},"it_catalogs":{"en":"IT catalogs","_type":"localeString"},"roi4webinar":{"en":"Pitch Avatar","_type":"localeString"},"b4reference":{"_type":"localeString","en":"Bonus4Reference"}},"breadcrumbs":{"home":{"en":"Home","ru":"Главная","_type":"localeString"},"companies":{"_type":"localeString","en":"Companies","ru":"Компании"},"products":{"en":"Products","ru":"Продукты","_type":"localeString"},"implementations":{"_type":"localeString","en":"Deployments","ru":"Внедрения"},"login":{"ru":"Вход","_type":"localeString","en":"Login"},"registration":{"en":"Registration","ru":"Регистрация","_type":"localeString"},"b2b-platform":{"ru":"Портал для покупателей, поставщиков и производителей ИТ","_type":"localeString","en":"B2B platform for IT buyers, vendors and suppliers"}},"comment-form":{"title":{"ru":"Оставить комментарий","_type":"localeString","en":"Leave comment"},"firstname":{"ru":"Имя","_type":"localeString","en":"First name"},"lastname":{"en":"Last name","ru":"Фамилия","_type":"localeString"},"company":{"ru":"Компания","_type":"localeString","en":"Company name"},"position":{"ru":"Должность","_type":"localeString","en":"Position"},"actual-cost":{"ru":"Фактическая стоимость","_type":"localeString","en":"Actual cost"},"received-roi":{"ru":"Полученный ROI","_type":"localeString","en":"Received ROI"},"saving-type":{"en":"Saving type","ru":"Тип экономии","_type":"localeString"},"comment":{"ru":"Комментарий","_type":"localeString","en":"Comment"},"your-rate":{"_type":"localeString","en":"Your rate","ru":"Ваша оценка"},"i-agree":{"_type":"localeString","en":"I agree","ru":"Я согласен"},"terms-of-use":{"ru":"С пользовательским соглашением и политикой конфиденциальности","_type":"localeString","en":"With user agreement and privacy policy"},"send":{"_type":"localeString","en":"Send","ru":"Отправить"},"required-message":{"ru":"{NAME} - это обязательное поле","_type":"localeString","en":"{NAME} is required filed"}},"maintenance":{"title":{"ru":"На сайте проводятся технические работы","_type":"localeString","en":"Site under maintenance"},"message":{"ru":"Спасибо за ваше понимание","_type":"localeString","en":"Thank you for your understanding"}},"filters":{"from":{"ru":"от","_type":"localeString","en":"from"},"to":{"ru":"до","_type":"localeString","en":"to"},"filter-price-title":{"ru":"Фильтр по цене","_type":"localeString","en":"Filter by price"},"view-type-label":{"en":"View","ru":"Вид","_type":"localeString"},"sort-type-label":{"ru":"Сортировка","_type":"localeString","en":"Sorting"},"category":{"en":"Category","ru":"Категория","_type":"localeString"},"follow":{"ru":"Следить","_type":"localeString","en":"Follow"},"add-product":{"ru":"Добавить продукт","_type":"localeString","en":"Add Product"},"show-all":{"en":"Show all","ru":"Показать все","_type":"localeString"},"filter-toggle":{"ru":"Фильтр","_type":"localeString","en":"Filter"},"clear-button":{"ru":"Очистить","_type":"localeString","en":"Сlear"},"delivery-type-field":{"ru":"Тип поставки","_type":"localeString","en":"Delivery type"},"product-categories-field":{"_type":"localeString","en":"product categories","ru":"категориz продуктаhjle"},"providers-field":{"_type":"localeString","en":"Providers","ru":"Поставщик, производитель"},"business-tasks-field":{"en":"Business tasks","ru":"Бизнес задачи","_type":"localeString"},"problems-field":{"ru":"Проблемы","_type":"localeString","en":"Problems"},"with-discounts-checkbox":{"ru":"Со скидками","_type":"localeString","en":"With discounts"},"expert-price-checkbox":{"en":"Configurator","ru":"Конфигуратор","_type":"localeString"},"roi-calculator-checkbox":{"_type":"localeString","en":"ROI-calculator","ru":"ROI-калькулятор"},"apply-filter-button":{"en":"Apply filter","ru":"Применить фильтр","_type":"localeString"},"sorting-toggle":{"_type":"localeString","en":"Sorting","ru":"Сортировка"},"show-all-button":{"ru":"Показать все","_type":"localeString","en":"Show all"},"suggest-product-button":{"_type":"localeString","en":"Suggest product","ru":"Предложить продукт"},"with-projects-label":{"_type":"localeString","en":"With deployments","ru":"С внедрениями"},"bonus-4-reference":{"en":"Bonus 4 Reference","ru":"Бонус за референс","_type":"localeString"},"product-categories":{"_type":"localeString","en":"Product Categories","ru":"Категории продуктов"},"countries":{"en":"Countries","ru":"Страны","_type":"localeString"},"seller":{"ru":"Продавец","_type":"localeString","en":"Seller"},"vendors":{"ru":"Производители продуктов пользователя","_type":"localeString","en":"User products vendors"},"suppliers":{"ru":"Поставщики пользователя","_type":"localeString","en":"User suppliers"},"business-process":{"en":"Problems","ru":"Проблемы","_type":"localeString"},"business-objectives":{"ru":"Бизнес задачи","_type":"localeString","en":"Business tasks"},"branch":{"ru":"Отрасль","_type":"localeString","en":" Branch"},"users":{"en":"Users","ru":"Пользователи","_type":"localeString"},"status":{"en":"Status","ru":"Статус","_type":"localeString"},"info-source":{"_type":"localeString","en":"Info source","ru":"Информационный ресурс"},"with-reference-checkbox":{"en":"With reference","ru":"С референсами","_type":"localeString"},"show-deal-checkbox":{"ru":"Показывать сделки с noname","_type":"localeString","en":"Show deal with noname"},"roi-checkbox":{"_type":"localeString","en":"ROI","ru":"ROI"},"problems":{"en":"Problems","ru":"Проблемы","_type":"localeString"},"find":{"ru":"Выполнить поиск","_type":"localeString","en":"Find"},"deal-date":{"ru":"Дата","_type":"localeString","en":"Date"},"try-button":{"en":"Try AI (Beta)","ru":"Попробовать AI (Beta)","_type":"localeString"},"hide":{"ru":"Скрыть","_type":"localeString","en":"Hide"},"company-size":{"ru":"Размер компании","_type":"localeString","en":"Company size"},"add-company":{"_type":"localeString","en":"Add company","ru":"Добавить компанию"},"add-implementation":{"ru":"Добавить внедрение","_type":"localeString","en":"Add deployment"},"sort-title-asc":{"ru":"От А до Я","_type":"localeString","en":"From A to Z"},"sort-title-desc":{"ru":"От Я до А","_type":"localeString","en":"From Z to A"},"sellers-field":{"ru":"Поставщики, Производители","_type":"localeString","en":"Sellers"},"supply-types":{"en":"Supply type","ru":"Тип поставки","_type":"localeString"},"with-comments-checkbox":{"ru":"С комментариями","_type":"localeString","en":"With comments"},"supplier":{"ru":"Поставщик","_type":"localeString","en":"Supplier"},"vendor":{"ru":"Производитель","_type":"localeString","en":"Vendor"},"user":{"ru":"Пользователь","_type":"localeString","en":"User"},"company-type":{"ru":"Тип компании","_type":"localeString","en":"Company type"},"partners-field":{"ru":" Партнеры","_type":"localeString","en":"Partners"},"customers":{"en":"Customers","ru":"Покупатели","_type":"localeString"},"product-supplier":{"_type":"localeString","en":"Product supplier","ru":"Поставщик продукта"},"product-vendor":{"_type":"localeString","en":"Product vendor","ru":"Производитель продукта"},"implementation-date":{"en":"Deployment date","ru":"Дата внедрения","_type":"localeString"},"canceled":{"ru":"Отменено","_type":"localeString","en":"Canceled"},"deal-canceled":{"ru":"Сделка отменена","_type":"localeString","en":"Deal canceled"},"deal-closed":{"en":"Deal closed","ru":"Сделка закрыта","_type":"localeString"},"deal-in-progress":{"ru":"Сделка в процессе","_type":"localeString","en":"Deal in progress"},"deal-is-planned":{"_type":"localeString","en":"Deal is planned","ru":"Сделка планируется"},"finished":{"ru":"Завершено","_type":"localeString","en":"Finished"},"in-process":{"en":"In Process","ru":"Ведется","_type":"localeString"},"planned":{"en":"Planned","ru":"Планируется","_type":"localeString"},"proof-of-concept":{"ru":"Пилотный проект","_type":"localeString","en":"Proof of concept"},"stopped":{"en":"Stopped","ru":"Остановлено","_type":"localeString"},"competencies":{"en":"Competencies","ru":"Компетенции","_type":"localeString"}}},"translationsStatus":{"implementationDetail":"success","filters":"success"},"sections":{},"sectionsStatus":{},"pageMetaData":{"implementationDetail":{}},"pageMetaDataStatus":{"implementationDetail":"success"},"subscribeInProgress":false,"subscribeError":false},"auth":{"inProgress":false,"error":false,"checked":true,"initialized":false,"user":{},"role":null,"expires":null},"products":{"productsByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null,"useProductLoading":false,"sellProductLoading":false,"templatesById":{},"comparisonByTemplateId":{}},"filters":{"filterCriterias":{"loading":false,"error":null,"data":{"price":{"min":0,"max":6000},"users":{"loading":false,"error":null,"ids":[],"values":{}},"suppliers":{"loading":false,"error":null,"ids":[],"values":{}},"vendors":{"loading":false,"error":null,"ids":[],"values":{}},"roles":{"id":200,"title":"Roles","values":{"1":{"id":1,"title":"User","translationKey":"user"},"2":{"id":2,"title":"Supplier","translationKey":"supplier"},"3":{"id":3,"title":"Vendor","translationKey":"vendor"}}},"categories":{"flat":[],"tree":[]},"countries":{"loading":false,"error":null,"ids":[],"values":{}}}},"showAIFilter":false},"companies":{"companiesByAlias":{},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"implementations":{"implementationsByAlias":{"microsoft-hyper-v-and-microsoft-lync-server-for-the-energy-company":{"id":1077,"title":"Microsoft Hyper-V and Microsoft Lync Server for the Energy Company","description":"<span style=\"font-style: italic;\">Description is not ready yet</span>","alias":"microsoft-hyper-v-and-microsoft-lync-server-for-the-energy-company","roi":0,"seo":{"title":"Microsoft Hyper-V and Microsoft Lync Server for the Energy Company","keywords":"","description":"<span style=\"font-style: italic;\">Description is not ready yet</span>","og:title":"Microsoft Hyper-V and Microsoft Lync Server for the Energy Company","og:description":"<span style=\"font-style: italic;\">Description is not ready yet</span>"},"deal_info":"","user":{"id":7498,"title":"Donetskteplokommunenergo","logoURL":"https://old.roi4cio.com/uploads/roi/company/Doneckteplokommunehnergo.png","alias":"doneckteplokommunehnergo","address":"","roles":[],"description":"Today, the regional communal enterprise <b>Donetskteplokommunenergo</b> is the largest heat supply complex in the Donetsk region. First of all, the activity of the enterprise is focused on meeting the needs of the population, enterprises, institutions and organizations of various forms of ownership in quality heat energy to ensure the most comfortable living conditions.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://kpdtke.com.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Donetskteplokommunenergo","keywords":"","description":"Today, the regional communal enterprise <b>Donetskteplokommunenergo</b> is the largest heat supply complex in the Donetsk region. First of all, the activity of the enterprise is focused on meeting the needs of the population, enterprises, institutions and orga","og:title":"Donetskteplokommunenergo","og:description":"Today, the regional communal enterprise <b>Donetskteplokommunenergo</b> is the largest heat supply complex in the Donetsk region. First of all, the activity of the enterprise is focused on meeting the needs of the population, enterprises, institutions and orga","og:image":"https://old.roi4cio.com/uploads/roi/company/Doneckteplokommunehnergo.png"},"eventUrl":""},"supplier":{"id":6447,"title":"AM Integrator (AMI)","logoURL":"https://old.roi4cio.com/uploads/roi/company/am_integrator.png","alias":"am-integrator","address":"Illinska St., 14/6 Kiev, 04070 Ukraine","roles":[],"description":"AM INTEGRATOR Group of Companies is one of the leading IT operators in Ukraine, being a supplier and integrator of a wide range of solutions in the field of modern IT infrastructure, multimedia solutions, engineering infrastructure, business applications and integrated business security systems for medium and large enterprises, as well as the public sector. AM Integrator helps companies:\r\n<ul><li>increase risk manageability and business productivity;</li></ul>\r\n<ul><li>reduce costs;</li></ul>\r\n<ul><li>protect data.</li></ul>\r\nAM Integrator offers intelligent and flexible solutions, including cloud services, that will help you strategically transform your business using technologies and platforms of industry leaders.<br />The company offers solutions for increasing productivity, effective collaboration, mobility and relationship management, identity-driven, advanced analytics, or the Internet of things. AM Integrator also helps with core infrastructure, from support to creating disaster recovery solutions. The team of company experts has been working with cloud technologies for more than 5 years, with virtual environments - more than 10 years.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":116,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":21,"vendorImplementationsCount":0,"vendorPartnersCount":8,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.amintegrator.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"AM Integrator (AMI)","keywords":"","description":"AM INTEGRATOR Group of Companies is one of the leading IT operators in Ukraine, being a supplier and integrator of a wide range of solutions in the field of modern IT infrastructure, multimedia solutions, engineering infrastructure, business applications and i","og:title":"AM Integrator (AMI)","og:description":"AM INTEGRATOR Group of Companies is one of the leading IT operators in Ukraine, being a supplier and integrator of a wide range of solutions in the field of modern IT infrastructure, multimedia solutions, engineering infrastructure, business applications and i","og:image":"https://old.roi4cio.com/uploads/roi/company/am_integrator.png"},"eventUrl":""},"vendors":[{"id":163,"title":"Microsoft","logoURL":"https://old.roi4cio.com/uploads/roi/company/ms_dshchpshch.png","alias":"microsoft","address":"Microsoft","roles":[],"description":"Microsoft Corporation is an multinational technology company headquartered in Redmond, Washington, that develops, manufactures, licenses, supports and sells computer software, consumer electronics and personal computers and services. Its best known software products are the Microsoft Windows line of operating systems, Microsoft Office office suite, and Internet Explorer and Edge web browsers. Its flagship hardware products are the Xbox video game consoles and the Microsoft Surface tablet lineup. As of 2011, it was the world's largest software maker by revenue, and one of the world's most valuable companies.","companyTypes":[],"products":{},"vendoredProductsCount":39,"suppliedProductsCount":39,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":66,"vendorPartnersCount":0,"supplierPartnersCount":272,"b4r":0,"categories":{},"companyUrl":"www.microsoft.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Microsoft","keywords":"Microsoft, software, world, products, hardware, Xbox, video, game","description":"Microsoft Corporation is an multinational technology company headquartered in Redmond, Washington, that develops, manufactures, licenses, supports and sells computer software, consumer electronics and personal computers and services. Its best known software pr","og:title":"Microsoft","og:description":"Microsoft Corporation is an multinational technology company headquartered in Redmond, Washington, that develops, manufactures, licenses, supports and sells computer software, consumer electronics and personal computers and services. Its best known software pr","og:image":"https://old.roi4cio.com/uploads/roi/company/ms_dshchpshch.png"},"eventUrl":""}],"products":[{"id":5,"logo":false,"scheme":false,"title":"Microsoft Hyper-V","vendorVerified":0,"rating":"2.40","implementationsCount":12,"suppliersCount":0,"alias":"microsoft-hyper-v","companyTypes":[],"description":"The management tools for the Hyper-V role consist of:\r\nGUI-based management tools: Hyper-V Manager, a Microsoft Management Console (MMC) snap-in, and Virtual Machine Connection, which provides access to the video output of a virtual machine so you can interact with the virtual machine.\r\nHyper-V-specific cmdlets for Windows PowerShell. Windows Server 2012 includes a Hyper-V module, which provides command-line access to all the functionality available in the GUI, as well functionality not available through the GUI. For more information about the Hyper-V module, see Hyper-V Module for Windows PowerShell.\r\nIf you use Server Manager to install the Hyper-V role, the management tools are included unless you specifically exclude them. If you use Windows PowerShell to install the Hyper-V role, the management tools are not included by default. To install the tools, use the parameter –IncludeManagementTools. For instructions about installing the Hyper-V role, see Install Hyper-V and create a virtual machine.\r\n\r\nOverview of Hyper-V\r\nApplies To: Windows Server 2008 R2\r\nHyper-V provides software infrastructure and basic management tools that you can use to create and manage a virtualized server computing environment. This virtualized environment can be used to address a variety of business goals aimed at improving efficiency and reducing costs. For example, a virtualized server environment can help you:\r\nReduce the costs of operating and maintaining physical servers by increasing your hardware utilization. You can reduce the amount of hardware needed to run your server workloads.\r\nIncrease development and test efficiency by reducing the amount of time it takes to set up hardware and software and reproduce test environments.\r\nImprove server availability without using as many physical computers as you would need in a failover configuration that uses only physical computers.\r\nSome ways Hyper-V can help you\r\nHyper-V can help you:\r\nEstablish or expand a private cloud environment. Provide more flexible, on-demand IT services by moving to or expanding your use of shared resources and adjust utilization as demand changes.\r\nUse your hardware more effectively. Consolidate servers and workloads onto fewer, more powerful physical computers to use less power and physical space.\r\nImprove business continuity. Minimize the impact of both scheduled and unscheduled downtime of your workloads.\r\nEstablish or expand a virtual desktop infrastructure (VDI). Use a centralized desktop strategy with VDI can help you increase business agility and data security, as well as simplify regulatory compliance and manage desktop operating systems and applications. Deploy Hyper-V and Remote Desktop Virtualization Host (RD Virtualization Host) on the same server to make personal virtual desktops or virtual desktop pools available to your users.\r\nMake development and test more efficient. Reproduce different computing environments without having to buy or maintain all the hardware you'd need if you only used physical systems.\r\nHyper-V and other virtualization products\r\nHyper-V in Windows and Windows Server replaces older hardware virtualization products, such as Microsoft Virtual PC, Microsoft Virtual Server, and Windows Virtual PC. Hyper-V offers networking, performance, storage and security features not available in these older products.\r\nHyper-V and most third-party virtualization applications that require the same processor features aren't compatible. That's because the processor features, known as hardware virtualization extensions, are designed to not be shared. For details, see Virtualization applications do not work together with Hyper-V, Device Guard, and Credential Guard.","shortDescription":"The Hyper-V role enables you to create and manage a virtualized computing environment by using virtualization technology that is built in to Windows Server. Installing the Hyper-V role installs the required components and optionally installs management tools. The required components include Windows hypervisor, Hyper-V Virtual Machine Management Service, the virtualization WMI provider, and other virtualization components such as the virtual machine bus (VMbus), virtualization service provider (VSP) and virtual infrastructure driver (VID).","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":18,"sellingCount":10,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Microsoft Hyper-V","keywords":"Hyper-V, Windows, hardware, virtual, physical, your, tools, server","description":"The management tools for the Hyper-V role consist of:\r\nGUI-based management tools: Hyper-V Manager, a Microsoft Management Console (MMC) snap-in, and Virtual Machine Connection, which provides access to the video output of a virtual machine so you can interact","og:title":"Microsoft Hyper-V","og:description":"The management tools for the Hyper-V role consist of:\r\nGUI-based management tools: Hyper-V Manager, a Microsoft Management Console (MMC) snap-in, and Virtual Machine Connection, which provides access to the video output of a virtual machine so you can interact"},"eventUrl":"","translationId":617,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":2,"title":"Virtual machine and cloud system software","alias":"virtual-machine-and-cloud-system-software","description":" A virtual machine (VM) is a software-based computer that exists within another computer’s operating system, often used for the purposes of testing, backing up data, or running SaaS applications. To fully grasp how VMs work, it’s important to first understand how computer software and hardware are typically integrated by an operating system.\r\n"The cloud" refers to servers that are accessed over the Internet, and the software and databases that run on those servers. Cloud servers are located in data centers all over the world. By using cloud computing, users and companies don't have to manage physical servers themselves or run software applications on their own machines.\r\nThe cloud enables users to access the same files and applications from almost any device, because the computing and storage take place on servers in a data center, instead of locally on the user device. This is why a user can log into their Instagram account on a new phone after their old phone breaks and still find their old account in place, with all their photos, videos, and conversation history. It works the same way with cloud email providers like Gmail or Microsoft Office 365, and with cloud storage providers like Dropbox or Google Drive.\r\nFor businesses, switching to cloud computing removes some IT costs and overhead: for instance, they no longer need to update and maintain their own servers, as the cloud vendor they are using will do that. This especially makes an impact on small businesses that may not have been able to afford their own internal infrastructure but can outsource their infrastructure needs affordably via the cloud. The cloud can also make it easier for companies to operate internationally because employees and customers can access the same files and applications from any location.\r\nSeveral cloud providers offer virtual machines to their customers. These virtual machines typically live on powerful servers that can act as a host to multiple VMs and can be used for a variety of reasons that wouldn’t be practical with a locally-hosted VM. These include:\r\n<ul><li>Running SaaS applications - Software-as-a-Service, or SaaS for short, is a cloud-based method of providing software to users. SaaS users subscribe to an application rather than purchasing it once and installing it. These applications are generally served to the user over the Internet. Often, it is virtual machines in the cloud that are doing the computation for SaaS applications as well as delivering them to users. If the cloud provider has a geographically distributed network edge, then the application will run closer to the user, resulting in faster performance.</li><li>Backing up data - Cloud-based VM services are very popular for backing up data because the data can be accessed from anywhere. Plus, cloud VMs provide better redundancy, require less maintenance, and generally scale better than physical data centers. (For example, it’s generally fairly easy to buy an extra gigabyte of storage space from a cloud VM provider, but much more difficult to build a new local data server for that extra gigabyte of data.)</li><li>Hosting services like email and access management - Hosting these services on cloud VMs is generally faster and more cost-effective, and helps minimize maintenance and offload security concerns as well.</li></ul>","materialsDescription":"What is an operating system?\r\nTraditional computers are built out of physical hardware, including hard disk drives, processor chips, RAM, etc. In order to utilize this hardware, computers rely on a type of software known as an operating system (OS). Some common examples of OSes are Mac OSX, Microsoft Windows, Linux, and Android.\r\nThe OS is what manages the computer’s hardware in ways that are useful to the user. For example, if the user wants to access the Internet, the OS directs the network interface card to make the connection. If the user wants to download a file, the OS will partition space on the hard drive for that file. The OS also runs and manages other pieces of software. For example, it can run a web browser and provide the browser with enough random access memory (RAM) to operate smoothly. Typically, operating systems exist within a physical computer at a one-to-one ratio; for each machine, there is a single OS managing its physical resources.\r\n<span style=\"font-weight: bold;\">Can you have two or more operating systems on one computer?</span>\r\nSome users want to be able to run multiple operating systems simultaneously on one computer, either for testing or one of the other reasons listed in the section below. This can be achieved through a process called virtualization. In virtualization, a piece of software behaves as if it were an independent computer. This piece of software is called a virtual machine, also known as a ‘guest’ computer. (The computer on which the VM is running is called the ‘host’.) The guest has an OS as well as its own virtual hardware.\r\n‘Virtual hardware’ may sound like a bit of an oxymoron, but it works by mapping to real hardware on the host computer. For example, the VM’s ‘hard drive’ is really just a file on the host computer’s hard drive. When the VM wants to save a new file, it actually has to communicate with the host OS, which will write this file to the host hard drive. Because virtual hardware must perform this added step of negotiating with the host to access hardware resources, virtual machines can’t run quite as fast as their host computers.\r\nWith virtualization, one computer can run two or more operating systems. The number of VMs that can run on one host is limited only by the host’s available resources. The user can run the OS of a VM in a window like any other program, or they can run it in fullscreen so that it looks and feels like a genuine host OS.\r\n <span style=\"font-weight: bold; \">What are virtual machines used for?</span>\r\nSome of the most popular reasons people run virtual machines include:\r\n<span style=\"font-weight: bold; \">Testing</span> - Oftentimes software developers want to be able to test their applications in different environments. They can use virtual machines to run their applications in various OSes on one computer. This is simpler and more cost-effective than having to test on several different physical machines.\r\n<span style=\"font-weight: bold; \">Running software designed for other OSes</span> - Although certain software applications are only available for a single platform, a VM can run software designed for a different OS. For example, a Mac user who wants to run software designed for Windows can run a Windows VM on their Mac host.\r\n<span style=\"font-weight: bold; \">Running outdated software</span> - Some pieces of older software can’t be run in modern OSes. Users who want to run these applications can run an old OS on a virtual machine.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Virtual_machine_and_cloud_system_software.png"},{"id":1,"title":"Desktop virtualization","alias":"desktop-virtualization","description":" Desktop virtualization is a virtualization technology that separates an individual's PC applications from his or her desktop. Virtualized desktops are generally hosted on a remote central server, rather than the hard drive of the personal computer. Because the client-server computing model is used in virtualizing desktops, desktop virtualization is also known as client virtualization.\r\nDesktop virtualization provides a way for users to maintain their individual desktops on a single, central server. The users may be connected to the central server through a LAN, WAN or over the Internet.\r\nDesktop virtualization has many benefits, including a lower total cost of ownership (TCO), increased security, reduced energy costs, reduced downtime and centralized management.\r\nLimitations of desktop virtualization include difficulty in maintenance and set up of printer drivers; increased downtime in case of network failures; complexity and costs involved in VDI deployment and security risks in the event of improper network management.<br /><br />","materialsDescription":" <span style=\"font-weight: bold; \">What are types of desktop virtualization technologies?</span>\r\nHost-based forms of desktop virtualization require that users view and interact with their virtual desktops over a network by using a remote display protocol. Because processing takes place in a data center, client devices can be traditional PCs, but also thin clients, zero clients, smartphones and tablets. Examples of host-based desktop virtualization technology include:\r\n<span style=\"font-weight: bold; \">Host-based virtual machines:</span> Each user connects to an individual VM that is hosted in a data center. The user may connect to the same VM every time, allowing for personalization (known as a persistent desktop), or be given a fresh VM at each login (a nonpersistent desktop).\r\n<span style=\"font-weight: bold; \">Shared hosted:</span> Users connect to a shared desktop that runs on a server. Microsoft Remote Desktop Services, formerly Terminal Services, takes this client-server approach. Users may also connect to individual applications running on a server; this technology is an example of application virtualization.\r\n<span style=\"font-weight: bold; \">Host-based physical machines:</span> The operating system runs directly on another device's physical hardware.\r\nClient virtualization requires processing to occur on local hardware; the use of thin clients, zero clients and mobile devices is not possible. These types of desktop virtualization include:\r\n<span style=\"font-weight: bold; \">OS image streaming:</span> The operating system runs on local hardware, but it boots to a remote disk image across the network. This is useful for groups of desktops that use the same disk image. OS image streaming, also known as remote desktop virtualization, requires a constant network connection in order to function.\r\n<span style=\"font-weight: bold; \">Client-based virtual machines:</span> A VM runs on a fully functional PC, with a hypervisor in place. Client-based virtual machines can be managed by regularly syncing the disk image with a server, but a constant network connection is not necessary in order for them to function.\r\n<span style=\"font-weight: bold;\">Desktop virtualization vs. virtual desktop infrastructure</span>\r\nThe terms <span style=\"font-style: italic;\">desktop virtualization</span> and virtual desktop infrastructure (VDI) are often used interchangeably, but they are not the same. While VDI is a type of desktop virtualization, not all desktop virtualization uses VDI.\r\nVDI refers to the use of host-based VMs to deliver virtual desktops, which emerged in 2006 as an alternative to Terminal Services and Citrix's client-server approach to desktop virtualization technology. Other types of desktop virtualization -- including the shared hosted model, host-based physical machines and all methods of client virtualization -- are not examples of VDI.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Desktop_virtualization.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":983,"logo":false,"scheme":false,"title":"Microsoft Skype for Business","vendorVerified":0,"rating":"2.00","implementationsCount":6,"suppliersCount":0,"alias":"microsoft-skype-for-business","companyTypes":[],"description":"Microsoft Skype for Business Basic gives you presence, instant messaging (IM), audio and video calls, online meetings, and sharing capabilities with the latest User Interface.. This is free download. For more information about features available in Skype for Business Basic in comparison to the Skype for Business client, please visit this page: Skype for Business client comparision chart Note: This Skype for Business Basic MSI desktop client provides presence, instant messaging and conferencing features. If you are licensed for Office 365 ProPlus, Office 365 Enterprise E3 or Office 365 Enterprise E4, you are also licensed for the full Skype for Business Windows desktop client, which includes additional features including advanced telephony support, archiving & compliance features. Please download full Skype for Business Windows desktop client from the Office 365 Software portal following the steps in Install Skype for Business on your PC.","shortDescription":"Microsoft Skype for Business gives you instant messaging (IM), audio and video calls, online meetings, availability (presence) information, and sharing capabilities all from one, easy-to-use program.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":5,"sellingCount":5,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Microsoft Skype for Business","keywords":"Business, Skype, client, Office, features, Basic, desktop, Microsoft","description":"Microsoft Skype for Business Basic gives you presence, instant messaging (IM), audio and video calls, online meetings, and sharing capabilities with the latest User Interface.. This is free download. For more information about features available in Skype for B","og:title":"Microsoft Skype for Business","og:description":"Microsoft Skype for Business Basic gives you presence, instant messaging (IM), audio and video calls, online meetings, and sharing capabilities with the latest User Interface.. This is free download. For more information about features available in Skype for B"},"eventUrl":"","translationId":984,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":367,"title":"Web Conferencing Applications","alias":"web-conferencing-applications","description":" Web conferencing is the common name for technology and tools for online meetings and real-time collaboration. Web conferencing allows you to conduct online presentations, collaborate on documents and applications, view websites, videos, images.\r\nWeb conferences, as a rule, are Internet services that require the installation of a client program on each participant’s computer. Some services also provide access to a web conference via a browser using flash, java or a special plug-in.\r\nServices for web conferencing can include features and tools such as screen sharing (screen sharing or individual applications), whiteboard (interactive whiteboard), the ability to show web presentations, co-browsing (the ability to synchronously browse web pages), tools for annotations, monitoring the presence of participants, text chat, integrated VoIP communication, video communication, the ability to change the leader, the ability to give control over the mouse and keyboard, meeting moderation tools, feedback collection tools (on example, polls), tools for scheduling and inviting participants, the ability to record the progress of a web conference.\r\nOften, web conferencing is used with Internet services for audio and video calls (for example, Skype) or they provide conference calling via a regular telephone.","materialsDescription":" What is the first thing that strikes you when we look at businessmen who are trying to establish communication with each other online? All of them require: “Give more opportunities for web conferencing!”. Therefore, it is not at all surprising that the WebRTC technology is gaining the favor of an increasing number of small and medium-sized businesses.\r\nA recent study conducted by Software Advice showed that more than half of employees in small businesses prefer web conferences, noting their efficiency and usability. The advantages are especially noticeable in comparison with communications via telephone or the use of special applications. However, the benefits of web conferencing do not end there - according to the study, they not only increase the speed and quality of online meetings, but also provide a lot of opportunities for collaboration. In addition, and this is obvious, they reduce travel costs.\r\n<span style=\"font-weight: bold;\">Speed and quality come first.</span>\r\nIt is worth noting that now small and medium businesses are almost gone from the use of communication hardware and use desktop computers and mobile devices. Despite the fact that audio and video conferences are still very popular (they are used by 45% and 50% of users, respectively), web conferences are actively replacing them. Judge for yourself - according to statistics, every third user selects them as a means of communication after the first experience of use.\r\nThe main reason for such a rapid growth in popularity is the speed and quality that web conferencing users provide. According to respondents, the main advantage of web conferences is the ability to organize a meeting much faster than before. Now there is no need to spend time on installing special applications like Skype or similar - any communication systems using any third-party programs are a thing of the past. Also worth noting is the ability to connect to the web conference literally in one click.\r\nMore than 40% of the people surveyed showed dissatisfaction with the tedious procedure of entering authorization data, noting the simplicity and convenience of connecting to the WebRTC web conference. All you need is access to the Internet!\r\n<span style=\"font-weight: bold;\">We work in a team</span>\r\nIt is no secret that the use of web conferencing significantly reduces the company's travel expenses. After all, booking tickets, searching for hotels and meeting places can result in a decent amount, which will seriously hurt the company's income. Using web conferences, you get the opportunity to arrange business meetings, even with overseas partners, without leaving your office. But that's not all! Web conferencing offers a range of tools to overcome language barriers. For example, in the field of healthcare, videoconferencing has been used to establish consultations between doctors and patients from completely different countries. With the help of online translators and other special features of web conferences, people can get the necessary help from qualified foreign specialists.\r\nDo not forget that web conferencing is not only a convenient way to hold a video call. You can arrange trainings for your team using file transfer and document display functions, as well as conduct job interviews without wasting time.\r\nIt is interesting to note that small and medium-sized businesses share their product samples with prospective clients using web conferences, turning them into a powerful marketing tool. This brings the business to a fundamentally new level, allowing the company to take a leading position in its industry!","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Web_Conferencing_Applications.png"},{"id":415,"title":"Mobile Enterprise Applications","alias":"mobile-enterprise-applications","description":"The term <span style=\"font-weight: bold; \">enterprise mobile application</span> is used in context of mobile apps created/brought by individual organizations for their workers to carry out functions required to run the organization.\r\nAn enterprise mobile app belonging to an organization is expected to be used by only the workers of that organization. The definition of enterprise mobility apps do not include the mobile apps that an organization create for its customers or consumers of the products or services generated by the organization. \r\nProviders of mobile enterprise application solutions create and develop apps for individual organizations that can buy instead of creating the apps themselves. Reasons for Organizations buying the apps include time and cost savings, technical expertise. Today Enterprise Mobility is playing track role for enterprise transformation.\r\nCompanies are rapidly incorporating mobile applications into their larger IT strategies, allowing them to grow their mobile presence further. Big data, the Internet of Things (IoT), and machine learning are all propelling this growth.\r\nNeed for enterprise mobility applications arose with mobile devices becoming essential in the day to day life and with employees using mobile devices for business purposes. This lead companies to adapt to either Bring Your Own Device (BYOD) or Corporate Owned, Personally Enabled (COPE) approach for Enterprise Mobility. BYOD is making significant progress in the business world, with employees using their own technology at work.\r\nOrganizations having their internal mobile teams develop the apps internally and deploy them. However, some organizations go for enterprise mobile app development company with wide experience in creating Mobile strategies and deploying the apps for Medium to Large Scale Enterprises. These companies provide options for Pre built and custom built turn-key suite of apps. ","materialsDescription":"<h1 class=\"align-center\"><span style=\"font-weight: bold; \">What are corporate mobile apps?</span></h1>\r\nConventionally, corporate mobile applications can be divided into several groups.\r\n<ul><li><span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">The first group</span></span> is applications designed only for work. Their main goal is to reduce company costs, optimize business processes, and, as a result, increase profits. Another option is an application to increase the efficiency of the analytical department, giving its users the opportunity to improve monitoring of the market, competitors, quickly collect and process data on prices, points of sale of goods, etc.</li><li><span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">The second group</span></span> is applications that integrate work and communication. These include corporate social networks, so popular recently. Created in the image and likeness of social networks familiar to everyone, they successfully combine work functionality and allow employees to communicate with each other, create personal pages, workgroups, communities, keep blogs, receive news about the company, share important files, create a common information base and use it at any time. </li><li><span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">The third group</span></span> is applications for monitoring remote employees. Office workers are easy to control: most of the day they are at their workplace, and if necessary, you can organize a system of electronic passes. Remote employees are left to their own devices - it’s very difficult to check whether they arrived at the site on time and reached at all, how many points they visited in a day, and whether they used company materials and equipment to fulfill “left” orders. </li><li><span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">The fourth group</span></span> is Service Desk and Help Desk, designed to automate the processing of client requests while providing technical support to users of IT departments. Most of these systems are online, because it is important for the user to solve the problem as quickly as possible. With their help, you can provide customer support directly from your mobile device. Applications provide an opportunity in the background to access the list of applications, view in detail individual applications, make changes to them, respond and work with comments.</li></ul>\r\n<h1 class=\"align-center\">Top 5 enterprise mobility app features you must know</h1>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Centrally Moderated and Strongly Secured Data Infrastructure.</span> Security must never be at bay when it comes to enterprise mobility apps. In the age of information, data is undoubtedly the most valuable commodity, losing which can result in a massive loss for business enterprises. Data sharing done via enterprise mobility apps or solutions need to be monitored. Construct a centrally moderated and highly secure (multi-level security) infrastructure for enterprise mobility solutions. This approach enhances trust and ensures that critical business data remains safe always.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Automation of Processes.</span> Automation is the main factor behind the adoption of enterprise mobility in the core business processes by the organizations. Businesses aim to streamline their operations with minimal human intervention and cut back on time/cost. The number of device usage in the enterprise domain is increasing year-after-year. The growth showcases the seriousness of organizations to adopt top enterprise mobile apps for enhancing automation and processes for better efficiency. </p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Real-Time Analytics and Connectivity.</span> The integration of enterprise mobility applications in the existing system leverages the technology benefits for seeking better insights into the ongoing processes. Every enterprise app must have cognitive analytical capabilities to succeed. Modern organizations have to manage thousands of procedures, offerings and deal with hundreds of stakeholders at any point in time. In case of such massive data overloads, every enterprise aims to have a real-time data analysis to make better decisions for growth in the future.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Incredible User Experience. </span>An enterprise mobility app must deliver an intuitive user experience. Not only should it focus on making the functionality better, but also on offering the best experience to the users. This step, in turn, will boost app adoption within the enterprise, fulfilling the organization’s aim for automation. The app must contain futuristic features such as in-app notifications, multi-platform support, offline functionality, etc., to offer an incredible user experience. <br /><span style=\"font-weight: bold; \">Event-Driven Approach. </span>Event-driven approach and architecture is the main differentiator, which fuels digital business transformation. This approach mainly revolves around the delivery of solutions that fulfill organizational objectives by offering rapid response to specific events. Moreover, the event-driven approach aims to transform the task flow based on particular circumstances. Businesses would be able to leverage dynamic opportunities to the maximum potential and provide real-time solutions by choosing the event-driven approach for their enterprise mobility applications. </p>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Mobile_Enterprise_Applications.jpg"},{"id":82,"title":"Unified Communications","alias":"unified-communications","description":"Unified communications (UC) is a framework for integrating various asynchronous and real-time communication tools. The goal of UC is to enhance business communication, collaboration and productivity. Unified communications do not represent a singular technology; rather, it describes a strategy for integrating interconnected systems of enterprise communication devices and applications that can be used in concert or successively.\r\nSome business communication tools - like Internet Protocol (IP) telephony and video conferencing - facilitate real-time communication, also called synchronous communication. Other enterprise communication tools, like email, facilitate asynchronous communication, which takes place at a person's convenience.\r\nIncreasingly, team collaboration tools have emerged to offer messaging-centric workflows and near-real-time communication. These tools also offer voice and video capabilities, API integrations and, ultimately, expound on instant messaging services by providing better UC features.\r\nThe goal of unified communications is to integrate the software that supports synchronous and asynchronous communication, so the end user has easy access to all tools from whatever device is in use.\r\nA unified communications environment is typically supported by one or more back-end systems, often referred to as UC platforms, that facilitate integration among services, as well as the front-end clients that provide access. For example, a web conferencing system would make use of an audio conferencing system - which, in turn, would be built on an underlying IP telephony platform - and a unified messaging client would allow click-to-talk (CTC), click-to-chat or click-to-video functionality.\r\nUC also supports users moving from one mode of communication to another within the same session. For example, a user may start communicating via email but then decide to escalate the interaction to real-time communication, transitioning the session to a voice call with one click and then to a video conference with another click without any disruption.\r\nUnified communications systems and their components can be deployed on premises, in a public or private cloud, or a combination of all three. Cloud-based unified communications is also called UC as a service (UCaaS). An open source project called WebRTC, for example, enables real-time communications to be embedded into web browsers.\r\nHistorically, single-vendor UC environments have demonstrated the tightest integration and compatibility. Interoperability among vendors remains an ongoing challenge in UC, but it has also been mitigated, in part, by partnerships, common protocols and open APIs.","materialsDescription":" <span style=\"font-weight: bold;\">What technology do unified communications have?</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Contrasting unified messaging</span></span>\r\nUnified communications are sometimes confused with unified messaging, but it is distinct. Unified communications refer to both real-time and non-real-time delivery of communications based on the preferred method and location of the recipient; unified messaging culls messages from several sources (such as e-mail, voice mail and faxes), but holds those messages only for retrieval at a later time. Unified communications allow for an individual to check and retrieve an e-mail or voice mail from any communication device at any time. It expands beyond voice mail services to data communications and video services.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Components</span></span>\r\nWith unified communications, multiple modes of business communications are integrated. Unified communications is not a single product but a collection of elements that include:\r\n<ul><li>Call control and multimodal communications</li><li>Presence</li><li>Instant messaging</li><li>Unified messaging</li><li>Speech access and personal assistant</li><li>Conferencing (audio, Web and video)</li><li>Collaboration tools</li><li>Mobility</li><li>Business process integration (BPI)</li><li>Software to enable business process integration</li></ul>\r\nPresence — knowing where intended recipients are, and if they are available, in real-time — is a key component of unified communications. Unified communications integrate all systems a user might already use, and helps those systems work together in real-time. For example, unified communications technology could allow a user to seamlessly collaborate with another person on a project, even if the two users are in separate locations. The user could quickly locate the necessary person by accessing an interactive directory, engage in a text messaging session, and then escalate the session to a voice call or even a video call.\r\nIn another example, an employee receives a call from a customer who wants answers. Unified communications enable that employee to call an expert colleague from a real-time list. This way, the employee can answer the customer faster by eliminating rounds of back-and-forth e-mails and phone-tag.\r\nThe examples in the previous paragraph primarily describe "personal productivity" enhancements that tend to benefit the individual user. While such benefits can be important, enterprises are finding that they can achieve even greater impact by using unified communications capabilities to transform business processes. This is achieved by integrating UC functionality directly into the business applications using development tools provided by many of the suppliers. Instead of the individual user invoking the UC functionality to, say, find an appropriate resource, the workflow or process application automatically identifies the resource at the point in the business activity where one is needed.\r\nWhen used in this manner, the concept of presence often changes. Most people associate presence with instant messaging (IM "buddy lists") the status of individuals is identified. But, in many business process applications, what is important is finding someone with a certain skill. In these environments, presence identifies available skills or capabilities.\r\nThis "business process" approach to integrating UC functionality can result in bottom-line benefits that are an order of magnitude greater than those achievable by personal productivity methods alone.\r\n<span style=\"font-weight: bold;\">Related concepts</span>\r\nUnified communications & collaboration (UCC) is the integration of various communications methods with collaboration tools such as virtual white boards, real-time audio and video conferencing, and enhanced call control capabilities. Before this fusion of communications and collaboration tools into a single platform, enterprise collaboration service vendors and enterprise communications service vendors offered distinctly different solutions. Now, collaboration service vendors also offer communications services, and communications service providers have developed collaboration tools.\r\nUnified communications & collaboration as a service (UCCaaS) is cloud-based UCC platforms. Compared to premises-based UCC solutions, UCCaaS platforms offer enhanced flexibility and scalability due to the SaaS subscription model.\r\nUnified communications provisioning is the act of entering and configuring the settings for users of phone systems, instant messaging, telepresence, and other collaboration channels. Provisioners refer to this process as making moves, adds, changes, and deletes or MAC-Ds.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Unified_Communications.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":6,"title":"Ensure Security and Business Continuity"},{"id":5,"title":"Enhance Staff Productivity"},{"id":254,"title":"Centralize management"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":395,"title":"Decentralization of management"},{"id":398,"title":"Poor communication and coordination among staff"},{"id":393,"title":"Complex and non-transparent business processes"},{"id":378,"title":"Low employee productivity"},{"id":370,"title":"No automated business processes"}]}},"categories":[{"id":2,"title":"Virtual machine and cloud system software","alias":"virtual-machine-and-cloud-system-software","description":" A virtual machine (VM) is a software-based computer that exists within another computer’s operating system, often used for the purposes of testing, backing up data, or running SaaS applications. To fully grasp how VMs work, it’s important to first understand how computer software and hardware are typically integrated by an operating system.\r\n"The cloud" refers to servers that are accessed over the Internet, and the software and databases that run on those servers. Cloud servers are located in data centers all over the world. By using cloud computing, users and companies don't have to manage physical servers themselves or run software applications on their own machines.\r\nThe cloud enables users to access the same files and applications from almost any device, because the computing and storage take place on servers in a data center, instead of locally on the user device. This is why a user can log into their Instagram account on a new phone after their old phone breaks and still find their old account in place, with all their photos, videos, and conversation history. It works the same way with cloud email providers like Gmail or Microsoft Office 365, and with cloud storage providers like Dropbox or Google Drive.\r\nFor businesses, switching to cloud computing removes some IT costs and overhead: for instance, they no longer need to update and maintain their own servers, as the cloud vendor they are using will do that. This especially makes an impact on small businesses that may not have been able to afford their own internal infrastructure but can outsource their infrastructure needs affordably via the cloud. The cloud can also make it easier for companies to operate internationally because employees and customers can access the same files and applications from any location.\r\nSeveral cloud providers offer virtual machines to their customers. These virtual machines typically live on powerful servers that can act as a host to multiple VMs and can be used for a variety of reasons that wouldn’t be practical with a locally-hosted VM. These include:\r\n<ul><li>Running SaaS applications - Software-as-a-Service, or SaaS for short, is a cloud-based method of providing software to users. SaaS users subscribe to an application rather than purchasing it once and installing it. These applications are generally served to the user over the Internet. Often, it is virtual machines in the cloud that are doing the computation for SaaS applications as well as delivering them to users. If the cloud provider has a geographically distributed network edge, then the application will run closer to the user, resulting in faster performance.</li><li>Backing up data - Cloud-based VM services are very popular for backing up data because the data can be accessed from anywhere. Plus, cloud VMs provide better redundancy, require less maintenance, and generally scale better than physical data centers. (For example, it’s generally fairly easy to buy an extra gigabyte of storage space from a cloud VM provider, but much more difficult to build a new local data server for that extra gigabyte of data.)</li><li>Hosting services like email and access management - Hosting these services on cloud VMs is generally faster and more cost-effective, and helps minimize maintenance and offload security concerns as well.</li></ul>","materialsDescription":"What is an operating system?\r\nTraditional computers are built out of physical hardware, including hard disk drives, processor chips, RAM, etc. In order to utilize this hardware, computers rely on a type of software known as an operating system (OS). Some common examples of OSes are Mac OSX, Microsoft Windows, Linux, and Android.\r\nThe OS is what manages the computer’s hardware in ways that are useful to the user. For example, if the user wants to access the Internet, the OS directs the network interface card to make the connection. If the user wants to download a file, the OS will partition space on the hard drive for that file. The OS also runs and manages other pieces of software. For example, it can run a web browser and provide the browser with enough random access memory (RAM) to operate smoothly. Typically, operating systems exist within a physical computer at a one-to-one ratio; for each machine, there is a single OS managing its physical resources.\r\n<span style=\"font-weight: bold;\">Can you have two or more operating systems on one computer?</span>\r\nSome users want to be able to run multiple operating systems simultaneously on one computer, either for testing or one of the other reasons listed in the section below. This can be achieved through a process called virtualization. In virtualization, a piece of software behaves as if it were an independent computer. This piece of software is called a virtual machine, also known as a ‘guest’ computer. (The computer on which the VM is running is called the ‘host’.) The guest has an OS as well as its own virtual hardware.\r\n‘Virtual hardware’ may sound like a bit of an oxymoron, but it works by mapping to real hardware on the host computer. For example, the VM’s ‘hard drive’ is really just a file on the host computer’s hard drive. When the VM wants to save a new file, it actually has to communicate with the host OS, which will write this file to the host hard drive. Because virtual hardware must perform this added step of negotiating with the host to access hardware resources, virtual machines can’t run quite as fast as their host computers.\r\nWith virtualization, one computer can run two or more operating systems. The number of VMs that can run on one host is limited only by the host’s available resources. The user can run the OS of a VM in a window like any other program, or they can run it in fullscreen so that it looks and feels like a genuine host OS.\r\n <span style=\"font-weight: bold; \">What are virtual machines used for?</span>\r\nSome of the most popular reasons people run virtual machines include:\r\n<span style=\"font-weight: bold; \">Testing</span> - Oftentimes software developers want to be able to test their applications in different environments. They can use virtual machines to run their applications in various OSes on one computer. This is simpler and more cost-effective than having to test on several different physical machines.\r\n<span style=\"font-weight: bold; \">Running software designed for other OSes</span> - Although certain software applications are only available for a single platform, a VM can run software designed for a different OS. For example, a Mac user who wants to run software designed for Windows can run a Windows VM on their Mac host.\r\n<span style=\"font-weight: bold; \">Running outdated software</span> - Some pieces of older software can’t be run in modern OSes. Users who want to run these applications can run an old OS on a virtual machine.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Virtual_machine_and_cloud_system_software.png"},{"id":1,"title":"Desktop virtualization","alias":"desktop-virtualization","description":" Desktop virtualization is a virtualization technology that separates an individual's PC applications from his or her desktop. Virtualized desktops are generally hosted on a remote central server, rather than the hard drive of the personal computer. Because the client-server computing model is used in virtualizing desktops, desktop virtualization is also known as client virtualization.\r\nDesktop virtualization provides a way for users to maintain their individual desktops on a single, central server. The users may be connected to the central server through a LAN, WAN or over the Internet.\r\nDesktop virtualization has many benefits, including a lower total cost of ownership (TCO), increased security, reduced energy costs, reduced downtime and centralized management.\r\nLimitations of desktop virtualization include difficulty in maintenance and set up of printer drivers; increased downtime in case of network failures; complexity and costs involved in VDI deployment and security risks in the event of improper network management.<br /><br />","materialsDescription":" <span style=\"font-weight: bold; \">What are types of desktop virtualization technologies?</span>\r\nHost-based forms of desktop virtualization require that users view and interact with their virtual desktops over a network by using a remote display protocol. Because processing takes place in a data center, client devices can be traditional PCs, but also thin clients, zero clients, smartphones and tablets. Examples of host-based desktop virtualization technology include:\r\n<span style=\"font-weight: bold; \">Host-based virtual machines:</span> Each user connects to an individual VM that is hosted in a data center. The user may connect to the same VM every time, allowing for personalization (known as a persistent desktop), or be given a fresh VM at each login (a nonpersistent desktop).\r\n<span style=\"font-weight: bold; \">Shared hosted:</span> Users connect to a shared desktop that runs on a server. Microsoft Remote Desktop Services, formerly Terminal Services, takes this client-server approach. Users may also connect to individual applications running on a server; this technology is an example of application virtualization.\r\n<span style=\"font-weight: bold; \">Host-based physical machines:</span> The operating system runs directly on another device's physical hardware.\r\nClient virtualization requires processing to occur on local hardware; the use of thin clients, zero clients and mobile devices is not possible. These types of desktop virtualization include:\r\n<span style=\"font-weight: bold; \">OS image streaming:</span> The operating system runs on local hardware, but it boots to a remote disk image across the network. This is useful for groups of desktops that use the same disk image. OS image streaming, also known as remote desktop virtualization, requires a constant network connection in order to function.\r\n<span style=\"font-weight: bold; \">Client-based virtual machines:</span> A VM runs on a fully functional PC, with a hypervisor in place. Client-based virtual machines can be managed by regularly syncing the disk image with a server, but a constant network connection is not necessary in order for them to function.\r\n<span style=\"font-weight: bold;\">Desktop virtualization vs. virtual desktop infrastructure</span>\r\nThe terms <span style=\"font-style: italic;\">desktop virtualization</span> and virtual desktop infrastructure (VDI) are often used interchangeably, but they are not the same. While VDI is a type of desktop virtualization, not all desktop virtualization uses VDI.\r\nVDI refers to the use of host-based VMs to deliver virtual desktops, which emerged in 2006 as an alternative to Terminal Services and Citrix's client-server approach to desktop virtualization technology. Other types of desktop virtualization -- including the shared hosted model, host-based physical machines and all methods of client virtualization -- are not examples of VDI.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Desktop_virtualization.png"},{"id":367,"title":"Web Conferencing Applications","alias":"web-conferencing-applications","description":" Web conferencing is the common name for technology and tools for online meetings and real-time collaboration. Web conferencing allows you to conduct online presentations, collaborate on documents and applications, view websites, videos, images.\r\nWeb conferences, as a rule, are Internet services that require the installation of a client program on each participant’s computer. Some services also provide access to a web conference via a browser using flash, java or a special plug-in.\r\nServices for web conferencing can include features and tools such as screen sharing (screen sharing or individual applications), whiteboard (interactive whiteboard), the ability to show web presentations, co-browsing (the ability to synchronously browse web pages), tools for annotations, monitoring the presence of participants, text chat, integrated VoIP communication, video communication, the ability to change the leader, the ability to give control over the mouse and keyboard, meeting moderation tools, feedback collection tools (on example, polls), tools for scheduling and inviting participants, the ability to record the progress of a web conference.\r\nOften, web conferencing is used with Internet services for audio and video calls (for example, Skype) or they provide conference calling via a regular telephone.","materialsDescription":" What is the first thing that strikes you when we look at businessmen who are trying to establish communication with each other online? All of them require: “Give more opportunities for web conferencing!”. Therefore, it is not at all surprising that the WebRTC technology is gaining the favor of an increasing number of small and medium-sized businesses.\r\nA recent study conducted by Software Advice showed that more than half of employees in small businesses prefer web conferences, noting their efficiency and usability. The advantages are especially noticeable in comparison with communications via telephone or the use of special applications. However, the benefits of web conferencing do not end there - according to the study, they not only increase the speed and quality of online meetings, but also provide a lot of opportunities for collaboration. In addition, and this is obvious, they reduce travel costs.\r\n<span style=\"font-weight: bold;\">Speed and quality come first.</span>\r\nIt is worth noting that now small and medium businesses are almost gone from the use of communication hardware and use desktop computers and mobile devices. Despite the fact that audio and video conferences are still very popular (they are used by 45% and 50% of users, respectively), web conferences are actively replacing them. Judge for yourself - according to statistics, every third user selects them as a means of communication after the first experience of use.\r\nThe main reason for such a rapid growth in popularity is the speed and quality that web conferencing users provide. According to respondents, the main advantage of web conferences is the ability to organize a meeting much faster than before. Now there is no need to spend time on installing special applications like Skype or similar - any communication systems using any third-party programs are a thing of the past. Also worth noting is the ability to connect to the web conference literally in one click.\r\nMore than 40% of the people surveyed showed dissatisfaction with the tedious procedure of entering authorization data, noting the simplicity and convenience of connecting to the WebRTC web conference. All you need is access to the Internet!\r\n<span style=\"font-weight: bold;\">We work in a team</span>\r\nIt is no secret that the use of web conferencing significantly reduces the company's travel expenses. After all, booking tickets, searching for hotels and meeting places can result in a decent amount, which will seriously hurt the company's income. Using web conferences, you get the opportunity to arrange business meetings, even with overseas partners, without leaving your office. But that's not all! Web conferencing offers a range of tools to overcome language barriers. For example, in the field of healthcare, videoconferencing has been used to establish consultations between doctors and patients from completely different countries. With the help of online translators and other special features of web conferences, people can get the necessary help from qualified foreign specialists.\r\nDo not forget that web conferencing is not only a convenient way to hold a video call. You can arrange trainings for your team using file transfer and document display functions, as well as conduct job interviews without wasting time.\r\nIt is interesting to note that small and medium-sized businesses share their product samples with prospective clients using web conferences, turning them into a powerful marketing tool. This brings the business to a fundamentally new level, allowing the company to take a leading position in its industry!","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Web_Conferencing_Applications.png"},{"id":415,"title":"Mobile Enterprise Applications","alias":"mobile-enterprise-applications","description":"The term <span style=\"font-weight: bold; \">enterprise mobile application</span> is used in context of mobile apps created/brought by individual organizations for their workers to carry out functions required to run the organization.\r\nAn enterprise mobile app belonging to an organization is expected to be used by only the workers of that organization. The definition of enterprise mobility apps do not include the mobile apps that an organization create for its customers or consumers of the products or services generated by the organization. \r\nProviders of mobile enterprise application solutions create and develop apps for individual organizations that can buy instead of creating the apps themselves. Reasons for Organizations buying the apps include time and cost savings, technical expertise. Today Enterprise Mobility is playing track role for enterprise transformation.\r\nCompanies are rapidly incorporating mobile applications into their larger IT strategies, allowing them to grow their mobile presence further. Big data, the Internet of Things (IoT), and machine learning are all propelling this growth.\r\nNeed for enterprise mobility applications arose with mobile devices becoming essential in the day to day life and with employees using mobile devices for business purposes. This lead companies to adapt to either Bring Your Own Device (BYOD) or Corporate Owned, Personally Enabled (COPE) approach for Enterprise Mobility. BYOD is making significant progress in the business world, with employees using their own technology at work.\r\nOrganizations having their internal mobile teams develop the apps internally and deploy them. However, some organizations go for enterprise mobile app development company with wide experience in creating Mobile strategies and deploying the apps for Medium to Large Scale Enterprises. These companies provide options for Pre built and custom built turn-key suite of apps. ","materialsDescription":"<h1 class=\"align-center\"><span style=\"font-weight: bold; \">What are corporate mobile apps?</span></h1>\r\nConventionally, corporate mobile applications can be divided into several groups.\r\n<ul><li><span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">The first group</span></span> is applications designed only for work. Their main goal is to reduce company costs, optimize business processes, and, as a result, increase profits. Another option is an application to increase the efficiency of the analytical department, giving its users the opportunity to improve monitoring of the market, competitors, quickly collect and process data on prices, points of sale of goods, etc.</li><li><span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">The second group</span></span> is applications that integrate work and communication. These include corporate social networks, so popular recently. Created in the image and likeness of social networks familiar to everyone, they successfully combine work functionality and allow employees to communicate with each other, create personal pages, workgroups, communities, keep blogs, receive news about the company, share important files, create a common information base and use it at any time. </li><li><span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">The third group</span></span> is applications for monitoring remote employees. Office workers are easy to control: most of the day they are at their workplace, and if necessary, you can organize a system of electronic passes. Remote employees are left to their own devices - it’s very difficult to check whether they arrived at the site on time and reached at all, how many points they visited in a day, and whether they used company materials and equipment to fulfill “left” orders. </li><li><span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">The fourth group</span></span> is Service Desk and Help Desk, designed to automate the processing of client requests while providing technical support to users of IT departments. Most of these systems are online, because it is important for the user to solve the problem as quickly as possible. With their help, you can provide customer support directly from your mobile device. Applications provide an opportunity in the background to access the list of applications, view in detail individual applications, make changes to them, respond and work with comments.</li></ul>\r\n<h1 class=\"align-center\">Top 5 enterprise mobility app features you must know</h1>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Centrally Moderated and Strongly Secured Data Infrastructure.</span> Security must never be at bay when it comes to enterprise mobility apps. In the age of information, data is undoubtedly the most valuable commodity, losing which can result in a massive loss for business enterprises. Data sharing done via enterprise mobility apps or solutions need to be monitored. Construct a centrally moderated and highly secure (multi-level security) infrastructure for enterprise mobility solutions. This approach enhances trust and ensures that critical business data remains safe always.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Automation of Processes.</span> Automation is the main factor behind the adoption of enterprise mobility in the core business processes by the organizations. Businesses aim to streamline their operations with minimal human intervention and cut back on time/cost. The number of device usage in the enterprise domain is increasing year-after-year. The growth showcases the seriousness of organizations to adopt top enterprise mobile apps for enhancing automation and processes for better efficiency. </p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Real-Time Analytics and Connectivity.</span> The integration of enterprise mobility applications in the existing system leverages the technology benefits for seeking better insights into the ongoing processes. Every enterprise app must have cognitive analytical capabilities to succeed. Modern organizations have to manage thousands of procedures, offerings and deal with hundreds of stakeholders at any point in time. In case of such massive data overloads, every enterprise aims to have a real-time data analysis to make better decisions for growth in the future.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Incredible User Experience. </span>An enterprise mobility app must deliver an intuitive user experience. Not only should it focus on making the functionality better, but also on offering the best experience to the users. This step, in turn, will boost app adoption within the enterprise, fulfilling the organization’s aim for automation. The app must contain futuristic features such as in-app notifications, multi-platform support, offline functionality, etc., to offer an incredible user experience. <br /><span style=\"font-weight: bold; \">Event-Driven Approach. </span>Event-driven approach and architecture is the main differentiator, which fuels digital business transformation. This approach mainly revolves around the delivery of solutions that fulfill organizational objectives by offering rapid response to specific events. Moreover, the event-driven approach aims to transform the task flow based on particular circumstances. Businesses would be able to leverage dynamic opportunities to the maximum potential and provide real-time solutions by choosing the event-driven approach for their enterprise mobility applications. </p>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Mobile_Enterprise_Applications.jpg"},{"id":82,"title":"Unified Communications","alias":"unified-communications","description":"Unified communications (UC) is a framework for integrating various asynchronous and real-time communication tools. The goal of UC is to enhance business communication, collaboration and productivity. Unified communications do not represent a singular technology; rather, it describes a strategy for integrating interconnected systems of enterprise communication devices and applications that can be used in concert or successively.\r\nSome business communication tools - like Internet Protocol (IP) telephony and video conferencing - facilitate real-time communication, also called synchronous communication. Other enterprise communication tools, like email, facilitate asynchronous communication, which takes place at a person's convenience.\r\nIncreasingly, team collaboration tools have emerged to offer messaging-centric workflows and near-real-time communication. These tools also offer voice and video capabilities, API integrations and, ultimately, expound on instant messaging services by providing better UC features.\r\nThe goal of unified communications is to integrate the software that supports synchronous and asynchronous communication, so the end user has easy access to all tools from whatever device is in use.\r\nA unified communications environment is typically supported by one or more back-end systems, often referred to as UC platforms, that facilitate integration among services, as well as the front-end clients that provide access. For example, a web conferencing system would make use of an audio conferencing system - which, in turn, would be built on an underlying IP telephony platform - and a unified messaging client would allow click-to-talk (CTC), click-to-chat or click-to-video functionality.\r\nUC also supports users moving from one mode of communication to another within the same session. For example, a user may start communicating via email but then decide to escalate the interaction to real-time communication, transitioning the session to a voice call with one click and then to a video conference with another click without any disruption.\r\nUnified communications systems and their components can be deployed on premises, in a public or private cloud, or a combination of all three. Cloud-based unified communications is also called UC as a service (UCaaS). An open source project called WebRTC, for example, enables real-time communications to be embedded into web browsers.\r\nHistorically, single-vendor UC environments have demonstrated the tightest integration and compatibility. Interoperability among vendors remains an ongoing challenge in UC, but it has also been mitigated, in part, by partnerships, common protocols and open APIs.","materialsDescription":" <span style=\"font-weight: bold;\">What technology do unified communications have?</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Contrasting unified messaging</span></span>\r\nUnified communications are sometimes confused with unified messaging, but it is distinct. Unified communications refer to both real-time and non-real-time delivery of communications based on the preferred method and location of the recipient; unified messaging culls messages from several sources (such as e-mail, voice mail and faxes), but holds those messages only for retrieval at a later time. Unified communications allow for an individual to check and retrieve an e-mail or voice mail from any communication device at any time. It expands beyond voice mail services to data communications and video services.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Components</span></span>\r\nWith unified communications, multiple modes of business communications are integrated. Unified communications is not a single product but a collection of elements that include:\r\n<ul><li>Call control and multimodal communications</li><li>Presence</li><li>Instant messaging</li><li>Unified messaging</li><li>Speech access and personal assistant</li><li>Conferencing (audio, Web and video)</li><li>Collaboration tools</li><li>Mobility</li><li>Business process integration (BPI)</li><li>Software to enable business process integration</li></ul>\r\nPresence — knowing where intended recipients are, and if they are available, in real-time — is a key component of unified communications. Unified communications integrate all systems a user might already use, and helps those systems work together in real-time. For example, unified communications technology could allow a user to seamlessly collaborate with another person on a project, even if the two users are in separate locations. The user could quickly locate the necessary person by accessing an interactive directory, engage in a text messaging session, and then escalate the session to a voice call or even a video call.\r\nIn another example, an employee receives a call from a customer who wants answers. Unified communications enable that employee to call an expert colleague from a real-time list. This way, the employee can answer the customer faster by eliminating rounds of back-and-forth e-mails and phone-tag.\r\nThe examples in the previous paragraph primarily describe "personal productivity" enhancements that tend to benefit the individual user. While such benefits can be important, enterprises are finding that they can achieve even greater impact by using unified communications capabilities to transform business processes. This is achieved by integrating UC functionality directly into the business applications using development tools provided by many of the suppliers. Instead of the individual user invoking the UC functionality to, say, find an appropriate resource, the workflow or process application automatically identifies the resource at the point in the business activity where one is needed.\r\nWhen used in this manner, the concept of presence often changes. Most people associate presence with instant messaging (IM "buddy lists") the status of individuals is identified. But, in many business process applications, what is important is finding someone with a certain skill. In these environments, presence identifies available skills or capabilities.\r\nThis "business process" approach to integrating UC functionality can result in bottom-line benefits that are an order of magnitude greater than those achievable by personal productivity methods alone.\r\n<span style=\"font-weight: bold;\">Related concepts</span>\r\nUnified communications & collaboration (UCC) is the integration of various communications methods with collaboration tools such as virtual white boards, real-time audio and video conferencing, and enhanced call control capabilities. Before this fusion of communications and collaboration tools into a single platform, enterprise collaboration service vendors and enterprise communications service vendors offered distinctly different solutions. Now, collaboration service vendors also offer communications services, and communications service providers have developed collaboration tools.\r\nUnified communications & collaboration as a service (UCCaaS) is cloud-based UCC platforms. Compared to premises-based UCC solutions, UCCaaS platforms offer enhanced flexibility and scalability due to the SaaS subscription model.\r\nUnified communications provisioning is the act of entering and configuring the settings for users of phone systems, instant messaging, telepresence, and other collaboration channels. Provisioners refer to this process as making moves, adds, changes, and deletes or MAC-Ds.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Unified_Communications.png"}],"additionalInfo":{"budgetNotExceeded":"-1","functionallyTaskAssignment":"-1","projectWasPut":"-1","price":0,"source":{"url":"https://ko.com.ua/ami_obespechila_doneckteplokommunjenergo_sredstvami_kollektivnoj_raboty_83864","title":"Media"}},"comments":[],"references":[],"referencesCount":0,"similarImplementations":[{"id":805,"title":"Amazon WorkSpaces for Corte dei conti","description":"<span style=\"color: rgb(97, 97, 97); \"><span style=\"font-style: italic; \">"We have no concerns about security or compliance. It's not easy to replicate the same security levels that we have on premises, but working in AWS, we're confident that we're following best practices for data protection, network access, and other security measures",</span> Leandro Gelasi, IT Officer<br /></span>\r\n\r\n<span style=\"font-weight: bold; \"><span style=\"color: rgb(97, 97, 97); \">The Challenge</span></span>\r\n<span style=\"color: rgb(97, 97, 97); \"></span>Despite its long-established roots,Corte dei conti (Cdc)<span style=\"color: rgb(97, 97, 97); \">isn’t an institution that has remained entrenched in the past. It understands that modernization is key to keeping relevant in a fast-moving world, and as a result it has embraced change in its processes and structure. IT has been central to this. Leandro Gelasi, IT officer at Corte dei conti, says<span style=\"font-style: italic; \">,“We have a deep commitment to continuous improvement, and to support this goal we need an agile and elastic IT infrastructure.”</span></span>\r\n<span style=\"color: rgb(97, 97, 97); \">Gelasi and his team wanted to move away from time-consuming management of physical IT. <span style=\"font-style: italic;\">“We wanted to focus on providing an excellent service, rather than on handling hardware,”</span> he says. A larger initiative to boost employee productivity went hand in hand with this efficiency drive, as Gelasi continues, <span style=\"font-style: italic;\">“We wanted to change the way our 3,000-plus employees worked, enabling them to access applications from anywhere, on any device. But we had to ensure that this flexibility for staff didn’t jeopardize the safety of data.”</span></span>\r\n<span style=\"color: rgb(97, 97, 97); \">Given its high-profile role in keeping public finances in check—and with the Italian government requiring agencies to cut IT expenditure in line with wider budget cuts—Cdc also had to focus on reducing its own costs. With a largely Citrix-based infrastructure, Corte dei conti had invested a lot in training its staff in this technology. It wanted to make the most of this investment, while at the same time making its architecture more agile.<br /><br /><span style=\"font-weight: bold;\">Why Amazon Web Services</span></span>\r\n<span style=\"color: rgb(97, 97, 97); \">The answer was a hybrid cloud environment, and Cdc chose Amazon Web Services (AWS) and AWS Advanced Consulting Partner XPeppers to help it in this journey, starting with adopting a virtual desktop infrastructure (VDI) based on Amazon WorkSpaces. Gelasi says, <span style=\"font-style: italic;\">“We looked at AWS and realized it was the perfect platform for our migration to the cloud. We had worked with XPeppers before, so it was our first choice to help us move to AWS and ensure seamless integration with our Citrix environment.”</span></span>\r\n<span style=\"color: rgb(97, 97, 97); \">The infrastructure runs on 25 Amazon Elastic Compute Cloud (Amazon EC2) instances, which run only during office hours, between 8:00 am and 8:00 pm. Cdc uses AWS Lambda to orchestrate the startup and shutdown for each instance. Each department has a dedicated Amazon Virtual Private Cloud (Amazon VPC) and a virtual private network connection between the VPCs and Cdc’s data centers.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Paolo Latella, solutions architect at XPeppers, says, <span style=\"font-style: italic;\">“Because it deals with sensitive data, Corte dei conti needs a secure architecture. We worked with Cdc to explain best practices in the cloud, ensuring that it maintains the highest security levels.” </span>For example, AWS Identity and Access Management (IAM) helps the court control access to resources, and Amazon CloudWatch allows the team to keep applications running smoothly. Plus, through the AWS Marketplace, Cdc can choose the software and services it needs to implement a security model that replicates its on-premises structure.<br /><br /><span style=\"font-weight: bold;\">The Benefits</span></span>\r\n<span style=\"color: rgb(97, 97, 97); \">First and foremost, Gelasi and his team feel safe working in the cloud. <span style=\"font-style: italic;\">“We have no concerns about security or compliance,” he says. “It’s not easy to replicate the same security levels that we have on premises, but working in AWS, we’re confident that we’re following best practices for data protection, network access, and other security measures.”</span><br />He continues, <span style=\"font-style: italic;\">“The service that our users are getting is vastly improved. We have very little feedback, which is great for us. No news is good news in IT.” </span>In addition, internal users have more flexibility and can access applications on their laptops, tablets, and smartphones from anywhere. <span style=\"font-style: italic;\">“We have made it possible for court employees such as magistrates to work effectively from home. Previously, they could only access applications from the office, but now they can do this wherever they are. As a result, they’re much more productive. Decisions get made faster and the whole system works better. It’s a brilliant result for our entire organization,” </span>says Gelasi.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Managing processes is also easier, so the Cdc IT team can focus on developing services for both internal and external clients. One of the IT team’s goals in the organization’s larger drive to boost efficiency is to provide services to government agencies across Italy. Gelasi says, <span style=\"font-style: italic;\">“With our AWS infrastructure, it’s easier for us to offer IT to other institutions, which helps them cut costs in line with government initiatives.”</span></span>\r\n<span style=\"color: rgb(97, 97, 97); \"><span style=\"font-style: italic;\">“We’re saving money in the cloud too,”</span> he continues. <span style=\"font-style: italic;\">“By moving to AWS, we avoided €40,000 in hardware costs.”</span> Operating expenses are more difficult to determine, but Gelasi is convinced that with the VDI project, Cdc is cutting energy consumption and saving money on air conditioning and electricity. <span style=\"font-style: italic;\">“One of the drivers of the project was to get better visibility of costs and be more accountable,”</span> he says. <span style=\"font-style: italic;\">“As we move more of our infrastructure to the AWS cloud, we’ll be able to do this too.”</span></span>\r\n<span style=\"color: rgb(97, 97, 97); \">Having successfully deployed VDI to 250 users across Cdc, the team is now rolling it out across all of the organization’s regions, eventually giving its 3,000 employees the tools to be more productive. The court is also working with XPeppers to build its disaster recovery on AWS and move more workloads to the cloud for improved agility. <span style=\"font-style: italic;\">“The biggest benefit of working in the AWS cloud? I can’t pinpoint just one,”</span> says Gelasi. <span style=\"font-style: italic;\">“It’s the whole package. We’ve got more flexibility, we can scale seamlessly, and we have more time to provide a great service to our customers.”</span></span>","alias":"amazon-workspaces-for-corte-dei-conti","roi":0,"seo":{"title":"Amazon WorkSpaces for Corte dei conti","keywords":"","description":"<span style=\"color: rgb(97, 97, 97); \"><span style=\"font-style: italic; \">"We have no concerns about security or compliance. It's not easy to replicate the same security levels that we have on premises, but working in AWS, we're confident that we're follo","og:title":"Amazon WorkSpaces for Corte dei conti","og:description":"<span style=\"color: rgb(97, 97, 97); \"><span style=\"font-style: italic; \">"We have no concerns about security or compliance. It's not easy to replicate the same security levels that we have on premises, but working in AWS, we're confident that we're follo"},"deal_info":"","user":{"id":5536,"title":"Corte dei conti","logoURL":"https://old.roi4cio.com/uploads/roi/company/Corte_dei_conti_logo.jpg","alias":"corte-dei-conti","address":"","roles":[],"description":" Corte dei conti (Cdc), or the Court of Auditors, is responsible for auditing and overseeing the accounts and budgets of all public institutions in Italy. Founded in 1862, its remit is set out in Article 100 of the Italian Constitution, which details the court’s judicial and administrative role in safeguarding public money, as well as in “preventing and avoiding waste and bad management of public finances.”\r\n\r\n","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.corteconti.it/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Corte dei conti","keywords":"","description":" Corte dei conti (Cdc), or the Court of Auditors, is responsible for auditing and overseeing the accounts and budgets of all public institutions in Italy. Founded in 1862, its remit is set out in Article 100 of the Italian Constitution, which details the court","og:title":"Corte dei conti","og:description":" Corte dei conti (Cdc), or the Court of Auditors, is responsible for auditing and overseeing the accounts and budgets of all public institutions in Italy. Founded in 1862, its remit is set out in Article 100 of the Italian Constitution, which details the court","og:image":"https://old.roi4cio.com/uploads/roi/company/Corte_dei_conti_logo.jpg"},"eventUrl":""},"supplier":{"id":5547,"title":"XPeppers","logoURL":"https://old.roi4cio.com/uploads/roi/company/xpeppers.png","alias":"xpeppers","address":"","roles":[],"description":"A software development company but, first of all, a team of passionate people, focused on agile methodologies and technology\r\nXPeppers practices eXtreme Programming (Pair Programming, Test-Driven Development, Refactoring, Continuous Integration, Simple Design) and DevOps. <br />\r\nXPeppers helps companies in reducing the time between ideas and production software, combining Lean, Agile, DevOps and using the Cloud.<br />\r\nAn Advanced Partner of the AWS Partner Network (APN). XPeppers helps its customers successfully migrate to the cloud and benefit from continuous integration and delivery practices.<br /><br /><br />","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":1,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.xpeppers.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"XPeppers","keywords":"","description":"A software development company but, first of all, a team of passionate people, focused on agile methodologies and technology\r\nXPeppers practices eXtreme Programming (Pair Programming, Test-Driven Development, Refactoring, Continuous Integration, Simple Design)","og:title":"XPeppers","og:description":"A software development company but, first of all, a team of passionate people, focused on agile methodologies and technology\r\nXPeppers practices eXtreme Programming (Pair Programming, Test-Driven Development, Refactoring, Continuous Integration, Simple Design)","og:image":"https://old.roi4cio.com/uploads/roi/company/xpeppers.png"},"eventUrl":""},"vendors":[{"id":176,"title":"Amazon Web Services","logoURL":"https://old.roi4cio.com/uploads/roi/company/aws_logo.png","alias":"amazon-web-services","address":"","roles":[],"description":" <span lang=\"EN-US\">Amazon Web Services (AWS) is the world's largest cloud service provider. Since 2006, the company has been offering customers various elements of a virtual IT infrastructure in the form of web services. Today AWS offers about 70 cloud services deployed on the basis of more than a hundred of its own data centers located in the United States, Europe, Brazil, Singapore, Japan, and Australia. Services include computing power, secure storage, analytics, mobile applications, databases, IoT solutions, and more. Customers pay only for the services they consume, dynamically expanding or contracting cloud resources as needed.</span> \r\n<span lang=\"EN-US\"> </span>\r\n<span lang=\"EN-US\"><span lang=\"en\">Through</span></span> cloud computing, companies do not need to pre-plan the use of servers and other IT infrastructure and pay for all this for several weeks or months in advance. Instead, they can deploy hundreds or thousands of servers in minutes and achieve results quickly.\r\n<span lang=\"EN-US\"> </span>\r\n<span lang=\"EN-US\">Today, Amazon Web Services provides a highly reliable, scalable, infrastructure platform in the cloud that powers hundreds of thousands of organizations in every industry and government in nearly every country in the world.</span>","companyTypes":[],"products":{},"vendoredProductsCount":36,"suppliedProductsCount":36,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":18,"vendorImplementationsCount":20,"vendorPartnersCount":0,"supplierPartnersCount":4,"b4r":0,"categories":{},"companyUrl":"http://aws.amazon.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Amazon Web Services","keywords":"Amazon, services, known, computing, also, tools, Services, than","description":" <span lang=\"EN-US\">Amazon Web Services (AWS) is the world's largest cloud service provider. Since 2006, the company has been offering customers various elements of a virtual IT infrastructure in the form of web services. Today AWS offers about 70 cloud s","og:title":"Amazon Web Services","og:description":" <span lang=\"EN-US\">Amazon Web Services (AWS) is the world's largest cloud service provider. Since 2006, the company has been offering customers various elements of a virtual IT infrastructure in the form of web services. Today AWS offers about 70 cloud s","og:image":"https://old.roi4cio.com/uploads/roi/company/aws_logo.png"},"eventUrl":""}],"products":[{"id":108,"logo":false,"scheme":false,"title":"Amazon EC2","vendorVerified":0,"rating":"2.00","implementationsCount":7,"suppliersCount":0,"alias":"amazon-ec2","companyTypes":[],"description":"Amazon Elastic Compute Cloud (Amazon EC2) is a web service that provides secure, resizable compute capacity in the cloud. It is designed to make web-scale cloud computing easier for developers.\r\nAmazon EC2’s simple web service interface allows you to obtain and configure capacity with minimal friction. It provides you with complete control of your computing resources and lets you run on Amazon’s proven computing environment. Amazon EC2 reduces the time required to obtain and boot new server instances to minutes, allowing you to quickly scale capacity, both up and down, as your computing requirements change. Amazon EC2 changes the economics of computing by allowing you to pay only for capacity that you actually use. Amazon EC2 provides developers the tools to build failure resilient applications and isolate them from common failure scenarios.<br />\r\n\r\n<span style=\"font-weight: bold;\">BENEFITS</span><br />\r\nELASTIC WEB-SCALE COMPUTING<br />\r\nAmazon EC2 enables you to increase or decrease capacity within minutes, not hours or days. You can commission one, hundreds, or even thousands of server instances simultaneously. You can also use Amazon EC2 Auto Scaling to maintain availability of your EC2 fleet and automatically scale your fleet up and down depending on its needs in order to maximize performance and minimize cost. To scale multiple services, you can use AWS Auto Scaling.<br />\r\nCOMPLETELY CONTROLLED<br />\r\nYou have complete control of your instances including root access and the ability to interact with them as you would any machine. You can stop any instance while retaining the data on the boot partition, and then subsequently restart the same instance using web service APIs. Instances can be rebooted remotely using web service APIs, and you also have access to their console output.<br />\r\nFLEXIBLE CLOUD HOSTING SERVICES<br />\r\nYou have the choice of multiple instance types, operating systems, and software packages. Amazon EC2 allows you to select a configuration of memory, CPU, instance storage, and the boot partition size that is optimal for your choice of operating system and application. For example, choice of operating systems includes numerous Linux distributions and Microsoft Windows Server.<br />\r\nINTEGRATED<br />\r\nAmazon EC2 is integrated with most AWS services such as Amazon Simple Storage Service (Amazon S3), Amazon Relational Database Service (Amazon RDS), and Amazon Virtual Private Cloud (Amazon VPC) to provide a complete, secure solution for computing, query processing, and cloud storage across a wide range of applications.<br />\r\nRELIABLE<br />\r\nAmazon EC2 offers a highly reliable environment where replacement instances can be rapidly and predictably commissioned. The service runs within Amazon’s proven network infrastructure and data centers. The Amazon EC2 Service Level Agreement commitment is 99.99% availability for each Amazon EC2 Region.<br />\r\nSECURE<br />\r\nCloud security at AWS is the highest priority. As an AWS customer, you will benefit from a data center and network architecture built to meet the requirements of the most security-sensitive organizations. Amazon EC2 works in conjunction with Amazon VPC to provide security and robust networking functionality for your compute resources.<br />\r\nINEXPENSIVE<br />\r\nAmazon EC2 passes on to you the financial benefits of Amazon’s scale. You pay a very low rate for the compute capacity you actually consume.<br />\r\nEASY TO START<br />\r\nThere are several ways to get started with Amazon EC2. You can use the AWS Management Console, the AWS Command Line Tools (CLI), or AWS SDKs. AWS is free to get started. ","shortDescription":"Amazon EC2 - Virtual Server Hosting\r\nAmazon Elastic Compute Cloud is a web service that provides resizable compute capacity in the cloud.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Amazon EC2","keywords":"Amazon, your, with, instances, computing, capacity, service, have","description":"Amazon Elastic Compute Cloud (Amazon EC2) is a web service that provides secure, resizable compute capacity in the cloud. It is designed to make web-scale cloud computing easier for developers.\r\nAmazon EC2’s simple web service interface allows you to obtain an","og:title":"Amazon EC2","og:description":"Amazon Elastic Compute Cloud (Amazon EC2) is a web service that provides secure, resizable compute capacity in the cloud. It is designed to make web-scale cloud computing easier for developers.\r\nAmazon EC2’s simple web service interface allows you to obtain an"},"eventUrl":"","translationId":108,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":689,"title":"Amazon Web Services","alias":"amazon-web-services","description":"Amazon Web Services (AWS) is a subsidiary of Amazon that provides on-demand cloud computing platforms to individuals, companies and governments, on a metered pay-as-you-go basis. In aggregate, these cloud computing web services provide a set of primitive, abstract technical infrastructure and distributed computing building blocks and tools. One of these services is Amazon Elastic Compute Cloud, which allows users to have at their disposal a virtual cluster of computers, available all the time, through the Internet. AWS's version of virtual computers emulate most of the attributes of a real computer including hardware (CPU(s) & GPU(s) for processing, local/RAM memory, hard-disk/SSD storage); a choice of operating systems; networking; and pre-loaded application software such as web servers, databases, CRM, etc.\r\nThe AWS technology is implemented at server farms throughout the world, and maintained by the Amazon subsidiary. Fees are based on a combination of usage, the hardware/OS/software/networking features chosen by the subscriber, required availability, redundancy, security, and service options. Subscribers can pay for a single virtual AWS computer, a dedicated physical computer, or clusters of either. As part of the subscription agreement, Amazon provides security for subscribers' system. AWS operates from many global geographical regions including 6 in North America.\r\nIn 2017, AWS comprised more than 90 services spanning a wide range including computing, storage, networking, database, analytics, application services, deployment, management, mobile, developer tools, and tools for the Internet of Things. The most popular include Amazon Elastic Compute Cloud (EC2) and Amazon Simple Storage Service (S3). Most services are not exposed directly to end users, but instead offer functionality through APIs for developers to use in their applications. Amazon Web Services' offerings are accessed over HTTP, using the REST architectural style and SOAP protocol.\r\nAmazon markets AWS to subscribers as a way of obtaining large scale computing capacity more quickly and cheaply than building an actual physical server farm. All services are billed based on usage, but each service measures usage in varying ways. As of 2017, AWS owns a dominant 34% of all cloud (IaaS, PaaS) while the next three competitors Microsoft, Google, and IBM have 11%, 8%, 6% respectively according to Synergy Group.","materialsDescription":"<span style=\"font-weight: bold;\">What is "Amazon Web Services" (AWS)?</span>\r\nWith Amazon Web Services (AWS), organizations can flexibly deploy storage space and computing capacity into Amazon's data centers without having to maintain their own hardware. A big advantage is that the infrastructure covers all dimensions for cloud computing. Whether it's video sharing, high-resolution photos, print data, or text documents, AWS can deliver IT resources on-demand, over the Internet, at a cost-per-use basis. The service exists since 2006 as a wholly owned subsidiary of Amazon Inc. The idea arose from the extensive experience with Amazon.com and the own need for platforms for web services in the cloud.\r\n<span style=\"font-weight: bold;\">What is Cloud Computing?</span>\r\nCloud Computing is a service that gives you access to expert-managed technology resources. The platform in the cloud provides the infrastructure (eg computing power, storage space) that does not have to be installed and configured in contrast to the hardware you have purchased yourself. Cloud computing only pays for the resources that are used. For example, a web shop can increase its computing power in the Christmas business and book less in "weak" months.\r\nAccess is via the Internet or VPN. There are no ongoing investment costs after the initial setup, but resources such as Virtual servers, databases or storage services are charged only after they have been used.\r\n<span style=\"font-weight: bold;\">Where is my data on Amazon AWS?</span>\r\nThere are currently eight Amazon Data Centers (AWS Regions) in different regions of the world. For each Amazon AWS resource, only the customer can decide where to use or store it. German customers typically use the data center in Ireland, which is governed by European law.\r\n<span style=\"font-weight: bold;\">How safe is my data on Amazon AWS?</span>\r\nThe customer data is stored in a highly secure infrastructure. Safety measures include, but are not limited to:\r\n<ul><li>Protection against DDos attacks (Distributed Denial of Service)</li><li>Defense against brute-force attacks on AWS accounts</li><li>Secure access: The access options are made via SSL.</li><li> Firewall: Output and access to the AWS data can be controlled.</li><li>Encrypted Data Storage: Data can be encrypted with Advanced Encryption Standard (AES) 256.</li><li>Certifications: Regular security review by independent certifications that AWS has undergone.</li></ul>\r\nEach Amazon data center (AWS region) consists of at least one Availability Zone. Availability Zones are stand-alone sub-sites that have been designed to be isolated from faults in other Availability Zones (independent power and data supply). Certain AWS resources, such as Database Services (RDS) or Storage Services (S3) automatically replicate your data within the AWS region to the different Availability Zones.\r\nAmazon AWS has appropriate certifications such as ISO27001 and has implemented a comprehensive security concept for the operation of its data center.\r\n<span style=\"font-weight: bold;\">Do I have to worry about hardware on Amazon AWS?</span>\r\nNo, all Amazon AWS resources are virtualized. Only Amazon takes care of the replacement and upgrade of hardware.\r\nNormally, you will not get anything out of defective hardware because defective storage media are exchanged by Amazon and since your data is stored multiple times redundantly, there is usually no problem either.\r\nIncidentally, if your chosen resources do not provide enough performance, you can easily get more CPU power from resources by just a few mouse clicks. You do not have to install anything new, just reboot your virtual machine or virtual database instance.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Amazon_Web_Services.png"},{"id":786,"title":"IaaS - computing","alias":"iaas-computing","description":"Cloud computing is the on demand availability of computer system resources, especially data storage and computing power, without direct active management by the user. The term is generally used to describe data centers available to many users over the Internet. Large clouds, predominant today, often have functions distributed over multiple locations from central servers. If the connection to the user is relatively close, it may be designated an edge server.\r\nInfrastructure as a service (IaaS) are online services that provide high-level APIs used to dereference various low-level details of underlying network infrastructure like physical computing resources, location, data partitioning, scaling, security, backup etc. A hypervisor, such as Xen, Oracle VirtualBox, Oracle VM, KVM, VMware ESX/ESXi, or Hyper-V, LXD, runs the virtual machines as guests. Pools of hypervisors within the cloud operational system can support large numbers of virtual machines and the ability to scale services up and down according to customers' varying requirements.\r\nTypically IaaS involve the use of a cloud orchestration technology like Open Stack, Apache Cloudstack or Open Nebula. This manages the creation of a virtual machine and decides on which hypervisor (i.e. physical host) to start it, enables VM migration features between hosts, allocates storage volumes and attaches them to VMs, usage information for billing and lots more.\r\nAn alternative to hypervisors are Linux containers, which run in isolated partitions of a single Linux kernel running directly on the physical hardware. Linux cgroups and namespaces are the underlying Linux kernel technologies used to isolate, secure and manage the containers. Containerisation offers higher performance than virtualization, because there is no hypervisor overhead. Also, container capacity auto-scales dynamically with computing load, which eliminates the problem of over-provisioning and enables usage-based billing.\r\nIaaS clouds often offer additional resources such as a virtual-machine disk-image library, raw block storage, file or object storage, firewalls, load balancers, IP addresses, virtual local area networks (VLANs), and software bundles.\r\nThe NIST's definition of cloud computing defines Infrastructure as a Service as:\r\n<ul><li>The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications.</li><li>The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, and deployed applications; and possibly limited control of select networking components (e.g., host firewalls).</li></ul>\r\nAccording to the Internet Engineering Task Force (IETF), the most basic cloud-service model is that of providers offering IT infrastructure — virtual machines and other resources — as a service to subscribers.\r\nIaaS-cloud providers supply these resources on-demand from their large pools of equipment installed in data centers. For wide-area connectivity, customers can use either the Internet or carrier clouds (dedicated virtual private networks). To deploy their applications, cloud users install operating-system images and their application software on the cloud infrastructure. In this model, the cloud user patches and maintains the operating systems and the application software. Cloud providers typically bill IaaS services on a utility computing basis: cost reflects the amount of resources allocated and consumed.","materialsDescription":" <span style=\"font-weight: bold; \">Cloud Computing Basics</span>\r\nWhether you are running applications that share photos to millions of mobile users or you’re supporting the critical operations of your business, a cloud services platform provides rapid access to flexible and low cost IT resources. With cloud computing, you don’t need to make large upfront investments in hardware and spend a lot of time on the heavy lifting of managing that hardware. Instead, you can provision exactly the right type and size of computing resources you need to power your newest bright idea or operate your IT department. You can access as many resources as you need, almost instantly, and only pay for what you use.\r\n<span style=\"font-weight: bold; \">How Does Cloud Computing Work?</span>\r\nCloud computing provides a simple way to access servers, storage, databases and a broad set of application services over the Internet. A Cloud services platform such as Amazon Web Services owns and maintains the network-connected hardware required for these application services, while you provision and use what you need via a web application.\r\n<span style=\"font-weight: bold; \">Six Advantages and Benefits of Cloud Computing</span>\r\n<span style=\"font-weight: bold; \">Trade capital expense for variable expense</span>\r\nInstead of having to invest heavily in data centers and servers before you know how you’re going to use them, you can only pay when you consume computing resources, and only pay for how much you consume.\r\n<span style=\"font-weight: bold; \">Benefit from massive economies of scale</span>\r\nBy using cloud computing, you can achieve a lower variable cost than you can get on your own. Because usage from hundreds of thousands of customers are aggregated in the cloud, providers can achieve higher economies of scale which translates into lower pay as you go prices.\r\n<span style=\"font-weight: bold; \">Stop guessing capacity</span>\r\nEliminate guessing on your infrastructure capacity needs. When you make a capacity decision prior to deploying an application, you often either end up sitting on expensive idle resources or dealing with limited capacity. With cloud computing, these problems go away. You can access as much or as little as you need, and scale up and down as required with only a few minutes notice.\r\n<span style=\"font-weight: bold; \">Increase speed and agility</span>\r\nIn a cloud computing environment, new IT resources are only ever a click away, which means you reduce the time it takes to make those resources available to your developers from weeks to just minutes. This results in a dramatic increase in agility for the organization, since the cost and time it takes to experiment and develop is significantly lower.\r\n<span style=\"font-weight: bold; \">Stop spending money on running and maintaining data centers</span>\r\nFocus on projects that differentiate your business, not the infrastructure. Cloud computing lets you focus on your own customers, rather than on the heavy lifting of racking, stacking and powering servers.\r\n<span style=\"font-weight: bold; \">Go global in minutes</span>\r\nEasily deploy your application in multiple regions around the world with just a few clicks. This means you can provide a lower latency and better experience for your customers simply and at minimal cost.\r\n<span style=\"font-weight: bold;\">Types of Cloud Computing</span>\r\nCloud computing has three main types that are commonly referred to as Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Selecting the right type of cloud computing for your needs can help you strike the right balance of control and the avoidance of undifferentiated heavy lifting.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IaaS_computing.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1220,"logo":false,"scheme":false,"title":"Amazon WorkSpaces","vendorVerified":0,"rating":"2.00","implementationsCount":3,"suppliersCount":0,"alias":"amazon-workspaces","companyTypes":[],"description":"Amazon WorkSpaces is a managed, secure cloud desktop service. You can use Amazon WorkSpaces to provision either Windows or Linux desktops in just a few minutes and quickly scale to provide thousands of desktops to workers across the globe. You can pay either monthly or hourly, just for the WorkSpaces you launch, which helps you save money when compared to traditional desktops and on-premises VDI solutions. Amazon WorkSpaces helps you eliminate the complexity in managing hardware inventory, OS versions and patches, and Virtual Desktop Infrastructure (VDI), which helps simplify your desktop delivery strategy. With Amazon WorkSpaces, your users get a fast, responsive desktop of their choice that they can access anywhere, anytime, from any supported device.\r\n<span style=\"font-weight: bold;\">Benefits</span><br />\r\nSIMPLIFY DESKTOP DELIVERY<br />\r\nAmazon WorkSpaces helps you eliminate many administrative tasks associated with managing your desktop lifecycle including provisioning, deploying, maintaining, and recycling desktops. There is less hardware inventory to manage and no need for complex virtual desktop infrastructure (VDI) deployments that don’t scale. <br />\r\nREDUCE COSTS<br />\r\nAmazon WorkSpaces eliminates the need to over-buy desktop and laptop resources by providing on-demand access to cloud desktops that include a range of compute, memory, and storage resources to meet your users' performance needs.<br />\r\nCONTROL YOUR DESKTOP RESOURCES<br />\r\nAmazon WorkSpaces offers a range of CPU, memory, and solid-state storage bundle configurations that can be dynamically modified so you have the right resources for your applications. You don’t have to waste time trying to predict how many desktops you need or what configuration those desktops should be, helping you reduce costs and eliminate the need to over-buy hardware.<br />\r\nKEEP YOUR DATA SECURE<br />\r\nAmazon WorkSpaces is deployed within an Amazon Virtual Private Network (VPC), provide each user with access to persistent, encrypted storage volumes in the AWS Cloud, and integrate with AWS Key Management Service (KMS). No user data is stored on the local device. This helps improve the security of user data and reduces your overall risk surface area.<br />\r\nFLEXIBLE DESKTOP OS DEPLOYMENT<br />\r\nAmazon WorkSpaces comes with a Windows 7, Windows 10, or Amazon Linux 2 desktop experience. Or you can bring your own Windows 7 or Windows 10 desktops and run them on Amazon WorkSpaces, and remain license compliant. In addition, you can choose from a number of productivity application bundles with your WorkSpaces.<br />\r\nDELIVER DESKTOPS TO MULTIPLE DEVICES<br />\r\nYour users can access their Amazon WorkSpaces from any supported device, including Windows and Mac computers, Chromebooks, iPads, Fire tablets, Android tablets and through Chrome or Firefox web browsers. Once your WorkSpace is provisioned just download the client to access it from the device of your choice.<br />\r\nCENTRALLY MANAGE AND SCALE YOUR GLOBAL DESKTOP DEPLOYMENT<br />\r\nAmazon WorkSpaces is available in 12 AWS Regions and provides access to high performance cloud desktops wherever your teams get work done. You can manage a global deployment of many thousands of WorkSpaces from the AWS console. And you can rapidly provision and de-provision desktops as the needs of your workforce change.<br />\r\nUSE YOUR EXISTING DIRECTORY<br />\r\nAmazon WorkSpaces securely integrates with your existing corporate directory, including Microsoft Active Directory, as well as multi-factor authentication tools so that your users can easily access company resources. You can manage user access control through the use of IP access control groups, which makes it easy to control and manage user access to their WorkSpaces using your existing tools.\r\n","shortDescription":"Amazon WorkSpaces - Access your desktop anywhere, anytime, from any device","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Amazon WorkSpaces","keywords":"WorkSpaces, Amazon, your, users, desktop, desktops, provides, Desktop","description":"Amazon WorkSpaces is a managed, secure cloud desktop service. You can use Amazon WorkSpaces to provision either Windows or Linux desktops in just a few minutes and quickly scale to provide thousands of desktops to workers across the globe. You can pay either m","og:title":"Amazon WorkSpaces","og:description":"Amazon WorkSpaces is a managed, secure cloud desktop service. You can use Amazon WorkSpaces to provision either Windows or Linux desktops in just a few minutes and quickly scale to provide thousands of desktops to workers across the globe. You can pay either m"},"eventUrl":"","translationId":1220,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":53,"title":"DaaS - Desktop as a Service","alias":"daas-desktop-as-a-service","description":"<span style=\"font-weight: bold; \">DaaS (Desktop as a service)</span> is a cloud computing offering in which a third party hosts the back end of a virtual desktop infrastructure (VDI) deployment.\r\nWith DaaS services, desktop operating systems run inside virtual machines on servers in a cloud provider's data center. All the necessary support infrastructure, including storage and network resources, also lives in the cloud. As with on-premises VDI, a DaaS providers stream virtual desktops over a network to a customer's endpoint devices, where end users may access them through client software or a web browser.\r\nThough it sounds a lot like VDI, there is a vital difference between DaaS and VDI. VDI refers to when virtual desktops are served through on-premise servers maintained by in-house IT teams. It’s the traditional way to deploy and manage virtual desktops. But since it’s on-premise, VDI technology technology must be maintained, managed, and upgraded in-house whenever necessary.\r\nDaaS service on the other hand, is a cloud-based virtual desktop solution that separates virtual desktops from on-premise servers, enabling brands to leverage a third-party hosting provider. It’s like VDI, but in the cloud instead of in the back of the office. \r\nHowever, it’s not necessary to choose one or the other. These two approaches can complement each other. Some users prefer to have a DaaS desktop overlay of their VDI deployment. For example, the Desktop as a Service providers allow the user to modernize legacy applications with zero code refactoring. Not all legacy Windows apps perform well in a DaaS environment, due to latency or hardware requirements. \r\nThe modern workplace requires agility, leading to many companies embracing mobile working and Bring Your Own Device (BYOD) policies against a backdrop of increased concern about security risk, compliance requirements and the ever-present need to reduce overheads. This is why, over a decade after analysts predicted the rise of remote desktop as a service, it is now finally being taken up in volume.\r\nBy adopting Desktop as a Service, companies can address the issues associated with end-user computing while giving their staff more freedom and increasing productivity. The pain associated with managing a multitude of devices, including those not supplied by the company, is eliminated. While remaining compliant, companies can greatly reduce risks. ","materialsDescription":"<h1 class=\"align-center\"><span style=\"font-weight: bold; \">How does desktop as a service work?</span></h1>\r\nDaaS architecture is multi-tenant, and organizations purchase the service through a subscription model -- typically based on the number of virtual desktop instances used per month.\r\nIn the desktop-as-a-service delivery model, the cloud computing provider manages the back-end responsibilities of data storage, backup, security and upgrades. While the provider handles all the back-end infrastructure costs and maintenance, customers usually manage their own virtual desktop images, applications and security, unless those desktop management services are part of the subscription.\r\nTypically, an end user's personal data is copied to and from their virtual desktop during logon and logoff, and access to the desktop is device-, location- and network-independent.\r\n<h1 class=\"align-center\">The benefits of Desktop as a Service</h1>\r\nMany organisations are undergoing digital transformation, and modernising the workplace is often a stream within the wider strategy. In order to manage remote and multi-device workforces using DaaS, you should think about the following seven benefits and how this will change, and hopefully improve, your currently way of working.\r\n<span style=\"font-weight: bold;\">The modern workplace.</span> Digital transformation is redefining what we think about the workplace. At the heart of this evolution is technology and the introduction of digital-first natives into the workplace. Allowing staff to work remotely, through DaaS in cloud and via their own devices is a surefire way to attract and retain the best talent.\r\n<span style=\"font-weight: bold;\">Cost.</span> As with many cloud initiatives, DaaS pricing moves from CAPEX to OPEX, leaving you more cash in the bank to spend on growing your business. Per desktop pricing enables you to know exactly what workforce expansion will cost the IT department, removing unforeseen infrastructure or hardware purchases as this is handled by the provider, who bundle everything in with the price of each desktop.Virtual machines use the compute power of the data centre rather than their local machines, placing less demand on the endpoint. <span style=\"font-weight: bold;\"></span>\r\n<span style=\"font-weight: bold;\">Scalability</span>. Due to the ‘...as a service’ delivery model, DaaS platform enables you to add user workstations fast and easily. This is particularly handy when your organisation utilises contract resource or temporary project teams, as there’s no hardware to procure, meaning you have the flexibility to create a desktop almost instantly and delete it when no longer required. This also puts you in control.\r\n<span style=\"font-weight: bold;\">Control.</span> DaaS helps you manage the risks that naturally come with giving your staff the freedom to work anywhere and on any device. It enables you to control the essentials such as data access and compliance without being overly restrictive. You no longer have to worry about what data is held on a user’s device as the data remains in the data centre at all times. This gives you control over all company assets because access can be revoked with the touch of a button.\r\n<span style=\"font-weight: bold;\">Management.</span> With an increasingly dispersed workforce, rolling out new applications or patching existing software has become more of a logistical problem than a technical one. Trying to coordinate people bringing in physical devices to be patched is a real issue for many companies, something which is eliminated completely with DaaS. You operate on one central image (or a small number of images based on persona), a change is made once, and everyone is on the latest version. It removes the need to standardise builds of end-user compute hardware as DaaS applications will run on almost any device no matter its configuration.\r\n<span style=\"font-weight: bold;\">Security.</span> DaaS moves the security risk from hundreds of end-user devices and put it all into the controlled and managed environment of a data centre. Lost or stolen laptops no longer provide a security risk. No data is on the local machine. As DaaS removes the need to create VPNs to access applications and data held by the company it also removes the problem of users trying to bypass the security in the belief that it will make their life easier. ","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/DaaS_-_Desktop_as_a_Service.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1244,"logo":false,"scheme":false,"title":"Amazon Virtual Private Cloud (VPC)","vendorVerified":0,"rating":"2.00","implementationsCount":5,"suppliersCount":0,"alias":"amazon-virtual-private-cloud-vpc","companyTypes":[],"description":"Amazon Virtual Private Cloud (Amazon VPC) lets you provision a logically isolated section of the AWS Cloud where you can launch AWS resources in a virtual network that you define. You have complete control over your virtual networking environment, including selection of your own IP address range, creation of subnets, and configuration of route tables and network gateways. You can use both IPv4 and IPv6 in your VPC for secure and easy access to resources and applications.\r\nYou can easily customize the network configuration for your Amazon VPC. For example, you can create a public-facing subnet for your web servers that has access to the Internet, and place your backend systems such as databases or application servers in a private-facing subnet with no Internet access. You can leverage multiple layers of security, including security groups and network access control lists, to help control access to Amazon EC2 instances in each subnet.\r\nAdditionally, you can create a Hardware Virtual Private Network (VPN) connection between your corporate data center and your VPC and leverage the AWS Cloud as an extension of your corporate data center.\r\n \r\n\r\n<span style=\"font-weight: bold;\">FEATURES</span>\r\nMULTIPLE CONNECTIVITY OPTIONS\r\nA variety of connectivity options exist for your Amazon VPC. You can connect your VPC to the Internet, to your data center, or other VPCs, based on the AWS resources that you want to expose publicly and those that you want to keep private.\r\n<ul><li>Connect directly to the Internet (public subnets)– You can launch instances into a publicly accessible subnet where they can send and receive traffic from the Internet.</li><li>Connect to the Internet using Network Address Translation (private subnets) – Private subnets can be used for instances that you do not want to be directly addressable from the Internet. Instances in a private subnet can access the Internet without exposing their private IP address by routing their traffic through a Network Address Translation (NAT) gateway in a public subnet.</li><li>Connect securely to your corporate datacenter– All traffic to and from instances in your VPC can be routed to your corporate datacenter over an industry standard, encrypted IPsec hardware VPN connection.</li><li>Connect privately to other VPCs- Peer VPCs together to share resources across multiple virtual networks owned by your or other AWS accounts.</li><li>Privately connect to AWS Services without using an Internet gateway, NAT or firewall proxy through a VPC Endpoint. Available AWS services include S3, DynamoDB, Kinesis Streams, Service Catalog, EC2 Systems Manager (SSM), Elastic Load Balancing (ELB) API, and Amazon Elastic Compute Cloud (EC2) API.</li><li>Privately connect to SaaS solutions supported by AWS PrivateLink.</li><li>Privately connect your internal services across different accounts and VPCs within your own organizations, significantly simplifying your internal network architecture.</li></ul>\r\nSECURE\r\nAmazon VPC provides advanced security features, such as security groups and network access control lists, to enable inbound and outbound filtering at the instance level and subnet level. In addition, you can store data in Amazon S3 and restrict access so that it’s only accessible from instances in your VPC. Optionally, you can also choose to launch Dedicated Instances which run on hardware dedicated to a single customer for additional isolation.\r\nSIMPLE\r\nYou can create a VPC quickly and easily using the AWS Management Console. You can select one of the common network setups that best match your needs and press "Start VPC Wizard." Subnets, IP ranges, route tables, and security groups are automatically created for you so you can concentrate on creating the applications to run in your VPC.\r\nALL THE SCALABILITY AND RELIABILITY OF AWS\r\nAmazon VPC provides all of the same benefits as the rest of the AWS platform. You can instantly scale your resources up or down, select Amazon EC2 instances types and sizes that are right for your applications, and pay only for the resources you use - all within Amazon’s proven infrastructure.","shortDescription":"Amazon Virtual Private Cloud - Provision a logically isolated section of the Amazon Web Services (AWS) Cloud where you can launch AWS resources in a virtual network that you define","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Amazon Virtual Private Cloud (VPC)","keywords":"your, Amazon, Internet, that, access, network, subnet, instances","description":"Amazon Virtual Private Cloud (Amazon VPC) lets you provision a logically isolated section of the AWS Cloud where you can launch AWS resources in a virtual network that you define. You have complete control over your virtual networking environment, including se","og:title":"Amazon Virtual Private Cloud (VPC)","og:description":"Amazon Virtual Private Cloud (Amazon VPC) lets you provision a logically isolated section of the AWS Cloud where you can launch AWS resources in a virtual network that you define. You have complete control over your virtual networking environment, including se"},"eventUrl":"","translationId":1244,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":2,"title":"Virtual machine and cloud system software","alias":"virtual-machine-and-cloud-system-software","description":" A virtual machine (VM) is a software-based computer that exists within another computer’s operating system, often used for the purposes of testing, backing up data, or running SaaS applications. To fully grasp how VMs work, it’s important to first understand how computer software and hardware are typically integrated by an operating system.\r\n"The cloud" refers to servers that are accessed over the Internet, and the software and databases that run on those servers. Cloud servers are located in data centers all over the world. By using cloud computing, users and companies don't have to manage physical servers themselves or run software applications on their own machines.\r\nThe cloud enables users to access the same files and applications from almost any device, because the computing and storage take place on servers in a data center, instead of locally on the user device. This is why a user can log into their Instagram account on a new phone after their old phone breaks and still find their old account in place, with all their photos, videos, and conversation history. It works the same way with cloud email providers like Gmail or Microsoft Office 365, and with cloud storage providers like Dropbox or Google Drive.\r\nFor businesses, switching to cloud computing removes some IT costs and overhead: for instance, they no longer need to update and maintain their own servers, as the cloud vendor they are using will do that. This especially makes an impact on small businesses that may not have been able to afford their own internal infrastructure but can outsource their infrastructure needs affordably via the cloud. The cloud can also make it easier for companies to operate internationally because employees and customers can access the same files and applications from any location.\r\nSeveral cloud providers offer virtual machines to their customers. These virtual machines typically live on powerful servers that can act as a host to multiple VMs and can be used for a variety of reasons that wouldn’t be practical with a locally-hosted VM. These include:\r\n<ul><li>Running SaaS applications - Software-as-a-Service, or SaaS for short, is a cloud-based method of providing software to users. SaaS users subscribe to an application rather than purchasing it once and installing it. These applications are generally served to the user over the Internet. Often, it is virtual machines in the cloud that are doing the computation for SaaS applications as well as delivering them to users. If the cloud provider has a geographically distributed network edge, then the application will run closer to the user, resulting in faster performance.</li><li>Backing up data - Cloud-based VM services are very popular for backing up data because the data can be accessed from anywhere. Plus, cloud VMs provide better redundancy, require less maintenance, and generally scale better than physical data centers. (For example, it’s generally fairly easy to buy an extra gigabyte of storage space from a cloud VM provider, but much more difficult to build a new local data server for that extra gigabyte of data.)</li><li>Hosting services like email and access management - Hosting these services on cloud VMs is generally faster and more cost-effective, and helps minimize maintenance and offload security concerns as well.</li></ul>","materialsDescription":"What is an operating system?\r\nTraditional computers are built out of physical hardware, including hard disk drives, processor chips, RAM, etc. In order to utilize this hardware, computers rely on a type of software known as an operating system (OS). Some common examples of OSes are Mac OSX, Microsoft Windows, Linux, and Android.\r\nThe OS is what manages the computer’s hardware in ways that are useful to the user. For example, if the user wants to access the Internet, the OS directs the network interface card to make the connection. If the user wants to download a file, the OS will partition space on the hard drive for that file. The OS also runs and manages other pieces of software. For example, it can run a web browser and provide the browser with enough random access memory (RAM) to operate smoothly. Typically, operating systems exist within a physical computer at a one-to-one ratio; for each machine, there is a single OS managing its physical resources.\r\n<span style=\"font-weight: bold;\">Can you have two or more operating systems on one computer?</span>\r\nSome users want to be able to run multiple operating systems simultaneously on one computer, either for testing or one of the other reasons listed in the section below. This can be achieved through a process called virtualization. In virtualization, a piece of software behaves as if it were an independent computer. This piece of software is called a virtual machine, also known as a ‘guest’ computer. (The computer on which the VM is running is called the ‘host’.) The guest has an OS as well as its own virtual hardware.\r\n‘Virtual hardware’ may sound like a bit of an oxymoron, but it works by mapping to real hardware on the host computer. For example, the VM’s ‘hard drive’ is really just a file on the host computer’s hard drive. When the VM wants to save a new file, it actually has to communicate with the host OS, which will write this file to the host hard drive. Because virtual hardware must perform this added step of negotiating with the host to access hardware resources, virtual machines can’t run quite as fast as their host computers.\r\nWith virtualization, one computer can run two or more operating systems. The number of VMs that can run on one host is limited only by the host’s available resources. The user can run the OS of a VM in a window like any other program, or they can run it in fullscreen so that it looks and feels like a genuine host OS.\r\n <span style=\"font-weight: bold; \">What are virtual machines used for?</span>\r\nSome of the most popular reasons people run virtual machines include:\r\n<span style=\"font-weight: bold; \">Testing</span> - Oftentimes software developers want to be able to test their applications in different environments. They can use virtual machines to run their applications in various OSes on one computer. This is simpler and more cost-effective than having to test on several different physical machines.\r\n<span style=\"font-weight: bold; \">Running software designed for other OSes</span> - Although certain software applications are only available for a single platform, a VM can run software designed for a different OS. For example, a Mac user who wants to run software designed for Windows can run a Windows VM on their Mac host.\r\n<span style=\"font-weight: bold; \">Running outdated software</span> - Some pieces of older software can’t be run in modern OSes. Users who want to run these applications can run an old OS on a virtual machine.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Virtual_machine_and_cloud_system_software.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1252,"logo":false,"scheme":false,"title":"Amazon CloudWatch","vendorVerified":0,"rating":"2.00","implementationsCount":2,"suppliersCount":0,"alias":"amazon-cloudwatch","companyTypes":[],"description":"Amazon CloudWatch is a monitoring and management service built for developers, system operators, site reliability engineers (SRE), and IT managers. CloudWatch provides you with data and actionable insights to monitor your applications, understand and respond to system-wide performance changes, optimize resource utilization, and get a unified view of operational health. CloudWatch collects monitoring and operational data in the form of logs, metrics, and events, providing you with a unified view of AWS resources, applications and services that run on AWS, and on-premises servers. You can use CloudWatch to set high resolution alarms, visualize logs and metrics side by side, take automated actions, troubleshoot issues, and discover insights to optimize your applications, and ensure they are running smoothly.\r\n\r\n<span style=\"font-weight: bold;\">BENEFITS</span><br />\r\n<span style=\"font-weight: bold;\">Access all your data from a single platform</span><br />\r\nModern applications are distributed (that is, they run on microservices architectures) and generate lots of data in the form of metrics, logs, and more. You need a way to easily collect, access, and correlate these data points from individual sources in silos (server, network, database, etc.) to effectively monitor applications and infrastructure resources. Amazon CloudWatch enables you to collect metrics and logs from all your AWS resources, applications, and services that run on AWS and on-premises servers, helping you break down data silos so you can easily gain system-wide visibility.<br />\r\n<span style=\"font-weight: bold;\">Easiest way to collect custom and granular metrics for AWS resources</span><br />\r\nMonitoring your AWS resources is easy with Amazon CloudWatch. CloudWatch is natively integrated with more than 70 AWS services such as Amazon EC2, Amazon DynamoDB, Amazon S3, Amazon ECS, AWS Lambda, Amazon API Gateway, etc. that automatically publish detailed 1-minute metrics and custom metrics with up to 1-second granularity. You can use AWS Systems Manager to install a CloudWatch Agent, or you can use the CloudWatch API to easily collect, publish, and store this data in CloudWatch.<br />\r\n<span style=\"font-weight: bold;\">Visibility across your applications, infrastructure, and services</span><br />\r\nGaining visibility across your distributed stack means correlating and visualizing metrics and logs to quickly pinpoint and resolve issues. With Amazon CloudWatch, you can visualize key metrics like CPU utilization and memory. You can also correlate a log pattern, e.g. error to a specific metric to quickly get the context and go from diagnosing the problem to understanding the root cause.<br />\r\n<span style=\"font-weight: bold;\">Improve total cost of ownership</span><br />\r\nAmazon CloudWatch enables you to set high resolution alarms and take automated actions. This means freeing up important resources to focus on adding business value. For example, you can get alerted on Amazon EC2 instances and set up Auto Scaling to add or remove instances. You can also execute automated responses to detect and shut down unused EC2 resources, reducing billing overages and improving resource optimization.<br />\r\n<span style=\"font-weight: bold;\">Optimize applications and operational resources</span><br />\r\nYou need a unified operational view, real-time granular data, and historical reference to optimize performance and resource utilization. With Amazon CloudWatch, you get enhanced monitoring with 1-second granularity and up to 15 months of metrics storage and retention. You can also leverage native CloudWatch features, such as Metric Math, to perform calculations on your metric data. For example, you can aggregate usage across an entire fleet of EC2 instances to derive operational and utilization insights.<br />\r\n<span style=\"font-weight: bold;\">Derive actionable insights from logs</span><br />\r\nAmazon CloudWatch Logs Insights enables you to explore, analyze, and visualize your logs instantly, allowing you to troubleshoot operational problems with ease. With Logs Insights, you only pay for the queries you run. Logs Insights scales with your log volume and query complexity giving you answers in seconds. In addition, you can publish log-based metrics, create alarms, and correlate logs and metrics together in CloudWatch Dashboards for complete operational visibility.","shortDescription":"Amazon CloudWatch is a monitoring service for AWS cloud resources and the applications you run on AWS. ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Amazon CloudWatch","keywords":"Amazon, CloudWatch, metrics, your, data, such, instances, frequency","description":"Amazon CloudWatch is a monitoring and management service built for developers, system operators, site reliability engineers (SRE), and IT managers. CloudWatch provides you with data and actionable insights to monitor your applications, understand and respond t","og:title":"Amazon CloudWatch","og:description":"Amazon CloudWatch is a monitoring and management service built for developers, system operators, site reliability engineers (SRE), and IT managers. CloudWatch provides you with data and actionable insights to monitor your applications, understand and respond t"},"eventUrl":"","translationId":1252,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":39,"title":"IaaS - Infrastructure as a Service","alias":"iaas-infrastructure-as-a-service","description":"<span style=\"font-weight: bold;\">Infrastructure as a service</span> (IaaS) are online services that provide high-level APIs used to dereference various low-level details of underlying network infrastructure like physical computing resources, location, data partitioning, scaling, security, backup etc. A hypervisor, such as Xen, Oracle VirtualBox, Oracle VM, KVM, VMware ESX/ESXi, or Hyper-V, LXD, runs the virtual machines as guests. Pools of hypervisors within the cloud operational system can support large numbers of virtual machines and the ability to scale services up and down according to customers' varying requirements.\r\nTypically IaaS solutions involve the use of a cloud orchestration technology like Open Stack, Apache Cloudstack or Open Nebula. This manages the creation of a virtual machine and decides on which hypervisor (i.e. physical host) to start it, enables VM migration features between hosts, allocates storage volumes and attaches them to VMs, usage information for billing and lots more.\r\nAn alternative to hypervisors are Linux containers, which run in isolated partitions of a single Linux kernel running directly on the physical hardware. Linux cgroups and namespaces are the underlying Linux kernel technologies used to isolate, secure and manage the containers. Containerisation offers higher performance than virtualization, because there is no hypervisor overhead. Also, container capacity auto-scales dynamically with computing load, which eliminates the problem of over-provisioning and enables usage-based billing.\r\nIaaS clouds often offer additional resources such as a virtual-machine disk-image library, raw block storage, file or object storage, firewalls, load balancers, IP addresses, virtual local area networks (VLANs), and software bundles.\r\nAccording to the Internet Engineering Task Force (IETF), the most basic cloud-service model is that of providers offering IT infrastructure – virtual machines and other resources – as a service to subscribers.\r\nIaaS cloud providers supply these resources on-demand from their large pools of equipment installed in data centers. For wide-area connectivity, customers can use either the Internet or carrier clouds (dedicated virtual private networks). To deploy their applications, cloud users install operating-system images and their application software on the cloud infrastructure. In this model, the cloud user patches and maintains the operating systems and the application software. Cloud infrastructure providers typically bill IaaS services on a utility computing basis: cost reflects the amount of resources allocated and consumed.","materialsDescription":"<h1 class=\"align-center\"><span style=\"font-weight: bold; \">Infrastructure as a Service Benefits </span></h1>\r\n<span style=\"font-weight: bold; \">Cost savings:</span> An obvious benefit of moving to the managed IaaS model is lower infrastructure costs. No longer do organizations have the responsibility of ensuring uptime, maintaining hardware and networking equipment, or replacing old equipment. IaaS technology also saves enterprises from having to buy more capacity to deal with sudden business spikes. Organizations with a smaller IT infrastructure generally require a smaller IT staff as well. The pay-as-you-go model also provides significant cost savings. \r\n<span style=\"font-weight: bold; \">Scalability and flexibility:</span> One of the greatest benefits of IaaS is the ability to scale up and down quickly in response to an enterprise’s requirements. Infrastructure as a Service providers generally have the latest, most powerful storage, servers and networking technology to accommodate the needs of their customers. This on-demand scalability provides added flexibility and greater agility to respond to changing opportunities and requirements. \r\n<span style=\"font-weight: bold; \">Faster time to market:</span> Competition is strong in every sector, and time to market is one of the best ways to beat the competition. Because IaaS vendors elasticity and scalability, organizations can ramp up and get the job done (and the product or service to market) more rapidly.\r\n<span style=\"font-weight: bold; \">Support for DR, BC and high availability:</span> While every enterprise has some type of disaster recovery plan, the technology behind those plans is often expensive and unwieldy. Organizations with several disparate locations often have different disaster recovery and business continuity plans and technologies, making management virtually impossible.\r\n<span style=\"font-weight: bold; \">Focus on business growth:</span> Time, money and energy spent making technology decisions and hiring staff to manage and maintain the technology infrastructure is time not spent on growing the business. By moving infrastructure to a global infrastructure services, organizations can focus their time and resources where they belong, on developing innovations in applications and solutions.\r\n<h1 class=\"align-center\">IaaS, PaaS and SaaS: What’s the Difference?</h1>\r\nPlatform as a Service (PaaS) is the next step up from IaaS products, where the provider also supplies the operating environment including the operating system, application services, middleware and other ‘runtimes’ for cloud users. It’s used for development environments where the business can focus on creating an app but wants someone else to maintain the deployment platform. It means you have much simpler workloads but you can’t necessarily be as flexible as you want.\r\nAt the highest level of orchestration is Software as a Service. In SaaS infrastructure applications are accessed on demand. Here you just open your browser and go, consuming software rather than installing and running it. A user simply logs on to access the provider’s application. Users can decide how the app will work but pretty much everything else is the responsibility of the software provider.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IaaS.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":104,"title":"Italy","name":"ITA"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":7,"title":"Improve Customer Service"},{"id":10,"title":"Ensure Compliance"},{"id":306,"title":"Manage Risks"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":370,"title":"No automated business processes"},{"id":373,"title":"IT infrastructure does not meet business tasks"},{"id":374,"title":"IT infrastructure downtimes"},{"id":378,"title":"Low employee productivity"},{"id":387,"title":"Non-compliant with IT security requirements"},{"id":390,"title":"Low quality of customer support"},{"id":397,"title":"Insufficient risk management"},{"id":397,"title":"Insufficient risk management"},{"id":400,"title":"High costs"}]}},"categories":[{"id":689,"title":"Amazon Web Services","alias":"amazon-web-services","description":"Amazon Web Services (AWS) is a subsidiary of Amazon that provides on-demand cloud computing platforms to individuals, companies and governments, on a metered pay-as-you-go basis. In aggregate, these cloud computing web services provide a set of primitive, abstract technical infrastructure and distributed computing building blocks and tools. One of these services is Amazon Elastic Compute Cloud, which allows users to have at their disposal a virtual cluster of computers, available all the time, through the Internet. AWS's version of virtual computers emulate most of the attributes of a real computer including hardware (CPU(s) & GPU(s) for processing, local/RAM memory, hard-disk/SSD storage); a choice of operating systems; networking; and pre-loaded application software such as web servers, databases, CRM, etc.\r\nThe AWS technology is implemented at server farms throughout the world, and maintained by the Amazon subsidiary. Fees are based on a combination of usage, the hardware/OS/software/networking features chosen by the subscriber, required availability, redundancy, security, and service options. Subscribers can pay for a single virtual AWS computer, a dedicated physical computer, or clusters of either. As part of the subscription agreement, Amazon provides security for subscribers' system. AWS operates from many global geographical regions including 6 in North America.\r\nIn 2017, AWS comprised more than 90 services spanning a wide range including computing, storage, networking, database, analytics, application services, deployment, management, mobile, developer tools, and tools for the Internet of Things. The most popular include Amazon Elastic Compute Cloud (EC2) and Amazon Simple Storage Service (S3). Most services are not exposed directly to end users, but instead offer functionality through APIs for developers to use in their applications. Amazon Web Services' offerings are accessed over HTTP, using the REST architectural style and SOAP protocol.\r\nAmazon markets AWS to subscribers as a way of obtaining large scale computing capacity more quickly and cheaply than building an actual physical server farm. All services are billed based on usage, but each service measures usage in varying ways. As of 2017, AWS owns a dominant 34% of all cloud (IaaS, PaaS) while the next three competitors Microsoft, Google, and IBM have 11%, 8%, 6% respectively according to Synergy Group.","materialsDescription":"<span style=\"font-weight: bold;\">What is "Amazon Web Services" (AWS)?</span>\r\nWith Amazon Web Services (AWS), organizations can flexibly deploy storage space and computing capacity into Amazon's data centers without having to maintain their own hardware. A big advantage is that the infrastructure covers all dimensions for cloud computing. Whether it's video sharing, high-resolution photos, print data, or text documents, AWS can deliver IT resources on-demand, over the Internet, at a cost-per-use basis. The service exists since 2006 as a wholly owned subsidiary of Amazon Inc. The idea arose from the extensive experience with Amazon.com and the own need for platforms for web services in the cloud.\r\n<span style=\"font-weight: bold;\">What is Cloud Computing?</span>\r\nCloud Computing is a service that gives you access to expert-managed technology resources. The platform in the cloud provides the infrastructure (eg computing power, storage space) that does not have to be installed and configured in contrast to the hardware you have purchased yourself. Cloud computing only pays for the resources that are used. For example, a web shop can increase its computing power in the Christmas business and book less in "weak" months.\r\nAccess is via the Internet or VPN. There are no ongoing investment costs after the initial setup, but resources such as Virtual servers, databases or storage services are charged only after they have been used.\r\n<span style=\"font-weight: bold;\">Where is my data on Amazon AWS?</span>\r\nThere are currently eight Amazon Data Centers (AWS Regions) in different regions of the world. For each Amazon AWS resource, only the customer can decide where to use or store it. German customers typically use the data center in Ireland, which is governed by European law.\r\n<span style=\"font-weight: bold;\">How safe is my data on Amazon AWS?</span>\r\nThe customer data is stored in a highly secure infrastructure. Safety measures include, but are not limited to:\r\n<ul><li>Protection against DDos attacks (Distributed Denial of Service)</li><li>Defense against brute-force attacks on AWS accounts</li><li>Secure access: The access options are made via SSL.</li><li> Firewall: Output and access to the AWS data can be controlled.</li><li>Encrypted Data Storage: Data can be encrypted with Advanced Encryption Standard (AES) 256.</li><li>Certifications: Regular security review by independent certifications that AWS has undergone.</li></ul>\r\nEach Amazon data center (AWS region) consists of at least one Availability Zone. Availability Zones are stand-alone sub-sites that have been designed to be isolated from faults in other Availability Zones (independent power and data supply). Certain AWS resources, such as Database Services (RDS) or Storage Services (S3) automatically replicate your data within the AWS region to the different Availability Zones.\r\nAmazon AWS has appropriate certifications such as ISO27001 and has implemented a comprehensive security concept for the operation of its data center.\r\n<span style=\"font-weight: bold;\">Do I have to worry about hardware on Amazon AWS?</span>\r\nNo, all Amazon AWS resources are virtualized. Only Amazon takes care of the replacement and upgrade of hardware.\r\nNormally, you will not get anything out of defective hardware because defective storage media are exchanged by Amazon and since your data is stored multiple times redundantly, there is usually no problem either.\r\nIncidentally, if your chosen resources do not provide enough performance, you can easily get more CPU power from resources by just a few mouse clicks. You do not have to install anything new, just reboot your virtual machine or virtual database instance.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Amazon_Web_Services.png"},{"id":786,"title":"IaaS - computing","alias":"iaas-computing","description":"Cloud computing is the on demand availability of computer system resources, especially data storage and computing power, without direct active management by the user. The term is generally used to describe data centers available to many users over the Internet. Large clouds, predominant today, often have functions distributed over multiple locations from central servers. If the connection to the user is relatively close, it may be designated an edge server.\r\nInfrastructure as a service (IaaS) are online services that provide high-level APIs used to dereference various low-level details of underlying network infrastructure like physical computing resources, location, data partitioning, scaling, security, backup etc. A hypervisor, such as Xen, Oracle VirtualBox, Oracle VM, KVM, VMware ESX/ESXi, or Hyper-V, LXD, runs the virtual machines as guests. Pools of hypervisors within the cloud operational system can support large numbers of virtual machines and the ability to scale services up and down according to customers' varying requirements.\r\nTypically IaaS involve the use of a cloud orchestration technology like Open Stack, Apache Cloudstack or Open Nebula. This manages the creation of a virtual machine and decides on which hypervisor (i.e. physical host) to start it, enables VM migration features between hosts, allocates storage volumes and attaches them to VMs, usage information for billing and lots more.\r\nAn alternative to hypervisors are Linux containers, which run in isolated partitions of a single Linux kernel running directly on the physical hardware. Linux cgroups and namespaces are the underlying Linux kernel technologies used to isolate, secure and manage the containers. Containerisation offers higher performance than virtualization, because there is no hypervisor overhead. Also, container capacity auto-scales dynamically with computing load, which eliminates the problem of over-provisioning and enables usage-based billing.\r\nIaaS clouds often offer additional resources such as a virtual-machine disk-image library, raw block storage, file or object storage, firewalls, load balancers, IP addresses, virtual local area networks (VLANs), and software bundles.\r\nThe NIST's definition of cloud computing defines Infrastructure as a Service as:\r\n<ul><li>The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications.</li><li>The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, and deployed applications; and possibly limited control of select networking components (e.g., host firewalls).</li></ul>\r\nAccording to the Internet Engineering Task Force (IETF), the most basic cloud-service model is that of providers offering IT infrastructure — virtual machines and other resources — as a service to subscribers.\r\nIaaS-cloud providers supply these resources on-demand from their large pools of equipment installed in data centers. For wide-area connectivity, customers can use either the Internet or carrier clouds (dedicated virtual private networks). To deploy their applications, cloud users install operating-system images and their application software on the cloud infrastructure. In this model, the cloud user patches and maintains the operating systems and the application software. Cloud providers typically bill IaaS services on a utility computing basis: cost reflects the amount of resources allocated and consumed.","materialsDescription":" <span style=\"font-weight: bold; \">Cloud Computing Basics</span>\r\nWhether you are running applications that share photos to millions of mobile users or you’re supporting the critical operations of your business, a cloud services platform provides rapid access to flexible and low cost IT resources. With cloud computing, you don’t need to make large upfront investments in hardware and spend a lot of time on the heavy lifting of managing that hardware. Instead, you can provision exactly the right type and size of computing resources you need to power your newest bright idea or operate your IT department. You can access as many resources as you need, almost instantly, and only pay for what you use.\r\n<span style=\"font-weight: bold; \">How Does Cloud Computing Work?</span>\r\nCloud computing provides a simple way to access servers, storage, databases and a broad set of application services over the Internet. A Cloud services platform such as Amazon Web Services owns and maintains the network-connected hardware required for these application services, while you provision and use what you need via a web application.\r\n<span style=\"font-weight: bold; \">Six Advantages and Benefits of Cloud Computing</span>\r\n<span style=\"font-weight: bold; \">Trade capital expense for variable expense</span>\r\nInstead of having to invest heavily in data centers and servers before you know how you’re going to use them, you can only pay when you consume computing resources, and only pay for how much you consume.\r\n<span style=\"font-weight: bold; \">Benefit from massive economies of scale</span>\r\nBy using cloud computing, you can achieve a lower variable cost than you can get on your own. Because usage from hundreds of thousands of customers are aggregated in the cloud, providers can achieve higher economies of scale which translates into lower pay as you go prices.\r\n<span style=\"font-weight: bold; \">Stop guessing capacity</span>\r\nEliminate guessing on your infrastructure capacity needs. When you make a capacity decision prior to deploying an application, you often either end up sitting on expensive idle resources or dealing with limited capacity. With cloud computing, these problems go away. You can access as much or as little as you need, and scale up and down as required with only a few minutes notice.\r\n<span style=\"font-weight: bold; \">Increase speed and agility</span>\r\nIn a cloud computing environment, new IT resources are only ever a click away, which means you reduce the time it takes to make those resources available to your developers from weeks to just minutes. This results in a dramatic increase in agility for the organization, since the cost and time it takes to experiment and develop is significantly lower.\r\n<span style=\"font-weight: bold; \">Stop spending money on running and maintaining data centers</span>\r\nFocus on projects that differentiate your business, not the infrastructure. Cloud computing lets you focus on your own customers, rather than on the heavy lifting of racking, stacking and powering servers.\r\n<span style=\"font-weight: bold; \">Go global in minutes</span>\r\nEasily deploy your application in multiple regions around the world with just a few clicks. This means you can provide a lower latency and better experience for your customers simply and at minimal cost.\r\n<span style=\"font-weight: bold;\">Types of Cloud Computing</span>\r\nCloud computing has three main types that are commonly referred to as Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Selecting the right type of cloud computing for your needs can help you strike the right balance of control and the avoidance of undifferentiated heavy lifting.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IaaS_computing.png"},{"id":53,"title":"DaaS - Desktop as a Service","alias":"daas-desktop-as-a-service","description":"<span style=\"font-weight: bold; \">DaaS (Desktop as a service)</span> is a cloud computing offering in which a third party hosts the back end of a virtual desktop infrastructure (VDI) deployment.\r\nWith DaaS services, desktop operating systems run inside virtual machines on servers in a cloud provider's data center. All the necessary support infrastructure, including storage and network resources, also lives in the cloud. As with on-premises VDI, a DaaS providers stream virtual desktops over a network to a customer's endpoint devices, where end users may access them through client software or a web browser.\r\nThough it sounds a lot like VDI, there is a vital difference between DaaS and VDI. VDI refers to when virtual desktops are served through on-premise servers maintained by in-house IT teams. It’s the traditional way to deploy and manage virtual desktops. But since it’s on-premise, VDI technology technology must be maintained, managed, and upgraded in-house whenever necessary.\r\nDaaS service on the other hand, is a cloud-based virtual desktop solution that separates virtual desktops from on-premise servers, enabling brands to leverage a third-party hosting provider. It’s like VDI, but in the cloud instead of in the back of the office. \r\nHowever, it’s not necessary to choose one or the other. These two approaches can complement each other. Some users prefer to have a DaaS desktop overlay of their VDI deployment. For example, the Desktop as a Service providers allow the user to modernize legacy applications with zero code refactoring. Not all legacy Windows apps perform well in a DaaS environment, due to latency or hardware requirements. \r\nThe modern workplace requires agility, leading to many companies embracing mobile working and Bring Your Own Device (BYOD) policies against a backdrop of increased concern about security risk, compliance requirements and the ever-present need to reduce overheads. This is why, over a decade after analysts predicted the rise of remote desktop as a service, it is now finally being taken up in volume.\r\nBy adopting Desktop as a Service, companies can address the issues associated with end-user computing while giving their staff more freedom and increasing productivity. The pain associated with managing a multitude of devices, including those not supplied by the company, is eliminated. While remaining compliant, companies can greatly reduce risks. ","materialsDescription":"<h1 class=\"align-center\"><span style=\"font-weight: bold; \">How does desktop as a service work?</span></h1>\r\nDaaS architecture is multi-tenant, and organizations purchase the service through a subscription model -- typically based on the number of virtual desktop instances used per month.\r\nIn the desktop-as-a-service delivery model, the cloud computing provider manages the back-end responsibilities of data storage, backup, security and upgrades. While the provider handles all the back-end infrastructure costs and maintenance, customers usually manage their own virtual desktop images, applications and security, unless those desktop management services are part of the subscription.\r\nTypically, an end user's personal data is copied to and from their virtual desktop during logon and logoff, and access to the desktop is device-, location- and network-independent.\r\n<h1 class=\"align-center\">The benefits of Desktop as a Service</h1>\r\nMany organisations are undergoing digital transformation, and modernising the workplace is often a stream within the wider strategy. In order to manage remote and multi-device workforces using DaaS, you should think about the following seven benefits and how this will change, and hopefully improve, your currently way of working.\r\n<span style=\"font-weight: bold;\">The modern workplace.</span> Digital transformation is redefining what we think about the workplace. At the heart of this evolution is technology and the introduction of digital-first natives into the workplace. Allowing staff to work remotely, through DaaS in cloud and via their own devices is a surefire way to attract and retain the best talent.\r\n<span style=\"font-weight: bold;\">Cost.</span> As with many cloud initiatives, DaaS pricing moves from CAPEX to OPEX, leaving you more cash in the bank to spend on growing your business. Per desktop pricing enables you to know exactly what workforce expansion will cost the IT department, removing unforeseen infrastructure or hardware purchases as this is handled by the provider, who bundle everything in with the price of each desktop.Virtual machines use the compute power of the data centre rather than their local machines, placing less demand on the endpoint. <span style=\"font-weight: bold;\"></span>\r\n<span style=\"font-weight: bold;\">Scalability</span>. Due to the ‘...as a service’ delivery model, DaaS platform enables you to add user workstations fast and easily. This is particularly handy when your organisation utilises contract resource or temporary project teams, as there’s no hardware to procure, meaning you have the flexibility to create a desktop almost instantly and delete it when no longer required. This also puts you in control.\r\n<span style=\"font-weight: bold;\">Control.</span> DaaS helps you manage the risks that naturally come with giving your staff the freedom to work anywhere and on any device. It enables you to control the essentials such as data access and compliance without being overly restrictive. You no longer have to worry about what data is held on a user’s device as the data remains in the data centre at all times. This gives you control over all company assets because access can be revoked with the touch of a button.\r\n<span style=\"font-weight: bold;\">Management.</span> With an increasingly dispersed workforce, rolling out new applications or patching existing software has become more of a logistical problem than a technical one. Trying to coordinate people bringing in physical devices to be patched is a real issue for many companies, something which is eliminated completely with DaaS. You operate on one central image (or a small number of images based on persona), a change is made once, and everyone is on the latest version. It removes the need to standardise builds of end-user compute hardware as DaaS applications will run on almost any device no matter its configuration.\r\n<span style=\"font-weight: bold;\">Security.</span> DaaS moves the security risk from hundreds of end-user devices and put it all into the controlled and managed environment of a data centre. Lost or stolen laptops no longer provide a security risk. No data is on the local machine. As DaaS removes the need to create VPNs to access applications and data held by the company it also removes the problem of users trying to bypass the security in the belief that it will make their life easier. ","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/DaaS_-_Desktop_as_a_Service.png"},{"id":2,"title":"Virtual machine and cloud system software","alias":"virtual-machine-and-cloud-system-software","description":" A virtual machine (VM) is a software-based computer that exists within another computer’s operating system, often used for the purposes of testing, backing up data, or running SaaS applications. To fully grasp how VMs work, it’s important to first understand how computer software and hardware are typically integrated by an operating system.\r\n"The cloud" refers to servers that are accessed over the Internet, and the software and databases that run on those servers. Cloud servers are located in data centers all over the world. By using cloud computing, users and companies don't have to manage physical servers themselves or run software applications on their own machines.\r\nThe cloud enables users to access the same files and applications from almost any device, because the computing and storage take place on servers in a data center, instead of locally on the user device. This is why a user can log into their Instagram account on a new phone after their old phone breaks and still find their old account in place, with all their photos, videos, and conversation history. It works the same way with cloud email providers like Gmail or Microsoft Office 365, and with cloud storage providers like Dropbox or Google Drive.\r\nFor businesses, switching to cloud computing removes some IT costs and overhead: for instance, they no longer need to update and maintain their own servers, as the cloud vendor they are using will do that. This especially makes an impact on small businesses that may not have been able to afford their own internal infrastructure but can outsource their infrastructure needs affordably via the cloud. The cloud can also make it easier for companies to operate internationally because employees and customers can access the same files and applications from any location.\r\nSeveral cloud providers offer virtual machines to their customers. These virtual machines typically live on powerful servers that can act as a host to multiple VMs and can be used for a variety of reasons that wouldn’t be practical with a locally-hosted VM. These include:\r\n<ul><li>Running SaaS applications - Software-as-a-Service, or SaaS for short, is a cloud-based method of providing software to users. SaaS users subscribe to an application rather than purchasing it once and installing it. These applications are generally served to the user over the Internet. Often, it is virtual machines in the cloud that are doing the computation for SaaS applications as well as delivering them to users. If the cloud provider has a geographically distributed network edge, then the application will run closer to the user, resulting in faster performance.</li><li>Backing up data - Cloud-based VM services are very popular for backing up data because the data can be accessed from anywhere. Plus, cloud VMs provide better redundancy, require less maintenance, and generally scale better than physical data centers. (For example, it’s generally fairly easy to buy an extra gigabyte of storage space from a cloud VM provider, but much more difficult to build a new local data server for that extra gigabyte of data.)</li><li>Hosting services like email and access management - Hosting these services on cloud VMs is generally faster and more cost-effective, and helps minimize maintenance and offload security concerns as well.</li></ul>","materialsDescription":"What is an operating system?\r\nTraditional computers are built out of physical hardware, including hard disk drives, processor chips, RAM, etc. In order to utilize this hardware, computers rely on a type of software known as an operating system (OS). Some common examples of OSes are Mac OSX, Microsoft Windows, Linux, and Android.\r\nThe OS is what manages the computer’s hardware in ways that are useful to the user. For example, if the user wants to access the Internet, the OS directs the network interface card to make the connection. If the user wants to download a file, the OS will partition space on the hard drive for that file. The OS also runs and manages other pieces of software. For example, it can run a web browser and provide the browser with enough random access memory (RAM) to operate smoothly. Typically, operating systems exist within a physical computer at a one-to-one ratio; for each machine, there is a single OS managing its physical resources.\r\n<span style=\"font-weight: bold;\">Can you have two or more operating systems on one computer?</span>\r\nSome users want to be able to run multiple operating systems simultaneously on one computer, either for testing or one of the other reasons listed in the section below. This can be achieved through a process called virtualization. In virtualization, a piece of software behaves as if it were an independent computer. This piece of software is called a virtual machine, also known as a ‘guest’ computer. (The computer on which the VM is running is called the ‘host’.) The guest has an OS as well as its own virtual hardware.\r\n‘Virtual hardware’ may sound like a bit of an oxymoron, but it works by mapping to real hardware on the host computer. For example, the VM’s ‘hard drive’ is really just a file on the host computer’s hard drive. When the VM wants to save a new file, it actually has to communicate with the host OS, which will write this file to the host hard drive. Because virtual hardware must perform this added step of negotiating with the host to access hardware resources, virtual machines can’t run quite as fast as their host computers.\r\nWith virtualization, one computer can run two or more operating systems. The number of VMs that can run on one host is limited only by the host’s available resources. The user can run the OS of a VM in a window like any other program, or they can run it in fullscreen so that it looks and feels like a genuine host OS.\r\n <span style=\"font-weight: bold; \">What are virtual machines used for?</span>\r\nSome of the most popular reasons people run virtual machines include:\r\n<span style=\"font-weight: bold; \">Testing</span> - Oftentimes software developers want to be able to test their applications in different environments. They can use virtual machines to run their applications in various OSes on one computer. This is simpler and more cost-effective than having to test on several different physical machines.\r\n<span style=\"font-weight: bold; \">Running software designed for other OSes</span> - Although certain software applications are only available for a single platform, a VM can run software designed for a different OS. For example, a Mac user who wants to run software designed for Windows can run a Windows VM on their Mac host.\r\n<span style=\"font-weight: bold; \">Running outdated software</span> - Some pieces of older software can’t be run in modern OSes. Users who want to run these applications can run an old OS on a virtual machine.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Virtual_machine_and_cloud_system_software.png"},{"id":39,"title":"IaaS - Infrastructure as a Service","alias":"iaas-infrastructure-as-a-service","description":"<span style=\"font-weight: bold;\">Infrastructure as a service</span> (IaaS) are online services that provide high-level APIs used to dereference various low-level details of underlying network infrastructure like physical computing resources, location, data partitioning, scaling, security, backup etc. A hypervisor, such as Xen, Oracle VirtualBox, Oracle VM, KVM, VMware ESX/ESXi, or Hyper-V, LXD, runs the virtual machines as guests. Pools of hypervisors within the cloud operational system can support large numbers of virtual machines and the ability to scale services up and down according to customers' varying requirements.\r\nTypically IaaS solutions involve the use of a cloud orchestration technology like Open Stack, Apache Cloudstack or Open Nebula. This manages the creation of a virtual machine and decides on which hypervisor (i.e. physical host) to start it, enables VM migration features between hosts, allocates storage volumes and attaches them to VMs, usage information for billing and lots more.\r\nAn alternative to hypervisors are Linux containers, which run in isolated partitions of a single Linux kernel running directly on the physical hardware. Linux cgroups and namespaces are the underlying Linux kernel technologies used to isolate, secure and manage the containers. Containerisation offers higher performance than virtualization, because there is no hypervisor overhead. Also, container capacity auto-scales dynamically with computing load, which eliminates the problem of over-provisioning and enables usage-based billing.\r\nIaaS clouds often offer additional resources such as a virtual-machine disk-image library, raw block storage, file or object storage, firewalls, load balancers, IP addresses, virtual local area networks (VLANs), and software bundles.\r\nAccording to the Internet Engineering Task Force (IETF), the most basic cloud-service model is that of providers offering IT infrastructure – virtual machines and other resources – as a service to subscribers.\r\nIaaS cloud providers supply these resources on-demand from their large pools of equipment installed in data centers. For wide-area connectivity, customers can use either the Internet or carrier clouds (dedicated virtual private networks). To deploy their applications, cloud users install operating-system images and their application software on the cloud infrastructure. In this model, the cloud user patches and maintains the operating systems and the application software. Cloud infrastructure providers typically bill IaaS services on a utility computing basis: cost reflects the amount of resources allocated and consumed.","materialsDescription":"<h1 class=\"align-center\"><span style=\"font-weight: bold; \">Infrastructure as a Service Benefits </span></h1>\r\n<span style=\"font-weight: bold; \">Cost savings:</span> An obvious benefit of moving to the managed IaaS model is lower infrastructure costs. No longer do organizations have the responsibility of ensuring uptime, maintaining hardware and networking equipment, or replacing old equipment. IaaS technology also saves enterprises from having to buy more capacity to deal with sudden business spikes. Organizations with a smaller IT infrastructure generally require a smaller IT staff as well. The pay-as-you-go model also provides significant cost savings. \r\n<span style=\"font-weight: bold; \">Scalability and flexibility:</span> One of the greatest benefits of IaaS is the ability to scale up and down quickly in response to an enterprise’s requirements. Infrastructure as a Service providers generally have the latest, most powerful storage, servers and networking technology to accommodate the needs of their customers. This on-demand scalability provides added flexibility and greater agility to respond to changing opportunities and requirements. \r\n<span style=\"font-weight: bold; \">Faster time to market:</span> Competition is strong in every sector, and time to market is one of the best ways to beat the competition. Because IaaS vendors elasticity and scalability, organizations can ramp up and get the job done (and the product or service to market) more rapidly.\r\n<span style=\"font-weight: bold; \">Support for DR, BC and high availability:</span> While every enterprise has some type of disaster recovery plan, the technology behind those plans is often expensive and unwieldy. Organizations with several disparate locations often have different disaster recovery and business continuity plans and technologies, making management virtually impossible.\r\n<span style=\"font-weight: bold; \">Focus on business growth:</span> Time, money and energy spent making technology decisions and hiring staff to manage and maintain the technology infrastructure is time not spent on growing the business. By moving infrastructure to a global infrastructure services, organizations can focus their time and resources where they belong, on developing innovations in applications and solutions.\r\n<h1 class=\"align-center\">IaaS, PaaS and SaaS: What’s the Difference?</h1>\r\nPlatform as a Service (PaaS) is the next step up from IaaS products, where the provider also supplies the operating environment including the operating system, application services, middleware and other ‘runtimes’ for cloud users. It’s used for development environments where the business can focus on creating an app but wants someone else to maintain the deployment platform. It means you have much simpler workloads but you can’t necessarily be as flexible as you want.\r\nAt the highest level of orchestration is Software as a Service. In SaaS infrastructure applications are accessed on demand. Here you just open your browser and go, consuming software rather than installing and running it. A user simply logs on to access the provider’s application. Users can decide how the app will work but pretty much everything else is the responsibility of the software provider.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IaaS.png"}],"additionalInfo":{"budgetNotExceeded":"-1","functionallyTaskAssignment":"-1","projectWasPut":"-1","price":0,"source":{"url":"https://aws.amazon.com/ru/solutions/case-studies/corte-dei-conti/?nc1=h_ls","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},{"id":170,"title":"Avaya Aura® Communication Manager, Avaya Call Management System (CMS), Avaya Aura® Experience Portal, Avaya Aura® Call Center Elite Multichannel for Caesar Satellite","description":"In 2016, Caesar Satellite prevented over 30,000 robberies with approximately 25,000 lawbreakers arrested.\r\n\r\n<span style=\"font-weight: bold;\">Benefits</span>\r\n\r\n<ul><li>Increased Productivity</li><li>Improved Customer Service</li></ul>\r\nCAESAR SATELLITE SECURES AVAYA SOLUTIONS FOR CONTACT CENTER UPGRADE\r\nThe Avaya Aura® Platform facilitates the continuity of the company’s business with unified communications including disaster recovery capabilities.\r\n\r\nSecurity is one of the business areas which demand the strictest requirements for proper functioning of IT-systems. Promptness of data processing and response to emerging hazards is the key efficiency indicator of security systems for real estate and automobiles. Caesar Satellite protects hundreds of office premises, apartments, country houses and automobiles. Along with monitoring centers providing information 24/7, the contact center is another crucial element in ensuring reliable and efficient protection of the client's property. It operates 24 hours a day in all time zones and promptly handles alarm signals to prevent violations all over Russia.\r\n\r\nThe continuous growth of demand on the infrastructure load as well as the desire for service quality improvements, required enhancing the contact center performance and efficiency.\r\n\r\n\r\n<span style=\"font-weight: bold;\">CHALLENGES</span>\r\nLack of resilience, risk of downtime\r\nLarge volume of calls that need to be addressed immediately\r\n24/7/365 system with periods of heavy call volumes and alarm notifications\r\n\r\n<span style=\"font-weight: bold;\">VALUE CREATED</span>\r\nAvaya solutions formed the basis for a high-performance contact center capable of serving over 135,000 clients with disaster recovery capabilities\r\nOperating 24/7, the contact center is now capable of processing over 14,000 calls and alarms from anywhere in Russia every day\r\nThe processes have been tuned to ensure immediate response to all calls during peak loads, in case of black outs and other emergencies\r\n\r\n<span style=\"font-weight: bold;\">Main Business Tasks</span>\r\nCaesar Satellite considers immediate processing all calls to be crucial for its success. This process directly depends on the fault-tolerant service structure, which is the cornerstone of business reliability and continuity. In order to create a new contact center meeting the defined performance and efficiency requirements, the company needed to solve the following tasks:\r\n\r\n<ul><li>upgrade the existing IT-infrastructure by implementing cutting-edge software</li><li>improve the performance of the remote customer service infrastructure</li><li>ensure disaster recovery of the contact center</li><li>integrate the new contact center with the client's existing systems</li><li>make working conditions more comfortable for the staff</li><li>develop and implement the client's own software tailored to business specific needs</li></ul>\r\n\r\n<span style=\"font-weight: bold;\">Why Avaya?</span>\r\nThe solution provider for the new contact center was selected based on such criteria as cost-effectiveness including cost of the solution and payback time, the solution’s functionality and reliability and the vendor's experience with similar projects. Avaya has been the leader in the contact center market in Russia for many years and employs a wide network of highly professional partners and integrators. The company has a reputation as a reliable provider of telecommunications equipment for various business areas and non-profit organizations. With its variety of solutions, Avaya is able to build and upgrade telecommunications infrastructures of any complexity. After careful investigation of the Caesar Satellite IT-infrastructure location in Moscow and Khimki town, the following Avaya solutions were chosen:\r\n\r\n<ul><li>Avaya Aura Communication Manager with call distribution software Avaya Aura Call Center Elite became the basis for the contact center providing work places for 200 operators</li><li>Avaya Call Management System was used to build the reporting system</li><li>Interactive voice platform Avaya Aura Experience Portal was implemented as a self-service platform</li><li>Avaya Elite Multichannel was used to create a single route for incoming calls via different channels and to integrate the contact center with existing IT systems.</li></ul>\r\n\r\n<span style=\"font-weight: bold;\">Project Implementation</span>\r\nThe project was implemented in the following stages:\r\n\r\nAssuring trouble-free operation - All components of the contact center were virtualized to ensure their synchronized and uninterrupted function. Backup of the virtualized contact center components, including core equipment, was installed on servers in data-processing centers located in different areas. Local implementation of redundant contact center functions to ensure off-line operation of subsidiaries in case of emergencies.\r\nUpgrade of the existing IT-infrastructure - All outdated components of the existing contact center (call routing and distribution systems, reporting, voice call center management, computer-integrated telephony server etc.) were updated to the latest versions of Avaya software.\r\nIntegration with business systems - The interactive voice response (IVR) system was transferred to the Avaya Experience Portal to ensure single routing of incoming calls and seamless integration with other elements of the contact center. To achieve this goal, the IVR logic was upgraded and integrated with the emergency calls processing system. The new contact center was integrated with the data base of Caesar Satellite, which made it possible to use existing client data without transferring to the new platform. The existing functions, such as automated call distribution, statistics generation, etc. were preserved.\r\nOptimization based on proprietary developments - The integrator developed and implemented their own solutions to improve the client's efficiency: pop-up info cards and a “Conversation template” application which are triggered automatically depending on the type of the customer's call.\r\n"Caesar Satellite serves customers from various regions in Russia. Every year, the rapid response teams of Caesar Satellite respond to an average of 380,000 emergency calls from apartments, cottages and commercial premises. In 2016, we prevented over 30,000 robberies with approximately 25,000 lawbreakers arrested. The contact center is a key component of our business processes: it ensures immediate processing of emergency calls and effective prevention of violations. Taking into account its importance for our business, we entrusted this project to Asteros and made the right choice. Today we are proud owners of the most innovative and efficient contact center in our industry, which is bound to raise Caesar Satellite to a new quality level of customer service,” states Oganez Torosyan, Head of IT-Service Caesar Satellite\r\n\r\n<span style=\"font-weight: bold;\">About Caesar Satellite</span>\r\nCaesar Satellite is the leader in the Russian market of security systems for real estate and automobiles. The operator protects office premises, apartments, country houses and automobiles. The company was founded in 1997 and started as a provider of satellite security systems for automobiles. In the early 2000s, the company began to develop its local networks and soon grew into a major national operator. In 2006, it was certified under ISO 9001 and became the first company in Russia to obtain Thatcham certification. Since 2013, Caesar Satellite has been a member of the GLONASS Non-Profit Partnership.\r\n\r\nCaesar Satellite possesses a reliable monitoring infrastructure processing 5 million signals every year. There are 4 monitoring centers which distribute the operating load in real time and ensure continuous functioning of the system 24/7/365.\r\n\r\n<span style=\"font-weight: bold;\">SOLUTIONS</span>\r\nAvaya Aura® Communication Manager\r\nAvaya Aura® Call Center Elite\r\nAvaya Aura® Experience Portal\r\nAvaya Elite Multichannel\r\nAvaya Call Management System\r\n\r\nThe rapid response teams of Caesar Satellite respond to an average of 380,000 emergency calls.","alias":"avaya-aurar-communication-manager-avaya-call-management-system-cms-avaya-aurar-experience-portal-avaya-aurar-call-center-elite-multichannel-for-caesar-satellite","roi":0,"seo":{"title":"Avaya Aura® Communication Manager, Avaya Call Management System (CMS), Avaya Aura® Experience Portal, Avaya Aura® Call Center Elite Multichannel for Caesar Satellite","keywords":"Avaya, contact, center, Caesar, Satellite, with, calls, business","description":"In 2016, Caesar Satellite prevented over 30,000 robberies with approximately 25,000 lawbreakers arrested.\r\n\r\n<span style=\"font-weight: bold;\">Benefits</span>\r\n\r\n<ul><li>Increased Productivity</li><li>Improved Customer Service</li></ul>\r\nCAESAR SATELLITE SECURE","og:title":"Avaya Aura® Communication Manager, Avaya Call Management System (CMS), Avaya Aura® Experience Portal, Avaya Aura® Call Center Elite Multichannel for Caesar Satellite","og:description":"In 2016, Caesar Satellite prevented over 30,000 robberies with approximately 25,000 lawbreakers arrested.\r\n\r\n<span style=\"font-weight: bold;\">Benefits</span>\r\n\r\n<ul><li>Increased Productivity</li><li>Improved Customer Service</li></ul>\r\nCAESAR SATELLITE SECURE"},"deal_info":"","user":{},"supplier":{},"vendors":[{"id":2058,"title":"Avaya","logoURL":"https://old.roi4cio.com/uploads/roi/company/avaya_logo.png","alias":"avaya","address":"","roles":[],"description":"Avaya is a recognized innovator leading business communications for the digital age. Avaya delivers smart global solutions and technologies for customer and team engagement, unified communications and collaboration, contact center and customer experience management, and networking. We provide related services to large enterprises, midmarket companies, small businesses, and government organizations around the world.\r\nAvaya Solutions bring people together with the right information at the right time in the right context, helping to enable a higher level of engagement among customers, teams, employees and partners to improve efficiency and quickly address critical business challenges. Designed to be highly scalable, reliable, secure and flexible, these solutions help reduce costs and simplify management while providing a platform for next-generation engagement and collaboration. They are available in a variety of deployment models including public, hybrid and private cloud as well as on a customer’s premises. All are supported by Avaya’s portfolio of professional and support services.","companyTypes":[],"products":{},"vendoredProductsCount":5,"suppliedProductsCount":5,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":2,"vendorImplementationsCount":1,"vendorPartnersCount":0,"supplierPartnersCount":3,"b4r":0,"categories":{},"companyUrl":"https://www.avaya.com/en/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Avaya","keywords":"Avaya, right, engagement, collaboration, services, management, customer, solutions","description":"Avaya is a recognized innovator leading business communications for the digital age. Avaya delivers smart global solutions and technologies for customer and team engagement, unified communications and collaboration, contact center and customer experience manag","og:title":"Avaya","og:description":"Avaya is a recognized innovator leading business communications for the digital age. Avaya delivers smart global solutions and technologies for customer and team engagement, unified communications and collaboration, contact center and customer experience manag","og:image":"https://old.roi4cio.com/uploads/roi/company/avaya_logo.png"},"eventUrl":""}],"products":[{"id":607,"logo":false,"scheme":false,"title":"Avaya Aura® Communication Manager","vendorVerified":0,"rating":"2.00","implementationsCount":1,"suppliersCount":0,"alias":"avaya-aurar-communication-manager","companyTypes":[],"description":"\r\nThe Core of Your Unified Communications and Collaboration Solution\r\n<ul> <li>Start your move to unified communications and collaboration with Avaya Aura® Communication Manager. Voice, video, messaging, and customer contact applications converge on a single network, to spread intelligent and flexible communications throughout the organization.</li> <li>Enable employees to take care of business more easily and quickly—because your staff at headquarters, remote branch offices, and on the road will all be using the same enhanced communication capabilities.</li> <li>Extend conferencing, mobility, video, and collaborative applications to everyone in your organization. Avaya Aura® Communication Manager adapts to SIP, H.323, digital, and analog. And this means your current network won’t stop you from moving to unified communications and collaboration.</li> </ul>\r\n• Communicate and Collaborate with Anyone, Anywhere. Extend your collaborative communications across time zones and regions to mobile phones, conference rooms, contact centers, and more. • Reliability at Your Fingertips. All communications are consistent and reliable with configurable redundancy, virtualization, and fault tolerance. • Designed for IT and Employees. Common capabilities, features, applications, and administration make learning easy for IT and employees while reducing the cost of ownership.","shortDescription":"Avaya Aura® Communication Manager software is the open, highly-reliable and extensible IP Telephony foundation on which Avaya delivers Unified Communications solutions to enterprises large and small.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Avaya Aura® Communication Manager","keywords":"communications, your, Communication, applications, Manager, with, Avaya, Extend","description":"\r\nThe Core of Your Unified Communications and Collaboration Solution\r\n<ul> <li>Start your move to unified communications and collaboration with Avaya Aura® Communication Manager. Voice, video, messaging, and customer contact applications converge on a single n","og:title":"Avaya Aura® Communication Manager","og:description":"\r\nThe Core of Your Unified Communications and Collaboration Solution\r\n<ul> <li>Start your move to unified communications and collaboration with Avaya Aura® Communication Manager. Voice, video, messaging, and customer contact applications converge on a single n"},"eventUrl":"","translationId":607,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":71,"title":"CRM - Customer Relationship Management","alias":"crm-customer-relationship-management","description":"<span style=\"font-weight: bold;\">Customer service</span> is the provision of service to customers before, during and after a purchase. The perception of success of such interactions is dependent on employees "who can adjust themselves to the personality of the guest". Customer service concerns the priority an organization assigns to customer service relative to components such as product innovation and pricing. In this sense, an organization that values good customer service may spend more money in training employees than the average organization or may proactively interview customers for feedback.\r\nA <span style=\"font-weight: bold;\">customer support</span> is a range of customer services to assist customers in making cost effective and correct use of a product. It includes assistance in planning, installation, training, trouble shooting, maintenance, upgrading, and disposal of a product. These services even may be done at customer's side where he/she uses the product or service. In this case it is called "at home customer services" or "at home customer support."\r\nRegarding technology, products such as mobile phones, televisions, computers, software products or other electronic or mechanical goods, it is termed technical support. \r\nCustomer service may be provided by a person (e.g., sales and service representative), or by automated means, such as kiosks, Internet sites, and apps.\r\n<span style=\"font-weight: bold;\">CRM </span>(Customer Relationship Management) is an approach to manage a company's interaction with current and potential customers. It uses data analysis about customers' history with a company to improve business relationships with customers, specifically focusing on customer retention and ultimately driving sales growth.\r\nOne important aspect of the CRM approach is the systems of CRM that compile data from a range of different communication channels, including a company's website, telephone, email, live chat, marketing materials and more recently, social media. Through the CRM approach and the systems used to facilitate it, businesses learn more about their target audiences and how to best cater to their needs.\r\nCRM helps users focus on their organization’s relationships with individual people including customers, service users, colleagues, or suppliers.\r\nWhen people talk about customer relationship management system, they might mean any of three things: \r\n<ul><li><span style=\"font-weight: bold;\">CRM as Technology</span>: This is a technology product, often in the cloud, that teams use to record, report and analyse interactions between the company and users. This is also called a CRM system or solution.</li><li><span style=\"font-weight: bold;\">CRM as a Strategy</span>: This is a business’ philosophy about how relationships with customers and potential customers should be managed. </li><li><span style=\"font-weight: bold;\">CRM as a Process</span>: Think of this as a system a business adopts to nurture and manage those relationships.</li></ul>\r\n<br /><br /><br />","materialsDescription":"<h1 class=\"align-center\"><span style=\"font-weight: normal;\">Why is CRM important?</span></h1>\r\nCRM management system enables a business to deepen its relationships with customers, service users, colleagues, partners and suppliers.\r\nForging good relationships and keeping track of prospects and customers is crucial for customer acquisition and retention, which is at the heart of a CRM’s function. You can see everything in one place — a simple, customizable dashboard that can tell you a customer’s previous history with you, the status of their orders, any outstanding customer service issues, and more.\r\nGartner predicts that by 2021, CRM technology will be the single largest revenue area of spending in enterprise software. If your business is going to last, you know that you need a strategy for the future. For forward-thinking businesses, CRM is the framework for that strategy.\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What are the benefits of CRM?</span></h1>\r\nBy collecting and organising data about customer interactions, making it accessible and actionable for all, and facilitating analysis of that data, CRM offers many benefits and advantages.<br />The benefits and advantages of CRM include:\r\n<ul><li>Enhanced contact management</li><li>Cross-team collaboration</li><li>Heightened productivity</li><li>Empowered sales management</li><li>Accurate sales forecasting</li><li>Reliable reporting</li><li>Improved sales metrics</li><li>Increased customer satisfaction and retention</li><li>Boosted marketing ROI</li><li>Enriched products and services</li></ul>\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What are the key features of most popular CRM software programs?</span></h1>\r\nWhile many CRM solutions differ in their specific value propositions — depending on your business size, priority function, or industry type — they usually share some core features. These, in fact, are the foundation of any top CRM software, without which you might end up using an inferior app or an over-rated address book. So, let’s discuss the key features you need to look for when figuring out the best CRM software for your business.\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Contact management</span>. The best CRM solutions aren’t just an address book that only organizes contact details. It manages customer data in a centralized place and gives you a 360-degree view of your customers. You should be able to organize customers’ personal information, demographics, interactions, and transactions in ways that are meaningful to your goals or processes. Moreover, a good contact management feature lets you personalize your outreach campaign. By collecting personal, social, and purchase data, it will help you to segment target audience groups in different ways.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Reporting and dashboards</span>. These features of customer relationship management allow you to use analytics to interpret customer data. Reporting is very useful if you want to consolidate disparate data and churn out insights in different visualizations. This lets you make better decisions or proactively deal with market trends and customer behavioral patterns. The more visual widgets a CRM software has, the better you can present reports. Furthermore, a best customer relationship management software will generate real-time data, making reporting more accurate and timely. Reporting also keeps you tab on sales opportunities like upsell, resell, and cross-sell, especially when integrated with e-commerce platforms.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Lead management</span>. These features let you manage leads all the way to win-loss stage. They pave a clear path to conversion, so you can quickly assess how the business is performing. One of the main three legs that comprises the best client relationship management software (the other two being contact management and reporting), lead management unburdens the sales team from follow-ups, tracking, and repetitive tasks.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Deals and tasks</span>. Deals and tasks are closely associated with leads. Deals are leads at the negotiation stage, so it’s critical to keep a close eye on their associated tasks for a higher chance of conversion.<br />CRM software tools should also let you track both deals and tasks in their respective windows or across the sales stages. Whether you’re viewing a contact or analyzing the sales pipeline, you should be able to immediately check the deal’s tasks and details. Deals and tasks should also have user permissions to protect leaks of sensitive data. Similarly, alerts are critical to tasks so deadlines are met. Notifications are usually sent via email or prominently displayed on the user’s dashboard.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Campaign management</span>. Solid CRM software will integrate this feature to enable marketing processes from outreach concept to A/B testing to deployment and to post analysis. This will allow you to sort campaigns to target segments in your contacts and define deployment strategies. You will also be able to define metrics for various channels, then plow back the insights generated by post-campaign analytics into planning more campaigns.<br />Recurring outreach efforts can also be automated. For instance, you can set to instantly appropriate content to contacts based on their interest or send tiered autoresponders based on campaign feedback.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Email management</span>. By integrating with popular email clients like Gmail and Outlook, CRM solutions can capture email messages and sort important details that can be saved in contacts or synced with leads. They can also track activities like opened emails, forwarded emails, clicked links, and downloaded files. Emails can also be qualified for prospecting.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Social media management. </span>Popular CRM systems feature an integrated social media management where you can view different social media pages from the CRM’s interface. This is a convenient way to post, reply on, and manage all your pages. Likewise, this feature gives you a better perspective on how customers are interacting with your brand. A glean of their likes and dislikes, interests, shares, and public conversations helps you to assess customer biases and preferences. Customers are also increasingly using social media to contact companies; hence, a good CRM should alert you for brand mentions.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Mobile access</span>. With more users accessing apps via mobile devices, many vendors have been prioritizing mobile-first platforms. Emergence Capital Partners study found over 300 mobile-first apps so far and CRM is definitely one their targets. Many CRM solutions have both Android and iOS apps. Mobile access works in two ways to be highly appreciated: accessing data and inputting data while on location. Field sales with the latest sales information on hand may be able to interest prospects better. Conversely, sales reps can quickly update deals across the pipeline even as they come off a client meeting.</li></ul>\r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/CRM_-_Customer_Relationship_Management.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":609,"logo":false,"scheme":false,"title":"Avaya Call Management System (CMS)","vendorVerified":0,"rating":"2.00","implementationsCount":1,"suppliersCount":0,"alias":"avaya-call-management-system-cms","companyTypes":[],"description":"Built on the performance, reliability and flexibility of the Avaya Aura® platform, Avaya CMS delivers real-time monitoring and historical reporting for Avaya Call Center Elite solutions including Elite omnichannel information, custom reporting, task scheduling, exception notification, threshold warning, administration and configuration, and long term ACD data storage.\r\nIncrease the efficiency of your call center\r\nOptimize performance across multiple channels. Improve service levels and increase agent efficiency by monitoring and reporting response times across Avaya Aura® Call Center (CC) Elite systems and non-voice channels. A simple extension to your CC Elite system, Elite Multichannel enables response time reporting and monitoring that can increase agent efficiency for voice, e-mail, fax, web Chat, SMS text or social media customer contact.\r\nManage dynamic call volumes without adding staff. Monitor and analyze everything from wait times and average answer speeds to the percentage by which abandoned call times have decreased in the past year. CMS measures up to 24K trunks, providing administration ease and increases reporting accuracy.\r\nMake a well- informed decision based on real-time CMS data to redirect calls on-the-fly or to redistribute expensive human resources. Increase performance, minimize costs or develop new or improved procedures by leveraging historical data.\r\nEnhance productivity while controlling costs. Realize a quick return on your CMS investment. Easy to deploy, CMS helps maximize the success of marketing and customer service campaigns. Continue benefitting from your investment over time by leveraging historical data to analyze trends and to establish performance benchmarks.","shortDescription":"Avaya Call Management System (CMS) is an integrated analysis and reporting solution that keeps you in touch with virtually everything that’s going on in your contact center from evaluating the performance of a single agent or group of agents to managing a contact center with multiple locations worldwide.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Avaya Call Management System (CMS)","keywords":"reporting, Avaya, Elite, data, your, performance, historical, times","description":"Built on the performance, reliability and flexibility of the Avaya Aura® platform, Avaya CMS delivers real-time monitoring and historical reporting for Avaya Call Center Elite solutions including Elite omnichannel information, custom reporting, task scheduling","og:title":"Avaya Call Management System (CMS)","og:description":"Built on the performance, reliability and flexibility of the Avaya Aura® platform, Avaya CMS delivers real-time monitoring and historical reporting for Avaya Call Center Elite solutions including Elite omnichannel information, custom reporting, task scheduling"},"eventUrl":"","translationId":609,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":82,"title":"Unified Communications","alias":"unified-communications","description":"Unified communications (UC) is a framework for integrating various asynchronous and real-time communication tools. The goal of UC is to enhance business communication, collaboration and productivity. Unified communications do not represent a singular technology; rather, it describes a strategy for integrating interconnected systems of enterprise communication devices and applications that can be used in concert or successively.\r\nSome business communication tools - like Internet Protocol (IP) telephony and video conferencing - facilitate real-time communication, also called synchronous communication. Other enterprise communication tools, like email, facilitate asynchronous communication, which takes place at a person's convenience.\r\nIncreasingly, team collaboration tools have emerged to offer messaging-centric workflows and near-real-time communication. These tools also offer voice and video capabilities, API integrations and, ultimately, expound on instant messaging services by providing better UC features.\r\nThe goal of unified communications is to integrate the software that supports synchronous and asynchronous communication, so the end user has easy access to all tools from whatever device is in use.\r\nA unified communications environment is typically supported by one or more back-end systems, often referred to as UC platforms, that facilitate integration among services, as well as the front-end clients that provide access. For example, a web conferencing system would make use of an audio conferencing system - which, in turn, would be built on an underlying IP telephony platform - and a unified messaging client would allow click-to-talk (CTC), click-to-chat or click-to-video functionality.\r\nUC also supports users moving from one mode of communication to another within the same session. For example, a user may start communicating via email but then decide to escalate the interaction to real-time communication, transitioning the session to a voice call with one click and then to a video conference with another click without any disruption.\r\nUnified communications systems and their components can be deployed on premises, in a public or private cloud, or a combination of all three. Cloud-based unified communications is also called UC as a service (UCaaS). An open source project called WebRTC, for example, enables real-time communications to be embedded into web browsers.\r\nHistorically, single-vendor UC environments have demonstrated the tightest integration and compatibility. Interoperability among vendors remains an ongoing challenge in UC, but it has also been mitigated, in part, by partnerships, common protocols and open APIs.","materialsDescription":" <span style=\"font-weight: bold;\">What technology do unified communications have?</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Contrasting unified messaging</span></span>\r\nUnified communications are sometimes confused with unified messaging, but it is distinct. Unified communications refer to both real-time and non-real-time delivery of communications based on the preferred method and location of the recipient; unified messaging culls messages from several sources (such as e-mail, voice mail and faxes), but holds those messages only for retrieval at a later time. Unified communications allow for an individual to check and retrieve an e-mail or voice mail from any communication device at any time. It expands beyond voice mail services to data communications and video services.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Components</span></span>\r\nWith unified communications, multiple modes of business communications are integrated. Unified communications is not a single product but a collection of elements that include:\r\n<ul><li>Call control and multimodal communications</li><li>Presence</li><li>Instant messaging</li><li>Unified messaging</li><li>Speech access and personal assistant</li><li>Conferencing (audio, Web and video)</li><li>Collaboration tools</li><li>Mobility</li><li>Business process integration (BPI)</li><li>Software to enable business process integration</li></ul>\r\nPresence — knowing where intended recipients are, and if they are available, in real-time — is a key component of unified communications. Unified communications integrate all systems a user might already use, and helps those systems work together in real-time. For example, unified communications technology could allow a user to seamlessly collaborate with another person on a project, even if the two users are in separate locations. The user could quickly locate the necessary person by accessing an interactive directory, engage in a text messaging session, and then escalate the session to a voice call or even a video call.\r\nIn another example, an employee receives a call from a customer who wants answers. Unified communications enable that employee to call an expert colleague from a real-time list. This way, the employee can answer the customer faster by eliminating rounds of back-and-forth e-mails and phone-tag.\r\nThe examples in the previous paragraph primarily describe "personal productivity" enhancements that tend to benefit the individual user. While such benefits can be important, enterprises are finding that they can achieve even greater impact by using unified communications capabilities to transform business processes. This is achieved by integrating UC functionality directly into the business applications using development tools provided by many of the suppliers. Instead of the individual user invoking the UC functionality to, say, find an appropriate resource, the workflow or process application automatically identifies the resource at the point in the business activity where one is needed.\r\nWhen used in this manner, the concept of presence often changes. Most people associate presence with instant messaging (IM "buddy lists") the status of individuals is identified. But, in many business process applications, what is important is finding someone with a certain skill. In these environments, presence identifies available skills or capabilities.\r\nThis "business process" approach to integrating UC functionality can result in bottom-line benefits that are an order of magnitude greater than those achievable by personal productivity methods alone.\r\n<span style=\"font-weight: bold;\">Related concepts</span>\r\nUnified communications & collaboration (UCC) is the integration of various communications methods with collaboration tools such as virtual white boards, real-time audio and video conferencing, and enhanced call control capabilities. Before this fusion of communications and collaboration tools into a single platform, enterprise collaboration service vendors and enterprise communications service vendors offered distinctly different solutions. Now, collaboration service vendors also offer communications services, and communications service providers have developed collaboration tools.\r\nUnified communications & collaboration as a service (UCCaaS) is cloud-based UCC platforms. Compared to premises-based UCC solutions, UCCaaS platforms offer enhanced flexibility and scalability due to the SaaS subscription model.\r\nUnified communications provisioning is the act of entering and configuring the settings for users of phone systems, instant messaging, telepresence, and other collaboration channels. Provisioners refer to this process as making moves, adds, changes, and deletes or MAC-Ds.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Unified_Communications.png"},{"id":186,"title":"VoIP - Voice over Internet Protocol","alias":"voip-voice-over-internet-protocol","description":"<span style=\"font-weight: bold;\">Voice over Internet Protocol </span>(Voice over IP, VoIP) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. Other terms commonly associated with VoIP solutions are IP telephony, Internet telephony, broadband telephony, and broadband phone service.\r\nThe term Internet telephony specifically refers to the provisioning of communications services (voice, fax, SMS, voice-messaging) over the public Internet, rather than via the public switched telephone network (PSTN). The steps and principles involved in originating VoIP telephone calls are similar to traditional digital telephony and involve signaling, channel setup, digitization of the analog voice signals, and encoding.\r\nInstead of being transmitted over a circuit-switched network, however, the digital information is packetized, and transmission occurs as IP packets over a packet-switched network. Such transmission entails careful considerations about resource management different from time-division multiplexing (TDM) networks.\r\n\r\n\r\n\r\n","materialsDescription":"<h1 class=\"align-center\"> What are the benefits of VoIP?</h1>\r\n VoIP technology can facilitate tasks and deliver services that might be cumbersome or costly to implement when using traditional PSTN: \r\n<ul><li>More than one phone call can be transmitted on the same broadband phone line. This way, VoIP system can facilitate the addition of telephone lines to businesses without the need for additional physical lines.</li><li>Features that are usually charged extra by telecommunication companies, such as call forwarding, caller ID or automatic redialing, are simple with voice over internet technology.</li><li>Unified Communications are secured with VoIP technology, as it allows integration with other services available on the internet such as video conversation, messaging, etc. </li></ul>\r\n<h1 class=\"align-center\">VoIP programs </h1>\r\nThere are four main types of VoIP technology. Each option has varying levels of complexity which can impact ease of implementation and maintenance.\r\n <span style=\"font-weight: bold;\">Integrated Access</span>\r\nIntegrated access is the VoIP service that most mimics the traditional phone line. With integrated access VoIP, businesses integrate VoIP software and existing, legacy phone systems. This approach lets the business keep its old number and equipment while also gaining access to advanced telecommunications features. \r\n<span style=\"font-weight: bold;\">SIP Trunks</span>\r\n Session Initial Protocol (SIP) transmits voice and video information across a data network, letting VoIP users take advantage of shared lines and increase their communications flexibility. Because all data is sent over a network, businesses can use SIP trunks to replace traditional analog phone networks or use a VoIP gateway to integrate SIP trunking with legacy phone systems. \r\n<span style=\"font-weight: bold;\">Hosted IP PBX</span>\r\n What most people envision when they think of VoIP, this VoIP solution sees a vendor host and operate the private branch exchange, offering unified communications solutions. The business connects to a hosted cloud-based PBX network via its IP network. Phone system hardware is maintained off-site by the hosted IP PBX vendor, and all responsibility for the hardware, software, maintenance, security and upgrades all falls on the hosted PBX provider. \r\n <span style=\"font-weight: bold;\">Managed IP PBX </span>\r\nSimilar to Hosted IP PBX, this version of the unified communication solution is outsourced to a third party that takes care of all management requirements, but instead of phone hardware being off-site, the equipment is housed on-premise by the business. \r\nUnderstanding these different services of VoIP communication can help a business determine the system that best suits its needs. SIP Trunks, for instance, are more attractive to those who want to install their own technology and manage it themselves, while still connecting to VoIP features.\r\n On the other hand, managed IP PBX is a good option for those who don’t have the resources to buy and operate their own VoIP systems. The Hosted IP PBX solution frees the business to select the VoIP management software that works for them and liberates them from the cost and administrative headache of maintaining both voice and data lines and the related carrier partnerships. ","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/VoIP_-_Voice_over_Internet_Protocol.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":611,"logo":false,"scheme":false,"title":"Avaya Aura® Experience Portal","vendorVerified":0,"rating":"2.00","implementationsCount":1,"suppliersCount":0,"alias":"avaya-aurar-experience-portal","companyTypes":[],"description":"\r\n<span style=\"font-weight: bold;\">Give Your Customers an Experience That No One Else Can</span>\r\n<ol> <li>Engage with your customers when and where they want on the devices of their choice. Every customer interaction holds the promise of making a positive impression and advancing your competitive advantage.</li> <li>Connect with customers in new ways, taking advantage of all the popular channels available with Avaya Aura® Experience Portal—including mobile, voice, video, email, and SMS text.</li> <li>Orchestrate a personalized interaction with each customer. Even when you have hundreds, thousands, or millions of customer connections, you can design and manage all the different interactions from a single multichannel application platform.</li> <li>Be as mobile as your customers. Deliver a seamless, persistent customer experience with mobile capabilities. Dynamic menus let customers check order status, connect with tech support, talk to a live agent. Customers hear estimated wait times and the option to receive a return call. Full context is provided to the agent, so the agent is always prepared to assist customers.</li> <li>Support self-service consumers through low-effort apps. Deliver contextual information to an agent so a customer can easily transition from one channel to another. Your agent sees all information that the customer already provided.</li> </ol>\r\n• Give Customers the Freedom to Choose. An omnichannel customer experience lets customers use their favorite channels and devices to connect with your agents. Give them options to connect by phone, mobile, email and SMS services. • Personalize Your Customer Interactions. Give your customers powerful, unique service experiences with multi-party conferencing, intelligent routing, and pre-identified customer preferences. • Upgrade Customer Experiences Without Upending Your Infrastructure. Your infrastructure investment is safe. Let customers have the experiences they crave by adding a standards-based platform that integrates with your existing infrastructure.","shortDescription":"Avaya Aura® Experience Portal is an Omnichannel Customer Engagement with a Personal Touch","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Avaya Aura® Experience Portal","keywords":"with, customer, customers, your, Your, agent, mobile, Give","description":"\r\n<span style=\"font-weight: bold;\">Give Your Customers an Experience That No One Else Can</span>\r\n<ol> <li>Engage with your customers when and where they want on the devices of their choice. Every customer interaction holds the promise of making a positive imp","og:title":"Avaya Aura® Experience Portal","og:description":"\r\n<span style=\"font-weight: bold;\">Give Your Customers an Experience That No One Else Can</span>\r\n<ol> <li>Engage with your customers when and where they want on the devices of their choice. Every customer interaction holds the promise of making a positive imp"},"eventUrl":"","translationId":611,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":71,"title":"CRM - Customer Relationship Management","alias":"crm-customer-relationship-management","description":"<span style=\"font-weight: bold;\">Customer service</span> is the provision of service to customers before, during and after a purchase. The perception of success of such interactions is dependent on employees "who can adjust themselves to the personality of the guest". Customer service concerns the priority an organization assigns to customer service relative to components such as product innovation and pricing. In this sense, an organization that values good customer service may spend more money in training employees than the average organization or may proactively interview customers for feedback.\r\nA <span style=\"font-weight: bold;\">customer support</span> is a range of customer services to assist customers in making cost effective and correct use of a product. It includes assistance in planning, installation, training, trouble shooting, maintenance, upgrading, and disposal of a product. These services even may be done at customer's side where he/she uses the product or service. In this case it is called "at home customer services" or "at home customer support."\r\nRegarding technology, products such as mobile phones, televisions, computers, software products or other electronic or mechanical goods, it is termed technical support. \r\nCustomer service may be provided by a person (e.g., sales and service representative), or by automated means, such as kiosks, Internet sites, and apps.\r\n<span style=\"font-weight: bold;\">CRM </span>(Customer Relationship Management) is an approach to manage a company's interaction with current and potential customers. It uses data analysis about customers' history with a company to improve business relationships with customers, specifically focusing on customer retention and ultimately driving sales growth.\r\nOne important aspect of the CRM approach is the systems of CRM that compile data from a range of different communication channels, including a company's website, telephone, email, live chat, marketing materials and more recently, social media. Through the CRM approach and the systems used to facilitate it, businesses learn more about their target audiences and how to best cater to their needs.\r\nCRM helps users focus on their organization’s relationships with individual people including customers, service users, colleagues, or suppliers.\r\nWhen people talk about customer relationship management system, they might mean any of three things: \r\n<ul><li><span style=\"font-weight: bold;\">CRM as Technology</span>: This is a technology product, often in the cloud, that teams use to record, report and analyse interactions between the company and users. This is also called a CRM system or solution.</li><li><span style=\"font-weight: bold;\">CRM as a Strategy</span>: This is a business’ philosophy about how relationships with customers and potential customers should be managed. </li><li><span style=\"font-weight: bold;\">CRM as a Process</span>: Think of this as a system a business adopts to nurture and manage those relationships.</li></ul>\r\n<br /><br /><br />","materialsDescription":"<h1 class=\"align-center\"><span style=\"font-weight: normal;\">Why is CRM important?</span></h1>\r\nCRM management system enables a business to deepen its relationships with customers, service users, colleagues, partners and suppliers.\r\nForging good relationships and keeping track of prospects and customers is crucial for customer acquisition and retention, which is at the heart of a CRM’s function. You can see everything in one place — a simple, customizable dashboard that can tell you a customer’s previous history with you, the status of their orders, any outstanding customer service issues, and more.\r\nGartner predicts that by 2021, CRM technology will be the single largest revenue area of spending in enterprise software. If your business is going to last, you know that you need a strategy for the future. For forward-thinking businesses, CRM is the framework for that strategy.\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What are the benefits of CRM?</span></h1>\r\nBy collecting and organising data about customer interactions, making it accessible and actionable for all, and facilitating analysis of that data, CRM offers many benefits and advantages.<br />The benefits and advantages of CRM include:\r\n<ul><li>Enhanced contact management</li><li>Cross-team collaboration</li><li>Heightened productivity</li><li>Empowered sales management</li><li>Accurate sales forecasting</li><li>Reliable reporting</li><li>Improved sales metrics</li><li>Increased customer satisfaction and retention</li><li>Boosted marketing ROI</li><li>Enriched products and services</li></ul>\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What are the key features of most popular CRM software programs?</span></h1>\r\nWhile many CRM solutions differ in their specific value propositions — depending on your business size, priority function, or industry type — they usually share some core features. These, in fact, are the foundation of any top CRM software, without which you might end up using an inferior app or an over-rated address book. So, let’s discuss the key features you need to look for when figuring out the best CRM software for your business.\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Contact management</span>. The best CRM solutions aren’t just an address book that only organizes contact details. It manages customer data in a centralized place and gives you a 360-degree view of your customers. You should be able to organize customers’ personal information, demographics, interactions, and transactions in ways that are meaningful to your goals or processes. Moreover, a good contact management feature lets you personalize your outreach campaign. By collecting personal, social, and purchase data, it will help you to segment target audience groups in different ways.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Reporting and dashboards</span>. These features of customer relationship management allow you to use analytics to interpret customer data. Reporting is very useful if you want to consolidate disparate data and churn out insights in different visualizations. This lets you make better decisions or proactively deal with market trends and customer behavioral patterns. The more visual widgets a CRM software has, the better you can present reports. Furthermore, a best customer relationship management software will generate real-time data, making reporting more accurate and timely. Reporting also keeps you tab on sales opportunities like upsell, resell, and cross-sell, especially when integrated with e-commerce platforms.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Lead management</span>. These features let you manage leads all the way to win-loss stage. They pave a clear path to conversion, so you can quickly assess how the business is performing. One of the main three legs that comprises the best client relationship management software (the other two being contact management and reporting), lead management unburdens the sales team from follow-ups, tracking, and repetitive tasks.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Deals and tasks</span>. Deals and tasks are closely associated with leads. Deals are leads at the negotiation stage, so it’s critical to keep a close eye on their associated tasks for a higher chance of conversion.<br />CRM software tools should also let you track both deals and tasks in their respective windows or across the sales stages. Whether you’re viewing a contact or analyzing the sales pipeline, you should be able to immediately check the deal’s tasks and details. Deals and tasks should also have user permissions to protect leaks of sensitive data. Similarly, alerts are critical to tasks so deadlines are met. Notifications are usually sent via email or prominently displayed on the user’s dashboard.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Campaign management</span>. Solid CRM software will integrate this feature to enable marketing processes from outreach concept to A/B testing to deployment and to post analysis. This will allow you to sort campaigns to target segments in your contacts and define deployment strategies. You will also be able to define metrics for various channels, then plow back the insights generated by post-campaign analytics into planning more campaigns.<br />Recurring outreach efforts can also be automated. For instance, you can set to instantly appropriate content to contacts based on their interest or send tiered autoresponders based on campaign feedback.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Email management</span>. By integrating with popular email clients like Gmail and Outlook, CRM solutions can capture email messages and sort important details that can be saved in contacts or synced with leads. They can also track activities like opened emails, forwarded emails, clicked links, and downloaded files. Emails can also be qualified for prospecting.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Social media management. </span>Popular CRM systems feature an integrated social media management where you can view different social media pages from the CRM’s interface. This is a convenient way to post, reply on, and manage all your pages. Likewise, this feature gives you a better perspective on how customers are interacting with your brand. A glean of their likes and dislikes, interests, shares, and public conversations helps you to assess customer biases and preferences. Customers are also increasingly using social media to contact companies; hence, a good CRM should alert you for brand mentions.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Mobile access</span>. With more users accessing apps via mobile devices, many vendors have been prioritizing mobile-first platforms. Emergence Capital Partners study found over 300 mobile-first apps so far and CRM is definitely one their targets. Many CRM solutions have both Android and iOS apps. Mobile access works in two ways to be highly appreciated: accessing data and inputting data while on location. Field sales with the latest sales information on hand may be able to interest prospects better. Conversely, sales reps can quickly update deals across the pipeline even as they come off a client meeting.</li></ul>\r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/CRM_-_Customer_Relationship_Management.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":615,"logo":false,"scheme":false,"title":"Avaya Aura® Call Center Elite Multichannel","vendorVerified":0,"rating":"2.00","implementationsCount":1,"suppliersCount":0,"alias":"avaya-aurar-call-center-elite-multichannel","companyTypes":[],"description":"\r\nAvaya Aura® Call Center Elite Multichannel is a Microsoft Windows-based software suite.\r\n\r\nCompanies can use this software suite to turn one-dimensional call centers into powerful multimedia contact centers. Call Center Elite Multichannel uses the phantom call capability of Communication Manager by which customers can make contact through phone, email, text message, or instant message.\r\n\r\nWhether your customers communicate on mobile, emails, or chat, their communication is routed by identifying the agent using a phone call. The emails, SMS, or chat messages are then directly forwarded to the agent identified using this call. The agent can also reply using the same method of communication.\r\n\r\nEasy to implement and simple to use, Call Center Elite Multichannel also delivers:\r\n\r\n• Out-of-the-box desktop applications for supervisors\r\n\r\n• Framework applications including intelligent routing, interaction data, and centralized configuration\r\n\r\n• Automated or agent-initiated outbound preview dialing\r\n\r\n• Powerful application development tools for complete customization and integration\r\n\r\n• Simple and fast wizards for desktop screen pop-ups and routing rules\r\n\r\n\r\nThe Call Center Elite Multichannel multimedia technology uses the phantom call capabilities of Communication Manager to deliver non-voice work items to contact center agents. Phantom calls are generated using the Computer-Telephony Integration (CTI) application. This application has no physical station as an originating point.\r\n\r\nThe multimedia suite blends emails, SMS, and web-based customer inquiries with inbound calls.","shortDescription":"Avaya Aura® Call Center Elite Multichannel offers options for contact handling allowing customers to be treated in an efficient manner and allow for greater business effectiveness.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Avaya Aura® Call Center Elite Multichannel","keywords":"call, Elite, Center, Multichannel, Call, using, contact, multimedia","description":"\r\nAvaya Aura® Call Center Elite Multichannel is a Microsoft Windows-based software suite.\r\n\r\nCompanies can use this software suite to turn one-dimensional call centers into powerful multimedia contact centers. Call Center Elite Multichannel uses the phantom ca","og:title":"Avaya Aura® Call Center Elite Multichannel","og:description":"\r\nAvaya Aura® Call Center Elite Multichannel is a Microsoft Windows-based software suite.\r\n\r\nCompanies can use this software suite to turn one-dimensional call centers into powerful multimedia contact centers. Call Center Elite Multichannel uses the phantom ca"},"eventUrl":"","translationId":615,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":71,"title":"CRM - Customer Relationship Management","alias":"crm-customer-relationship-management","description":"<span style=\"font-weight: bold;\">Customer service</span> is the provision of service to customers before, during and after a purchase. The perception of success of such interactions is dependent on employees "who can adjust themselves to the personality of the guest". Customer service concerns the priority an organization assigns to customer service relative to components such as product innovation and pricing. In this sense, an organization that values good customer service may spend more money in training employees than the average organization or may proactively interview customers for feedback.\r\nA <span style=\"font-weight: bold;\">customer support</span> is a range of customer services to assist customers in making cost effective and correct use of a product. It includes assistance in planning, installation, training, trouble shooting, maintenance, upgrading, and disposal of a product. These services even may be done at customer's side where he/she uses the product or service. In this case it is called "at home customer services" or "at home customer support."\r\nRegarding technology, products such as mobile phones, televisions, computers, software products or other electronic or mechanical goods, it is termed technical support. \r\nCustomer service may be provided by a person (e.g., sales and service representative), or by automated means, such as kiosks, Internet sites, and apps.\r\n<span style=\"font-weight: bold;\">CRM </span>(Customer Relationship Management) is an approach to manage a company's interaction with current and potential customers. It uses data analysis about customers' history with a company to improve business relationships with customers, specifically focusing on customer retention and ultimately driving sales growth.\r\nOne important aspect of the CRM approach is the systems of CRM that compile data from a range of different communication channels, including a company's website, telephone, email, live chat, marketing materials and more recently, social media. Through the CRM approach and the systems used to facilitate it, businesses learn more about their target audiences and how to best cater to their needs.\r\nCRM helps users focus on their organization’s relationships with individual people including customers, service users, colleagues, or suppliers.\r\nWhen people talk about customer relationship management system, they might mean any of three things: \r\n<ul><li><span style=\"font-weight: bold;\">CRM as Technology</span>: This is a technology product, often in the cloud, that teams use to record, report and analyse interactions between the company and users. This is also called a CRM system or solution.</li><li><span style=\"font-weight: bold;\">CRM as a Strategy</span>: This is a business’ philosophy about how relationships with customers and potential customers should be managed. </li><li><span style=\"font-weight: bold;\">CRM as a Process</span>: Think of this as a system a business adopts to nurture and manage those relationships.</li></ul>\r\n<br /><br /><br />","materialsDescription":"<h1 class=\"align-center\"><span style=\"font-weight: normal;\">Why is CRM important?</span></h1>\r\nCRM management system enables a business to deepen its relationships with customers, service users, colleagues, partners and suppliers.\r\nForging good relationships and keeping track of prospects and customers is crucial for customer acquisition and retention, which is at the heart of a CRM’s function. You can see everything in one place — a simple, customizable dashboard that can tell you a customer’s previous history with you, the status of their orders, any outstanding customer service issues, and more.\r\nGartner predicts that by 2021, CRM technology will be the single largest revenue area of spending in enterprise software. If your business is going to last, you know that you need a strategy for the future. For forward-thinking businesses, CRM is the framework for that strategy.\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What are the benefits of CRM?</span></h1>\r\nBy collecting and organising data about customer interactions, making it accessible and actionable for all, and facilitating analysis of that data, CRM offers many benefits and advantages.<br />The benefits and advantages of CRM include:\r\n<ul><li>Enhanced contact management</li><li>Cross-team collaboration</li><li>Heightened productivity</li><li>Empowered sales management</li><li>Accurate sales forecasting</li><li>Reliable reporting</li><li>Improved sales metrics</li><li>Increased customer satisfaction and retention</li><li>Boosted marketing ROI</li><li>Enriched products and services</li></ul>\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What are the key features of most popular CRM software programs?</span></h1>\r\nWhile many CRM solutions differ in their specific value propositions — depending on your business size, priority function, or industry type — they usually share some core features. These, in fact, are the foundation of any top CRM software, without which you might end up using an inferior app or an over-rated address book. So, let’s discuss the key features you need to look for when figuring out the best CRM software for your business.\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Contact management</span>. The best CRM solutions aren’t just an address book that only organizes contact details. It manages customer data in a centralized place and gives you a 360-degree view of your customers. You should be able to organize customers’ personal information, demographics, interactions, and transactions in ways that are meaningful to your goals or processes. Moreover, a good contact management feature lets you personalize your outreach campaign. By collecting personal, social, and purchase data, it will help you to segment target audience groups in different ways.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Reporting and dashboards</span>. These features of customer relationship management allow you to use analytics to interpret customer data. Reporting is very useful if you want to consolidate disparate data and churn out insights in different visualizations. This lets you make better decisions or proactively deal with market trends and customer behavioral patterns. The more visual widgets a CRM software has, the better you can present reports. Furthermore, a best customer relationship management software will generate real-time data, making reporting more accurate and timely. Reporting also keeps you tab on sales opportunities like upsell, resell, and cross-sell, especially when integrated with e-commerce platforms.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Lead management</span>. These features let you manage leads all the way to win-loss stage. They pave a clear path to conversion, so you can quickly assess how the business is performing. One of the main three legs that comprises the best client relationship management software (the other two being contact management and reporting), lead management unburdens the sales team from follow-ups, tracking, and repetitive tasks.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Deals and tasks</span>. Deals and tasks are closely associated with leads. Deals are leads at the negotiation stage, so it’s critical to keep a close eye on their associated tasks for a higher chance of conversion.<br />CRM software tools should also let you track both deals and tasks in their respective windows or across the sales stages. Whether you’re viewing a contact or analyzing the sales pipeline, you should be able to immediately check the deal’s tasks and details. Deals and tasks should also have user permissions to protect leaks of sensitive data. Similarly, alerts are critical to tasks so deadlines are met. Notifications are usually sent via email or prominently displayed on the user’s dashboard.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Campaign management</span>. Solid CRM software will integrate this feature to enable marketing processes from outreach concept to A/B testing to deployment and to post analysis. This will allow you to sort campaigns to target segments in your contacts and define deployment strategies. You will also be able to define metrics for various channels, then plow back the insights generated by post-campaign analytics into planning more campaigns.<br />Recurring outreach efforts can also be automated. For instance, you can set to instantly appropriate content to contacts based on their interest or send tiered autoresponders based on campaign feedback.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Email management</span>. By integrating with popular email clients like Gmail and Outlook, CRM solutions can capture email messages and sort important details that can be saved in contacts or synced with leads. They can also track activities like opened emails, forwarded emails, clicked links, and downloaded files. Emails can also be qualified for prospecting.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Social media management. </span>Popular CRM systems feature an integrated social media management where you can view different social media pages from the CRM’s interface. This is a convenient way to post, reply on, and manage all your pages. Likewise, this feature gives you a better perspective on how customers are interacting with your brand. A glean of their likes and dislikes, interests, shares, and public conversations helps you to assess customer biases and preferences. Customers are also increasingly using social media to contact companies; hence, a good CRM should alert you for brand mentions.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Mobile access</span>. With more users accessing apps via mobile devices, many vendors have been prioritizing mobile-first platforms. Emergence Capital Partners study found over 300 mobile-first apps so far and CRM is definitely one their targets. Many CRM solutions have both Android and iOS apps. Mobile access works in two ways to be highly appreciated: accessing data and inputting data while on location. Field sales with the latest sales information on hand may be able to interest prospects better. Conversely, sales reps can quickly update deals across the pipeline even as they come off a client meeting.</li></ul>\r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/CRM_-_Customer_Relationship_Management.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":5,"title":"Enhance Staff Productivity"},{"id":7,"title":"Improve Customer Service"},{"id":252,"title":"Increase Customer Base"},{"id":253,"title":"Expand Sales Geography"},{"id":262,"title":"Support Customers"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":340,"title":"Low quality of customer service"},{"id":356,"title":"High costs of routine operations"},{"id":388,"title":"Failure to attract new customers"},{"id":389,"title":"Customer attrition"},{"id":390,"title":"Low quality of customer support"},{"id":400,"title":"High costs"}]}},"categories":[{"id":71,"title":"CRM - Customer Relationship Management","alias":"crm-customer-relationship-management","description":"<span style=\"font-weight: bold;\">Customer service</span> is the provision of service to customers before, during and after a purchase. The perception of success of such interactions is dependent on employees "who can adjust themselves to the personality of the guest". Customer service concerns the priority an organization assigns to customer service relative to components such as product innovation and pricing. In this sense, an organization that values good customer service may spend more money in training employees than the average organization or may proactively interview customers for feedback.\r\nA <span style=\"font-weight: bold;\">customer support</span> is a range of customer services to assist customers in making cost effective and correct use of a product. It includes assistance in planning, installation, training, trouble shooting, maintenance, upgrading, and disposal of a product. These services even may be done at customer's side where he/she uses the product or service. In this case it is called "at home customer services" or "at home customer support."\r\nRegarding technology, products such as mobile phones, televisions, computers, software products or other electronic or mechanical goods, it is termed technical support. \r\nCustomer service may be provided by a person (e.g., sales and service representative), or by automated means, such as kiosks, Internet sites, and apps.\r\n<span style=\"font-weight: bold;\">CRM </span>(Customer Relationship Management) is an approach to manage a company's interaction with current and potential customers. It uses data analysis about customers' history with a company to improve business relationships with customers, specifically focusing on customer retention and ultimately driving sales growth.\r\nOne important aspect of the CRM approach is the systems of CRM that compile data from a range of different communication channels, including a company's website, telephone, email, live chat, marketing materials and more recently, social media. Through the CRM approach and the systems used to facilitate it, businesses learn more about their target audiences and how to best cater to their needs.\r\nCRM helps users focus on their organization’s relationships with individual people including customers, service users, colleagues, or suppliers.\r\nWhen people talk about customer relationship management system, they might mean any of three things: \r\n<ul><li><span style=\"font-weight: bold;\">CRM as Technology</span>: This is a technology product, often in the cloud, that teams use to record, report and analyse interactions between the company and users. This is also called a CRM system or solution.</li><li><span style=\"font-weight: bold;\">CRM as a Strategy</span>: This is a business’ philosophy about how relationships with customers and potential customers should be managed. </li><li><span style=\"font-weight: bold;\">CRM as a Process</span>: Think of this as a system a business adopts to nurture and manage those relationships.</li></ul>\r\n<br /><br /><br />","materialsDescription":"<h1 class=\"align-center\"><span style=\"font-weight: normal;\">Why is CRM important?</span></h1>\r\nCRM management system enables a business to deepen its relationships with customers, service users, colleagues, partners and suppliers.\r\nForging good relationships and keeping track of prospects and customers is crucial for customer acquisition and retention, which is at the heart of a CRM’s function. You can see everything in one place — a simple, customizable dashboard that can tell you a customer’s previous history with you, the status of their orders, any outstanding customer service issues, and more.\r\nGartner predicts that by 2021, CRM technology will be the single largest revenue area of spending in enterprise software. If your business is going to last, you know that you need a strategy for the future. For forward-thinking businesses, CRM is the framework for that strategy.\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What are the benefits of CRM?</span></h1>\r\nBy collecting and organising data about customer interactions, making it accessible and actionable for all, and facilitating analysis of that data, CRM offers many benefits and advantages.<br />The benefits and advantages of CRM include:\r\n<ul><li>Enhanced contact management</li><li>Cross-team collaboration</li><li>Heightened productivity</li><li>Empowered sales management</li><li>Accurate sales forecasting</li><li>Reliable reporting</li><li>Improved sales metrics</li><li>Increased customer satisfaction and retention</li><li>Boosted marketing ROI</li><li>Enriched products and services</li></ul>\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">What are the key features of most popular CRM software programs?</span></h1>\r\nWhile many CRM solutions differ in their specific value propositions — depending on your business size, priority function, or industry type — they usually share some core features. These, in fact, are the foundation of any top CRM software, without which you might end up using an inferior app or an over-rated address book. So, let’s discuss the key features you need to look for when figuring out the best CRM software for your business.\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Contact management</span>. The best CRM solutions aren’t just an address book that only organizes contact details. It manages customer data in a centralized place and gives you a 360-degree view of your customers. You should be able to organize customers’ personal information, demographics, interactions, and transactions in ways that are meaningful to your goals or processes. Moreover, a good contact management feature lets you personalize your outreach campaign. By collecting personal, social, and purchase data, it will help you to segment target audience groups in different ways.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Reporting and dashboards</span>. These features of customer relationship management allow you to use analytics to interpret customer data. Reporting is very useful if you want to consolidate disparate data and churn out insights in different visualizations. This lets you make better decisions or proactively deal with market trends and customer behavioral patterns. The more visual widgets a CRM software has, the better you can present reports. Furthermore, a best customer relationship management software will generate real-time data, making reporting more accurate and timely. Reporting also keeps you tab on sales opportunities like upsell, resell, and cross-sell, especially when integrated with e-commerce platforms.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Lead management</span>. These features let you manage leads all the way to win-loss stage. They pave a clear path to conversion, so you can quickly assess how the business is performing. One of the main three legs that comprises the best client relationship management software (the other two being contact management and reporting), lead management unburdens the sales team from follow-ups, tracking, and repetitive tasks.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Deals and tasks</span>. Deals and tasks are closely associated with leads. Deals are leads at the negotiation stage, so it’s critical to keep a close eye on their associated tasks for a higher chance of conversion.<br />CRM software tools should also let you track both deals and tasks in their respective windows or across the sales stages. Whether you’re viewing a contact or analyzing the sales pipeline, you should be able to immediately check the deal’s tasks and details. Deals and tasks should also have user permissions to protect leaks of sensitive data. Similarly, alerts are critical to tasks so deadlines are met. Notifications are usually sent via email or prominently displayed on the user’s dashboard.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Campaign management</span>. Solid CRM software will integrate this feature to enable marketing processes from outreach concept to A/B testing to deployment and to post analysis. This will allow you to sort campaigns to target segments in your contacts and define deployment strategies. You will also be able to define metrics for various channels, then plow back the insights generated by post-campaign analytics into planning more campaigns.<br />Recurring outreach efforts can also be automated. For instance, you can set to instantly appropriate content to contacts based on their interest or send tiered autoresponders based on campaign feedback.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Email management</span>. By integrating with popular email clients like Gmail and Outlook, CRM solutions can capture email messages and sort important details that can be saved in contacts or synced with leads. They can also track activities like opened emails, forwarded emails, clicked links, and downloaded files. Emails can also be qualified for prospecting.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Social media management. </span>Popular CRM systems feature an integrated social media management where you can view different social media pages from the CRM’s interface. This is a convenient way to post, reply on, and manage all your pages. Likewise, this feature gives you a better perspective on how customers are interacting with your brand. A glean of their likes and dislikes, interests, shares, and public conversations helps you to assess customer biases and preferences. Customers are also increasingly using social media to contact companies; hence, a good CRM should alert you for brand mentions.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Mobile access</span>. With more users accessing apps via mobile devices, many vendors have been prioritizing mobile-first platforms. Emergence Capital Partners study found over 300 mobile-first apps so far and CRM is definitely one their targets. Many CRM solutions have both Android and iOS apps. Mobile access works in two ways to be highly appreciated: accessing data and inputting data while on location. Field sales with the latest sales information on hand may be able to interest prospects better. Conversely, sales reps can quickly update deals across the pipeline even as they come off a client meeting.</li></ul>\r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/CRM_-_Customer_Relationship_Management.png"},{"id":82,"title":"Unified Communications","alias":"unified-communications","description":"Unified communications (UC) is a framework for integrating various asynchronous and real-time communication tools. The goal of UC is to enhance business communication, collaboration and productivity. Unified communications do not represent a singular technology; rather, it describes a strategy for integrating interconnected systems of enterprise communication devices and applications that can be used in concert or successively.\r\nSome business communication tools - like Internet Protocol (IP) telephony and video conferencing - facilitate real-time communication, also called synchronous communication. Other enterprise communication tools, like email, facilitate asynchronous communication, which takes place at a person's convenience.\r\nIncreasingly, team collaboration tools have emerged to offer messaging-centric workflows and near-real-time communication. These tools also offer voice and video capabilities, API integrations and, ultimately, expound on instant messaging services by providing better UC features.\r\nThe goal of unified communications is to integrate the software that supports synchronous and asynchronous communication, so the end user has easy access to all tools from whatever device is in use.\r\nA unified communications environment is typically supported by one or more back-end systems, often referred to as UC platforms, that facilitate integration among services, as well as the front-end clients that provide access. For example, a web conferencing system would make use of an audio conferencing system - which, in turn, would be built on an underlying IP telephony platform - and a unified messaging client would allow click-to-talk (CTC), click-to-chat or click-to-video functionality.\r\nUC also supports users moving from one mode of communication to another within the same session. For example, a user may start communicating via email but then decide to escalate the interaction to real-time communication, transitioning the session to a voice call with one click and then to a video conference with another click without any disruption.\r\nUnified communications systems and their components can be deployed on premises, in a public or private cloud, or a combination of all three. Cloud-based unified communications is also called UC as a service (UCaaS). An open source project called WebRTC, for example, enables real-time communications to be embedded into web browsers.\r\nHistorically, single-vendor UC environments have demonstrated the tightest integration and compatibility. Interoperability among vendors remains an ongoing challenge in UC, but it has also been mitigated, in part, by partnerships, common protocols and open APIs.","materialsDescription":" <span style=\"font-weight: bold;\">What technology do unified communications have?</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Contrasting unified messaging</span></span>\r\nUnified communications are sometimes confused with unified messaging, but it is distinct. Unified communications refer to both real-time and non-real-time delivery of communications based on the preferred method and location of the recipient; unified messaging culls messages from several sources (such as e-mail, voice mail and faxes), but holds those messages only for retrieval at a later time. Unified communications allow for an individual to check and retrieve an e-mail or voice mail from any communication device at any time. It expands beyond voice mail services to data communications and video services.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Components</span></span>\r\nWith unified communications, multiple modes of business communications are integrated. Unified communications is not a single product but a collection of elements that include:\r\n<ul><li>Call control and multimodal communications</li><li>Presence</li><li>Instant messaging</li><li>Unified messaging</li><li>Speech access and personal assistant</li><li>Conferencing (audio, Web and video)</li><li>Collaboration tools</li><li>Mobility</li><li>Business process integration (BPI)</li><li>Software to enable business process integration</li></ul>\r\nPresence — knowing where intended recipients are, and if they are available, in real-time — is a key component of unified communications. Unified communications integrate all systems a user might already use, and helps those systems work together in real-time. For example, unified communications technology could allow a user to seamlessly collaborate with another person on a project, even if the two users are in separate locations. The user could quickly locate the necessary person by accessing an interactive directory, engage in a text messaging session, and then escalate the session to a voice call or even a video call.\r\nIn another example, an employee receives a call from a customer who wants answers. Unified communications enable that employee to call an expert colleague from a real-time list. This way, the employee can answer the customer faster by eliminating rounds of back-and-forth e-mails and phone-tag.\r\nThe examples in the previous paragraph primarily describe "personal productivity" enhancements that tend to benefit the individual user. While such benefits can be important, enterprises are finding that they can achieve even greater impact by using unified communications capabilities to transform business processes. This is achieved by integrating UC functionality directly into the business applications using development tools provided by many of the suppliers. Instead of the individual user invoking the UC functionality to, say, find an appropriate resource, the workflow or process application automatically identifies the resource at the point in the business activity where one is needed.\r\nWhen used in this manner, the concept of presence often changes. Most people associate presence with instant messaging (IM "buddy lists") the status of individuals is identified. But, in many business process applications, what is important is finding someone with a certain skill. In these environments, presence identifies available skills or capabilities.\r\nThis "business process" approach to integrating UC functionality can result in bottom-line benefits that are an order of magnitude greater than those achievable by personal productivity methods alone.\r\n<span style=\"font-weight: bold;\">Related concepts</span>\r\nUnified communications & collaboration (UCC) is the integration of various communications methods with collaboration tools such as virtual white boards, real-time audio and video conferencing, and enhanced call control capabilities. Before this fusion of communications and collaboration tools into a single platform, enterprise collaboration service vendors and enterprise communications service vendors offered distinctly different solutions. Now, collaboration service vendors also offer communications services, and communications service providers have developed collaboration tools.\r\nUnified communications & collaboration as a service (UCCaaS) is cloud-based UCC platforms. Compared to premises-based UCC solutions, UCCaaS platforms offer enhanced flexibility and scalability due to the SaaS subscription model.\r\nUnified communications provisioning is the act of entering and configuring the settings for users of phone systems, instant messaging, telepresence, and other collaboration channels. Provisioners refer to this process as making moves, adds, changes, and deletes or MAC-Ds.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Unified_Communications.png"},{"id":186,"title":"VoIP - Voice over Internet Protocol","alias":"voip-voice-over-internet-protocol","description":"<span style=\"font-weight: bold;\">Voice over Internet Protocol </span>(Voice over IP, VoIP) is a methodology and group of technologies for the delivery of voice communications and multimedia sessions over Internet Protocol (IP) networks, such as the Internet. Other terms commonly associated with VoIP solutions are IP telephony, Internet telephony, broadband telephony, and broadband phone service.\r\nThe term Internet telephony specifically refers to the provisioning of communications services (voice, fax, SMS, voice-messaging) over the public Internet, rather than via the public switched telephone network (PSTN). The steps and principles involved in originating VoIP telephone calls are similar to traditional digital telephony and involve signaling, channel setup, digitization of the analog voice signals, and encoding.\r\nInstead of being transmitted over a circuit-switched network, however, the digital information is packetized, and transmission occurs as IP packets over a packet-switched network. Such transmission entails careful considerations about resource management different from time-division multiplexing (TDM) networks.\r\n\r\n\r\n\r\n","materialsDescription":"<h1 class=\"align-center\"> What are the benefits of VoIP?</h1>\r\n VoIP technology can facilitate tasks and deliver services that might be cumbersome or costly to implement when using traditional PSTN: \r\n<ul><li>More than one phone call can be transmitted on the same broadband phone line. This way, VoIP system can facilitate the addition of telephone lines to businesses without the need for additional physical lines.</li><li>Features that are usually charged extra by telecommunication companies, such as call forwarding, caller ID or automatic redialing, are simple with voice over internet technology.</li><li>Unified Communications are secured with VoIP technology, as it allows integration with other services available on the internet such as video conversation, messaging, etc. </li></ul>\r\n<h1 class=\"align-center\">VoIP programs </h1>\r\nThere are four main types of VoIP technology. Each option has varying levels of complexity which can impact ease of implementation and maintenance.\r\n <span style=\"font-weight: bold;\">Integrated Access</span>\r\nIntegrated access is the VoIP service that most mimics the traditional phone line. With integrated access VoIP, businesses integrate VoIP software and existing, legacy phone systems. This approach lets the business keep its old number and equipment while also gaining access to advanced telecommunications features. \r\n<span style=\"font-weight: bold;\">SIP Trunks</span>\r\n Session Initial Protocol (SIP) transmits voice and video information across a data network, letting VoIP users take advantage of shared lines and increase their communications flexibility. Because all data is sent over a network, businesses can use SIP trunks to replace traditional analog phone networks or use a VoIP gateway to integrate SIP trunking with legacy phone systems. \r\n<span style=\"font-weight: bold;\">Hosted IP PBX</span>\r\n What most people envision when they think of VoIP, this VoIP solution sees a vendor host and operate the private branch exchange, offering unified communications solutions. The business connects to a hosted cloud-based PBX network via its IP network. Phone system hardware is maintained off-site by the hosted IP PBX vendor, and all responsibility for the hardware, software, maintenance, security and upgrades all falls on the hosted PBX provider. \r\n <span style=\"font-weight: bold;\">Managed IP PBX </span>\r\nSimilar to Hosted IP PBX, this version of the unified communication solution is outsourced to a third party that takes care of all management requirements, but instead of phone hardware being off-site, the equipment is housed on-premise by the business. \r\nUnderstanding these different services of VoIP communication can help a business determine the system that best suits its needs. SIP Trunks, for instance, are more attractive to those who want to install their own technology and manage it themselves, while still connecting to VoIP features.\r\n On the other hand, managed IP PBX is a good option for those who don’t have the resources to buy and operate their own VoIP systems. The Hosted IP PBX solution frees the business to select the VoIP management software that works for them and liberates them from the cost and administrative headache of maintaining both voice and data lines and the related carrier partnerships. ","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/VoIP_-_Voice_over_Internet_Protocol.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"http://www.asteros.ru/press/news/5098/","title":"Supplier's web site"}},"comments":[],"referencesCount":0},{"id":809,"title":"AWS for Coinbase","description":"<span style=\"font-weight: bold;\"> The Challenge</span>\r\nSince its founding in 2012, Coinbase has quickly become the leader in bitcoin transactions. As it prepared to respond to ever-increasing customer demand for bitcoin transactions, the company knew it needed to invest in the right underlying technology. <span style=\"font-style: italic;\">“We’re now in the phase of legitimizing this currency and bringing it to the masses,”</span> says Rob Witoff , director at Coinbase . <span style=\"font-style: italic;\">“As part of that, our core tenets are security, scalability, and availability.”</span>\r\nSecurity is the most important of those tenets, according to Witoff . <span style=\"font-style: italic;\">“We control hundreds of millions of dollars of bitcoin for our customers, placing us among the largest reserves in our industry,”</span> says Witoff . <span style=\"font-style: italic;\">“Just as a traditional bank would heavily guard its customers’ assets inside a physical bank vault, we take the same or greater precautions with our servers.”</span>\r\nScalability is also critical because Coinbase needs to be able to elastically scale its services globally without consuming precious engineering resources. <span style=\"font-style: italic;\">“As a startup, we’re meticulous about where we invest our time,”</span> says Witoff . <span style=\"font-style: italic;\">“We want to focus on how our customers interact with our product and the services we’re offering. We don’t want to reinvent solutions to already-solved foundational infrastructure.”</span> Coinbase also strives to give its developers more time to focus on innovation. <span style=\"font-style: italic;\">“We have creative, envelope-pushing engineers who are driving our startup with innovative new services that balance a delightful experience with uncompromising security,”</span> says Witoff . <span style=\"font-style: italic;\">“That’s why we need to have our exchange on something we know will work.”</span>\r\nAdditionally, Coinbase sought a better data analytics solution. <span style=\"font-style: italic;\">“We generate massive amounts of data from the top to the bottom of our infrastructure that would traditionally be stored in a remote and dated warehouse. But we’ve increasingly focused on adopting new technologies without losing a reliable, trusted core,”</span> says Witoff . <span style=\"font-style: italic;\">“At the same time, we wanted the best possible real-time insight into how our services are running.”</span>\r\nTo support its goals, Coinbase decided to deploy its new bitcoin exchange in the cloud. <span style=\"font-style: italic;\">“When I joined Coinbase in 2014, the company was bootstrapped by quite a few third-party hosting providers,”</span> says Witoff . <span style=\"font-style: italic;\">“But because we’re managing actual value and real assets on our machines, we needed to have complete control over our environment.”</span><br /><br />\r\n<span style=\"font-weight: bold;\">Why Amazon Web Services</span>\r\nCoinbase evaluated different cloud technology vendors in late 2014, but it was most confident in Amazon Web Services (AWS). In his previous role at NASA’s Jet Propulsion Laboratory, Witoff gained experience running secure and sensitive workloads on AWS. Based on this, Witoff says he <span style=\"font-style: italic;\">“came to trust a properly designed AWS cloud.”</span>\r\nThe company began designing the new Coinbase Exchange by using AWS Identity and Access Management (IAM), which securely controls access to AWS services. <span style=\"font-style: italic;\">“Cloud computing provides an API for everything, including accidentally destroying the company,”</span> says Witoff . <span style=\"font-style: italic;\">“We think security and identity and access management done correctly can empower our engineers to focus on products within clear and trusted walls, and that’s why we implemented an auditable self-service security foundation with AWS IAM.”</span> The exchange runs inside the Coinbase production environment on AWS, powered by a custom-built transactional data engine alongside Amazon Relational Database Service (Amazon RDS) instances and PostgreSQL databases. Amazon Elastic Compute Cloud (Amazon EC2) instances also power the exchange.\r\nThe organization provides reliable delivery of its wallet and exchange to global customers by distributing its applications natively across multiple AWS Availability Zones.\r\nCoinbase created a streaming data insight pipeline in AWS, with real-time exchange analytics processed by an Amazon Kinesis managed big-data processing service. <span style=\"font-style: italic;\">“All of our operations analytics are piped into Kinesis in real time and then sent to our analytics engine so engineers can search, query, and find trends from the data,” </span>Witoff says. <span style=\"font-style: italic;\">“We also take that data from Kinesis into a separate disaster recovery environment.”</span> Coinbase also integrates the insight pipeline with AWS CloudTrail log files, which are sent to Amazon Simple Storage Service (Amazon S3) buckets, then to the AWS Lambda compute service, and on to Kinesis containers based on Docker images. This gives Coinbase complete, transparent, and indexed audit logs across its entire IT environment.\r\nEvery day, 1 TB of data—about 1 billion events—flows through that path. <span style=\"font-style: italic;\">“Whenever our security groups or network access controls are modified, we see alerts in real time, so we get full insight into everything happening across the exchange,”</span> says Witoff . For additional big-data insight, Coinbase uses Amazon Elastic MapReduce (Amazon EMR), a web service that uses the Hadoop open-source framework to process data, and Amazon Redshift, a managed petabyte-scale data warehouse. <span style=\"font-style: italic;\">“We use Amazon EMR to crunch our growing databases into structured, actionable Redshift data that tells us how our company is performing and where to steer our ship next,”</span> says Witoff .\r\nAll of the company’s networks are designed, built, and maintained through AWS CloudFormation templates. <span style=\"font-style: italic;\">“This gives us the luxury of version-controlling our network, and it allows for seamless, exact network duplication for on-demand development and staging environments,” </span>says Witoff . Coinbase also uses Amazon Virtual Private Cloud (Amazon VPC) endpoints to optimize throughput to Amazon S3, and Amazon WorkSpaces to provision cloud-based desktops for global workers. <span style=\"font-style: italic;\">“As we scale our services around the world, we also scale our team. We rely on Amazon WorkSpaces for on-demand access by our contractors to appropriate slices of our network,”</span> Witoff says.\r\nCoinbase launched the U.S. Coinbase Exchange on AWS in February 2015, and recently expanded to serve European users.<br /><span style=\"font-weight: bold;\"><br /></span>\r\n<span style=\"font-weight: bold;\">The Benefits</span>\r\nCoinbase is able to securely store its customers’ funds using AWS. “I consider Amazon’s cloud to be our own private cloud, and when we deploy something there, I trust that my staff and administrators are the only people who have access to those assets,” says Witoff . <span style=\"font-style: italic;\">“Also, securely storing bitcoin remains a major focus area for us that has helped us gain the trust of consumers across the world. Rather than spending our resources replicating and securing a new data center with solved challenges, AWS has allowed us to hone in on one of our core competencies: securely storing private keys.”</span>\r\nCoinbase has also relied on AWS to quickly grow its customer base. <span style=\"font-style: italic;\">“In three years, our bitcoin wallet base has grown from zero to more than 3 million. We’ve been able to drive that growth by providing a fast, global wallet service, which would not be possible without AWS,”</span> says Witoff .\r\nAdditionally, the company has better visibility into its business with its insight pipeline. <span style=\"font-style: italic;\">“Using Kinesis for our insight pipeline, we can provide analytical insights to our engineering team without forcing them to jump through complex hoops to traverse our information,”</span> says Witoff . <span style=\"font-style: italic;\">“They can use the pipeline to easily view all the metadata about how the Coinbase Exchange is performing.”</span> And because Kinesis provides a one-to-many analytics delivery method, Coinbase can collect metrics in its primary database as well as through new, experimental data stores. <span style=\"font-style: italic;\">“As a result, we can keep up to speed with the latest, greatest, most exciting tools in the data science and data analytics space without having to take undue risk on unproven technologies,”</span> says Witoff .\r\nAs a startup company that built its bitcoin exchange in the cloud from day one, Coinbase has more agility than it would have had if it created the exchange internally. <span style=\"font-style: italic;\">“By starting with the cloud at our core, we’ve been able to move fast where others dread,”</span> says Witoff . <span style=\"font-style: italic;\">“Evolving our network topology, scaling across the globe, and deploying new services are never more than a few actions away. This empowers us to spend more time thinking about what we want to do instead of what we’re able to do.”</span> That agility is helping Coinbase meet the demands of fast business growth. <span style=\"font-style: italic;\">“Our exchange is in hyper-growth mode, and we’re in the process of scaling it all across the world,”</span> says Witoff . <span style=\"font-style: italic;\">“For each new country we bring on board, we are able to scale geographically and at the touch of a button launch more machines to support more users.”</span>\r\nBy using AWS, Coinbase can concentrate even more on innovation. <span style=\"font-style: italic;\">“We trust AWS to manage the lowest layers of our stack, which helps me sleep at night,”</span> says Witoff . <span style=\"font-style: italic;\">“And as we go higher up into that stack—for example, with our insight pipeline—we are able to reach new heights as a business, so we can focus on innovating for the future of finance.”</span>","alias":"aws-for-coinbase","roi":0,"seo":{"title":"AWS for Coinbase","keywords":"","description":"<span style=\"font-weight: bold;\"> The Challenge</span>\r\nSince its founding in 2012, Coinbase has quickly become the leader in bitcoin transactions. As it prepared to respond to ever-increasing customer demand for bitcoin transactions, the company knew it ","og:title":"AWS for Coinbase","og:description":"<span style=\"font-weight: bold;\"> The Challenge</span>\r\nSince its founding in 2012, Coinbase has quickly become the leader in bitcoin transactions. As it prepared to respond to ever-increasing customer demand for bitcoin transactions, the company knew it "},"deal_info":"","user":{"id":5549,"title":"Coinbase","logoURL":"https://old.roi4cio.com/uploads/roi/company/Coinbase-Logo.png","alias":"coinbase","address":"","roles":[],"description":" Founded in June of 2012, Coinbase is a digital currency wallet and platform where merchants and consumers can transact with new digital currencies like bitcoin, ethereum, and litecoin. It is based in San Francisco, California.\r\nBitcoin is the world's most widely used alternative currency with a total market cap of over $100 billion. The bitcoin network is made up of thousands of computers run by individuals all over the world.\r\nThe company, which supports 3 million global users, facilitates bitcoin transactions in 190 countries and exchanges between bitcoin and flat currencies in 26 countries. In addition to its wallet and exchange services, Coinbase offers an API that developers and merchants can use to build applications and accept bitcoin payments.<br /><br />","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.coinbase.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Coinbase","keywords":"","description":" Founded in June of 2012, Coinbase is a digital currency wallet and platform where merchants and consumers can transact with new digital currencies like bitcoin, ethereum, and litecoin. It is based in San Francisco, California.\r\nBitcoin is the world's most wid","og:title":"Coinbase","og:description":" Founded in June of 2012, Coinbase is a digital currency wallet and platform where merchants and consumers can transact with new digital currencies like bitcoin, ethereum, and litecoin. It is based in San Francisco, California.\r\nBitcoin is the world's most wid","og:image":"https://old.roi4cio.com/uploads/roi/company/Coinbase-Logo.png"},"eventUrl":""},"supplier":{"id":176,"title":"Amazon Web Services","logoURL":"https://old.roi4cio.com/uploads/roi/company/aws_logo.png","alias":"amazon-web-services","address":"","roles":[],"description":" <span lang=\"EN-US\">Amazon Web Services (AWS) is the world's largest cloud service provider. Since 2006, the company has been offering customers various elements of a virtual IT infrastructure in the form of web services. Today AWS offers about 70 cloud services deployed on the basis of more than a hundred of its own data centers located in the United States, Europe, Brazil, Singapore, Japan, and Australia. Services include computing power, secure storage, analytics, mobile applications, databases, IoT solutions, and more. Customers pay only for the services they consume, dynamically expanding or contracting cloud resources as needed.</span> \r\n<span lang=\"EN-US\"> </span>\r\n<span lang=\"EN-US\"><span lang=\"en\">Through</span></span> cloud computing, companies do not need to pre-plan the use of servers and other IT infrastructure and pay for all this for several weeks or months in advance. Instead, they can deploy hundreds or thousands of servers in minutes and achieve results quickly.\r\n<span lang=\"EN-US\"> </span>\r\n<span lang=\"EN-US\">Today, Amazon Web Services provides a highly reliable, scalable, infrastructure platform in the cloud that powers hundreds of thousands of organizations in every industry and government in nearly every country in the world.</span>","companyTypes":[],"products":{},"vendoredProductsCount":36,"suppliedProductsCount":36,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":18,"vendorImplementationsCount":20,"vendorPartnersCount":0,"supplierPartnersCount":4,"b4r":0,"categories":{},"companyUrl":"http://aws.amazon.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Amazon Web Services","keywords":"Amazon, services, known, computing, also, tools, Services, than","description":" <span lang=\"EN-US\">Amazon Web Services (AWS) is the world's largest cloud service provider. Since 2006, the company has been offering customers various elements of a virtual IT infrastructure in the form of web services. Today AWS offers about 70 cloud s","og:title":"Amazon Web Services","og:description":" <span lang=\"EN-US\">Amazon Web Services (AWS) is the world's largest cloud service provider. Since 2006, the company has been offering customers various elements of a virtual IT infrastructure in the form of web services. Today AWS offers about 70 cloud s","og:image":"https://old.roi4cio.com/uploads/roi/company/aws_logo.png"},"eventUrl":""},"vendors":[{"id":176,"title":"Amazon Web Services","logoURL":"https://old.roi4cio.com/uploads/roi/company/aws_logo.png","alias":"amazon-web-services","address":"","roles":[],"description":" <span lang=\"EN-US\">Amazon Web Services (AWS) is the world's largest cloud service provider. Since 2006, the company has been offering customers various elements of a virtual IT infrastructure in the form of web services. Today AWS offers about 70 cloud services deployed on the basis of more than a hundred of its own data centers located in the United States, Europe, Brazil, Singapore, Japan, and Australia. Services include computing power, secure storage, analytics, mobile applications, databases, IoT solutions, and more. Customers pay only for the services they consume, dynamically expanding or contracting cloud resources as needed.</span> \r\n<span lang=\"EN-US\"> </span>\r\n<span lang=\"EN-US\"><span lang=\"en\">Through</span></span> cloud computing, companies do not need to pre-plan the use of servers and other IT infrastructure and pay for all this for several weeks or months in advance. Instead, they can deploy hundreds or thousands of servers in minutes and achieve results quickly.\r\n<span lang=\"EN-US\"> </span>\r\n<span lang=\"EN-US\">Today, Amazon Web Services provides a highly reliable, scalable, infrastructure platform in the cloud that powers hundreds of thousands of organizations in every industry and government in nearly every country in the world.</span>","companyTypes":[],"products":{},"vendoredProductsCount":36,"suppliedProductsCount":36,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":18,"vendorImplementationsCount":20,"vendorPartnersCount":0,"supplierPartnersCount":4,"b4r":0,"categories":{},"companyUrl":"http://aws.amazon.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Amazon Web Services","keywords":"Amazon, services, known, computing, also, tools, Services, than","description":" <span lang=\"EN-US\">Amazon Web Services (AWS) is the world's largest cloud service provider. Since 2006, the company has been offering customers various elements of a virtual IT infrastructure in the form of web services. Today AWS offers about 70 cloud s","og:title":"Amazon Web Services","og:description":" <span lang=\"EN-US\">Amazon Web Services (AWS) is the world's largest cloud service provider. Since 2006, the company has been offering customers various elements of a virtual IT infrastructure in the form of web services. Today AWS offers about 70 cloud s","og:image":"https://old.roi4cio.com/uploads/roi/company/aws_logo.png"},"eventUrl":""}],"products":[{"id":108,"logo":false,"scheme":false,"title":"Amazon EC2","vendorVerified":0,"rating":"2.00","implementationsCount":7,"suppliersCount":0,"alias":"amazon-ec2","companyTypes":[],"description":"Amazon Elastic Compute Cloud (Amazon EC2) is a web service that provides secure, resizable compute capacity in the cloud. It is designed to make web-scale cloud computing easier for developers.\r\nAmazon EC2’s simple web service interface allows you to obtain and configure capacity with minimal friction. It provides you with complete control of your computing resources and lets you run on Amazon’s proven computing environment. Amazon EC2 reduces the time required to obtain and boot new server instances to minutes, allowing you to quickly scale capacity, both up and down, as your computing requirements change. Amazon EC2 changes the economics of computing by allowing you to pay only for capacity that you actually use. Amazon EC2 provides developers the tools to build failure resilient applications and isolate them from common failure scenarios.<br />\r\n\r\n<span style=\"font-weight: bold;\">BENEFITS</span><br />\r\nELASTIC WEB-SCALE COMPUTING<br />\r\nAmazon EC2 enables you to increase or decrease capacity within minutes, not hours or days. You can commission one, hundreds, or even thousands of server instances simultaneously. You can also use Amazon EC2 Auto Scaling to maintain availability of your EC2 fleet and automatically scale your fleet up and down depending on its needs in order to maximize performance and minimize cost. To scale multiple services, you can use AWS Auto Scaling.<br />\r\nCOMPLETELY CONTROLLED<br />\r\nYou have complete control of your instances including root access and the ability to interact with them as you would any machine. You can stop any instance while retaining the data on the boot partition, and then subsequently restart the same instance using web service APIs. Instances can be rebooted remotely using web service APIs, and you also have access to their console output.<br />\r\nFLEXIBLE CLOUD HOSTING SERVICES<br />\r\nYou have the choice of multiple instance types, operating systems, and software packages. Amazon EC2 allows you to select a configuration of memory, CPU, instance storage, and the boot partition size that is optimal for your choice of operating system and application. For example, choice of operating systems includes numerous Linux distributions and Microsoft Windows Server.<br />\r\nINTEGRATED<br />\r\nAmazon EC2 is integrated with most AWS services such as Amazon Simple Storage Service (Amazon S3), Amazon Relational Database Service (Amazon RDS), and Amazon Virtual Private Cloud (Amazon VPC) to provide a complete, secure solution for computing, query processing, and cloud storage across a wide range of applications.<br />\r\nRELIABLE<br />\r\nAmazon EC2 offers a highly reliable environment where replacement instances can be rapidly and predictably commissioned. The service runs within Amazon’s proven network infrastructure and data centers. The Amazon EC2 Service Level Agreement commitment is 99.99% availability for each Amazon EC2 Region.<br />\r\nSECURE<br />\r\nCloud security at AWS is the highest priority. As an AWS customer, you will benefit from a data center and network architecture built to meet the requirements of the most security-sensitive organizations. Amazon EC2 works in conjunction with Amazon VPC to provide security and robust networking functionality for your compute resources.<br />\r\nINEXPENSIVE<br />\r\nAmazon EC2 passes on to you the financial benefits of Amazon’s scale. You pay a very low rate for the compute capacity you actually consume.<br />\r\nEASY TO START<br />\r\nThere are several ways to get started with Amazon EC2. You can use the AWS Management Console, the AWS Command Line Tools (CLI), or AWS SDKs. AWS is free to get started. ","shortDescription":"Amazon EC2 - Virtual Server Hosting\r\nAmazon Elastic Compute Cloud is a web service that provides resizable compute capacity in the cloud.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Amazon EC2","keywords":"Amazon, your, with, instances, computing, capacity, service, have","description":"Amazon Elastic Compute Cloud (Amazon EC2) is a web service that provides secure, resizable compute capacity in the cloud. It is designed to make web-scale cloud computing easier for developers.\r\nAmazon EC2’s simple web service interface allows you to obtain an","og:title":"Amazon EC2","og:description":"Amazon Elastic Compute Cloud (Amazon EC2) is a web service that provides secure, resizable compute capacity in the cloud. It is designed to make web-scale cloud computing easier for developers.\r\nAmazon EC2’s simple web service interface allows you to obtain an"},"eventUrl":"","translationId":108,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":689,"title":"Amazon Web Services","alias":"amazon-web-services","description":"Amazon Web Services (AWS) is a subsidiary of Amazon that provides on-demand cloud computing platforms to individuals, companies and governments, on a metered pay-as-you-go basis. In aggregate, these cloud computing web services provide a set of primitive, abstract technical infrastructure and distributed computing building blocks and tools. One of these services is Amazon Elastic Compute Cloud, which allows users to have at their disposal a virtual cluster of computers, available all the time, through the Internet. AWS's version of virtual computers emulate most of the attributes of a real computer including hardware (CPU(s) & GPU(s) for processing, local/RAM memory, hard-disk/SSD storage); a choice of operating systems; networking; and pre-loaded application software such as web servers, databases, CRM, etc.\r\nThe AWS technology is implemented at server farms throughout the world, and maintained by the Amazon subsidiary. Fees are based on a combination of usage, the hardware/OS/software/networking features chosen by the subscriber, required availability, redundancy, security, and service options. Subscribers can pay for a single virtual AWS computer, a dedicated physical computer, or clusters of either. As part of the subscription agreement, Amazon provides security for subscribers' system. AWS operates from many global geographical regions including 6 in North America.\r\nIn 2017, AWS comprised more than 90 services spanning a wide range including computing, storage, networking, database, analytics, application services, deployment, management, mobile, developer tools, and tools for the Internet of Things. The most popular include Amazon Elastic Compute Cloud (EC2) and Amazon Simple Storage Service (S3). Most services are not exposed directly to end users, but instead offer functionality through APIs for developers to use in their applications. Amazon Web Services' offerings are accessed over HTTP, using the REST architectural style and SOAP protocol.\r\nAmazon markets AWS to subscribers as a way of obtaining large scale computing capacity more quickly and cheaply than building an actual physical server farm. All services are billed based on usage, but each service measures usage in varying ways. As of 2017, AWS owns a dominant 34% of all cloud (IaaS, PaaS) while the next three competitors Microsoft, Google, and IBM have 11%, 8%, 6% respectively according to Synergy Group.","materialsDescription":"<span style=\"font-weight: bold;\">What is "Amazon Web Services" (AWS)?</span>\r\nWith Amazon Web Services (AWS), organizations can flexibly deploy storage space and computing capacity into Amazon's data centers without having to maintain their own hardware. A big advantage is that the infrastructure covers all dimensions for cloud computing. Whether it's video sharing, high-resolution photos, print data, or text documents, AWS can deliver IT resources on-demand, over the Internet, at a cost-per-use basis. The service exists since 2006 as a wholly owned subsidiary of Amazon Inc. The idea arose from the extensive experience with Amazon.com and the own need for platforms for web services in the cloud.\r\n<span style=\"font-weight: bold;\">What is Cloud Computing?</span>\r\nCloud Computing is a service that gives you access to expert-managed technology resources. The platform in the cloud provides the infrastructure (eg computing power, storage space) that does not have to be installed and configured in contrast to the hardware you have purchased yourself. Cloud computing only pays for the resources that are used. For example, a web shop can increase its computing power in the Christmas business and book less in "weak" months.\r\nAccess is via the Internet or VPN. There are no ongoing investment costs after the initial setup, but resources such as Virtual servers, databases or storage services are charged only after they have been used.\r\n<span style=\"font-weight: bold;\">Where is my data on Amazon AWS?</span>\r\nThere are currently eight Amazon Data Centers (AWS Regions) in different regions of the world. For each Amazon AWS resource, only the customer can decide where to use or store it. German customers typically use the data center in Ireland, which is governed by European law.\r\n<span style=\"font-weight: bold;\">How safe is my data on Amazon AWS?</span>\r\nThe customer data is stored in a highly secure infrastructure. Safety measures include, but are not limited to:\r\n<ul><li>Protection against DDos attacks (Distributed Denial of Service)</li><li>Defense against brute-force attacks on AWS accounts</li><li>Secure access: The access options are made via SSL.</li><li> Firewall: Output and access to the AWS data can be controlled.</li><li>Encrypted Data Storage: Data can be encrypted with Advanced Encryption Standard (AES) 256.</li><li>Certifications: Regular security review by independent certifications that AWS has undergone.</li></ul>\r\nEach Amazon data center (AWS region) consists of at least one Availability Zone. Availability Zones are stand-alone sub-sites that have been designed to be isolated from faults in other Availability Zones (independent power and data supply). Certain AWS resources, such as Database Services (RDS) or Storage Services (S3) automatically replicate your data within the AWS region to the different Availability Zones.\r\nAmazon AWS has appropriate certifications such as ISO27001 and has implemented a comprehensive security concept for the operation of its data center.\r\n<span style=\"font-weight: bold;\">Do I have to worry about hardware on Amazon AWS?</span>\r\nNo, all Amazon AWS resources are virtualized. Only Amazon takes care of the replacement and upgrade of hardware.\r\nNormally, you will not get anything out of defective hardware because defective storage media are exchanged by Amazon and since your data is stored multiple times redundantly, there is usually no problem either.\r\nIncidentally, if your chosen resources do not provide enough performance, you can easily get more CPU power from resources by just a few mouse clicks. You do not have to install anything new, just reboot your virtual machine or virtual database instance.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Amazon_Web_Services.png"},{"id":786,"title":"IaaS - computing","alias":"iaas-computing","description":"Cloud computing is the on demand availability of computer system resources, especially data storage and computing power, without direct active management by the user. The term is generally used to describe data centers available to many users over the Internet. Large clouds, predominant today, often have functions distributed over multiple locations from central servers. If the connection to the user is relatively close, it may be designated an edge server.\r\nInfrastructure as a service (IaaS) are online services that provide high-level APIs used to dereference various low-level details of underlying network infrastructure like physical computing resources, location, data partitioning, scaling, security, backup etc. A hypervisor, such as Xen, Oracle VirtualBox, Oracle VM, KVM, VMware ESX/ESXi, or Hyper-V, LXD, runs the virtual machines as guests. Pools of hypervisors within the cloud operational system can support large numbers of virtual machines and the ability to scale services up and down according to customers' varying requirements.\r\nTypically IaaS involve the use of a cloud orchestration technology like Open Stack, Apache Cloudstack or Open Nebula. This manages the creation of a virtual machine and decides on which hypervisor (i.e. physical host) to start it, enables VM migration features between hosts, allocates storage volumes and attaches them to VMs, usage information for billing and lots more.\r\nAn alternative to hypervisors are Linux containers, which run in isolated partitions of a single Linux kernel running directly on the physical hardware. Linux cgroups and namespaces are the underlying Linux kernel technologies used to isolate, secure and manage the containers. Containerisation offers higher performance than virtualization, because there is no hypervisor overhead. Also, container capacity auto-scales dynamically with computing load, which eliminates the problem of over-provisioning and enables usage-based billing.\r\nIaaS clouds often offer additional resources such as a virtual-machine disk-image library, raw block storage, file or object storage, firewalls, load balancers, IP addresses, virtual local area networks (VLANs), and software bundles.\r\nThe NIST's definition of cloud computing defines Infrastructure as a Service as:\r\n<ul><li>The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications.</li><li>The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, and deployed applications; and possibly limited control of select networking components (e.g., host firewalls).</li></ul>\r\nAccording to the Internet Engineering Task Force (IETF), the most basic cloud-service model is that of providers offering IT infrastructure — virtual machines and other resources — as a service to subscribers.\r\nIaaS-cloud providers supply these resources on-demand from their large pools of equipment installed in data centers. For wide-area connectivity, customers can use either the Internet or carrier clouds (dedicated virtual private networks). To deploy their applications, cloud users install operating-system images and their application software on the cloud infrastructure. In this model, the cloud user patches and maintains the operating systems and the application software. Cloud providers typically bill IaaS services on a utility computing basis: cost reflects the amount of resources allocated and consumed.","materialsDescription":" <span style=\"font-weight: bold; \">Cloud Computing Basics</span>\r\nWhether you are running applications that share photos to millions of mobile users or you’re supporting the critical operations of your business, a cloud services platform provides rapid access to flexible and low cost IT resources. With cloud computing, you don’t need to make large upfront investments in hardware and spend a lot of time on the heavy lifting of managing that hardware. Instead, you can provision exactly the right type and size of computing resources you need to power your newest bright idea or operate your IT department. You can access as many resources as you need, almost instantly, and only pay for what you use.\r\n<span style=\"font-weight: bold; \">How Does Cloud Computing Work?</span>\r\nCloud computing provides a simple way to access servers, storage, databases and a broad set of application services over the Internet. A Cloud services platform such as Amazon Web Services owns and maintains the network-connected hardware required for these application services, while you provision and use what you need via a web application.\r\n<span style=\"font-weight: bold; \">Six Advantages and Benefits of Cloud Computing</span>\r\n<span style=\"font-weight: bold; \">Trade capital expense for variable expense</span>\r\nInstead of having to invest heavily in data centers and servers before you know how you’re going to use them, you can only pay when you consume computing resources, and only pay for how much you consume.\r\n<span style=\"font-weight: bold; \">Benefit from massive economies of scale</span>\r\nBy using cloud computing, you can achieve a lower variable cost than you can get on your own. Because usage from hundreds of thousands of customers are aggregated in the cloud, providers can achieve higher economies of scale which translates into lower pay as you go prices.\r\n<span style=\"font-weight: bold; \">Stop guessing capacity</span>\r\nEliminate guessing on your infrastructure capacity needs. When you make a capacity decision prior to deploying an application, you often either end up sitting on expensive idle resources or dealing with limited capacity. With cloud computing, these problems go away. You can access as much or as little as you need, and scale up and down as required with only a few minutes notice.\r\n<span style=\"font-weight: bold; \">Increase speed and agility</span>\r\nIn a cloud computing environment, new IT resources are only ever a click away, which means you reduce the time it takes to make those resources available to your developers from weeks to just minutes. This results in a dramatic increase in agility for the organization, since the cost and time it takes to experiment and develop is significantly lower.\r\n<span style=\"font-weight: bold; \">Stop spending money on running and maintaining data centers</span>\r\nFocus on projects that differentiate your business, not the infrastructure. Cloud computing lets you focus on your own customers, rather than on the heavy lifting of racking, stacking and powering servers.\r\n<span style=\"font-weight: bold; \">Go global in minutes</span>\r\nEasily deploy your application in multiple regions around the world with just a few clicks. This means you can provide a lower latency and better experience for your customers simply and at minimal cost.\r\n<span style=\"font-weight: bold;\">Types of Cloud Computing</span>\r\nCloud computing has three main types that are commonly referred to as Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Selecting the right type of cloud computing for your needs can help you strike the right balance of control and the avoidance of undifferentiated heavy lifting.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IaaS_computing.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1220,"logo":false,"scheme":false,"title":"Amazon WorkSpaces","vendorVerified":0,"rating":"2.00","implementationsCount":3,"suppliersCount":0,"alias":"amazon-workspaces","companyTypes":[],"description":"Amazon WorkSpaces is a managed, secure cloud desktop service. You can use Amazon WorkSpaces to provision either Windows or Linux desktops in just a few minutes and quickly scale to provide thousands of desktops to workers across the globe. You can pay either monthly or hourly, just for the WorkSpaces you launch, which helps you save money when compared to traditional desktops and on-premises VDI solutions. Amazon WorkSpaces helps you eliminate the complexity in managing hardware inventory, OS versions and patches, and Virtual Desktop Infrastructure (VDI), which helps simplify your desktop delivery strategy. With Amazon WorkSpaces, your users get a fast, responsive desktop of their choice that they can access anywhere, anytime, from any supported device.\r\n<span style=\"font-weight: bold;\">Benefits</span><br />\r\nSIMPLIFY DESKTOP DELIVERY<br />\r\nAmazon WorkSpaces helps you eliminate many administrative tasks associated with managing your desktop lifecycle including provisioning, deploying, maintaining, and recycling desktops. There is less hardware inventory to manage and no need for complex virtual desktop infrastructure (VDI) deployments that don’t scale. <br />\r\nREDUCE COSTS<br />\r\nAmazon WorkSpaces eliminates the need to over-buy desktop and laptop resources by providing on-demand access to cloud desktops that include a range of compute, memory, and storage resources to meet your users' performance needs.<br />\r\nCONTROL YOUR DESKTOP RESOURCES<br />\r\nAmazon WorkSpaces offers a range of CPU, memory, and solid-state storage bundle configurations that can be dynamically modified so you have the right resources for your applications. You don’t have to waste time trying to predict how many desktops you need or what configuration those desktops should be, helping you reduce costs and eliminate the need to over-buy hardware.<br />\r\nKEEP YOUR DATA SECURE<br />\r\nAmazon WorkSpaces is deployed within an Amazon Virtual Private Network (VPC), provide each user with access to persistent, encrypted storage volumes in the AWS Cloud, and integrate with AWS Key Management Service (KMS). No user data is stored on the local device. This helps improve the security of user data and reduces your overall risk surface area.<br />\r\nFLEXIBLE DESKTOP OS DEPLOYMENT<br />\r\nAmazon WorkSpaces comes with a Windows 7, Windows 10, or Amazon Linux 2 desktop experience. Or you can bring your own Windows 7 or Windows 10 desktops and run them on Amazon WorkSpaces, and remain license compliant. In addition, you can choose from a number of productivity application bundles with your WorkSpaces.<br />\r\nDELIVER DESKTOPS TO MULTIPLE DEVICES<br />\r\nYour users can access their Amazon WorkSpaces from any supported device, including Windows and Mac computers, Chromebooks, iPads, Fire tablets, Android tablets and through Chrome or Firefox web browsers. Once your WorkSpace is provisioned just download the client to access it from the device of your choice.<br />\r\nCENTRALLY MANAGE AND SCALE YOUR GLOBAL DESKTOP DEPLOYMENT<br />\r\nAmazon WorkSpaces is available in 12 AWS Regions and provides access to high performance cloud desktops wherever your teams get work done. You can manage a global deployment of many thousands of WorkSpaces from the AWS console. And you can rapidly provision and de-provision desktops as the needs of your workforce change.<br />\r\nUSE YOUR EXISTING DIRECTORY<br />\r\nAmazon WorkSpaces securely integrates with your existing corporate directory, including Microsoft Active Directory, as well as multi-factor authentication tools so that your users can easily access company resources. You can manage user access control through the use of IP access control groups, which makes it easy to control and manage user access to their WorkSpaces using your existing tools.\r\n","shortDescription":"Amazon WorkSpaces - Access your desktop anywhere, anytime, from any device","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Amazon WorkSpaces","keywords":"WorkSpaces, Amazon, your, users, desktop, desktops, provides, Desktop","description":"Amazon WorkSpaces is a managed, secure cloud desktop service. You can use Amazon WorkSpaces to provision either Windows or Linux desktops in just a few minutes and quickly scale to provide thousands of desktops to workers across the globe. You can pay either m","og:title":"Amazon WorkSpaces","og:description":"Amazon WorkSpaces is a managed, secure cloud desktop service. You can use Amazon WorkSpaces to provision either Windows or Linux desktops in just a few minutes and quickly scale to provide thousands of desktops to workers across the globe. You can pay either m"},"eventUrl":"","translationId":1220,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":53,"title":"DaaS - Desktop as a Service","alias":"daas-desktop-as-a-service","description":"<span style=\"font-weight: bold; \">DaaS (Desktop as a service)</span> is a cloud computing offering in which a third party hosts the back end of a virtual desktop infrastructure (VDI) deployment.\r\nWith DaaS services, desktop operating systems run inside virtual machines on servers in a cloud provider's data center. All the necessary support infrastructure, including storage and network resources, also lives in the cloud. As with on-premises VDI, a DaaS providers stream virtual desktops over a network to a customer's endpoint devices, where end users may access them through client software or a web browser.\r\nThough it sounds a lot like VDI, there is a vital difference between DaaS and VDI. VDI refers to when virtual desktops are served through on-premise servers maintained by in-house IT teams. It’s the traditional way to deploy and manage virtual desktops. But since it’s on-premise, VDI technology technology must be maintained, managed, and upgraded in-house whenever necessary.\r\nDaaS service on the other hand, is a cloud-based virtual desktop solution that separates virtual desktops from on-premise servers, enabling brands to leverage a third-party hosting provider. It’s like VDI, but in the cloud instead of in the back of the office. \r\nHowever, it’s not necessary to choose one or the other. These two approaches can complement each other. Some users prefer to have a DaaS desktop overlay of their VDI deployment. For example, the Desktop as a Service providers allow the user to modernize legacy applications with zero code refactoring. Not all legacy Windows apps perform well in a DaaS environment, due to latency or hardware requirements. \r\nThe modern workplace requires agility, leading to many companies embracing mobile working and Bring Your Own Device (BYOD) policies against a backdrop of increased concern about security risk, compliance requirements and the ever-present need to reduce overheads. This is why, over a decade after analysts predicted the rise of remote desktop as a service, it is now finally being taken up in volume.\r\nBy adopting Desktop as a Service, companies can address the issues associated with end-user computing while giving their staff more freedom and increasing productivity. The pain associated with managing a multitude of devices, including those not supplied by the company, is eliminated. While remaining compliant, companies can greatly reduce risks. ","materialsDescription":"<h1 class=\"align-center\"><span style=\"font-weight: bold; \">How does desktop as a service work?</span></h1>\r\nDaaS architecture is multi-tenant, and organizations purchase the service through a subscription model -- typically based on the number of virtual desktop instances used per month.\r\nIn the desktop-as-a-service delivery model, the cloud computing provider manages the back-end responsibilities of data storage, backup, security and upgrades. While the provider handles all the back-end infrastructure costs and maintenance, customers usually manage their own virtual desktop images, applications and security, unless those desktop management services are part of the subscription.\r\nTypically, an end user's personal data is copied to and from their virtual desktop during logon and logoff, and access to the desktop is device-, location- and network-independent.\r\n<h1 class=\"align-center\">The benefits of Desktop as a Service</h1>\r\nMany organisations are undergoing digital transformation, and modernising the workplace is often a stream within the wider strategy. In order to manage remote and multi-device workforces using DaaS, you should think about the following seven benefits and how this will change, and hopefully improve, your currently way of working.\r\n<span style=\"font-weight: bold;\">The modern workplace.</span> Digital transformation is redefining what we think about the workplace. At the heart of this evolution is technology and the introduction of digital-first natives into the workplace. Allowing staff to work remotely, through DaaS in cloud and via their own devices is a surefire way to attract and retain the best talent.\r\n<span style=\"font-weight: bold;\">Cost.</span> As with many cloud initiatives, DaaS pricing moves from CAPEX to OPEX, leaving you more cash in the bank to spend on growing your business. Per desktop pricing enables you to know exactly what workforce expansion will cost the IT department, removing unforeseen infrastructure or hardware purchases as this is handled by the provider, who bundle everything in with the price of each desktop.Virtual machines use the compute power of the data centre rather than their local machines, placing less demand on the endpoint. <span style=\"font-weight: bold;\"></span>\r\n<span style=\"font-weight: bold;\">Scalability</span>. Due to the ‘...as a service’ delivery model, DaaS platform enables you to add user workstations fast and easily. This is particularly handy when your organisation utilises contract resource or temporary project teams, as there’s no hardware to procure, meaning you have the flexibility to create a desktop almost instantly and delete it when no longer required. This also puts you in control.\r\n<span style=\"font-weight: bold;\">Control.</span> DaaS helps you manage the risks that naturally come with giving your staff the freedom to work anywhere and on any device. It enables you to control the essentials such as data access and compliance without being overly restrictive. You no longer have to worry about what data is held on a user’s device as the data remains in the data centre at all times. This gives you control over all company assets because access can be revoked with the touch of a button.\r\n<span style=\"font-weight: bold;\">Management.</span> With an increasingly dispersed workforce, rolling out new applications or patching existing software has become more of a logistical problem than a technical one. Trying to coordinate people bringing in physical devices to be patched is a real issue for many companies, something which is eliminated completely with DaaS. You operate on one central image (or a small number of images based on persona), a change is made once, and everyone is on the latest version. It removes the need to standardise builds of end-user compute hardware as DaaS applications will run on almost any device no matter its configuration.\r\n<span style=\"font-weight: bold;\">Security.</span> DaaS moves the security risk from hundreds of end-user devices and put it all into the controlled and managed environment of a data centre. Lost or stolen laptops no longer provide a security risk. No data is on the local machine. As DaaS removes the need to create VPNs to access applications and data held by the company it also removes the problem of users trying to bypass the security in the belief that it will make their life easier. ","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/DaaS_-_Desktop_as_a_Service.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1238,"logo":false,"scheme":false,"title":"Amazon S3","vendorVerified":0,"rating":"3.00","implementationsCount":7,"suppliersCount":0,"alias":"amazon-s3","companyTypes":[],"description":"Amazon Simple Storage Service (Amazon S3) is an object storage service that offers industry-leading scalability, data availability, security, and performance. This means customers of all sizes and industries can use it to store and protect any amount of data for a range of use cases, such as websites, mobile applications, backup and restore, archive, enterprise applications, IoT devices, and big data analytics. Amazon S3 provides easy-to-use management features so you can organize your data and configure finely-tuned access controls to meet your specific business, organizational, and compliance requirements. Amazon S3 is designed for 99.999999999% (11 9's) of durability, and stores data for millions of applications for companies all around the world.\r\n\r\n<span style=\"font-weight: bold; \">Main benefits:</span><span style=\"text-decoration: underline; \"><span style=\"font-weight: bold; \"><br /></span></span>\r\n<span style=\"font-weight: bold; \">Industry-leading performance, scalability, availability, and durability</span>\r\nScale your storage resources up and down to meet fluctuating demands, without upfront investments or resource procurement cycles. Amazon S3 is designed for 99.999999999% of data durability because it automatically creates and stores copies of all S3 objects across multiple systems. This means your data is available when needed and protected against failures, errors, and threats.\r\n<span style=\"font-weight: bold; \">Wide range of cost-effective storage classes</span>\r\nSave costs without sacrificing performance by storing data across the S3 Storage Classes, which support different data access levels at corresponding rates. You can use S3 Storage Class Analysis to discover data that should move to a lower-cost storage class based on access patterns, and configure an S3 Lifecycle policy to execute the transfer. You can also store data with changing or unknown access patterns in S3 Intelligent-Tiering, which tiers objects based on changing access patterns and automatically delivers cost savings.\r\n<span style=\"font-weight: bold; \">Unmatched security, compliance, and audit capabilities</span>\r\nStore your data in Amazon S3 and secure it from unauthorized access with encryption features and access management tools. You can also use Amazon Macie to identify sensitive data stored in your S3 buckets and detect irregular access requests. Amazon S3 maintains compliance programs, such as PCI-DSS, HIPAA/HITECH, FedRAMP, EU Data Protection Directive, and FISMA, to help you meet regulatory requirements. AWS also supports numerous auditing capabilities to monitor access requests to your S3 resources.\r\n<span style=\"font-weight: bold; \">Management tools for granular data control</span>\r\nClassify, manage, and report on your data using features, such as: S3 Storage Class Analysis to analyze access patterns; S3 Lifecycle policies to transfer objects to lower-cost storage classes; S3 Cross-Region Replication to replicate data into other regions; S3 Object Lock to apply retention dates to objects and protect them from deletion; and S3 Inventory to get visbility into your stored objects, their metadata, and encryption status. You can also use S3 Batch Operations to change object properties and perform storage management tasks for billions of objects. Since Amazon S3 works with AWS Lambda, you can log activities, define alerts, and automate workflows without managing additional infrastructure.\r\n<span style=\"font-weight: bold; \">Query-in-place services for analytics</span>\r\nRun big data analytics across your S3 objects (and other data sets in AWS) with our query-in-place services. Use Amazon Athena to query S3 data with standard SQL expressions and Amazon Redshift Spectrum to analyze data that is stored across your AWS data warehouses and S3 resources. You can also use S3 Select to retrieve subsets of object metadata, instead of the entire object, and improve query performance by up to 400%.\r\n<span style=\"font-weight: bold; \">Most supported cloud storage service</span>\r\nStore and protect your data in Amazon S3 by working with a partner from the AWS Partner Network (APN) — the largest community of technology and consulting cloud services providers. The APN recognizes migration partners that transfer data to Amazon S3 and storage partners that offer S3-integrated solutions for primary storage, backup and restore, archive, and disaster recovery. You can also purchase an AWS-integrated solution directly from the AWS Marketplace, which lists of hundreds storage-specific offerings.","shortDescription":"Amazon Simple Storage Service (Amazon S3) is an object storage service that offers industry-leading scalability, data availability, security, and performance.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Amazon S3","keywords":"data, Amazon, with, storage, that, from, most, cloud","description":"Amazon Simple Storage Service (Amazon S3) is an object storage service that offers industry-leading scalability, data availability, security, and performance. This means customers of all sizes and industries can use it to store and protect any amount of data f","og:title":"Amazon S3","og:description":"Amazon Simple Storage Service (Amazon S3) is an object storage service that offers industry-leading scalability, data availability, security, and performance. This means customers of all sizes and industries can use it to store and protect any amount of data f"},"eventUrl":"","translationId":1238,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":789,"title":"IaaS - storage","alias":"iaas-storage","description":"IaaS is an abbreviation that stands for Infrastructure as a Service (“infrastructure as a service”). This model provides for a cloud provider to provide the client with the necessary amount of computing resources - virtual servers, remote workstations, data warehouses, with or without the provision of software - and software deployment within the infrastructure remains the client's prerogative. In essence, IaaS is an alternative to renting physical servers, racks in the data center, operating systems; instead, the necessary resources are purchased with the ability to quickly scale them if necessary. In many cases, this model may be more profitable than the traditional purchase and installation of equipment, here are just a few examples:\r\n<ul><li>if the need for computing resources is not constant and can vary greatly depending on the period, and there is no desire to overpay for unused capacity;</li><li>when a company is just starting its way on the market and does not have working capital in order to buy all the necessary infrastructure - a frequent option among startups;</li><li>there is a rapid growth in business, and the network infrastructure must keep pace with it;</li><li>if you need to reduce the cost of purchasing and maintaining equipment;</li><li>when a new direction is launched, and it is necessary to test it without investing significant funds in resources.</li></ul>\r\nIaaS can be organized on the basis of a public or private cloud, as well as by combining two approaches - the so-called. “Hybrid cloud”, created using the appropriate software.","materialsDescription":" IaaS or Infrastructure as a service translated into Russian as “Infrastructure as a service”.\r\n"Infrastructure" in the case of IaaS, it can be virtual servers and networks, data warehouses, operating systems.\r\n“As a service” means that the cloud infrastructure components listed above are provided to you as a connected service.\r\nIaaS is a cloud infrastructure utilization model in which the computing power is provided to the client for independent management.\r\n<span style=\"font-weight: bold;\">What is the difference from PaaS and SaaS?</span>\r\nFrequently asked questions, what distinguishes IaaS, PaaS, SaaS from each other? What is the difference? Answering all questions, you decide to leave in the area of responsibility of its IT specialists. It requires only time and financial costs for your business.\r\n<span style=\"font-weight: bold;\">Who is responsible for what?</span>\r\nIn the case of using IaaS models, a company can independently use resources: install and run software, exercise control over systems, applications, and virtual storage systems.\r\nFor example, networks, servers, servers and servers. The IaaS service provider manages its own software and operating system, middleware and applications, is responsible for the infrastructure during the purchase, installation and configuration.\r\n<span style=\"font-weight: bold;\">Why do companies choose IaaS?</span>\r\nScaling capabilities. All users have access to resources, and you must use all the resources you need.\r\nCost savings. As a rule, the use of cloud services costs the company less than buying its own infrastructure.\r\nMobility. Ability to work with conventional applications.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IaaS_storage.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1242,"logo":false,"scheme":false,"title":"Amazon Relational Database Service (RDS)","vendorVerified":0,"rating":"2.00","implementationsCount":4,"suppliersCount":0,"alias":"amazon-relational-database-service-rds","companyTypes":[],"description":"Amazon Relational Database Service (Amazon RDS) makes it easy to set up, operate, and scale a relational database in the cloud. It provides cost-efficient and resizable capacity while automating time-consuming administration tasks such as hardware provisioning, database setup, patching and backups. It frees you to focus on your applications so you can give them the fast performance, high availability, security and compatibility they need.\r\nAmazon RDS is available on several database instance types - optimized for memory, performance or I/O - and provides you with six familiar database engines to choose from, including Amazon Aurora, PostgreSQL, MySQL, MariaDB, Oracle, and Microsoft SQL Server. You can use the AWS Database Migration Service to easily migrate or replicate your existing databases to Amazon RDS.\r\n<span style=\"font-weight: bold;\">Easy to Administer</span>\r\nAmazon RDS makes it easy to go from project conception to deployment. Use the AWS Management Console, the AWS RDS Command-Line Interface, or simple API calls to access the capabilities of a production-ready relational database in minutes. No need for infrastructure provisioning, and no need for installing and maintaining database software.\r\n<span style=\"font-weight: bold;\">Highly Scalable</span>\r\nYou can scale your database's compute and storage resources with only a few mouse clicks or an API call, often with no downtime. Many Amazon RDS engine types allow you to launch one or more Read Replicas to offload read traffic from your primary database instance.\r\n<span style=\"font-weight: bold;\">Available and Durable</span>\r\nAmazon RDS runs on the same highly reliable infrastructure used by other Amazon Web Services. When you provision a Multi-AZ DB Instance, Amazon RDS synchronously replicates the data to a standby instance in a different Availability Zone (AZ). Amazon RDS has many other features that enhance reliability for critical production databases, including automated backups, database snapshots, and automatic host replacement.\r\n<span style=\"font-weight: bold;\">Fast</span>\r\nAmazon RDS supports the most demanding database applications. You can choose between two SSD-backed storage options: one optimized for high-performance OLTP applications, and the other for cost-effective general-purpose use. In addition, Amazon Aurora provides performance on par with commercial databases at 1/10th the cost.\r\n<span style=\"font-weight: bold;\">Secure</span>\r\nAmazon RDS makes it easy to control network access to your database. Amazon RDS also lets you run your database instances in Amazon Virtual Private Cloud (Amazon VPC), which enables you to isolate your database instances and to connect to your existing IT infrastructure through an industry-standard encrypted IPsec VPN. Many Amazon RDS engine types offer encryption at rest and encryption in transit.\r\n<span style=\"font-weight: bold;\">Inexpensive</span>\r\nYou pay very low rates and only for the resources you actually consume. In addition, you benefit from the option of On-Demand pricing with no up-front or long-term commitments, or even lower hourly rates via our Reserved Instance pricing.","shortDescription":"Amazon Relational Database Service (RDS) is a managed relational database service with a choice of six popular database engines. Set up, operate, and scale a relational database in the cloud with just a few clicks.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Amazon Relational Database Service (RDS)","keywords":"Amazon, database, your, with, from, instance, types, infrastructure","description":"Amazon Relational Database Service (Amazon RDS) makes it easy to set up, operate, and scale a relational database in the cloud. It provides cost-efficient and resizable capacity while automating time-consuming administration tasks such as hardware provisioning","og:title":"Amazon Relational Database Service (RDS)","og:description":"Amazon Relational Database Service (Amazon RDS) makes it easy to set up, operate, and scale a relational database in the cloud. It provides cost-efficient and resizable capacity while automating time-consuming administration tasks such as hardware provisioning"},"eventUrl":"","translationId":1242,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":239,"title":"Relational Database Management Systems","alias":"relational-database-management-systems","description":" Relational Database Management System (RDBMS) is a DBMS designed specifically for relational databases. Therefore, RDBMSes are a subset of DBMSes.\r\nA relational database refers to a database that stores data in a structured format, using rows and columns. This makes it easy to locate and access specific values within the database. It is "relational" because the values within each table are related to each other. Tables may also be related to other tables. The relational structure makes it possible to run queries across multiple tables at once.\r\nWhile a relational database describes the type of database an RDMBS manages, the RDBMS refers to the database program itself. It is the software that executes queries on the data, including adding, updating, and searching for values.\r\nAn RDBMS may also provide a visual representation of the data. For example, it may display data in a tables like a spreadsheet, allowing you to view and even edit individual values in the table. Some relational database softwareallow you to create forms that can streamline entering, editing, and deleting data.\r\nMost well known DBMS applications fall into the RDBMS category. Examples include Oracle Database, MySQL, Microsoft SQL Server, and IBM DB2. Some of these programs support non-relational databases, but they are primarily used for relational database management.\r\nExamples of non-relational databases include Apache HBase, IBM Domino, and Oracle NoSQL Database. These type of databases are managed by other DMBS programs that support NoSQL, which do not fall into the RDBMS category.\r\nElements of the relational DBMS that overarch the basic relational database are so intrinsic to operations that it is hard to dissociate the two in practice.\r\nThe most basic features of RDBMS are related to create, read, update and delete operations, collectively known as CRUD. They form the foundation of a well-organized system that promotes consistent treatment of data.\r\nThe RDBMS typically provides data dictionaries and metadata collections useful in data handling. These programmatically support well-defined data structures and relationships. Data storage management is a common capability of the RDBMS, and this has come to be defined by data objects that range from binary large object (blob) strings to stored procedures. Data objects like this extend the scope of basic relational database operations and can be handled in a variety of ways in different RDBMSes.\r\nThe most common means of data access for the RDBMS is via SQL. Its main language components comprise data manipulation language (DML) and data definition language (DDL) statements. Extensions are available for development efforts that pair SQL use with common programming languages, such as COBOL (Common Business-Oriented Language), Java and .NET.\r\nRDBMSes use complex algorithms that support multiple concurrent user access to the database, while maintaining data integrity. Security management, which enforces policy-based access, is yet another overlay service that the RDBMS provides for the basic database as it is used in enterprise settings.\r\nRDBMSes support the work of database administrators (DBAs) who must manage and monitor database activity. Utilities help automate data loading and database backup. RDBMS systems manage log files that track system performance based on selected operational parameters. This enables measurement of database usage, capacity and performance, particularly query performance. RDBMSes provide graphical interfaces that help DBAs visualize database activity.\r\nRelational database management systems are central to key applications, such as banking ledgers, travel reservation systems and online retailing. As RDBMSes have matured, they have achieved increasingly higher levels of query optimization, and they have become key parts of reporting, analytics and data warehousing applications for businesses as well. \r\nRDBMSes are intrinsic to operations of a variety of enterprise applications and are at the center of most master data management (MDM) systems.<br /><br />","materialsDescription":"<h1 class=\"align-center\"> <span style=\"font-weight: normal;\">What are the advantages of a Relational Database Management System?</span></h1>\r\nA Relational Database Management System (RDBMS) is a software system that provides access to a relational database. The software system is a collection of software applications that can be used to create, maintain, manage and use the database. A "relational database" is a database structured on the "relational" model. Data are stored and presented in a tabular format, organized in rows and columns with one record per row.\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Data Structure.</span> The table format is simple and easy for database users to understand and use. Relational database management software provide data access using a natural structure and organization of the data. Database queries can search any column for matching entries.</li></ul>\r\n<dl></dl>\r\n<ul><li><span style=\"font-weight: bold;\">Multi-User Access.</span> RDBMS database program allow multiple database users to access a database simultaneously. Built-in locking and transactions management functionality allow users to access data as it is being changed, prevents collisions between two users updating the data, and keeps users from accessing partially updated records.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Privileges. </span>Authorization and privilege control features in an RDBMS allow the database administrator to restrict access to authorized users, and grant privileges to individual users based on the types of database tasks they need to perform. Authorization can be defined based on the remote client IP address in combination with user authorization, restricting access to specific external computer systems.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Network Access.</span> RDBMSs provide access to the database through a server daemon, a specialized software program that listens for requests on a network, and allows database clients to connect to and use the database. Users do not need to be able to log in to the physical computer system to use the database, providing convenience for the users and a layer of security for the database. Network access allows developers to build desktop tools and Web applications to interact with databases.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Speed.</span> The relational database model is not the fastest data structure. RDBMS software advantages, such as simplicity, make the slower speed a fair trade-off. Optimizations built into an RDBMS, and the design of the databases, enhance performance, allowing RDBMSs to perform more than fast enough for most applications and data sets. Improvements in technology, increasing processor speeds and decreasing memory and storage costs allow systems administrators to build incredibly fast systems that can overcome any database performance shortcomings.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Maintenance. </span>RDBMSs feature maintenance utilities that provide database administrators with tools to easily maintain, test, repair and back up the databases housed in the system. Many of the functions can be automated using built-in automation in the RDBMS, or automation tools available on the operating system.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Language.</span> RDBMSs support a generic language called "Structured Query Language" (SQL). The SQL syntax is simple, and the language uses standard English language keywords and phrasing, making it fairly intuitive and easy to learn. Many RDBMSs add non-SQL, database-specific keywords, functions and features to the SQL language.</li></ul>\r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Relational_Database_Management_Systems.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1244,"logo":false,"scheme":false,"title":"Amazon Virtual Private Cloud (VPC)","vendorVerified":0,"rating":"2.00","implementationsCount":5,"suppliersCount":0,"alias":"amazon-virtual-private-cloud-vpc","companyTypes":[],"description":"Amazon Virtual Private Cloud (Amazon VPC) lets you provision a logically isolated section of the AWS Cloud where you can launch AWS resources in a virtual network that you define. You have complete control over your virtual networking environment, including selection of your own IP address range, creation of subnets, and configuration of route tables and network gateways. You can use both IPv4 and IPv6 in your VPC for secure and easy access to resources and applications.\r\nYou can easily customize the network configuration for your Amazon VPC. For example, you can create a public-facing subnet for your web servers that has access to the Internet, and place your backend systems such as databases or application servers in a private-facing subnet with no Internet access. You can leverage multiple layers of security, including security groups and network access control lists, to help control access to Amazon EC2 instances in each subnet.\r\nAdditionally, you can create a Hardware Virtual Private Network (VPN) connection between your corporate data center and your VPC and leverage the AWS Cloud as an extension of your corporate data center.\r\n \r\n\r\n<span style=\"font-weight: bold;\">FEATURES</span>\r\nMULTIPLE CONNECTIVITY OPTIONS\r\nA variety of connectivity options exist for your Amazon VPC. You can connect your VPC to the Internet, to your data center, or other VPCs, based on the AWS resources that you want to expose publicly and those that you want to keep private.\r\n<ul><li>Connect directly to the Internet (public subnets)– You can launch instances into a publicly accessible subnet where they can send and receive traffic from the Internet.</li><li>Connect to the Internet using Network Address Translation (private subnets) – Private subnets can be used for instances that you do not want to be directly addressable from the Internet. Instances in a private subnet can access the Internet without exposing their private IP address by routing their traffic through a Network Address Translation (NAT) gateway in a public subnet.</li><li>Connect securely to your corporate datacenter– All traffic to and from instances in your VPC can be routed to your corporate datacenter over an industry standard, encrypted IPsec hardware VPN connection.</li><li>Connect privately to other VPCs- Peer VPCs together to share resources across multiple virtual networks owned by your or other AWS accounts.</li><li>Privately connect to AWS Services without using an Internet gateway, NAT or firewall proxy through a VPC Endpoint. Available AWS services include S3, DynamoDB, Kinesis Streams, Service Catalog, EC2 Systems Manager (SSM), Elastic Load Balancing (ELB) API, and Amazon Elastic Compute Cloud (EC2) API.</li><li>Privately connect to SaaS solutions supported by AWS PrivateLink.</li><li>Privately connect your internal services across different accounts and VPCs within your own organizations, significantly simplifying your internal network architecture.</li></ul>\r\nSECURE\r\nAmazon VPC provides advanced security features, such as security groups and network access control lists, to enable inbound and outbound filtering at the instance level and subnet level. In addition, you can store data in Amazon S3 and restrict access so that it’s only accessible from instances in your VPC. Optionally, you can also choose to launch Dedicated Instances which run on hardware dedicated to a single customer for additional isolation.\r\nSIMPLE\r\nYou can create a VPC quickly and easily using the AWS Management Console. You can select one of the common network setups that best match your needs and press "Start VPC Wizard." Subnets, IP ranges, route tables, and security groups are automatically created for you so you can concentrate on creating the applications to run in your VPC.\r\nALL THE SCALABILITY AND RELIABILITY OF AWS\r\nAmazon VPC provides all of the same benefits as the rest of the AWS platform. You can instantly scale your resources up or down, select Amazon EC2 instances types and sizes that are right for your applications, and pay only for the resources you use - all within Amazon’s proven infrastructure.","shortDescription":"Amazon Virtual Private Cloud - Provision a logically isolated section of the Amazon Web Services (AWS) Cloud where you can launch AWS resources in a virtual network that you define","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Amazon Virtual Private Cloud (VPC)","keywords":"your, Amazon, Internet, that, access, network, subnet, instances","description":"Amazon Virtual Private Cloud (Amazon VPC) lets you provision a logically isolated section of the AWS Cloud where you can launch AWS resources in a virtual network that you define. You have complete control over your virtual networking environment, including se","og:title":"Amazon Virtual Private Cloud (VPC)","og:description":"Amazon Virtual Private Cloud (Amazon VPC) lets you provision a logically isolated section of the AWS Cloud where you can launch AWS resources in a virtual network that you define. You have complete control over your virtual networking environment, including se"},"eventUrl":"","translationId":1244,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":2,"title":"Virtual machine and cloud system software","alias":"virtual-machine-and-cloud-system-software","description":" A virtual machine (VM) is a software-based computer that exists within another computer’s operating system, often used for the purposes of testing, backing up data, or running SaaS applications. To fully grasp how VMs work, it’s important to first understand how computer software and hardware are typically integrated by an operating system.\r\n"The cloud" refers to servers that are accessed over the Internet, and the software and databases that run on those servers. Cloud servers are located in data centers all over the world. By using cloud computing, users and companies don't have to manage physical servers themselves or run software applications on their own machines.\r\nThe cloud enables users to access the same files and applications from almost any device, because the computing and storage take place on servers in a data center, instead of locally on the user device. This is why a user can log into their Instagram account on a new phone after their old phone breaks and still find their old account in place, with all their photos, videos, and conversation history. It works the same way with cloud email providers like Gmail or Microsoft Office 365, and with cloud storage providers like Dropbox or Google Drive.\r\nFor businesses, switching to cloud computing removes some IT costs and overhead: for instance, they no longer need to update and maintain their own servers, as the cloud vendor they are using will do that. This especially makes an impact on small businesses that may not have been able to afford their own internal infrastructure but can outsource their infrastructure needs affordably via the cloud. The cloud can also make it easier for companies to operate internationally because employees and customers can access the same files and applications from any location.\r\nSeveral cloud providers offer virtual machines to their customers. These virtual machines typically live on powerful servers that can act as a host to multiple VMs and can be used for a variety of reasons that wouldn’t be practical with a locally-hosted VM. These include:\r\n<ul><li>Running SaaS applications - Software-as-a-Service, or SaaS for short, is a cloud-based method of providing software to users. SaaS users subscribe to an application rather than purchasing it once and installing it. These applications are generally served to the user over the Internet. Often, it is virtual machines in the cloud that are doing the computation for SaaS applications as well as delivering them to users. If the cloud provider has a geographically distributed network edge, then the application will run closer to the user, resulting in faster performance.</li><li>Backing up data - Cloud-based VM services are very popular for backing up data because the data can be accessed from anywhere. Plus, cloud VMs provide better redundancy, require less maintenance, and generally scale better than physical data centers. (For example, it’s generally fairly easy to buy an extra gigabyte of storage space from a cloud VM provider, but much more difficult to build a new local data server for that extra gigabyte of data.)</li><li>Hosting services like email and access management - Hosting these services on cloud VMs is generally faster and more cost-effective, and helps minimize maintenance and offload security concerns as well.</li></ul>","materialsDescription":"What is an operating system?\r\nTraditional computers are built out of physical hardware, including hard disk drives, processor chips, RAM, etc. In order to utilize this hardware, computers rely on a type of software known as an operating system (OS). Some common examples of OSes are Mac OSX, Microsoft Windows, Linux, and Android.\r\nThe OS is what manages the computer’s hardware in ways that are useful to the user. For example, if the user wants to access the Internet, the OS directs the network interface card to make the connection. If the user wants to download a file, the OS will partition space on the hard drive for that file. The OS also runs and manages other pieces of software. For example, it can run a web browser and provide the browser with enough random access memory (RAM) to operate smoothly. Typically, operating systems exist within a physical computer at a one-to-one ratio; for each machine, there is a single OS managing its physical resources.\r\n<span style=\"font-weight: bold;\">Can you have two or more operating systems on one computer?</span>\r\nSome users want to be able to run multiple operating systems simultaneously on one computer, either for testing or one of the other reasons listed in the section below. This can be achieved through a process called virtualization. In virtualization, a piece of software behaves as if it were an independent computer. This piece of software is called a virtual machine, also known as a ‘guest’ computer. (The computer on which the VM is running is called the ‘host’.) The guest has an OS as well as its own virtual hardware.\r\n‘Virtual hardware’ may sound like a bit of an oxymoron, but it works by mapping to real hardware on the host computer. For example, the VM’s ‘hard drive’ is really just a file on the host computer’s hard drive. When the VM wants to save a new file, it actually has to communicate with the host OS, which will write this file to the host hard drive. Because virtual hardware must perform this added step of negotiating with the host to access hardware resources, virtual machines can’t run quite as fast as their host computers.\r\nWith virtualization, one computer can run two or more operating systems. The number of VMs that can run on one host is limited only by the host’s available resources. The user can run the OS of a VM in a window like any other program, or they can run it in fullscreen so that it looks and feels like a genuine host OS.\r\n <span style=\"font-weight: bold; \">What are virtual machines used for?</span>\r\nSome of the most popular reasons people run virtual machines include:\r\n<span style=\"font-weight: bold; \">Testing</span> - Oftentimes software developers want to be able to test their applications in different environments. They can use virtual machines to run their applications in various OSes on one computer. This is simpler and more cost-effective than having to test on several different physical machines.\r\n<span style=\"font-weight: bold; \">Running software designed for other OSes</span> - Although certain software applications are only available for a single platform, a VM can run software designed for a different OS. For example, a Mac user who wants to run software designed for Windows can run a Windows VM on their Mac host.\r\n<span style=\"font-weight: bold; \">Running outdated software</span> - Some pieces of older software can’t be run in modern OSes. Users who want to run these applications can run an old OS on a virtual machine.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Virtual_machine_and_cloud_system_software.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":3113,"logo":false,"scheme":false,"title":"Amazon EMR","vendorVerified":0,"rating":"0.00","implementationsCount":3,"suppliersCount":0,"alias":"amazon-emr","companyTypes":[],"description":"Amazon EMR provides a managed Hadoop framework that makes it easy, fast, and cost-effective to process vast amounts of data across dynamically scalable Amazon EC2 instances. You can also run other popular distributed frameworks such as Apache Spark, HBase, Presto, and Flink in EMR, and interact with data in other AWS data stores such as Amazon S3 and Amazon DynamoDB. EMR Notebooks, based on the popular Jupyter Notebook, provide a development and collaboration environment for ad hoc querying and exploratory analysis.\r\nEMR securely and reliably handles a broad set of big data use cases, including log analysis, web indexing, data transformations (ETL), machine learning, financial analysis, scientific simulation, and bioinformatics.\r\n<p class=\"align-center\"> </p>\r\n<p class=\"align-center\"><span style=\"font-weight: bold;\">BENEFITS</span></p>\r\nEASY TO USE\r\nYou can launch an EMR cluster in minutes. You don’t need to worry about node provisioning, cluster setup, Hadoop configuration, or cluster tuning. EMR takes care of these tasks so you can focus on analysis. Data scientists, developers and analysts can also use EMR Notebooks, a managed environment based on Jupyter Notebook, to build applications and collaborate with peers.\r\nLOW COST\r\nEMR pricing is simple and predictable: You pay a per-instance rate for every second used, with a one-minute minimum charge. You can launch a 10-node EMR cluster with applications such as Hadoop, Spark, and Hive, for as little as $0.15 per hour. Because EMR has native support for Amazon EC2 Spot and Reserved Instances, you can also save 50-80% on the cost of the underlying instances.\r\nELASTIC\r\nWith EMR, you can provision one, hundreds, or thousands of compute instances to process data at any scale. You can easily increase or decrease the number of instances manually or with Auto Scaling, and you only pay for what you use. EMR also decouples compute instances and persistent storage, so they can be scaled independently.\r\nRELIABLE\r\nYou can spend less time tuning and monitoring your cluster. EMR has tuned Hadoop for the cloud; it also monitors your cluster — retrying failed tasks and automatically replacing poorly performing instances. EMR provides the latest stable open source software releases, so you don’t have to manage updates and bug fixes, leading to fewer issues and less effort to maintain the environment.\r\nSECURE\r\nEMR automatically configures EC2 firewall settings that control network access to instances, and you can launch clusters in an Amazon Virtual Private Cloud (VPC), a logically isolated network you define. For objects stored in S3, you can use S3 server-side encryption or Amazon S3 client-side encryption with EMRFS, with AWS Key Management Service or customer-managed keys. You can also easily enable other encryption options and authentication with Kerberos.\r\nFLEXIBLE\r\nYou have complete control over your cluster. You have root access to every instance, you can easily install additional applications, and you can customize every cluster with bootstrap actions. You can also launch EMR clusters with custom Amazon Linux AMIs.","shortDescription":"Easily Run and Scale Apache Spark, Hadoop, HBase, Presto, Hive, and other Big Data Frameworks","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Amazon EMR","keywords":"","description":"Amazon EMR provides a managed Hadoop framework that makes it easy, fast, and cost-effective to process vast amounts of data across dynamically scalable Amazon EC2 instances. You can also run other popular distributed frameworks such as Apache Spark, HBase, Pre","og:title":"Amazon EMR","og:description":"Amazon EMR provides a managed Hadoop framework that makes it easy, fast, and cost-effective to process vast amounts of data across dynamically scalable Amazon EC2 instances. You can also run other popular distributed frameworks such as Apache Spark, HBase, Pre"},"eventUrl":"","translationId":3113,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":39,"title":"IaaS - Infrastructure as a Service","alias":"iaas-infrastructure-as-a-service","description":"<span style=\"font-weight: bold;\">Infrastructure as a service</span> (IaaS) are online services that provide high-level APIs used to dereference various low-level details of underlying network infrastructure like physical computing resources, location, data partitioning, scaling, security, backup etc. A hypervisor, such as Xen, Oracle VirtualBox, Oracle VM, KVM, VMware ESX/ESXi, or Hyper-V, LXD, runs the virtual machines as guests. Pools of hypervisors within the cloud operational system can support large numbers of virtual machines and the ability to scale services up and down according to customers' varying requirements.\r\nTypically IaaS solutions involve the use of a cloud orchestration technology like Open Stack, Apache Cloudstack or Open Nebula. This manages the creation of a virtual machine and decides on which hypervisor (i.e. physical host) to start it, enables VM migration features between hosts, allocates storage volumes and attaches them to VMs, usage information for billing and lots more.\r\nAn alternative to hypervisors are Linux containers, which run in isolated partitions of a single Linux kernel running directly on the physical hardware. Linux cgroups and namespaces are the underlying Linux kernel technologies used to isolate, secure and manage the containers. Containerisation offers higher performance than virtualization, because there is no hypervisor overhead. Also, container capacity auto-scales dynamically with computing load, which eliminates the problem of over-provisioning and enables usage-based billing.\r\nIaaS clouds often offer additional resources such as a virtual-machine disk-image library, raw block storage, file or object storage, firewalls, load balancers, IP addresses, virtual local area networks (VLANs), and software bundles.\r\nAccording to the Internet Engineering Task Force (IETF), the most basic cloud-service model is that of providers offering IT infrastructure – virtual machines and other resources – as a service to subscribers.\r\nIaaS cloud providers supply these resources on-demand from their large pools of equipment installed in data centers. For wide-area connectivity, customers can use either the Internet or carrier clouds (dedicated virtual private networks). To deploy their applications, cloud users install operating-system images and their application software on the cloud infrastructure. In this model, the cloud user patches and maintains the operating systems and the application software. Cloud infrastructure providers typically bill IaaS services on a utility computing basis: cost reflects the amount of resources allocated and consumed.","materialsDescription":"<h1 class=\"align-center\"><span style=\"font-weight: bold; \">Infrastructure as a Service Benefits </span></h1>\r\n<span style=\"font-weight: bold; \">Cost savings:</span> An obvious benefit of moving to the managed IaaS model is lower infrastructure costs. No longer do organizations have the responsibility of ensuring uptime, maintaining hardware and networking equipment, or replacing old equipment. IaaS technology also saves enterprises from having to buy more capacity to deal with sudden business spikes. Organizations with a smaller IT infrastructure generally require a smaller IT staff as well. The pay-as-you-go model also provides significant cost savings. \r\n<span style=\"font-weight: bold; \">Scalability and flexibility:</span> One of the greatest benefits of IaaS is the ability to scale up and down quickly in response to an enterprise’s requirements. Infrastructure as a Service providers generally have the latest, most powerful storage, servers and networking technology to accommodate the needs of their customers. This on-demand scalability provides added flexibility and greater agility to respond to changing opportunities and requirements. \r\n<span style=\"font-weight: bold; \">Faster time to market:</span> Competition is strong in every sector, and time to market is one of the best ways to beat the competition. Because IaaS vendors elasticity and scalability, organizations can ramp up and get the job done (and the product or service to market) more rapidly.\r\n<span style=\"font-weight: bold; \">Support for DR, BC and high availability:</span> While every enterprise has some type of disaster recovery plan, the technology behind those plans is often expensive and unwieldy. Organizations with several disparate locations often have different disaster recovery and business continuity plans and technologies, making management virtually impossible.\r\n<span style=\"font-weight: bold; \">Focus on business growth:</span> Time, money and energy spent making technology decisions and hiring staff to manage and maintain the technology infrastructure is time not spent on growing the business. By moving infrastructure to a global infrastructure services, organizations can focus their time and resources where they belong, on developing innovations in applications and solutions.\r\n<h1 class=\"align-center\">IaaS, PaaS and SaaS: What’s the Difference?</h1>\r\nPlatform as a Service (PaaS) is the next step up from IaaS products, where the provider also supplies the operating environment including the operating system, application services, middleware and other ‘runtimes’ for cloud users. It’s used for development environments where the business can focus on creating an app but wants someone else to maintain the deployment platform. It means you have much simpler workloads but you can’t necessarily be as flexible as you want.\r\nAt the highest level of orchestration is Software as a Service. In SaaS infrastructure applications are accessed on demand. Here you just open your browser and go, consuming software rather than installing and running it. A user simply logs on to access the provider’s application. Users can decide how the app will work but pretty much everything else is the responsibility of the software provider.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IaaS.png"},{"id":786,"title":"IaaS - computing","alias":"iaas-computing","description":"Cloud computing is the on demand availability of computer system resources, especially data storage and computing power, without direct active management by the user. The term is generally used to describe data centers available to many users over the Internet. Large clouds, predominant today, often have functions distributed over multiple locations from central servers. If the connection to the user is relatively close, it may be designated an edge server.\r\nInfrastructure as a service (IaaS) are online services that provide high-level APIs used to dereference various low-level details of underlying network infrastructure like physical computing resources, location, data partitioning, scaling, security, backup etc. A hypervisor, such as Xen, Oracle VirtualBox, Oracle VM, KVM, VMware ESX/ESXi, or Hyper-V, LXD, runs the virtual machines as guests. Pools of hypervisors within the cloud operational system can support large numbers of virtual machines and the ability to scale services up and down according to customers' varying requirements.\r\nTypically IaaS involve the use of a cloud orchestration technology like Open Stack, Apache Cloudstack or Open Nebula. This manages the creation of a virtual machine and decides on which hypervisor (i.e. physical host) to start it, enables VM migration features between hosts, allocates storage volumes and attaches them to VMs, usage information for billing and lots more.\r\nAn alternative to hypervisors are Linux containers, which run in isolated partitions of a single Linux kernel running directly on the physical hardware. Linux cgroups and namespaces are the underlying Linux kernel technologies used to isolate, secure and manage the containers. Containerisation offers higher performance than virtualization, because there is no hypervisor overhead. Also, container capacity auto-scales dynamically with computing load, which eliminates the problem of over-provisioning and enables usage-based billing.\r\nIaaS clouds often offer additional resources such as a virtual-machine disk-image library, raw block storage, file or object storage, firewalls, load balancers, IP addresses, virtual local area networks (VLANs), and software bundles.\r\nThe NIST's definition of cloud computing defines Infrastructure as a Service as:\r\n<ul><li>The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications.</li><li>The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, and deployed applications; and possibly limited control of select networking components (e.g., host firewalls).</li></ul>\r\nAccording to the Internet Engineering Task Force (IETF), the most basic cloud-service model is that of providers offering IT infrastructure — virtual machines and other resources — as a service to subscribers.\r\nIaaS-cloud providers supply these resources on-demand from their large pools of equipment installed in data centers. For wide-area connectivity, customers can use either the Internet or carrier clouds (dedicated virtual private networks). To deploy their applications, cloud users install operating-system images and their application software on the cloud infrastructure. In this model, the cloud user patches and maintains the operating systems and the application software. Cloud providers typically bill IaaS services on a utility computing basis: cost reflects the amount of resources allocated and consumed.","materialsDescription":" <span style=\"font-weight: bold; \">Cloud Computing Basics</span>\r\nWhether you are running applications that share photos to millions of mobile users or you’re supporting the critical operations of your business, a cloud services platform provides rapid access to flexible and low cost IT resources. With cloud computing, you don’t need to make large upfront investments in hardware and spend a lot of time on the heavy lifting of managing that hardware. Instead, you can provision exactly the right type and size of computing resources you need to power your newest bright idea or operate your IT department. You can access as many resources as you need, almost instantly, and only pay for what you use.\r\n<span style=\"font-weight: bold; \">How Does Cloud Computing Work?</span>\r\nCloud computing provides a simple way to access servers, storage, databases and a broad set of application services over the Internet. A Cloud services platform such as Amazon Web Services owns and maintains the network-connected hardware required for these application services, while you provision and use what you need via a web application.\r\n<span style=\"font-weight: bold; \">Six Advantages and Benefits of Cloud Computing</span>\r\n<span style=\"font-weight: bold; \">Trade capital expense for variable expense</span>\r\nInstead of having to invest heavily in data centers and servers before you know how you’re going to use them, you can only pay when you consume computing resources, and only pay for how much you consume.\r\n<span style=\"font-weight: bold; \">Benefit from massive economies of scale</span>\r\nBy using cloud computing, you can achieve a lower variable cost than you can get on your own. Because usage from hundreds of thousands of customers are aggregated in the cloud, providers can achieve higher economies of scale which translates into lower pay as you go prices.\r\n<span style=\"font-weight: bold; \">Stop guessing capacity</span>\r\nEliminate guessing on your infrastructure capacity needs. When you make a capacity decision prior to deploying an application, you often either end up sitting on expensive idle resources or dealing with limited capacity. With cloud computing, these problems go away. You can access as much or as little as you need, and scale up and down as required with only a few minutes notice.\r\n<span style=\"font-weight: bold; \">Increase speed and agility</span>\r\nIn a cloud computing environment, new IT resources are only ever a click away, which means you reduce the time it takes to make those resources available to your developers from weeks to just minutes. This results in a dramatic increase in agility for the organization, since the cost and time it takes to experiment and develop is significantly lower.\r\n<span style=\"font-weight: bold; \">Stop spending money on running and maintaining data centers</span>\r\nFocus on projects that differentiate your business, not the infrastructure. Cloud computing lets you focus on your own customers, rather than on the heavy lifting of racking, stacking and powering servers.\r\n<span style=\"font-weight: bold; \">Go global in minutes</span>\r\nEasily deploy your application in multiple regions around the world with just a few clicks. This means you can provide a lower latency and better experience for your customers simply and at minimal cost.\r\n<span style=\"font-weight: bold;\">Types of Cloud Computing</span>\r\nCloud computing has three main types that are commonly referred to as Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Selecting the right type of cloud computing for your needs can help you strike the right balance of control and the avoidance of undifferentiated heavy lifting.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IaaS_computing.png"},{"id":789,"title":"IaaS - storage","alias":"iaas-storage","description":"IaaS is an abbreviation that stands for Infrastructure as a Service (“infrastructure as a service”). This model provides for a cloud provider to provide the client with the necessary amount of computing resources - virtual servers, remote workstations, data warehouses, with or without the provision of software - and software deployment within the infrastructure remains the client's prerogative. In essence, IaaS is an alternative to renting physical servers, racks in the data center, operating systems; instead, the necessary resources are purchased with the ability to quickly scale them if necessary. In many cases, this model may be more profitable than the traditional purchase and installation of equipment, here are just a few examples:\r\n<ul><li>if the need for computing resources is not constant and can vary greatly depending on the period, and there is no desire to overpay for unused capacity;</li><li>when a company is just starting its way on the market and does not have working capital in order to buy all the necessary infrastructure - a frequent option among startups;</li><li>there is a rapid growth in business, and the network infrastructure must keep pace with it;</li><li>if you need to reduce the cost of purchasing and maintaining equipment;</li><li>when a new direction is launched, and it is necessary to test it without investing significant funds in resources.</li></ul>\r\nIaaS can be organized on the basis of a public or private cloud, as well as by combining two approaches - the so-called. “Hybrid cloud”, created using the appropriate software.","materialsDescription":" IaaS or Infrastructure as a service translated into Russian as “Infrastructure as a service”.\r\n"Infrastructure" in the case of IaaS, it can be virtual servers and networks, data warehouses, operating systems.\r\n“As a service” means that the cloud infrastructure components listed above are provided to you as a connected service.\r\nIaaS is a cloud infrastructure utilization model in which the computing power is provided to the client for independent management.\r\n<span style=\"font-weight: bold;\">What is the difference from PaaS and SaaS?</span>\r\nFrequently asked questions, what distinguishes IaaS, PaaS, SaaS from each other? What is the difference? Answering all questions, you decide to leave in the area of responsibility of its IT specialists. It requires only time and financial costs for your business.\r\n<span style=\"font-weight: bold;\">Who is responsible for what?</span>\r\nIn the case of using IaaS models, a company can independently use resources: install and run software, exercise control over systems, applications, and virtual storage systems.\r\nFor example, networks, servers, servers and servers. The IaaS service provider manages its own software and operating system, middleware and applications, is responsible for the infrastructure during the purchase, installation and configuration.\r\n<span style=\"font-weight: bold;\">Why do companies choose IaaS?</span>\r\nScaling capabilities. All users have access to resources, and you must use all the resources you need.\r\nCost savings. As a rule, the use of cloud services costs the company less than buying its own infrastructure.\r\nMobility. Ability to work with conventional applications.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IaaS_storage.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":3118,"logo":false,"scheme":false,"title":"AWS CloudFormation","vendorVerified":0,"rating":"0.00","implementationsCount":2,"suppliersCount":0,"alias":"aws-cloudformation","companyTypes":[],"description":"AWS CloudFormation provides a common language for you to describe and provision all the infrastructure resources in your cloud environment. CloudFormation allows you to use a simple text file to model and provision, in an automated and secure manner, all the resources needed for your applications across all regions and accounts. This file serves as the single source of truth for your cloud environment. \r\nAWS CloudFormation is available at no additional charge, and you pay only for the AWS resources needed to run your applications.\r\n<p class=\"align-center\"><span style=\"font-weight: bold;\">Benefits</span></p>\r\nMODEL IT ALL\r\nAWS CloudFormation allows you to model your entire infrastructure in a text file. This template becomes the single source of truth for your infrastructure. This helps you to standardize infrastructure components used across your organization, enabling configuration compliance and faster troubleshooting.\r\nAUTOMATE AND DEPLOY\r\nAWS CloudFormation provisions your resources in a safe, repeatable manner, allowing you to build and rebuild your infrastructure and applications, without having to perform manual actions or write custom scripts. CloudFormation takes care of determining the right operations to perform when managing your stack, and rolls back changes automatically if errors are detected.\r\nIT'S JUST CODE\r\nCodifying your infrastructure allows you to treat your infrastructure as just code. You can author it with any code editor, check it into a version control system, and review the files with team members before deploying into production.","shortDescription":"AWS CloudFormation: Model and provision all your cloud infrastructure resources","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"AWS CloudFormation","keywords":"","description":"AWS CloudFormation provides a common language for you to describe and provision all the infrastructure resources in your cloud environment. CloudFormation allows you to use a simple text file to model and provision, in an automated and secure manner, all the r","og:title":"AWS CloudFormation","og:description":"AWS CloudFormation provides a common language for you to describe and provision all the infrastructure resources in your cloud environment. CloudFormation allows you to use a simple text file to model and provision, in an automated and secure manner, all the r"},"eventUrl":"","translationId":3118,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":39,"title":"IaaS - Infrastructure as a Service","alias":"iaas-infrastructure-as-a-service","description":"<span style=\"font-weight: bold;\">Infrastructure as a service</span> (IaaS) are online services that provide high-level APIs used to dereference various low-level details of underlying network infrastructure like physical computing resources, location, data partitioning, scaling, security, backup etc. A hypervisor, such as Xen, Oracle VirtualBox, Oracle VM, KVM, VMware ESX/ESXi, or Hyper-V, LXD, runs the virtual machines as guests. Pools of hypervisors within the cloud operational system can support large numbers of virtual machines and the ability to scale services up and down according to customers' varying requirements.\r\nTypically IaaS solutions involve the use of a cloud orchestration technology like Open Stack, Apache Cloudstack or Open Nebula. This manages the creation of a virtual machine and decides on which hypervisor (i.e. physical host) to start it, enables VM migration features between hosts, allocates storage volumes and attaches them to VMs, usage information for billing and lots more.\r\nAn alternative to hypervisors are Linux containers, which run in isolated partitions of a single Linux kernel running directly on the physical hardware. Linux cgroups and namespaces are the underlying Linux kernel technologies used to isolate, secure and manage the containers. Containerisation offers higher performance than virtualization, because there is no hypervisor overhead. Also, container capacity auto-scales dynamically with computing load, which eliminates the problem of over-provisioning and enables usage-based billing.\r\nIaaS clouds often offer additional resources such as a virtual-machine disk-image library, raw block storage, file or object storage, firewalls, load balancers, IP addresses, virtual local area networks (VLANs), and software bundles.\r\nAccording to the Internet Engineering Task Force (IETF), the most basic cloud-service model is that of providers offering IT infrastructure – virtual machines and other resources – as a service to subscribers.\r\nIaaS cloud providers supply these resources on-demand from their large pools of equipment installed in data centers. For wide-area connectivity, customers can use either the Internet or carrier clouds (dedicated virtual private networks). To deploy their applications, cloud users install operating-system images and their application software on the cloud infrastructure. In this model, the cloud user patches and maintains the operating systems and the application software. Cloud infrastructure providers typically bill IaaS services on a utility computing basis: cost reflects the amount of resources allocated and consumed.","materialsDescription":"<h1 class=\"align-center\"><span style=\"font-weight: bold; \">Infrastructure as a Service Benefits </span></h1>\r\n<span style=\"font-weight: bold; \">Cost savings:</span> An obvious benefit of moving to the managed IaaS model is lower infrastructure costs. No longer do organizations have the responsibility of ensuring uptime, maintaining hardware and networking equipment, or replacing old equipment. IaaS technology also saves enterprises from having to buy more capacity to deal with sudden business spikes. Organizations with a smaller IT infrastructure generally require a smaller IT staff as well. The pay-as-you-go model also provides significant cost savings. \r\n<span style=\"font-weight: bold; \">Scalability and flexibility:</span> One of the greatest benefits of IaaS is the ability to scale up and down quickly in response to an enterprise’s requirements. Infrastructure as a Service providers generally have the latest, most powerful storage, servers and networking technology to accommodate the needs of their customers. This on-demand scalability provides added flexibility and greater agility to respond to changing opportunities and requirements. \r\n<span style=\"font-weight: bold; \">Faster time to market:</span> Competition is strong in every sector, and time to market is one of the best ways to beat the competition. Because IaaS vendors elasticity and scalability, organizations can ramp up and get the job done (and the product or service to market) more rapidly.\r\n<span style=\"font-weight: bold; \">Support for DR, BC and high availability:</span> While every enterprise has some type of disaster recovery plan, the technology behind those plans is often expensive and unwieldy. Organizations with several disparate locations often have different disaster recovery and business continuity plans and technologies, making management virtually impossible.\r\n<span style=\"font-weight: bold; \">Focus on business growth:</span> Time, money and energy spent making technology decisions and hiring staff to manage and maintain the technology infrastructure is time not spent on growing the business. By moving infrastructure to a global infrastructure services, organizations can focus their time and resources where they belong, on developing innovations in applications and solutions.\r\n<h1 class=\"align-center\">IaaS, PaaS and SaaS: What’s the Difference?</h1>\r\nPlatform as a Service (PaaS) is the next step up from IaaS products, where the provider also supplies the operating environment including the operating system, application services, middleware and other ‘runtimes’ for cloud users. It’s used for development environments where the business can focus on creating an app but wants someone else to maintain the deployment platform. It means you have much simpler workloads but you can’t necessarily be as flexible as you want.\r\nAt the highest level of orchestration is Software as a Service. In SaaS infrastructure applications are accessed on demand. Here you just open your browser and go, consuming software rather than installing and running it. A user simply logs on to access the provider’s application. Users can decide how the app will work but pretty much everything else is the responsibility of the software provider.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IaaS.png"},{"id":786,"title":"IaaS - computing","alias":"iaas-computing","description":"Cloud computing is the on demand availability of computer system resources, especially data storage and computing power, without direct active management by the user. The term is generally used to describe data centers available to many users over the Internet. Large clouds, predominant today, often have functions distributed over multiple locations from central servers. If the connection to the user is relatively close, it may be designated an edge server.\r\nInfrastructure as a service (IaaS) are online services that provide high-level APIs used to dereference various low-level details of underlying network infrastructure like physical computing resources, location, data partitioning, scaling, security, backup etc. A hypervisor, such as Xen, Oracle VirtualBox, Oracle VM, KVM, VMware ESX/ESXi, or Hyper-V, LXD, runs the virtual machines as guests. Pools of hypervisors within the cloud operational system can support large numbers of virtual machines and the ability to scale services up and down according to customers' varying requirements.\r\nTypically IaaS involve the use of a cloud orchestration technology like Open Stack, Apache Cloudstack or Open Nebula. This manages the creation of a virtual machine and decides on which hypervisor (i.e. physical host) to start it, enables VM migration features between hosts, allocates storage volumes and attaches them to VMs, usage information for billing and lots more.\r\nAn alternative to hypervisors are Linux containers, which run in isolated partitions of a single Linux kernel running directly on the physical hardware. Linux cgroups and namespaces are the underlying Linux kernel technologies used to isolate, secure and manage the containers. Containerisation offers higher performance than virtualization, because there is no hypervisor overhead. Also, container capacity auto-scales dynamically with computing load, which eliminates the problem of over-provisioning and enables usage-based billing.\r\nIaaS clouds often offer additional resources such as a virtual-machine disk-image library, raw block storage, file or object storage, firewalls, load balancers, IP addresses, virtual local area networks (VLANs), and software bundles.\r\nThe NIST's definition of cloud computing defines Infrastructure as a Service as:\r\n<ul><li>The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications.</li><li>The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, and deployed applications; and possibly limited control of select networking components (e.g., host firewalls).</li></ul>\r\nAccording to the Internet Engineering Task Force (IETF), the most basic cloud-service model is that of providers offering IT infrastructure — virtual machines and other resources — as a service to subscribers.\r\nIaaS-cloud providers supply these resources on-demand from their large pools of equipment installed in data centers. For wide-area connectivity, customers can use either the Internet or carrier clouds (dedicated virtual private networks). To deploy their applications, cloud users install operating-system images and their application software on the cloud infrastructure. In this model, the cloud user patches and maintains the operating systems and the application software. Cloud providers typically bill IaaS services on a utility computing basis: cost reflects the amount of resources allocated and consumed.","materialsDescription":" <span style=\"font-weight: bold; \">Cloud Computing Basics</span>\r\nWhether you are running applications that share photos to millions of mobile users or you’re supporting the critical operations of your business, a cloud services platform provides rapid access to flexible and low cost IT resources. With cloud computing, you don’t need to make large upfront investments in hardware and spend a lot of time on the heavy lifting of managing that hardware. Instead, you can provision exactly the right type and size of computing resources you need to power your newest bright idea or operate your IT department. You can access as many resources as you need, almost instantly, and only pay for what you use.\r\n<span style=\"font-weight: bold; \">How Does Cloud Computing Work?</span>\r\nCloud computing provides a simple way to access servers, storage, databases and a broad set of application services over the Internet. A Cloud services platform such as Amazon Web Services owns and maintains the network-connected hardware required for these application services, while you provision and use what you need via a web application.\r\n<span style=\"font-weight: bold; \">Six Advantages and Benefits of Cloud Computing</span>\r\n<span style=\"font-weight: bold; \">Trade capital expense for variable expense</span>\r\nInstead of having to invest heavily in data centers and servers before you know how you’re going to use them, you can only pay when you consume computing resources, and only pay for how much you consume.\r\n<span style=\"font-weight: bold; \">Benefit from massive economies of scale</span>\r\nBy using cloud computing, you can achieve a lower variable cost than you can get on your own. Because usage from hundreds of thousands of customers are aggregated in the cloud, providers can achieve higher economies of scale which translates into lower pay as you go prices.\r\n<span style=\"font-weight: bold; \">Stop guessing capacity</span>\r\nEliminate guessing on your infrastructure capacity needs. When you make a capacity decision prior to deploying an application, you often either end up sitting on expensive idle resources or dealing with limited capacity. With cloud computing, these problems go away. You can access as much or as little as you need, and scale up and down as required with only a few minutes notice.\r\n<span style=\"font-weight: bold; \">Increase speed and agility</span>\r\nIn a cloud computing environment, new IT resources are only ever a click away, which means you reduce the time it takes to make those resources available to your developers from weeks to just minutes. This results in a dramatic increase in agility for the organization, since the cost and time it takes to experiment and develop is significantly lower.\r\n<span style=\"font-weight: bold; \">Stop spending money on running and maintaining data centers</span>\r\nFocus on projects that differentiate your business, not the infrastructure. Cloud computing lets you focus on your own customers, rather than on the heavy lifting of racking, stacking and powering servers.\r\n<span style=\"font-weight: bold; \">Go global in minutes</span>\r\nEasily deploy your application in multiple regions around the world with just a few clicks. This means you can provide a lower latency and better experience for your customers simply and at minimal cost.\r\n<span style=\"font-weight: bold;\">Types of Cloud Computing</span>\r\nCloud computing has three main types that are commonly referred to as Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Selecting the right type of cloud computing for your needs can help you strike the right balance of control and the avoidance of undifferentiated heavy lifting.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IaaS_computing.png"},{"id":789,"title":"IaaS - storage","alias":"iaas-storage","description":"IaaS is an abbreviation that stands for Infrastructure as a Service (“infrastructure as a service”). This model provides for a cloud provider to provide the client with the necessary amount of computing resources - virtual servers, remote workstations, data warehouses, with or without the provision of software - and software deployment within the infrastructure remains the client's prerogative. In essence, IaaS is an alternative to renting physical servers, racks in the data center, operating systems; instead, the necessary resources are purchased with the ability to quickly scale them if necessary. In many cases, this model may be more profitable than the traditional purchase and installation of equipment, here are just a few examples:\r\n<ul><li>if the need for computing resources is not constant and can vary greatly depending on the period, and there is no desire to overpay for unused capacity;</li><li>when a company is just starting its way on the market and does not have working capital in order to buy all the necessary infrastructure - a frequent option among startups;</li><li>there is a rapid growth in business, and the network infrastructure must keep pace with it;</li><li>if you need to reduce the cost of purchasing and maintaining equipment;</li><li>when a new direction is launched, and it is necessary to test it without investing significant funds in resources.</li></ul>\r\nIaaS can be organized on the basis of a public or private cloud, as well as by combining two approaches - the so-called. “Hybrid cloud”, created using the appropriate software.","materialsDescription":" IaaS or Infrastructure as a service translated into Russian as “Infrastructure as a service”.\r\n"Infrastructure" in the case of IaaS, it can be virtual servers and networks, data warehouses, operating systems.\r\n“As a service” means that the cloud infrastructure components listed above are provided to you as a connected service.\r\nIaaS is a cloud infrastructure utilization model in which the computing power is provided to the client for independent management.\r\n<span style=\"font-weight: bold;\">What is the difference from PaaS and SaaS?</span>\r\nFrequently asked questions, what distinguishes IaaS, PaaS, SaaS from each other? What is the difference? Answering all questions, you decide to leave in the area of responsibility of its IT specialists. It requires only time and financial costs for your business.\r\n<span style=\"font-weight: bold;\">Who is responsible for what?</span>\r\nIn the case of using IaaS models, a company can independently use resources: install and run software, exercise control over systems, applications, and virtual storage systems.\r\nFor example, networks, servers, servers and servers. The IaaS service provider manages its own software and operating system, middleware and applications, is responsible for the infrastructure during the purchase, installation and configuration.\r\n<span style=\"font-weight: bold;\">Why do companies choose IaaS?</span>\r\nScaling capabilities. All users have access to resources, and you must use all the resources you need.\r\nCost savings. As a rule, the use of cloud services costs the company less than buying its own infrastructure.\r\nMobility. Ability to work with conventional applications.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IaaS_storage.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":7,"title":"Improve Customer Service"},{"id":262,"title":"Support Customers"},{"id":306,"title":"Manage Risks"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":175,"title":"Aging IT infrastructure"},{"id":180,"title":"Inability to forecast execution timelines"},{"id":282,"title":"Unauthorized access to corporate IT systems and data"},{"id":334,"title":"Poor timing of management decision making"},{"id":340,"title":"Low quality of customer service"},{"id":348,"title":"No centralized control over IT systems"},{"id":370,"title":"No automated business processes"},{"id":375,"title":"No support for mobile and remote users"},{"id":385,"title":"Risk of data loss or damage"},{"id":400,"title":"High costs"}]}},"categories":[{"id":689,"title":"Amazon Web Services","alias":"amazon-web-services","description":"Amazon Web Services (AWS) is a subsidiary of Amazon that provides on-demand cloud computing platforms to individuals, companies and governments, on a metered pay-as-you-go basis. In aggregate, these cloud computing web services provide a set of primitive, abstract technical infrastructure and distributed computing building blocks and tools. One of these services is Amazon Elastic Compute Cloud, which allows users to have at their disposal a virtual cluster of computers, available all the time, through the Internet. AWS's version of virtual computers emulate most of the attributes of a real computer including hardware (CPU(s) & GPU(s) for processing, local/RAM memory, hard-disk/SSD storage); a choice of operating systems; networking; and pre-loaded application software such as web servers, databases, CRM, etc.\r\nThe AWS technology is implemented at server farms throughout the world, and maintained by the Amazon subsidiary. Fees are based on a combination of usage, the hardware/OS/software/networking features chosen by the subscriber, required availability, redundancy, security, and service options. Subscribers can pay for a single virtual AWS computer, a dedicated physical computer, or clusters of either. As part of the subscription agreement, Amazon provides security for subscribers' system. AWS operates from many global geographical regions including 6 in North America.\r\nIn 2017, AWS comprised more than 90 services spanning a wide range including computing, storage, networking, database, analytics, application services, deployment, management, mobile, developer tools, and tools for the Internet of Things. The most popular include Amazon Elastic Compute Cloud (EC2) and Amazon Simple Storage Service (S3). Most services are not exposed directly to end users, but instead offer functionality through APIs for developers to use in their applications. Amazon Web Services' offerings are accessed over HTTP, using the REST architectural style and SOAP protocol.\r\nAmazon markets AWS to subscribers as a way of obtaining large scale computing capacity more quickly and cheaply than building an actual physical server farm. All services are billed based on usage, but each service measures usage in varying ways. As of 2017, AWS owns a dominant 34% of all cloud (IaaS, PaaS) while the next three competitors Microsoft, Google, and IBM have 11%, 8%, 6% respectively according to Synergy Group.","materialsDescription":"<span style=\"font-weight: bold;\">What is "Amazon Web Services" (AWS)?</span>\r\nWith Amazon Web Services (AWS), organizations can flexibly deploy storage space and computing capacity into Amazon's data centers without having to maintain their own hardware. A big advantage is that the infrastructure covers all dimensions for cloud computing. Whether it's video sharing, high-resolution photos, print data, or text documents, AWS can deliver IT resources on-demand, over the Internet, at a cost-per-use basis. The service exists since 2006 as a wholly owned subsidiary of Amazon Inc. The idea arose from the extensive experience with Amazon.com and the own need for platforms for web services in the cloud.\r\n<span style=\"font-weight: bold;\">What is Cloud Computing?</span>\r\nCloud Computing is a service that gives you access to expert-managed technology resources. The platform in the cloud provides the infrastructure (eg computing power, storage space) that does not have to be installed and configured in contrast to the hardware you have purchased yourself. Cloud computing only pays for the resources that are used. For example, a web shop can increase its computing power in the Christmas business and book less in "weak" months.\r\nAccess is via the Internet or VPN. There are no ongoing investment costs after the initial setup, but resources such as Virtual servers, databases or storage services are charged only after they have been used.\r\n<span style=\"font-weight: bold;\">Where is my data on Amazon AWS?</span>\r\nThere are currently eight Amazon Data Centers (AWS Regions) in different regions of the world. For each Amazon AWS resource, only the customer can decide where to use or store it. German customers typically use the data center in Ireland, which is governed by European law.\r\n<span style=\"font-weight: bold;\">How safe is my data on Amazon AWS?</span>\r\nThe customer data is stored in a highly secure infrastructure. Safety measures include, but are not limited to:\r\n<ul><li>Protection against DDos attacks (Distributed Denial of Service)</li><li>Defense against brute-force attacks on AWS accounts</li><li>Secure access: The access options are made via SSL.</li><li> Firewall: Output and access to the AWS data can be controlled.</li><li>Encrypted Data Storage: Data can be encrypted with Advanced Encryption Standard (AES) 256.</li><li>Certifications: Regular security review by independent certifications that AWS has undergone.</li></ul>\r\nEach Amazon data center (AWS region) consists of at least one Availability Zone. Availability Zones are stand-alone sub-sites that have been designed to be isolated from faults in other Availability Zones (independent power and data supply). Certain AWS resources, such as Database Services (RDS) or Storage Services (S3) automatically replicate your data within the AWS region to the different Availability Zones.\r\nAmazon AWS has appropriate certifications such as ISO27001 and has implemented a comprehensive security concept for the operation of its data center.\r\n<span style=\"font-weight: bold;\">Do I have to worry about hardware on Amazon AWS?</span>\r\nNo, all Amazon AWS resources are virtualized. Only Amazon takes care of the replacement and upgrade of hardware.\r\nNormally, you will not get anything out of defective hardware because defective storage media are exchanged by Amazon and since your data is stored multiple times redundantly, there is usually no problem either.\r\nIncidentally, if your chosen resources do not provide enough performance, you can easily get more CPU power from resources by just a few mouse clicks. You do not have to install anything new, just reboot your virtual machine or virtual database instance.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Amazon_Web_Services.png"},{"id":786,"title":"IaaS - computing","alias":"iaas-computing","description":"Cloud computing is the on demand availability of computer system resources, especially data storage and computing power, without direct active management by the user. The term is generally used to describe data centers available to many users over the Internet. Large clouds, predominant today, often have functions distributed over multiple locations from central servers. If the connection to the user is relatively close, it may be designated an edge server.\r\nInfrastructure as a service (IaaS) are online services that provide high-level APIs used to dereference various low-level details of underlying network infrastructure like physical computing resources, location, data partitioning, scaling, security, backup etc. A hypervisor, such as Xen, Oracle VirtualBox, Oracle VM, KVM, VMware ESX/ESXi, or Hyper-V, LXD, runs the virtual machines as guests. Pools of hypervisors within the cloud operational system can support large numbers of virtual machines and the ability to scale services up and down according to customers' varying requirements.\r\nTypically IaaS involve the use of a cloud orchestration technology like Open Stack, Apache Cloudstack or Open Nebula. This manages the creation of a virtual machine and decides on which hypervisor (i.e. physical host) to start it, enables VM migration features between hosts, allocates storage volumes and attaches them to VMs, usage information for billing and lots more.\r\nAn alternative to hypervisors are Linux containers, which run in isolated partitions of a single Linux kernel running directly on the physical hardware. Linux cgroups and namespaces are the underlying Linux kernel technologies used to isolate, secure and manage the containers. Containerisation offers higher performance than virtualization, because there is no hypervisor overhead. Also, container capacity auto-scales dynamically with computing load, which eliminates the problem of over-provisioning and enables usage-based billing.\r\nIaaS clouds often offer additional resources such as a virtual-machine disk-image library, raw block storage, file or object storage, firewalls, load balancers, IP addresses, virtual local area networks (VLANs), and software bundles.\r\nThe NIST's definition of cloud computing defines Infrastructure as a Service as:\r\n<ul><li>The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications.</li><li>The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, and deployed applications; and possibly limited control of select networking components (e.g., host firewalls).</li></ul>\r\nAccording to the Internet Engineering Task Force (IETF), the most basic cloud-service model is that of providers offering IT infrastructure — virtual machines and other resources — as a service to subscribers.\r\nIaaS-cloud providers supply these resources on-demand from their large pools of equipment installed in data centers. For wide-area connectivity, customers can use either the Internet or carrier clouds (dedicated virtual private networks). To deploy their applications, cloud users install operating-system images and their application software on the cloud infrastructure. In this model, the cloud user patches and maintains the operating systems and the application software. Cloud providers typically bill IaaS services on a utility computing basis: cost reflects the amount of resources allocated and consumed.","materialsDescription":" <span style=\"font-weight: bold; \">Cloud Computing Basics</span>\r\nWhether you are running applications that share photos to millions of mobile users or you’re supporting the critical operations of your business, a cloud services platform provides rapid access to flexible and low cost IT resources. With cloud computing, you don’t need to make large upfront investments in hardware and spend a lot of time on the heavy lifting of managing that hardware. Instead, you can provision exactly the right type and size of computing resources you need to power your newest bright idea or operate your IT department. You can access as many resources as you need, almost instantly, and only pay for what you use.\r\n<span style=\"font-weight: bold; \">How Does Cloud Computing Work?</span>\r\nCloud computing provides a simple way to access servers, storage, databases and a broad set of application services over the Internet. A Cloud services platform such as Amazon Web Services owns and maintains the network-connected hardware required for these application services, while you provision and use what you need via a web application.\r\n<span style=\"font-weight: bold; \">Six Advantages and Benefits of Cloud Computing</span>\r\n<span style=\"font-weight: bold; \">Trade capital expense for variable expense</span>\r\nInstead of having to invest heavily in data centers and servers before you know how you’re going to use them, you can only pay when you consume computing resources, and only pay for how much you consume.\r\n<span style=\"font-weight: bold; \">Benefit from massive economies of scale</span>\r\nBy using cloud computing, you can achieve a lower variable cost than you can get on your own. Because usage from hundreds of thousands of customers are aggregated in the cloud, providers can achieve higher economies of scale which translates into lower pay as you go prices.\r\n<span style=\"font-weight: bold; \">Stop guessing capacity</span>\r\nEliminate guessing on your infrastructure capacity needs. When you make a capacity decision prior to deploying an application, you often either end up sitting on expensive idle resources or dealing with limited capacity. With cloud computing, these problems go away. You can access as much or as little as you need, and scale up and down as required with only a few minutes notice.\r\n<span style=\"font-weight: bold; \">Increase speed and agility</span>\r\nIn a cloud computing environment, new IT resources are only ever a click away, which means you reduce the time it takes to make those resources available to your developers from weeks to just minutes. This results in a dramatic increase in agility for the organization, since the cost and time it takes to experiment and develop is significantly lower.\r\n<span style=\"font-weight: bold; \">Stop spending money on running and maintaining data centers</span>\r\nFocus on projects that differentiate your business, not the infrastructure. Cloud computing lets you focus on your own customers, rather than on the heavy lifting of racking, stacking and powering servers.\r\n<span style=\"font-weight: bold; \">Go global in minutes</span>\r\nEasily deploy your application in multiple regions around the world with just a few clicks. This means you can provide a lower latency and better experience for your customers simply and at minimal cost.\r\n<span style=\"font-weight: bold;\">Types of Cloud Computing</span>\r\nCloud computing has three main types that are commonly referred to as Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Selecting the right type of cloud computing for your needs can help you strike the right balance of control and the avoidance of undifferentiated heavy lifting.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IaaS_computing.png"},{"id":53,"title":"DaaS - Desktop as a Service","alias":"daas-desktop-as-a-service","description":"<span style=\"font-weight: bold; \">DaaS (Desktop as a service)</span> is a cloud computing offering in which a third party hosts the back end of a virtual desktop infrastructure (VDI) deployment.\r\nWith DaaS services, desktop operating systems run inside virtual machines on servers in a cloud provider's data center. All the necessary support infrastructure, including storage and network resources, also lives in the cloud. As with on-premises VDI, a DaaS providers stream virtual desktops over a network to a customer's endpoint devices, where end users may access them through client software or a web browser.\r\nThough it sounds a lot like VDI, there is a vital difference between DaaS and VDI. VDI refers to when virtual desktops are served through on-premise servers maintained by in-house IT teams. It’s the traditional way to deploy and manage virtual desktops. But since it’s on-premise, VDI technology technology must be maintained, managed, and upgraded in-house whenever necessary.\r\nDaaS service on the other hand, is a cloud-based virtual desktop solution that separates virtual desktops from on-premise servers, enabling brands to leverage a third-party hosting provider. It’s like VDI, but in the cloud instead of in the back of the office. \r\nHowever, it’s not necessary to choose one or the other. These two approaches can complement each other. Some users prefer to have a DaaS desktop overlay of their VDI deployment. For example, the Desktop as a Service providers allow the user to modernize legacy applications with zero code refactoring. Not all legacy Windows apps perform well in a DaaS environment, due to latency or hardware requirements. \r\nThe modern workplace requires agility, leading to many companies embracing mobile working and Bring Your Own Device (BYOD) policies against a backdrop of increased concern about security risk, compliance requirements and the ever-present need to reduce overheads. This is why, over a decade after analysts predicted the rise of remote desktop as a service, it is now finally being taken up in volume.\r\nBy adopting Desktop as a Service, companies can address the issues associated with end-user computing while giving their staff more freedom and increasing productivity. The pain associated with managing a multitude of devices, including those not supplied by the company, is eliminated. While remaining compliant, companies can greatly reduce risks. ","materialsDescription":"<h1 class=\"align-center\"><span style=\"font-weight: bold; \">How does desktop as a service work?</span></h1>\r\nDaaS architecture is multi-tenant, and organizations purchase the service through a subscription model -- typically based on the number of virtual desktop instances used per month.\r\nIn the desktop-as-a-service delivery model, the cloud computing provider manages the back-end responsibilities of data storage, backup, security and upgrades. While the provider handles all the back-end infrastructure costs and maintenance, customers usually manage their own virtual desktop images, applications and security, unless those desktop management services are part of the subscription.\r\nTypically, an end user's personal data is copied to and from their virtual desktop during logon and logoff, and access to the desktop is device-, location- and network-independent.\r\n<h1 class=\"align-center\">The benefits of Desktop as a Service</h1>\r\nMany organisations are undergoing digital transformation, and modernising the workplace is often a stream within the wider strategy. In order to manage remote and multi-device workforces using DaaS, you should think about the following seven benefits and how this will change, and hopefully improve, your currently way of working.\r\n<span style=\"font-weight: bold;\">The modern workplace.</span> Digital transformation is redefining what we think about the workplace. At the heart of this evolution is technology and the introduction of digital-first natives into the workplace. Allowing staff to work remotely, through DaaS in cloud and via their own devices is a surefire way to attract and retain the best talent.\r\n<span style=\"font-weight: bold;\">Cost.</span> As with many cloud initiatives, DaaS pricing moves from CAPEX to OPEX, leaving you more cash in the bank to spend on growing your business. Per desktop pricing enables you to know exactly what workforce expansion will cost the IT department, removing unforeseen infrastructure or hardware purchases as this is handled by the provider, who bundle everything in with the price of each desktop.Virtual machines use the compute power of the data centre rather than their local machines, placing less demand on the endpoint. <span style=\"font-weight: bold;\"></span>\r\n<span style=\"font-weight: bold;\">Scalability</span>. Due to the ‘...as a service’ delivery model, DaaS platform enables you to add user workstations fast and easily. This is particularly handy when your organisation utilises contract resource or temporary project teams, as there’s no hardware to procure, meaning you have the flexibility to create a desktop almost instantly and delete it when no longer required. This also puts you in control.\r\n<span style=\"font-weight: bold;\">Control.</span> DaaS helps you manage the risks that naturally come with giving your staff the freedom to work anywhere and on any device. It enables you to control the essentials such as data access and compliance without being overly restrictive. You no longer have to worry about what data is held on a user’s device as the data remains in the data centre at all times. This gives you control over all company assets because access can be revoked with the touch of a button.\r\n<span style=\"font-weight: bold;\">Management.</span> With an increasingly dispersed workforce, rolling out new applications or patching existing software has become more of a logistical problem than a technical one. Trying to coordinate people bringing in physical devices to be patched is a real issue for many companies, something which is eliminated completely with DaaS. You operate on one central image (or a small number of images based on persona), a change is made once, and everyone is on the latest version. It removes the need to standardise builds of end-user compute hardware as DaaS applications will run on almost any device no matter its configuration.\r\n<span style=\"font-weight: bold;\">Security.</span> DaaS moves the security risk from hundreds of end-user devices and put it all into the controlled and managed environment of a data centre. Lost or stolen laptops no longer provide a security risk. No data is on the local machine. As DaaS removes the need to create VPNs to access applications and data held by the company it also removes the problem of users trying to bypass the security in the belief that it will make their life easier. ","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/DaaS_-_Desktop_as_a_Service.png"},{"id":789,"title":"IaaS - storage","alias":"iaas-storage","description":"IaaS is an abbreviation that stands for Infrastructure as a Service (“infrastructure as a service”). This model provides for a cloud provider to provide the client with the necessary amount of computing resources - virtual servers, remote workstations, data warehouses, with or without the provision of software - and software deployment within the infrastructure remains the client's prerogative. In essence, IaaS is an alternative to renting physical servers, racks in the data center, operating systems; instead, the necessary resources are purchased with the ability to quickly scale them if necessary. In many cases, this model may be more profitable than the traditional purchase and installation of equipment, here are just a few examples:\r\n<ul><li>if the need for computing resources is not constant and can vary greatly depending on the period, and there is no desire to overpay for unused capacity;</li><li>when a company is just starting its way on the market and does not have working capital in order to buy all the necessary infrastructure - a frequent option among startups;</li><li>there is a rapid growth in business, and the network infrastructure must keep pace with it;</li><li>if you need to reduce the cost of purchasing and maintaining equipment;</li><li>when a new direction is launched, and it is necessary to test it without investing significant funds in resources.</li></ul>\r\nIaaS can be organized on the basis of a public or private cloud, as well as by combining two approaches - the so-called. “Hybrid cloud”, created using the appropriate software.","materialsDescription":" IaaS or Infrastructure as a service translated into Russian as “Infrastructure as a service”.\r\n"Infrastructure" in the case of IaaS, it can be virtual servers and networks, data warehouses, operating systems.\r\n“As a service” means that the cloud infrastructure components listed above are provided to you as a connected service.\r\nIaaS is a cloud infrastructure utilization model in which the computing power is provided to the client for independent management.\r\n<span style=\"font-weight: bold;\">What is the difference from PaaS and SaaS?</span>\r\nFrequently asked questions, what distinguishes IaaS, PaaS, SaaS from each other? What is the difference? Answering all questions, you decide to leave in the area of responsibility of its IT specialists. It requires only time and financial costs for your business.\r\n<span style=\"font-weight: bold;\">Who is responsible for what?</span>\r\nIn the case of using IaaS models, a company can independently use resources: install and run software, exercise control over systems, applications, and virtual storage systems.\r\nFor example, networks, servers, servers and servers. The IaaS service provider manages its own software and operating system, middleware and applications, is responsible for the infrastructure during the purchase, installation and configuration.\r\n<span style=\"font-weight: bold;\">Why do companies choose IaaS?</span>\r\nScaling capabilities. All users have access to resources, and you must use all the resources you need.\r\nCost savings. As a rule, the use of cloud services costs the company less than buying its own infrastructure.\r\nMobility. Ability to work with conventional applications.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IaaS_storage.png"},{"id":239,"title":"Relational Database Management Systems","alias":"relational-database-management-systems","description":" Relational Database Management System (RDBMS) is a DBMS designed specifically for relational databases. Therefore, RDBMSes are a subset of DBMSes.\r\nA relational database refers to a database that stores data in a structured format, using rows and columns. This makes it easy to locate and access specific values within the database. It is "relational" because the values within each table are related to each other. Tables may also be related to other tables. The relational structure makes it possible to run queries across multiple tables at once.\r\nWhile a relational database describes the type of database an RDMBS manages, the RDBMS refers to the database program itself. It is the software that executes queries on the data, including adding, updating, and searching for values.\r\nAn RDBMS may also provide a visual representation of the data. For example, it may display data in a tables like a spreadsheet, allowing you to view and even edit individual values in the table. Some relational database softwareallow you to create forms that can streamline entering, editing, and deleting data.\r\nMost well known DBMS applications fall into the RDBMS category. Examples include Oracle Database, MySQL, Microsoft SQL Server, and IBM DB2. Some of these programs support non-relational databases, but they are primarily used for relational database management.\r\nExamples of non-relational databases include Apache HBase, IBM Domino, and Oracle NoSQL Database. These type of databases are managed by other DMBS programs that support NoSQL, which do not fall into the RDBMS category.\r\nElements of the relational DBMS that overarch the basic relational database are so intrinsic to operations that it is hard to dissociate the two in practice.\r\nThe most basic features of RDBMS are related to create, read, update and delete operations, collectively known as CRUD. They form the foundation of a well-organized system that promotes consistent treatment of data.\r\nThe RDBMS typically provides data dictionaries and metadata collections useful in data handling. These programmatically support well-defined data structures and relationships. Data storage management is a common capability of the RDBMS, and this has come to be defined by data objects that range from binary large object (blob) strings to stored procedures. Data objects like this extend the scope of basic relational database operations and can be handled in a variety of ways in different RDBMSes.\r\nThe most common means of data access for the RDBMS is via SQL. Its main language components comprise data manipulation language (DML) and data definition language (DDL) statements. Extensions are available for development efforts that pair SQL use with common programming languages, such as COBOL (Common Business-Oriented Language), Java and .NET.\r\nRDBMSes use complex algorithms that support multiple concurrent user access to the database, while maintaining data integrity. Security management, which enforces policy-based access, is yet another overlay service that the RDBMS provides for the basic database as it is used in enterprise settings.\r\nRDBMSes support the work of database administrators (DBAs) who must manage and monitor database activity. Utilities help automate data loading and database backup. RDBMS systems manage log files that track system performance based on selected operational parameters. This enables measurement of database usage, capacity and performance, particularly query performance. RDBMSes provide graphical interfaces that help DBAs visualize database activity.\r\nRelational database management systems are central to key applications, such as banking ledgers, travel reservation systems and online retailing. As RDBMSes have matured, they have achieved increasingly higher levels of query optimization, and they have become key parts of reporting, analytics and data warehousing applications for businesses as well. \r\nRDBMSes are intrinsic to operations of a variety of enterprise applications and are at the center of most master data management (MDM) systems.<br /><br />","materialsDescription":"<h1 class=\"align-center\"> <span style=\"font-weight: normal;\">What are the advantages of a Relational Database Management System?</span></h1>\r\nA Relational Database Management System (RDBMS) is a software system that provides access to a relational database. The software system is a collection of software applications that can be used to create, maintain, manage and use the database. A "relational database" is a database structured on the "relational" model. Data are stored and presented in a tabular format, organized in rows and columns with one record per row.\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Data Structure.</span> The table format is simple and easy for database users to understand and use. Relational database management software provide data access using a natural structure and organization of the data. Database queries can search any column for matching entries.</li></ul>\r\n<dl></dl>\r\n<ul><li><span style=\"font-weight: bold;\">Multi-User Access.</span> RDBMS database program allow multiple database users to access a database simultaneously. Built-in locking and transactions management functionality allow users to access data as it is being changed, prevents collisions between two users updating the data, and keeps users from accessing partially updated records.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Privileges. </span>Authorization and privilege control features in an RDBMS allow the database administrator to restrict access to authorized users, and grant privileges to individual users based on the types of database tasks they need to perform. Authorization can be defined based on the remote client IP address in combination with user authorization, restricting access to specific external computer systems.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Network Access.</span> RDBMSs provide access to the database through a server daemon, a specialized software program that listens for requests on a network, and allows database clients to connect to and use the database. Users do not need to be able to log in to the physical computer system to use the database, providing convenience for the users and a layer of security for the database. Network access allows developers to build desktop tools and Web applications to interact with databases.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Speed.</span> The relational database model is not the fastest data structure. RDBMS software advantages, such as simplicity, make the slower speed a fair trade-off. Optimizations built into an RDBMS, and the design of the databases, enhance performance, allowing RDBMSs to perform more than fast enough for most applications and data sets. Improvements in technology, increasing processor speeds and decreasing memory and storage costs allow systems administrators to build incredibly fast systems that can overcome any database performance shortcomings.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Maintenance. </span>RDBMSs feature maintenance utilities that provide database administrators with tools to easily maintain, test, repair and back up the databases housed in the system. Many of the functions can be automated using built-in automation in the RDBMS, or automation tools available on the operating system.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Language.</span> RDBMSs support a generic language called "Structured Query Language" (SQL). The SQL syntax is simple, and the language uses standard English language keywords and phrasing, making it fairly intuitive and easy to learn. Many RDBMSs add non-SQL, database-specific keywords, functions and features to the SQL language.</li></ul>\r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Relational_Database_Management_Systems.png"},{"id":2,"title":"Virtual machine and cloud system software","alias":"virtual-machine-and-cloud-system-software","description":" A virtual machine (VM) is a software-based computer that exists within another computer’s operating system, often used for the purposes of testing, backing up data, or running SaaS applications. To fully grasp how VMs work, it’s important to first understand how computer software and hardware are typically integrated by an operating system.\r\n"The cloud" refers to servers that are accessed over the Internet, and the software and databases that run on those servers. Cloud servers are located in data centers all over the world. By using cloud computing, users and companies don't have to manage physical servers themselves or run software applications on their own machines.\r\nThe cloud enables users to access the same files and applications from almost any device, because the computing and storage take place on servers in a data center, instead of locally on the user device. This is why a user can log into their Instagram account on a new phone after their old phone breaks and still find their old account in place, with all their photos, videos, and conversation history. It works the same way with cloud email providers like Gmail or Microsoft Office 365, and with cloud storage providers like Dropbox or Google Drive.\r\nFor businesses, switching to cloud computing removes some IT costs and overhead: for instance, they no longer need to update and maintain their own servers, as the cloud vendor they are using will do that. This especially makes an impact on small businesses that may not have been able to afford their own internal infrastructure but can outsource their infrastructure needs affordably via the cloud. The cloud can also make it easier for companies to operate internationally because employees and customers can access the same files and applications from any location.\r\nSeveral cloud providers offer virtual machines to their customers. These virtual machines typically live on powerful servers that can act as a host to multiple VMs and can be used for a variety of reasons that wouldn’t be practical with a locally-hosted VM. These include:\r\n<ul><li>Running SaaS applications - Software-as-a-Service, or SaaS for short, is a cloud-based method of providing software to users. SaaS users subscribe to an application rather than purchasing it once and installing it. These applications are generally served to the user over the Internet. Often, it is virtual machines in the cloud that are doing the computation for SaaS applications as well as delivering them to users. If the cloud provider has a geographically distributed network edge, then the application will run closer to the user, resulting in faster performance.</li><li>Backing up data - Cloud-based VM services are very popular for backing up data because the data can be accessed from anywhere. Plus, cloud VMs provide better redundancy, require less maintenance, and generally scale better than physical data centers. (For example, it’s generally fairly easy to buy an extra gigabyte of storage space from a cloud VM provider, but much more difficult to build a new local data server for that extra gigabyte of data.)</li><li>Hosting services like email and access management - Hosting these services on cloud VMs is generally faster and more cost-effective, and helps minimize maintenance and offload security concerns as well.</li></ul>","materialsDescription":"What is an operating system?\r\nTraditional computers are built out of physical hardware, including hard disk drives, processor chips, RAM, etc. In order to utilize this hardware, computers rely on a type of software known as an operating system (OS). Some common examples of OSes are Mac OSX, Microsoft Windows, Linux, and Android.\r\nThe OS is what manages the computer’s hardware in ways that are useful to the user. For example, if the user wants to access the Internet, the OS directs the network interface card to make the connection. If the user wants to download a file, the OS will partition space on the hard drive for that file. The OS also runs and manages other pieces of software. For example, it can run a web browser and provide the browser with enough random access memory (RAM) to operate smoothly. Typically, operating systems exist within a physical computer at a one-to-one ratio; for each machine, there is a single OS managing its physical resources.\r\n<span style=\"font-weight: bold;\">Can you have two or more operating systems on one computer?</span>\r\nSome users want to be able to run multiple operating systems simultaneously on one computer, either for testing or one of the other reasons listed in the section below. This can be achieved through a process called virtualization. In virtualization, a piece of software behaves as if it were an independent computer. This piece of software is called a virtual machine, also known as a ‘guest’ computer. (The computer on which the VM is running is called the ‘host’.) The guest has an OS as well as its own virtual hardware.\r\n‘Virtual hardware’ may sound like a bit of an oxymoron, but it works by mapping to real hardware on the host computer. For example, the VM’s ‘hard drive’ is really just a file on the host computer’s hard drive. When the VM wants to save a new file, it actually has to communicate with the host OS, which will write this file to the host hard drive. Because virtual hardware must perform this added step of negotiating with the host to access hardware resources, virtual machines can’t run quite as fast as their host computers.\r\nWith virtualization, one computer can run two or more operating systems. The number of VMs that can run on one host is limited only by the host’s available resources. The user can run the OS of a VM in a window like any other program, or they can run it in fullscreen so that it looks and feels like a genuine host OS.\r\n <span style=\"font-weight: bold; \">What are virtual machines used for?</span>\r\nSome of the most popular reasons people run virtual machines include:\r\n<span style=\"font-weight: bold; \">Testing</span> - Oftentimes software developers want to be able to test their applications in different environments. They can use virtual machines to run their applications in various OSes on one computer. This is simpler and more cost-effective than having to test on several different physical machines.\r\n<span style=\"font-weight: bold; \">Running software designed for other OSes</span> - Although certain software applications are only available for a single platform, a VM can run software designed for a different OS. For example, a Mac user who wants to run software designed for Windows can run a Windows VM on their Mac host.\r\n<span style=\"font-weight: bold; \">Running outdated software</span> - Some pieces of older software can’t be run in modern OSes. Users who want to run these applications can run an old OS on a virtual machine.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Virtual_machine_and_cloud_system_software.png"},{"id":39,"title":"IaaS - Infrastructure as a Service","alias":"iaas-infrastructure-as-a-service","description":"<span style=\"font-weight: bold;\">Infrastructure as a service</span> (IaaS) are online services that provide high-level APIs used to dereference various low-level details of underlying network infrastructure like physical computing resources, location, data partitioning, scaling, security, backup etc. A hypervisor, such as Xen, Oracle VirtualBox, Oracle VM, KVM, VMware ESX/ESXi, or Hyper-V, LXD, runs the virtual machines as guests. Pools of hypervisors within the cloud operational system can support large numbers of virtual machines and the ability to scale services up and down according to customers' varying requirements.\r\nTypically IaaS solutions involve the use of a cloud orchestration technology like Open Stack, Apache Cloudstack or Open Nebula. This manages the creation of a virtual machine and decides on which hypervisor (i.e. physical host) to start it, enables VM migration features between hosts, allocates storage volumes and attaches them to VMs, usage information for billing and lots more.\r\nAn alternative to hypervisors are Linux containers, which run in isolated partitions of a single Linux kernel running directly on the physical hardware. Linux cgroups and namespaces are the underlying Linux kernel technologies used to isolate, secure and manage the containers. Containerisation offers higher performance than virtualization, because there is no hypervisor overhead. Also, container capacity auto-scales dynamically with computing load, which eliminates the problem of over-provisioning and enables usage-based billing.\r\nIaaS clouds often offer additional resources such as a virtual-machine disk-image library, raw block storage, file or object storage, firewalls, load balancers, IP addresses, virtual local area networks (VLANs), and software bundles.\r\nAccording to the Internet Engineering Task Force (IETF), the most basic cloud-service model is that of providers offering IT infrastructure – virtual machines and other resources – as a service to subscribers.\r\nIaaS cloud providers supply these resources on-demand from their large pools of equipment installed in data centers. For wide-area connectivity, customers can use either the Internet or carrier clouds (dedicated virtual private networks). To deploy their applications, cloud users install operating-system images and their application software on the cloud infrastructure. In this model, the cloud user patches and maintains the operating systems and the application software. Cloud infrastructure providers typically bill IaaS services on a utility computing basis: cost reflects the amount of resources allocated and consumed.","materialsDescription":"<h1 class=\"align-center\"><span style=\"font-weight: bold; \">Infrastructure as a Service Benefits </span></h1>\r\n<span style=\"font-weight: bold; \">Cost savings:</span> An obvious benefit of moving to the managed IaaS model is lower infrastructure costs. No longer do organizations have the responsibility of ensuring uptime, maintaining hardware and networking equipment, or replacing old equipment. IaaS technology also saves enterprises from having to buy more capacity to deal with sudden business spikes. Organizations with a smaller IT infrastructure generally require a smaller IT staff as well. The pay-as-you-go model also provides significant cost savings. \r\n<span style=\"font-weight: bold; \">Scalability and flexibility:</span> One of the greatest benefits of IaaS is the ability to scale up and down quickly in response to an enterprise’s requirements. Infrastructure as a Service providers generally have the latest, most powerful storage, servers and networking technology to accommodate the needs of their customers. This on-demand scalability provides added flexibility and greater agility to respond to changing opportunities and requirements. \r\n<span style=\"font-weight: bold; \">Faster time to market:</span> Competition is strong in every sector, and time to market is one of the best ways to beat the competition. Because IaaS vendors elasticity and scalability, organizations can ramp up and get the job done (and the product or service to market) more rapidly.\r\n<span style=\"font-weight: bold; \">Support for DR, BC and high availability:</span> While every enterprise has some type of disaster recovery plan, the technology behind those plans is often expensive and unwieldy. Organizations with several disparate locations often have different disaster recovery and business continuity plans and technologies, making management virtually impossible.\r\n<span style=\"font-weight: bold; \">Focus on business growth:</span> Time, money and energy spent making technology decisions and hiring staff to manage and maintain the technology infrastructure is time not spent on growing the business. By moving infrastructure to a global infrastructure services, organizations can focus their time and resources where they belong, on developing innovations in applications and solutions.\r\n<h1 class=\"align-center\">IaaS, PaaS and SaaS: What’s the Difference?</h1>\r\nPlatform as a Service (PaaS) is the next step up from IaaS products, where the provider also supplies the operating environment including the operating system, application services, middleware and other ‘runtimes’ for cloud users. It’s used for development environments where the business can focus on creating an app but wants someone else to maintain the deployment platform. It means you have much simpler workloads but you can’t necessarily be as flexible as you want.\r\nAt the highest level of orchestration is Software as a Service. In SaaS infrastructure applications are accessed on demand. Here you just open your browser and go, consuming software rather than installing and running it. A user simply logs on to access the provider’s application. Users can decide how the app will work but pretty much everything else is the responsibility of the software provider.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IaaS.png"}],"additionalInfo":{"budgetNotExceeded":"-1","functionallyTaskAssignment":"-1","projectWasPut":"-1","price":0,"source":{"url":"https://aws.amazon.com/ru/solutions/case-studies/coinbase/?nc1=h_ls","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},{"id":819,"title":"AWS for publishing company","description":"<span style=\"color: rgb(97, 97, 97); \"><span style=\"font-weight: bold;\">The Challenge</span><br /></span>\r\n<span style=\"color: rgb(97, 97, 97); \">After maintaining on-premises hardware and custom publishing software for nearly two decades, The Seattle Times sought to migrate its website publishing to a contemporary content management platform. To avoid the costs of acquiring and configuring new hardware infrastructure and the required staff to maintain it, the company initially chose a fully managed hosting vendor. But after several months, The Times' software engineering team found it had sacrificed flexibility and agility in exchange for less maintenance responsibility. As the hosted platform struggled with managing traffic under a vastly fluctuating load, The Seattle Times team was hamstrung in its ability to scale up to meet customer demand.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">Tom Bain, the software engineering manager overseeing the migration effort, says, <span style=\"font-style: italic;\">"We had a fairly standard architecture in mind when we set out to do the migration, and we encouraged our vendor to adapt to our needs, but they struggled with the idea of altering their own business model to satisfy our very unique hosting needs."</span><br /></span>\r\n<span style=\"color: rgb(97, 97, 97); \"><span style=\"font-weight: bold;\">Why Amazon Web Services</span></span>\r\n<span style=\"color: rgb(97, 97, 97); \">To address these core scalability concerns, The Seattle Times engineering team considered several alternative hosting options, including self-hosting on premises, more flexible managed hosting options, and various cloud providers. The team concluded that the available cloud options provided the needed flexibility, appropriate architecture, and desired cost savings. The company ultimately chose Amazon Web Services (AWS), in part because of the maturity of the product offering and, most significantly, the auto-scaling capabilities built into the service. The Seattle Times' new software is built on the LAMP stack, and the added benefits of native, Linux-based cloud hosting made the most sense when choosing a new vendor.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">The Seattle Times developed a proof-of-concept and implementation plan, which was reviewed by a team from AWS Support. <span style=\"font-style: italic;\">“They looked over our architecture and said, ‘Here are some things that we recommend you do, some best practices, and some lessons learned,’ ”</span> says Rob Grutko, director of technology for The Seattle Times. <span style=\"font-style: italic;\">“They were very helpful in making sure we were production ready.”</span></span>\r\n<span style=\"color: rgb(97, 97, 97); \">After implementing the desired system architecture and vetting the chosen components and configuration with AWS, The Times deployed its new system in just six hours. The website moved to the AWS platform between 11 p.m. and 3 a.m. and final testing was completed by 5 a.m. — in time for the next news day.<br /></span>\r\n<span style=\"color: rgb(97, 97, 97); \"><span style=\"font-weight: bold;\">How Seattle Times Uses AWS</span></span>\r\n<span style=\"color: rgb(97, 97, 97); \">Seattletimes.com is now hosted in an Amazon Virtual Private Cloud (Amazon VPC), a logically isolated section of the AWS cloud. It uses Amazon Elastic Compute Cloud (Amazon EC2) for resizable compute capacity and Amazon Elastic Block Store (Amazon EBS) for persistent block-level storage volumes. Amazon Relational Database Service (Amazon RDS) serves as a scalable cloud-based database, Amazon Simple Storage Service (Amazon S3) provides a fully redundant infrastructure for storing and retrieving data, and Amazon Route 53 offers a highly available and scalable Domain Name System (DNS) web service.</span>\r\n<span style=\"color: rgb(97, 97, 97); \">The Times is using Amazon CloudFront in front of several Amazon S3 buckets to distribute a huge collection of photo imagery. The combination of Amazon CloudFront and Amazon S3 is used to embed photos into news stories distributed to The Times readers with low latency and high transfer speeds. Additionally, Amazon ElastiCache serves as an in-memory “cache in the cloud” in The Times’ new configuration. The Times is also using AWS Lambda to resize images for viewing on different devices such as desktop computers, tablets, and smartphones.<br /></span>\r\n<span style=\"color: rgb(97, 97, 97); \"><span style=\"font-weight: bold;\">The Benefits</span></span>\r\n<span style=\"color: rgb(97, 97, 97); \">With AWS, The Seattle Times can now automatically scale up very rapidly to accommodate spikes in website traffic when big stories break, and scale down during slower traffic periods to reduce costs. <span style=\"font-style: italic;\">“Auto-scaling is really the clincher to this,”</span> Grutko says. <span style=\"font-style: italic;\">“With AWS, we can now serve our online readers with speed and efficiency, scaling to meet demand and delivering a better reader experience.’’</span></span>\r\n<span style=\"color: rgb(97, 97, 97); \">Moreover, news images can now be rapidly resized for different viewing environments, allowing breaking-news stories to reach readers faster. <span style=\"font-style: italic;\">“AWS Lambda provides us with extremely fast image resizing,” </span>Grutko says. <span style=\"font-style: italic;\">“Before, if we needed an image resized in 10 different sizes, it would happen serially. With AWS Lambda, all 10 images get created at the same time, so it’s quite a bit faster and it involves no server maintenance.”</span></span>\r\n<span style=\"color: rgb(97, 97, 97); \">Rather than relying on a hosting service to fix inevitable systems issues, The Times now has complete control over its back-end environment, enabling it to troubleshoot problems as soon as they occur. <span style=\"font-style: italic;\">“When an issue happens, we can go under the hood and troubleshoot to get around nearly any problem,”</span> says Grutko.<span style=\"font-style: italic;\"> “It’s our environment, and we control it.”</span></span>\r\n<span style=\"color: rgb(97, 97, 97); \">When the company encounters a problem that it can’t solve, it relies on AWS Support.<span style=\"font-style: italic;\"> “Our on-boarding experience was quite good with the AWS support team,”</span> says Miles Van Pelt, senior development engineer at The Seattle Times. <span style=\"font-style: italic;\">“It really felt like they went out of their way to answer our questions and research topics that we couldn't readily find in their extensive documentation.”</span></span>\r\n<span style=\"color: rgb(97, 97, 97); \">By choosing AWS, The Seattle Times is now better positioned to deliver in its pursuit of being a leading-edge digital news media company. <span style=\"font-style: italic;\">“By moving to AWS, we’ve regained the agility and flexibility we need to support the company’s journalistic mission without incurring the expense and demands required of a pile of physical hardware,”</span> says Grutko .</span>","alias":"aws-for-publishing-company","roi":0,"seo":{"title":"AWS for publishing company","keywords":"","description":"<span style=\"color: rgb(97, 97, 97); \"><span style=\"font-weight: bold;\">The Challenge</span><br /></span>\r\n<span style=\"color: rgb(97, 97, 97); \">After maintaining on-premises hardware and custom publishing software for nearly two decades, The Seattle Times so","og:title":"AWS for publishing company","og:description":"<span style=\"color: rgb(97, 97, 97); \"><span style=\"font-weight: bold;\">The Challenge</span><br /></span>\r\n<span style=\"color: rgb(97, 97, 97); \">After maintaining on-premises hardware and custom publishing software for nearly two decades, The Seattle Times so"},"deal_info":"","user":{"id":5642,"title":"The Seattle Times","logoURL":"https://old.roi4cio.com/uploads/roi/company/The_Seattle_Times.png","alias":"the-seattle-times","address":"","roles":[],"description":" Founded in 1896, The Seattle Times is a family-owned news media business serving the Pacific Northwest. The Seattle Times is the winner of 10 Pulitzer Prizes, journalism’s highest honor, and two prestigious Online Journalism Awards for its digital news coverage. Seattletimes.com attracts nearly 7 million unique visitors a month, making it the biggest local digital network in the region. The Seattle Times print edition is the second largest newspaper on the West Coast, setting the news agenda for Seattle and the region.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.seattletimes.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"The Seattle Times","keywords":"","description":" Founded in 1896, The Seattle Times is a family-owned news media business serving the Pacific Northwest. The Seattle Times is the winner of 10 Pulitzer Prizes, journalism’s highest honor, and two prestigious Online Journalism Awards for its digital news covera","og:title":"The Seattle Times","og:description":" Founded in 1896, The Seattle Times is a family-owned news media business serving the Pacific Northwest. The Seattle Times is the winner of 10 Pulitzer Prizes, journalism’s highest honor, and two prestigious Online Journalism Awards for its digital news covera","og:image":"https://old.roi4cio.com/uploads/roi/company/The_Seattle_Times.png"},"eventUrl":""},"supplier":{"id":176,"title":"Amazon Web Services","logoURL":"https://old.roi4cio.com/uploads/roi/company/aws_logo.png","alias":"amazon-web-services","address":"","roles":[],"description":" <span lang=\"EN-US\">Amazon Web Services (AWS) is the world's largest cloud service provider. Since 2006, the company has been offering customers various elements of a virtual IT infrastructure in the form of web services. Today AWS offers about 70 cloud services deployed on the basis of more than a hundred of its own data centers located in the United States, Europe, Brazil, Singapore, Japan, and Australia. Services include computing power, secure storage, analytics, mobile applications, databases, IoT solutions, and more. Customers pay only for the services they consume, dynamically expanding or contracting cloud resources as needed.</span> \r\n<span lang=\"EN-US\"> </span>\r\n<span lang=\"EN-US\"><span lang=\"en\">Through</span></span> cloud computing, companies do not need to pre-plan the use of servers and other IT infrastructure and pay for all this for several weeks or months in advance. Instead, they can deploy hundreds or thousands of servers in minutes and achieve results quickly.\r\n<span lang=\"EN-US\"> </span>\r\n<span lang=\"EN-US\">Today, Amazon Web Services provides a highly reliable, scalable, infrastructure platform in the cloud that powers hundreds of thousands of organizations in every industry and government in nearly every country in the world.</span>","companyTypes":[],"products":{},"vendoredProductsCount":36,"suppliedProductsCount":36,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":18,"vendorImplementationsCount":20,"vendorPartnersCount":0,"supplierPartnersCount":4,"b4r":0,"categories":{},"companyUrl":"http://aws.amazon.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Amazon Web Services","keywords":"Amazon, services, known, computing, also, tools, Services, than","description":" <span lang=\"EN-US\">Amazon Web Services (AWS) is the world's largest cloud service provider. Since 2006, the company has been offering customers various elements of a virtual IT infrastructure in the form of web services. Today AWS offers about 70 cloud s","og:title":"Amazon Web Services","og:description":" <span lang=\"EN-US\">Amazon Web Services (AWS) is the world's largest cloud service provider. Since 2006, the company has been offering customers various elements of a virtual IT infrastructure in the form of web services. Today AWS offers about 70 cloud s","og:image":"https://old.roi4cio.com/uploads/roi/company/aws_logo.png"},"eventUrl":""},"vendors":[{"id":176,"title":"Amazon Web Services","logoURL":"https://old.roi4cio.com/uploads/roi/company/aws_logo.png","alias":"amazon-web-services","address":"","roles":[],"description":" <span lang=\"EN-US\">Amazon Web Services (AWS) is the world's largest cloud service provider. Since 2006, the company has been offering customers various elements of a virtual IT infrastructure in the form of web services. Today AWS offers about 70 cloud services deployed on the basis of more than a hundred of its own data centers located in the United States, Europe, Brazil, Singapore, Japan, and Australia. Services include computing power, secure storage, analytics, mobile applications, databases, IoT solutions, and more. Customers pay only for the services they consume, dynamically expanding or contracting cloud resources as needed.</span> \r\n<span lang=\"EN-US\"> </span>\r\n<span lang=\"EN-US\"><span lang=\"en\">Through</span></span> cloud computing, companies do not need to pre-plan the use of servers and other IT infrastructure and pay for all this for several weeks or months in advance. Instead, they can deploy hundreds or thousands of servers in minutes and achieve results quickly.\r\n<span lang=\"EN-US\"> </span>\r\n<span lang=\"EN-US\">Today, Amazon Web Services provides a highly reliable, scalable, infrastructure platform in the cloud that powers hundreds of thousands of organizations in every industry and government in nearly every country in the world.</span>","companyTypes":[],"products":{},"vendoredProductsCount":36,"suppliedProductsCount":36,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":18,"vendorImplementationsCount":20,"vendorPartnersCount":0,"supplierPartnersCount":4,"b4r":0,"categories":{},"companyUrl":"http://aws.amazon.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Amazon Web Services","keywords":"Amazon, services, known, computing, also, tools, Services, than","description":" <span lang=\"EN-US\">Amazon Web Services (AWS) is the world's largest cloud service provider. Since 2006, the company has been offering customers various elements of a virtual IT infrastructure in the form of web services. Today AWS offers about 70 cloud s","og:title":"Amazon Web Services","og:description":" <span lang=\"EN-US\">Amazon Web Services (AWS) is the world's largest cloud service provider. Since 2006, the company has been offering customers various elements of a virtual IT infrastructure in the form of web services. Today AWS offers about 70 cloud s","og:image":"https://old.roi4cio.com/uploads/roi/company/aws_logo.png"},"eventUrl":""}],"products":[{"id":108,"logo":false,"scheme":false,"title":"Amazon EC2","vendorVerified":0,"rating":"2.00","implementationsCount":7,"suppliersCount":0,"alias":"amazon-ec2","companyTypes":[],"description":"Amazon Elastic Compute Cloud (Amazon EC2) is a web service that provides secure, resizable compute capacity in the cloud. It is designed to make web-scale cloud computing easier for developers.\r\nAmazon EC2’s simple web service interface allows you to obtain and configure capacity with minimal friction. It provides you with complete control of your computing resources and lets you run on Amazon’s proven computing environment. Amazon EC2 reduces the time required to obtain and boot new server instances to minutes, allowing you to quickly scale capacity, both up and down, as your computing requirements change. Amazon EC2 changes the economics of computing by allowing you to pay only for capacity that you actually use. Amazon EC2 provides developers the tools to build failure resilient applications and isolate them from common failure scenarios.<br />\r\n\r\n<span style=\"font-weight: bold;\">BENEFITS</span><br />\r\nELASTIC WEB-SCALE COMPUTING<br />\r\nAmazon EC2 enables you to increase or decrease capacity within minutes, not hours or days. You can commission one, hundreds, or even thousands of server instances simultaneously. You can also use Amazon EC2 Auto Scaling to maintain availability of your EC2 fleet and automatically scale your fleet up and down depending on its needs in order to maximize performance and minimize cost. To scale multiple services, you can use AWS Auto Scaling.<br />\r\nCOMPLETELY CONTROLLED<br />\r\nYou have complete control of your instances including root access and the ability to interact with them as you would any machine. You can stop any instance while retaining the data on the boot partition, and then subsequently restart the same instance using web service APIs. Instances can be rebooted remotely using web service APIs, and you also have access to their console output.<br />\r\nFLEXIBLE CLOUD HOSTING SERVICES<br />\r\nYou have the choice of multiple instance types, operating systems, and software packages. Amazon EC2 allows you to select a configuration of memory, CPU, instance storage, and the boot partition size that is optimal for your choice of operating system and application. For example, choice of operating systems includes numerous Linux distributions and Microsoft Windows Server.<br />\r\nINTEGRATED<br />\r\nAmazon EC2 is integrated with most AWS services such as Amazon Simple Storage Service (Amazon S3), Amazon Relational Database Service (Amazon RDS), and Amazon Virtual Private Cloud (Amazon VPC) to provide a complete, secure solution for computing, query processing, and cloud storage across a wide range of applications.<br />\r\nRELIABLE<br />\r\nAmazon EC2 offers a highly reliable environment where replacement instances can be rapidly and predictably commissioned. The service runs within Amazon’s proven network infrastructure and data centers. The Amazon EC2 Service Level Agreement commitment is 99.99% availability for each Amazon EC2 Region.<br />\r\nSECURE<br />\r\nCloud security at AWS is the highest priority. As an AWS customer, you will benefit from a data center and network architecture built to meet the requirements of the most security-sensitive organizations. Amazon EC2 works in conjunction with Amazon VPC to provide security and robust networking functionality for your compute resources.<br />\r\nINEXPENSIVE<br />\r\nAmazon EC2 passes on to you the financial benefits of Amazon’s scale. You pay a very low rate for the compute capacity you actually consume.<br />\r\nEASY TO START<br />\r\nThere are several ways to get started with Amazon EC2. You can use the AWS Management Console, the AWS Command Line Tools (CLI), or AWS SDKs. AWS is free to get started. ","shortDescription":"Amazon EC2 - Virtual Server Hosting\r\nAmazon Elastic Compute Cloud is a web service that provides resizable compute capacity in the cloud.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Amazon EC2","keywords":"Amazon, your, with, instances, computing, capacity, service, have","description":"Amazon Elastic Compute Cloud (Amazon EC2) is a web service that provides secure, resizable compute capacity in the cloud. It is designed to make web-scale cloud computing easier for developers.\r\nAmazon EC2’s simple web service interface allows you to obtain an","og:title":"Amazon EC2","og:description":"Amazon Elastic Compute Cloud (Amazon EC2) is a web service that provides secure, resizable compute capacity in the cloud. It is designed to make web-scale cloud computing easier for developers.\r\nAmazon EC2’s simple web service interface allows you to obtain an"},"eventUrl":"","translationId":108,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":689,"title":"Amazon Web Services","alias":"amazon-web-services","description":"Amazon Web Services (AWS) is a subsidiary of Amazon that provides on-demand cloud computing platforms to individuals, companies and governments, on a metered pay-as-you-go basis. In aggregate, these cloud computing web services provide a set of primitive, abstract technical infrastructure and distributed computing building blocks and tools. One of these services is Amazon Elastic Compute Cloud, which allows users to have at their disposal a virtual cluster of computers, available all the time, through the Internet. AWS's version of virtual computers emulate most of the attributes of a real computer including hardware (CPU(s) & GPU(s) for processing, local/RAM memory, hard-disk/SSD storage); a choice of operating systems; networking; and pre-loaded application software such as web servers, databases, CRM, etc.\r\nThe AWS technology is implemented at server farms throughout the world, and maintained by the Amazon subsidiary. Fees are based on a combination of usage, the hardware/OS/software/networking features chosen by the subscriber, required availability, redundancy, security, and service options. Subscribers can pay for a single virtual AWS computer, a dedicated physical computer, or clusters of either. As part of the subscription agreement, Amazon provides security for subscribers' system. AWS operates from many global geographical regions including 6 in North America.\r\nIn 2017, AWS comprised more than 90 services spanning a wide range including computing, storage, networking, database, analytics, application services, deployment, management, mobile, developer tools, and tools for the Internet of Things. The most popular include Amazon Elastic Compute Cloud (EC2) and Amazon Simple Storage Service (S3). Most services are not exposed directly to end users, but instead offer functionality through APIs for developers to use in their applications. Amazon Web Services' offerings are accessed over HTTP, using the REST architectural style and SOAP protocol.\r\nAmazon markets AWS to subscribers as a way of obtaining large scale computing capacity more quickly and cheaply than building an actual physical server farm. All services are billed based on usage, but each service measures usage in varying ways. As of 2017, AWS owns a dominant 34% of all cloud (IaaS, PaaS) while the next three competitors Microsoft, Google, and IBM have 11%, 8%, 6% respectively according to Synergy Group.","materialsDescription":"<span style=\"font-weight: bold;\">What is "Amazon Web Services" (AWS)?</span>\r\nWith Amazon Web Services (AWS), organizations can flexibly deploy storage space and computing capacity into Amazon's data centers without having to maintain their own hardware. A big advantage is that the infrastructure covers all dimensions for cloud computing. Whether it's video sharing, high-resolution photos, print data, or text documents, AWS can deliver IT resources on-demand, over the Internet, at a cost-per-use basis. The service exists since 2006 as a wholly owned subsidiary of Amazon Inc. The idea arose from the extensive experience with Amazon.com and the own need for platforms for web services in the cloud.\r\n<span style=\"font-weight: bold;\">What is Cloud Computing?</span>\r\nCloud Computing is a service that gives you access to expert-managed technology resources. The platform in the cloud provides the infrastructure (eg computing power, storage space) that does not have to be installed and configured in contrast to the hardware you have purchased yourself. Cloud computing only pays for the resources that are used. For example, a web shop can increase its computing power in the Christmas business and book less in "weak" months.\r\nAccess is via the Internet or VPN. There are no ongoing investment costs after the initial setup, but resources such as Virtual servers, databases or storage services are charged only after they have been used.\r\n<span style=\"font-weight: bold;\">Where is my data on Amazon AWS?</span>\r\nThere are currently eight Amazon Data Centers (AWS Regions) in different regions of the world. For each Amazon AWS resource, only the customer can decide where to use or store it. German customers typically use the data center in Ireland, which is governed by European law.\r\n<span style=\"font-weight: bold;\">How safe is my data on Amazon AWS?</span>\r\nThe customer data is stored in a highly secure infrastructure. Safety measures include, but are not limited to:\r\n<ul><li>Protection against DDos attacks (Distributed Denial of Service)</li><li>Defense against brute-force attacks on AWS accounts</li><li>Secure access: The access options are made via SSL.</li><li> Firewall: Output and access to the AWS data can be controlled.</li><li>Encrypted Data Storage: Data can be encrypted with Advanced Encryption Standard (AES) 256.</li><li>Certifications: Regular security review by independent certifications that AWS has undergone.</li></ul>\r\nEach Amazon data center (AWS region) consists of at least one Availability Zone. Availability Zones are stand-alone sub-sites that have been designed to be isolated from faults in other Availability Zones (independent power and data supply). Certain AWS resources, such as Database Services (RDS) or Storage Services (S3) automatically replicate your data within the AWS region to the different Availability Zones.\r\nAmazon AWS has appropriate certifications such as ISO27001 and has implemented a comprehensive security concept for the operation of its data center.\r\n<span style=\"font-weight: bold;\">Do I have to worry about hardware on Amazon AWS?</span>\r\nNo, all Amazon AWS resources are virtualized. Only Amazon takes care of the replacement and upgrade of hardware.\r\nNormally, you will not get anything out of defective hardware because defective storage media are exchanged by Amazon and since your data is stored multiple times redundantly, there is usually no problem either.\r\nIncidentally, if your chosen resources do not provide enough performance, you can easily get more CPU power from resources by just a few mouse clicks. You do not have to install anything new, just reboot your virtual machine or virtual database instance.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Amazon_Web_Services.png"},{"id":786,"title":"IaaS - computing","alias":"iaas-computing","description":"Cloud computing is the on demand availability of computer system resources, especially data storage and computing power, without direct active management by the user. The term is generally used to describe data centers available to many users over the Internet. Large clouds, predominant today, often have functions distributed over multiple locations from central servers. If the connection to the user is relatively close, it may be designated an edge server.\r\nInfrastructure as a service (IaaS) are online services that provide high-level APIs used to dereference various low-level details of underlying network infrastructure like physical computing resources, location, data partitioning, scaling, security, backup etc. A hypervisor, such as Xen, Oracle VirtualBox, Oracle VM, KVM, VMware ESX/ESXi, or Hyper-V, LXD, runs the virtual machines as guests. Pools of hypervisors within the cloud operational system can support large numbers of virtual machines and the ability to scale services up and down according to customers' varying requirements.\r\nTypically IaaS involve the use of a cloud orchestration technology like Open Stack, Apache Cloudstack or Open Nebula. This manages the creation of a virtual machine and decides on which hypervisor (i.e. physical host) to start it, enables VM migration features between hosts, allocates storage volumes and attaches them to VMs, usage information for billing and lots more.\r\nAn alternative to hypervisors are Linux containers, which run in isolated partitions of a single Linux kernel running directly on the physical hardware. Linux cgroups and namespaces are the underlying Linux kernel technologies used to isolate, secure and manage the containers. Containerisation offers higher performance than virtualization, because there is no hypervisor overhead. Also, container capacity auto-scales dynamically with computing load, which eliminates the problem of over-provisioning and enables usage-based billing.\r\nIaaS clouds often offer additional resources such as a virtual-machine disk-image library, raw block storage, file or object storage, firewalls, load balancers, IP addresses, virtual local area networks (VLANs), and software bundles.\r\nThe NIST's definition of cloud computing defines Infrastructure as a Service as:\r\n<ul><li>The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications.</li><li>The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, and deployed applications; and possibly limited control of select networking components (e.g., host firewalls).</li></ul>\r\nAccording to the Internet Engineering Task Force (IETF), the most basic cloud-service model is that of providers offering IT infrastructure — virtual machines and other resources — as a service to subscribers.\r\nIaaS-cloud providers supply these resources on-demand from their large pools of equipment installed in data centers. For wide-area connectivity, customers can use either the Internet or carrier clouds (dedicated virtual private networks). To deploy their applications, cloud users install operating-system images and their application software on the cloud infrastructure. In this model, the cloud user patches and maintains the operating systems and the application software. Cloud providers typically bill IaaS services on a utility computing basis: cost reflects the amount of resources allocated and consumed.","materialsDescription":" <span style=\"font-weight: bold; \">Cloud Computing Basics</span>\r\nWhether you are running applications that share photos to millions of mobile users or you’re supporting the critical operations of your business, a cloud services platform provides rapid access to flexible and low cost IT resources. With cloud computing, you don’t need to make large upfront investments in hardware and spend a lot of time on the heavy lifting of managing that hardware. Instead, you can provision exactly the right type and size of computing resources you need to power your newest bright idea or operate your IT department. You can access as many resources as you need, almost instantly, and only pay for what you use.\r\n<span style=\"font-weight: bold; \">How Does Cloud Computing Work?</span>\r\nCloud computing provides a simple way to access servers, storage, databases and a broad set of application services over the Internet. A Cloud services platform such as Amazon Web Services owns and maintains the network-connected hardware required for these application services, while you provision and use what you need via a web application.\r\n<span style=\"font-weight: bold; \">Six Advantages and Benefits of Cloud Computing</span>\r\n<span style=\"font-weight: bold; \">Trade capital expense for variable expense</span>\r\nInstead of having to invest heavily in data centers and servers before you know how you’re going to use them, you can only pay when you consume computing resources, and only pay for how much you consume.\r\n<span style=\"font-weight: bold; \">Benefit from massive economies of scale</span>\r\nBy using cloud computing, you can achieve a lower variable cost than you can get on your own. Because usage from hundreds of thousands of customers are aggregated in the cloud, providers can achieve higher economies of scale which translates into lower pay as you go prices.\r\n<span style=\"font-weight: bold; \">Stop guessing capacity</span>\r\nEliminate guessing on your infrastructure capacity needs. When you make a capacity decision prior to deploying an application, you often either end up sitting on expensive idle resources or dealing with limited capacity. With cloud computing, these problems go away. You can access as much or as little as you need, and scale up and down as required with only a few minutes notice.\r\n<span style=\"font-weight: bold; \">Increase speed and agility</span>\r\nIn a cloud computing environment, new IT resources are only ever a click away, which means you reduce the time it takes to make those resources available to your developers from weeks to just minutes. This results in a dramatic increase in agility for the organization, since the cost and time it takes to experiment and develop is significantly lower.\r\n<span style=\"font-weight: bold; \">Stop spending money on running and maintaining data centers</span>\r\nFocus on projects that differentiate your business, not the infrastructure. Cloud computing lets you focus on your own customers, rather than on the heavy lifting of racking, stacking and powering servers.\r\n<span style=\"font-weight: bold; \">Go global in minutes</span>\r\nEasily deploy your application in multiple regions around the world with just a few clicks. This means you can provide a lower latency and better experience for your customers simply and at minimal cost.\r\n<span style=\"font-weight: bold;\">Types of Cloud Computing</span>\r\nCloud computing has three main types that are commonly referred to as Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Selecting the right type of cloud computing for your needs can help you strike the right balance of control and the avoidance of undifferentiated heavy lifting.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IaaS_computing.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1236,"logo":false,"scheme":false,"title":"Amazon Route 53","vendorVerified":0,"rating":"2.00","implementationsCount":1,"suppliersCount":0,"alias":"amazon-route-53","companyTypes":[],"description":"Amazon Route 53 is a highly available and scalable cloud Domain Name System (DNS) web service. It is designed to give developers and businesses an extremely reliable and cost effective way to route end users to Internet applications by translating names like www.example.com into the numeric IP addresses like 192.0.2.1 that computers use to connect to each other. Amazon Route 53 is fully compliant with IPv6 as well.\r\nAmazon Route 53 effectively connects user requests to infrastructure running in AWS – such as Amazon EC2 instances, Elastic Load Balancing load balancers, or Amazon S3 buckets – and can also be used to route users to infrastructure outside of AWS. You can use Amazon Route 53 to configure DNS health checks to route traffic to healthy endpoints or to independently monitor the health of your application and its endpoints. Amazon Route 53 Traffic Flow makes it easy for you to manage traffic globally through a variety of routing types, including Latency Based Routing, Geo DNS, Geoproximity, and Weighted Round Robin—all of which can be combined with DNS Failover in order to enable a variety of low-latency, fault-tolerant architectures. Using Amazon Route 53 Traffic Flow’s simple visual editor, you can easily manage how your end-users are routed to your application’s endpoints—whether in a single AWS region or distributed around the globe. Amazon Route 53 also offers Domain Name Registration – you can purchase and manage domain names such as example.com and Amazon Route 53 will automatically configure DNS settings for your domains.\r\n\r\n<span style=\"text-decoration: underline; \"><span style=\"font-weight: bold; \">BENEFITS:</span></span>\r\n<span style=\"font-weight: bold; \">Highly available and reliable</span>\r\nAmazon Route 53 is built using AWS’s highly available and reliable infrastructure. The distributed nature of our DNS servers helps ensure a consistent ability to route your end users to your application. Features such as Amazon Route 53 Traffic Flow help you improve reliability with easy configuration of failover to re-route your users to an alternate location if your primary application endpoint becomes unavailable. Amazon Route 53 is designed to provide the level of dependability required by important applications. Amazon Route 53 is backed by the Amazon Route 53 Service Level Agreement.\r\n<span style=\"font-weight: bold; \">Flexible</span>\r\nAmazon Route 53 Traffic Flow routes traffic based on multiple criteria, such as endpoint health, geographic location, and latency. You can configure multiple traffic policies and decide which policies are active at any given time. You can create and edit traffic policies using the simple visual editor in the Route 53 console, AWS SDKs, or the Route 53 API. Traffic Flow’s versioning feature maintains a history of changes to your traffic policies, so you can easily roll back to a previous version using the console or API.\r\n<span style=\"font-weight: bold; \">Designed for use with other Amazon Web Services</span>\r\nAmazon Route 53 is designed to work well with other AWS features and offerings. You can use Amazon Route 53 to map domain names to your Amazon EC2 instances, Amazon S3 buckets, Amazon CloudFront distributions, and other AWS resources. By using the AWS Identity and Access Management (IAM) service with Amazon Route 53, you get fine grained control over who can update your DNS data. You can use Amazon Route 53 to map your zone apex (example.com versus www.example.com) to your Elastic Load Balancing instance, Amazon CloudFront distribution, AWS Elastic Beanstalk environment, API Gateway, VPC endpoint, or Amazon S3 website bucket using a feature called Alias record.\r\n<span style=\"font-weight: bold; \">Simple</span>\r\nWith self-service sign-up, Amazon Route 53 can start to answer your DNS queries within minutes. You can configure your DNS settings with the AWS Management Console or our easy-to-use API. You can also programmatically integrate the Amazon Route 53 API into your overall web application. For instance, you can use Amazon Route 53’s API to create a new DNS record whenever you create a new EC2 instance. Amazon Route 53 Traffic Flow makes it easy to set up sophisticated routing logic for your applications by using the simple visual policy editor.\r\n<span style=\"font-weight: bold; \">Fast</span>\r\nUsing a global anycast network of DNS servers around the world, Amazon Route 53 is designed to automatically route your users to the optimal location depending on network conditions. As a result, the service offers low query latency for your end users, as well as low update latency for your DNS record management needs. Amazon Route 53 Traffic Flow lets you further improve your customers’ experience by running your application in multiple locations around the world and using traffic policies to ensure your end users are routed to the closest healthy endpoint for your application.\r\n<span style=\"font-weight: bold; \">Cost-effective</span>\r\nAmazon Route 53 passes on the benefits of AWS’s scale to you. You pay only for the resources you use, such as the number of queries that the service answers for each of your domains, hosted zones for managing domains through the service, and optional features such as traffic policies and health checks, all at a low cost and without minimum usage commitments or any up-front fees.\r\n<span style=\"font-weight: bold; \">Secure</span>\r\nBy integrating Amazon Route 53 with AWS Identity and Access Management (IAM), you can grant unique credentials and manage permissions for every user within your AWS account and specify who has access to which parts of the Amazon Route 53 service.\r\n<span style=\"font-weight: bold; \">Scalable</span>\r\nRoute 53 is designed to automatically scale to handle very large query volumes without any intervention from you.\r\n<span style=\"font-weight: bold;\">Simplify the hybrid cloud</span>\r\nAmazon Route 53 Resolver provides recursive DNS for your Amazon VPC and on-premises networks over AWS Direct Connect or AWS Managed VPN.","shortDescription":"Amazon Route 53 is a highly available and scalable cloud Domain Name System (DNS) web service. ","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Amazon Route 53","keywords":"Route, your, domain, Amazon, name, with, that, hosted","description":"Amazon Route 53 is a highly available and scalable cloud Domain Name System (DNS) web service. It is designed to give developers and businesses an extremely reliable and cost effective way to route end users to Internet applications by translating names like w","og:title":"Amazon Route 53","og:description":"Amazon Route 53 is a highly available and scalable cloud Domain Name System (DNS) web service. It is designed to give developers and businesses an extremely reliable and cost effective way to route end users to Internet applications by translating names like w"},"eventUrl":"","translationId":1236,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":479,"title":"System Infrastructure Software","alias":"system-infrastructure-software","description":" System infrastructure software is a type of enterprise software or program designed to increase the IT performance of any organization. It provides various solutions to enterprises such as workforce support, business transactions, and internal services & processes. This software is used by various industry verticals to operate business functions efficiently and smoothly.\r\nAdvancements in cloud technologies and virtualization are expected to boost the market. Further, the rise in demand for automation and integrated approach in the business process is also anticipated to fuel the market. However, high implementation costs and the absence of a standardized framework are expected to hinder the growth of the market. Moreover, the adoption of bringing your own device (BYOD) is a major opportunity for key players in the system infrastructure software market.\r\nThe system infrastructure software market is segmented on the basis of type, application, industry vertical, and geography. Based on the type, the market is divided into system & network management software, security software, storage software, and system software. By application, the market is classified into building management systems, cloud integration, data center infrastructure management, integrated communication, network integration, and others. By industry vertical, the market is categorized into banking, financial services and insurance (BFSI), telecommunications & IT, transportation & logistics, oil & gas, manufacturing, retail, and others. By geography, it is analyzed across North America, Europe, Asia-Pacific, and LAMEA.<br /><br />","materialsDescription":" <span style=\"font-weight: bold;\">System Infrastructure Software Market Key Segments:</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">By Type</span></span>\r\n<ul><li>System & Network Management Software</li><li>Security Software</li><li>Storage Software</li><li>System Software</li></ul>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">By Application</span></span>\r\n<ul><li>Building Management System</li><li>Cloud Integration</li><li>Data Center Infrastructure Management</li><li>Integrated Communication</li><li>Network Integration</li><li>Others</li></ul>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">By Industry Vertical</span></span>\r\n<ul><li>Banking, Financial Services and Insurance (BFSI)</li><li>Telecommunications & IT</li><li>Transportation & Logistics</li><li>Oil & Gas</li><li>Manufacturing</li><li>Retail</li><li>Others </li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_System_Infrastructure_Software.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1238,"logo":false,"scheme":false,"title":"Amazon S3","vendorVerified":0,"rating":"3.00","implementationsCount":7,"suppliersCount":0,"alias":"amazon-s3","companyTypes":[],"description":"Amazon Simple Storage Service (Amazon S3) is an object storage service that offers industry-leading scalability, data availability, security, and performance. This means customers of all sizes and industries can use it to store and protect any amount of data for a range of use cases, such as websites, mobile applications, backup and restore, archive, enterprise applications, IoT devices, and big data analytics. Amazon S3 provides easy-to-use management features so you can organize your data and configure finely-tuned access controls to meet your specific business, organizational, and compliance requirements. Amazon S3 is designed for 99.999999999% (11 9's) of durability, and stores data for millions of applications for companies all around the world.\r\n\r\n<span style=\"font-weight: bold; \">Main benefits:</span><span style=\"text-decoration: underline; \"><span style=\"font-weight: bold; \"><br /></span></span>\r\n<span style=\"font-weight: bold; \">Industry-leading performance, scalability, availability, and durability</span>\r\nScale your storage resources up and down to meet fluctuating demands, without upfront investments or resource procurement cycles. Amazon S3 is designed for 99.999999999% of data durability because it automatically creates and stores copies of all S3 objects across multiple systems. This means your data is available when needed and protected against failures, errors, and threats.\r\n<span style=\"font-weight: bold; \">Wide range of cost-effective storage classes</span>\r\nSave costs without sacrificing performance by storing data across the S3 Storage Classes, which support different data access levels at corresponding rates. You can use S3 Storage Class Analysis to discover data that should move to a lower-cost storage class based on access patterns, and configure an S3 Lifecycle policy to execute the transfer. You can also store data with changing or unknown access patterns in S3 Intelligent-Tiering, which tiers objects based on changing access patterns and automatically delivers cost savings.\r\n<span style=\"font-weight: bold; \">Unmatched security, compliance, and audit capabilities</span>\r\nStore your data in Amazon S3 and secure it from unauthorized access with encryption features and access management tools. You can also use Amazon Macie to identify sensitive data stored in your S3 buckets and detect irregular access requests. Amazon S3 maintains compliance programs, such as PCI-DSS, HIPAA/HITECH, FedRAMP, EU Data Protection Directive, and FISMA, to help you meet regulatory requirements. AWS also supports numerous auditing capabilities to monitor access requests to your S3 resources.\r\n<span style=\"font-weight: bold; \">Management tools for granular data control</span>\r\nClassify, manage, and report on your data using features, such as: S3 Storage Class Analysis to analyze access patterns; S3 Lifecycle policies to transfer objects to lower-cost storage classes; S3 Cross-Region Replication to replicate data into other regions; S3 Object Lock to apply retention dates to objects and protect them from deletion; and S3 Inventory to get visbility into your stored objects, their metadata, and encryption status. You can also use S3 Batch Operations to change object properties and perform storage management tasks for billions of objects. Since Amazon S3 works with AWS Lambda, you can log activities, define alerts, and automate workflows without managing additional infrastructure.\r\n<span style=\"font-weight: bold; \">Query-in-place services for analytics</span>\r\nRun big data analytics across your S3 objects (and other data sets in AWS) with our query-in-place services. Use Amazon Athena to query S3 data with standard SQL expressions and Amazon Redshift Spectrum to analyze data that is stored across your AWS data warehouses and S3 resources. You can also use S3 Select to retrieve subsets of object metadata, instead of the entire object, and improve query performance by up to 400%.\r\n<span style=\"font-weight: bold; \">Most supported cloud storage service</span>\r\nStore and protect your data in Amazon S3 by working with a partner from the AWS Partner Network (APN) — the largest community of technology and consulting cloud services providers. The APN recognizes migration partners that transfer data to Amazon S3 and storage partners that offer S3-integrated solutions for primary storage, backup and restore, archive, and disaster recovery. You can also purchase an AWS-integrated solution directly from the AWS Marketplace, which lists of hundreds storage-specific offerings.","shortDescription":"Amazon Simple Storage Service (Amazon S3) is an object storage service that offers industry-leading scalability, data availability, security, and performance.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Amazon S3","keywords":"data, Amazon, with, storage, that, from, most, cloud","description":"Amazon Simple Storage Service (Amazon S3) is an object storage service that offers industry-leading scalability, data availability, security, and performance. This means customers of all sizes and industries can use it to store and protect any amount of data f","og:title":"Amazon S3","og:description":"Amazon Simple Storage Service (Amazon S3) is an object storage service that offers industry-leading scalability, data availability, security, and performance. This means customers of all sizes and industries can use it to store and protect any amount of data f"},"eventUrl":"","translationId":1238,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":789,"title":"IaaS - storage","alias":"iaas-storage","description":"IaaS is an abbreviation that stands for Infrastructure as a Service (“infrastructure as a service”). This model provides for a cloud provider to provide the client with the necessary amount of computing resources - virtual servers, remote workstations, data warehouses, with or without the provision of software - and software deployment within the infrastructure remains the client's prerogative. In essence, IaaS is an alternative to renting physical servers, racks in the data center, operating systems; instead, the necessary resources are purchased with the ability to quickly scale them if necessary. In many cases, this model may be more profitable than the traditional purchase and installation of equipment, here are just a few examples:\r\n<ul><li>if the need for computing resources is not constant and can vary greatly depending on the period, and there is no desire to overpay for unused capacity;</li><li>when a company is just starting its way on the market and does not have working capital in order to buy all the necessary infrastructure - a frequent option among startups;</li><li>there is a rapid growth in business, and the network infrastructure must keep pace with it;</li><li>if you need to reduce the cost of purchasing and maintaining equipment;</li><li>when a new direction is launched, and it is necessary to test it without investing significant funds in resources.</li></ul>\r\nIaaS can be organized on the basis of a public or private cloud, as well as by combining two approaches - the so-called. “Hybrid cloud”, created using the appropriate software.","materialsDescription":" IaaS or Infrastructure as a service translated into Russian as “Infrastructure as a service”.\r\n"Infrastructure" in the case of IaaS, it can be virtual servers and networks, data warehouses, operating systems.\r\n“As a service” means that the cloud infrastructure components listed above are provided to you as a connected service.\r\nIaaS is a cloud infrastructure utilization model in which the computing power is provided to the client for independent management.\r\n<span style=\"font-weight: bold;\">What is the difference from PaaS and SaaS?</span>\r\nFrequently asked questions, what distinguishes IaaS, PaaS, SaaS from each other? What is the difference? Answering all questions, you decide to leave in the area of responsibility of its IT specialists. It requires only time and financial costs for your business.\r\n<span style=\"font-weight: bold;\">Who is responsible for what?</span>\r\nIn the case of using IaaS models, a company can independently use resources: install and run software, exercise control over systems, applications, and virtual storage systems.\r\nFor example, networks, servers, servers and servers. The IaaS service provider manages its own software and operating system, middleware and applications, is responsible for the infrastructure during the purchase, installation and configuration.\r\n<span style=\"font-weight: bold;\">Why do companies choose IaaS?</span>\r\nScaling capabilities. All users have access to resources, and you must use all the resources you need.\r\nCost savings. As a rule, the use of cloud services costs the company less than buying its own infrastructure.\r\nMobility. Ability to work with conventional applications.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IaaS_storage.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1242,"logo":false,"scheme":false,"title":"Amazon Relational Database Service (RDS)","vendorVerified":0,"rating":"2.00","implementationsCount":4,"suppliersCount":0,"alias":"amazon-relational-database-service-rds","companyTypes":[],"description":"Amazon Relational Database Service (Amazon RDS) makes it easy to set up, operate, and scale a relational database in the cloud. It provides cost-efficient and resizable capacity while automating time-consuming administration tasks such as hardware provisioning, database setup, patching and backups. It frees you to focus on your applications so you can give them the fast performance, high availability, security and compatibility they need.\r\nAmazon RDS is available on several database instance types - optimized for memory, performance or I/O - and provides you with six familiar database engines to choose from, including Amazon Aurora, PostgreSQL, MySQL, MariaDB, Oracle, and Microsoft SQL Server. You can use the AWS Database Migration Service to easily migrate or replicate your existing databases to Amazon RDS.\r\n<span style=\"font-weight: bold;\">Easy to Administer</span>\r\nAmazon RDS makes it easy to go from project conception to deployment. Use the AWS Management Console, the AWS RDS Command-Line Interface, or simple API calls to access the capabilities of a production-ready relational database in minutes. No need for infrastructure provisioning, and no need for installing and maintaining database software.\r\n<span style=\"font-weight: bold;\">Highly Scalable</span>\r\nYou can scale your database's compute and storage resources with only a few mouse clicks or an API call, often with no downtime. Many Amazon RDS engine types allow you to launch one or more Read Replicas to offload read traffic from your primary database instance.\r\n<span style=\"font-weight: bold;\">Available and Durable</span>\r\nAmazon RDS runs on the same highly reliable infrastructure used by other Amazon Web Services. When you provision a Multi-AZ DB Instance, Amazon RDS synchronously replicates the data to a standby instance in a different Availability Zone (AZ). Amazon RDS has many other features that enhance reliability for critical production databases, including automated backups, database snapshots, and automatic host replacement.\r\n<span style=\"font-weight: bold;\">Fast</span>\r\nAmazon RDS supports the most demanding database applications. You can choose between two SSD-backed storage options: one optimized for high-performance OLTP applications, and the other for cost-effective general-purpose use. In addition, Amazon Aurora provides performance on par with commercial databases at 1/10th the cost.\r\n<span style=\"font-weight: bold;\">Secure</span>\r\nAmazon RDS makes it easy to control network access to your database. Amazon RDS also lets you run your database instances in Amazon Virtual Private Cloud (Amazon VPC), which enables you to isolate your database instances and to connect to your existing IT infrastructure through an industry-standard encrypted IPsec VPN. Many Amazon RDS engine types offer encryption at rest and encryption in transit.\r\n<span style=\"font-weight: bold;\">Inexpensive</span>\r\nYou pay very low rates and only for the resources you actually consume. In addition, you benefit from the option of On-Demand pricing with no up-front or long-term commitments, or even lower hourly rates via our Reserved Instance pricing.","shortDescription":"Amazon Relational Database Service (RDS) is a managed relational database service with a choice of six popular database engines. Set up, operate, and scale a relational database in the cloud with just a few clicks.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Amazon Relational Database Service (RDS)","keywords":"Amazon, database, your, with, from, instance, types, infrastructure","description":"Amazon Relational Database Service (Amazon RDS) makes it easy to set up, operate, and scale a relational database in the cloud. It provides cost-efficient and resizable capacity while automating time-consuming administration tasks such as hardware provisioning","og:title":"Amazon Relational Database Service (RDS)","og:description":"Amazon Relational Database Service (Amazon RDS) makes it easy to set up, operate, and scale a relational database in the cloud. It provides cost-efficient and resizable capacity while automating time-consuming administration tasks such as hardware provisioning"},"eventUrl":"","translationId":1242,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":239,"title":"Relational Database Management Systems","alias":"relational-database-management-systems","description":" Relational Database Management System (RDBMS) is a DBMS designed specifically for relational databases. Therefore, RDBMSes are a subset of DBMSes.\r\nA relational database refers to a database that stores data in a structured format, using rows and columns. This makes it easy to locate and access specific values within the database. It is "relational" because the values within each table are related to each other. Tables may also be related to other tables. The relational structure makes it possible to run queries across multiple tables at once.\r\nWhile a relational database describes the type of database an RDMBS manages, the RDBMS refers to the database program itself. It is the software that executes queries on the data, including adding, updating, and searching for values.\r\nAn RDBMS may also provide a visual representation of the data. For example, it may display data in a tables like a spreadsheet, allowing you to view and even edit individual values in the table. Some relational database softwareallow you to create forms that can streamline entering, editing, and deleting data.\r\nMost well known DBMS applications fall into the RDBMS category. Examples include Oracle Database, MySQL, Microsoft SQL Server, and IBM DB2. Some of these programs support non-relational databases, but they are primarily used for relational database management.\r\nExamples of non-relational databases include Apache HBase, IBM Domino, and Oracle NoSQL Database. These type of databases are managed by other DMBS programs that support NoSQL, which do not fall into the RDBMS category.\r\nElements of the relational DBMS that overarch the basic relational database are so intrinsic to operations that it is hard to dissociate the two in practice.\r\nThe most basic features of RDBMS are related to create, read, update and delete operations, collectively known as CRUD. They form the foundation of a well-organized system that promotes consistent treatment of data.\r\nThe RDBMS typically provides data dictionaries and metadata collections useful in data handling. These programmatically support well-defined data structures and relationships. Data storage management is a common capability of the RDBMS, and this has come to be defined by data objects that range from binary large object (blob) strings to stored procedures. Data objects like this extend the scope of basic relational database operations and can be handled in a variety of ways in different RDBMSes.\r\nThe most common means of data access for the RDBMS is via SQL. Its main language components comprise data manipulation language (DML) and data definition language (DDL) statements. Extensions are available for development efforts that pair SQL use with common programming languages, such as COBOL (Common Business-Oriented Language), Java and .NET.\r\nRDBMSes use complex algorithms that support multiple concurrent user access to the database, while maintaining data integrity. Security management, which enforces policy-based access, is yet another overlay service that the RDBMS provides for the basic database as it is used in enterprise settings.\r\nRDBMSes support the work of database administrators (DBAs) who must manage and monitor database activity. Utilities help automate data loading and database backup. RDBMS systems manage log files that track system performance based on selected operational parameters. This enables measurement of database usage, capacity and performance, particularly query performance. RDBMSes provide graphical interfaces that help DBAs visualize database activity.\r\nRelational database management systems are central to key applications, such as banking ledgers, travel reservation systems and online retailing. As RDBMSes have matured, they have achieved increasingly higher levels of query optimization, and they have become key parts of reporting, analytics and data warehousing applications for businesses as well. \r\nRDBMSes are intrinsic to operations of a variety of enterprise applications and are at the center of most master data management (MDM) systems.<br /><br />","materialsDescription":"<h1 class=\"align-center\"> <span style=\"font-weight: normal;\">What are the advantages of a Relational Database Management System?</span></h1>\r\nA Relational Database Management System (RDBMS) is a software system that provides access to a relational database. The software system is a collection of software applications that can be used to create, maintain, manage and use the database. A "relational database" is a database structured on the "relational" model. Data are stored and presented in a tabular format, organized in rows and columns with one record per row.\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Data Structure.</span> The table format is simple and easy for database users to understand and use. Relational database management software provide data access using a natural structure and organization of the data. Database queries can search any column for matching entries.</li></ul>\r\n<dl></dl>\r\n<ul><li><span style=\"font-weight: bold;\">Multi-User Access.</span> RDBMS database program allow multiple database users to access a database simultaneously. Built-in locking and transactions management functionality allow users to access data as it is being changed, prevents collisions between two users updating the data, and keeps users from accessing partially updated records.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Privileges. </span>Authorization and privilege control features in an RDBMS allow the database administrator to restrict access to authorized users, and grant privileges to individual users based on the types of database tasks they need to perform. Authorization can be defined based on the remote client IP address in combination with user authorization, restricting access to specific external computer systems.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Network Access.</span> RDBMSs provide access to the database through a server daemon, a specialized software program that listens for requests on a network, and allows database clients to connect to and use the database. Users do not need to be able to log in to the physical computer system to use the database, providing convenience for the users and a layer of security for the database. Network access allows developers to build desktop tools and Web applications to interact with databases.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Speed.</span> The relational database model is not the fastest data structure. RDBMS software advantages, such as simplicity, make the slower speed a fair trade-off. Optimizations built into an RDBMS, and the design of the databases, enhance performance, allowing RDBMSs to perform more than fast enough for most applications and data sets. Improvements in technology, increasing processor speeds and decreasing memory and storage costs allow systems administrators to build incredibly fast systems that can overcome any database performance shortcomings.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Maintenance. </span>RDBMSs feature maintenance utilities that provide database administrators with tools to easily maintain, test, repair and back up the databases housed in the system. Many of the functions can be automated using built-in automation in the RDBMS, or automation tools available on the operating system.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Language.</span> RDBMSs support a generic language called "Structured Query Language" (SQL). The SQL syntax is simple, and the language uses standard English language keywords and phrasing, making it fairly intuitive and easy to learn. Many RDBMSs add non-SQL, database-specific keywords, functions and features to the SQL language.</li></ul>\r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Relational_Database_Management_Systems.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1244,"logo":false,"scheme":false,"title":"Amazon Virtual Private Cloud (VPC)","vendorVerified":0,"rating":"2.00","implementationsCount":5,"suppliersCount":0,"alias":"amazon-virtual-private-cloud-vpc","companyTypes":[],"description":"Amazon Virtual Private Cloud (Amazon VPC) lets you provision a logically isolated section of the AWS Cloud where you can launch AWS resources in a virtual network that you define. You have complete control over your virtual networking environment, including selection of your own IP address range, creation of subnets, and configuration of route tables and network gateways. You can use both IPv4 and IPv6 in your VPC for secure and easy access to resources and applications.\r\nYou can easily customize the network configuration for your Amazon VPC. For example, you can create a public-facing subnet for your web servers that has access to the Internet, and place your backend systems such as databases or application servers in a private-facing subnet with no Internet access. You can leverage multiple layers of security, including security groups and network access control lists, to help control access to Amazon EC2 instances in each subnet.\r\nAdditionally, you can create a Hardware Virtual Private Network (VPN) connection between your corporate data center and your VPC and leverage the AWS Cloud as an extension of your corporate data center.\r\n \r\n\r\n<span style=\"font-weight: bold;\">FEATURES</span>\r\nMULTIPLE CONNECTIVITY OPTIONS\r\nA variety of connectivity options exist for your Amazon VPC. You can connect your VPC to the Internet, to your data center, or other VPCs, based on the AWS resources that you want to expose publicly and those that you want to keep private.\r\n<ul><li>Connect directly to the Internet (public subnets)– You can launch instances into a publicly accessible subnet where they can send and receive traffic from the Internet.</li><li>Connect to the Internet using Network Address Translation (private subnets) – Private subnets can be used for instances that you do not want to be directly addressable from the Internet. Instances in a private subnet can access the Internet without exposing their private IP address by routing their traffic through a Network Address Translation (NAT) gateway in a public subnet.</li><li>Connect securely to your corporate datacenter– All traffic to and from instances in your VPC can be routed to your corporate datacenter over an industry standard, encrypted IPsec hardware VPN connection.</li><li>Connect privately to other VPCs- Peer VPCs together to share resources across multiple virtual networks owned by your or other AWS accounts.</li><li>Privately connect to AWS Services without using an Internet gateway, NAT or firewall proxy through a VPC Endpoint. Available AWS services include S3, DynamoDB, Kinesis Streams, Service Catalog, EC2 Systems Manager (SSM), Elastic Load Balancing (ELB) API, and Amazon Elastic Compute Cloud (EC2) API.</li><li>Privately connect to SaaS solutions supported by AWS PrivateLink.</li><li>Privately connect your internal services across different accounts and VPCs within your own organizations, significantly simplifying your internal network architecture.</li></ul>\r\nSECURE\r\nAmazon VPC provides advanced security features, such as security groups and network access control lists, to enable inbound and outbound filtering at the instance level and subnet level. In addition, you can store data in Amazon S3 and restrict access so that it’s only accessible from instances in your VPC. Optionally, you can also choose to launch Dedicated Instances which run on hardware dedicated to a single customer for additional isolation.\r\nSIMPLE\r\nYou can create a VPC quickly and easily using the AWS Management Console. You can select one of the common network setups that best match your needs and press "Start VPC Wizard." Subnets, IP ranges, route tables, and security groups are automatically created for you so you can concentrate on creating the applications to run in your VPC.\r\nALL THE SCALABILITY AND RELIABILITY OF AWS\r\nAmazon VPC provides all of the same benefits as the rest of the AWS platform. You can instantly scale your resources up or down, select Amazon EC2 instances types and sizes that are right for your applications, and pay only for the resources you use - all within Amazon’s proven infrastructure.","shortDescription":"Amazon Virtual Private Cloud - Provision a logically isolated section of the Amazon Web Services (AWS) Cloud where you can launch AWS resources in a virtual network that you define","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Amazon Virtual Private Cloud (VPC)","keywords":"your, Amazon, Internet, that, access, network, subnet, instances","description":"Amazon Virtual Private Cloud (Amazon VPC) lets you provision a logically isolated section of the AWS Cloud where you can launch AWS resources in a virtual network that you define. You have complete control over your virtual networking environment, including se","og:title":"Amazon Virtual Private Cloud (VPC)","og:description":"Amazon Virtual Private Cloud (Amazon VPC) lets you provision a logically isolated section of the AWS Cloud where you can launch AWS resources in a virtual network that you define. You have complete control over your virtual networking environment, including se"},"eventUrl":"","translationId":1244,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":2,"title":"Virtual machine and cloud system software","alias":"virtual-machine-and-cloud-system-software","description":" A virtual machine (VM) is a software-based computer that exists within another computer’s operating system, often used for the purposes of testing, backing up data, or running SaaS applications. To fully grasp how VMs work, it’s important to first understand how computer software and hardware are typically integrated by an operating system.\r\n"The cloud" refers to servers that are accessed over the Internet, and the software and databases that run on those servers. Cloud servers are located in data centers all over the world. By using cloud computing, users and companies don't have to manage physical servers themselves or run software applications on their own machines.\r\nThe cloud enables users to access the same files and applications from almost any device, because the computing and storage take place on servers in a data center, instead of locally on the user device. This is why a user can log into their Instagram account on a new phone after their old phone breaks and still find their old account in place, with all their photos, videos, and conversation history. It works the same way with cloud email providers like Gmail or Microsoft Office 365, and with cloud storage providers like Dropbox or Google Drive.\r\nFor businesses, switching to cloud computing removes some IT costs and overhead: for instance, they no longer need to update and maintain their own servers, as the cloud vendor they are using will do that. This especially makes an impact on small businesses that may not have been able to afford their own internal infrastructure but can outsource their infrastructure needs affordably via the cloud. The cloud can also make it easier for companies to operate internationally because employees and customers can access the same files and applications from any location.\r\nSeveral cloud providers offer virtual machines to their customers. These virtual machines typically live on powerful servers that can act as a host to multiple VMs and can be used for a variety of reasons that wouldn’t be practical with a locally-hosted VM. These include:\r\n<ul><li>Running SaaS applications - Software-as-a-Service, or SaaS for short, is a cloud-based method of providing software to users. SaaS users subscribe to an application rather than purchasing it once and installing it. These applications are generally served to the user over the Internet. Often, it is virtual machines in the cloud that are doing the computation for SaaS applications as well as delivering them to users. If the cloud provider has a geographically distributed network edge, then the application will run closer to the user, resulting in faster performance.</li><li>Backing up data - Cloud-based VM services are very popular for backing up data because the data can be accessed from anywhere. Plus, cloud VMs provide better redundancy, require less maintenance, and generally scale better than physical data centers. (For example, it’s generally fairly easy to buy an extra gigabyte of storage space from a cloud VM provider, but much more difficult to build a new local data server for that extra gigabyte of data.)</li><li>Hosting services like email and access management - Hosting these services on cloud VMs is generally faster and more cost-effective, and helps minimize maintenance and offload security concerns as well.</li></ul>","materialsDescription":"What is an operating system?\r\nTraditional computers are built out of physical hardware, including hard disk drives, processor chips, RAM, etc. In order to utilize this hardware, computers rely on a type of software known as an operating system (OS). Some common examples of OSes are Mac OSX, Microsoft Windows, Linux, and Android.\r\nThe OS is what manages the computer’s hardware in ways that are useful to the user. For example, if the user wants to access the Internet, the OS directs the network interface card to make the connection. If the user wants to download a file, the OS will partition space on the hard drive for that file. The OS also runs and manages other pieces of software. For example, it can run a web browser and provide the browser with enough random access memory (RAM) to operate smoothly. Typically, operating systems exist within a physical computer at a one-to-one ratio; for each machine, there is a single OS managing its physical resources.\r\n<span style=\"font-weight: bold;\">Can you have two or more operating systems on one computer?</span>\r\nSome users want to be able to run multiple operating systems simultaneously on one computer, either for testing or one of the other reasons listed in the section below. This can be achieved through a process called virtualization. In virtualization, a piece of software behaves as if it were an independent computer. This piece of software is called a virtual machine, also known as a ‘guest’ computer. (The computer on which the VM is running is called the ‘host’.) The guest has an OS as well as its own virtual hardware.\r\n‘Virtual hardware’ may sound like a bit of an oxymoron, but it works by mapping to real hardware on the host computer. For example, the VM’s ‘hard drive’ is really just a file on the host computer’s hard drive. When the VM wants to save a new file, it actually has to communicate with the host OS, which will write this file to the host hard drive. Because virtual hardware must perform this added step of negotiating with the host to access hardware resources, virtual machines can’t run quite as fast as their host computers.\r\nWith virtualization, one computer can run two or more operating systems. The number of VMs that can run on one host is limited only by the host’s available resources. The user can run the OS of a VM in a window like any other program, or they can run it in fullscreen so that it looks and feels like a genuine host OS.\r\n <span style=\"font-weight: bold; \">What are virtual machines used for?</span>\r\nSome of the most popular reasons people run virtual machines include:\r\n<span style=\"font-weight: bold; \">Testing</span> - Oftentimes software developers want to be able to test their applications in different environments. They can use virtual machines to run their applications in various OSes on one computer. This is simpler and more cost-effective than having to test on several different physical machines.\r\n<span style=\"font-weight: bold; \">Running software designed for other OSes</span> - Although certain software applications are only available for a single platform, a VM can run software designed for a different OS. For example, a Mac user who wants to run software designed for Windows can run a Windows VM on their Mac host.\r\n<span style=\"font-weight: bold; \">Running outdated software</span> - Some pieces of older software can’t be run in modern OSes. Users who want to run these applications can run an old OS on a virtual machine.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Virtual_machine_and_cloud_system_software.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1248,"logo":false,"scheme":false,"title":"Amazon ElastiCache","vendorVerified":0,"rating":"2.00","implementationsCount":1,"suppliersCount":0,"alias":"amazon-elasticache","companyTypes":[],"description":"Amazon ElastiCache offers fully managed Redis and Memcached. Seamlessly deploy, operate, and scale popular open source compatible in-memory data stores. Build data-intensive apps or improve the performance of your existing apps by retrieving data from high throughput and low latency in-memory data stores. Amazon ElastiCache is a popular choice for Gaming, Ad-Tech, Financial Services, Healthcare, and IoT apps.\r\n\r\n<span style=\"font-weight: bold; \">Benefits</span>\r\nEXTREME PERFORMANCE\r\nAmazon ElastiCache works as an in-memory data store and cache to support the most demanding applications requiring sub-millisecond response times. By utilizing an end-to-end optimized stack running on customer dedicated nodes, Amazon ElastiCache provides secure, blazing fast performance.\r\nFULLY MANAGED\r\nYou no longer need to perform management tasks such as hardware provisioning, software patching, setup, configuration, monitoring, failure recovery, and backups. ElastiCache continuously monitors your clusters to keep your workloads up and running so that you can focus on higher value application development.\r\nSCALABLE\r\nAmazon ElastiCache can scale-out, scale-in, and scale-up to meet fluctuating application demands. Write and memory scaling is supported with sharding. Replicas provide read scaling.\r\n\r\n<span style=\"font-weight: bold;\">Amazon ElastiCache Engines</span><br />\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Amazon ElastiCache for Redis</span></span><br />\r\nAmazon ElastiCache for Redis is a blazing fast in-memory data store that provides sub-millisecond latency to power internet-scale real-time applications. Built on open-source Redis and compatible with the Redis APIs, ElastiCache for Redis works with your Redis clients and uses the open Redis data format to store your data. Your self-managed Redis applications can work seamlessly with ElastiCache for Redis without any code changes. ElastiCache for Redis combines the speed, simplicity, and versatility of open-source Redis with manageability, security, and scalability from Amazon to power the most demanding real-time applications in Gaming, Ad-Tech, E-Commerce, Healthcare, Financial Services, and IoT.<br /><br /><span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Amazon ElastiCache for Memcached</span></span><br />Amazon ElastiCache for Memcached is a Memcached-compatible in-memory key-value store service that can be used as a cache or a data store. It delivers the performance, ease-of-use, and simplicity of Memcached. ElastiCache for Memcached is fully managed, scalable, and secure - making it an ideal candidate for use cases where frequently accessed data must be in-memory. It is a popular choice for use cases such as Web, Mobile Apps, Gaming, Ad-Tech, and E-Commerce.","shortDescription":"Amazon ElastiCache - Managed, in-memory data store services. Choose Redis or Memcached to power real-time applications.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Amazon ElastiCache","keywords":"ElastiCache, Amazon, data, your, in-memory, apps, stores, application","description":"Amazon ElastiCache offers fully managed Redis and Memcached. Seamlessly deploy, operate, and scale popular open source compatible in-memory data stores. Build data-intensive apps or improve the performance of your existing apps by retrieving data from high thr","og:title":"Amazon ElastiCache","og:description":"Amazon ElastiCache offers fully managed Redis and Memcached. Seamlessly deploy, operate, and scale popular open source compatible in-memory data stores. Build data-intensive apps or improve the performance of your existing apps by retrieving data from high thr"},"eventUrl":"","translationId":1248,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":325,"title":"Performance Management Software","alias":"performance-management-software","description":" <span style=\"font-weight: bold; \">Performance management software </span>— also referred to as a <span style=\"font-weight: bold; \">performance management system</span>— helps a company track, analyze, and evaluate its employees’ performance. is designed to improve business performance by spurring employee productivity. It works to ensure individual employees and teams are engaged and in alignment with organizational goals. Employee review software replaces an annual performance review process with real-time performance tracking, goal setting and feedback.\r\nPerformance management software systems are overseen by the HR department. They fit under the umbrella of <span style=\"font-style: italic; \">talent management systems.</span>\r\nAs next-generation HR software, performance management tools help companies address the modern goals of continually monitoring performance while giving employees feedback and support. Performance review software can track individual contributions to a team, as well as that team's ability to meet business objectives, thus tying performance into the company's bottom line.\r\nImproving employee engagement is another goal of performance management software. An employee can see current individual performance goals and their progress toward meeting them. This includes tracking efforts on specific projects. Managers measure individual performance against goals, and employees get a better idea of where they stand.\r\nThese systems use dashboards for quick and collaborative reviews. They can report individual performance, as well as project and team performance. The systems may also include employee ranking.\r\nAn effective performance management program must interact with other tools - in particular, workforce analytics. Data can be analyzed, for instance, against reporting from financial management systems and sales performance management systems.","materialsDescription":"<h1 class=\"align-center\">Why Implement Performance Management Software?</h1>\r\n<ul><li><span style=\"font-weight: bold; \">Easily-Navigable Dashboard </span></li></ul>\r\nThe top advantage to performance management tools are their ability to bring all key data and performance into one, organized location. Award-winning business performance management software do that. They make it easy to navigate the data and information and help leaders make better decisions for their workforce. \r\n<ul><li><span style=\"font-weight: bold; \">Performance Review Cycles </span></li></ul>\r\nTraditional annual review cycle or not, performance management system software can help coordinate, organize, schedule and store review information. The software will send reminders to leaders, manage permissions as leadership changes and provide structure to the overall process, including scripts based on company values and the employee’s role.\r\n<ul><li><span style=\"font-weight: bold; \">360 Degree and Peer Reviews </span></li></ul>\r\nPerformance and talent management tool can help ensure the process goes smoothly by providing structured and anonymous assessments. In some cases, there might be more than a few people involved in the performance review of one employee, so the software can track the progress of feedback to ensure each manager or leader has provided necessary input in a timely manner.\r\n<ul><li><span style=\"font-weight: bold; \">Customizable Review and Assessment Scripts </span></li></ul>\r\nIt is best practice to base performance on the unique values and goals of your organization, which means the annual review script should be different for a manager than it is for an executive, and nothing like the script of another organization. \r\n<ul><li><span style=\"font-weight: bold; \">Goal and Performance Tracking </span></li></ul>\r\nContinuous performance and goal tracking allows leadership to see the progress of projects clearly while keeping in mind which employees are hitting the mark and which need guidance. And because automated performance management system available to the employee as well, everyone will be on the same page and aligned to the work being done, even between departments in real-time.\r\n<ul><li><span style=\"font-weight: bold; \">Development & Succession Planning </span></li></ul>\r\nEmployees need continuous support in order to become effective contributors to the organization, especially in the long run. With performance management tools, you can track development progress, assign long term goals and ensure you understand the direction of talent and the business as a whole.\r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Performance_Management_Software.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1250,"logo":false,"scheme":false,"title":"AWS Lambda","vendorVerified":0,"rating":"2.00","implementationsCount":2,"suppliersCount":0,"alias":"amazon-lambda-function","companyTypes":[],"description":"AWS Lambda lets you run code without provisioning or managing servers. You pay only for the compute time you consume - there is no charge when your code is not running.\r\nYou can use AWS Lambda to extend other AWS services with custom logic, or create your own back-end services that operate at AWS scale, performance, and security. AWS Lambda can automatically run code in response to multiple events, such as HTTP requests via Amazon API Gateway, modifications to objects in Amazon S3 buckets, table updates in Amazon DynamoDB, and state transitions in AWS Step Functions.\r\nLambda runs your code on high-availability compute infrastructure and performs all the administration of the compute resources, including server and operating system maintenance, capacity provisioning and automatic scaling, code and security patch deployment, and code monitoring and logging. All you need to do is supply the code.\r\n<span style=\"font-weight: bold; \">Introducing AWS Lambda functions</span>\r\nThe code you run on AWS Lambda is called a “Lambda function.” After you create your Lambda function it is always ready to run as soon as it is triggered, similar to a formula in a spreadsheet. Each function includes your code as well as some associated configuration information, including the function name and resource requirements. Lambda functions are “stateless,” with no affinity to the underlying infrastructure, so that Lambda can rapidly launch as many copies of the function as needed to scale to the rate of incoming events.\r\nAfter you upload your code to AWS Lambda, you can associate your function with specific AWS resources (e.g. a particular Amazon S3 bucket, Amazon DynamoDB table, Amazon Kinesis stream, or Amazon SNS notification). Then, when the resource changes, Lambda will execute your function and manage the compute resources as needed in order to keep up with incoming requests.\r\n\r\n<span style=\"text-decoration: underline; \"><span style=\"font-weight: bold; \">KEY PRODUCT FEATURES</span></span>\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Extend other AWS services with custom logic</span></span>\r\nAWS Lambda allows you to add custom logic to AWS resources such as Amazon S3 buckets and Amazon DynamoDB tables, making it easy to apply compute to data as it is enters or moves through the cloud.\r\nIt is easy to get started with AWS Lambda. First you create your function by uploading your code (or building it right in the Lambda console) and choosing the memory, timeout period, and AWS Identity and Access Management (IAM) role. Then, you specify the AWS resource to trigger the function, either a particular Amazon S3 bucket, Amazon DynamoDB table, or Amazon Kinesis stream. When the resource changes, Lambda will run your function and launch and manage the compute resources as needed in order to keep up with incoming requests.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Build custom back-end services</span></span>\r\nYou can use AWS Lambda to create new back-end services for your applications that are triggered on-demand using the Lambda API or custom API endpoints built using Amazon API Gateway. By using Lambda to process custom events instead of servicing these on the client, you can avoid client platform variations, reduce battery drain, and enable easier updates.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Bring your own code</span></span>\r\nWith AWS Lambda, there are no new languages, tools, or frameworks to learn. You can use any third party library, even native ones. AWS Lambda supports Java, Node.js, C#, and Python code, with support for other languages coming in the future.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Completely automated administration</span></span>\r\nAWS Lambda manages all the infrastructure to run your code on highly available, fault-tolerant infrastructure, freeing you to focus on building differentiated back-end services. With Lambda, you never have to update the underlying OS when a patch is released, or worry about resizing or adding new servers as your usage grows. AWS Lambda seamlessly deploys your code, does all the administration, maintenance, and security patches, and provides built-in logging and monitoring through Amazon CloudWatch.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Built-in fault tolerance</span></span>\r\nLambda has built-in fault tolerance. AWS Lambda maintains compute capacity across multiple Availability Zones in each region to help protect your code against individual machine or data center facility failures. Both AWS Lambda and the functions running on the service provide predictable and reliable operational performance. AWS Lambda is designed to provide high availability for both the service itself and for the functions it operates. There are no maintenance windows or scheduled downtimes.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Automatic scaling</span></span>\r\nAWS Lambda invokes your code only when needed and automatically scales to support the rate of incoming requests without requiring you to configure anything. There is no limit to the number of requests your code can handle. AWS Lambda typically starts running your code within milliseconds of an event, and since Lambda scales automatically, the performance remains consistently high as the frequency of events increases. Since your code is stateless, Lambda can start as many instances of it as needed without lengthy deployment and configuration delays.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Run code in response to Amazon CloudFront requests</span></span>\r\nWith Lambda@Edge, AWS Lambda can run your code across AWS locations globally in response to Amazon CloudFront events, such as requests for content to or from origin servers and viewers. This makes it easier to deliver richer, more personalized content to your end users with lower latency.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Orchestrate multiple functions</span></span>\r\nYou can coordinate multiple AWS Lambda functions for complex or long-running tasks by building workflows with AWS Step Functions. Step Functions lets you define workflows that trigger a collection of Lambda functions using sequential, parallel, branching, and error-handling steps. With Step Functions and Lambda, you can build stateful, long-running processes for applications and backends.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Integrated security model</span></span>\r\nAWS Lambda allows your code to securely access other AWS services through its built-in AWS SDK and integration with AWS Identity and Access Management (IAM). AWS Lambda runs your code within a VPC by default. You can optionally also configure AWS Lambda to access resources behind your own VPC, allowing you to leverage custom security groups and network access control lists to provide your Lambda functions access to your resources within a VPC.\r\nWS Lambda is SOC, HIPAA, PCI, ISO compliant. For the latest in Lambda certification and compliance readiness, please see the full services in scope.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Pay per use</span></span>\r\nWith AWS Lambda you pay only for the requests served and the compute time required to run your code. Billing is metered in increments of 100 milliseconds, making it cost-effective and easy to scale automatically from a few requests per day to thousands per second.\r\n<span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">Flexible resource model</span></span>\r\nYou choose the amount of memory you want to allocate to your functions and AWS Lambda allocates proportional CPU power, network bandwidth, and disk I/O.\r\n<br /><span style=\"text-decoration: underline; \"><span style=\"font-weight: bold; \">BENEFITS</span></span>\r\n<span style=\"font-weight: bold; \">No servers to manage</span>\r\nAWS Lambda automatically runs your code without requiring you to provision or manage servers. Just write the code and upload it to Lambda.\r\n<span style=\"font-weight: bold; \">Continuous scaling</span>\r\nAWS Lambda automatically scales your application by running code in response to each trigger. Your code runs in parallel and processes each trigger individually, scaling precisely with the size of the workload.\r\n<span style=\"font-weight: bold; \">Subsecond metering</span>\r\nWith AWS Lambda, you are charged for every 100ms your code executes and the number of times your code is triggered. You don't pay anything when your code isn't running.\r\n\r\n","shortDescription":"AWS Lambda is a serverless compute service that runs your code in response to events and automatically manages the underlying compute resources for you.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"AWS Lambda","keywords":"code, your, Lambda, Amazon, compute, data, that, using","description":"AWS Lambda lets you run code without provisioning or managing servers. You pay only for the compute time you consume - there is no charge when your code is not running.\r\nYou can use AWS Lambda to extend other AWS services with custom logic, or create your own ","og:title":"AWS Lambda","og:description":"AWS Lambda lets you run code without provisioning or managing servers. You pay only for the compute time you consume - there is no charge when your code is not running.\r\nYou can use AWS Lambda to extend other AWS services with custom logic, or create your own "},"eventUrl":"","translationId":1250,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":325,"title":"Performance Management Software","alias":"performance-management-software","description":" <span style=\"font-weight: bold; \">Performance management software </span>— also referred to as a <span style=\"font-weight: bold; \">performance management system</span>— helps a company track, analyze, and evaluate its employees’ performance. is designed to improve business performance by spurring employee productivity. It works to ensure individual employees and teams are engaged and in alignment with organizational goals. Employee review software replaces an annual performance review process with real-time performance tracking, goal setting and feedback.\r\nPerformance management software systems are overseen by the HR department. They fit under the umbrella of <span style=\"font-style: italic; \">talent management systems.</span>\r\nAs next-generation HR software, performance management tools help companies address the modern goals of continually monitoring performance while giving employees feedback and support. Performance review software can track individual contributions to a team, as well as that team's ability to meet business objectives, thus tying performance into the company's bottom line.\r\nImproving employee engagement is another goal of performance management software. An employee can see current individual performance goals and their progress toward meeting them. This includes tracking efforts on specific projects. Managers measure individual performance against goals, and employees get a better idea of where they stand.\r\nThese systems use dashboards for quick and collaborative reviews. They can report individual performance, as well as project and team performance. The systems may also include employee ranking.\r\nAn effective performance management program must interact with other tools - in particular, workforce analytics. Data can be analyzed, for instance, against reporting from financial management systems and sales performance management systems.","materialsDescription":"<h1 class=\"align-center\">Why Implement Performance Management Software?</h1>\r\n<ul><li><span style=\"font-weight: bold; \">Easily-Navigable Dashboard </span></li></ul>\r\nThe top advantage to performance management tools are their ability to bring all key data and performance into one, organized location. Award-winning business performance management software do that. They make it easy to navigate the data and information and help leaders make better decisions for their workforce. \r\n<ul><li><span style=\"font-weight: bold; \">Performance Review Cycles </span></li></ul>\r\nTraditional annual review cycle or not, performance management system software can help coordinate, organize, schedule and store review information. The software will send reminders to leaders, manage permissions as leadership changes and provide structure to the overall process, including scripts based on company values and the employee’s role.\r\n<ul><li><span style=\"font-weight: bold; \">360 Degree and Peer Reviews </span></li></ul>\r\nPerformance and talent management tool can help ensure the process goes smoothly by providing structured and anonymous assessments. In some cases, there might be more than a few people involved in the performance review of one employee, so the software can track the progress of feedback to ensure each manager or leader has provided necessary input in a timely manner.\r\n<ul><li><span style=\"font-weight: bold; \">Customizable Review and Assessment Scripts </span></li></ul>\r\nIt is best practice to base performance on the unique values and goals of your organization, which means the annual review script should be different for a manager than it is for an executive, and nothing like the script of another organization. \r\n<ul><li><span style=\"font-weight: bold; \">Goal and Performance Tracking </span></li></ul>\r\nContinuous performance and goal tracking allows leadership to see the progress of projects clearly while keeping in mind which employees are hitting the mark and which need guidance. And because automated performance management system available to the employee as well, everyone will be on the same page and aligned to the work being done, even between departments in real-time.\r\n<ul><li><span style=\"font-weight: bold; \">Development & Succession Planning </span></li></ul>\r\nEmployees need continuous support in order to become effective contributors to the organization, especially in the long run. With performance management tools, you can track development progress, assign long term goals and ensure you understand the direction of talent and the business as a whole.\r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Performance_Management_Software.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1256,"logo":false,"scheme":false,"title":"Amazon Elastic Block Store (EBS)","vendorVerified":0,"rating":"2.00","implementationsCount":2,"suppliersCount":0,"alias":"amazon-elastic-block-store","companyTypes":[],"description":"Amazon Elastic Block Store (Amazon EBS) provides persistent block storage volumes for use with Amazon EC2 instances in the AWS Cloud. Each Amazon EBS volume is automatically replicated within its Availability Zone to protect you from component failure, offering high availability and durability. Amazon EBS volumes offer the consistent and low-latency performance needed to run your workloads. With Amazon EBS, you can scale your usage up or down within minutes – all while paying a low price for only what you provision.\r\nAmazon EBS is designed for application workloads that benefit from fine tuning for performance, cost and capacity. Typical use cases include Big Data analytics engines (like the Hadoop/HDFS ecosystem and Amazon EMR clusters), relational and NoSQL databases (like Microsoft SQL Server and MySQL or Cassandra and MongoDB), stream and log processing applications (like Kafka and Splunk), and data warehousing applications (like Vertica and Teradata).\r\n\r\n<span style=\"font-weight: bold;\">Amazon EBS Features</span>\r\nPersistent block storage for Amazon EC2 delivering capabilities and performance for the most demanding applications\r\n<span style=\"font-style: italic;\">High Performance Volumes</span>\r\nChoose between SSD-backed or HDD-backed volumes that can deliver the performance you need for your most demanding applications.\r\n<span style=\"font-style: italic;\">Availability</span>\r\nEach Amazon EBS volume is designed for 99.999% availability and automatically replicates within its Availability Zone to protect your applications from component failure.\r\n<span style=\"font-style: italic;\">Encryption</span>\r\nAmazon EBS encryption provides seamless support for data-at-rest and data-in-transit between EC2 instances and EBS volumes.\r\n<span style=\"font-style: italic;\">Access Management</span>\r\nAmazon’s flexible access control policies allow you to specify who can access which EBS volumes ensuring secure access to your data.\r\n<span style=\"font-style: italic;\">Snapshots</span>\r\nProtect your data by creating point-in-time snapshots of EBS volumes, which are backed up to Amazon S3 for long-term durability.\r\n<span style=\"font-style: italic;\">Elastic Volumes</span>\r\nDynamically increase capacity, tune performance, and change the type of live EBS volumes. \r\n\r\n<span style=\"font-weight: bold;\">Amazon EBS Benefits</span>\r\nHighly available, high performance, persistent block storage for Amazon EC2.\r\n<span style=\"font-style: italic;\">Reliable, Secure Storage</span>\r\nEach Amazon EBS volume provides redundancies within its Availability Zone to protect against failures. Encryption and access control policies deliver a strong defense-in-depth security strategy for your data.\r\n<span style=\"font-style: italic;\">Consistent, Low-latency Performance</span>\r\nAmazon EBS General Purpose (SSD) volumes and Amazon EBS Provisioned IOPS (SSD) volumes deliver low-latency through SSD technology and consistent I/O performance scaled to the needs of your application.\r\n<span style=\"font-style: italic;\">Backup, Restore, Innovate</span>\r\nProtect your data by taking point-in-time snapshots of your Amazon EBS volumes providing long-term durability for your data. Boost the agility of your business by using Amazon EBS snapshots to create new EC2 instances.\r\n<span style=\"font-style: italic;\">Quickly Scale Up, Easily Scale Down</span>\r\nAmazon EBS allows you to optimize your volumes for capacity, performance, or cost giving you the ability to dynamically adapt to the changing needs of your business.\r\n<span style=\"font-style: italic;\">Geographic Flexibility</span>\r\nAmazon EBS provides the ability to copy snapshots across AWS regions, enabling geographical expansion, data center migration, and disaster recovery providing flexibility and protecting for your business.\r\n<span style=\"font-style: italic;\">Optimized Performance</span>\r\nAn Amazon EBS–optimized instance provides dedicated network capacity for Amazon EBS volumes. This provides the best performance for your EBS volumes by minimizing network contention between EBS and your instance.","shortDescription":"Amazon Elastic Block Store is a persistent block storage for Amazon EC2","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Amazon Elastic Block Store (EBS)","keywords":"Amazon, your, volumes, performance, data, provides, applications, Availability","description":"Amazon Elastic Block Store (Amazon EBS) provides persistent block storage volumes for use with Amazon EC2 instances in the AWS Cloud. Each Amazon EBS volume is automatically replicated within its Availability Zone to protect you from component failure, offerin","og:title":"Amazon Elastic Block Store (EBS)","og:description":"Amazon Elastic Block Store (Amazon EBS) provides persistent block storage volumes for use with Amazon EC2 instances in the AWS Cloud. Each Amazon EBS volume is automatically replicated within its Availability Zone to protect you from component failure, offerin"},"eventUrl":"","translationId":1256,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":325,"title":"Performance Management Software","alias":"performance-management-software","description":" <span style=\"font-weight: bold; \">Performance management software </span>— also referred to as a <span style=\"font-weight: bold; \">performance management system</span>— helps a company track, analyze, and evaluate its employees’ performance. is designed to improve business performance by spurring employee productivity. It works to ensure individual employees and teams are engaged and in alignment with organizational goals. Employee review software replaces an annual performance review process with real-time performance tracking, goal setting and feedback.\r\nPerformance management software systems are overseen by the HR department. They fit under the umbrella of <span style=\"font-style: italic; \">talent management systems.</span>\r\nAs next-generation HR software, performance management tools help companies address the modern goals of continually monitoring performance while giving employees feedback and support. Performance review software can track individual contributions to a team, as well as that team's ability to meet business objectives, thus tying performance into the company's bottom line.\r\nImproving employee engagement is another goal of performance management software. An employee can see current individual performance goals and their progress toward meeting them. This includes tracking efforts on specific projects. Managers measure individual performance against goals, and employees get a better idea of where they stand.\r\nThese systems use dashboards for quick and collaborative reviews. They can report individual performance, as well as project and team performance. The systems may also include employee ranking.\r\nAn effective performance management program must interact with other tools - in particular, workforce analytics. Data can be analyzed, for instance, against reporting from financial management systems and sales performance management systems.","materialsDescription":"<h1 class=\"align-center\">Why Implement Performance Management Software?</h1>\r\n<ul><li><span style=\"font-weight: bold; \">Easily-Navigable Dashboard </span></li></ul>\r\nThe top advantage to performance management tools are their ability to bring all key data and performance into one, organized location. Award-winning business performance management software do that. They make it easy to navigate the data and information and help leaders make better decisions for their workforce. \r\n<ul><li><span style=\"font-weight: bold; \">Performance Review Cycles </span></li></ul>\r\nTraditional annual review cycle or not, performance management system software can help coordinate, organize, schedule and store review information. The software will send reminders to leaders, manage permissions as leadership changes and provide structure to the overall process, including scripts based on company values and the employee’s role.\r\n<ul><li><span style=\"font-weight: bold; \">360 Degree and Peer Reviews </span></li></ul>\r\nPerformance and talent management tool can help ensure the process goes smoothly by providing structured and anonymous assessments. In some cases, there might be more than a few people involved in the performance review of one employee, so the software can track the progress of feedback to ensure each manager or leader has provided necessary input in a timely manner.\r\n<ul><li><span style=\"font-weight: bold; \">Customizable Review and Assessment Scripts </span></li></ul>\r\nIt is best practice to base performance on the unique values and goals of your organization, which means the annual review script should be different for a manager than it is for an executive, and nothing like the script of another organization. \r\n<ul><li><span style=\"font-weight: bold; \">Goal and Performance Tracking </span></li></ul>\r\nContinuous performance and goal tracking allows leadership to see the progress of projects clearly while keeping in mind which employees are hitting the mark and which need guidance. And because automated performance management system available to the employee as well, everyone will be on the same page and aligned to the work being done, even between departments in real-time.\r\n<ul><li><span style=\"font-weight: bold; \">Development & Succession Planning </span></li></ul>\r\nEmployees need continuous support in order to become effective contributors to the organization, especially in the long run. With performance management tools, you can track development progress, assign long term goals and ensure you understand the direction of talent and the business as a whole.\r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Performance_Management_Software.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":3145,"logo":false,"scheme":false,"title":"Amazon CloudFront","vendorVerified":0,"rating":"0.00","implementationsCount":3,"suppliersCount":0,"alias":"amazon-cloudfront","companyTypes":[],"description":"Amazon CloudFront is a fast content delivery network (CDN) service that securely delivers data, videos, applications, and APIs to customers globally with low latency, high transfer speeds, all within a developer-friendly environment. CloudFront is integrated with AWS – both physical locations that are directly connected to the AWS global infrastructure, as well as other AWS services. CloudFront works seamlessly with services including AWS Shield for DDoS mitigation, Amazon S3, Elastic Load Balancing or Amazon EC2 as origins for your applications, and Lambda@Edge to run custom code closer to customers’ users and to customize the user experience.\r\nYou can get started with the Content Delivery Network in minutes, using the same AWS tools that you're already familiar with: APIs, AWS Management Console, AWS CloudFormation, CLIs, and SDKs. Amazon's CDN offers a simple, pay-as-you-go pricing model with no upfront fees or required long-term contracts, and support for the CDN is included in your existing AWS Support subscription.\r\n\r\n<span style=\"font-weight: bold;\">BENEFITS</span>\r\n<span style=\"font-weight: bold; \">Fast and global</span>\r\nThe Amazon CloudFront content delivery network (CDN) is massively scaled and globally distributed. The CloudFront network has 166 points of presence (PoPs), and leverages the highly-resilient Amazon backbone network for superior performance and availability for your end users.\r\n<span style=\"font-weight: bold; \">Security at the Edge</span>\r\nAmazon CloudFront is a highly-secure CDN that provides both network and application level protection. Your traffic and applications benefit through a variety of built-in protections such as AWS Shield Standard, at no additional cost. You can also use configurable features such as AWS Certificate Manager (ACM) to create and manage custom SSL certificates at no extra cost.\r\n<span style=\"font-weight: bold; \">Highly Programmable</span>\r\nAmazon CloudFront features can be customized for your specific application requirements. Lambda@Edge functions, triggered by CloudFront events, extend your custom code across AWS locations worldwide, allowing you to move even complex application logic closer to your end users to improve responsiveness. The CDN also supports integrations with other tools and automation interfaces for today's DevOps and CI/CD environments by using native APIs or AWS tools.\r\n<span style=\"font-weight: bold;\">Deep integration with AWS</span>\r\nAmazon CloudFront is integrated with AWS services such as Amazon S3, Amazon EC2, Elastic Load Balancing, Amazon Route 53, and AWS Elemental Media Services . They are all accessible via the same console and all features in the CDN can be programmatically configured by using APIs or the AWS Management Console. Lastly, if you use AWS origins such as Amazon S3, Amazon EC2 or Elastic Load Balancing, you don’t pay for any data transferred between these services and CloudFront.","shortDescription":"Amazon CloudFront is a fast, highly secure and programmable content delivery network (CDN)","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Amazon CloudFront","keywords":"","description":"Amazon CloudFront is a fast content delivery network (CDN) service that securely delivers data, videos, applications, and APIs to customers globally with low latency, high transfer speeds, all within a developer-friendly environment. CloudFront is integrated w","og:title":"Amazon CloudFront","og:description":"Amazon CloudFront is a fast content delivery network (CDN) service that securely delivers data, videos, applications, and APIs to customers globally with low latency, high transfer speeds, all within a developer-friendly environment. CloudFront is integrated w"},"eventUrl":"","translationId":3145,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":279,"title":"Content Applications","alias":"content-applications","description":" With the explosion of digital technology, your company must manage and share content across a growing number of online channels. Meanwhile, your teams demand easy and secure access to their organization’s valuable digital assets―from any place, at any time.\r\nContent management systems provide the tools needed to access, manage, retrieve, distribute and publish digital content. Digital content encompasses digital files including images, photos, presentations, documents, videos, multimedia and any other content.\r\nContent management tools in the Cloud provide efficient content life cycle management. The majority of companies require some form of online content management in order to create and share their content.\r\nThe process of content management begins with production. Enterprise content has many touch points for editing cycles, review stages, and the eventual publication, with each step crucial in producing high-quality content. Large organizations typically have a content manager that oversees this process and are successful by utilizing the best content management system.","materialsDescription":" <span style=\"font-weight: bold;\">What are the benefits of content management software?</span>\r\nChange is constant. Content management platforms contain everything you need to work in entirely new and better ways. Enterprise teams can boost productivity with easy-to-deploy cloud content management. Businesses can collaborate on digital files, share content between teams, preserve important digital assets, monitor content growth and access, connect teams with specific files, distribute digital assets across marketing channels like social media, ensure users and channels are always using latest versions, control rights management, and make sure decisions and work gets done fast.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Content_Applications.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":220,"title":"United States","name":"USA"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":7,"title":"Improve Customer Service"},{"id":262,"title":"Support Customers"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":180,"title":"Inability to forecast execution timelines"},{"id":340,"title":"Low quality of customer service"},{"id":370,"title":"No automated business processes"},{"id":373,"title":"IT infrastructure does not meet business tasks"},{"id":378,"title":"Low employee productivity"},{"id":382,"title":"High costs of IT personnel"},{"id":390,"title":"Low quality of customer support"},{"id":398,"title":"Poor communication and coordination among staff"},{"id":398,"title":"Poor communication and coordination among staff"},{"id":400,"title":"High costs"}]}},"categories":[{"id":689,"title":"Amazon Web Services","alias":"amazon-web-services","description":"Amazon Web Services (AWS) is a subsidiary of Amazon that provides on-demand cloud computing platforms to individuals, companies and governments, on a metered pay-as-you-go basis. In aggregate, these cloud computing web services provide a set of primitive, abstract technical infrastructure and distributed computing building blocks and tools. One of these services is Amazon Elastic Compute Cloud, which allows users to have at their disposal a virtual cluster of computers, available all the time, through the Internet. AWS's version of virtual computers emulate most of the attributes of a real computer including hardware (CPU(s) & GPU(s) for processing, local/RAM memory, hard-disk/SSD storage); a choice of operating systems; networking; and pre-loaded application software such as web servers, databases, CRM, etc.\r\nThe AWS technology is implemented at server farms throughout the world, and maintained by the Amazon subsidiary. Fees are based on a combination of usage, the hardware/OS/software/networking features chosen by the subscriber, required availability, redundancy, security, and service options. Subscribers can pay for a single virtual AWS computer, a dedicated physical computer, or clusters of either. As part of the subscription agreement, Amazon provides security for subscribers' system. AWS operates from many global geographical regions including 6 in North America.\r\nIn 2017, AWS comprised more than 90 services spanning a wide range including computing, storage, networking, database, analytics, application services, deployment, management, mobile, developer tools, and tools for the Internet of Things. The most popular include Amazon Elastic Compute Cloud (EC2) and Amazon Simple Storage Service (S3). Most services are not exposed directly to end users, but instead offer functionality through APIs for developers to use in their applications. Amazon Web Services' offerings are accessed over HTTP, using the REST architectural style and SOAP protocol.\r\nAmazon markets AWS to subscribers as a way of obtaining large scale computing capacity more quickly and cheaply than building an actual physical server farm. All services are billed based on usage, but each service measures usage in varying ways. As of 2017, AWS owns a dominant 34% of all cloud (IaaS, PaaS) while the next three competitors Microsoft, Google, and IBM have 11%, 8%, 6% respectively according to Synergy Group.","materialsDescription":"<span style=\"font-weight: bold;\">What is "Amazon Web Services" (AWS)?</span>\r\nWith Amazon Web Services (AWS), organizations can flexibly deploy storage space and computing capacity into Amazon's data centers without having to maintain their own hardware. A big advantage is that the infrastructure covers all dimensions for cloud computing. Whether it's video sharing, high-resolution photos, print data, or text documents, AWS can deliver IT resources on-demand, over the Internet, at a cost-per-use basis. The service exists since 2006 as a wholly owned subsidiary of Amazon Inc. The idea arose from the extensive experience with Amazon.com and the own need for platforms for web services in the cloud.\r\n<span style=\"font-weight: bold;\">What is Cloud Computing?</span>\r\nCloud Computing is a service that gives you access to expert-managed technology resources. The platform in the cloud provides the infrastructure (eg computing power, storage space) that does not have to be installed and configured in contrast to the hardware you have purchased yourself. Cloud computing only pays for the resources that are used. For example, a web shop can increase its computing power in the Christmas business and book less in "weak" months.\r\nAccess is via the Internet or VPN. There are no ongoing investment costs after the initial setup, but resources such as Virtual servers, databases or storage services are charged only after they have been used.\r\n<span style=\"font-weight: bold;\">Where is my data on Amazon AWS?</span>\r\nThere are currently eight Amazon Data Centers (AWS Regions) in different regions of the world. For each Amazon AWS resource, only the customer can decide where to use or store it. German customers typically use the data center in Ireland, which is governed by European law.\r\n<span style=\"font-weight: bold;\">How safe is my data on Amazon AWS?</span>\r\nThe customer data is stored in a highly secure infrastructure. Safety measures include, but are not limited to:\r\n<ul><li>Protection against DDos attacks (Distributed Denial of Service)</li><li>Defense against brute-force attacks on AWS accounts</li><li>Secure access: The access options are made via SSL.</li><li> Firewall: Output and access to the AWS data can be controlled.</li><li>Encrypted Data Storage: Data can be encrypted with Advanced Encryption Standard (AES) 256.</li><li>Certifications: Regular security review by independent certifications that AWS has undergone.</li></ul>\r\nEach Amazon data center (AWS region) consists of at least one Availability Zone. Availability Zones are stand-alone sub-sites that have been designed to be isolated from faults in other Availability Zones (independent power and data supply). Certain AWS resources, such as Database Services (RDS) or Storage Services (S3) automatically replicate your data within the AWS region to the different Availability Zones.\r\nAmazon AWS has appropriate certifications such as ISO27001 and has implemented a comprehensive security concept for the operation of its data center.\r\n<span style=\"font-weight: bold;\">Do I have to worry about hardware on Amazon AWS?</span>\r\nNo, all Amazon AWS resources are virtualized. Only Amazon takes care of the replacement and upgrade of hardware.\r\nNormally, you will not get anything out of defective hardware because defective storage media are exchanged by Amazon and since your data is stored multiple times redundantly, there is usually no problem either.\r\nIncidentally, if your chosen resources do not provide enough performance, you can easily get more CPU power from resources by just a few mouse clicks. You do not have to install anything new, just reboot your virtual machine or virtual database instance.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Amazon_Web_Services.png"},{"id":786,"title":"IaaS - computing","alias":"iaas-computing","description":"Cloud computing is the on demand availability of computer system resources, especially data storage and computing power, without direct active management by the user. The term is generally used to describe data centers available to many users over the Internet. Large clouds, predominant today, often have functions distributed over multiple locations from central servers. If the connection to the user is relatively close, it may be designated an edge server.\r\nInfrastructure as a service (IaaS) are online services that provide high-level APIs used to dereference various low-level details of underlying network infrastructure like physical computing resources, location, data partitioning, scaling, security, backup etc. A hypervisor, such as Xen, Oracle VirtualBox, Oracle VM, KVM, VMware ESX/ESXi, or Hyper-V, LXD, runs the virtual machines as guests. Pools of hypervisors within the cloud operational system can support large numbers of virtual machines and the ability to scale services up and down according to customers' varying requirements.\r\nTypically IaaS involve the use of a cloud orchestration technology like Open Stack, Apache Cloudstack or Open Nebula. This manages the creation of a virtual machine and decides on which hypervisor (i.e. physical host) to start it, enables VM migration features between hosts, allocates storage volumes and attaches them to VMs, usage information for billing and lots more.\r\nAn alternative to hypervisors are Linux containers, which run in isolated partitions of a single Linux kernel running directly on the physical hardware. Linux cgroups and namespaces are the underlying Linux kernel technologies used to isolate, secure and manage the containers. Containerisation offers higher performance than virtualization, because there is no hypervisor overhead. Also, container capacity auto-scales dynamically with computing load, which eliminates the problem of over-provisioning and enables usage-based billing.\r\nIaaS clouds often offer additional resources such as a virtual-machine disk-image library, raw block storage, file or object storage, firewalls, load balancers, IP addresses, virtual local area networks (VLANs), and software bundles.\r\nThe NIST's definition of cloud computing defines Infrastructure as a Service as:\r\n<ul><li>The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications.</li><li>The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, and deployed applications; and possibly limited control of select networking components (e.g., host firewalls).</li></ul>\r\nAccording to the Internet Engineering Task Force (IETF), the most basic cloud-service model is that of providers offering IT infrastructure — virtual machines and other resources — as a service to subscribers.\r\nIaaS-cloud providers supply these resources on-demand from their large pools of equipment installed in data centers. For wide-area connectivity, customers can use either the Internet or carrier clouds (dedicated virtual private networks). To deploy their applications, cloud users install operating-system images and their application software on the cloud infrastructure. In this model, the cloud user patches and maintains the operating systems and the application software. Cloud providers typically bill IaaS services on a utility computing basis: cost reflects the amount of resources allocated and consumed.","materialsDescription":" <span style=\"font-weight: bold; \">Cloud Computing Basics</span>\r\nWhether you are running applications that share photos to millions of mobile users or you’re supporting the critical operations of your business, a cloud services platform provides rapid access to flexible and low cost IT resources. With cloud computing, you don’t need to make large upfront investments in hardware and spend a lot of time on the heavy lifting of managing that hardware. Instead, you can provision exactly the right type and size of computing resources you need to power your newest bright idea or operate your IT department. You can access as many resources as you need, almost instantly, and only pay for what you use.\r\n<span style=\"font-weight: bold; \">How Does Cloud Computing Work?</span>\r\nCloud computing provides a simple way to access servers, storage, databases and a broad set of application services over the Internet. A Cloud services platform such as Amazon Web Services owns and maintains the network-connected hardware required for these application services, while you provision and use what you need via a web application.\r\n<span style=\"font-weight: bold; \">Six Advantages and Benefits of Cloud Computing</span>\r\n<span style=\"font-weight: bold; \">Trade capital expense for variable expense</span>\r\nInstead of having to invest heavily in data centers and servers before you know how you’re going to use them, you can only pay when you consume computing resources, and only pay for how much you consume.\r\n<span style=\"font-weight: bold; \">Benefit from massive economies of scale</span>\r\nBy using cloud computing, you can achieve a lower variable cost than you can get on your own. Because usage from hundreds of thousands of customers are aggregated in the cloud, providers can achieve higher economies of scale which translates into lower pay as you go prices.\r\n<span style=\"font-weight: bold; \">Stop guessing capacity</span>\r\nEliminate guessing on your infrastructure capacity needs. When you make a capacity decision prior to deploying an application, you often either end up sitting on expensive idle resources or dealing with limited capacity. With cloud computing, these problems go away. You can access as much or as little as you need, and scale up and down as required with only a few minutes notice.\r\n<span style=\"font-weight: bold; \">Increase speed and agility</span>\r\nIn a cloud computing environment, new IT resources are only ever a click away, which means you reduce the time it takes to make those resources available to your developers from weeks to just minutes. This results in a dramatic increase in agility for the organization, since the cost and time it takes to experiment and develop is significantly lower.\r\n<span style=\"font-weight: bold; \">Stop spending money on running and maintaining data centers</span>\r\nFocus on projects that differentiate your business, not the infrastructure. Cloud computing lets you focus on your own customers, rather than on the heavy lifting of racking, stacking and powering servers.\r\n<span style=\"font-weight: bold; \">Go global in minutes</span>\r\nEasily deploy your application in multiple regions around the world with just a few clicks. This means you can provide a lower latency and better experience for your customers simply and at minimal cost.\r\n<span style=\"font-weight: bold;\">Types of Cloud Computing</span>\r\nCloud computing has three main types that are commonly referred to as Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Selecting the right type of cloud computing for your needs can help you strike the right balance of control and the avoidance of undifferentiated heavy lifting.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IaaS_computing.png"},{"id":479,"title":"System Infrastructure Software","alias":"system-infrastructure-software","description":" System infrastructure software is a type of enterprise software or program designed to increase the IT performance of any organization. It provides various solutions to enterprises such as workforce support, business transactions, and internal services & processes. This software is used by various industry verticals to operate business functions efficiently and smoothly.\r\nAdvancements in cloud technologies and virtualization are expected to boost the market. Further, the rise in demand for automation and integrated approach in the business process is also anticipated to fuel the market. However, high implementation costs and the absence of a standardized framework are expected to hinder the growth of the market. Moreover, the adoption of bringing your own device (BYOD) is a major opportunity for key players in the system infrastructure software market.\r\nThe system infrastructure software market is segmented on the basis of type, application, industry vertical, and geography. Based on the type, the market is divided into system & network management software, security software, storage software, and system software. By application, the market is classified into building management systems, cloud integration, data center infrastructure management, integrated communication, network integration, and others. By industry vertical, the market is categorized into banking, financial services and insurance (BFSI), telecommunications & IT, transportation & logistics, oil & gas, manufacturing, retail, and others. By geography, it is analyzed across North America, Europe, Asia-Pacific, and LAMEA.<br /><br />","materialsDescription":" <span style=\"font-weight: bold;\">System Infrastructure Software Market Key Segments:</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">By Type</span></span>\r\n<ul><li>System & Network Management Software</li><li>Security Software</li><li>Storage Software</li><li>System Software</li></ul>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">By Application</span></span>\r\n<ul><li>Building Management System</li><li>Cloud Integration</li><li>Data Center Infrastructure Management</li><li>Integrated Communication</li><li>Network Integration</li><li>Others</li></ul>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">By Industry Vertical</span></span>\r\n<ul><li>Banking, Financial Services and Insurance (BFSI)</li><li>Telecommunications & IT</li><li>Transportation & Logistics</li><li>Oil & Gas</li><li>Manufacturing</li><li>Retail</li><li>Others </li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_System_Infrastructure_Software.png"},{"id":789,"title":"IaaS - storage","alias":"iaas-storage","description":"IaaS is an abbreviation that stands for Infrastructure as a Service (“infrastructure as a service”). This model provides for a cloud provider to provide the client with the necessary amount of computing resources - virtual servers, remote workstations, data warehouses, with or without the provision of software - and software deployment within the infrastructure remains the client's prerogative. In essence, IaaS is an alternative to renting physical servers, racks in the data center, operating systems; instead, the necessary resources are purchased with the ability to quickly scale them if necessary. In many cases, this model may be more profitable than the traditional purchase and installation of equipment, here are just a few examples:\r\n<ul><li>if the need for computing resources is not constant and can vary greatly depending on the period, and there is no desire to overpay for unused capacity;</li><li>when a company is just starting its way on the market and does not have working capital in order to buy all the necessary infrastructure - a frequent option among startups;</li><li>there is a rapid growth in business, and the network infrastructure must keep pace with it;</li><li>if you need to reduce the cost of purchasing and maintaining equipment;</li><li>when a new direction is launched, and it is necessary to test it without investing significant funds in resources.</li></ul>\r\nIaaS can be organized on the basis of a public or private cloud, as well as by combining two approaches - the so-called. “Hybrid cloud”, created using the appropriate software.","materialsDescription":" IaaS or Infrastructure as a service translated into Russian as “Infrastructure as a service”.\r\n"Infrastructure" in the case of IaaS, it can be virtual servers and networks, data warehouses, operating systems.\r\n“As a service” means that the cloud infrastructure components listed above are provided to you as a connected service.\r\nIaaS is a cloud infrastructure utilization model in which the computing power is provided to the client for independent management.\r\n<span style=\"font-weight: bold;\">What is the difference from PaaS and SaaS?</span>\r\nFrequently asked questions, what distinguishes IaaS, PaaS, SaaS from each other? What is the difference? Answering all questions, you decide to leave in the area of responsibility of its IT specialists. It requires only time and financial costs for your business.\r\n<span style=\"font-weight: bold;\">Who is responsible for what?</span>\r\nIn the case of using IaaS models, a company can independently use resources: install and run software, exercise control over systems, applications, and virtual storage systems.\r\nFor example, networks, servers, servers and servers. The IaaS service provider manages its own software and operating system, middleware and applications, is responsible for the infrastructure during the purchase, installation and configuration.\r\n<span style=\"font-weight: bold;\">Why do companies choose IaaS?</span>\r\nScaling capabilities. All users have access to resources, and you must use all the resources you need.\r\nCost savings. As a rule, the use of cloud services costs the company less than buying its own infrastructure.\r\nMobility. Ability to work with conventional applications.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IaaS_storage.png"},{"id":239,"title":"Relational Database Management Systems","alias":"relational-database-management-systems","description":" Relational Database Management System (RDBMS) is a DBMS designed specifically for relational databases. Therefore, RDBMSes are a subset of DBMSes.\r\nA relational database refers to a database that stores data in a structured format, using rows and columns. This makes it easy to locate and access specific values within the database. It is "relational" because the values within each table are related to each other. Tables may also be related to other tables. The relational structure makes it possible to run queries across multiple tables at once.\r\nWhile a relational database describes the type of database an RDMBS manages, the RDBMS refers to the database program itself. It is the software that executes queries on the data, including adding, updating, and searching for values.\r\nAn RDBMS may also provide a visual representation of the data. For example, it may display data in a tables like a spreadsheet, allowing you to view and even edit individual values in the table. Some relational database softwareallow you to create forms that can streamline entering, editing, and deleting data.\r\nMost well known DBMS applications fall into the RDBMS category. Examples include Oracle Database, MySQL, Microsoft SQL Server, and IBM DB2. Some of these programs support non-relational databases, but they are primarily used for relational database management.\r\nExamples of non-relational databases include Apache HBase, IBM Domino, and Oracle NoSQL Database. These type of databases are managed by other DMBS programs that support NoSQL, which do not fall into the RDBMS category.\r\nElements of the relational DBMS that overarch the basic relational database are so intrinsic to operations that it is hard to dissociate the two in practice.\r\nThe most basic features of RDBMS are related to create, read, update and delete operations, collectively known as CRUD. They form the foundation of a well-organized system that promotes consistent treatment of data.\r\nThe RDBMS typically provides data dictionaries and metadata collections useful in data handling. These programmatically support well-defined data structures and relationships. Data storage management is a common capability of the RDBMS, and this has come to be defined by data objects that range from binary large object (blob) strings to stored procedures. Data objects like this extend the scope of basic relational database operations and can be handled in a variety of ways in different RDBMSes.\r\nThe most common means of data access for the RDBMS is via SQL. Its main language components comprise data manipulation language (DML) and data definition language (DDL) statements. Extensions are available for development efforts that pair SQL use with common programming languages, such as COBOL (Common Business-Oriented Language), Java and .NET.\r\nRDBMSes use complex algorithms that support multiple concurrent user access to the database, while maintaining data integrity. Security management, which enforces policy-based access, is yet another overlay service that the RDBMS provides for the basic database as it is used in enterprise settings.\r\nRDBMSes support the work of database administrators (DBAs) who must manage and monitor database activity. Utilities help automate data loading and database backup. RDBMS systems manage log files that track system performance based on selected operational parameters. This enables measurement of database usage, capacity and performance, particularly query performance. RDBMSes provide graphical interfaces that help DBAs visualize database activity.\r\nRelational database management systems are central to key applications, such as banking ledgers, travel reservation systems and online retailing. As RDBMSes have matured, they have achieved increasingly higher levels of query optimization, and they have become key parts of reporting, analytics and data warehousing applications for businesses as well. \r\nRDBMSes are intrinsic to operations of a variety of enterprise applications and are at the center of most master data management (MDM) systems.<br /><br />","materialsDescription":"<h1 class=\"align-center\"> <span style=\"font-weight: normal;\">What are the advantages of a Relational Database Management System?</span></h1>\r\nA Relational Database Management System (RDBMS) is a software system that provides access to a relational database. The software system is a collection of software applications that can be used to create, maintain, manage and use the database. A "relational database" is a database structured on the "relational" model. Data are stored and presented in a tabular format, organized in rows and columns with one record per row.\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Data Structure.</span> The table format is simple and easy for database users to understand and use. Relational database management software provide data access using a natural structure and organization of the data. Database queries can search any column for matching entries.</li></ul>\r\n<dl></dl>\r\n<ul><li><span style=\"font-weight: bold;\">Multi-User Access.</span> RDBMS database program allow multiple database users to access a database simultaneously. Built-in locking and transactions management functionality allow users to access data as it is being changed, prevents collisions between two users updating the data, and keeps users from accessing partially updated records.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Privileges. </span>Authorization and privilege control features in an RDBMS allow the database administrator to restrict access to authorized users, and grant privileges to individual users based on the types of database tasks they need to perform. Authorization can be defined based on the remote client IP address in combination with user authorization, restricting access to specific external computer systems.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Network Access.</span> RDBMSs provide access to the database through a server daemon, a specialized software program that listens for requests on a network, and allows database clients to connect to and use the database. Users do not need to be able to log in to the physical computer system to use the database, providing convenience for the users and a layer of security for the database. Network access allows developers to build desktop tools and Web applications to interact with databases.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Speed.</span> The relational database model is not the fastest data structure. RDBMS software advantages, such as simplicity, make the slower speed a fair trade-off. Optimizations built into an RDBMS, and the design of the databases, enhance performance, allowing RDBMSs to perform more than fast enough for most applications and data sets. Improvements in technology, increasing processor speeds and decreasing memory and storage costs allow systems administrators to build incredibly fast systems that can overcome any database performance shortcomings.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Maintenance. </span>RDBMSs feature maintenance utilities that provide database administrators with tools to easily maintain, test, repair and back up the databases housed in the system. Many of the functions can be automated using built-in automation in the RDBMS, or automation tools available on the operating system.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Language.</span> RDBMSs support a generic language called "Structured Query Language" (SQL). The SQL syntax is simple, and the language uses standard English language keywords and phrasing, making it fairly intuitive and easy to learn. Many RDBMSs add non-SQL, database-specific keywords, functions and features to the SQL language.</li></ul>\r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Relational_Database_Management_Systems.png"},{"id":2,"title":"Virtual machine and cloud system software","alias":"virtual-machine-and-cloud-system-software","description":" A virtual machine (VM) is a software-based computer that exists within another computer’s operating system, often used for the purposes of testing, backing up data, or running SaaS applications. To fully grasp how VMs work, it’s important to first understand how computer software and hardware are typically integrated by an operating system.\r\n"The cloud" refers to servers that are accessed over the Internet, and the software and databases that run on those servers. Cloud servers are located in data centers all over the world. By using cloud computing, users and companies don't have to manage physical servers themselves or run software applications on their own machines.\r\nThe cloud enables users to access the same files and applications from almost any device, because the computing and storage take place on servers in a data center, instead of locally on the user device. This is why a user can log into their Instagram account on a new phone after their old phone breaks and still find their old account in place, with all their photos, videos, and conversation history. It works the same way with cloud email providers like Gmail or Microsoft Office 365, and with cloud storage providers like Dropbox or Google Drive.\r\nFor businesses, switching to cloud computing removes some IT costs and overhead: for instance, they no longer need to update and maintain their own servers, as the cloud vendor they are using will do that. This especially makes an impact on small businesses that may not have been able to afford their own internal infrastructure but can outsource their infrastructure needs affordably via the cloud. The cloud can also make it easier for companies to operate internationally because employees and customers can access the same files and applications from any location.\r\nSeveral cloud providers offer virtual machines to their customers. These virtual machines typically live on powerful servers that can act as a host to multiple VMs and can be used for a variety of reasons that wouldn’t be practical with a locally-hosted VM. These include:\r\n<ul><li>Running SaaS applications - Software-as-a-Service, or SaaS for short, is a cloud-based method of providing software to users. SaaS users subscribe to an application rather than purchasing it once and installing it. These applications are generally served to the user over the Internet. Often, it is virtual machines in the cloud that are doing the computation for SaaS applications as well as delivering them to users. If the cloud provider has a geographically distributed network edge, then the application will run closer to the user, resulting in faster performance.</li><li>Backing up data - Cloud-based VM services are very popular for backing up data because the data can be accessed from anywhere. Plus, cloud VMs provide better redundancy, require less maintenance, and generally scale better than physical data centers. (For example, it’s generally fairly easy to buy an extra gigabyte of storage space from a cloud VM provider, but much more difficult to build a new local data server for that extra gigabyte of data.)</li><li>Hosting services like email and access management - Hosting these services on cloud VMs is generally faster and more cost-effective, and helps minimize maintenance and offload security concerns as well.</li></ul>","materialsDescription":"What is an operating system?\r\nTraditional computers are built out of physical hardware, including hard disk drives, processor chips, RAM, etc. In order to utilize this hardware, computers rely on a type of software known as an operating system (OS). Some common examples of OSes are Mac OSX, Microsoft Windows, Linux, and Android.\r\nThe OS is what manages the computer’s hardware in ways that are useful to the user. For example, if the user wants to access the Internet, the OS directs the network interface card to make the connection. If the user wants to download a file, the OS will partition space on the hard drive for that file. The OS also runs and manages other pieces of software. For example, it can run a web browser and provide the browser with enough random access memory (RAM) to operate smoothly. Typically, operating systems exist within a physical computer at a one-to-one ratio; for each machine, there is a single OS managing its physical resources.\r\n<span style=\"font-weight: bold;\">Can you have two or more operating systems on one computer?</span>\r\nSome users want to be able to run multiple operating systems simultaneously on one computer, either for testing or one of the other reasons listed in the section below. This can be achieved through a process called virtualization. In virtualization, a piece of software behaves as if it were an independent computer. This piece of software is called a virtual machine, also known as a ‘guest’ computer. (The computer on which the VM is running is called the ‘host’.) The guest has an OS as well as its own virtual hardware.\r\n‘Virtual hardware’ may sound like a bit of an oxymoron, but it works by mapping to real hardware on the host computer. For example, the VM’s ‘hard drive’ is really just a file on the host computer’s hard drive. When the VM wants to save a new file, it actually has to communicate with the host OS, which will write this file to the host hard drive. Because virtual hardware must perform this added step of negotiating with the host to access hardware resources, virtual machines can’t run quite as fast as their host computers.\r\nWith virtualization, one computer can run two or more operating systems. The number of VMs that can run on one host is limited only by the host’s available resources. The user can run the OS of a VM in a window like any other program, or they can run it in fullscreen so that it looks and feels like a genuine host OS.\r\n <span style=\"font-weight: bold; \">What are virtual machines used for?</span>\r\nSome of the most popular reasons people run virtual machines include:\r\n<span style=\"font-weight: bold; \">Testing</span> - Oftentimes software developers want to be able to test their applications in different environments. They can use virtual machines to run their applications in various OSes on one computer. This is simpler and more cost-effective than having to test on several different physical machines.\r\n<span style=\"font-weight: bold; \">Running software designed for other OSes</span> - Although certain software applications are only available for a single platform, a VM can run software designed for a different OS. For example, a Mac user who wants to run software designed for Windows can run a Windows VM on their Mac host.\r\n<span style=\"font-weight: bold; \">Running outdated software</span> - Some pieces of older software can’t be run in modern OSes. Users who want to run these applications can run an old OS on a virtual machine.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Virtual_machine_and_cloud_system_software.png"},{"id":325,"title":"Performance Management Software","alias":"performance-management-software","description":" <span style=\"font-weight: bold; \">Performance management software </span>— also referred to as a <span style=\"font-weight: bold; \">performance management system</span>— helps a company track, analyze, and evaluate its employees’ performance. is designed to improve business performance by spurring employee productivity. It works to ensure individual employees and teams are engaged and in alignment with organizational goals. Employee review software replaces an annual performance review process with real-time performance tracking, goal setting and feedback.\r\nPerformance management software systems are overseen by the HR department. They fit under the umbrella of <span style=\"font-style: italic; \">talent management systems.</span>\r\nAs next-generation HR software, performance management tools help companies address the modern goals of continually monitoring performance while giving employees feedback and support. Performance review software can track individual contributions to a team, as well as that team's ability to meet business objectives, thus tying performance into the company's bottom line.\r\nImproving employee engagement is another goal of performance management software. An employee can see current individual performance goals and their progress toward meeting them. This includes tracking efforts on specific projects. Managers measure individual performance against goals, and employees get a better idea of where they stand.\r\nThese systems use dashboards for quick and collaborative reviews. They can report individual performance, as well as project and team performance. The systems may also include employee ranking.\r\nAn effective performance management program must interact with other tools - in particular, workforce analytics. Data can be analyzed, for instance, against reporting from financial management systems and sales performance management systems.","materialsDescription":"<h1 class=\"align-center\">Why Implement Performance Management Software?</h1>\r\n<ul><li><span style=\"font-weight: bold; \">Easily-Navigable Dashboard </span></li></ul>\r\nThe top advantage to performance management tools are their ability to bring all key data and performance into one, organized location. Award-winning business performance management software do that. They make it easy to navigate the data and information and help leaders make better decisions for their workforce. \r\n<ul><li><span style=\"font-weight: bold; \">Performance Review Cycles </span></li></ul>\r\nTraditional annual review cycle or not, performance management system software can help coordinate, organize, schedule and store review information. The software will send reminders to leaders, manage permissions as leadership changes and provide structure to the overall process, including scripts based on company values and the employee’s role.\r\n<ul><li><span style=\"font-weight: bold; \">360 Degree and Peer Reviews </span></li></ul>\r\nPerformance and talent management tool can help ensure the process goes smoothly by providing structured and anonymous assessments. In some cases, there might be more than a few people involved in the performance review of one employee, so the software can track the progress of feedback to ensure each manager or leader has provided necessary input in a timely manner.\r\n<ul><li><span style=\"font-weight: bold; \">Customizable Review and Assessment Scripts </span></li></ul>\r\nIt is best practice to base performance on the unique values and goals of your organization, which means the annual review script should be different for a manager than it is for an executive, and nothing like the script of another organization. \r\n<ul><li><span style=\"font-weight: bold; \">Goal and Performance Tracking </span></li></ul>\r\nContinuous performance and goal tracking allows leadership to see the progress of projects clearly while keeping in mind which employees are hitting the mark and which need guidance. And because automated performance management system available to the employee as well, everyone will be on the same page and aligned to the work being done, even between departments in real-time.\r\n<ul><li><span style=\"font-weight: bold; \">Development & Succession Planning </span></li></ul>\r\nEmployees need continuous support in order to become effective contributors to the organization, especially in the long run. With performance management tools, you can track development progress, assign long term goals and ensure you understand the direction of talent and the business as a whole.\r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Performance_Management_Software.png"},{"id":279,"title":"Content Applications","alias":"content-applications","description":" With the explosion of digital technology, your company must manage and share content across a growing number of online channels. Meanwhile, your teams demand easy and secure access to their organization’s valuable digital assets―from any place, at any time.\r\nContent management systems provide the tools needed to access, manage, retrieve, distribute and publish digital content. Digital content encompasses digital files including images, photos, presentations, documents, videos, multimedia and any other content.\r\nContent management tools in the Cloud provide efficient content life cycle management. The majority of companies require some form of online content management in order to create and share their content.\r\nThe process of content management begins with production. Enterprise content has many touch points for editing cycles, review stages, and the eventual publication, with each step crucial in producing high-quality content. Large organizations typically have a content manager that oversees this process and are successful by utilizing the best content management system.","materialsDescription":" <span style=\"font-weight: bold;\">What are the benefits of content management software?</span>\r\nChange is constant. Content management platforms contain everything you need to work in entirely new and better ways. Enterprise teams can boost productivity with easy-to-deploy cloud content management. Businesses can collaborate on digital files, share content between teams, preserve important digital assets, monitor content growth and access, connect teams with specific files, distribute digital assets across marketing channels like social media, ensure users and channels are always using latest versions, control rights management, and make sure decisions and work gets done fast.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Content_Applications.png"}],"additionalInfo":{"budgetNotExceeded":"-1","functionallyTaskAssignment":"-1","projectWasPut":"-1","price":0,"source":{"url":"https://aws.amazon.com/ru/solutions/case-studies/the-seattle-times/?nc1=h_ls","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},{"id":624,"title":"AWS for the leading online travel company","description":"Expedia Increases Agility and Resiliency by Going All In on AWS\r\nExpedia is all in on AWS, with plans to migrate 80 percent of its mission-critical apps from its on-premises data centers to the cloud in the next two to three years. By using AWS, Expedia has become more resilient. Expedia’s developers have been able to innovate faster while saving the company millions of dollars. Expedia provides travel-booking services across its flagship site Expedia.com and about 200 other travel-booking sites around the world.\r\n<p class=\"align-center\"><span style=\"font-weight: bold;\">About Expedia</span></p>\r\nExpedia, Inc. is a leading online travel company, providing leisure and business travel to customers worldwide. Expedia’s extensive brand portfolio includes Expedia.com, one of the world’s largest full service online travel agency, with sites localized for more than 20 countries; Hotels.com, the hotel specialist with sites in more than 60 countries; Hotwire.com, the hotel specialist with sites in more than 60 countries, and other travel brands. \r\nThe company delivers consumer value in leisure and business travel, drives incremental demand and direct bookings to travel suppliers, and provides advertisers the opportunity to reach a highly valuable audience of in-market travel consumers through Expedia Media Solutions. Expedia also powers bookings for some of the world’s leading airlines and hotels, top consumer brands, high traffic websites, and thousands of active affiliates through Expedia Affiliate Network.\r\n<p class=\"align-center\"><span style=\"font-weight: bold;\">The Challenge</span></p>\r\nExpedia is committed to continuous innovation, technology, and platform improvements to create a great experience for its customers. The Expedia Worldwide Engineering (EWE) organization supports all websites under the Expedia brand. Expedia began using Amazon Web Services (AWS) in 2010 to launch Expedia Suggest Service (ESS), a typeahead suggestion service that helps customers enter travel, search, and location information correctly. According to the company’s metrics, an error page is the main reason for site abandonment. Expedia wanted global users to find what they were looking for quickly and without errors. At the time, Expedia operated all its services from data centers in Chandler, AZ. The engineering team realized that they had to run ESS in locations physically close to customers to enable a quick and responsive service with minimal network latency.\r\n<span style=\"font-weight: bold;\">Why Amazon Web Services</span>\r\nExpedia considered on-premises virtualization solutions as well as other cloud providers, but ultimately chose Amazon Web Services (AWS) because it was the only solution with the global infrastructure in place to support Asia Pacific customers. \r\n<p class=\"align-center\"><span style=\"font-style: italic;\">“From an architectural perspective, infrastructure, automation, and proximity to the customer were key factors,” explains Murari Gopalan, Technology Director. “There was no way for us to solve the problem without AWS.”</span></p>\r\n<p class=\"align-center\"><span style=\"font-weight: bold;\">Launching ESS on AWS</span></p>\r\n<p class=\"align-center\"><span style=\"font-style: italic;\">“Using AWS, we were able to build and deliver the ESS service within three months,” says Magesh Chandramouli, Principal Architect. </span></p>\r\nESS uses algorithms based on customer location and aggregated shopping and booking data from past customers to display suggestions when a customer starts typing. For example, if a customer in Seattle entered sea when booking a flight, the service would display Seattle, SeaTac, and other relevant destinations. \r\nExpedia launched ESS instances initially in the Asia Pacific (Singapore) Region and then quickly replicated the service in the US West (Northern California) and EU (Ireland) Regions. Expedia engineers initially used Apache Lucene and other open source tools to build the service, but eventually developed powerful tools in-house to store indexes and queries. \r\nBy deploying ESS on AWS, Expedia was able to improve service to customers in the Asia Pacific region as well as Europe. \r\n<p class=\"align-center\"><span style=\"font-style: italic;\">“Latency was our biggest issue,” says Chandramouli. “Using AWS, we decreased average network latency from 700 milliseconds to less than 50 milliseconds.” </span></p>\r\n<p class=\"align-center\"><span style=\"font-weight: bold;\">Running Critical Applications on AWS</span></p>\r\nBy 2011, Expedia was running several critical, high-volumes applications on AWS, such as the Global Deals Engine (GDE). GDE delivers deals to its online partners and allows them to create custom websites and applications using Expedia APIs and product inventory tools. \r\nExpedia provisions Hadoop clusters using Amazon Elastic Map Reduce (Amazon EMR) to analyze and process streams of data coming from Expedia’s global network of websites, primarily clickstream, user interaction, and supply data, which is stored on Amazon Simple Storage Service (Amazon S3). Expedia processes approximately 240 requests per second. “The advantage of AWS is that we can use Auto Scaling to match load demand instead of having to maintain capacity for peak load in traditional datacenters,” comments Gopalan. Expedia uses AWS CloudFormation with Chef to deploy its entire front and backend stack into its Amazon Virtual Private Cloud (Amazon VPC) environment. Expedia uses a multi-region, multi-availability zone architecture with a proprietary DNS service to add resiliency to the applications. Figure 2 demonstrates the architecture of the GDE service on AWS.\r\nExpedia can add a new cluster to manage GDE and other high volume applications without worrying about the infrastructure. \r\n<p class=\"align-center\"><span style=\"font-style: italic;\">“If we had to host the same applications on our on-premises data center, we wouldn’t have the same level of CPU efficiency,” says Chandramouli. “If an application processes 3,000 requests per second, we would have to configure our physical servers to run at about 30 percent capacity to avoid boxes running hot. On AWS, we can push CPU consumption close to 70 percent because we can always scale out. Fundamentally, running in AWS enables a 230 percent CPU consumption efficiency in data processing. We run our critical applications on AWS because we can scale and use the infrastructure efficiently.”</span></p>\r\n<p class=\"align-center\"><span style=\"font-weight: bold;\">Using IAM to Manage Security</span></p>\r\nTo simplify the management of GDE, Expedia developed an identity federation broker that uses AWS Identity and Access Management (AWS IAM) and the AWS Security Token Service (AWS STS). The federation broker allows systems administrators and developers to use their existing Windows Active Directory (AD) accounts to single sign-on (SSO) to the AWS Management Console. In doing so, Expedia eliminates the need to create IAM users and maintain multiple environments where user identities are stored. Federation broker users sign into their Windows machines with their existing Active Directory credentials, browse to the federation broker, and transparently log into the AWS Management Console. This allows Expedia to enforce password and permissions management within their existing directory and to enforce group policies and other governance rules. Additionally, if an employee ever leaves the company or takes a different role, Expedia simply make changes to Active Directory to revoke or changes AWS permissions for the user instead of inside of AWS.\r\n<p class=\"align-center\"><span style=\"font-weight: bold;\">Standardizing Application Deployment</span></p>\r\nThe success of the ESS and GDE services sparked interest from other Expedia development teams, who began to use AWS for regional initiatives. By 2012, Expedia was hosting applications in the US East (Northern Virginia), EU (Ireland), Asia Pacific (Singapore), Asia Pacific (Tokyo), and US West (Northern California) Regions. Expedia Worldwide Engineering culled best practices from these initiatives to create a standardized deployment setup across all Regions. As Jun-Dai Bates-Kobashigawa, Principal Software Engineer explains, \r\n<p class=\"align-center\"><span style=\"font-style: italic;\">“We’re using Chef to automate the configuration of the Amazon Elastic Compute Cloud (Amazon EC2) servers. We can take any AWS image and use scripts stored in Chef to build a machine and spin up an instance customized for a team in just in a few minutes.”</span></p>\r\nThe team consolidated all AWS accounts under one AWS account and provisioned one Amazon VPC network in each Region. This allows each Region to have an isolated infrastructure with a separate firewall, application layer, and database layer. Expedia applies Amazon EC2 Security Group firewall settings to safeguard applications and services. Amazon VPC is completely integrated into Expedia’s lab and production environments. \r\n<p class=\"align-center\"><span style=\"font-style: italic;\">“The Amazon VPC experience for the developer is totally seamless,” says Bates-Kobashigawa. “Developers use the same Active Directory service for authentication and may not even know that some of the servers that they log onto are running on AWS. It feels like a physical infrastructure with its own subnets and multiple layers, and it’s also easy to connect to our on-premises infrastructure using VPN.”</span></p>\r\nExpedia uses a blue-green deployment approach to create parallel production environments on AWS, enabling continuous deployment and faster time-to-market. \r\n<p class=\"align-center\"><span style=\"font-style: italic;\">“One of our metrics for success is the reduction of time to deploy within our teams,” says Gopalan. “We use this method to launch applications pretty quickly compared to a traditional deployment. Moreover, reducing the cost of a rollback to zero means we can be fearless with deployments.” </span></p>\r\n<p class=\"align-center\"><span style=\"font-weight: bold;\">The Benefits</span></p>\r\nExpedia uses AWS to develop applications faster, scale to process large volumes of data, and troubleshoot issues quickly. By using AWS to build a standard deployment model, development teams can quickly create the infrastructure for new initiatives. Critical applications run in multiple Availability Zones in different Regions to ensure data is always available and to enable disaster recovery. Expedia Worldwide Engineering is working on building a monitoring infrastructure in all Regions and moving to a single infrastructure.\r\nGenerally, teams have more control over development and operations on AWS. When Expedia experienced conversion issues for its Client Logging service, engineers were able to track and identify critical issues within two days. Expedia estimates that it would have taken six weeks to find the script errors if the service ran in a physical environment. \r\nPreviously, Expedia had to provision servers for a full-load scenario in its data centers. \r\n<p class=\"align-center\"><span style=\"font-style: italic;\">“To deploy an application using our on-site facility, you have to think about the physical infrastructure,” Bates-Kobashigawa explains. “If there are 100 boxes running, you might have to take 20 boxes out to apply new code. Using AWS, we don’t have to take capacity out; we just add new capacity and send traffic to it.”</span></p>\r\n<p class=\"align-center\"><span style=\"font-style: italic;\">Chandramouli comments, “When I was developer, you didn’t want to invest in architecture if you didn’t know how the application would turn out. I had to plan upfront and build a proof of concept to present to stakeholders. By using AWS, I’m not bound by throughput limitations or CPU capacity. When I think of AWS, freedom is the first word that comes to mind.”</span></p>","alias":"aws-for-the-leading-online-travel-company","roi":0,"seo":{"title":"AWS for the leading online travel company","keywords":"","description":"Expedia Increases Agility and Resiliency by Going All In on AWS\r\nExpedia is all in on AWS, with plans to migrate 80 percent of its mission-critical apps from its on-premises data centers to the cloud in the next two to three years. By using AWS, Expedia has be","og:title":"AWS for the leading online travel company","og:description":"Expedia Increases Agility and Resiliency by Going All In on AWS\r\nExpedia is all in on AWS, with plans to migrate 80 percent of its mission-critical apps from its on-premises data centers to the cloud in the next two to three years. By using AWS, Expedia has be"},"deal_info":"","user":{"id":5047,"title":"Expedia Group","logoURL":"https://old.roi4cio.com/uploads/roi/company/Expedia_Group.jpg","alias":"expedia-group","address":"","roles":[],"description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Expedia Group is an American global travel technology company. Its websites, which are primarily travel fare aggregators and travel metasearch engines, include CarRentals.com, CheapTickets, Expedia.com, HomeAway, Hotels.com, Hotwire.com, Orbitz, Travelocity, trivago, and Venere.com.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">According to Rich Barton, the company's first CEO, the word "Expedia" is derived from a combination of exploration and speed.</span>\r\nSource: https://en.wikipedia.org/wiki/Expedia_Group","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.expedia.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Expedia Group","keywords":"","description":"<div><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Expedia Group is an American global travel technology company. Its websites, which are primarily travel fare aggregators and travel metasearch engines, include CarRenta","og:title":"Expedia Group","og:description":"<div><span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Expedia Group is an American global travel technology company. Its websites, which are primarily travel fare aggregators and travel metasearch engines, include CarRenta","og:image":"https://old.roi4cio.com/uploads/roi/company/Expedia_Group.jpg"},"eventUrl":""},"supplier":{"id":176,"title":"Amazon Web Services","logoURL":"https://old.roi4cio.com/uploads/roi/company/aws_logo.png","alias":"amazon-web-services","address":"","roles":[],"description":" <span lang=\"EN-US\">Amazon Web Services (AWS) is the world's largest cloud service provider. Since 2006, the company has been offering customers various elements of a virtual IT infrastructure in the form of web services. Today AWS offers about 70 cloud services deployed on the basis of more than a hundred of its own data centers located in the United States, Europe, Brazil, Singapore, Japan, and Australia. Services include computing power, secure storage, analytics, mobile applications, databases, IoT solutions, and more. Customers pay only for the services they consume, dynamically expanding or contracting cloud resources as needed.</span> \r\n<span lang=\"EN-US\"> </span>\r\n<span lang=\"EN-US\"><span lang=\"en\">Through</span></span> cloud computing, companies do not need to pre-plan the use of servers and other IT infrastructure and pay for all this for several weeks or months in advance. Instead, they can deploy hundreds or thousands of servers in minutes and achieve results quickly.\r\n<span lang=\"EN-US\"> </span>\r\n<span lang=\"EN-US\">Today, Amazon Web Services provides a highly reliable, scalable, infrastructure platform in the cloud that powers hundreds of thousands of organizations in every industry and government in nearly every country in the world.</span>","companyTypes":[],"products":{},"vendoredProductsCount":36,"suppliedProductsCount":36,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":18,"vendorImplementationsCount":20,"vendorPartnersCount":0,"supplierPartnersCount":4,"b4r":0,"categories":{},"companyUrl":"http://aws.amazon.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Amazon Web Services","keywords":"Amazon, services, known, computing, also, tools, Services, than","description":" <span lang=\"EN-US\">Amazon Web Services (AWS) is the world's largest cloud service provider. Since 2006, the company has been offering customers various elements of a virtual IT infrastructure in the form of web services. Today AWS offers about 70 cloud s","og:title":"Amazon Web Services","og:description":" <span lang=\"EN-US\">Amazon Web Services (AWS) is the world's largest cloud service provider. Since 2006, the company has been offering customers various elements of a virtual IT infrastructure in the form of web services. Today AWS offers about 70 cloud s","og:image":"https://old.roi4cio.com/uploads/roi/company/aws_logo.png"},"eventUrl":""},"vendors":[{"id":176,"title":"Amazon Web Services","logoURL":"https://old.roi4cio.com/uploads/roi/company/aws_logo.png","alias":"amazon-web-services","address":"","roles":[],"description":" <span lang=\"EN-US\">Amazon Web Services (AWS) is the world's largest cloud service provider. Since 2006, the company has been offering customers various elements of a virtual IT infrastructure in the form of web services. Today AWS offers about 70 cloud services deployed on the basis of more than a hundred of its own data centers located in the United States, Europe, Brazil, Singapore, Japan, and Australia. Services include computing power, secure storage, analytics, mobile applications, databases, IoT solutions, and more. Customers pay only for the services they consume, dynamically expanding or contracting cloud resources as needed.</span> \r\n<span lang=\"EN-US\"> </span>\r\n<span lang=\"EN-US\"><span lang=\"en\">Through</span></span> cloud computing, companies do not need to pre-plan the use of servers and other IT infrastructure and pay for all this for several weeks or months in advance. Instead, they can deploy hundreds or thousands of servers in minutes and achieve results quickly.\r\n<span lang=\"EN-US\"> </span>\r\n<span lang=\"EN-US\">Today, Amazon Web Services provides a highly reliable, scalable, infrastructure platform in the cloud that powers hundreds of thousands of organizations in every industry and government in nearly every country in the world.</span>","companyTypes":[],"products":{},"vendoredProductsCount":36,"suppliedProductsCount":36,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":18,"vendorImplementationsCount":20,"vendorPartnersCount":0,"supplierPartnersCount":4,"b4r":0,"categories":{},"companyUrl":"http://aws.amazon.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Amazon Web Services","keywords":"Amazon, services, known, computing, also, tools, Services, than","description":" <span lang=\"EN-US\">Amazon Web Services (AWS) is the world's largest cloud service provider. Since 2006, the company has been offering customers various elements of a virtual IT infrastructure in the form of web services. Today AWS offers about 70 cloud s","og:title":"Amazon Web Services","og:description":" <span lang=\"EN-US\">Amazon Web Services (AWS) is the world's largest cloud service provider. Since 2006, the company has been offering customers various elements of a virtual IT infrastructure in the form of web services. Today AWS offers about 70 cloud s","og:image":"https://old.roi4cio.com/uploads/roi/company/aws_logo.png"},"eventUrl":""}],"products":[{"id":1238,"logo":false,"scheme":false,"title":"Amazon S3","vendorVerified":0,"rating":"3.00","implementationsCount":7,"suppliersCount":0,"alias":"amazon-s3","companyTypes":[],"description":"Amazon Simple Storage Service (Amazon S3) is an object storage service that offers industry-leading scalability, data availability, security, and performance. This means customers of all sizes and industries can use it to store and protect any amount of data for a range of use cases, such as websites, mobile applications, backup and restore, archive, enterprise applications, IoT devices, and big data analytics. Amazon S3 provides easy-to-use management features so you can organize your data and configure finely-tuned access controls to meet your specific business, organizational, and compliance requirements. Amazon S3 is designed for 99.999999999% (11 9's) of durability, and stores data for millions of applications for companies all around the world.\r\n\r\n<span style=\"font-weight: bold; \">Main benefits:</span><span style=\"text-decoration: underline; \"><span style=\"font-weight: bold; \"><br /></span></span>\r\n<span style=\"font-weight: bold; \">Industry-leading performance, scalability, availability, and durability</span>\r\nScale your storage resources up and down to meet fluctuating demands, without upfront investments or resource procurement cycles. Amazon S3 is designed for 99.999999999% of data durability because it automatically creates and stores copies of all S3 objects across multiple systems. This means your data is available when needed and protected against failures, errors, and threats.\r\n<span style=\"font-weight: bold; \">Wide range of cost-effective storage classes</span>\r\nSave costs without sacrificing performance by storing data across the S3 Storage Classes, which support different data access levels at corresponding rates. You can use S3 Storage Class Analysis to discover data that should move to a lower-cost storage class based on access patterns, and configure an S3 Lifecycle policy to execute the transfer. You can also store data with changing or unknown access patterns in S3 Intelligent-Tiering, which tiers objects based on changing access patterns and automatically delivers cost savings.\r\n<span style=\"font-weight: bold; \">Unmatched security, compliance, and audit capabilities</span>\r\nStore your data in Amazon S3 and secure it from unauthorized access with encryption features and access management tools. You can also use Amazon Macie to identify sensitive data stored in your S3 buckets and detect irregular access requests. Amazon S3 maintains compliance programs, such as PCI-DSS, HIPAA/HITECH, FedRAMP, EU Data Protection Directive, and FISMA, to help you meet regulatory requirements. AWS also supports numerous auditing capabilities to monitor access requests to your S3 resources.\r\n<span style=\"font-weight: bold; \">Management tools for granular data control</span>\r\nClassify, manage, and report on your data using features, such as: S3 Storage Class Analysis to analyze access patterns; S3 Lifecycle policies to transfer objects to lower-cost storage classes; S3 Cross-Region Replication to replicate data into other regions; S3 Object Lock to apply retention dates to objects and protect them from deletion; and S3 Inventory to get visbility into your stored objects, their metadata, and encryption status. You can also use S3 Batch Operations to change object properties and perform storage management tasks for billions of objects. Since Amazon S3 works with AWS Lambda, you can log activities, define alerts, and automate workflows without managing additional infrastructure.\r\n<span style=\"font-weight: bold; \">Query-in-place services for analytics</span>\r\nRun big data analytics across your S3 objects (and other data sets in AWS) with our query-in-place services. Use Amazon Athena to query S3 data with standard SQL expressions and Amazon Redshift Spectrum to analyze data that is stored across your AWS data warehouses and S3 resources. You can also use S3 Select to retrieve subsets of object metadata, instead of the entire object, and improve query performance by up to 400%.\r\n<span style=\"font-weight: bold; \">Most supported cloud storage service</span>\r\nStore and protect your data in Amazon S3 by working with a partner from the AWS Partner Network (APN) — the largest community of technology and consulting cloud services providers. The APN recognizes migration partners that transfer data to Amazon S3 and storage partners that offer S3-integrated solutions for primary storage, backup and restore, archive, and disaster recovery. You can also purchase an AWS-integrated solution directly from the AWS Marketplace, which lists of hundreds storage-specific offerings.","shortDescription":"Amazon Simple Storage Service (Amazon S3) is an object storage service that offers industry-leading scalability, data availability, security, and performance.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Amazon S3","keywords":"data, Amazon, with, storage, that, from, most, cloud","description":"Amazon Simple Storage Service (Amazon S3) is an object storage service that offers industry-leading scalability, data availability, security, and performance. This means customers of all sizes and industries can use it to store and protect any amount of data f","og:title":"Amazon S3","og:description":"Amazon Simple Storage Service (Amazon S3) is an object storage service that offers industry-leading scalability, data availability, security, and performance. This means customers of all sizes and industries can use it to store and protect any amount of data f"},"eventUrl":"","translationId":1238,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":789,"title":"IaaS - storage","alias":"iaas-storage","description":"IaaS is an abbreviation that stands for Infrastructure as a Service (“infrastructure as a service”). This model provides for a cloud provider to provide the client with the necessary amount of computing resources - virtual servers, remote workstations, data warehouses, with or without the provision of software - and software deployment within the infrastructure remains the client's prerogative. In essence, IaaS is an alternative to renting physical servers, racks in the data center, operating systems; instead, the necessary resources are purchased with the ability to quickly scale them if necessary. In many cases, this model may be more profitable than the traditional purchase and installation of equipment, here are just a few examples:\r\n<ul><li>if the need for computing resources is not constant and can vary greatly depending on the period, and there is no desire to overpay for unused capacity;</li><li>when a company is just starting its way on the market and does not have working capital in order to buy all the necessary infrastructure - a frequent option among startups;</li><li>there is a rapid growth in business, and the network infrastructure must keep pace with it;</li><li>if you need to reduce the cost of purchasing and maintaining equipment;</li><li>when a new direction is launched, and it is necessary to test it without investing significant funds in resources.</li></ul>\r\nIaaS can be organized on the basis of a public or private cloud, as well as by combining two approaches - the so-called. “Hybrid cloud”, created using the appropriate software.","materialsDescription":" IaaS or Infrastructure as a service translated into Russian as “Infrastructure as a service”.\r\n"Infrastructure" in the case of IaaS, it can be virtual servers and networks, data warehouses, operating systems.\r\n“As a service” means that the cloud infrastructure components listed above are provided to you as a connected service.\r\nIaaS is a cloud infrastructure utilization model in which the computing power is provided to the client for independent management.\r\n<span style=\"font-weight: bold;\">What is the difference from PaaS and SaaS?</span>\r\nFrequently asked questions, what distinguishes IaaS, PaaS, SaaS from each other? What is the difference? Answering all questions, you decide to leave in the area of responsibility of its IT specialists. It requires only time and financial costs for your business.\r\n<span style=\"font-weight: bold;\">Who is responsible for what?</span>\r\nIn the case of using IaaS models, a company can independently use resources: install and run software, exercise control over systems, applications, and virtual storage systems.\r\nFor example, networks, servers, servers and servers. The IaaS service provider manages its own software and operating system, middleware and applications, is responsible for the infrastructure during the purchase, installation and configuration.\r\n<span style=\"font-weight: bold;\">Why do companies choose IaaS?</span>\r\nScaling capabilities. All users have access to resources, and you must use all the resources you need.\r\nCost savings. As a rule, the use of cloud services costs the company less than buying its own infrastructure.\r\nMobility. Ability to work with conventional applications.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IaaS_storage.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1244,"logo":false,"scheme":false,"title":"Amazon Virtual Private Cloud (VPC)","vendorVerified":0,"rating":"2.00","implementationsCount":5,"suppliersCount":0,"alias":"amazon-virtual-private-cloud-vpc","companyTypes":[],"description":"Amazon Virtual Private Cloud (Amazon VPC) lets you provision a logically isolated section of the AWS Cloud where you can launch AWS resources in a virtual network that you define. You have complete control over your virtual networking environment, including selection of your own IP address range, creation of subnets, and configuration of route tables and network gateways. You can use both IPv4 and IPv6 in your VPC for secure and easy access to resources and applications.\r\nYou can easily customize the network configuration for your Amazon VPC. For example, you can create a public-facing subnet for your web servers that has access to the Internet, and place your backend systems such as databases or application servers in a private-facing subnet with no Internet access. You can leverage multiple layers of security, including security groups and network access control lists, to help control access to Amazon EC2 instances in each subnet.\r\nAdditionally, you can create a Hardware Virtual Private Network (VPN) connection between your corporate data center and your VPC and leverage the AWS Cloud as an extension of your corporate data center.\r\n \r\n\r\n<span style=\"font-weight: bold;\">FEATURES</span>\r\nMULTIPLE CONNECTIVITY OPTIONS\r\nA variety of connectivity options exist for your Amazon VPC. You can connect your VPC to the Internet, to your data center, or other VPCs, based on the AWS resources that you want to expose publicly and those that you want to keep private.\r\n<ul><li>Connect directly to the Internet (public subnets)– You can launch instances into a publicly accessible subnet where they can send and receive traffic from the Internet.</li><li>Connect to the Internet using Network Address Translation (private subnets) – Private subnets can be used for instances that you do not want to be directly addressable from the Internet. Instances in a private subnet can access the Internet without exposing their private IP address by routing their traffic through a Network Address Translation (NAT) gateway in a public subnet.</li><li>Connect securely to your corporate datacenter– All traffic to and from instances in your VPC can be routed to your corporate datacenter over an industry standard, encrypted IPsec hardware VPN connection.</li><li>Connect privately to other VPCs- Peer VPCs together to share resources across multiple virtual networks owned by your or other AWS accounts.</li><li>Privately connect to AWS Services without using an Internet gateway, NAT or firewall proxy through a VPC Endpoint. Available AWS services include S3, DynamoDB, Kinesis Streams, Service Catalog, EC2 Systems Manager (SSM), Elastic Load Balancing (ELB) API, and Amazon Elastic Compute Cloud (EC2) API.</li><li>Privately connect to SaaS solutions supported by AWS PrivateLink.</li><li>Privately connect your internal services across different accounts and VPCs within your own organizations, significantly simplifying your internal network architecture.</li></ul>\r\nSECURE\r\nAmazon VPC provides advanced security features, such as security groups and network access control lists, to enable inbound and outbound filtering at the instance level and subnet level. In addition, you can store data in Amazon S3 and restrict access so that it’s only accessible from instances in your VPC. Optionally, you can also choose to launch Dedicated Instances which run on hardware dedicated to a single customer for additional isolation.\r\nSIMPLE\r\nYou can create a VPC quickly and easily using the AWS Management Console. You can select one of the common network setups that best match your needs and press "Start VPC Wizard." Subnets, IP ranges, route tables, and security groups are automatically created for you so you can concentrate on creating the applications to run in your VPC.\r\nALL THE SCALABILITY AND RELIABILITY OF AWS\r\nAmazon VPC provides all of the same benefits as the rest of the AWS platform. You can instantly scale your resources up or down, select Amazon EC2 instances types and sizes that are right for your applications, and pay only for the resources you use - all within Amazon’s proven infrastructure.","shortDescription":"Amazon Virtual Private Cloud - Provision a logically isolated section of the Amazon Web Services (AWS) Cloud where you can launch AWS resources in a virtual network that you define","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Amazon Virtual Private Cloud (VPC)","keywords":"your, Amazon, Internet, that, access, network, subnet, instances","description":"Amazon Virtual Private Cloud (Amazon VPC) lets you provision a logically isolated section of the AWS Cloud where you can launch AWS resources in a virtual network that you define. You have complete control over your virtual networking environment, including se","og:title":"Amazon Virtual Private Cloud (VPC)","og:description":"Amazon Virtual Private Cloud (Amazon VPC) lets you provision a logically isolated section of the AWS Cloud where you can launch AWS resources in a virtual network that you define. You have complete control over your virtual networking environment, including se"},"eventUrl":"","translationId":1244,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":2,"title":"Virtual machine and cloud system software","alias":"virtual-machine-and-cloud-system-software","description":" A virtual machine (VM) is a software-based computer that exists within another computer’s operating system, often used for the purposes of testing, backing up data, or running SaaS applications. To fully grasp how VMs work, it’s important to first understand how computer software and hardware are typically integrated by an operating system.\r\n"The cloud" refers to servers that are accessed over the Internet, and the software and databases that run on those servers. Cloud servers are located in data centers all over the world. By using cloud computing, users and companies don't have to manage physical servers themselves or run software applications on their own machines.\r\nThe cloud enables users to access the same files and applications from almost any device, because the computing and storage take place on servers in a data center, instead of locally on the user device. This is why a user can log into their Instagram account on a new phone after their old phone breaks and still find their old account in place, with all their photos, videos, and conversation history. It works the same way with cloud email providers like Gmail or Microsoft Office 365, and with cloud storage providers like Dropbox or Google Drive.\r\nFor businesses, switching to cloud computing removes some IT costs and overhead: for instance, they no longer need to update and maintain their own servers, as the cloud vendor they are using will do that. This especially makes an impact on small businesses that may not have been able to afford their own internal infrastructure but can outsource their infrastructure needs affordably via the cloud. The cloud can also make it easier for companies to operate internationally because employees and customers can access the same files and applications from any location.\r\nSeveral cloud providers offer virtual machines to their customers. These virtual machines typically live on powerful servers that can act as a host to multiple VMs and can be used for a variety of reasons that wouldn’t be practical with a locally-hosted VM. These include:\r\n<ul><li>Running SaaS applications - Software-as-a-Service, or SaaS for short, is a cloud-based method of providing software to users. SaaS users subscribe to an application rather than purchasing it once and installing it. These applications are generally served to the user over the Internet. Often, it is virtual machines in the cloud that are doing the computation for SaaS applications as well as delivering them to users. If the cloud provider has a geographically distributed network edge, then the application will run closer to the user, resulting in faster performance.</li><li>Backing up data - Cloud-based VM services are very popular for backing up data because the data can be accessed from anywhere. Plus, cloud VMs provide better redundancy, require less maintenance, and generally scale better than physical data centers. (For example, it’s generally fairly easy to buy an extra gigabyte of storage space from a cloud VM provider, but much more difficult to build a new local data server for that extra gigabyte of data.)</li><li>Hosting services like email and access management - Hosting these services on cloud VMs is generally faster and more cost-effective, and helps minimize maintenance and offload security concerns as well.</li></ul>","materialsDescription":"What is an operating system?\r\nTraditional computers are built out of physical hardware, including hard disk drives, processor chips, RAM, etc. In order to utilize this hardware, computers rely on a type of software known as an operating system (OS). Some common examples of OSes are Mac OSX, Microsoft Windows, Linux, and Android.\r\nThe OS is what manages the computer’s hardware in ways that are useful to the user. For example, if the user wants to access the Internet, the OS directs the network interface card to make the connection. If the user wants to download a file, the OS will partition space on the hard drive for that file. The OS also runs and manages other pieces of software. For example, it can run a web browser and provide the browser with enough random access memory (RAM) to operate smoothly. Typically, operating systems exist within a physical computer at a one-to-one ratio; for each machine, there is a single OS managing its physical resources.\r\n<span style=\"font-weight: bold;\">Can you have two or more operating systems on one computer?</span>\r\nSome users want to be able to run multiple operating systems simultaneously on one computer, either for testing or one of the other reasons listed in the section below. This can be achieved through a process called virtualization. In virtualization, a piece of software behaves as if it were an independent computer. This piece of software is called a virtual machine, also known as a ‘guest’ computer. (The computer on which the VM is running is called the ‘host’.) The guest has an OS as well as its own virtual hardware.\r\n‘Virtual hardware’ may sound like a bit of an oxymoron, but it works by mapping to real hardware on the host computer. For example, the VM’s ‘hard drive’ is really just a file on the host computer’s hard drive. When the VM wants to save a new file, it actually has to communicate with the host OS, which will write this file to the host hard drive. Because virtual hardware must perform this added step of negotiating with the host to access hardware resources, virtual machines can’t run quite as fast as their host computers.\r\nWith virtualization, one computer can run two or more operating systems. The number of VMs that can run on one host is limited only by the host’s available resources. The user can run the OS of a VM in a window like any other program, or they can run it in fullscreen so that it looks and feels like a genuine host OS.\r\n <span style=\"font-weight: bold; \">What are virtual machines used for?</span>\r\nSome of the most popular reasons people run virtual machines include:\r\n<span style=\"font-weight: bold; \">Testing</span> - Oftentimes software developers want to be able to test their applications in different environments. They can use virtual machines to run their applications in various OSes on one computer. This is simpler and more cost-effective than having to test on several different physical machines.\r\n<span style=\"font-weight: bold; \">Running software designed for other OSes</span> - Although certain software applications are only available for a single platform, a VM can run software designed for a different OS. For example, a Mac user who wants to run software designed for Windows can run a Windows VM on their Mac host.\r\n<span style=\"font-weight: bold; \">Running outdated software</span> - Some pieces of older software can’t be run in modern OSes. Users who want to run these applications can run an old OS on a virtual machine.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Virtual_machine_and_cloud_system_software.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":3113,"logo":false,"scheme":false,"title":"Amazon EMR","vendorVerified":0,"rating":"0.00","implementationsCount":3,"suppliersCount":0,"alias":"amazon-emr","companyTypes":[],"description":"Amazon EMR provides a managed Hadoop framework that makes it easy, fast, and cost-effective to process vast amounts of data across dynamically scalable Amazon EC2 instances. You can also run other popular distributed frameworks such as Apache Spark, HBase, Presto, and Flink in EMR, and interact with data in other AWS data stores such as Amazon S3 and Amazon DynamoDB. EMR Notebooks, based on the popular Jupyter Notebook, provide a development and collaboration environment for ad hoc querying and exploratory analysis.\r\nEMR securely and reliably handles a broad set of big data use cases, including log analysis, web indexing, data transformations (ETL), machine learning, financial analysis, scientific simulation, and bioinformatics.\r\n<p class=\"align-center\"> </p>\r\n<p class=\"align-center\"><span style=\"font-weight: bold;\">BENEFITS</span></p>\r\nEASY TO USE\r\nYou can launch an EMR cluster in minutes. You don’t need to worry about node provisioning, cluster setup, Hadoop configuration, or cluster tuning. EMR takes care of these tasks so you can focus on analysis. Data scientists, developers and analysts can also use EMR Notebooks, a managed environment based on Jupyter Notebook, to build applications and collaborate with peers.\r\nLOW COST\r\nEMR pricing is simple and predictable: You pay a per-instance rate for every second used, with a one-minute minimum charge. You can launch a 10-node EMR cluster with applications such as Hadoop, Spark, and Hive, for as little as $0.15 per hour. Because EMR has native support for Amazon EC2 Spot and Reserved Instances, you can also save 50-80% on the cost of the underlying instances.\r\nELASTIC\r\nWith EMR, you can provision one, hundreds, or thousands of compute instances to process data at any scale. You can easily increase or decrease the number of instances manually or with Auto Scaling, and you only pay for what you use. EMR also decouples compute instances and persistent storage, so they can be scaled independently.\r\nRELIABLE\r\nYou can spend less time tuning and monitoring your cluster. EMR has tuned Hadoop for the cloud; it also monitors your cluster — retrying failed tasks and automatically replacing poorly performing instances. EMR provides the latest stable open source software releases, so you don’t have to manage updates and bug fixes, leading to fewer issues and less effort to maintain the environment.\r\nSECURE\r\nEMR automatically configures EC2 firewall settings that control network access to instances, and you can launch clusters in an Amazon Virtual Private Cloud (VPC), a logically isolated network you define. For objects stored in S3, you can use S3 server-side encryption or Amazon S3 client-side encryption with EMRFS, with AWS Key Management Service or customer-managed keys. You can also easily enable other encryption options and authentication with Kerberos.\r\nFLEXIBLE\r\nYou have complete control over your cluster. You have root access to every instance, you can easily install additional applications, and you can customize every cluster with bootstrap actions. You can also launch EMR clusters with custom Amazon Linux AMIs.","shortDescription":"Easily Run and Scale Apache Spark, Hadoop, HBase, Presto, Hive, and other Big Data Frameworks","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Amazon EMR","keywords":"","description":"Amazon EMR provides a managed Hadoop framework that makes it easy, fast, and cost-effective to process vast amounts of data across dynamically scalable Amazon EC2 instances. You can also run other popular distributed frameworks such as Apache Spark, HBase, Pre","og:title":"Amazon EMR","og:description":"Amazon EMR provides a managed Hadoop framework that makes it easy, fast, and cost-effective to process vast amounts of data across dynamically scalable Amazon EC2 instances. You can also run other popular distributed frameworks such as Apache Spark, HBase, Pre"},"eventUrl":"","translationId":3113,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":39,"title":"IaaS - Infrastructure as a Service","alias":"iaas-infrastructure-as-a-service","description":"<span style=\"font-weight: bold;\">Infrastructure as a service</span> (IaaS) are online services that provide high-level APIs used to dereference various low-level details of underlying network infrastructure like physical computing resources, location, data partitioning, scaling, security, backup etc. A hypervisor, such as Xen, Oracle VirtualBox, Oracle VM, KVM, VMware ESX/ESXi, or Hyper-V, LXD, runs the virtual machines as guests. Pools of hypervisors within the cloud operational system can support large numbers of virtual machines and the ability to scale services up and down according to customers' varying requirements.\r\nTypically IaaS solutions involve the use of a cloud orchestration technology like Open Stack, Apache Cloudstack or Open Nebula. This manages the creation of a virtual machine and decides on which hypervisor (i.e. physical host) to start it, enables VM migration features between hosts, allocates storage volumes and attaches them to VMs, usage information for billing and lots more.\r\nAn alternative to hypervisors are Linux containers, which run in isolated partitions of a single Linux kernel running directly on the physical hardware. Linux cgroups and namespaces are the underlying Linux kernel technologies used to isolate, secure and manage the containers. Containerisation offers higher performance than virtualization, because there is no hypervisor overhead. Also, container capacity auto-scales dynamically with computing load, which eliminates the problem of over-provisioning and enables usage-based billing.\r\nIaaS clouds often offer additional resources such as a virtual-machine disk-image library, raw block storage, file or object storage, firewalls, load balancers, IP addresses, virtual local area networks (VLANs), and software bundles.\r\nAccording to the Internet Engineering Task Force (IETF), the most basic cloud-service model is that of providers offering IT infrastructure – virtual machines and other resources – as a service to subscribers.\r\nIaaS cloud providers supply these resources on-demand from their large pools of equipment installed in data centers. For wide-area connectivity, customers can use either the Internet or carrier clouds (dedicated virtual private networks). To deploy their applications, cloud users install operating-system images and their application software on the cloud infrastructure. In this model, the cloud user patches and maintains the operating systems and the application software. Cloud infrastructure providers typically bill IaaS services on a utility computing basis: cost reflects the amount of resources allocated and consumed.","materialsDescription":"<h1 class=\"align-center\"><span style=\"font-weight: bold; \">Infrastructure as a Service Benefits </span></h1>\r\n<span style=\"font-weight: bold; \">Cost savings:</span> An obvious benefit of moving to the managed IaaS model is lower infrastructure costs. No longer do organizations have the responsibility of ensuring uptime, maintaining hardware and networking equipment, or replacing old equipment. IaaS technology also saves enterprises from having to buy more capacity to deal with sudden business spikes. Organizations with a smaller IT infrastructure generally require a smaller IT staff as well. The pay-as-you-go model also provides significant cost savings. \r\n<span style=\"font-weight: bold; \">Scalability and flexibility:</span> One of the greatest benefits of IaaS is the ability to scale up and down quickly in response to an enterprise’s requirements. Infrastructure as a Service providers generally have the latest, most powerful storage, servers and networking technology to accommodate the needs of their customers. This on-demand scalability provides added flexibility and greater agility to respond to changing opportunities and requirements. \r\n<span style=\"font-weight: bold; \">Faster time to market:</span> Competition is strong in every sector, and time to market is one of the best ways to beat the competition. Because IaaS vendors elasticity and scalability, organizations can ramp up and get the job done (and the product or service to market) more rapidly.\r\n<span style=\"font-weight: bold; \">Support for DR, BC and high availability:</span> While every enterprise has some type of disaster recovery plan, the technology behind those plans is often expensive and unwieldy. Organizations with several disparate locations often have different disaster recovery and business continuity plans and technologies, making management virtually impossible.\r\n<span style=\"font-weight: bold; \">Focus on business growth:</span> Time, money and energy spent making technology decisions and hiring staff to manage and maintain the technology infrastructure is time not spent on growing the business. By moving infrastructure to a global infrastructure services, organizations can focus their time and resources where they belong, on developing innovations in applications and solutions.\r\n<h1 class=\"align-center\">IaaS, PaaS and SaaS: What’s the Difference?</h1>\r\nPlatform as a Service (PaaS) is the next step up from IaaS products, where the provider also supplies the operating environment including the operating system, application services, middleware and other ‘runtimes’ for cloud users. It’s used for development environments where the business can focus on creating an app but wants someone else to maintain the deployment platform. It means you have much simpler workloads but you can’t necessarily be as flexible as you want.\r\nAt the highest level of orchestration is Software as a Service. In SaaS infrastructure applications are accessed on demand. Here you just open your browser and go, consuming software rather than installing and running it. A user simply logs on to access the provider’s application. Users can decide how the app will work but pretty much everything else is the responsibility of the software provider.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IaaS.png"},{"id":786,"title":"IaaS - computing","alias":"iaas-computing","description":"Cloud computing is the on demand availability of computer system resources, especially data storage and computing power, without direct active management by the user. The term is generally used to describe data centers available to many users over the Internet. Large clouds, predominant today, often have functions distributed over multiple locations from central servers. If the connection to the user is relatively close, it may be designated an edge server.\r\nInfrastructure as a service (IaaS) are online services that provide high-level APIs used to dereference various low-level details of underlying network infrastructure like physical computing resources, location, data partitioning, scaling, security, backup etc. A hypervisor, such as Xen, Oracle VirtualBox, Oracle VM, KVM, VMware ESX/ESXi, or Hyper-V, LXD, runs the virtual machines as guests. Pools of hypervisors within the cloud operational system can support large numbers of virtual machines and the ability to scale services up and down according to customers' varying requirements.\r\nTypically IaaS involve the use of a cloud orchestration technology like Open Stack, Apache Cloudstack or Open Nebula. This manages the creation of a virtual machine and decides on which hypervisor (i.e. physical host) to start it, enables VM migration features between hosts, allocates storage volumes and attaches them to VMs, usage information for billing and lots more.\r\nAn alternative to hypervisors are Linux containers, which run in isolated partitions of a single Linux kernel running directly on the physical hardware. Linux cgroups and namespaces are the underlying Linux kernel technologies used to isolate, secure and manage the containers. Containerisation offers higher performance than virtualization, because there is no hypervisor overhead. Also, container capacity auto-scales dynamically with computing load, which eliminates the problem of over-provisioning and enables usage-based billing.\r\nIaaS clouds often offer additional resources such as a virtual-machine disk-image library, raw block storage, file or object storage, firewalls, load balancers, IP addresses, virtual local area networks (VLANs), and software bundles.\r\nThe NIST's definition of cloud computing defines Infrastructure as a Service as:\r\n<ul><li>The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications.</li><li>The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, and deployed applications; and possibly limited control of select networking components (e.g., host firewalls).</li></ul>\r\nAccording to the Internet Engineering Task Force (IETF), the most basic cloud-service model is that of providers offering IT infrastructure — virtual machines and other resources — as a service to subscribers.\r\nIaaS-cloud providers supply these resources on-demand from their large pools of equipment installed in data centers. For wide-area connectivity, customers can use either the Internet or carrier clouds (dedicated virtual private networks). To deploy their applications, cloud users install operating-system images and their application software on the cloud infrastructure. In this model, the cloud user patches and maintains the operating systems and the application software. Cloud providers typically bill IaaS services on a utility computing basis: cost reflects the amount of resources allocated and consumed.","materialsDescription":" <span style=\"font-weight: bold; \">Cloud Computing Basics</span>\r\nWhether you are running applications that share photos to millions of mobile users or you’re supporting the critical operations of your business, a cloud services platform provides rapid access to flexible and low cost IT resources. With cloud computing, you don’t need to make large upfront investments in hardware and spend a lot of time on the heavy lifting of managing that hardware. Instead, you can provision exactly the right type and size of computing resources you need to power your newest bright idea or operate your IT department. You can access as many resources as you need, almost instantly, and only pay for what you use.\r\n<span style=\"font-weight: bold; \">How Does Cloud Computing Work?</span>\r\nCloud computing provides a simple way to access servers, storage, databases and a broad set of application services over the Internet. A Cloud services platform such as Amazon Web Services owns and maintains the network-connected hardware required for these application services, while you provision and use what you need via a web application.\r\n<span style=\"font-weight: bold; \">Six Advantages and Benefits of Cloud Computing</span>\r\n<span style=\"font-weight: bold; \">Trade capital expense for variable expense</span>\r\nInstead of having to invest heavily in data centers and servers before you know how you’re going to use them, you can only pay when you consume computing resources, and only pay for how much you consume.\r\n<span style=\"font-weight: bold; \">Benefit from massive economies of scale</span>\r\nBy using cloud computing, you can achieve a lower variable cost than you can get on your own. Because usage from hundreds of thousands of customers are aggregated in the cloud, providers can achieve higher economies of scale which translates into lower pay as you go prices.\r\n<span style=\"font-weight: bold; \">Stop guessing capacity</span>\r\nEliminate guessing on your infrastructure capacity needs. When you make a capacity decision prior to deploying an application, you often either end up sitting on expensive idle resources or dealing with limited capacity. With cloud computing, these problems go away. You can access as much or as little as you need, and scale up and down as required with only a few minutes notice.\r\n<span style=\"font-weight: bold; \">Increase speed and agility</span>\r\nIn a cloud computing environment, new IT resources are only ever a click away, which means you reduce the time it takes to make those resources available to your developers from weeks to just minutes. This results in a dramatic increase in agility for the organization, since the cost and time it takes to experiment and develop is significantly lower.\r\n<span style=\"font-weight: bold; \">Stop spending money on running and maintaining data centers</span>\r\nFocus on projects that differentiate your business, not the infrastructure. Cloud computing lets you focus on your own customers, rather than on the heavy lifting of racking, stacking and powering servers.\r\n<span style=\"font-weight: bold; \">Go global in minutes</span>\r\nEasily deploy your application in multiple regions around the world with just a few clicks. This means you can provide a lower latency and better experience for your customers simply and at minimal cost.\r\n<span style=\"font-weight: bold;\">Types of Cloud Computing</span>\r\nCloud computing has three main types that are commonly referred to as Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Selecting the right type of cloud computing for your needs can help you strike the right balance of control and the avoidance of undifferentiated heavy lifting.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IaaS_computing.png"},{"id":789,"title":"IaaS - storage","alias":"iaas-storage","description":"IaaS is an abbreviation that stands for Infrastructure as a Service (“infrastructure as a service”). This model provides for a cloud provider to provide the client with the necessary amount of computing resources - virtual servers, remote workstations, data warehouses, with or without the provision of software - and software deployment within the infrastructure remains the client's prerogative. In essence, IaaS is an alternative to renting physical servers, racks in the data center, operating systems; instead, the necessary resources are purchased with the ability to quickly scale them if necessary. In many cases, this model may be more profitable than the traditional purchase and installation of equipment, here are just a few examples:\r\n<ul><li>if the need for computing resources is not constant and can vary greatly depending on the period, and there is no desire to overpay for unused capacity;</li><li>when a company is just starting its way on the market and does not have working capital in order to buy all the necessary infrastructure - a frequent option among startups;</li><li>there is a rapid growth in business, and the network infrastructure must keep pace with it;</li><li>if you need to reduce the cost of purchasing and maintaining equipment;</li><li>when a new direction is launched, and it is necessary to test it without investing significant funds in resources.</li></ul>\r\nIaaS can be organized on the basis of a public or private cloud, as well as by combining two approaches - the so-called. “Hybrid cloud”, created using the appropriate software.","materialsDescription":" IaaS or Infrastructure as a service translated into Russian as “Infrastructure as a service”.\r\n"Infrastructure" in the case of IaaS, it can be virtual servers and networks, data warehouses, operating systems.\r\n“As a service” means that the cloud infrastructure components listed above are provided to you as a connected service.\r\nIaaS is a cloud infrastructure utilization model in which the computing power is provided to the client for independent management.\r\n<span style=\"font-weight: bold;\">What is the difference from PaaS and SaaS?</span>\r\nFrequently asked questions, what distinguishes IaaS, PaaS, SaaS from each other? What is the difference? Answering all questions, you decide to leave in the area of responsibility of its IT specialists. It requires only time and financial costs for your business.\r\n<span style=\"font-weight: bold;\">Who is responsible for what?</span>\r\nIn the case of using IaaS models, a company can independently use resources: install and run software, exercise control over systems, applications, and virtual storage systems.\r\nFor example, networks, servers, servers and servers. The IaaS service provider manages its own software and operating system, middleware and applications, is responsible for the infrastructure during the purchase, installation and configuration.\r\n<span style=\"font-weight: bold;\">Why do companies choose IaaS?</span>\r\nScaling capabilities. All users have access to resources, and you must use all the resources you need.\r\nCost savings. As a rule, the use of cloud services costs the company less than buying its own infrastructure.\r\nMobility. Ability to work with conventional applications.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IaaS_storage.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":3115,"logo":false,"scheme":false,"title":"AWS Auto Scaling","vendorVerified":0,"rating":"0.00","implementationsCount":1,"suppliersCount":0,"alias":"aws-auto-scaling","companyTypes":[],"description":"AWS Auto Scaling monitors your applications and automatically adjusts capacity to maintain steady, predictable performance at the lowest possible cost. Using AWS Auto Scaling, it’s easy to setup application scaling for multiple resources across multiple services in minutes. The service provides a simple, powerful user interface that lets you build scaling plans for resources including Amazon EC2 instances and Spot Fleets, Amazon ECS tasks, Amazon DynamoDB tables and indexes, and Amazon Aurora Replicas. AWS Auto Scaling makes scaling simple with recommendations that allow you to optimize performance, costs, or balance between them. If you’re already using Amazon EC2 Auto Scaling to dynamically scale your Amazon EC2 instances, you can now combine it with AWS Auto Scaling to scale additional resources for other AWS services. With AWS Auto Scaling, your applications always have the right resources at the right time.\r\nIt’s easy to get started with AWS Auto Scaling using the AWS Management Console, Command Line Interface (CLI), or SDK. AWS Auto Scaling is available at no additional charge. You pay only for the AWS resources needed to run your applications and Amazon CloudWatch monitoring fees.\r\n<p class=\"align-center\"><span style=\"font-weight: bold;\">Benefits</span></p>\r\nSETUP SCALING QUICKLY\r\nAWS Auto Scaling lets you set target utilization levels for multiple resources in a single, intuitive interface. You can quickly see the average utilization of all of your scalable resources without having to navigate to other consoles. For example, if your application uses Amazon EC2 and Amazon DynamoDB, you can use AWS Auto Scaling to manage resource provisioning for all of the EC2 Auto Scaling groups and database tables in your application.\r\nMAKE SMART SCALING DECISIONS\r\nAWS Auto Scaling lets you build scaling plans that automate how groups of different resources respond to changes in demand. You can optimize availability, costs, or a balance of both. AWS Auto Scaling automatically creates all of the scaling policies and sets targets for you based on your preference. AWS Auto Scaling monitors your application and automatically adds or removes capacity from your resource groups in real-time as demands change.\r\nAUTOMATICALLY MAINTAIN PERFORMANCE\r\nUsing AWS Auto Scaling, you maintain optimal application performance and availability, even when workloads are periodic, unpredictable, or continuously changing. AWS Auto Scaling continually monitors your applications to make sure that they are operating at your desired performance levels. When demand spikes, AWS Auto Scaling automatically increases the capacity of constrained resources so you maintain a high quality of service.\r\nPAY ONLY FOR WHAT YOU NEED\r\nAWS Auto Scaling can help you optimize your utilization and cost efficiencies when consuming AWS services so you only pay for the resources you actually need. When demand drops, AWS Auto Scaling will automatically remove any excess resource capacity so you avoid overspending. AWS Auto Scaling is free to use, and allows you to optimize the costs of your AWS environment.","shortDescription":"Application scaling to optimize performance and costs\r\n","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"AWS Auto Scaling","keywords":"","description":"AWS Auto Scaling monitors your applications and automatically adjusts capacity to maintain steady, predictable performance at the lowest possible cost. Using AWS Auto Scaling, it’s easy to setup application scaling for multiple resources across multiple servic","og:title":"AWS Auto Scaling","og:description":"AWS Auto Scaling monitors your applications and automatically adjusts capacity to maintain steady, predictable performance at the lowest possible cost. Using AWS Auto Scaling, it’s easy to setup application scaling for multiple resources across multiple servic"},"eventUrl":"","translationId":3115,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":39,"title":"IaaS - Infrastructure as a Service","alias":"iaas-infrastructure-as-a-service","description":"<span style=\"font-weight: bold;\">Infrastructure as a service</span> (IaaS) are online services that provide high-level APIs used to dereference various low-level details of underlying network infrastructure like physical computing resources, location, data partitioning, scaling, security, backup etc. A hypervisor, such as Xen, Oracle VirtualBox, Oracle VM, KVM, VMware ESX/ESXi, or Hyper-V, LXD, runs the virtual machines as guests. Pools of hypervisors within the cloud operational system can support large numbers of virtual machines and the ability to scale services up and down according to customers' varying requirements.\r\nTypically IaaS solutions involve the use of a cloud orchestration technology like Open Stack, Apache Cloudstack or Open Nebula. This manages the creation of a virtual machine and decides on which hypervisor (i.e. physical host) to start it, enables VM migration features between hosts, allocates storage volumes and attaches them to VMs, usage information for billing and lots more.\r\nAn alternative to hypervisors are Linux containers, which run in isolated partitions of a single Linux kernel running directly on the physical hardware. Linux cgroups and namespaces are the underlying Linux kernel technologies used to isolate, secure and manage the containers. Containerisation offers higher performance than virtualization, because there is no hypervisor overhead. Also, container capacity auto-scales dynamically with computing load, which eliminates the problem of over-provisioning and enables usage-based billing.\r\nIaaS clouds often offer additional resources such as a virtual-machine disk-image library, raw block storage, file or object storage, firewalls, load balancers, IP addresses, virtual local area networks (VLANs), and software bundles.\r\nAccording to the Internet Engineering Task Force (IETF), the most basic cloud-service model is that of providers offering IT infrastructure – virtual machines and other resources – as a service to subscribers.\r\nIaaS cloud providers supply these resources on-demand from their large pools of equipment installed in data centers. For wide-area connectivity, customers can use either the Internet or carrier clouds (dedicated virtual private networks). To deploy their applications, cloud users install operating-system images and their application software on the cloud infrastructure. In this model, the cloud user patches and maintains the operating systems and the application software. Cloud infrastructure providers typically bill IaaS services on a utility computing basis: cost reflects the amount of resources allocated and consumed.","materialsDescription":"<h1 class=\"align-center\"><span style=\"font-weight: bold; \">Infrastructure as a Service Benefits </span></h1>\r\n<span style=\"font-weight: bold; \">Cost savings:</span> An obvious benefit of moving to the managed IaaS model is lower infrastructure costs. No longer do organizations have the responsibility of ensuring uptime, maintaining hardware and networking equipment, or replacing old equipment. IaaS technology also saves enterprises from having to buy more capacity to deal with sudden business spikes. Organizations with a smaller IT infrastructure generally require a smaller IT staff as well. The pay-as-you-go model also provides significant cost savings. \r\n<span style=\"font-weight: bold; \">Scalability and flexibility:</span> One of the greatest benefits of IaaS is the ability to scale up and down quickly in response to an enterprise’s requirements. Infrastructure as a Service providers generally have the latest, most powerful storage, servers and networking technology to accommodate the needs of their customers. This on-demand scalability provides added flexibility and greater agility to respond to changing opportunities and requirements. \r\n<span style=\"font-weight: bold; \">Faster time to market:</span> Competition is strong in every sector, and time to market is one of the best ways to beat the competition. Because IaaS vendors elasticity and scalability, organizations can ramp up and get the job done (and the product or service to market) more rapidly.\r\n<span style=\"font-weight: bold; \">Support for DR, BC and high availability:</span> While every enterprise has some type of disaster recovery plan, the technology behind those plans is often expensive and unwieldy. Organizations with several disparate locations often have different disaster recovery and business continuity plans and technologies, making management virtually impossible.\r\n<span style=\"font-weight: bold; \">Focus on business growth:</span> Time, money and energy spent making technology decisions and hiring staff to manage and maintain the technology infrastructure is time not spent on growing the business. By moving infrastructure to a global infrastructure services, organizations can focus their time and resources where they belong, on developing innovations in applications and solutions.\r\n<h1 class=\"align-center\">IaaS, PaaS and SaaS: What’s the Difference?</h1>\r\nPlatform as a Service (PaaS) is the next step up from IaaS products, where the provider also supplies the operating environment including the operating system, application services, middleware and other ‘runtimes’ for cloud users. It’s used for development environments where the business can focus on creating an app but wants someone else to maintain the deployment platform. It means you have much simpler workloads but you can’t necessarily be as flexible as you want.\r\nAt the highest level of orchestration is Software as a Service. In SaaS infrastructure applications are accessed on demand. Here you just open your browser and go, consuming software rather than installing and running it. A user simply logs on to access the provider’s application. Users can decide how the app will work but pretty much everything else is the responsibility of the software provider.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IaaS.png"},{"id":786,"title":"IaaS - computing","alias":"iaas-computing","description":"Cloud computing is the on demand availability of computer system resources, especially data storage and computing power, without direct active management by the user. The term is generally used to describe data centers available to many users over the Internet. Large clouds, predominant today, often have functions distributed over multiple locations from central servers. If the connection to the user is relatively close, it may be designated an edge server.\r\nInfrastructure as a service (IaaS) are online services that provide high-level APIs used to dereference various low-level details of underlying network infrastructure like physical computing resources, location, data partitioning, scaling, security, backup etc. A hypervisor, such as Xen, Oracle VirtualBox, Oracle VM, KVM, VMware ESX/ESXi, or Hyper-V, LXD, runs the virtual machines as guests. Pools of hypervisors within the cloud operational system can support large numbers of virtual machines and the ability to scale services up and down according to customers' varying requirements.\r\nTypically IaaS involve the use of a cloud orchestration technology like Open Stack, Apache Cloudstack or Open Nebula. This manages the creation of a virtual machine and decides on which hypervisor (i.e. physical host) to start it, enables VM migration features between hosts, allocates storage volumes and attaches them to VMs, usage information for billing and lots more.\r\nAn alternative to hypervisors are Linux containers, which run in isolated partitions of a single Linux kernel running directly on the physical hardware. Linux cgroups and namespaces are the underlying Linux kernel technologies used to isolate, secure and manage the containers. Containerisation offers higher performance than virtualization, because there is no hypervisor overhead. Also, container capacity auto-scales dynamically with computing load, which eliminates the problem of over-provisioning and enables usage-based billing.\r\nIaaS clouds often offer additional resources such as a virtual-machine disk-image library, raw block storage, file or object storage, firewalls, load balancers, IP addresses, virtual local area networks (VLANs), and software bundles.\r\nThe NIST's definition of cloud computing defines Infrastructure as a Service as:\r\n<ul><li>The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications.</li><li>The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, and deployed applications; and possibly limited control of select networking components (e.g., host firewalls).</li></ul>\r\nAccording to the Internet Engineering Task Force (IETF), the most basic cloud-service model is that of providers offering IT infrastructure — virtual machines and other resources — as a service to subscribers.\r\nIaaS-cloud providers supply these resources on-demand from their large pools of equipment installed in data centers. For wide-area connectivity, customers can use either the Internet or carrier clouds (dedicated virtual private networks). To deploy their applications, cloud users install operating-system images and their application software on the cloud infrastructure. In this model, the cloud user patches and maintains the operating systems and the application software. Cloud providers typically bill IaaS services on a utility computing basis: cost reflects the amount of resources allocated and consumed.","materialsDescription":" <span style=\"font-weight: bold; \">Cloud Computing Basics</span>\r\nWhether you are running applications that share photos to millions of mobile users or you’re supporting the critical operations of your business, a cloud services platform provides rapid access to flexible and low cost IT resources. With cloud computing, you don’t need to make large upfront investments in hardware and spend a lot of time on the heavy lifting of managing that hardware. Instead, you can provision exactly the right type and size of computing resources you need to power your newest bright idea or operate your IT department. You can access as many resources as you need, almost instantly, and only pay for what you use.\r\n<span style=\"font-weight: bold; \">How Does Cloud Computing Work?</span>\r\nCloud computing provides a simple way to access servers, storage, databases and a broad set of application services over the Internet. A Cloud services platform such as Amazon Web Services owns and maintains the network-connected hardware required for these application services, while you provision and use what you need via a web application.\r\n<span style=\"font-weight: bold; \">Six Advantages and Benefits of Cloud Computing</span>\r\n<span style=\"font-weight: bold; \">Trade capital expense for variable expense</span>\r\nInstead of having to invest heavily in data centers and servers before you know how you’re going to use them, you can only pay when you consume computing resources, and only pay for how much you consume.\r\n<span style=\"font-weight: bold; \">Benefit from massive economies of scale</span>\r\nBy using cloud computing, you can achieve a lower variable cost than you can get on your own. Because usage from hundreds of thousands of customers are aggregated in the cloud, providers can achieve higher economies of scale which translates into lower pay as you go prices.\r\n<span style=\"font-weight: bold; \">Stop guessing capacity</span>\r\nEliminate guessing on your infrastructure capacity needs. When you make a capacity decision prior to deploying an application, you often either end up sitting on expensive idle resources or dealing with limited capacity. With cloud computing, these problems go away. You can access as much or as little as you need, and scale up and down as required with only a few minutes notice.\r\n<span style=\"font-weight: bold; \">Increase speed and agility</span>\r\nIn a cloud computing environment, new IT resources are only ever a click away, which means you reduce the time it takes to make those resources available to your developers from weeks to just minutes. This results in a dramatic increase in agility for the organization, since the cost and time it takes to experiment and develop is significantly lower.\r\n<span style=\"font-weight: bold; \">Stop spending money on running and maintaining data centers</span>\r\nFocus on projects that differentiate your business, not the infrastructure. Cloud computing lets you focus on your own customers, rather than on the heavy lifting of racking, stacking and powering servers.\r\n<span style=\"font-weight: bold; \">Go global in minutes</span>\r\nEasily deploy your application in multiple regions around the world with just a few clicks. This means you can provide a lower latency and better experience for your customers simply and at minimal cost.\r\n<span style=\"font-weight: bold;\">Types of Cloud Computing</span>\r\nCloud computing has three main types that are commonly referred to as Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Selecting the right type of cloud computing for your needs can help you strike the right balance of control and the avoidance of undifferentiated heavy lifting.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IaaS_computing.png"},{"id":789,"title":"IaaS - storage","alias":"iaas-storage","description":"IaaS is an abbreviation that stands for Infrastructure as a Service (“infrastructure as a service”). This model provides for a cloud provider to provide the client with the necessary amount of computing resources - virtual servers, remote workstations, data warehouses, with or without the provision of software - and software deployment within the infrastructure remains the client's prerogative. In essence, IaaS is an alternative to renting physical servers, racks in the data center, operating systems; instead, the necessary resources are purchased with the ability to quickly scale them if necessary. In many cases, this model may be more profitable than the traditional purchase and installation of equipment, here are just a few examples:\r\n<ul><li>if the need for computing resources is not constant and can vary greatly depending on the period, and there is no desire to overpay for unused capacity;</li><li>when a company is just starting its way on the market and does not have working capital in order to buy all the necessary infrastructure - a frequent option among startups;</li><li>there is a rapid growth in business, and the network infrastructure must keep pace with it;</li><li>if you need to reduce the cost of purchasing and maintaining equipment;</li><li>when a new direction is launched, and it is necessary to test it without investing significant funds in resources.</li></ul>\r\nIaaS can be organized on the basis of a public or private cloud, as well as by combining two approaches - the so-called. “Hybrid cloud”, created using the appropriate software.","materialsDescription":" IaaS or Infrastructure as a service translated into Russian as “Infrastructure as a service”.\r\n"Infrastructure" in the case of IaaS, it can be virtual servers and networks, data warehouses, operating systems.\r\n“As a service” means that the cloud infrastructure components listed above are provided to you as a connected service.\r\nIaaS is a cloud infrastructure utilization model in which the computing power is provided to the client for independent management.\r\n<span style=\"font-weight: bold;\">What is the difference from PaaS and SaaS?</span>\r\nFrequently asked questions, what distinguishes IaaS, PaaS, SaaS from each other? What is the difference? Answering all questions, you decide to leave in the area of responsibility of its IT specialists. It requires only time and financial costs for your business.\r\n<span style=\"font-weight: bold;\">Who is responsible for what?</span>\r\nIn the case of using IaaS models, a company can independently use resources: install and run software, exercise control over systems, applications, and virtual storage systems.\r\nFor example, networks, servers, servers and servers. The IaaS service provider manages its own software and operating system, middleware and applications, is responsible for the infrastructure during the purchase, installation and configuration.\r\n<span style=\"font-weight: bold;\">Why do companies choose IaaS?</span>\r\nScaling capabilities. All users have access to resources, and you must use all the resources you need.\r\nCost savings. As a rule, the use of cloud services costs the company less than buying its own infrastructure.\r\nMobility. Ability to work with conventional applications.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IaaS_storage.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":3118,"logo":false,"scheme":false,"title":"AWS CloudFormation","vendorVerified":0,"rating":"0.00","implementationsCount":2,"suppliersCount":0,"alias":"aws-cloudformation","companyTypes":[],"description":"AWS CloudFormation provides a common language for you to describe and provision all the infrastructure resources in your cloud environment. CloudFormation allows you to use a simple text file to model and provision, in an automated and secure manner, all the resources needed for your applications across all regions and accounts. This file serves as the single source of truth for your cloud environment. \r\nAWS CloudFormation is available at no additional charge, and you pay only for the AWS resources needed to run your applications.\r\n<p class=\"align-center\"><span style=\"font-weight: bold;\">Benefits</span></p>\r\nMODEL IT ALL\r\nAWS CloudFormation allows you to model your entire infrastructure in a text file. This template becomes the single source of truth for your infrastructure. This helps you to standardize infrastructure components used across your organization, enabling configuration compliance and faster troubleshooting.\r\nAUTOMATE AND DEPLOY\r\nAWS CloudFormation provisions your resources in a safe, repeatable manner, allowing you to build and rebuild your infrastructure and applications, without having to perform manual actions or write custom scripts. CloudFormation takes care of determining the right operations to perform when managing your stack, and rolls back changes automatically if errors are detected.\r\nIT'S JUST CODE\r\nCodifying your infrastructure allows you to treat your infrastructure as just code. You can author it with any code editor, check it into a version control system, and review the files with team members before deploying into production.","shortDescription":"AWS CloudFormation: Model and provision all your cloud infrastructure resources","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"AWS CloudFormation","keywords":"","description":"AWS CloudFormation provides a common language for you to describe and provision all the infrastructure resources in your cloud environment. CloudFormation allows you to use a simple text file to model and provision, in an automated and secure manner, all the r","og:title":"AWS CloudFormation","og:description":"AWS CloudFormation provides a common language for you to describe and provision all the infrastructure resources in your cloud environment. CloudFormation allows you to use a simple text file to model and provision, in an automated and secure manner, all the r"},"eventUrl":"","translationId":3118,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":39,"title":"IaaS - Infrastructure as a Service","alias":"iaas-infrastructure-as-a-service","description":"<span style=\"font-weight: bold;\">Infrastructure as a service</span> (IaaS) are online services that provide high-level APIs used to dereference various low-level details of underlying network infrastructure like physical computing resources, location, data partitioning, scaling, security, backup etc. A hypervisor, such as Xen, Oracle VirtualBox, Oracle VM, KVM, VMware ESX/ESXi, or Hyper-V, LXD, runs the virtual machines as guests. Pools of hypervisors within the cloud operational system can support large numbers of virtual machines and the ability to scale services up and down according to customers' varying requirements.\r\nTypically IaaS solutions involve the use of a cloud orchestration technology like Open Stack, Apache Cloudstack or Open Nebula. This manages the creation of a virtual machine and decides on which hypervisor (i.e. physical host) to start it, enables VM migration features between hosts, allocates storage volumes and attaches them to VMs, usage information for billing and lots more.\r\nAn alternative to hypervisors are Linux containers, which run in isolated partitions of a single Linux kernel running directly on the physical hardware. Linux cgroups and namespaces are the underlying Linux kernel technologies used to isolate, secure and manage the containers. Containerisation offers higher performance than virtualization, because there is no hypervisor overhead. Also, container capacity auto-scales dynamically with computing load, which eliminates the problem of over-provisioning and enables usage-based billing.\r\nIaaS clouds often offer additional resources such as a virtual-machine disk-image library, raw block storage, file or object storage, firewalls, load balancers, IP addresses, virtual local area networks (VLANs), and software bundles.\r\nAccording to the Internet Engineering Task Force (IETF), the most basic cloud-service model is that of providers offering IT infrastructure – virtual machines and other resources – as a service to subscribers.\r\nIaaS cloud providers supply these resources on-demand from their large pools of equipment installed in data centers. For wide-area connectivity, customers can use either the Internet or carrier clouds (dedicated virtual private networks). To deploy their applications, cloud users install operating-system images and their application software on the cloud infrastructure. In this model, the cloud user patches and maintains the operating systems and the application software. Cloud infrastructure providers typically bill IaaS services on a utility computing basis: cost reflects the amount of resources allocated and consumed.","materialsDescription":"<h1 class=\"align-center\"><span style=\"font-weight: bold; \">Infrastructure as a Service Benefits </span></h1>\r\n<span style=\"font-weight: bold; \">Cost savings:</span> An obvious benefit of moving to the managed IaaS model is lower infrastructure costs. No longer do organizations have the responsibility of ensuring uptime, maintaining hardware and networking equipment, or replacing old equipment. IaaS technology also saves enterprises from having to buy more capacity to deal with sudden business spikes. Organizations with a smaller IT infrastructure generally require a smaller IT staff as well. The pay-as-you-go model also provides significant cost savings. \r\n<span style=\"font-weight: bold; \">Scalability and flexibility:</span> One of the greatest benefits of IaaS is the ability to scale up and down quickly in response to an enterprise’s requirements. Infrastructure as a Service providers generally have the latest, most powerful storage, servers and networking technology to accommodate the needs of their customers. This on-demand scalability provides added flexibility and greater agility to respond to changing opportunities and requirements. \r\n<span style=\"font-weight: bold; \">Faster time to market:</span> Competition is strong in every sector, and time to market is one of the best ways to beat the competition. Because IaaS vendors elasticity and scalability, organizations can ramp up and get the job done (and the product or service to market) more rapidly.\r\n<span style=\"font-weight: bold; \">Support for DR, BC and high availability:</span> While every enterprise has some type of disaster recovery plan, the technology behind those plans is often expensive and unwieldy. Organizations with several disparate locations often have different disaster recovery and business continuity plans and technologies, making management virtually impossible.\r\n<span style=\"font-weight: bold; \">Focus on business growth:</span> Time, money and energy spent making technology decisions and hiring staff to manage and maintain the technology infrastructure is time not spent on growing the business. By moving infrastructure to a global infrastructure services, organizations can focus their time and resources where they belong, on developing innovations in applications and solutions.\r\n<h1 class=\"align-center\">IaaS, PaaS and SaaS: What’s the Difference?</h1>\r\nPlatform as a Service (PaaS) is the next step up from IaaS products, where the provider also supplies the operating environment including the operating system, application services, middleware and other ‘runtimes’ for cloud users. It’s used for development environments where the business can focus on creating an app but wants someone else to maintain the deployment platform. It means you have much simpler workloads but you can’t necessarily be as flexible as you want.\r\nAt the highest level of orchestration is Software as a Service. In SaaS infrastructure applications are accessed on demand. Here you just open your browser and go, consuming software rather than installing and running it. A user simply logs on to access the provider’s application. Users can decide how the app will work but pretty much everything else is the responsibility of the software provider.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IaaS.png"},{"id":786,"title":"IaaS - computing","alias":"iaas-computing","description":"Cloud computing is the on demand availability of computer system resources, especially data storage and computing power, without direct active management by the user. The term is generally used to describe data centers available to many users over the Internet. Large clouds, predominant today, often have functions distributed over multiple locations from central servers. If the connection to the user is relatively close, it may be designated an edge server.\r\nInfrastructure as a service (IaaS) are online services that provide high-level APIs used to dereference various low-level details of underlying network infrastructure like physical computing resources, location, data partitioning, scaling, security, backup etc. A hypervisor, such as Xen, Oracle VirtualBox, Oracle VM, KVM, VMware ESX/ESXi, or Hyper-V, LXD, runs the virtual machines as guests. Pools of hypervisors within the cloud operational system can support large numbers of virtual machines and the ability to scale services up and down according to customers' varying requirements.\r\nTypically IaaS involve the use of a cloud orchestration technology like Open Stack, Apache Cloudstack or Open Nebula. This manages the creation of a virtual machine and decides on which hypervisor (i.e. physical host) to start it, enables VM migration features between hosts, allocates storage volumes and attaches them to VMs, usage information for billing and lots more.\r\nAn alternative to hypervisors are Linux containers, which run in isolated partitions of a single Linux kernel running directly on the physical hardware. Linux cgroups and namespaces are the underlying Linux kernel technologies used to isolate, secure and manage the containers. Containerisation offers higher performance than virtualization, because there is no hypervisor overhead. Also, container capacity auto-scales dynamically with computing load, which eliminates the problem of over-provisioning and enables usage-based billing.\r\nIaaS clouds often offer additional resources such as a virtual-machine disk-image library, raw block storage, file or object storage, firewalls, load balancers, IP addresses, virtual local area networks (VLANs), and software bundles.\r\nThe NIST's definition of cloud computing defines Infrastructure as a Service as:\r\n<ul><li>The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications.</li><li>The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, and deployed applications; and possibly limited control of select networking components (e.g., host firewalls).</li></ul>\r\nAccording to the Internet Engineering Task Force (IETF), the most basic cloud-service model is that of providers offering IT infrastructure — virtual machines and other resources — as a service to subscribers.\r\nIaaS-cloud providers supply these resources on-demand from their large pools of equipment installed in data centers. For wide-area connectivity, customers can use either the Internet or carrier clouds (dedicated virtual private networks). To deploy their applications, cloud users install operating-system images and their application software on the cloud infrastructure. In this model, the cloud user patches and maintains the operating systems and the application software. Cloud providers typically bill IaaS services on a utility computing basis: cost reflects the amount of resources allocated and consumed.","materialsDescription":" <span style=\"font-weight: bold; \">Cloud Computing Basics</span>\r\nWhether you are running applications that share photos to millions of mobile users or you’re supporting the critical operations of your business, a cloud services platform provides rapid access to flexible and low cost IT resources. With cloud computing, you don’t need to make large upfront investments in hardware and spend a lot of time on the heavy lifting of managing that hardware. Instead, you can provision exactly the right type and size of computing resources you need to power your newest bright idea or operate your IT department. You can access as many resources as you need, almost instantly, and only pay for what you use.\r\n<span style=\"font-weight: bold; \">How Does Cloud Computing Work?</span>\r\nCloud computing provides a simple way to access servers, storage, databases and a broad set of application services over the Internet. A Cloud services platform such as Amazon Web Services owns and maintains the network-connected hardware required for these application services, while you provision and use what you need via a web application.\r\n<span style=\"font-weight: bold; \">Six Advantages and Benefits of Cloud Computing</span>\r\n<span style=\"font-weight: bold; \">Trade capital expense for variable expense</span>\r\nInstead of having to invest heavily in data centers and servers before you know how you’re going to use them, you can only pay when you consume computing resources, and only pay for how much you consume.\r\n<span style=\"font-weight: bold; \">Benefit from massive economies of scale</span>\r\nBy using cloud computing, you can achieve a lower variable cost than you can get on your own. Because usage from hundreds of thousands of customers are aggregated in the cloud, providers can achieve higher economies of scale which translates into lower pay as you go prices.\r\n<span style=\"font-weight: bold; \">Stop guessing capacity</span>\r\nEliminate guessing on your infrastructure capacity needs. When you make a capacity decision prior to deploying an application, you often either end up sitting on expensive idle resources or dealing with limited capacity. With cloud computing, these problems go away. You can access as much or as little as you need, and scale up and down as required with only a few minutes notice.\r\n<span style=\"font-weight: bold; \">Increase speed and agility</span>\r\nIn a cloud computing environment, new IT resources are only ever a click away, which means you reduce the time it takes to make those resources available to your developers from weeks to just minutes. This results in a dramatic increase in agility for the organization, since the cost and time it takes to experiment and develop is significantly lower.\r\n<span style=\"font-weight: bold; \">Stop spending money on running and maintaining data centers</span>\r\nFocus on projects that differentiate your business, not the infrastructure. Cloud computing lets you focus on your own customers, rather than on the heavy lifting of racking, stacking and powering servers.\r\n<span style=\"font-weight: bold; \">Go global in minutes</span>\r\nEasily deploy your application in multiple regions around the world with just a few clicks. This means you can provide a lower latency and better experience for your customers simply and at minimal cost.\r\n<span style=\"font-weight: bold;\">Types of Cloud Computing</span>\r\nCloud computing has three main types that are commonly referred to as Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Selecting the right type of cloud computing for your needs can help you strike the right balance of control and the avoidance of undifferentiated heavy lifting.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IaaS_computing.png"},{"id":789,"title":"IaaS - storage","alias":"iaas-storage","description":"IaaS is an abbreviation that stands for Infrastructure as a Service (“infrastructure as a service”). This model provides for a cloud provider to provide the client with the necessary amount of computing resources - virtual servers, remote workstations, data warehouses, with or without the provision of software - and software deployment within the infrastructure remains the client's prerogative. In essence, IaaS is an alternative to renting physical servers, racks in the data center, operating systems; instead, the necessary resources are purchased with the ability to quickly scale them if necessary. In many cases, this model may be more profitable than the traditional purchase and installation of equipment, here are just a few examples:\r\n<ul><li>if the need for computing resources is not constant and can vary greatly depending on the period, and there is no desire to overpay for unused capacity;</li><li>when a company is just starting its way on the market and does not have working capital in order to buy all the necessary infrastructure - a frequent option among startups;</li><li>there is a rapid growth in business, and the network infrastructure must keep pace with it;</li><li>if you need to reduce the cost of purchasing and maintaining equipment;</li><li>when a new direction is launched, and it is necessary to test it without investing significant funds in resources.</li></ul>\r\nIaaS can be organized on the basis of a public or private cloud, as well as by combining two approaches - the so-called. “Hybrid cloud”, created using the appropriate software.","materialsDescription":" IaaS or Infrastructure as a service translated into Russian as “Infrastructure as a service”.\r\n"Infrastructure" in the case of IaaS, it can be virtual servers and networks, data warehouses, operating systems.\r\n“As a service” means that the cloud infrastructure components listed above are provided to you as a connected service.\r\nIaaS is a cloud infrastructure utilization model in which the computing power is provided to the client for independent management.\r\n<span style=\"font-weight: bold;\">What is the difference from PaaS and SaaS?</span>\r\nFrequently asked questions, what distinguishes IaaS, PaaS, SaaS from each other? What is the difference? Answering all questions, you decide to leave in the area of responsibility of its IT specialists. It requires only time and financial costs for your business.\r\n<span style=\"font-weight: bold;\">Who is responsible for what?</span>\r\nIn the case of using IaaS models, a company can independently use resources: install and run software, exercise control over systems, applications, and virtual storage systems.\r\nFor example, networks, servers, servers and servers. The IaaS service provider manages its own software and operating system, middleware and applications, is responsible for the infrastructure during the purchase, installation and configuration.\r\n<span style=\"font-weight: bold;\">Why do companies choose IaaS?</span>\r\nScaling capabilities. All users have access to resources, and you must use all the resources you need.\r\nCost savings. As a rule, the use of cloud services costs the company less than buying its own infrastructure.\r\nMobility. Ability to work with conventional applications.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IaaS_storage.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":7,"title":"Improve Customer Service"},{"id":306,"title":"Manage Risks"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":175,"title":"Aging IT infrastructure"},{"id":179,"title":"Shortage of inhouse software developers"},{"id":340,"title":"Low quality of customer service"},{"id":346,"title":"Shortage of inhouse IT resources"},{"id":356,"title":"High costs of routine operations"},{"id":383,"title":"Shortage of inhouse IT engineers"},{"id":389,"title":"Customer attrition"},{"id":390,"title":"Low quality of customer support"}]}},"categories":[{"id":789,"title":"IaaS - storage","alias":"iaas-storage","description":"IaaS is an abbreviation that stands for Infrastructure as a Service (“infrastructure as a service”). This model provides for a cloud provider to provide the client with the necessary amount of computing resources - virtual servers, remote workstations, data warehouses, with or without the provision of software - and software deployment within the infrastructure remains the client's prerogative. In essence, IaaS is an alternative to renting physical servers, racks in the data center, operating systems; instead, the necessary resources are purchased with the ability to quickly scale them if necessary. In many cases, this model may be more profitable than the traditional purchase and installation of equipment, here are just a few examples:\r\n<ul><li>if the need for computing resources is not constant and can vary greatly depending on the period, and there is no desire to overpay for unused capacity;</li><li>when a company is just starting its way on the market and does not have working capital in order to buy all the necessary infrastructure - a frequent option among startups;</li><li>there is a rapid growth in business, and the network infrastructure must keep pace with it;</li><li>if you need to reduce the cost of purchasing and maintaining equipment;</li><li>when a new direction is launched, and it is necessary to test it without investing significant funds in resources.</li></ul>\r\nIaaS can be organized on the basis of a public or private cloud, as well as by combining two approaches - the so-called. “Hybrid cloud”, created using the appropriate software.","materialsDescription":" IaaS or Infrastructure as a service translated into Russian as “Infrastructure as a service”.\r\n"Infrastructure" in the case of IaaS, it can be virtual servers and networks, data warehouses, operating systems.\r\n“As a service” means that the cloud infrastructure components listed above are provided to you as a connected service.\r\nIaaS is a cloud infrastructure utilization model in which the computing power is provided to the client for independent management.\r\n<span style=\"font-weight: bold;\">What is the difference from PaaS and SaaS?</span>\r\nFrequently asked questions, what distinguishes IaaS, PaaS, SaaS from each other? What is the difference? Answering all questions, you decide to leave in the area of responsibility of its IT specialists. It requires only time and financial costs for your business.\r\n<span style=\"font-weight: bold;\">Who is responsible for what?</span>\r\nIn the case of using IaaS models, a company can independently use resources: install and run software, exercise control over systems, applications, and virtual storage systems.\r\nFor example, networks, servers, servers and servers. The IaaS service provider manages its own software and operating system, middleware and applications, is responsible for the infrastructure during the purchase, installation and configuration.\r\n<span style=\"font-weight: bold;\">Why do companies choose IaaS?</span>\r\nScaling capabilities. All users have access to resources, and you must use all the resources you need.\r\nCost savings. As a rule, the use of cloud services costs the company less than buying its own infrastructure.\r\nMobility. Ability to work with conventional applications.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IaaS_storage.png"},{"id":2,"title":"Virtual machine and cloud system software","alias":"virtual-machine-and-cloud-system-software","description":" A virtual machine (VM) is a software-based computer that exists within another computer’s operating system, often used for the purposes of testing, backing up data, or running SaaS applications. To fully grasp how VMs work, it’s important to first understand how computer software and hardware are typically integrated by an operating system.\r\n"The cloud" refers to servers that are accessed over the Internet, and the software and databases that run on those servers. Cloud servers are located in data centers all over the world. By using cloud computing, users and companies don't have to manage physical servers themselves or run software applications on their own machines.\r\nThe cloud enables users to access the same files and applications from almost any device, because the computing and storage take place on servers in a data center, instead of locally on the user device. This is why a user can log into their Instagram account on a new phone after their old phone breaks and still find their old account in place, with all their photos, videos, and conversation history. It works the same way with cloud email providers like Gmail or Microsoft Office 365, and with cloud storage providers like Dropbox or Google Drive.\r\nFor businesses, switching to cloud computing removes some IT costs and overhead: for instance, they no longer need to update and maintain their own servers, as the cloud vendor they are using will do that. This especially makes an impact on small businesses that may not have been able to afford their own internal infrastructure but can outsource their infrastructure needs affordably via the cloud. The cloud can also make it easier for companies to operate internationally because employees and customers can access the same files and applications from any location.\r\nSeveral cloud providers offer virtual machines to their customers. These virtual machines typically live on powerful servers that can act as a host to multiple VMs and can be used for a variety of reasons that wouldn’t be practical with a locally-hosted VM. These include:\r\n<ul><li>Running SaaS applications - Software-as-a-Service, or SaaS for short, is a cloud-based method of providing software to users. SaaS users subscribe to an application rather than purchasing it once and installing it. These applications are generally served to the user over the Internet. Often, it is virtual machines in the cloud that are doing the computation for SaaS applications as well as delivering them to users. If the cloud provider has a geographically distributed network edge, then the application will run closer to the user, resulting in faster performance.</li><li>Backing up data - Cloud-based VM services are very popular for backing up data because the data can be accessed from anywhere. Plus, cloud VMs provide better redundancy, require less maintenance, and generally scale better than physical data centers. (For example, it’s generally fairly easy to buy an extra gigabyte of storage space from a cloud VM provider, but much more difficult to build a new local data server for that extra gigabyte of data.)</li><li>Hosting services like email and access management - Hosting these services on cloud VMs is generally faster and more cost-effective, and helps minimize maintenance and offload security concerns as well.</li></ul>","materialsDescription":"What is an operating system?\r\nTraditional computers are built out of physical hardware, including hard disk drives, processor chips, RAM, etc. In order to utilize this hardware, computers rely on a type of software known as an operating system (OS). Some common examples of OSes are Mac OSX, Microsoft Windows, Linux, and Android.\r\nThe OS is what manages the computer’s hardware in ways that are useful to the user. For example, if the user wants to access the Internet, the OS directs the network interface card to make the connection. If the user wants to download a file, the OS will partition space on the hard drive for that file. The OS also runs and manages other pieces of software. For example, it can run a web browser and provide the browser with enough random access memory (RAM) to operate smoothly. Typically, operating systems exist within a physical computer at a one-to-one ratio; for each machine, there is a single OS managing its physical resources.\r\n<span style=\"font-weight: bold;\">Can you have two or more operating systems on one computer?</span>\r\nSome users want to be able to run multiple operating systems simultaneously on one computer, either for testing or one of the other reasons listed in the section below. This can be achieved through a process called virtualization. In virtualization, a piece of software behaves as if it were an independent computer. This piece of software is called a virtual machine, also known as a ‘guest’ computer. (The computer on which the VM is running is called the ‘host’.) The guest has an OS as well as its own virtual hardware.\r\n‘Virtual hardware’ may sound like a bit of an oxymoron, but it works by mapping to real hardware on the host computer. For example, the VM’s ‘hard drive’ is really just a file on the host computer’s hard drive. When the VM wants to save a new file, it actually has to communicate with the host OS, which will write this file to the host hard drive. Because virtual hardware must perform this added step of negotiating with the host to access hardware resources, virtual machines can’t run quite as fast as their host computers.\r\nWith virtualization, one computer can run two or more operating systems. The number of VMs that can run on one host is limited only by the host’s available resources. The user can run the OS of a VM in a window like any other program, or they can run it in fullscreen so that it looks and feels like a genuine host OS.\r\n <span style=\"font-weight: bold; \">What are virtual machines used for?</span>\r\nSome of the most popular reasons people run virtual machines include:\r\n<span style=\"font-weight: bold; \">Testing</span> - Oftentimes software developers want to be able to test their applications in different environments. They can use virtual machines to run their applications in various OSes on one computer. This is simpler and more cost-effective than having to test on several different physical machines.\r\n<span style=\"font-weight: bold; \">Running software designed for other OSes</span> - Although certain software applications are only available for a single platform, a VM can run software designed for a different OS. For example, a Mac user who wants to run software designed for Windows can run a Windows VM on their Mac host.\r\n<span style=\"font-weight: bold; \">Running outdated software</span> - Some pieces of older software can’t be run in modern OSes. Users who want to run these applications can run an old OS on a virtual machine.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Virtual_machine_and_cloud_system_software.png"},{"id":39,"title":"IaaS - Infrastructure as a Service","alias":"iaas-infrastructure-as-a-service","description":"<span style=\"font-weight: bold;\">Infrastructure as a service</span> (IaaS) are online services that provide high-level APIs used to dereference various low-level details of underlying network infrastructure like physical computing resources, location, data partitioning, scaling, security, backup etc. A hypervisor, such as Xen, Oracle VirtualBox, Oracle VM, KVM, VMware ESX/ESXi, or Hyper-V, LXD, runs the virtual machines as guests. Pools of hypervisors within the cloud operational system can support large numbers of virtual machines and the ability to scale services up and down according to customers' varying requirements.\r\nTypically IaaS solutions involve the use of a cloud orchestration technology like Open Stack, Apache Cloudstack or Open Nebula. This manages the creation of a virtual machine and decides on which hypervisor (i.e. physical host) to start it, enables VM migration features between hosts, allocates storage volumes and attaches them to VMs, usage information for billing and lots more.\r\nAn alternative to hypervisors are Linux containers, which run in isolated partitions of a single Linux kernel running directly on the physical hardware. Linux cgroups and namespaces are the underlying Linux kernel technologies used to isolate, secure and manage the containers. Containerisation offers higher performance than virtualization, because there is no hypervisor overhead. Also, container capacity auto-scales dynamically with computing load, which eliminates the problem of over-provisioning and enables usage-based billing.\r\nIaaS clouds often offer additional resources such as a virtual-machine disk-image library, raw block storage, file or object storage, firewalls, load balancers, IP addresses, virtual local area networks (VLANs), and software bundles.\r\nAccording to the Internet Engineering Task Force (IETF), the most basic cloud-service model is that of providers offering IT infrastructure – virtual machines and other resources – as a service to subscribers.\r\nIaaS cloud providers supply these resources on-demand from their large pools of equipment installed in data centers. For wide-area connectivity, customers can use either the Internet or carrier clouds (dedicated virtual private networks). To deploy their applications, cloud users install operating-system images and their application software on the cloud infrastructure. In this model, the cloud user patches and maintains the operating systems and the application software. Cloud infrastructure providers typically bill IaaS services on a utility computing basis: cost reflects the amount of resources allocated and consumed.","materialsDescription":"<h1 class=\"align-center\"><span style=\"font-weight: bold; \">Infrastructure as a Service Benefits </span></h1>\r\n<span style=\"font-weight: bold; \">Cost savings:</span> An obvious benefit of moving to the managed IaaS model is lower infrastructure costs. No longer do organizations have the responsibility of ensuring uptime, maintaining hardware and networking equipment, or replacing old equipment. IaaS technology also saves enterprises from having to buy more capacity to deal with sudden business spikes. Organizations with a smaller IT infrastructure generally require a smaller IT staff as well. The pay-as-you-go model also provides significant cost savings. \r\n<span style=\"font-weight: bold; \">Scalability and flexibility:</span> One of the greatest benefits of IaaS is the ability to scale up and down quickly in response to an enterprise’s requirements. Infrastructure as a Service providers generally have the latest, most powerful storage, servers and networking technology to accommodate the needs of their customers. This on-demand scalability provides added flexibility and greater agility to respond to changing opportunities and requirements. \r\n<span style=\"font-weight: bold; \">Faster time to market:</span> Competition is strong in every sector, and time to market is one of the best ways to beat the competition. Because IaaS vendors elasticity and scalability, organizations can ramp up and get the job done (and the product or service to market) more rapidly.\r\n<span style=\"font-weight: bold; \">Support for DR, BC and high availability:</span> While every enterprise has some type of disaster recovery plan, the technology behind those plans is often expensive and unwieldy. Organizations with several disparate locations often have different disaster recovery and business continuity plans and technologies, making management virtually impossible.\r\n<span style=\"font-weight: bold; \">Focus on business growth:</span> Time, money and energy spent making technology decisions and hiring staff to manage and maintain the technology infrastructure is time not spent on growing the business. By moving infrastructure to a global infrastructure services, organizations can focus their time and resources where they belong, on developing innovations in applications and solutions.\r\n<h1 class=\"align-center\">IaaS, PaaS and SaaS: What’s the Difference?</h1>\r\nPlatform as a Service (PaaS) is the next step up from IaaS products, where the provider also supplies the operating environment including the operating system, application services, middleware and other ‘runtimes’ for cloud users. It’s used for development environments where the business can focus on creating an app but wants someone else to maintain the deployment platform. It means you have much simpler workloads but you can’t necessarily be as flexible as you want.\r\nAt the highest level of orchestration is Software as a Service. In SaaS infrastructure applications are accessed on demand. Here you just open your browser and go, consuming software rather than installing and running it. A user simply logs on to access the provider’s application. Users can decide how the app will work but pretty much everything else is the responsibility of the software provider.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IaaS.png"},{"id":786,"title":"IaaS - computing","alias":"iaas-computing","description":"Cloud computing is the on demand availability of computer system resources, especially data storage and computing power, without direct active management by the user. The term is generally used to describe data centers available to many users over the Internet. Large clouds, predominant today, often have functions distributed over multiple locations from central servers. If the connection to the user is relatively close, it may be designated an edge server.\r\nInfrastructure as a service (IaaS) are online services that provide high-level APIs used to dereference various low-level details of underlying network infrastructure like physical computing resources, location, data partitioning, scaling, security, backup etc. A hypervisor, such as Xen, Oracle VirtualBox, Oracle VM, KVM, VMware ESX/ESXi, or Hyper-V, LXD, runs the virtual machines as guests. Pools of hypervisors within the cloud operational system can support large numbers of virtual machines and the ability to scale services up and down according to customers' varying requirements.\r\nTypically IaaS involve the use of a cloud orchestration technology like Open Stack, Apache Cloudstack or Open Nebula. This manages the creation of a virtual machine and decides on which hypervisor (i.e. physical host) to start it, enables VM migration features between hosts, allocates storage volumes and attaches them to VMs, usage information for billing and lots more.\r\nAn alternative to hypervisors are Linux containers, which run in isolated partitions of a single Linux kernel running directly on the physical hardware. Linux cgroups and namespaces are the underlying Linux kernel technologies used to isolate, secure and manage the containers. Containerisation offers higher performance than virtualization, because there is no hypervisor overhead. Also, container capacity auto-scales dynamically with computing load, which eliminates the problem of over-provisioning and enables usage-based billing.\r\nIaaS clouds often offer additional resources such as a virtual-machine disk-image library, raw block storage, file or object storage, firewalls, load balancers, IP addresses, virtual local area networks (VLANs), and software bundles.\r\nThe NIST's definition of cloud computing defines Infrastructure as a Service as:\r\n<ul><li>The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications.</li><li>The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, and deployed applications; and possibly limited control of select networking components (e.g., host firewalls).</li></ul>\r\nAccording to the Internet Engineering Task Force (IETF), the most basic cloud-service model is that of providers offering IT infrastructure — virtual machines and other resources — as a service to subscribers.\r\nIaaS-cloud providers supply these resources on-demand from their large pools of equipment installed in data centers. For wide-area connectivity, customers can use either the Internet or carrier clouds (dedicated virtual private networks). To deploy their applications, cloud users install operating-system images and their application software on the cloud infrastructure. In this model, the cloud user patches and maintains the operating systems and the application software. Cloud providers typically bill IaaS services on a utility computing basis: cost reflects the amount of resources allocated and consumed.","materialsDescription":" <span style=\"font-weight: bold; \">Cloud Computing Basics</span>\r\nWhether you are running applications that share photos to millions of mobile users or you’re supporting the critical operations of your business, a cloud services platform provides rapid access to flexible and low cost IT resources. With cloud computing, you don’t need to make large upfront investments in hardware and spend a lot of time on the heavy lifting of managing that hardware. Instead, you can provision exactly the right type and size of computing resources you need to power your newest bright idea or operate your IT department. You can access as many resources as you need, almost instantly, and only pay for what you use.\r\n<span style=\"font-weight: bold; \">How Does Cloud Computing Work?</span>\r\nCloud computing provides a simple way to access servers, storage, databases and a broad set of application services over the Internet. A Cloud services platform such as Amazon Web Services owns and maintains the network-connected hardware required for these application services, while you provision and use what you need via a web application.\r\n<span style=\"font-weight: bold; \">Six Advantages and Benefits of Cloud Computing</span>\r\n<span style=\"font-weight: bold; \">Trade capital expense for variable expense</span>\r\nInstead of having to invest heavily in data centers and servers before you know how you’re going to use them, you can only pay when you consume computing resources, and only pay for how much you consume.\r\n<span style=\"font-weight: bold; \">Benefit from massive economies of scale</span>\r\nBy using cloud computing, you can achieve a lower variable cost than you can get on your own. Because usage from hundreds of thousands of customers are aggregated in the cloud, providers can achieve higher economies of scale which translates into lower pay as you go prices.\r\n<span style=\"font-weight: bold; \">Stop guessing capacity</span>\r\nEliminate guessing on your infrastructure capacity needs. When you make a capacity decision prior to deploying an application, you often either end up sitting on expensive idle resources or dealing with limited capacity. With cloud computing, these problems go away. You can access as much or as little as you need, and scale up and down as required with only a few minutes notice.\r\n<span style=\"font-weight: bold; \">Increase speed and agility</span>\r\nIn a cloud computing environment, new IT resources are only ever a click away, which means you reduce the time it takes to make those resources available to your developers from weeks to just minutes. This results in a dramatic increase in agility for the organization, since the cost and time it takes to experiment and develop is significantly lower.\r\n<span style=\"font-weight: bold; \">Stop spending money on running and maintaining data centers</span>\r\nFocus on projects that differentiate your business, not the infrastructure. Cloud computing lets you focus on your own customers, rather than on the heavy lifting of racking, stacking and powering servers.\r\n<span style=\"font-weight: bold; \">Go global in minutes</span>\r\nEasily deploy your application in multiple regions around the world with just a few clicks. This means you can provide a lower latency and better experience for your customers simply and at minimal cost.\r\n<span style=\"font-weight: bold;\">Types of Cloud Computing</span>\r\nCloud computing has three main types that are commonly referred to as Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Selecting the right type of cloud computing for your needs can help you strike the right balance of control and the avoidance of undifferentiated heavy lifting.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IaaS_computing.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://aws.amazon.com/ru/solutions/case-studies/expedia/","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},{"id":433,"title":"Barracuda NGFW on AWS for software provider","description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Club Automation drives new business growth, safely migrates its health club management application to AWS, protects customer data, and provisions firewalls in 15 minutes instead of several hours by using Barracuda NextGen Firewalls on the AWS Cloud. The organization provides cloud-based enterprise resource planning (ERP) software for health and athletic clubs throughout the United States. Club Automation migrated its applications to AWS and uses Barracuda firewalls provisioned through the AWS Marketplace.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; font-weight: bold; \">About Club Automation</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Club Automation a leading cloudbased software provider with a mission of contributing to a healthier and more active world by empowering more-efficient health and fitness club management. Based in Chicago, the company offers a software-as-a-service (SaaS) solution that enables health and fitness clubs to run their facilities effortlessly.</span>\r\n\r\n<span style=\"font-weight: bold; \">The Challenge </span>\r\nNot long ago, Club Automation was a small upstart company in the health club software industry with a big goal: to revolutionize the entire industry with a SaaS enterprise resource planning (ERP) solution that manages all parts of a health club’s business. The company is now experiencing explosive business growth. <span style=\"font-weight: bold; font-style: italic; \">“We came into the club ERP space as an underdog, but we’ve grown extremely fast,” says Max Longin, a founding partner at the company. “About 70 percent of our total revenue as a company has come in the past year.” Even so, Longin considers this a period of “controlled growth.” “We have not really been marketing ourselves—our new customers have been coming to us through word of mouth. Our concern has been that if our systems are not ready to scale to support more growth, we could compromise performance and our customers’ experience.”</span>\r\nTo address that concern, Club Automation sought to move its SaaS application to a new cloud technology provider.<span style=\"font-weight: bold; font-style: italic; \"> “We needed more agility and scalability than we had with our previous hybrid-cloud solution, which included a secure but legacy private-cloud environment,” Longin confirms. “We had to scale ahead of required capacity, which was costly and required a lot of planning. We wanted to be more agile, so we could quickly roll out new apps and features for our customers.”</span>\r\nAs Club Automation considered new cloud technologies, it also needed to ensure strong security for its application workloads. <span style=\"font-weight: bold; font-style: italic; \">“We operate in a cardholder environment, and our solution needs to be PCI compliant and highly secure,” Longin says. “We can’t allow access to our backend systems by anyone other than our developers. We had to eliminate attack surface areas within a cloud environment, and we needed the security to enable our business to move our workloads to the cloud safely.”</span>\r\n<span style=\"font-weight: bold; \">Why Amazon Web Services </span>\r\nClub Automation decided to move its SaaS application to the Amazon Web Services (AWS) cloud, in part because AWS addressed the company’s security and performance challenges. “Previously, we were not set up to support geographic growth, because we only had a few dispersed data centers and we had challenges deploying security quickly and getting solid performance in all areas of the United States,” Longin says. “We looked at Microsoft Azure, but it wasn’t the right solution for our needs,” says Longin. “AWS fit like a glove, and it offers the best services for our business.” Club Automation runs its web servers on Amazon Elastic Compute Cloud (Amazon EC2) instances and runs background jobs on AWS Elastic Beanstalk, a service for deploying and scaling web applications. The company is also using Amazon Aurora, a hosted relational database service, to store and manage customer membership and financial data.\r\nTo safely migrate its SaaS application workloads to AWS, Club Automation chose to work with Barracuda Networks, an AWS Partner Network (APN) Advanced Technology Partner with an AWS Security Competency certification. Barracuda provides firewalls engineered for AWS to help customers deploy a comprehensive security architecture and increase protection against cyberattacks and advanced threats. “I had a previous business relationship with Barracuda and was impressed with the stability of the solutions,” Longin says. Club Automation deployed Barracuda NextGen Firewalls to help secure the company’s AWS environment. The firewalls are installed on an Amazon EC2 instance in the Club Automation Amazon Virtual Private Cloud (Amazon VPC). Each firewall sits in a public subnet, protecting against unauthorized access to the private subnets where the cardholder data environment is located.\r\nClub Automation was able to easily purchase and deploy the Barracuda firewalls through the AWS Marketplace, an online store where customers can find software and services from AWS partners so they can build solutions and run their businesses.\r\n\r\n<span style=\"font-weight: bold;\">The Benefits</span>\r\n By moving its SaaS application to the AWS Cloud, Club Automation has been able to keep up with its rapid rate of growth. “AWS makes it very easy for us to scale and innovate,” says Longin. “We needed the right platform to enable growth, and we have that. Instead of having to carefully control growth because of platform limitations, we can scale on demand to support an increasing number of clubs with our application. We no longer have any restrictions on how large or fast we grow.” The company now has the agility to respond quickly to customer needs and can deploy its solutions 30–40 percent faster. Longin says, “We have to innovate by giving clubs the features they’re looking for. For example, we’re currently rolling out a new mobile app, branded by each club, and we could not have done that without using AWS and Barracuda.”\r\nClub Automation is taking advantage of Barracuda firewalls to help secure its growing number of AWS services. “We are using the Barracuda NextGen Firewalls, provisioned through the AWS Marketplace, to effectively guard our application against web-based attacks and application layer attacks,” says Longin. “The Barracuda solution plugs in seamlessly to our AWS environment, and it is doing its job of minimizing the attack surface area and helping our customers keep club member cardholder data protected.”\r\nClub Automation has also decreased the amount of time the configuration process took with its previous firewall solution. Barracuda offerings on the AWS Marketplace support AWS CloudFormation templates, which allow developers and administrators to deploy applications within a stack of AWS-related resources. <span style=\"font-weight: bold; font-style: italic;\">“The Barracuda firewall is a self-service, cloud-based solution that takes less than 15 minutes to get up and running, as opposed to the hours and sometimes days the previous solution took,” Longin says. “Provisioning new users is much simpler and faster. Instead of opening a support ticket and waiting for it to be addressed, we can just go into AWS and provision new users ourselves. This is a key benefit for us as we keep growing.”</span>\r\nRelying on Barracuda, Club Automation enabled its IT team to securely move its SaaS workloads to AWS. <span style=\"font-weight: bold; font-style: italic;\">“We had considered using a cloud solution a few years ago, but cloud offerings were not what they are today, and security solutions like Barracuda’s were not available,” says Longin. “Our move to AWS would not have been possible without Barracuda firewalls,” remarks Longin. “Using Barracuda helped us safely transition more of our workloads to AWS, and we expect our full production environment to be all-in on AWS by the end of the year.”</span>\r\nIn addition, Club Automation benefited from the ease of deployment from the AWS Marketplace.<span style=\"font-weight: bold; font-style: italic;\"> “It couldn’t have been more simple,” says Longin. “All we had to do was find the solution and then quickly configure and deploy it through the AWS Marketplace. In the software industry, it’s rare when something works as expected, but the AWS Marketplace did just that.” In the near future, Club Automation expects to use the marketplace for the upcoming Barracuda metered billing service. “With metered billing, we will be able to consume Barracuda services in the same way we consume AWS services, which will be very cost-effective for us,” </span>Longin says.\r\nPreviously, Club Automation had been holding back on expansion and had only grown through word of mouth, because it was concerned that its IT staff could not support rapid expansion. Now, using AWS, the company is poised for major growth.<span style=\"font-weight: bold; font-style: italic;\"> “We are ready and able to grow,” says Longin. “We have started hiring inside sales representatives and creating marketing plans, because we have a platform that enables scalability and expansion while also allowing us to maintain our high standards of customer service. To keep growing fast, we need agility and innovation. That’s what fueled our transition to AWS and Barracuda, and it will continue fueling our growth in this industry.”</span>","alias":"barracuda-ngfw-on-aws-for-software-provider","roi":0,"seo":{"title":"Barracuda NGFW on AWS for software provider","keywords":"Barracuda, Automation, Club, Longin, says, solution, with, that","description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Club Automation drives new business growth, safely migrates its health club management application to AWS, protects customer data, and provisions firewalls in 15 minutes ins","og:title":"Barracuda NGFW on AWS for software provider","og:description":"<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Club Automation drives new business growth, safely migrates its health club management application to AWS, protects customer data, and provisions firewalls in 15 minutes ins"},"deal_info":"","user":{"id":4195,"title":"Hidden user","logoURL":"https://old.roi4cio.com/uploads/roi/company/hidden_user.jpg","alias":"skrytyi-polzovatel","address":"","roles":[],"description":"User Information is confidential ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":98,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hidden user","keywords":"Hidden, user, User, Information, confidential","description":"User Information is confidential ","og:title":"Hidden user","og:description":"User Information is confidential ","og:image":"https://old.roi4cio.com/uploads/roi/company/hidden_user.jpg"},"eventUrl":""},"supplier":{"id":4196,"title":"Club Automation","logoURL":"https://old.roi4cio.com/uploads/roi/company/Club_Automation.png","alias":"club-automation","address":"","roles":[],"description":"Club Automation is the leading cloud-based club management software provider for the health and athletic club industry.\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Club Automation's mission is to contribute to a healthier and more active world by empowering health and fitness clubs to run their facilities effortlessly.</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"> </span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">We started with our own club - now it's your turn</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Club Automation started after club owner Jeff VanDixhorn wanted something to manage all parts of his business - from front desk to back end. He partnered with developer Max Longin and together they built a web-based solution that totally transformed the way his clubs operated. They soon realized that their solution can do much more than just help his own facilities - it can revolutionize the entire industry!</span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \"><br /></span>\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Today, Club Automation is a leading cloud-based software provider that helps the health and athletic industry to manage their clubs more efficiently. </span>","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":2,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.clubautomation.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Club Automation","keywords":"Club, Automation, club, that, their, more, clubs, industry","description":"<div>Club Automation is the leading cloud-based club management software provider for the health and athletic club industry.\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Club Automation's mission is to contribute to a","og:title":"Club Automation","og:description":"<div>Club Automation is the leading cloud-based club management software provider for the health and athletic club industry.\r\n<span style=\"color: rgb(0, 0, 0); font-family: Verdana, sans-serif; font-size: 12px; \">Club Automation's mission is to contribute to a","og:image":"https://old.roi4cio.com/uploads/roi/company/Club_Automation.png"},"eventUrl":""},"vendors":[{"id":176,"title":"Amazon Web Services","logoURL":"https://old.roi4cio.com/uploads/roi/company/aws_logo.png","alias":"amazon-web-services","address":"","roles":[],"description":" <span lang=\"EN-US\">Amazon Web Services (AWS) is the world's largest cloud service provider. Since 2006, the company has been offering customers various elements of a virtual IT infrastructure in the form of web services. Today AWS offers about 70 cloud services deployed on the basis of more than a hundred of its own data centers located in the United States, Europe, Brazil, Singapore, Japan, and Australia. Services include computing power, secure storage, analytics, mobile applications, databases, IoT solutions, and more. Customers pay only for the services they consume, dynamically expanding or contracting cloud resources as needed.</span> \r\n<span lang=\"EN-US\"> </span>\r\n<span lang=\"EN-US\"><span lang=\"en\">Through</span></span> cloud computing, companies do not need to pre-plan the use of servers and other IT infrastructure and pay for all this for several weeks or months in advance. Instead, they can deploy hundreds or thousands of servers in minutes and achieve results quickly.\r\n<span lang=\"EN-US\"> </span>\r\n<span lang=\"EN-US\">Today, Amazon Web Services provides a highly reliable, scalable, infrastructure platform in the cloud that powers hundreds of thousands of organizations in every industry and government in nearly every country in the world.</span>","companyTypes":[],"products":{},"vendoredProductsCount":36,"suppliedProductsCount":36,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":18,"vendorImplementationsCount":20,"vendorPartnersCount":0,"supplierPartnersCount":4,"b4r":0,"categories":{},"companyUrl":"http://aws.amazon.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Amazon Web Services","keywords":"Amazon, services, known, computing, also, tools, Services, than","description":" <span lang=\"EN-US\">Amazon Web Services (AWS) is the world's largest cloud service provider. Since 2006, the company has been offering customers various elements of a virtual IT infrastructure in the form of web services. Today AWS offers about 70 cloud s","og:title":"Amazon Web Services","og:description":" <span lang=\"EN-US\">Amazon Web Services (AWS) is the world's largest cloud service provider. Since 2006, the company has been offering customers various elements of a virtual IT infrastructure in the form of web services. Today AWS offers about 70 cloud s","og:image":"https://old.roi4cio.com/uploads/roi/company/aws_logo.png"},"eventUrl":""},{"id":183,"title":"Barracuda Networks","logoURL":"https://old.roi4cio.com/uploads/roi/company/barracuda_logo.png","alias":"barracuda-networks","address":"","roles":[],"description":"Barracuda Networks, Inc. is the world leader in email and web security. In addition, the company develops solutions for IM security, server load balancing systems and message archiving.<br /><br />The company develops products for security, networking and storage based on network devices and cloud services. Security products include solutions to protect against spam, web surfing, hackers and threats from instant messaging services. The platform also successfully combats such threats as spam, spyware, Trojans and other malware. Barracuda solutions provide web traffic filtering, load balancing, message archiving, backup services, data protection, and more.<br /><br />Today, more than 50,000 companies and security organizations around the world use Barracuda Networks solutions. The main product list includes solutions such as Barracuda Spam Firewall, Barracuda Web Filter, Barracuda IM Firewall. ","companyTypes":[],"products":{},"vendoredProductsCount":11,"suppliedProductsCount":11,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":15,"vendorPartnersCount":0,"supplierPartnersCount":3,"b4r":1,"categories":{},"companyUrl":"www.barracuda.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Barracuda Networks","keywords":"products, company, Barracuda, include, protection, services, storage, security","description":"Barracuda Networks, Inc. is the world leader in email and web security. In addition, the company develops solutions for IM security, server load balancing systems and message archiving.<br /><br />The company develops products for security, networking and stor","og:title":"Barracuda Networks","og:description":"Barracuda Networks, Inc. is the world leader in email and web security. In addition, the company develops solutions for IM security, server load balancing systems and message archiving.<br /><br />The company develops products for security, networking and stor","og:image":"https://old.roi4cio.com/uploads/roi/company/barracuda_logo.png"},"eventUrl":""}],"products":[{"id":108,"logo":false,"scheme":false,"title":"Amazon EC2","vendorVerified":0,"rating":"2.00","implementationsCount":7,"suppliersCount":0,"alias":"amazon-ec2","companyTypes":[],"description":"Amazon Elastic Compute Cloud (Amazon EC2) is a web service that provides secure, resizable compute capacity in the cloud. It is designed to make web-scale cloud computing easier for developers.\r\nAmazon EC2’s simple web service interface allows you to obtain and configure capacity with minimal friction. It provides you with complete control of your computing resources and lets you run on Amazon’s proven computing environment. Amazon EC2 reduces the time required to obtain and boot new server instances to minutes, allowing you to quickly scale capacity, both up and down, as your computing requirements change. Amazon EC2 changes the economics of computing by allowing you to pay only for capacity that you actually use. Amazon EC2 provides developers the tools to build failure resilient applications and isolate them from common failure scenarios.<br />\r\n\r\n<span style=\"font-weight: bold;\">BENEFITS</span><br />\r\nELASTIC WEB-SCALE COMPUTING<br />\r\nAmazon EC2 enables you to increase or decrease capacity within minutes, not hours or days. You can commission one, hundreds, or even thousands of server instances simultaneously. You can also use Amazon EC2 Auto Scaling to maintain availability of your EC2 fleet and automatically scale your fleet up and down depending on its needs in order to maximize performance and minimize cost. To scale multiple services, you can use AWS Auto Scaling.<br />\r\nCOMPLETELY CONTROLLED<br />\r\nYou have complete control of your instances including root access and the ability to interact with them as you would any machine. You can stop any instance while retaining the data on the boot partition, and then subsequently restart the same instance using web service APIs. Instances can be rebooted remotely using web service APIs, and you also have access to their console output.<br />\r\nFLEXIBLE CLOUD HOSTING SERVICES<br />\r\nYou have the choice of multiple instance types, operating systems, and software packages. Amazon EC2 allows you to select a configuration of memory, CPU, instance storage, and the boot partition size that is optimal for your choice of operating system and application. For example, choice of operating systems includes numerous Linux distributions and Microsoft Windows Server.<br />\r\nINTEGRATED<br />\r\nAmazon EC2 is integrated with most AWS services such as Amazon Simple Storage Service (Amazon S3), Amazon Relational Database Service (Amazon RDS), and Amazon Virtual Private Cloud (Amazon VPC) to provide a complete, secure solution for computing, query processing, and cloud storage across a wide range of applications.<br />\r\nRELIABLE<br />\r\nAmazon EC2 offers a highly reliable environment where replacement instances can be rapidly and predictably commissioned. The service runs within Amazon’s proven network infrastructure and data centers. The Amazon EC2 Service Level Agreement commitment is 99.99% availability for each Amazon EC2 Region.<br />\r\nSECURE<br />\r\nCloud security at AWS is the highest priority. As an AWS customer, you will benefit from a data center and network architecture built to meet the requirements of the most security-sensitive organizations. Amazon EC2 works in conjunction with Amazon VPC to provide security and robust networking functionality for your compute resources.<br />\r\nINEXPENSIVE<br />\r\nAmazon EC2 passes on to you the financial benefits of Amazon’s scale. You pay a very low rate for the compute capacity you actually consume.<br />\r\nEASY TO START<br />\r\nThere are several ways to get started with Amazon EC2. You can use the AWS Management Console, the AWS Command Line Tools (CLI), or AWS SDKs. AWS is free to get started. ","shortDescription":"Amazon EC2 - Virtual Server Hosting\r\nAmazon Elastic Compute Cloud is a web service that provides resizable compute capacity in the cloud.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Amazon EC2","keywords":"Amazon, your, with, instances, computing, capacity, service, have","description":"Amazon Elastic Compute Cloud (Amazon EC2) is a web service that provides secure, resizable compute capacity in the cloud. It is designed to make web-scale cloud computing easier for developers.\r\nAmazon EC2’s simple web service interface allows you to obtain an","og:title":"Amazon EC2","og:description":"Amazon Elastic Compute Cloud (Amazon EC2) is a web service that provides secure, resizable compute capacity in the cloud. It is designed to make web-scale cloud computing easier for developers.\r\nAmazon EC2’s simple web service interface allows you to obtain an"},"eventUrl":"","translationId":108,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":689,"title":"Amazon Web Services","alias":"amazon-web-services","description":"Amazon Web Services (AWS) is a subsidiary of Amazon that provides on-demand cloud computing platforms to individuals, companies and governments, on a metered pay-as-you-go basis. In aggregate, these cloud computing web services provide a set of primitive, abstract technical infrastructure and distributed computing building blocks and tools. One of these services is Amazon Elastic Compute Cloud, which allows users to have at their disposal a virtual cluster of computers, available all the time, through the Internet. AWS's version of virtual computers emulate most of the attributes of a real computer including hardware (CPU(s) & GPU(s) for processing, local/RAM memory, hard-disk/SSD storage); a choice of operating systems; networking; and pre-loaded application software such as web servers, databases, CRM, etc.\r\nThe AWS technology is implemented at server farms throughout the world, and maintained by the Amazon subsidiary. Fees are based on a combination of usage, the hardware/OS/software/networking features chosen by the subscriber, required availability, redundancy, security, and service options. Subscribers can pay for a single virtual AWS computer, a dedicated physical computer, or clusters of either. As part of the subscription agreement, Amazon provides security for subscribers' system. AWS operates from many global geographical regions including 6 in North America.\r\nIn 2017, AWS comprised more than 90 services spanning a wide range including computing, storage, networking, database, analytics, application services, deployment, management, mobile, developer tools, and tools for the Internet of Things. The most popular include Amazon Elastic Compute Cloud (EC2) and Amazon Simple Storage Service (S3). Most services are not exposed directly to end users, but instead offer functionality through APIs for developers to use in their applications. Amazon Web Services' offerings are accessed over HTTP, using the REST architectural style and SOAP protocol.\r\nAmazon markets AWS to subscribers as a way of obtaining large scale computing capacity more quickly and cheaply than building an actual physical server farm. All services are billed based on usage, but each service measures usage in varying ways. As of 2017, AWS owns a dominant 34% of all cloud (IaaS, PaaS) while the next three competitors Microsoft, Google, and IBM have 11%, 8%, 6% respectively according to Synergy Group.","materialsDescription":"<span style=\"font-weight: bold;\">What is "Amazon Web Services" (AWS)?</span>\r\nWith Amazon Web Services (AWS), organizations can flexibly deploy storage space and computing capacity into Amazon's data centers without having to maintain their own hardware. A big advantage is that the infrastructure covers all dimensions for cloud computing. Whether it's video sharing, high-resolution photos, print data, or text documents, AWS can deliver IT resources on-demand, over the Internet, at a cost-per-use basis. The service exists since 2006 as a wholly owned subsidiary of Amazon Inc. The idea arose from the extensive experience with Amazon.com and the own need for platforms for web services in the cloud.\r\n<span style=\"font-weight: bold;\">What is Cloud Computing?</span>\r\nCloud Computing is a service that gives you access to expert-managed technology resources. The platform in the cloud provides the infrastructure (eg computing power, storage space) that does not have to be installed and configured in contrast to the hardware you have purchased yourself. Cloud computing only pays for the resources that are used. For example, a web shop can increase its computing power in the Christmas business and book less in "weak" months.\r\nAccess is via the Internet or VPN. There are no ongoing investment costs after the initial setup, but resources such as Virtual servers, databases or storage services are charged only after they have been used.\r\n<span style=\"font-weight: bold;\">Where is my data on Amazon AWS?</span>\r\nThere are currently eight Amazon Data Centers (AWS Regions) in different regions of the world. For each Amazon AWS resource, only the customer can decide where to use or store it. German customers typically use the data center in Ireland, which is governed by European law.\r\n<span style=\"font-weight: bold;\">How safe is my data on Amazon AWS?</span>\r\nThe customer data is stored in a highly secure infrastructure. Safety measures include, but are not limited to:\r\n<ul><li>Protection against DDos attacks (Distributed Denial of Service)</li><li>Defense against brute-force attacks on AWS accounts</li><li>Secure access: The access options are made via SSL.</li><li> Firewall: Output and access to the AWS data can be controlled.</li><li>Encrypted Data Storage: Data can be encrypted with Advanced Encryption Standard (AES) 256.</li><li>Certifications: Regular security review by independent certifications that AWS has undergone.</li></ul>\r\nEach Amazon data center (AWS region) consists of at least one Availability Zone. Availability Zones are stand-alone sub-sites that have been designed to be isolated from faults in other Availability Zones (independent power and data supply). Certain AWS resources, such as Database Services (RDS) or Storage Services (S3) automatically replicate your data within the AWS region to the different Availability Zones.\r\nAmazon AWS has appropriate certifications such as ISO27001 and has implemented a comprehensive security concept for the operation of its data center.\r\n<span style=\"font-weight: bold;\">Do I have to worry about hardware on Amazon AWS?</span>\r\nNo, all Amazon AWS resources are virtualized. Only Amazon takes care of the replacement and upgrade of hardware.\r\nNormally, you will not get anything out of defective hardware because defective storage media are exchanged by Amazon and since your data is stored multiple times redundantly, there is usually no problem either.\r\nIncidentally, if your chosen resources do not provide enough performance, you can easily get more CPU power from resources by just a few mouse clicks. You do not have to install anything new, just reboot your virtual machine or virtual database instance.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Amazon_Web_Services.png"},{"id":786,"title":"IaaS - computing","alias":"iaas-computing","description":"Cloud computing is the on demand availability of computer system resources, especially data storage and computing power, without direct active management by the user. The term is generally used to describe data centers available to many users over the Internet. Large clouds, predominant today, often have functions distributed over multiple locations from central servers. If the connection to the user is relatively close, it may be designated an edge server.\r\nInfrastructure as a service (IaaS) are online services that provide high-level APIs used to dereference various low-level details of underlying network infrastructure like physical computing resources, location, data partitioning, scaling, security, backup etc. A hypervisor, such as Xen, Oracle VirtualBox, Oracle VM, KVM, VMware ESX/ESXi, or Hyper-V, LXD, runs the virtual machines as guests. Pools of hypervisors within the cloud operational system can support large numbers of virtual machines and the ability to scale services up and down according to customers' varying requirements.\r\nTypically IaaS involve the use of a cloud orchestration technology like Open Stack, Apache Cloudstack or Open Nebula. This manages the creation of a virtual machine and decides on which hypervisor (i.e. physical host) to start it, enables VM migration features between hosts, allocates storage volumes and attaches them to VMs, usage information for billing and lots more.\r\nAn alternative to hypervisors are Linux containers, which run in isolated partitions of a single Linux kernel running directly on the physical hardware. Linux cgroups and namespaces are the underlying Linux kernel technologies used to isolate, secure and manage the containers. Containerisation offers higher performance than virtualization, because there is no hypervisor overhead. Also, container capacity auto-scales dynamically with computing load, which eliminates the problem of over-provisioning and enables usage-based billing.\r\nIaaS clouds often offer additional resources such as a virtual-machine disk-image library, raw block storage, file or object storage, firewalls, load balancers, IP addresses, virtual local area networks (VLANs), and software bundles.\r\nThe NIST's definition of cloud computing defines Infrastructure as a Service as:\r\n<ul><li>The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications.</li><li>The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, and deployed applications; and possibly limited control of select networking components (e.g., host firewalls).</li></ul>\r\nAccording to the Internet Engineering Task Force (IETF), the most basic cloud-service model is that of providers offering IT infrastructure — virtual machines and other resources — as a service to subscribers.\r\nIaaS-cloud providers supply these resources on-demand from their large pools of equipment installed in data centers. For wide-area connectivity, customers can use either the Internet or carrier clouds (dedicated virtual private networks). To deploy their applications, cloud users install operating-system images and their application software on the cloud infrastructure. In this model, the cloud user patches and maintains the operating systems and the application software. Cloud providers typically bill IaaS services on a utility computing basis: cost reflects the amount of resources allocated and consumed.","materialsDescription":" <span style=\"font-weight: bold; \">Cloud Computing Basics</span>\r\nWhether you are running applications that share photos to millions of mobile users or you’re supporting the critical operations of your business, a cloud services platform provides rapid access to flexible and low cost IT resources. With cloud computing, you don’t need to make large upfront investments in hardware and spend a lot of time on the heavy lifting of managing that hardware. Instead, you can provision exactly the right type and size of computing resources you need to power your newest bright idea or operate your IT department. You can access as many resources as you need, almost instantly, and only pay for what you use.\r\n<span style=\"font-weight: bold; \">How Does Cloud Computing Work?</span>\r\nCloud computing provides a simple way to access servers, storage, databases and a broad set of application services over the Internet. A Cloud services platform such as Amazon Web Services owns and maintains the network-connected hardware required for these application services, while you provision and use what you need via a web application.\r\n<span style=\"font-weight: bold; \">Six Advantages and Benefits of Cloud Computing</span>\r\n<span style=\"font-weight: bold; \">Trade capital expense for variable expense</span>\r\nInstead of having to invest heavily in data centers and servers before you know how you’re going to use them, you can only pay when you consume computing resources, and only pay for how much you consume.\r\n<span style=\"font-weight: bold; \">Benefit from massive economies of scale</span>\r\nBy using cloud computing, you can achieve a lower variable cost than you can get on your own. Because usage from hundreds of thousands of customers are aggregated in the cloud, providers can achieve higher economies of scale which translates into lower pay as you go prices.\r\n<span style=\"font-weight: bold; \">Stop guessing capacity</span>\r\nEliminate guessing on your infrastructure capacity needs. When you make a capacity decision prior to deploying an application, you often either end up sitting on expensive idle resources or dealing with limited capacity. With cloud computing, these problems go away. You can access as much or as little as you need, and scale up and down as required with only a few minutes notice.\r\n<span style=\"font-weight: bold; \">Increase speed and agility</span>\r\nIn a cloud computing environment, new IT resources are only ever a click away, which means you reduce the time it takes to make those resources available to your developers from weeks to just minutes. This results in a dramatic increase in agility for the organization, since the cost and time it takes to experiment and develop is significantly lower.\r\n<span style=\"font-weight: bold; \">Stop spending money on running and maintaining data centers</span>\r\nFocus on projects that differentiate your business, not the infrastructure. Cloud computing lets you focus on your own customers, rather than on the heavy lifting of racking, stacking and powering servers.\r\n<span style=\"font-weight: bold; \">Go global in minutes</span>\r\nEasily deploy your application in multiple regions around the world with just a few clicks. This means you can provide a lower latency and better experience for your customers simply and at minimal cost.\r\n<span style=\"font-weight: bold;\">Types of Cloud Computing</span>\r\nCloud computing has three main types that are commonly referred to as Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Selecting the right type of cloud computing for your needs can help you strike the right balance of control and the avoidance of undifferentiated heavy lifting.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IaaS_computing.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1244,"logo":false,"scheme":false,"title":"Amazon Virtual Private Cloud (VPC)","vendorVerified":0,"rating":"2.00","implementationsCount":5,"suppliersCount":0,"alias":"amazon-virtual-private-cloud-vpc","companyTypes":[],"description":"Amazon Virtual Private Cloud (Amazon VPC) lets you provision a logically isolated section of the AWS Cloud where you can launch AWS resources in a virtual network that you define. You have complete control over your virtual networking environment, including selection of your own IP address range, creation of subnets, and configuration of route tables and network gateways. You can use both IPv4 and IPv6 in your VPC for secure and easy access to resources and applications.\r\nYou can easily customize the network configuration for your Amazon VPC. For example, you can create a public-facing subnet for your web servers that has access to the Internet, and place your backend systems such as databases or application servers in a private-facing subnet with no Internet access. You can leverage multiple layers of security, including security groups and network access control lists, to help control access to Amazon EC2 instances in each subnet.\r\nAdditionally, you can create a Hardware Virtual Private Network (VPN) connection between your corporate data center and your VPC and leverage the AWS Cloud as an extension of your corporate data center.\r\n \r\n\r\n<span style=\"font-weight: bold;\">FEATURES</span>\r\nMULTIPLE CONNECTIVITY OPTIONS\r\nA variety of connectivity options exist for your Amazon VPC. You can connect your VPC to the Internet, to your data center, or other VPCs, based on the AWS resources that you want to expose publicly and those that you want to keep private.\r\n<ul><li>Connect directly to the Internet (public subnets)– You can launch instances into a publicly accessible subnet where they can send and receive traffic from the Internet.</li><li>Connect to the Internet using Network Address Translation (private subnets) – Private subnets can be used for instances that you do not want to be directly addressable from the Internet. Instances in a private subnet can access the Internet without exposing their private IP address by routing their traffic through a Network Address Translation (NAT) gateway in a public subnet.</li><li>Connect securely to your corporate datacenter– All traffic to and from instances in your VPC can be routed to your corporate datacenter over an industry standard, encrypted IPsec hardware VPN connection.</li><li>Connect privately to other VPCs- Peer VPCs together to share resources across multiple virtual networks owned by your or other AWS accounts.</li><li>Privately connect to AWS Services without using an Internet gateway, NAT or firewall proxy through a VPC Endpoint. Available AWS services include S3, DynamoDB, Kinesis Streams, Service Catalog, EC2 Systems Manager (SSM), Elastic Load Balancing (ELB) API, and Amazon Elastic Compute Cloud (EC2) API.</li><li>Privately connect to SaaS solutions supported by AWS PrivateLink.</li><li>Privately connect your internal services across different accounts and VPCs within your own organizations, significantly simplifying your internal network architecture.</li></ul>\r\nSECURE\r\nAmazon VPC provides advanced security features, such as security groups and network access control lists, to enable inbound and outbound filtering at the instance level and subnet level. In addition, you can store data in Amazon S3 and restrict access so that it’s only accessible from instances in your VPC. Optionally, you can also choose to launch Dedicated Instances which run on hardware dedicated to a single customer for additional isolation.\r\nSIMPLE\r\nYou can create a VPC quickly and easily using the AWS Management Console. You can select one of the common network setups that best match your needs and press "Start VPC Wizard." Subnets, IP ranges, route tables, and security groups are automatically created for you so you can concentrate on creating the applications to run in your VPC.\r\nALL THE SCALABILITY AND RELIABILITY OF AWS\r\nAmazon VPC provides all of the same benefits as the rest of the AWS platform. You can instantly scale your resources up or down, select Amazon EC2 instances types and sizes that are right for your applications, and pay only for the resources you use - all within Amazon’s proven infrastructure.","shortDescription":"Amazon Virtual Private Cloud - Provision a logically isolated section of the Amazon Web Services (AWS) Cloud where you can launch AWS resources in a virtual network that you define","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":0,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Amazon Virtual Private Cloud (VPC)","keywords":"your, Amazon, Internet, that, access, network, subnet, instances","description":"Amazon Virtual Private Cloud (Amazon VPC) lets you provision a logically isolated section of the AWS Cloud where you can launch AWS resources in a virtual network that you define. You have complete control over your virtual networking environment, including se","og:title":"Amazon Virtual Private Cloud (VPC)","og:description":"Amazon Virtual Private Cloud (Amazon VPC) lets you provision a logically isolated section of the AWS Cloud where you can launch AWS resources in a virtual network that you define. You have complete control over your virtual networking environment, including se"},"eventUrl":"","translationId":1244,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":2,"title":"Virtual machine and cloud system software","alias":"virtual-machine-and-cloud-system-software","description":" A virtual machine (VM) is a software-based computer that exists within another computer’s operating system, often used for the purposes of testing, backing up data, or running SaaS applications. To fully grasp how VMs work, it’s important to first understand how computer software and hardware are typically integrated by an operating system.\r\n"The cloud" refers to servers that are accessed over the Internet, and the software and databases that run on those servers. Cloud servers are located in data centers all over the world. By using cloud computing, users and companies don't have to manage physical servers themselves or run software applications on their own machines.\r\nThe cloud enables users to access the same files and applications from almost any device, because the computing and storage take place on servers in a data center, instead of locally on the user device. This is why a user can log into their Instagram account on a new phone after their old phone breaks and still find their old account in place, with all their photos, videos, and conversation history. It works the same way with cloud email providers like Gmail or Microsoft Office 365, and with cloud storage providers like Dropbox or Google Drive.\r\nFor businesses, switching to cloud computing removes some IT costs and overhead: for instance, they no longer need to update and maintain their own servers, as the cloud vendor they are using will do that. This especially makes an impact on small businesses that may not have been able to afford their own internal infrastructure but can outsource their infrastructure needs affordably via the cloud. The cloud can also make it easier for companies to operate internationally because employees and customers can access the same files and applications from any location.\r\nSeveral cloud providers offer virtual machines to their customers. These virtual machines typically live on powerful servers that can act as a host to multiple VMs and can be used for a variety of reasons that wouldn’t be practical with a locally-hosted VM. These include:\r\n<ul><li>Running SaaS applications - Software-as-a-Service, or SaaS for short, is a cloud-based method of providing software to users. SaaS users subscribe to an application rather than purchasing it once and installing it. These applications are generally served to the user over the Internet. Often, it is virtual machines in the cloud that are doing the computation for SaaS applications as well as delivering them to users. If the cloud provider has a geographically distributed network edge, then the application will run closer to the user, resulting in faster performance.</li><li>Backing up data - Cloud-based VM services are very popular for backing up data because the data can be accessed from anywhere. Plus, cloud VMs provide better redundancy, require less maintenance, and generally scale better than physical data centers. (For example, it’s generally fairly easy to buy an extra gigabyte of storage space from a cloud VM provider, but much more difficult to build a new local data server for that extra gigabyte of data.)</li><li>Hosting services like email and access management - Hosting these services on cloud VMs is generally faster and more cost-effective, and helps minimize maintenance and offload security concerns as well.</li></ul>","materialsDescription":"What is an operating system?\r\nTraditional computers are built out of physical hardware, including hard disk drives, processor chips, RAM, etc. In order to utilize this hardware, computers rely on a type of software known as an operating system (OS). Some common examples of OSes are Mac OSX, Microsoft Windows, Linux, and Android.\r\nThe OS is what manages the computer’s hardware in ways that are useful to the user. For example, if the user wants to access the Internet, the OS directs the network interface card to make the connection. If the user wants to download a file, the OS will partition space on the hard drive for that file. The OS also runs and manages other pieces of software. For example, it can run a web browser and provide the browser with enough random access memory (RAM) to operate smoothly. Typically, operating systems exist within a physical computer at a one-to-one ratio; for each machine, there is a single OS managing its physical resources.\r\n<span style=\"font-weight: bold;\">Can you have two or more operating systems on one computer?</span>\r\nSome users want to be able to run multiple operating systems simultaneously on one computer, either for testing or one of the other reasons listed in the section below. This can be achieved through a process called virtualization. In virtualization, a piece of software behaves as if it were an independent computer. This piece of software is called a virtual machine, also known as a ‘guest’ computer. (The computer on which the VM is running is called the ‘host’.) The guest has an OS as well as its own virtual hardware.\r\n‘Virtual hardware’ may sound like a bit of an oxymoron, but it works by mapping to real hardware on the host computer. For example, the VM’s ‘hard drive’ is really just a file on the host computer’s hard drive. When the VM wants to save a new file, it actually has to communicate with the host OS, which will write this file to the host hard drive. Because virtual hardware must perform this added step of negotiating with the host to access hardware resources, virtual machines can’t run quite as fast as their host computers.\r\nWith virtualization, one computer can run two or more operating systems. The number of VMs that can run on one host is limited only by the host’s available resources. The user can run the OS of a VM in a window like any other program, or they can run it in fullscreen so that it looks and feels like a genuine host OS.\r\n <span style=\"font-weight: bold; \">What are virtual machines used for?</span>\r\nSome of the most popular reasons people run virtual machines include:\r\n<span style=\"font-weight: bold; \">Testing</span> - Oftentimes software developers want to be able to test their applications in different environments. They can use virtual machines to run their applications in various OSes on one computer. This is simpler and more cost-effective than having to test on several different physical machines.\r\n<span style=\"font-weight: bold; \">Running software designed for other OSes</span> - Although certain software applications are only available for a single platform, a VM can run software designed for a different OS. For example, a Mac user who wants to run software designed for Windows can run a Windows VM on their Mac host.\r\n<span style=\"font-weight: bold; \">Running outdated software</span> - Some pieces of older software can’t be run in modern OSes. Users who want to run these applications can run an old OS on a virtual machine.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Virtual_machine_and_cloud_system_software.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":1399,"logo":false,"scheme":false,"title":"Barracuda NextGen Firewall (NGFW)","vendorVerified":0,"rating":"3.00","implementationsCount":4,"suppliersCount":0,"alias":"barracuda-nextgen-firewall-ngfw","companyTypes":[],"description":"<span style=\"font-weight: bold;\">Next-Generation Firewalls for the Cloud Era</span>\r\nIn the cloud era, network firewalls must do more than secure your network. They must also ensure you have uninterrupted network availability and robust access to cloud-hosted applications. The Barracuda NextGen Firewall F-Series is a family of hardware, virtual, and cloud-based appliances that protect and enhance your dispersed network infrastructure. They deliver advanced security by tightly integrating a comprehensive set of next-generation firewall technologies, including Layer 7 application profiling, intrusion prevention, web filtering, malware and advanced threat protection, antispam protection, and network access control. In addition, the F-Series combines highly resilient VPN technology with intelligent traffic management and WAN optimization capabilities. This lets you reduce line costs, increase overall network availability, improve site-to-site connectivity, and ensure uninterrupted access to applications hosted in the cloud. Scalable centralized management helps you reduce administrative overhead while defining and enforcing granular policies across your entire dispersed network. The F-Series cloud-ready firewalls are ideal for multi-site enterprises, managed service providers, and other organizations with complex, dispersed network infrastructures.\r\n<span style=\"font-weight: bold;\">Security for the Cloud Era</span>\r\nSecurity paradigms are shifting—and securing your network perimeter is no longer good enough. In the cloud era, workloads happen everywhere, users are increasingly mobile, and potential attack surfaces are multiplying. Barracuda NextGen Firewall F-Series is purpose-built to deal with the challenges of securing widely distributed networks.\r\n<span style=\"font-weight: bold;\">Advanced Threat Protection</span>\r\nIn today's constantly evolving threat landscape, your organization faces zero-hour malware exploits and advanced persistent threats that routinely bypass traditional, signature-based IPS and antivirus engines. Barracuda Advanced Threat Protection gives your security infrastructure the ability to identify and block new, sophisticated threats-without affecting network performance and throughput.\r\n<span style=\"font-weight: bold;\">Secure SD-WAN..</span>\r\nBarracuda Cloud Era Firewalls include full next gen Security paired with all network optimization and management functionality today known as Secure SD-WAN. This includes true zero touch deployment (ZTD), dynamic bandwidth measurement, performance based transport selection, application specific routing and even data duplication and WAN optimization technology. VPN tunnels between sites can make use of multiple uplinks simultaneously and dynamically assign the best path for the application.\r\n<span style=\"font-weight: bold;\">This enables:</span>\r\n\r\n<ul> <li>Balancing of Internet traffic across multiple uplinks to minimize downtime and improve performance</li> <li>VPN across multiple broadband connections and MPLs replacement</li> <li>Up to 24 physical uplinks to create highly redundant VPN tunnels</li> <li>Replacing network backhauling central policy enforcement architectures with direct internet break outs</li> <li>Faster access to cloud applications like office365 by dynamically prioritizing them over non-critical traffic</li> <li>Guaranteed users' access to critical applications through granular policy controls</li> <li>Increased available bandwidth with built-in traffic compression and data deduplication</li> <li>Auto creation of VPN tunnels between spokes in a hub-and-spoke architecture to enhance connection quality for latency-sensitive traffic</li> </ul>\r\n<span style=\"font-weight: bold;\">Why Barracuda NextGen Firewall?</span> When selecting security technology, it is critical that your products are supported by people who take your data security as seriously as you do. The Barracuda NextGen Firewall is supported by our award-winning 24x7 technical support staffed by in-house security engineers with no phone trees. Help is always a phone call away. Hundreds of thousands of organizations around the globe rely on Barracuda to protect their applications, networks, and data. The Barracuda NextGen Firewall is part of a comprehensive line of data protection, network firewall, and security products and services designed for organizations seeking robust yet affordable protection from ever-increasing cyber threats.\r\n<span style=\"font-style: italic;\">Source: https://www.barracuda.com/products/nextgenfirewall_f</span>","shortDescription":"Barracuda's Next Generation Firewalls redefine the role of the Firewall from a perimeter security solution to a distributed network optimization solution that scales across any number of locations.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":0,"sellingCount":5,"discontinued":0,"rebateForPoc":0,"rebate":5,"seo":{"title":"Barracuda NextGen Firewall (NGFW)","keywords":"","description":"<span style=\"font-weight: bold;\">Next-Generation Firewalls for the Cloud Era</span>\r\nIn the cloud era, network firewalls must do more than secure your network. They must also ensure you have uninterrupted network availability and robust access to cloud-hosted ","og:title":"Barracuda NextGen Firewall (NGFW)","og:description":"<span style=\"font-weight: bold;\">Next-Generation Firewalls for the Cloud Era</span>\r\nIn the cloud era, network firewalls must do more than secure your network. They must also ensure you have uninterrupted network availability and robust access to cloud-hosted "},"eventUrl":"","translationId":1400,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"A next-generation firewall (NGFW) is a part of the third generation of firewall technology that is implemented in either hardware or software and is capable of detecting and blocking sophisticated attacks by enforcing security policies at the application, port and protocol levels.\r\nNGFWs typically feature advanced functions including:\r\n<ul><li>application awareness;</li><li>integrated intrusion prevention systems (IPS);</li><li>identity awareness -- user and group control;</li><li>bridged and routed modes;</li><li> the ability to use external intelligence sources.</li></ul>\r\nOf these offerings, most next-generation firewalls integrate at least three basic functions: enterprise firewall capabilities, an intrusion prevention system (IPS) and application control.\r\nLike the introduction of stateful inspection in traditional firewalls, NGFWs bring additional context to the firewall's decision-making process by providing it with the ability to understand the details of the web application traffic passing through it and to take action to block traffic that might exploit vulnerabilities.\r\nThe different features of next-generation firewalls combine to create unique benefits for users. NGFWs are often able to block malware before it enters a network, something that wasn't previously possible.\r\nNGFWs are also better equipped to address advanced persistent threats (APTs) because they can be integrated with threat intelligence services. NGFWs can also offer a low-cost option for companies trying to improve basic device security through the use of application awareness, inspection services, protection systems and awareness tools.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What is a next-generation firewall (NGFW)?</span>\r\nA NGFW contains all the normal defenses that a traditional firewall has as well as a type of intrusion prevention software and application control, alongside other additional security features. NGFWs are also capable of deep packet inspection, which enables more robust filters.\r\nIntrusion prevention software monitors network activity to detect and stop vulnerability exploits from occurring. This is usually done by monitoring for breaches against the network policies in place as a breach is usually indicative of malicious activity.\r\nApplication control software simply sets up a hard filter for programs that are trying to send or receive data over the Internet. This can either be done by a blacklist (programs in the filter are blocked) or by a whitelist (programs not in the filter are blocked).","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_NGFW.png"},{"id":784,"title":"NGFW - next-generation firewall - Appliance","alias":"ngfw-next-generation-firewall-appliance","description":" A next-generation firewall (NGFW) is a part of the third generation of firewall technology, combining a traditional firewall with other network device filtering functionalities, such as an application firewall using in-line deep packet inspection (DPI), an intrusion prevention system (IPS). Other techniques might also be employed, such as TLS/SSL encrypted traffic inspection, website filtering, QoS/bandwidth management, antivirus inspection and third-party identity management integration (i.e. LDAP, RADIUS, Active Directory).\r\nNGFWs include the typical functions of traditional firewalls such as packet filtering, network- and port-address translation (NAT), stateful inspection, and virtual private network (VPN) support. The goal of next-generation firewalls is to include more layers of the OSI model, improving filtering of network traffic that is dependent on the packet contents.\r\nNGFWs perform deeper inspection compared to stateful inspection performed by the first- and second-generation firewalls. NGFWs use a more thorough inspection style, checking packet payloads and matching signatures for harmful activities such as exploitable attacks and malware.\r\nImproved detection of encrypted applications and intrusion prevention service. Modern threats like web-based malware attacks, targeted attacks, application-layer attacks, and more have had a significantly negative effect on the threat landscape. In fact, more than 80% of all new malware and intrusion attempts are exploiting weaknesses in applications, as opposed to weaknesses in networking components and services.\r\nStateful firewalls with simple packet filtering capabilities were efficient blocking unwanted applications as most applications met the port-protocol expectations. Administrators could promptly prevent an unsafe application from being accessed by users by blocking the associated ports and protocols. But today, blocking a web application like Farmville that uses port 80 by closing the port would also mean complications with the entire HTTP protocol.\r\nProtection based on ports, protocols, IP addresses is no more reliable and viable. This has led to the development of identity-based security approach, which takes organizations a step ahead of conventional security appliances which bind security to IP-addresses.\r\nNGFWs offer administrators a deeper awareness of and control over individual applications, along with deeper inspection capabilities by the firewall. Administrators can create very granular "allow/deny" rules for controlling use of websites and applications in the network. ","materialsDescription":"<span style=\"font-weight: bold;\"> What is a next-generation firewall (NGFW)?</span>\r\nAn NGFW contains all the normal defences that a traditional firewall has as well as a type of intrusion prevention software and application control, alongside other bonus security features. NGFWs are also capable of deep packet inspection which enables more robust filters.\r\nIntrusion prevention software monitors network activity to detect and stop vulnerability exploits from occurring. This is usually done by monitoring for breaches against the network policies in place as a breach is usually indicative of malicious activity.\r\nApplication control software simply sets up a hard filter for programs that are trying to send or receive data over the Internet. This can either be done by blacklist (programs in the filter are blocked) or by whitelist (programs not in the filter are blocked).","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_NGFW.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":281,"title":"No IT security guidelines"},{"id":282,"title":"Unauthorized access to corporate IT systems and data"},{"id":336,"title":"Risk or Leaks of confidential information"},{"id":384,"title":"Risk of attacks by hackers"},{"id":385,"title":"Risk of data loss or damage"},{"id":386,"title":"Risk of lost access to data and IT systems"}]}},"categories":[{"id":689,"title":"Amazon Web Services","alias":"amazon-web-services","description":"Amazon Web Services (AWS) is a subsidiary of Amazon that provides on-demand cloud computing platforms to individuals, companies and governments, on a metered pay-as-you-go basis. In aggregate, these cloud computing web services provide a set of primitive, abstract technical infrastructure and distributed computing building blocks and tools. One of these services is Amazon Elastic Compute Cloud, which allows users to have at their disposal a virtual cluster of computers, available all the time, through the Internet. AWS's version of virtual computers emulate most of the attributes of a real computer including hardware (CPU(s) & GPU(s) for processing, local/RAM memory, hard-disk/SSD storage); a choice of operating systems; networking; and pre-loaded application software such as web servers, databases, CRM, etc.\r\nThe AWS technology is implemented at server farms throughout the world, and maintained by the Amazon subsidiary. Fees are based on a combination of usage, the hardware/OS/software/networking features chosen by the subscriber, required availability, redundancy, security, and service options. Subscribers can pay for a single virtual AWS computer, a dedicated physical computer, or clusters of either. As part of the subscription agreement, Amazon provides security for subscribers' system. AWS operates from many global geographical regions including 6 in North America.\r\nIn 2017, AWS comprised more than 90 services spanning a wide range including computing, storage, networking, database, analytics, application services, deployment, management, mobile, developer tools, and tools for the Internet of Things. The most popular include Amazon Elastic Compute Cloud (EC2) and Amazon Simple Storage Service (S3). Most services are not exposed directly to end users, but instead offer functionality through APIs for developers to use in their applications. Amazon Web Services' offerings are accessed over HTTP, using the REST architectural style and SOAP protocol.\r\nAmazon markets AWS to subscribers as a way of obtaining large scale computing capacity more quickly and cheaply than building an actual physical server farm. All services are billed based on usage, but each service measures usage in varying ways. As of 2017, AWS owns a dominant 34% of all cloud (IaaS, PaaS) while the next three competitors Microsoft, Google, and IBM have 11%, 8%, 6% respectively according to Synergy Group.","materialsDescription":"<span style=\"font-weight: bold;\">What is "Amazon Web Services" (AWS)?</span>\r\nWith Amazon Web Services (AWS), organizations can flexibly deploy storage space and computing capacity into Amazon's data centers without having to maintain their own hardware. A big advantage is that the infrastructure covers all dimensions for cloud computing. Whether it's video sharing, high-resolution photos, print data, or text documents, AWS can deliver IT resources on-demand, over the Internet, at a cost-per-use basis. The service exists since 2006 as a wholly owned subsidiary of Amazon Inc. The idea arose from the extensive experience with Amazon.com and the own need for platforms for web services in the cloud.\r\n<span style=\"font-weight: bold;\">What is Cloud Computing?</span>\r\nCloud Computing is a service that gives you access to expert-managed technology resources. The platform in the cloud provides the infrastructure (eg computing power, storage space) that does not have to be installed and configured in contrast to the hardware you have purchased yourself. Cloud computing only pays for the resources that are used. For example, a web shop can increase its computing power in the Christmas business and book less in "weak" months.\r\nAccess is via the Internet or VPN. There are no ongoing investment costs after the initial setup, but resources such as Virtual servers, databases or storage services are charged only after they have been used.\r\n<span style=\"font-weight: bold;\">Where is my data on Amazon AWS?</span>\r\nThere are currently eight Amazon Data Centers (AWS Regions) in different regions of the world. For each Amazon AWS resource, only the customer can decide where to use or store it. German customers typically use the data center in Ireland, which is governed by European law.\r\n<span style=\"font-weight: bold;\">How safe is my data on Amazon AWS?</span>\r\nThe customer data is stored in a highly secure infrastructure. Safety measures include, but are not limited to:\r\n<ul><li>Protection against DDos attacks (Distributed Denial of Service)</li><li>Defense against brute-force attacks on AWS accounts</li><li>Secure access: The access options are made via SSL.</li><li> Firewall: Output and access to the AWS data can be controlled.</li><li>Encrypted Data Storage: Data can be encrypted with Advanced Encryption Standard (AES) 256.</li><li>Certifications: Regular security review by independent certifications that AWS has undergone.</li></ul>\r\nEach Amazon data center (AWS region) consists of at least one Availability Zone. Availability Zones are stand-alone sub-sites that have been designed to be isolated from faults in other Availability Zones (independent power and data supply). Certain AWS resources, such as Database Services (RDS) or Storage Services (S3) automatically replicate your data within the AWS region to the different Availability Zones.\r\nAmazon AWS has appropriate certifications such as ISO27001 and has implemented a comprehensive security concept for the operation of its data center.\r\n<span style=\"font-weight: bold;\">Do I have to worry about hardware on Amazon AWS?</span>\r\nNo, all Amazon AWS resources are virtualized. Only Amazon takes care of the replacement and upgrade of hardware.\r\nNormally, you will not get anything out of defective hardware because defective storage media are exchanged by Amazon and since your data is stored multiple times redundantly, there is usually no problem either.\r\nIncidentally, if your chosen resources do not provide enough performance, you can easily get more CPU power from resources by just a few mouse clicks. You do not have to install anything new, just reboot your virtual machine or virtual database instance.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Amazon_Web_Services.png"},{"id":786,"title":"IaaS - computing","alias":"iaas-computing","description":"Cloud computing is the on demand availability of computer system resources, especially data storage and computing power, without direct active management by the user. The term is generally used to describe data centers available to many users over the Internet. Large clouds, predominant today, often have functions distributed over multiple locations from central servers. If the connection to the user is relatively close, it may be designated an edge server.\r\nInfrastructure as a service (IaaS) are online services that provide high-level APIs used to dereference various low-level details of underlying network infrastructure like physical computing resources, location, data partitioning, scaling, security, backup etc. A hypervisor, such as Xen, Oracle VirtualBox, Oracle VM, KVM, VMware ESX/ESXi, or Hyper-V, LXD, runs the virtual machines as guests. Pools of hypervisors within the cloud operational system can support large numbers of virtual machines and the ability to scale services up and down according to customers' varying requirements.\r\nTypically IaaS involve the use of a cloud orchestration technology like Open Stack, Apache Cloudstack or Open Nebula. This manages the creation of a virtual machine and decides on which hypervisor (i.e. physical host) to start it, enables VM migration features between hosts, allocates storage volumes and attaches them to VMs, usage information for billing and lots more.\r\nAn alternative to hypervisors are Linux containers, which run in isolated partitions of a single Linux kernel running directly on the physical hardware. Linux cgroups and namespaces are the underlying Linux kernel technologies used to isolate, secure and manage the containers. Containerisation offers higher performance than virtualization, because there is no hypervisor overhead. Also, container capacity auto-scales dynamically with computing load, which eliminates the problem of over-provisioning and enables usage-based billing.\r\nIaaS clouds often offer additional resources such as a virtual-machine disk-image library, raw block storage, file or object storage, firewalls, load balancers, IP addresses, virtual local area networks (VLANs), and software bundles.\r\nThe NIST's definition of cloud computing defines Infrastructure as a Service as:\r\n<ul><li>The capability provided to the consumer is to provision processing, storage, networks, and other fundamental computing resources where the consumer is able to deploy and run arbitrary software, which can include operating systems and applications.</li><li>The consumer does not manage or control the underlying cloud infrastructure but has control over operating systems, storage, and deployed applications; and possibly limited control of select networking components (e.g., host firewalls).</li></ul>\r\nAccording to the Internet Engineering Task Force (IETF), the most basic cloud-service model is that of providers offering IT infrastructure — virtual machines and other resources — as a service to subscribers.\r\nIaaS-cloud providers supply these resources on-demand from their large pools of equipment installed in data centers. For wide-area connectivity, customers can use either the Internet or carrier clouds (dedicated virtual private networks). To deploy their applications, cloud users install operating-system images and their application software on the cloud infrastructure. In this model, the cloud user patches and maintains the operating systems and the application software. Cloud providers typically bill IaaS services on a utility computing basis: cost reflects the amount of resources allocated and consumed.","materialsDescription":" <span style=\"font-weight: bold; \">Cloud Computing Basics</span>\r\nWhether you are running applications that share photos to millions of mobile users or you’re supporting the critical operations of your business, a cloud services platform provides rapid access to flexible and low cost IT resources. With cloud computing, you don’t need to make large upfront investments in hardware and spend a lot of time on the heavy lifting of managing that hardware. Instead, you can provision exactly the right type and size of computing resources you need to power your newest bright idea or operate your IT department. You can access as many resources as you need, almost instantly, and only pay for what you use.\r\n<span style=\"font-weight: bold; \">How Does Cloud Computing Work?</span>\r\nCloud computing provides a simple way to access servers, storage, databases and a broad set of application services over the Internet. A Cloud services platform such as Amazon Web Services owns and maintains the network-connected hardware required for these application services, while you provision and use what you need via a web application.\r\n<span style=\"font-weight: bold; \">Six Advantages and Benefits of Cloud Computing</span>\r\n<span style=\"font-weight: bold; \">Trade capital expense for variable expense</span>\r\nInstead of having to invest heavily in data centers and servers before you know how you’re going to use them, you can only pay when you consume computing resources, and only pay for how much you consume.\r\n<span style=\"font-weight: bold; \">Benefit from massive economies of scale</span>\r\nBy using cloud computing, you can achieve a lower variable cost than you can get on your own. Because usage from hundreds of thousands of customers are aggregated in the cloud, providers can achieve higher economies of scale which translates into lower pay as you go prices.\r\n<span style=\"font-weight: bold; \">Stop guessing capacity</span>\r\nEliminate guessing on your infrastructure capacity needs. When you make a capacity decision prior to deploying an application, you often either end up sitting on expensive idle resources or dealing with limited capacity. With cloud computing, these problems go away. You can access as much or as little as you need, and scale up and down as required with only a few minutes notice.\r\n<span style=\"font-weight: bold; \">Increase speed and agility</span>\r\nIn a cloud computing environment, new IT resources are only ever a click away, which means you reduce the time it takes to make those resources available to your developers from weeks to just minutes. This results in a dramatic increase in agility for the organization, since the cost and time it takes to experiment and develop is significantly lower.\r\n<span style=\"font-weight: bold; \">Stop spending money on running and maintaining data centers</span>\r\nFocus on projects that differentiate your business, not the infrastructure. Cloud computing lets you focus on your own customers, rather than on the heavy lifting of racking, stacking and powering servers.\r\n<span style=\"font-weight: bold; \">Go global in minutes</span>\r\nEasily deploy your application in multiple regions around the world with just a few clicks. This means you can provide a lower latency and better experience for your customers simply and at minimal cost.\r\n<span style=\"font-weight: bold;\">Types of Cloud Computing</span>\r\nCloud computing has three main types that are commonly referred to as Infrastructure as a Service (IaaS), Platform as a Service (PaaS), and Software as a Service (SaaS). Selecting the right type of cloud computing for your needs can help you strike the right balance of control and the avoidance of undifferentiated heavy lifting.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_IaaS_computing.png"},{"id":2,"title":"Virtual machine and cloud system software","alias":"virtual-machine-and-cloud-system-software","description":" A virtual machine (VM) is a software-based computer that exists within another computer’s operating system, often used for the purposes of testing, backing up data, or running SaaS applications. To fully grasp how VMs work, it’s important to first understand how computer software and hardware are typically integrated by an operating system.\r\n"The cloud" refers to servers that are accessed over the Internet, and the software and databases that run on those servers. Cloud servers are located in data centers all over the world. By using cloud computing, users and companies don't have to manage physical servers themselves or run software applications on their own machines.\r\nThe cloud enables users to access the same files and applications from almost any device, because the computing and storage take place on servers in a data center, instead of locally on the user device. This is why a user can log into their Instagram account on a new phone after their old phone breaks and still find their old account in place, with all their photos, videos, and conversation history. It works the same way with cloud email providers like Gmail or Microsoft Office 365, and with cloud storage providers like Dropbox or Google Drive.\r\nFor businesses, switching to cloud computing removes some IT costs and overhead: for instance, they no longer need to update and maintain their own servers, as the cloud vendor they are using will do that. This especially makes an impact on small businesses that may not have been able to afford their own internal infrastructure but can outsource their infrastructure needs affordably via the cloud. The cloud can also make it easier for companies to operate internationally because employees and customers can access the same files and applications from any location.\r\nSeveral cloud providers offer virtual machines to their customers. These virtual machines typically live on powerful servers that can act as a host to multiple VMs and can be used for a variety of reasons that wouldn’t be practical with a locally-hosted VM. These include:\r\n<ul><li>Running SaaS applications - Software-as-a-Service, or SaaS for short, is a cloud-based method of providing software to users. SaaS users subscribe to an application rather than purchasing it once and installing it. These applications are generally served to the user over the Internet. Often, it is virtual machines in the cloud that are doing the computation for SaaS applications as well as delivering them to users. If the cloud provider has a geographically distributed network edge, then the application will run closer to the user, resulting in faster performance.</li><li>Backing up data - Cloud-based VM services are very popular for backing up data because the data can be accessed from anywhere. Plus, cloud VMs provide better redundancy, require less maintenance, and generally scale better than physical data centers. (For example, it’s generally fairly easy to buy an extra gigabyte of storage space from a cloud VM provider, but much more difficult to build a new local data server for that extra gigabyte of data.)</li><li>Hosting services like email and access management - Hosting these services on cloud VMs is generally faster and more cost-effective, and helps minimize maintenance and offload security concerns as well.</li></ul>","materialsDescription":"What is an operating system?\r\nTraditional computers are built out of physical hardware, including hard disk drives, processor chips, RAM, etc. In order to utilize this hardware, computers rely on a type of software known as an operating system (OS). Some common examples of OSes are Mac OSX, Microsoft Windows, Linux, and Android.\r\nThe OS is what manages the computer’s hardware in ways that are useful to the user. For example, if the user wants to access the Internet, the OS directs the network interface card to make the connection. If the user wants to download a file, the OS will partition space on the hard drive for that file. The OS also runs and manages other pieces of software. For example, it can run a web browser and provide the browser with enough random access memory (RAM) to operate smoothly. Typically, operating systems exist within a physical computer at a one-to-one ratio; for each machine, there is a single OS managing its physical resources.\r\n<span style=\"font-weight: bold;\">Can you have two or more operating systems on one computer?</span>\r\nSome users want to be able to run multiple operating systems simultaneously on one computer, either for testing or one of the other reasons listed in the section below. This can be achieved through a process called virtualization. In virtualization, a piece of software behaves as if it were an independent computer. This piece of software is called a virtual machine, also known as a ‘guest’ computer. (The computer on which the VM is running is called the ‘host’.) The guest has an OS as well as its own virtual hardware.\r\n‘Virtual hardware’ may sound like a bit of an oxymoron, but it works by mapping to real hardware on the host computer. For example, the VM’s ‘hard drive’ is really just a file on the host computer’s hard drive. When the VM wants to save a new file, it actually has to communicate with the host OS, which will write this file to the host hard drive. Because virtual hardware must perform this added step of negotiating with the host to access hardware resources, virtual machines can’t run quite as fast as their host computers.\r\nWith virtualization, one computer can run two or more operating systems. The number of VMs that can run on one host is limited only by the host’s available resources. The user can run the OS of a VM in a window like any other program, or they can run it in fullscreen so that it looks and feels like a genuine host OS.\r\n <span style=\"font-weight: bold; \">What are virtual machines used for?</span>\r\nSome of the most popular reasons people run virtual machines include:\r\n<span style=\"font-weight: bold; \">Testing</span> - Oftentimes software developers want to be able to test their applications in different environments. They can use virtual machines to run their applications in various OSes on one computer. This is simpler and more cost-effective than having to test on several different physical machines.\r\n<span style=\"font-weight: bold; \">Running software designed for other OSes</span> - Although certain software applications are only available for a single platform, a VM can run software designed for a different OS. For example, a Mac user who wants to run software designed for Windows can run a Windows VM on their Mac host.\r\n<span style=\"font-weight: bold; \">Running outdated software</span> - Some pieces of older software can’t be run in modern OSes. Users who want to run these applications can run an old OS on a virtual machine.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Virtual_machine_and_cloud_system_software.png"},{"id":782,"title":"NGFW - next-generation firewall","alias":"ngfw-next-generation-firewall","description":"A next-generation firewall (NGFW) is a part of the third generation of firewall technology that is implemented in either hardware or software and is capable of detecting and blocking sophisticated attacks by enforcing security policies at the application, port and protocol levels.\r\nNGFWs typically feature advanced functions including:\r\n<ul><li>application awareness;</li><li>integrated intrusion prevention systems (IPS);</li><li>identity awareness -- user and group control;</li><li>bridged and routed modes;</li><li> the ability to use external intelligence sources.</li></ul>\r\nOf these offerings, most next-generation firewalls integrate at least three basic functions: enterprise firewall capabilities, an intrusion prevention system (IPS) and application control.\r\nLike the introduction of stateful inspection in traditional firewalls, NGFWs bring additional context to the firewall's decision-making process by providing it with the ability to understand the details of the web application traffic passing through it and to take action to block traffic that might exploit vulnerabilities.\r\nThe different features of next-generation firewalls combine to create unique benefits for users. NGFWs are often able to block malware before it enters a network, something that wasn't previously possible.\r\nNGFWs are also better equipped to address advanced persistent threats (APTs) because they can be integrated with threat intelligence services. NGFWs can also offer a low-cost option for companies trying to improve basic device security through the use of application awareness, inspection services, protection systems and awareness tools.<br /><br />","materialsDescription":"<span style=\"font-weight: bold;\">What is a next-generation firewall (NGFW)?</span>\r\nA NGFW contains all the normal defenses that a traditional firewall has as well as a type of intrusion prevention software and application control, alongside other additional security features. NGFWs are also capable of deep packet inspection, which enables more robust filters.\r\nIntrusion prevention software monitors network activity to detect and stop vulnerability exploits from occurring. This is usually done by monitoring for breaches against the network policies in place as a breach is usually indicative of malicious activity.\r\nApplication control software simply sets up a hard filter for programs that are trying to send or receive data over the Internet. This can either be done by a blacklist (programs in the filter are blocked) or by a whitelist (programs not in the filter are blocked).","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_NGFW.png"},{"id":784,"title":"NGFW - next-generation firewall - Appliance","alias":"ngfw-next-generation-firewall-appliance","description":" A next-generation firewall (NGFW) is a part of the third generation of firewall technology, combining a traditional firewall with other network device filtering functionalities, such as an application firewall using in-line deep packet inspection (DPI), an intrusion prevention system (IPS). Other techniques might also be employed, such as TLS/SSL encrypted traffic inspection, website filtering, QoS/bandwidth management, antivirus inspection and third-party identity management integration (i.e. LDAP, RADIUS, Active Directory).\r\nNGFWs include the typical functions of traditional firewalls such as packet filtering, network- and port-address translation (NAT), stateful inspection, and virtual private network (VPN) support. The goal of next-generation firewalls is to include more layers of the OSI model, improving filtering of network traffic that is dependent on the packet contents.\r\nNGFWs perform deeper inspection compared to stateful inspection performed by the first- and second-generation firewalls. NGFWs use a more thorough inspection style, checking packet payloads and matching signatures for harmful activities such as exploitable attacks and malware.\r\nImproved detection of encrypted applications and intrusion prevention service. Modern threats like web-based malware attacks, targeted attacks, application-layer attacks, and more have had a significantly negative effect on the threat landscape. In fact, more than 80% of all new malware and intrusion attempts are exploiting weaknesses in applications, as opposed to weaknesses in networking components and services.\r\nStateful firewalls with simple packet filtering capabilities were efficient blocking unwanted applications as most applications met the port-protocol expectations. Administrators could promptly prevent an unsafe application from being accessed by users by blocking the associated ports and protocols. But today, blocking a web application like Farmville that uses port 80 by closing the port would also mean complications with the entire HTTP protocol.\r\nProtection based on ports, protocols, IP addresses is no more reliable and viable. This has led to the development of identity-based security approach, which takes organizations a step ahead of conventional security appliances which bind security to IP-addresses.\r\nNGFWs offer administrators a deeper awareness of and control over individual applications, along with deeper inspection capabilities by the firewall. Administrators can create very granular "allow/deny" rules for controlling use of websites and applications in the network. ","materialsDescription":"<span style=\"font-weight: bold;\"> What is a next-generation firewall (NGFW)?</span>\r\nAn NGFW contains all the normal defences that a traditional firewall has as well as a type of intrusion prevention software and application control, alongside other bonus security features. NGFWs are also capable of deep packet inspection which enables more robust filters.\r\nIntrusion prevention software monitors network activity to detect and stop vulnerability exploits from occurring. This is usually done by monitoring for breaches against the network policies in place as a breach is usually indicative of malicious activity.\r\nApplication control software simply sets up a hard filter for programs that are trying to send or receive data over the Internet. This can either be done by blacklist (programs in the filter are blocked) or by whitelist (programs not in the filter are blocked).","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_NGFW.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://www.barracuda.com/resources/Barracuda_Next_Gen_Firewall_AWS_CS_Club_Automation_US#top","title":"Web-site of vendor"}},"comments":[],"referencesCount":0},{"id":61,"title":"Cisco TelePresence for Bank","description":"Description is not ready yet","alias":"cisco-telepresence-for-bank","roi":0,"seo":{"title":"Cisco TelePresence for Bank","keywords":"","description":"Description is not ready yet","og:title":"Cisco TelePresence for Bank","og:description":"Description is not ready yet"},"deal_info":"","user":{"id":203,"title":"State Savings Bank of Ukraine","logoURL":"https://old.roi4cio.com/uploads/roi/company/oschadbank.png","alias":"oshchadbank","address":"","roles":[],"description":"The State Savings Bank of Ukraine, or Oschadbank is a public joint-stock company based in Ukraine. It was established by Decree of the Cabinet of Ministers of Ukraine on May 21, 1999, through the transformation of its predecessor, the State Specialized Commercial Savings Bank of Ukraine into a Joint-Stock Company.\r\nThe State Savings Bank of Ukraine is one of the largest financial institutions of Ukraine and one of three systemically important banks (including Ukreximbank and PrivatBank) nominated by National Bank of Ukraine every year since 2015 when classification requirement came into force.\r\nBy the end of 2016, the bank had 3,650 branches and 2,850 ATMs throughout the country which carry out various functions, such as the disbursement of pensions, social aid, processing of utility payments and other banking transactions. Together with PrivatBank, Oschadbank is one of the only two Ukrainian banks whose clients' time deposits are fully guaranteed by state law compared to total of 200,000 in other banks in case of bank liquidation.\r\nSource: https://en.wikipedia.org/wiki/State_Savings_Bank_of_Ukraine","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":6,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.oschadbank.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"State Savings Bank of Ukraine","keywords":"Ukraine, Decree, Cabinet, Ministers, 1999, with, established, Company","description":"The State Savings Bank of Ukraine, or Oschadbank is a public joint-stock company based in Ukraine. It was established by Decree of the Cabinet of Ministers of Ukraine on May 21, 1999, through the transformation of its predecessor, the State Specialized Commerc","og:title":"State Savings Bank of Ukraine","og:description":"The State Savings Bank of Ukraine, or Oschadbank is a public joint-stock company based in Ukraine. It was established by Decree of the Cabinet of Ministers of Ukraine on May 21, 1999, through the transformation of its predecessor, the State Specialized Commerc","og:image":"https://old.roi4cio.com/uploads/roi/company/oschadbank.png"},"eventUrl":""},"supplier":{"id":1392,"title":"S&T Ukraine","logoURL":"https://old.roi4cio.com/uploads/roi/company/S_T_Ukraine.png","alias":"ehs-ehnd-ti-ukraina","address":"","roles":[],"description":"S&T Ukraine was established in 1993 and today we are in TOP3 of Ukrainian systems integrators. We hold leading positions in the field of design and implementation of corporate integrated information systems, complex network and telecom solutions as well as provision of IT services in Ukraine.<br />There are more than 130 employees working at S&T Ukraine now. We pay utmost attention to growing skills of our team. Not only we employ best experts around but also invest seriously into their further training and education.<br />S&T Ukraine closely co-operates with a number of global IT vendors ans holds top partner statuses with them. Cisco, EMC, IBM, HPЕ, Microsoft, Oracle and many more are among them.<br />S&T has subsidiaries in more than 18 countries of Central and Eastern Europe.<br /><br />","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":182,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":15,"vendorImplementationsCount":0,"vendorPartnersCount":7,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.snt.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"S&T Ukraine","keywords":"Ukraine, more, with, than, them, systems, also, around","description":"S&T Ukraine was established in 1993 and today we are in TOP3 of Ukrainian systems integrators. We hold leading positions in the field of design and implementation of corporate integrated information systems, complex network and telecom solutions as well as","og:title":"S&T Ukraine","og:description":"S&T Ukraine was established in 1993 and today we are in TOP3 of Ukrainian systems integrators. We hold leading positions in the field of design and implementation of corporate integrated information systems, complex network and telecom solutions as well as","og:image":"https://old.roi4cio.com/uploads/roi/company/S_T_Ukraine.png"},"eventUrl":""},"vendors":[{"id":170,"title":"Cisco","logoURL":"https://old.roi4cio.com/uploads/roi/company/Cisco_logo.png","alias":"cisco","address":"","roles":[],"description":"<span lang=\"en\">Cisco Systems is a global manufacturer of network equipment: routers, switches and servers, as well as software for data transmission on the Internet and corporate networks. The company was founded in 1984 in San Jose (California, USA). Today, Cisco dominates the Internet Protocol (IP) -based network equipment segment, and also manufactures cybersecurity, video conferencing systems, and other network equipment and software. In addition, Cisco offers a number of cloud services. Cisco's primary customers are large enterprises and telecommunications service providers, but the company also sells products aimed at small businesses and the public sector. </span>\r\n\r\n<span lang=\"en\">Cisco offers products and services in four categories. The company's infrastructure platforms generate more than half of its revenue. This includes switching devices, routing devices, wireless communications, and data processing solutions. Applications that account for over 10% of revenue are primarily software related to networking and data processing platforms. </span>\r\n\r\n<span lang=\"en\">Applications include collaboration tools (unified communications, Cisco TelePresence video conferencing) as well as AppDynamics and Internet of Things software. The cybersecurity product category generates more than 5% of the company's revenue and includes network security, email security, identity and access, advanced threat protection, and unified exposure management products. In addition, Cisco offers consulting services. </span>\r\n\r\n<span lang=\"en\">Cisco's total revenue in fiscal 2020 was nearly $ 50 billion. The company is expanding its research and development (R&D) investments in areas such as the cloud platform, remote collaboration platform, analytics and telecommunications technologies.</span>","companyTypes":[],"products":{},"vendoredProductsCount":29,"suppliedProductsCount":29,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":7,"vendorImplementationsCount":42,"vendorPartnersCount":0,"supplierPartnersCount":125,"b4r":0,"categories":{},"companyUrl":"https://www.cisco.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Cisco","keywords":"Index, networking, Cisco, company, Russell, 1000, June, Average","description":"<span lang=\"en\">Cisco Systems is a global manufacturer of network equipment: routers, switches and servers, as well as software for data transmission on the Internet and corporate networks. The company was founded in 1984 in San Jose (California, USA). Today, ","og:title":"Cisco","og:description":"<span lang=\"en\">Cisco Systems is a global manufacturer of network equipment: routers, switches and servers, as well as software for data transmission on the Internet and corporate networks. The company was founded in 1984 in San Jose (California, USA). Today, ","og:image":"https://old.roi4cio.com/uploads/roi/company/Cisco_logo.png"},"eventUrl":""}],"products":[{"id":70,"logo":false,"scheme":false,"title":"Cisco TelePresence Server","vendorVerified":0,"rating":"2.40","implementationsCount":3,"suppliersCount":0,"alias":"cisco-telepresence-server","companyTypes":[],"description":"<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">Features and Capabilities</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \"><br /></span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">With TelePresence Server, anyone can join a meeting using video, audio, and content sharing, from any mobile, desktop, or room system, anywhere. People can meet the way they want—in one-on-one discussions; in personal, always-on meeting rooms; or in scheduled meetings.</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \"><br /></span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">You can expand your on-premises videoconferencing deployment to a hybrid premises-and-cloud model by extending meetings to Cisco WebEx Meeting Center users. Anyone can join the same meeting from a standards-based video or WebEx-equipped device.</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \"><br /></span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">Features</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \"><br /></span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">Business-Quality, Highly Scalable Conferencing</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">Enjoy effective collaboration through video, audio, and content sharing for meetings that can include hundreds of participants. Enjoy a superior experience on any device using mobile, desktop, or room systems.</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \"><br /></span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">Intuitive, User-Selectable Layouts and In-Meeting Controls</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">A comprehensive range of controls and indicators helps you customize your meeting experience. Use them to define security controls, choose your favorite layout, and easily see who is in your meeting.</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \"><br /></span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">Flexible Deployment Options</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">You can choose between a virtualized setup on:</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \"><br /></span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">Cisco Business Edition platforms</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">Optimized Cisco UCS platforms, such as the new high-capacity Cisco Meeting Server 1000 and Multiparty Media 410v Blade Server</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">Or choose a dedicated hardware option, such as a Cisco Multiparty Media 300 Series appliance or the Cisco MSE 8000 chassis with the Multiparty Media 820 blade, for a high-capacity solution.</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \"><br /></span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">Use TelePresence Server to:</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \"><br /></span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">Extend video collaboration to all employees, from mobile-, desktop-, or room-based systems</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">Boost team productivity and effectiveness</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">Bring everyone together in always-available Collaboration Meeting Rooms</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">Unify collaboration system deployment with a single collaboration architecture</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">Cut costs and simplify provisioning and maintenance</span>","shortDescription":"Cisco TelePresence Server is a business-quality, intuitive video conferencing","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":20,"sellingCount":11,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Cisco TelePresence Server","keywords":"Cisco, meeting, Server, collaboration, video, your, Meeting, Multiparty","description":"<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">Features and Capabilities</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \"><br /></span>\r\n<span style=\"","og:title":"Cisco TelePresence Server","og:description":"<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">Features and Capabilities</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \"><br /></span>\r\n<span style=\""},"eventUrl":"","translationId":93,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":30,"title":"Video Conferencing","alias":"video-conferencing","description":"Video conferencing is a technology that allows users in different locations to hold face-to-face meetings without having to move to a single location together. This technology is particularly convenient for business users in different cities or even different countries because it saves time, expense, and hassle associated with business travel. Uses for video conferencing include holding routine meetings, negotiating business deals, and interviewing job candidates.\r\nVideo conferencing's main advantage over teleconferencing is that users can see each other, which allows them to develop stronger relationships. When a video conference is held for informal purposes, it is called a video call or video chat.\r\nThere are a variety of ways video conferencing can be conducted. Individuals may use web cameras connected to our built into laptop, tablet, or desktop computers. Smartphones equipped with cameras may also be used to connect for video conferences. In such instances, a software-based platform typically is used to transmit communication over Internet protocols.\r\nSome businesses use dedicated video conferencing rooms that have been equipped with high-grade cameras and screens to ensure the conversation is clear and with limited technical faults. Third-party providers often install and assemble the hardware needed to conduct the video conference.\r\nCompanies with multiple offices might establish direct video communications between their locations in order to allow their teams to work more collaboratively.\r\nVideo conferencing can also be used as a medium for conducting training, with the instructor teaching a remote class from almost anywhere. This can be done in a corporate context, especially for getting workers the knowledge they need to better perform their jobs. The academic world can also make use of video conferencing to connect a traditional classroom setting with students who have based a considerable distance from the school.\r\nA video conference may also be used to conduct regular meetings with a company staff or to confer with shareholders about the latest activities at the business. It may be used to announce significant changes at a company, such as introducing a new CEO or to present information in an interactive way that allows all participants to engage in discussion about what they see on screen.\r\nHotels and conference centers sometimes make video conferencing services available to guests who require such services. This may be offered in suites or conference rooms that have been equipped for this purpose.","materialsDescription":" <span style=\"font-weight: bold; \">What is video conferencing?</span>\r\nVideo conferencing is two-way interactive communication delivered using telephone or Internet technologies that allows people at a different location to come together for a meeting. The video conference can be as simple as a conversation between two people in private offices (point-to-point) or involve several sites (multi-point) with more than one person in large rooms at different sites.\r\nA basic video conference setup has a camera and a microphone. Video from the camera and audio from the microphone is converted into a digital format and transmitted to a receiving location using a coding and decoding device, often referred to as a "codec".\r\nAt that receiving location is another codec device that decodes the receiving digital stream into a form that can be seen and heard on monitors or televisions. At the same time, video and audio from cameras and microphones at the received location is sent back to the original location.\r\n<span style=\"font-weight: bold; \">What are the benefits of video conferencing?</span>\r\nVideo conferencing saves travel time and money. Participants can see and hear all other participants and communicate both verbally and visually, creating a face-to-face experience. PowerPoint and other on-screen graphics, as well as other cameras, are also available presentation options. People's downtime is reduced and productivity gains are achieved by removing the logistics of flight preparations, airport delays, hotel stays, and all the other inconveniences of business travel. In distance education, video conferencing provides quality access to students who could not travel to or could afford to relocate to a traditional campus. Video conferences can also be recorded and made available in a variety of ways, e.g., DVDs, streaming video. Besides distance education, other applications include meetings, dissertation and thesis defenses, telemedical procedures, and online conferences.\r\nPeople use video conferencing when:\r\n<ul><li>a live conversation is needed;</li><li>visual information is an important component of the conversation;</li><li>the parties of the conversation can't physically come to the same location;</li><li>the expense or time of travel is a consideration.</li></ul>\r\nExamples of how video conferencing can benefit people around campus:\r\n<ul><li>Guest lecturer invited into a class from another institution.</li><li>The researcher collaborates with colleagues at other institutions on a regular basis.</li><li>Thesis defense at another institution.</li><li>Administrators from different parts of campus need to collaborate on administrator issues such as a campus strategic plan.</li><li>Researcher needs to meet with a review committee about a grant.</li><li>Student interviews with an employer in another city.</li></ul>\r\n<span style=\"font-weight: bold; \">Please explain the etiquette for video conferencing</span>\r\n<ul><li>Allow a few minutes for setting up and shutting down the video conference.</li><li>Stick to time limits.</li><li>Remember to mute your microphone when you are not talking.</li><li>Consider using a location banner.</li><li>Take turns speaking and allow time for audio delay.</li><li>Don't multi-task on camera.</li><li>Be aware of possible audio distractions if your microphone is not muted - coughing, paper shuffling, air conditioning units, laptop and projector fans, phone ringing, etc.</li></ul>\r\n<span style=\"font-weight: bold;\">What are some suggestions for a successful video conference?</span>\r\nProvide an overview for new users so they can learn the basics of videoconferencing:\r\n<ul><li>Share rules of etiquette.</li><li>Get experience using the remote control (room based systems) or using the desktop client software.</li><li>Emphasize the importance of muting the microphone when you are not speaking.</li><li>Test with each location prior to the video conference. Testing provides experience and creates a positive experience.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Video_Conferencing.png"},{"id":367,"title":"Web Conferencing Applications","alias":"web-conferencing-applications","description":" Web conferencing is the common name for technology and tools for online meetings and real-time collaboration. Web conferencing allows you to conduct online presentations, collaborate on documents and applications, view websites, videos, images.\r\nWeb conferences, as a rule, are Internet services that require the installation of a client program on each participant’s computer. Some services also provide access to a web conference via a browser using flash, java or a special plug-in.\r\nServices for web conferencing can include features and tools such as screen sharing (screen sharing or individual applications), whiteboard (interactive whiteboard), the ability to show web presentations, co-browsing (the ability to synchronously browse web pages), tools for annotations, monitoring the presence of participants, text chat, integrated VoIP communication, video communication, the ability to change the leader, the ability to give control over the mouse and keyboard, meeting moderation tools, feedback collection tools (on example, polls), tools for scheduling and inviting participants, the ability to record the progress of a web conference.\r\nOften, web conferencing is used with Internet services for audio and video calls (for example, Skype) or they provide conference calling via a regular telephone.","materialsDescription":" What is the first thing that strikes you when we look at businessmen who are trying to establish communication with each other online? All of them require: “Give more opportunities for web conferencing!”. Therefore, it is not at all surprising that the WebRTC technology is gaining the favor of an increasing number of small and medium-sized businesses.\r\nA recent study conducted by Software Advice showed that more than half of employees in small businesses prefer web conferences, noting their efficiency and usability. The advantages are especially noticeable in comparison with communications via telephone or the use of special applications. However, the benefits of web conferencing do not end there - according to the study, they not only increase the speed and quality of online meetings, but also provide a lot of opportunities for collaboration. In addition, and this is obvious, they reduce travel costs.\r\n<span style=\"font-weight: bold;\">Speed and quality come first.</span>\r\nIt is worth noting that now small and medium businesses are almost gone from the use of communication hardware and use desktop computers and mobile devices. Despite the fact that audio and video conferences are still very popular (they are used by 45% and 50% of users, respectively), web conferences are actively replacing them. Judge for yourself - according to statistics, every third user selects them as a means of communication after the first experience of use.\r\nThe main reason for such a rapid growth in popularity is the speed and quality that web conferencing users provide. According to respondents, the main advantage of web conferences is the ability to organize a meeting much faster than before. Now there is no need to spend time on installing special applications like Skype or similar - any communication systems using any third-party programs are a thing of the past. Also worth noting is the ability to connect to the web conference literally in one click.\r\nMore than 40% of the people surveyed showed dissatisfaction with the tedious procedure of entering authorization data, noting the simplicity and convenience of connecting to the WebRTC web conference. All you need is access to the Internet!\r\n<span style=\"font-weight: bold;\">We work in a team</span>\r\nIt is no secret that the use of web conferencing significantly reduces the company's travel expenses. After all, booking tickets, searching for hotels and meeting places can result in a decent amount, which will seriously hurt the company's income. Using web conferences, you get the opportunity to arrange business meetings, even with overseas partners, without leaving your office. But that's not all! Web conferencing offers a range of tools to overcome language barriers. For example, in the field of healthcare, videoconferencing has been used to establish consultations between doctors and patients from completely different countries. With the help of online translators and other special features of web conferences, people can get the necessary help from qualified foreign specialists.\r\nDo not forget that web conferencing is not only a convenient way to hold a video call. You can arrange trainings for your team using file transfer and document display functions, as well as conduct job interviews without wasting time.\r\nIt is interesting to note that small and medium-sized businesses share their product samples with prospective clients using web conferences, turning them into a powerful marketing tool. This brings the business to a fundamentally new level, allowing the company to take a leading position in its industry!","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Web_Conferencing_Applications.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":377,"title":"Separate communications channels"},{"id":398,"title":"Poor communication and coordination among staff"}]}},"categories":[{"id":30,"title":"Video Conferencing","alias":"video-conferencing","description":"Video conferencing is a technology that allows users in different locations to hold face-to-face meetings without having to move to a single location together. This technology is particularly convenient for business users in different cities or even different countries because it saves time, expense, and hassle associated with business travel. Uses for video conferencing include holding routine meetings, negotiating business deals, and interviewing job candidates.\r\nVideo conferencing's main advantage over teleconferencing is that users can see each other, which allows them to develop stronger relationships. When a video conference is held for informal purposes, it is called a video call or video chat.\r\nThere are a variety of ways video conferencing can be conducted. Individuals may use web cameras connected to our built into laptop, tablet, or desktop computers. Smartphones equipped with cameras may also be used to connect for video conferences. In such instances, a software-based platform typically is used to transmit communication over Internet protocols.\r\nSome businesses use dedicated video conferencing rooms that have been equipped with high-grade cameras and screens to ensure the conversation is clear and with limited technical faults. Third-party providers often install and assemble the hardware needed to conduct the video conference.\r\nCompanies with multiple offices might establish direct video communications between their locations in order to allow their teams to work more collaboratively.\r\nVideo conferencing can also be used as a medium for conducting training, with the instructor teaching a remote class from almost anywhere. This can be done in a corporate context, especially for getting workers the knowledge they need to better perform their jobs. The academic world can also make use of video conferencing to connect a traditional classroom setting with students who have based a considerable distance from the school.\r\nA video conference may also be used to conduct regular meetings with a company staff or to confer with shareholders about the latest activities at the business. It may be used to announce significant changes at a company, such as introducing a new CEO or to present information in an interactive way that allows all participants to engage in discussion about what they see on screen.\r\nHotels and conference centers sometimes make video conferencing services available to guests who require such services. This may be offered in suites or conference rooms that have been equipped for this purpose.","materialsDescription":" <span style=\"font-weight: bold; \">What is video conferencing?</span>\r\nVideo conferencing is two-way interactive communication delivered using telephone or Internet technologies that allows people at a different location to come together for a meeting. The video conference can be as simple as a conversation between two people in private offices (point-to-point) or involve several sites (multi-point) with more than one person in large rooms at different sites.\r\nA basic video conference setup has a camera and a microphone. Video from the camera and audio from the microphone is converted into a digital format and transmitted to a receiving location using a coding and decoding device, often referred to as a "codec".\r\nAt that receiving location is another codec device that decodes the receiving digital stream into a form that can be seen and heard on monitors or televisions. At the same time, video and audio from cameras and microphones at the received location is sent back to the original location.\r\n<span style=\"font-weight: bold; \">What are the benefits of video conferencing?</span>\r\nVideo conferencing saves travel time and money. Participants can see and hear all other participants and communicate both verbally and visually, creating a face-to-face experience. PowerPoint and other on-screen graphics, as well as other cameras, are also available presentation options. People's downtime is reduced and productivity gains are achieved by removing the logistics of flight preparations, airport delays, hotel stays, and all the other inconveniences of business travel. In distance education, video conferencing provides quality access to students who could not travel to or could afford to relocate to a traditional campus. Video conferences can also be recorded and made available in a variety of ways, e.g., DVDs, streaming video. Besides distance education, other applications include meetings, dissertation and thesis defenses, telemedical procedures, and online conferences.\r\nPeople use video conferencing when:\r\n<ul><li>a live conversation is needed;</li><li>visual information is an important component of the conversation;</li><li>the parties of the conversation can't physically come to the same location;</li><li>the expense or time of travel is a consideration.</li></ul>\r\nExamples of how video conferencing can benefit people around campus:\r\n<ul><li>Guest lecturer invited into a class from another institution.</li><li>The researcher collaborates with colleagues at other institutions on a regular basis.</li><li>Thesis defense at another institution.</li><li>Administrators from different parts of campus need to collaborate on administrator issues such as a campus strategic plan.</li><li>Researcher needs to meet with a review committee about a grant.</li><li>Student interviews with an employer in another city.</li></ul>\r\n<span style=\"font-weight: bold; \">Please explain the etiquette for video conferencing</span>\r\n<ul><li>Allow a few minutes for setting up and shutting down the video conference.</li><li>Stick to time limits.</li><li>Remember to mute your microphone when you are not talking.</li><li>Consider using a location banner.</li><li>Take turns speaking and allow time for audio delay.</li><li>Don't multi-task on camera.</li><li>Be aware of possible audio distractions if your microphone is not muted - coughing, paper shuffling, air conditioning units, laptop and projector fans, phone ringing, etc.</li></ul>\r\n<span style=\"font-weight: bold;\">What are some suggestions for a successful video conference?</span>\r\nProvide an overview for new users so they can learn the basics of videoconferencing:\r\n<ul><li>Share rules of etiquette.</li><li>Get experience using the remote control (room based systems) or using the desktop client software.</li><li>Emphasize the importance of muting the microphone when you are not speaking.</li><li>Test with each location prior to the video conference. Testing provides experience and creates a positive experience.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Video_Conferencing.png"},{"id":367,"title":"Web Conferencing Applications","alias":"web-conferencing-applications","description":" Web conferencing is the common name for technology and tools for online meetings and real-time collaboration. Web conferencing allows you to conduct online presentations, collaborate on documents and applications, view websites, videos, images.\r\nWeb conferences, as a rule, are Internet services that require the installation of a client program on each participant’s computer. Some services also provide access to a web conference via a browser using flash, java or a special plug-in.\r\nServices for web conferencing can include features and tools such as screen sharing (screen sharing or individual applications), whiteboard (interactive whiteboard), the ability to show web presentations, co-browsing (the ability to synchronously browse web pages), tools for annotations, monitoring the presence of participants, text chat, integrated VoIP communication, video communication, the ability to change the leader, the ability to give control over the mouse and keyboard, meeting moderation tools, feedback collection tools (on example, polls), tools for scheduling and inviting participants, the ability to record the progress of a web conference.\r\nOften, web conferencing is used with Internet services for audio and video calls (for example, Skype) or they provide conference calling via a regular telephone.","materialsDescription":" What is the first thing that strikes you when we look at businessmen who are trying to establish communication with each other online? All of them require: “Give more opportunities for web conferencing!”. Therefore, it is not at all surprising that the WebRTC technology is gaining the favor of an increasing number of small and medium-sized businesses.\r\nA recent study conducted by Software Advice showed that more than half of employees in small businesses prefer web conferences, noting their efficiency and usability. The advantages are especially noticeable in comparison with communications via telephone or the use of special applications. However, the benefits of web conferencing do not end there - according to the study, they not only increase the speed and quality of online meetings, but also provide a lot of opportunities for collaboration. In addition, and this is obvious, they reduce travel costs.\r\n<span style=\"font-weight: bold;\">Speed and quality come first.</span>\r\nIt is worth noting that now small and medium businesses are almost gone from the use of communication hardware and use desktop computers and mobile devices. Despite the fact that audio and video conferences are still very popular (they are used by 45% and 50% of users, respectively), web conferences are actively replacing them. Judge for yourself - according to statistics, every third user selects them as a means of communication after the first experience of use.\r\nThe main reason for such a rapid growth in popularity is the speed and quality that web conferencing users provide. According to respondents, the main advantage of web conferences is the ability to organize a meeting much faster than before. Now there is no need to spend time on installing special applications like Skype or similar - any communication systems using any third-party programs are a thing of the past. Also worth noting is the ability to connect to the web conference literally in one click.\r\nMore than 40% of the people surveyed showed dissatisfaction with the tedious procedure of entering authorization data, noting the simplicity and convenience of connecting to the WebRTC web conference. All you need is access to the Internet!\r\n<span style=\"font-weight: bold;\">We work in a team</span>\r\nIt is no secret that the use of web conferencing significantly reduces the company's travel expenses. After all, booking tickets, searching for hotels and meeting places can result in a decent amount, which will seriously hurt the company's income. Using web conferences, you get the opportunity to arrange business meetings, even with overseas partners, without leaving your office. But that's not all! Web conferencing offers a range of tools to overcome language barriers. For example, in the field of healthcare, videoconferencing has been used to establish consultations between doctors and patients from completely different countries. With the help of online translators and other special features of web conferences, people can get the necessary help from qualified foreign specialists.\r\nDo not forget that web conferencing is not only a convenient way to hold a video call. You can arrange trainings for your team using file transfer and document display functions, as well as conduct job interviews without wasting time.\r\nIt is interesting to note that small and medium-sized businesses share their product samples with prospective clients using web conferences, turning them into a powerful marketing tool. This brings the business to a fundamentally new level, allowing the company to take a leading position in its industry!","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Web_Conferencing_Applications.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"","title":"Supplier's web site"}},"comments":[],"referencesCount":0},{"id":896,"title":"Cisco TelePresence for Kyivstar","description":"Description is not ready yet","alias":"cisco-telepresence-for-kyivstar","roi":0,"seo":{"title":"Cisco TelePresence for Kyivstar","keywords":"","description":"Description is not ready yet","og:title":"Cisco TelePresence for Kyivstar","og:description":"Description is not ready yet"},"deal_info":"","user":{"id":2540,"title":"Kyivstar","logoURL":"https://old.roi4cio.com/uploads/roi/company/Kievstar.png","alias":"kievstar","address":"","roles":[],"description":"<span style=\"font-weight: bold;\">Kyivstar</span> – mobile operator No.1 and one of the best brands of Ukraine\r\n\r\nThe company's history started back in 1994, and on December 9, 1997, the first call in Kyivstar mobile network was made.\r\n\r\nToday Kyivstar is the largest Ukrainian telecommunication operator providing communications and data services based on a broad range of mobile and fixed-line technologies, including 3G. Company's customer base amounts to over 24 million in mobile and over 1.1 million in broadband Internet.\r\n\r\nKyivstar is a part of VimpelCom Ltd., one of the world's largest integrated telecommunications companies, headquartered in Netherlands. The holding company owns telecom assets in the CIS countries, Europe, Asia, and Africa, and its shares are freely traded on the stock exchange (NASDAQ). Jean-Yves Charlier is CEO of VimpelCom Ltd.\r\n\r\nKyivstar is one of few companies in VimpelCom Ltd. that provides services under its own, exclusively Ukrainian brand. Every year international control of Kyivstar network parameters is held. According to its results, the company demonstrates better quality and productivity than on the average in the region and in the world.\r\n\r\nKyivstar has achieved big success thanks to investment into development of its own fiber-optic network which is an important link in the traffic exchange between Europe and Asia, and it is a reliable partner of Ukrainians in the connection with the other countries of the world. The company provides roaming services in 195 countries on 5 continents.\r\n\r\nFor more than 25 years of operation on the territory of Ukraine Kyivstar has been developing the technical infrastructure of telecom-market and has been faithfully performing its obligations to the country and the society. For many years the company has been the largest taxpayer to the state budget of Ukraine among the companies in the sector of transport and communications, as well as one of the best employers and most socially responsible business entities.\r\n\r\nKyivstar was the first company to provide the best telecommunications services of European markets for Ukrainian subscribers. For instance, in 1998 the company was the first to suggest SMS service to subscribers, and in 2000 – was the first to start providing access to Internet by WAP. After that Kyivstar was the first to massively introduce packet tariff plans with no charge for minutes and to cancel megabyte billing of Internet in the most of the tariff plans.\r\n\r\nThe company was the first among telecommunications operators of Ukraine to fully upgrade switched network to prepare for high-speed mobile data transmission technologies. In Kyivstar's network, MSC Server Blade Cluster, unique equipment for Ukraine, is installed. It is new-generation switchers that support technologies from 2.5G to LTE. In 2012 the process of base stations' equipment replacement for a full transition to IP architecture was started.\r\n\r\nKyivstar's team amounts to around 4,000 professionals working all over Ukraine. A system of continuing education and professional development, encouragement and protection of employees has been created in the company:\r\n\r\n<ul><li>Every year more than 50% of employees upgrade their skills at various courses and trainings organized by the company;</li><li> 40% of employees use flexible work schedule; when needed, any employee can work remotely through "Virtual Office" system.</li></ul>\r\nThe company's care about employees' health is an essential part of the social package. Kyivstar's workers can get medical service in more than 1,000 clinics, health institutions and pharmacies in 99 Ukrainian cities.\r\n\r\n<span style=\"font-weight: bold;\">Information on the ownership structure of PJSC “Kyivstar”</span>\r\nThe sole shareholder of PJSC “Kyivstar” is the international telecom group of companies <span style=\"font-weight: bold;\">VEON</span>, the headquarters of which is located in the Kingdom of the Netherlands. VEON shares are traded on the stock exchanges of the USA and the European Union, and among the owners of the shares there are thousands of people, including large investment funds of the USA, Great Britain, Italy, such as Exor NV, Shah Capital, Prosperity Capital, Kopernik Global Investors, etc. No shareholder has a majority stake and does not have a decisive influence on the activities of the VEON group and, accordingly, on the activities of Kyivstar.\r\nIn February 2022, the VEON Group excluded persons who have been subject to EU sanctions from the Board of Directors, their financial assets are frozen, and they themselves do not take any part in or have any influence on the management of the VEON Group. The group also decided to withdraw from the russian market and on May 30, 2023, reported on the completion of all legal formalities and procedures related to this initiative.\r\nPJSC “Kyivstar” is managed by the President (a citizen of Ukraine) and the Supervisory Board of Kyivstar PJSC, which includes citizens of Ukraine, the United States, the European Union and Turkey. Each of these citizens is a person with an exceptionally high reputation in the business environment with long experience of managerial work on the international market.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":6,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.kyivstar.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Kyivstar","keywords":"Kyivstar, company, Ukraine, first, network, mobile, been, employees","description":"<span style=\"font-weight: bold;\">Kyivstar</span> – mobile operator No.1 and one of the best brands of Ukraine\r\n\r\nThe company's history started back in 1994, and on December 9, 1997, the first call in Kyivstar mobile network was made.\r\n\r\nToday Kyivstar is the l","og:title":"Kyivstar","og:description":"<span style=\"font-weight: bold;\">Kyivstar</span> – mobile operator No.1 and one of the best brands of Ukraine\r\n\r\nThe company's history started back in 1994, and on December 9, 1997, the first call in Kyivstar mobile network was made.\r\n\r\nToday Kyivstar is the l","og:image":"https://old.roi4cio.com/uploads/roi/company/Kievstar.png"},"eventUrl":""},"supplier":{"id":1392,"title":"S&T Ukraine","logoURL":"https://old.roi4cio.com/uploads/roi/company/S_T_Ukraine.png","alias":"ehs-ehnd-ti-ukraina","address":"","roles":[],"description":"S&T Ukraine was established in 1993 and today we are in TOP3 of Ukrainian systems integrators. We hold leading positions in the field of design and implementation of corporate integrated information systems, complex network and telecom solutions as well as provision of IT services in Ukraine.<br />There are more than 130 employees working at S&T Ukraine now. We pay utmost attention to growing skills of our team. Not only we employ best experts around but also invest seriously into their further training and education.<br />S&T Ukraine closely co-operates with a number of global IT vendors ans holds top partner statuses with them. Cisco, EMC, IBM, HPЕ, Microsoft, Oracle and many more are among them.<br />S&T has subsidiaries in more than 18 countries of Central and Eastern Europe.<br /><br />","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":182,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":15,"vendorImplementationsCount":0,"vendorPartnersCount":7,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.snt.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"S&T Ukraine","keywords":"Ukraine, more, with, than, them, systems, also, around","description":"S&T Ukraine was established in 1993 and today we are in TOP3 of Ukrainian systems integrators. We hold leading positions in the field of design and implementation of corporate integrated information systems, complex network and telecom solutions as well as","og:title":"S&T Ukraine","og:description":"S&T Ukraine was established in 1993 and today we are in TOP3 of Ukrainian systems integrators. We hold leading positions in the field of design and implementation of corporate integrated information systems, complex network and telecom solutions as well as","og:image":"https://old.roi4cio.com/uploads/roi/company/S_T_Ukraine.png"},"eventUrl":""},"vendors":[{"id":170,"title":"Cisco","logoURL":"https://old.roi4cio.com/uploads/roi/company/Cisco_logo.png","alias":"cisco","address":"","roles":[],"description":"<span lang=\"en\">Cisco Systems is a global manufacturer of network equipment: routers, switches and servers, as well as software for data transmission on the Internet and corporate networks. The company was founded in 1984 in San Jose (California, USA). Today, Cisco dominates the Internet Protocol (IP) -based network equipment segment, and also manufactures cybersecurity, video conferencing systems, and other network equipment and software. In addition, Cisco offers a number of cloud services. Cisco's primary customers are large enterprises and telecommunications service providers, but the company also sells products aimed at small businesses and the public sector. </span>\r\n\r\n<span lang=\"en\">Cisco offers products and services in four categories. The company's infrastructure platforms generate more than half of its revenue. This includes switching devices, routing devices, wireless communications, and data processing solutions. Applications that account for over 10% of revenue are primarily software related to networking and data processing platforms. </span>\r\n\r\n<span lang=\"en\">Applications include collaboration tools (unified communications, Cisco TelePresence video conferencing) as well as AppDynamics and Internet of Things software. The cybersecurity product category generates more than 5% of the company's revenue and includes network security, email security, identity and access, advanced threat protection, and unified exposure management products. In addition, Cisco offers consulting services. </span>\r\n\r\n<span lang=\"en\">Cisco's total revenue in fiscal 2020 was nearly $ 50 billion. The company is expanding its research and development (R&D) investments in areas such as the cloud platform, remote collaboration platform, analytics and telecommunications technologies.</span>","companyTypes":[],"products":{},"vendoredProductsCount":29,"suppliedProductsCount":29,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":7,"vendorImplementationsCount":42,"vendorPartnersCount":0,"supplierPartnersCount":125,"b4r":0,"categories":{},"companyUrl":"https://www.cisco.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Cisco","keywords":"Index, networking, Cisco, company, Russell, 1000, June, Average","description":"<span lang=\"en\">Cisco Systems is a global manufacturer of network equipment: routers, switches and servers, as well as software for data transmission on the Internet and corporate networks. The company was founded in 1984 in San Jose (California, USA). Today, ","og:title":"Cisco","og:description":"<span lang=\"en\">Cisco Systems is a global manufacturer of network equipment: routers, switches and servers, as well as software for data transmission on the Internet and corporate networks. The company was founded in 1984 in San Jose (California, USA). Today, ","og:image":"https://old.roi4cio.com/uploads/roi/company/Cisco_logo.png"},"eventUrl":""}],"products":[{"id":70,"logo":false,"scheme":false,"title":"Cisco TelePresence Server","vendorVerified":0,"rating":"2.40","implementationsCount":3,"suppliersCount":0,"alias":"cisco-telepresence-server","companyTypes":[],"description":"<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">Features and Capabilities</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \"><br /></span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">With TelePresence Server, anyone can join a meeting using video, audio, and content sharing, from any mobile, desktop, or room system, anywhere. People can meet the way they want—in one-on-one discussions; in personal, always-on meeting rooms; or in scheduled meetings.</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \"><br /></span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">You can expand your on-premises videoconferencing deployment to a hybrid premises-and-cloud model by extending meetings to Cisco WebEx Meeting Center users. Anyone can join the same meeting from a standards-based video or WebEx-equipped device.</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \"><br /></span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">Features</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \"><br /></span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">Business-Quality, Highly Scalable Conferencing</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">Enjoy effective collaboration through video, audio, and content sharing for meetings that can include hundreds of participants. Enjoy a superior experience on any device using mobile, desktop, or room systems.</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \"><br /></span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">Intuitive, User-Selectable Layouts and In-Meeting Controls</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">A comprehensive range of controls and indicators helps you customize your meeting experience. Use them to define security controls, choose your favorite layout, and easily see who is in your meeting.</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \"><br /></span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">Flexible Deployment Options</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">You can choose between a virtualized setup on:</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \"><br /></span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">Cisco Business Edition platforms</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">Optimized Cisco UCS platforms, such as the new high-capacity Cisco Meeting Server 1000 and Multiparty Media 410v Blade Server</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">Or choose a dedicated hardware option, such as a Cisco Multiparty Media 300 Series appliance or the Cisco MSE 8000 chassis with the Multiparty Media 820 blade, for a high-capacity solution.</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \"><br /></span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">Use TelePresence Server to:</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \"><br /></span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">Extend video collaboration to all employees, from mobile-, desktop-, or room-based systems</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">Boost team productivity and effectiveness</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">Bring everyone together in always-available Collaboration Meeting Rooms</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">Unify collaboration system deployment with a single collaboration architecture</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">Cut costs and simplify provisioning and maintenance</span>","shortDescription":"Cisco TelePresence Server is a business-quality, intuitive video conferencing","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":20,"sellingCount":11,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Cisco TelePresence Server","keywords":"Cisco, meeting, Server, collaboration, video, your, Meeting, Multiparty","description":"<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">Features and Capabilities</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \"><br /></span>\r\n<span style=\"","og:title":"Cisco TelePresence Server","og:description":"<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">Features and Capabilities</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \"><br /></span>\r\n<span style=\""},"eventUrl":"","translationId":93,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":30,"title":"Video Conferencing","alias":"video-conferencing","description":"Video conferencing is a technology that allows users in different locations to hold face-to-face meetings without having to move to a single location together. This technology is particularly convenient for business users in different cities or even different countries because it saves time, expense, and hassle associated with business travel. Uses for video conferencing include holding routine meetings, negotiating business deals, and interviewing job candidates.\r\nVideo conferencing's main advantage over teleconferencing is that users can see each other, which allows them to develop stronger relationships. When a video conference is held for informal purposes, it is called a video call or video chat.\r\nThere are a variety of ways video conferencing can be conducted. Individuals may use web cameras connected to our built into laptop, tablet, or desktop computers. Smartphones equipped with cameras may also be used to connect for video conferences. In such instances, a software-based platform typically is used to transmit communication over Internet protocols.\r\nSome businesses use dedicated video conferencing rooms that have been equipped with high-grade cameras and screens to ensure the conversation is clear and with limited technical faults. Third-party providers often install and assemble the hardware needed to conduct the video conference.\r\nCompanies with multiple offices might establish direct video communications between their locations in order to allow their teams to work more collaboratively.\r\nVideo conferencing can also be used as a medium for conducting training, with the instructor teaching a remote class from almost anywhere. This can be done in a corporate context, especially for getting workers the knowledge they need to better perform their jobs. The academic world can also make use of video conferencing to connect a traditional classroom setting with students who have based a considerable distance from the school.\r\nA video conference may also be used to conduct regular meetings with a company staff or to confer with shareholders about the latest activities at the business. It may be used to announce significant changes at a company, such as introducing a new CEO or to present information in an interactive way that allows all participants to engage in discussion about what they see on screen.\r\nHotels and conference centers sometimes make video conferencing services available to guests who require such services. This may be offered in suites or conference rooms that have been equipped for this purpose.","materialsDescription":" <span style=\"font-weight: bold; \">What is video conferencing?</span>\r\nVideo conferencing is two-way interactive communication delivered using telephone or Internet technologies that allows people at a different location to come together for a meeting. The video conference can be as simple as a conversation between two people in private offices (point-to-point) or involve several sites (multi-point) with more than one person in large rooms at different sites.\r\nA basic video conference setup has a camera and a microphone. Video from the camera and audio from the microphone is converted into a digital format and transmitted to a receiving location using a coding and decoding device, often referred to as a "codec".\r\nAt that receiving location is another codec device that decodes the receiving digital stream into a form that can be seen and heard on monitors or televisions. At the same time, video and audio from cameras and microphones at the received location is sent back to the original location.\r\n<span style=\"font-weight: bold; \">What are the benefits of video conferencing?</span>\r\nVideo conferencing saves travel time and money. Participants can see and hear all other participants and communicate both verbally and visually, creating a face-to-face experience. PowerPoint and other on-screen graphics, as well as other cameras, are also available presentation options. People's downtime is reduced and productivity gains are achieved by removing the logistics of flight preparations, airport delays, hotel stays, and all the other inconveniences of business travel. In distance education, video conferencing provides quality access to students who could not travel to or could afford to relocate to a traditional campus. Video conferences can also be recorded and made available in a variety of ways, e.g., DVDs, streaming video. Besides distance education, other applications include meetings, dissertation and thesis defenses, telemedical procedures, and online conferences.\r\nPeople use video conferencing when:\r\n<ul><li>a live conversation is needed;</li><li>visual information is an important component of the conversation;</li><li>the parties of the conversation can't physically come to the same location;</li><li>the expense or time of travel is a consideration.</li></ul>\r\nExamples of how video conferencing can benefit people around campus:\r\n<ul><li>Guest lecturer invited into a class from another institution.</li><li>The researcher collaborates with colleagues at other institutions on a regular basis.</li><li>Thesis defense at another institution.</li><li>Administrators from different parts of campus need to collaborate on administrator issues such as a campus strategic plan.</li><li>Researcher needs to meet with a review committee about a grant.</li><li>Student interviews with an employer in another city.</li></ul>\r\n<span style=\"font-weight: bold; \">Please explain the etiquette for video conferencing</span>\r\n<ul><li>Allow a few minutes for setting up and shutting down the video conference.</li><li>Stick to time limits.</li><li>Remember to mute your microphone when you are not talking.</li><li>Consider using a location banner.</li><li>Take turns speaking and allow time for audio delay.</li><li>Don't multi-task on camera.</li><li>Be aware of possible audio distractions if your microphone is not muted - coughing, paper shuffling, air conditioning units, laptop and projector fans, phone ringing, etc.</li></ul>\r\n<span style=\"font-weight: bold;\">What are some suggestions for a successful video conference?</span>\r\nProvide an overview for new users so they can learn the basics of videoconferencing:\r\n<ul><li>Share rules of etiquette.</li><li>Get experience using the remote control (room based systems) or using the desktop client software.</li><li>Emphasize the importance of muting the microphone when you are not speaking.</li><li>Test with each location prior to the video conference. Testing provides experience and creates a positive experience.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Video_Conferencing.png"},{"id":367,"title":"Web Conferencing Applications","alias":"web-conferencing-applications","description":" Web conferencing is the common name for technology and tools for online meetings and real-time collaboration. Web conferencing allows you to conduct online presentations, collaborate on documents and applications, view websites, videos, images.\r\nWeb conferences, as a rule, are Internet services that require the installation of a client program on each participant’s computer. Some services also provide access to a web conference via a browser using flash, java or a special plug-in.\r\nServices for web conferencing can include features and tools such as screen sharing (screen sharing or individual applications), whiteboard (interactive whiteboard), the ability to show web presentations, co-browsing (the ability to synchronously browse web pages), tools for annotations, monitoring the presence of participants, text chat, integrated VoIP communication, video communication, the ability to change the leader, the ability to give control over the mouse and keyboard, meeting moderation tools, feedback collection tools (on example, polls), tools for scheduling and inviting participants, the ability to record the progress of a web conference.\r\nOften, web conferencing is used with Internet services for audio and video calls (for example, Skype) or they provide conference calling via a regular telephone.","materialsDescription":" What is the first thing that strikes you when we look at businessmen who are trying to establish communication with each other online? All of them require: “Give more opportunities for web conferencing!”. Therefore, it is not at all surprising that the WebRTC technology is gaining the favor of an increasing number of small and medium-sized businesses.\r\nA recent study conducted by Software Advice showed that more than half of employees in small businesses prefer web conferences, noting their efficiency and usability. The advantages are especially noticeable in comparison with communications via telephone or the use of special applications. However, the benefits of web conferencing do not end there - according to the study, they not only increase the speed and quality of online meetings, but also provide a lot of opportunities for collaboration. In addition, and this is obvious, they reduce travel costs.\r\n<span style=\"font-weight: bold;\">Speed and quality come first.</span>\r\nIt is worth noting that now small and medium businesses are almost gone from the use of communication hardware and use desktop computers and mobile devices. Despite the fact that audio and video conferences are still very popular (they are used by 45% and 50% of users, respectively), web conferences are actively replacing them. Judge for yourself - according to statistics, every third user selects them as a means of communication after the first experience of use.\r\nThe main reason for such a rapid growth in popularity is the speed and quality that web conferencing users provide. According to respondents, the main advantage of web conferences is the ability to organize a meeting much faster than before. Now there is no need to spend time on installing special applications like Skype or similar - any communication systems using any third-party programs are a thing of the past. Also worth noting is the ability to connect to the web conference literally in one click.\r\nMore than 40% of the people surveyed showed dissatisfaction with the tedious procedure of entering authorization data, noting the simplicity and convenience of connecting to the WebRTC web conference. All you need is access to the Internet!\r\n<span style=\"font-weight: bold;\">We work in a team</span>\r\nIt is no secret that the use of web conferencing significantly reduces the company's travel expenses. After all, booking tickets, searching for hotels and meeting places can result in a decent amount, which will seriously hurt the company's income. Using web conferences, you get the opportunity to arrange business meetings, even with overseas partners, without leaving your office. But that's not all! Web conferencing offers a range of tools to overcome language barriers. For example, in the field of healthcare, videoconferencing has been used to establish consultations between doctors and patients from completely different countries. With the help of online translators and other special features of web conferences, people can get the necessary help from qualified foreign specialists.\r\nDo not forget that web conferencing is not only a convenient way to hold a video call. You can arrange trainings for your team using file transfer and document display functions, as well as conduct job interviews without wasting time.\r\nIt is interesting to note that small and medium-sized businesses share their product samples with prospective clients using web conferences, turning them into a powerful marketing tool. This brings the business to a fundamentally new level, allowing the company to take a leading position in its industry!","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Web_Conferencing_Applications.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":9,"title":"Support Decision Making"},{"id":10,"title":"Ensure Compliance"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":334,"title":"Poor timing of management decision making"},{"id":370,"title":"No automated business processes"},{"id":373,"title":"IT infrastructure does not meet business tasks"},{"id":375,"title":"No support for mobile and remote users"},{"id":378,"title":"Low employee productivity"},{"id":387,"title":"Non-compliant with IT security requirements"},{"id":393,"title":"Complex and non-transparent business processes"},{"id":398,"title":"Poor communication and coordination among staff"}]}},"categories":[{"id":30,"title":"Video Conferencing","alias":"video-conferencing","description":"Video conferencing is a technology that allows users in different locations to hold face-to-face meetings without having to move to a single location together. This technology is particularly convenient for business users in different cities or even different countries because it saves time, expense, and hassle associated with business travel. Uses for video conferencing include holding routine meetings, negotiating business deals, and interviewing job candidates.\r\nVideo conferencing's main advantage over teleconferencing is that users can see each other, which allows them to develop stronger relationships. When a video conference is held for informal purposes, it is called a video call or video chat.\r\nThere are a variety of ways video conferencing can be conducted. Individuals may use web cameras connected to our built into laptop, tablet, or desktop computers. Smartphones equipped with cameras may also be used to connect for video conferences. In such instances, a software-based platform typically is used to transmit communication over Internet protocols.\r\nSome businesses use dedicated video conferencing rooms that have been equipped with high-grade cameras and screens to ensure the conversation is clear and with limited technical faults. Third-party providers often install and assemble the hardware needed to conduct the video conference.\r\nCompanies with multiple offices might establish direct video communications between their locations in order to allow their teams to work more collaboratively.\r\nVideo conferencing can also be used as a medium for conducting training, with the instructor teaching a remote class from almost anywhere. This can be done in a corporate context, especially for getting workers the knowledge they need to better perform their jobs. The academic world can also make use of video conferencing to connect a traditional classroom setting with students who have based a considerable distance from the school.\r\nA video conference may also be used to conduct regular meetings with a company staff or to confer with shareholders about the latest activities at the business. It may be used to announce significant changes at a company, such as introducing a new CEO or to present information in an interactive way that allows all participants to engage in discussion about what they see on screen.\r\nHotels and conference centers sometimes make video conferencing services available to guests who require such services. This may be offered in suites or conference rooms that have been equipped for this purpose.","materialsDescription":" <span style=\"font-weight: bold; \">What is video conferencing?</span>\r\nVideo conferencing is two-way interactive communication delivered using telephone or Internet technologies that allows people at a different location to come together for a meeting. The video conference can be as simple as a conversation between two people in private offices (point-to-point) or involve several sites (multi-point) with more than one person in large rooms at different sites.\r\nA basic video conference setup has a camera and a microphone. Video from the camera and audio from the microphone is converted into a digital format and transmitted to a receiving location using a coding and decoding device, often referred to as a "codec".\r\nAt that receiving location is another codec device that decodes the receiving digital stream into a form that can be seen and heard on monitors or televisions. At the same time, video and audio from cameras and microphones at the received location is sent back to the original location.\r\n<span style=\"font-weight: bold; \">What are the benefits of video conferencing?</span>\r\nVideo conferencing saves travel time and money. Participants can see and hear all other participants and communicate both verbally and visually, creating a face-to-face experience. PowerPoint and other on-screen graphics, as well as other cameras, are also available presentation options. People's downtime is reduced and productivity gains are achieved by removing the logistics of flight preparations, airport delays, hotel stays, and all the other inconveniences of business travel. In distance education, video conferencing provides quality access to students who could not travel to or could afford to relocate to a traditional campus. Video conferences can also be recorded and made available in a variety of ways, e.g., DVDs, streaming video. Besides distance education, other applications include meetings, dissertation and thesis defenses, telemedical procedures, and online conferences.\r\nPeople use video conferencing when:\r\n<ul><li>a live conversation is needed;</li><li>visual information is an important component of the conversation;</li><li>the parties of the conversation can't physically come to the same location;</li><li>the expense or time of travel is a consideration.</li></ul>\r\nExamples of how video conferencing can benefit people around campus:\r\n<ul><li>Guest lecturer invited into a class from another institution.</li><li>The researcher collaborates with colleagues at other institutions on a regular basis.</li><li>Thesis defense at another institution.</li><li>Administrators from different parts of campus need to collaborate on administrator issues such as a campus strategic plan.</li><li>Researcher needs to meet with a review committee about a grant.</li><li>Student interviews with an employer in another city.</li></ul>\r\n<span style=\"font-weight: bold; \">Please explain the etiquette for video conferencing</span>\r\n<ul><li>Allow a few minutes for setting up and shutting down the video conference.</li><li>Stick to time limits.</li><li>Remember to mute your microphone when you are not talking.</li><li>Consider using a location banner.</li><li>Take turns speaking and allow time for audio delay.</li><li>Don't multi-task on camera.</li><li>Be aware of possible audio distractions if your microphone is not muted - coughing, paper shuffling, air conditioning units, laptop and projector fans, phone ringing, etc.</li></ul>\r\n<span style=\"font-weight: bold;\">What are some suggestions for a successful video conference?</span>\r\nProvide an overview for new users so they can learn the basics of videoconferencing:\r\n<ul><li>Share rules of etiquette.</li><li>Get experience using the remote control (room based systems) or using the desktop client software.</li><li>Emphasize the importance of muting the microphone when you are not speaking.</li><li>Test with each location prior to the video conference. Testing provides experience and creates a positive experience.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Video_Conferencing.png"},{"id":367,"title":"Web Conferencing Applications","alias":"web-conferencing-applications","description":" Web conferencing is the common name for technology and tools for online meetings and real-time collaboration. Web conferencing allows you to conduct online presentations, collaborate on documents and applications, view websites, videos, images.\r\nWeb conferences, as a rule, are Internet services that require the installation of a client program on each participant’s computer. Some services also provide access to a web conference via a browser using flash, java or a special plug-in.\r\nServices for web conferencing can include features and tools such as screen sharing (screen sharing or individual applications), whiteboard (interactive whiteboard), the ability to show web presentations, co-browsing (the ability to synchronously browse web pages), tools for annotations, monitoring the presence of participants, text chat, integrated VoIP communication, video communication, the ability to change the leader, the ability to give control over the mouse and keyboard, meeting moderation tools, feedback collection tools (on example, polls), tools for scheduling and inviting participants, the ability to record the progress of a web conference.\r\nOften, web conferencing is used with Internet services for audio and video calls (for example, Skype) or they provide conference calling via a regular telephone.","materialsDescription":" What is the first thing that strikes you when we look at businessmen who are trying to establish communication with each other online? All of them require: “Give more opportunities for web conferencing!”. Therefore, it is not at all surprising that the WebRTC technology is gaining the favor of an increasing number of small and medium-sized businesses.\r\nA recent study conducted by Software Advice showed that more than half of employees in small businesses prefer web conferences, noting their efficiency and usability. The advantages are especially noticeable in comparison with communications via telephone or the use of special applications. However, the benefits of web conferencing do not end there - according to the study, they not only increase the speed and quality of online meetings, but also provide a lot of opportunities for collaboration. In addition, and this is obvious, they reduce travel costs.\r\n<span style=\"font-weight: bold;\">Speed and quality come first.</span>\r\nIt is worth noting that now small and medium businesses are almost gone from the use of communication hardware and use desktop computers and mobile devices. Despite the fact that audio and video conferences are still very popular (they are used by 45% and 50% of users, respectively), web conferences are actively replacing them. Judge for yourself - according to statistics, every third user selects them as a means of communication after the first experience of use.\r\nThe main reason for such a rapid growth in popularity is the speed and quality that web conferencing users provide. According to respondents, the main advantage of web conferences is the ability to organize a meeting much faster than before. Now there is no need to spend time on installing special applications like Skype or similar - any communication systems using any third-party programs are a thing of the past. Also worth noting is the ability to connect to the web conference literally in one click.\r\nMore than 40% of the people surveyed showed dissatisfaction with the tedious procedure of entering authorization data, noting the simplicity and convenience of connecting to the WebRTC web conference. All you need is access to the Internet!\r\n<span style=\"font-weight: bold;\">We work in a team</span>\r\nIt is no secret that the use of web conferencing significantly reduces the company's travel expenses. After all, booking tickets, searching for hotels and meeting places can result in a decent amount, which will seriously hurt the company's income. Using web conferences, you get the opportunity to arrange business meetings, even with overseas partners, without leaving your office. But that's not all! Web conferencing offers a range of tools to overcome language barriers. For example, in the field of healthcare, videoconferencing has been used to establish consultations between doctors and patients from completely different countries. With the help of online translators and other special features of web conferences, people can get the necessary help from qualified foreign specialists.\r\nDo not forget that web conferencing is not only a convenient way to hold a video call. You can arrange trainings for your team using file transfer and document display functions, as well as conduct job interviews without wasting time.\r\nIt is interesting to note that small and medium-sized businesses share their product samples with prospective clients using web conferences, turning them into a powerful marketing tool. This brings the business to a fundamentally new level, allowing the company to take a leading position in its industry!","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Web_Conferencing_Applications.png"}],"additionalInfo":{"budgetNotExceeded":"-1","functionallyTaskAssignment":"-1","projectWasPut":"-1","price":0,"source":{"url":"http://snt.ua/news/pressroom/pressreleases/82095.ua.php","title":"Supplier's web site"}},"comments":[],"referencesCount":0},{"id":935,"title":"Cisco TelePresence for the largest agricultural holding in Ukraine","description":"Description is not ready yet","alias":"cisco-telepresence-for-the-largest-agricultural-holding-in-ukraine","roi":0,"seo":{"title":"Cisco TelePresence for the largest agricultural holding in Ukraine","keywords":"","description":"Description is not ready yet","og:title":"Cisco TelePresence for the largest agricultural holding in Ukraine","og:description":"Description is not ready yet"},"deal_info":"","user":{"id":7275,"title":"Ukrlandfarming","logoURL":"https://old.roi4cio.com/uploads/roi/company/Ukrlandfarming.jpeg","alias":"ukrlendfarming","address":"","roles":[],"description":" Ukrlandfarming was founded in 2007.<br />In 2011, after acquiring and combining the assets of the companies: Robusta-Agro-Invest (agricultural crops), Dakor Agro Holding (agricultural crops, sugar, livestock), Rise (agricultural crops, sugar, livestock, seeds, services on storage, distribution of agricultural machinery, fertilizers, plant protection products), Ukrmyaso (production of beef and leather products), Avangard (production of eggs and egg products), Olympus, Agro-Resource, Zorya, "Chernyshevskoe", "Macon" (increase in bank and storage facilities), Ukrlandfarming group has become the largest vertically integrated agricultural holding in Ukraine.<br />Ukrlandfarming is the most powerful vertically integrated agricultural holding in Ukraine, which manages the largest in the country and the eighth in the world bank of fertile black soil with a total area of 570 thousand hectares.<br />Production direction<br />• Crop production and seed production.<br />• Dairy and beef cattle breeding.<br />• Production of eggs and egg products.<br />• Sugar production.<br />• Meat processing.<br />• Storage and trade of grain and industrial crops.<br />• Distribution of agricultural machinery, spare parts, plant protection products, mineral and special fertilizers, seeds.<br />• Technical service.<br />The holding structure includes five seed factories, 19 poultry farms, 10 laying hen farms, three reproducers, three breeding farms, six animal feed plants, the Imperovo Foods egg product factory, three egg storage facilities, six sugar mills, 19 meat processing plants and two leather factories.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.ulf.com.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Ukrlandfarming","keywords":"","description":" Ukrlandfarming was founded in 2007.<br />In 2011, after acquiring and combining the assets of the companies: Robusta-Agro-Invest (agricultural crops), Dakor Agro Holding (agricultural crops, sugar, livestock), Rise (agricultural crops, sugar, livestock, seeds","og:title":"Ukrlandfarming","og:description":" Ukrlandfarming was founded in 2007.<br />In 2011, after acquiring and combining the assets of the companies: Robusta-Agro-Invest (agricultural crops), Dakor Agro Holding (agricultural crops, sugar, livestock), Rise (agricultural crops, sugar, livestock, seeds","og:image":"https://old.roi4cio.com/uploads/roi/company/Ukrlandfarming.jpeg"},"eventUrl":""},"supplier":{"id":249,"title":"Integrity Systems","logoURL":"https://old.roi4cio.com/uploads/roi/company/integrity_systems.png","alias":"integrity-systems","address":"Київ 01032 вул. Саксаганського, 119, оф. 26","roles":[],"description":"Integrity Systems is a young company, system integrator dynamic. Integrity Systems specializes in the design and implementation of IT solutions for medium and large enterprises. The company "Systems Integration" was founded in 2007 and focuses its activities on solutions using various technologies IT business objectives corporate customers in Ukraine. The main asset is our team of qualified consultants, project managers and engineers, allowing us to offer our clients services that cover the full life cycle of IT solutions - from analyzing business objectives, design, implementation and further maintenance and support.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":197,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":15,"vendorImplementationsCount":0,"vendorPartnersCount":9,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://integritysys.com.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Integrity Systems","keywords":"Systems, solutions, Integrity, implementation, design, company, business, objectives","description":"Integrity Systems is a young company, system integrator dynamic. Integrity Systems specializes in the design and implementation of IT solutions for medium and large enterprises. The company "Systems Integration" was founded in 2007 and focuses its ac","og:title":"Integrity Systems","og:description":"Integrity Systems is a young company, system integrator dynamic. Integrity Systems specializes in the design and implementation of IT solutions for medium and large enterprises. The company "Systems Integration" was founded in 2007 and focuses its ac","og:image":"https://old.roi4cio.com/uploads/roi/company/integrity_systems.png"},"eventUrl":""},"vendors":[{"id":170,"title":"Cisco","logoURL":"https://old.roi4cio.com/uploads/roi/company/Cisco_logo.png","alias":"cisco","address":"","roles":[],"description":"<span lang=\"en\">Cisco Systems is a global manufacturer of network equipment: routers, switches and servers, as well as software for data transmission on the Internet and corporate networks. The company was founded in 1984 in San Jose (California, USA). Today, Cisco dominates the Internet Protocol (IP) -based network equipment segment, and also manufactures cybersecurity, video conferencing systems, and other network equipment and software. In addition, Cisco offers a number of cloud services. Cisco's primary customers are large enterprises and telecommunications service providers, but the company also sells products aimed at small businesses and the public sector. </span>\r\n\r\n<span lang=\"en\">Cisco offers products and services in four categories. The company's infrastructure platforms generate more than half of its revenue. This includes switching devices, routing devices, wireless communications, and data processing solutions. Applications that account for over 10% of revenue are primarily software related to networking and data processing platforms. </span>\r\n\r\n<span lang=\"en\">Applications include collaboration tools (unified communications, Cisco TelePresence video conferencing) as well as AppDynamics and Internet of Things software. The cybersecurity product category generates more than 5% of the company's revenue and includes network security, email security, identity and access, advanced threat protection, and unified exposure management products. In addition, Cisco offers consulting services. </span>\r\n\r\n<span lang=\"en\">Cisco's total revenue in fiscal 2020 was nearly $ 50 billion. The company is expanding its research and development (R&D) investments in areas such as the cloud platform, remote collaboration platform, analytics and telecommunications technologies.</span>","companyTypes":[],"products":{},"vendoredProductsCount":29,"suppliedProductsCount":29,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":7,"vendorImplementationsCount":42,"vendorPartnersCount":0,"supplierPartnersCount":125,"b4r":0,"categories":{},"companyUrl":"https://www.cisco.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Cisco","keywords":"Index, networking, Cisco, company, Russell, 1000, June, Average","description":"<span lang=\"en\">Cisco Systems is a global manufacturer of network equipment: routers, switches and servers, as well as software for data transmission on the Internet and corporate networks. The company was founded in 1984 in San Jose (California, USA). Today, ","og:title":"Cisco","og:description":"<span lang=\"en\">Cisco Systems is a global manufacturer of network equipment: routers, switches and servers, as well as software for data transmission on the Internet and corporate networks. The company was founded in 1984 in San Jose (California, USA). Today, ","og:image":"https://old.roi4cio.com/uploads/roi/company/Cisco_logo.png"},"eventUrl":""}],"products":[{"id":70,"logo":false,"scheme":false,"title":"Cisco TelePresence Server","vendorVerified":0,"rating":"2.40","implementationsCount":3,"suppliersCount":0,"alias":"cisco-telepresence-server","companyTypes":[],"description":"<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">Features and Capabilities</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \"><br /></span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">With TelePresence Server, anyone can join a meeting using video, audio, and content sharing, from any mobile, desktop, or room system, anywhere. People can meet the way they want—in one-on-one discussions; in personal, always-on meeting rooms; or in scheduled meetings.</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \"><br /></span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">You can expand your on-premises videoconferencing deployment to a hybrid premises-and-cloud model by extending meetings to Cisco WebEx Meeting Center users. Anyone can join the same meeting from a standards-based video or WebEx-equipped device.</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \"><br /></span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">Features</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \"><br /></span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">Business-Quality, Highly Scalable Conferencing</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">Enjoy effective collaboration through video, audio, and content sharing for meetings that can include hundreds of participants. Enjoy a superior experience on any device using mobile, desktop, or room systems.</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \"><br /></span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">Intuitive, User-Selectable Layouts and In-Meeting Controls</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">A comprehensive range of controls and indicators helps you customize your meeting experience. Use them to define security controls, choose your favorite layout, and easily see who is in your meeting.</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \"><br /></span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">Flexible Deployment Options</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">You can choose between a virtualized setup on:</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \"><br /></span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">Cisco Business Edition platforms</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">Optimized Cisco UCS platforms, such as the new high-capacity Cisco Meeting Server 1000 and Multiparty Media 410v Blade Server</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">Or choose a dedicated hardware option, such as a Cisco Multiparty Media 300 Series appliance or the Cisco MSE 8000 chassis with the Multiparty Media 820 blade, for a high-capacity solution.</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \"><br /></span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">Use TelePresence Server to:</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \"><br /></span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">Extend video collaboration to all employees, from mobile-, desktop-, or room-based systems</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">Boost team productivity and effectiveness</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">Bring everyone together in always-available Collaboration Meeting Rooms</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">Unify collaboration system deployment with a single collaboration architecture</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">Cut costs and simplify provisioning and maintenance</span>","shortDescription":"Cisco TelePresence Server is a business-quality, intuitive video conferencing","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":20,"sellingCount":11,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Cisco TelePresence Server","keywords":"Cisco, meeting, Server, collaboration, video, your, Meeting, Multiparty","description":"<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">Features and Capabilities</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \"><br /></span>\r\n<span style=\"","og:title":"Cisco TelePresence Server","og:description":"<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \">Features and Capabilities</span>\r\n<span style=\"color: rgb(51, 51, 51); font-family: arial, helvetica, sans-serif; font-size: 16px; \"><br /></span>\r\n<span style=\""},"eventUrl":"","translationId":93,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":30,"title":"Video Conferencing","alias":"video-conferencing","description":"Video conferencing is a technology that allows users in different locations to hold face-to-face meetings without having to move to a single location together. This technology is particularly convenient for business users in different cities or even different countries because it saves time, expense, and hassle associated with business travel. Uses for video conferencing include holding routine meetings, negotiating business deals, and interviewing job candidates.\r\nVideo conferencing's main advantage over teleconferencing is that users can see each other, which allows them to develop stronger relationships. When a video conference is held for informal purposes, it is called a video call or video chat.\r\nThere are a variety of ways video conferencing can be conducted. Individuals may use web cameras connected to our built into laptop, tablet, or desktop computers. Smartphones equipped with cameras may also be used to connect for video conferences. In such instances, a software-based platform typically is used to transmit communication over Internet protocols.\r\nSome businesses use dedicated video conferencing rooms that have been equipped with high-grade cameras and screens to ensure the conversation is clear and with limited technical faults. Third-party providers often install and assemble the hardware needed to conduct the video conference.\r\nCompanies with multiple offices might establish direct video communications between their locations in order to allow their teams to work more collaboratively.\r\nVideo conferencing can also be used as a medium for conducting training, with the instructor teaching a remote class from almost anywhere. This can be done in a corporate context, especially for getting workers the knowledge they need to better perform their jobs. The academic world can also make use of video conferencing to connect a traditional classroom setting with students who have based a considerable distance from the school.\r\nA video conference may also be used to conduct regular meetings with a company staff or to confer with shareholders about the latest activities at the business. It may be used to announce significant changes at a company, such as introducing a new CEO or to present information in an interactive way that allows all participants to engage in discussion about what they see on screen.\r\nHotels and conference centers sometimes make video conferencing services available to guests who require such services. This may be offered in suites or conference rooms that have been equipped for this purpose.","materialsDescription":" <span style=\"font-weight: bold; \">What is video conferencing?</span>\r\nVideo conferencing is two-way interactive communication delivered using telephone or Internet technologies that allows people at a different location to come together for a meeting. The video conference can be as simple as a conversation between two people in private offices (point-to-point) or involve several sites (multi-point) with more than one person in large rooms at different sites.\r\nA basic video conference setup has a camera and a microphone. Video from the camera and audio from the microphone is converted into a digital format and transmitted to a receiving location using a coding and decoding device, often referred to as a "codec".\r\nAt that receiving location is another codec device that decodes the receiving digital stream into a form that can be seen and heard on monitors or televisions. At the same time, video and audio from cameras and microphones at the received location is sent back to the original location.\r\n<span style=\"font-weight: bold; \">What are the benefits of video conferencing?</span>\r\nVideo conferencing saves travel time and money. Participants can see and hear all other participants and communicate both verbally and visually, creating a face-to-face experience. PowerPoint and other on-screen graphics, as well as other cameras, are also available presentation options. People's downtime is reduced and productivity gains are achieved by removing the logistics of flight preparations, airport delays, hotel stays, and all the other inconveniences of business travel. In distance education, video conferencing provides quality access to students who could not travel to or could afford to relocate to a traditional campus. Video conferences can also be recorded and made available in a variety of ways, e.g., DVDs, streaming video. Besides distance education, other applications include meetings, dissertation and thesis defenses, telemedical procedures, and online conferences.\r\nPeople use video conferencing when:\r\n<ul><li>a live conversation is needed;</li><li>visual information is an important component of the conversation;</li><li>the parties of the conversation can't physically come to the same location;</li><li>the expense or time of travel is a consideration.</li></ul>\r\nExamples of how video conferencing can benefit people around campus:\r\n<ul><li>Guest lecturer invited into a class from another institution.</li><li>The researcher collaborates with colleagues at other institutions on a regular basis.</li><li>Thesis defense at another institution.</li><li>Administrators from different parts of campus need to collaborate on administrator issues such as a campus strategic plan.</li><li>Researcher needs to meet with a review committee about a grant.</li><li>Student interviews with an employer in another city.</li></ul>\r\n<span style=\"font-weight: bold; \">Please explain the etiquette for video conferencing</span>\r\n<ul><li>Allow a few minutes for setting up and shutting down the video conference.</li><li>Stick to time limits.</li><li>Remember to mute your microphone when you are not talking.</li><li>Consider using a location banner.</li><li>Take turns speaking and allow time for audio delay.</li><li>Don't multi-task on camera.</li><li>Be aware of possible audio distractions if your microphone is not muted - coughing, paper shuffling, air conditioning units, laptop and projector fans, phone ringing, etc.</li></ul>\r\n<span style=\"font-weight: bold;\">What are some suggestions for a successful video conference?</span>\r\nProvide an overview for new users so they can learn the basics of videoconferencing:\r\n<ul><li>Share rules of etiquette.</li><li>Get experience using the remote control (room based systems) or using the desktop client software.</li><li>Emphasize the importance of muting the microphone when you are not speaking.</li><li>Test with each location prior to the video conference. Testing provides experience and creates a positive experience.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Video_Conferencing.png"},{"id":367,"title":"Web Conferencing Applications","alias":"web-conferencing-applications","description":" Web conferencing is the common name for technology and tools for online meetings and real-time collaboration. Web conferencing allows you to conduct online presentations, collaborate on documents and applications, view websites, videos, images.\r\nWeb conferences, as a rule, are Internet services that require the installation of a client program on each participant’s computer. Some services also provide access to a web conference via a browser using flash, java or a special plug-in.\r\nServices for web conferencing can include features and tools such as screen sharing (screen sharing or individual applications), whiteboard (interactive whiteboard), the ability to show web presentations, co-browsing (the ability to synchronously browse web pages), tools for annotations, monitoring the presence of participants, text chat, integrated VoIP communication, video communication, the ability to change the leader, the ability to give control over the mouse and keyboard, meeting moderation tools, feedback collection tools (on example, polls), tools for scheduling and inviting participants, the ability to record the progress of a web conference.\r\nOften, web conferencing is used with Internet services for audio and video calls (for example, Skype) or they provide conference calling via a regular telephone.","materialsDescription":" What is the first thing that strikes you when we look at businessmen who are trying to establish communication with each other online? All of them require: “Give more opportunities for web conferencing!”. Therefore, it is not at all surprising that the WebRTC technology is gaining the favor of an increasing number of small and medium-sized businesses.\r\nA recent study conducted by Software Advice showed that more than half of employees in small businesses prefer web conferences, noting their efficiency and usability. The advantages are especially noticeable in comparison with communications via telephone or the use of special applications. However, the benefits of web conferencing do not end there - according to the study, they not only increase the speed and quality of online meetings, but also provide a lot of opportunities for collaboration. In addition, and this is obvious, they reduce travel costs.\r\n<span style=\"font-weight: bold;\">Speed and quality come first.</span>\r\nIt is worth noting that now small and medium businesses are almost gone from the use of communication hardware and use desktop computers and mobile devices. Despite the fact that audio and video conferences are still very popular (they are used by 45% and 50% of users, respectively), web conferences are actively replacing them. Judge for yourself - according to statistics, every third user selects them as a means of communication after the first experience of use.\r\nThe main reason for such a rapid growth in popularity is the speed and quality that web conferencing users provide. According to respondents, the main advantage of web conferences is the ability to organize a meeting much faster than before. Now there is no need to spend time on installing special applications like Skype or similar - any communication systems using any third-party programs are a thing of the past. Also worth noting is the ability to connect to the web conference literally in one click.\r\nMore than 40% of the people surveyed showed dissatisfaction with the tedious procedure of entering authorization data, noting the simplicity and convenience of connecting to the WebRTC web conference. All you need is access to the Internet!\r\n<span style=\"font-weight: bold;\">We work in a team</span>\r\nIt is no secret that the use of web conferencing significantly reduces the company's travel expenses. After all, booking tickets, searching for hotels and meeting places can result in a decent amount, which will seriously hurt the company's income. Using web conferences, you get the opportunity to arrange business meetings, even with overseas partners, without leaving your office. But that's not all! Web conferencing offers a range of tools to overcome language barriers. For example, in the field of healthcare, videoconferencing has been used to establish consultations between doctors and patients from completely different countries. With the help of online translators and other special features of web conferences, people can get the necessary help from qualified foreign specialists.\r\nDo not forget that web conferencing is not only a convenient way to hold a video call. You can arrange trainings for your team using file transfer and document display functions, as well as conduct job interviews without wasting time.\r\nIt is interesting to note that small and medium-sized businesses share their product samples with prospective clients using web conferences, turning them into a powerful marketing tool. This brings the business to a fundamentally new level, allowing the company to take a leading position in its industry!","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Web_Conferencing_Applications.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":10,"title":"Ensure Compliance"},{"id":254,"title":"Centralize management"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":375,"title":"No support for mobile and remote users"},{"id":381,"title":"HR management"},{"id":398,"title":"Poor communication and coordination among staff"}]}},"categories":[{"id":30,"title":"Video Conferencing","alias":"video-conferencing","description":"Video conferencing is a technology that allows users in different locations to hold face-to-face meetings without having to move to a single location together. This technology is particularly convenient for business users in different cities or even different countries because it saves time, expense, and hassle associated with business travel. Uses for video conferencing include holding routine meetings, negotiating business deals, and interviewing job candidates.\r\nVideo conferencing's main advantage over teleconferencing is that users can see each other, which allows them to develop stronger relationships. When a video conference is held for informal purposes, it is called a video call or video chat.\r\nThere are a variety of ways video conferencing can be conducted. Individuals may use web cameras connected to our built into laptop, tablet, or desktop computers. Smartphones equipped with cameras may also be used to connect for video conferences. In such instances, a software-based platform typically is used to transmit communication over Internet protocols.\r\nSome businesses use dedicated video conferencing rooms that have been equipped with high-grade cameras and screens to ensure the conversation is clear and with limited technical faults. Third-party providers often install and assemble the hardware needed to conduct the video conference.\r\nCompanies with multiple offices might establish direct video communications between their locations in order to allow their teams to work more collaboratively.\r\nVideo conferencing can also be used as a medium for conducting training, with the instructor teaching a remote class from almost anywhere. This can be done in a corporate context, especially for getting workers the knowledge they need to better perform their jobs. The academic world can also make use of video conferencing to connect a traditional classroom setting with students who have based a considerable distance from the school.\r\nA video conference may also be used to conduct regular meetings with a company staff or to confer with shareholders about the latest activities at the business. It may be used to announce significant changes at a company, such as introducing a new CEO or to present information in an interactive way that allows all participants to engage in discussion about what they see on screen.\r\nHotels and conference centers sometimes make video conferencing services available to guests who require such services. This may be offered in suites or conference rooms that have been equipped for this purpose.","materialsDescription":" <span style=\"font-weight: bold; \">What is video conferencing?</span>\r\nVideo conferencing is two-way interactive communication delivered using telephone or Internet technologies that allows people at a different location to come together for a meeting. The video conference can be as simple as a conversation between two people in private offices (point-to-point) or involve several sites (multi-point) with more than one person in large rooms at different sites.\r\nA basic video conference setup has a camera and a microphone. Video from the camera and audio from the microphone is converted into a digital format and transmitted to a receiving location using a coding and decoding device, often referred to as a "codec".\r\nAt that receiving location is another codec device that decodes the receiving digital stream into a form that can be seen and heard on monitors or televisions. At the same time, video and audio from cameras and microphones at the received location is sent back to the original location.\r\n<span style=\"font-weight: bold; \">What are the benefits of video conferencing?</span>\r\nVideo conferencing saves travel time and money. Participants can see and hear all other participants and communicate both verbally and visually, creating a face-to-face experience. PowerPoint and other on-screen graphics, as well as other cameras, are also available presentation options. People's downtime is reduced and productivity gains are achieved by removing the logistics of flight preparations, airport delays, hotel stays, and all the other inconveniences of business travel. In distance education, video conferencing provides quality access to students who could not travel to or could afford to relocate to a traditional campus. Video conferences can also be recorded and made available in a variety of ways, e.g., DVDs, streaming video. Besides distance education, other applications include meetings, dissertation and thesis defenses, telemedical procedures, and online conferences.\r\nPeople use video conferencing when:\r\n<ul><li>a live conversation is needed;</li><li>visual information is an important component of the conversation;</li><li>the parties of the conversation can't physically come to the same location;</li><li>the expense or time of travel is a consideration.</li></ul>\r\nExamples of how video conferencing can benefit people around campus:\r\n<ul><li>Guest lecturer invited into a class from another institution.</li><li>The researcher collaborates with colleagues at other institutions on a regular basis.</li><li>Thesis defense at another institution.</li><li>Administrators from different parts of campus need to collaborate on administrator issues such as a campus strategic plan.</li><li>Researcher needs to meet with a review committee about a grant.</li><li>Student interviews with an employer in another city.</li></ul>\r\n<span style=\"font-weight: bold; \">Please explain the etiquette for video conferencing</span>\r\n<ul><li>Allow a few minutes for setting up and shutting down the video conference.</li><li>Stick to time limits.</li><li>Remember to mute your microphone when you are not talking.</li><li>Consider using a location banner.</li><li>Take turns speaking and allow time for audio delay.</li><li>Don't multi-task on camera.</li><li>Be aware of possible audio distractions if your microphone is not muted - coughing, paper shuffling, air conditioning units, laptop and projector fans, phone ringing, etc.</li></ul>\r\n<span style=\"font-weight: bold;\">What are some suggestions for a successful video conference?</span>\r\nProvide an overview for new users so they can learn the basics of videoconferencing:\r\n<ul><li>Share rules of etiquette.</li><li>Get experience using the remote control (room based systems) or using the desktop client software.</li><li>Emphasize the importance of muting the microphone when you are not speaking.</li><li>Test with each location prior to the video conference. Testing provides experience and creates a positive experience.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Video_Conferencing.png"},{"id":367,"title":"Web Conferencing Applications","alias":"web-conferencing-applications","description":" Web conferencing is the common name for technology and tools for online meetings and real-time collaboration. Web conferencing allows you to conduct online presentations, collaborate on documents and applications, view websites, videos, images.\r\nWeb conferences, as a rule, are Internet services that require the installation of a client program on each participant’s computer. Some services also provide access to a web conference via a browser using flash, java or a special plug-in.\r\nServices for web conferencing can include features and tools such as screen sharing (screen sharing or individual applications), whiteboard (interactive whiteboard), the ability to show web presentations, co-browsing (the ability to synchronously browse web pages), tools for annotations, monitoring the presence of participants, text chat, integrated VoIP communication, video communication, the ability to change the leader, the ability to give control over the mouse and keyboard, meeting moderation tools, feedback collection tools (on example, polls), tools for scheduling and inviting participants, the ability to record the progress of a web conference.\r\nOften, web conferencing is used with Internet services for audio and video calls (for example, Skype) or they provide conference calling via a regular telephone.","materialsDescription":" What is the first thing that strikes you when we look at businessmen who are trying to establish communication with each other online? All of them require: “Give more opportunities for web conferencing!”. Therefore, it is not at all surprising that the WebRTC technology is gaining the favor of an increasing number of small and medium-sized businesses.\r\nA recent study conducted by Software Advice showed that more than half of employees in small businesses prefer web conferences, noting their efficiency and usability. The advantages are especially noticeable in comparison with communications via telephone or the use of special applications. However, the benefits of web conferencing do not end there - according to the study, they not only increase the speed and quality of online meetings, but also provide a lot of opportunities for collaboration. In addition, and this is obvious, they reduce travel costs.\r\n<span style=\"font-weight: bold;\">Speed and quality come first.</span>\r\nIt is worth noting that now small and medium businesses are almost gone from the use of communication hardware and use desktop computers and mobile devices. Despite the fact that audio and video conferences are still very popular (they are used by 45% and 50% of users, respectively), web conferences are actively replacing them. Judge for yourself - according to statistics, every third user selects them as a means of communication after the first experience of use.\r\nThe main reason for such a rapid growth in popularity is the speed and quality that web conferencing users provide. According to respondents, the main advantage of web conferences is the ability to organize a meeting much faster than before. Now there is no need to spend time on installing special applications like Skype or similar - any communication systems using any third-party programs are a thing of the past. Also worth noting is the ability to connect to the web conference literally in one click.\r\nMore than 40% of the people surveyed showed dissatisfaction with the tedious procedure of entering authorization data, noting the simplicity and convenience of connecting to the WebRTC web conference. All you need is access to the Internet!\r\n<span style=\"font-weight: bold;\">We work in a team</span>\r\nIt is no secret that the use of web conferencing significantly reduces the company's travel expenses. After all, booking tickets, searching for hotels and meeting places can result in a decent amount, which will seriously hurt the company's income. Using web conferences, you get the opportunity to arrange business meetings, even with overseas partners, without leaving your office. But that's not all! Web conferencing offers a range of tools to overcome language barriers. For example, in the field of healthcare, videoconferencing has been used to establish consultations between doctors and patients from completely different countries. With the help of online translators and other special features of web conferences, people can get the necessary help from qualified foreign specialists.\r\nDo not forget that web conferencing is not only a convenient way to hold a video call. You can arrange trainings for your team using file transfer and document display functions, as well as conduct job interviews without wasting time.\r\nIt is interesting to note that small and medium-sized businesses share their product samples with prospective clients using web conferences, turning them into a powerful marketing tool. This brings the business to a fundamentally new level, allowing the company to take a leading position in its industry!","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Web_Conferencing_Applications.png"}],"additionalInfo":{"budgetNotExceeded":"-1","functionallyTaskAssignment":"-1","projectWasPut":"-1","price":0,"source":{"url":"http://integritysys.com.ua/success-networks/ukrlandfarming-m-cisco/","title":"Supplier's web site"}},"comments":[],"referencesCount":0},{"id":1038,"title":"Cisco Unified Communication Manager 7.1 for the Ukrainian bank \"Prominvestbank\"","description":"<span style=\"font-style: italic; \">Description is not ready yet</span>","alias":"cisco-unified-communication-manager-71-for-the-ukrainian-bank-prominvestbank","roi":0,"seo":{"title":"Cisco Unified Communication Manager 7.1 for the Ukrainian bank \"Prominvestbank\"","keywords":"","description":"<span style=\"font-style: italic; \">Description is not ready yet</span>","og:title":"Cisco Unified Communication Manager 7.1 for the Ukrainian bank \"Prominvestbank\"","og:description":"<span style=\"font-style: italic; \">Description is not ready yet</span>"},"deal_info":"","user":{"id":542,"title":"Prominvestbank","logoURL":"https://old.roi4cio.com/uploads/roi/company/Prominvestbank.png","alias":"prominvestbank","address":"","roles":[],"description":"PSC Prominvestbank was established in 1992 and from the moment of its foundation it is included into the group of the largest banks of Ukraine. In the early 2000s, the bank first entered the list of 1000 largest banks in the world for the first time. In 2003, 2004 and 2006, The Banker (Financial Times) English publication recognized PSC Prominvestbank as the Bank of the year in Ukraine. In 2010, according to the results of top-100 "Business leaders of Ukraine - 10 years of development" - a joint project of Ukrainian Investment Newspaper LLC and Credit-Rating agency - PSC Prominvestbank joined the ranks of the most important financial institutions for the development of the country. In 2014 PSC Prominvestbank was named as the systemic important bank of the country according to NBU classification.\r\nAccording to results of 2016, Prominvestbank received a favorable opinion of the international auditor of RSM Ukraine. In August 2017, Expert-Rating rating agency updated the long-term credit rating of PSC Prominvestbank at the level of uaАА +. PSC Prominvestbank has a unique experience of cooperation with enterprises of all economy sectors.\r\nPSC Prominvestbank develops business focusing on two key client segments: Big business and retail customers.\r\nProminvestbank is traditionally a leading player in the corporate sector service market. The bank supports almost a thousand of mechanical engineering, electric power, food industry enterprises, agro-industrial complexes and other branches of economy of Ukraine. The bank has an extensive network of branches integrated into a single information space on the basis of modern technologies. According to the loan portfolio volume to corporate clients of PSC Prominvestbank is confidently among the top five financial institutions of the country. During the years of state independence, the bank invested more than $70 billion of credit resources in economic development. Innovative model of retail business is based on a fundamentally new approach to cooperation with the Client and is focused on long-term relationships building.\r\nThe main shareholder of the Bank since 2009 is the State corporation Bank for Development and Foreign Economic Affairs (Vnesheconombank) (Russia), which owns 99.7726% of shares (detailed).\r\nIn addition to its profile activities, PSC Prominvestbank is the initiator and founder of two humanitarian educational projects: Kyiv Institute of Banking and Russian-Ukrainian humanitarian gymnasium.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.pib.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Prominvestbank","keywords":"Promstroybank, state, USSR, 1922, Prominvestba, begun, history, successor","description":"PSC Prominvestbank was established in 1992 and from the moment of its foundation it is included into the group of the largest banks of Ukraine. In the early 2000s, the bank first entered the list of 1000 largest banks in the world for the first time. In 2003, ","og:title":"Prominvestbank","og:description":"PSC Prominvestbank was established in 1992 and from the moment of its foundation it is included into the group of the largest banks of Ukraine. In the early 2000s, the bank first entered the list of 1000 largest banks in the world for the first time. In 2003, ","og:image":"https://old.roi4cio.com/uploads/roi/company/Prominvestbank.png"},"eventUrl":""},"supplier":{"id":2701,"title":"VERNA","logoURL":"https://old.roi4cio.com/uploads/roi/company/VERNA.png","alias":"verna","address":"","roles":[],"description":"VERNA is one of the leading IT Integrators, specializing in design, implementation and support of technical solutions, aimed to improve the efficiency of corporate IT systems, - both on-site and on a remote basis. <br />VERNA has spent more than 15 successful years of dynamic development in the MSP area, having implemented 150 + projects for national-wide companies at Ukrainian market as well as outsourced projects for clients from USA and Western Europe.<br />The main customers are large geographically distributed enterprises: banks, retails, industrial enterprises (BNP Paribas Group, GlobalLogic, Volksbank, Kraft, ArcelorMittal, UniCredit Bank and others).<br />Technical expertise and skills of VERNA team are proven by certificates and partnership statuses with Cisco, Microsoft, HP, IBM, APC, Oracle, VMware, Citrix, Intel, Dell, Siemens, Systemax, etc.<br />VERNA specializes in planning, implementation and support of the following solutions:<br />- Virtualization (VMware,Hyper-V, Citrix, Dockers)<br />- Infrastructure (MS Active Directory, Office 365, Azure, AWS amazon)<br />- VoIP (Cisco, asterisk/FreePBX/Elastix)<br />- Unified Communications (Webex, Big Blue Button, Lync, Exchange, SharePoint)<br />- Networking (Cisco, FortiNet, OpenVPN, CheckPoint)<br />- Server & Storage (SAN, NAS, FAS)<br />- Business applications and databases (Microsoft, Oracle, IBM)<br />- VDI and terminal access solutions (Microsoft, VMware, Citrix)<br />- Storage virtualization (DataCore)<br />- DLP and Information Security (Antivirus systems, websence, Fortinet, DeviceLock e t.c.)<br />Source: https://www.linkedin.com/company/verna","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":205,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":41,"vendorImplementationsCount":0,"vendorPartnersCount":9,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.verna.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"VERNA","keywords":"solutions, infrastructure, providing, distributed, geographically, with, core, services","description":"VERNA is one of the leading IT Integrators, specializing in design, implementation and support of technical solutions, aimed to improve the efficiency of corporate IT systems, - both on-site and on a remote basis. <br />VERNA has spent more than 15 successful ","og:title":"VERNA","og:description":"VERNA is one of the leading IT Integrators, specializing in design, implementation and support of technical solutions, aimed to improve the efficiency of corporate IT systems, - both on-site and on a remote basis. <br />VERNA has spent more than 15 successful ","og:image":"https://old.roi4cio.com/uploads/roi/company/VERNA.png"},"eventUrl":""},"vendors":[{"id":170,"title":"Cisco","logoURL":"https://old.roi4cio.com/uploads/roi/company/Cisco_logo.png","alias":"cisco","address":"","roles":[],"description":"<span lang=\"en\">Cisco Systems is a global manufacturer of network equipment: routers, switches and servers, as well as software for data transmission on the Internet and corporate networks. The company was founded in 1984 in San Jose (California, USA). Today, Cisco dominates the Internet Protocol (IP) -based network equipment segment, and also manufactures cybersecurity, video conferencing systems, and other network equipment and software. In addition, Cisco offers a number of cloud services. Cisco's primary customers are large enterprises and telecommunications service providers, but the company also sells products aimed at small businesses and the public sector. </span>\r\n\r\n<span lang=\"en\">Cisco offers products and services in four categories. The company's infrastructure platforms generate more than half of its revenue. This includes switching devices, routing devices, wireless communications, and data processing solutions. Applications that account for over 10% of revenue are primarily software related to networking and data processing platforms. </span>\r\n\r\n<span lang=\"en\">Applications include collaboration tools (unified communications, Cisco TelePresence video conferencing) as well as AppDynamics and Internet of Things software. The cybersecurity product category generates more than 5% of the company's revenue and includes network security, email security, identity and access, advanced threat protection, and unified exposure management products. In addition, Cisco offers consulting services. </span>\r\n\r\n<span lang=\"en\">Cisco's total revenue in fiscal 2020 was nearly $ 50 billion. The company is expanding its research and development (R&D) investments in areas such as the cloud platform, remote collaboration platform, analytics and telecommunications technologies.</span>","companyTypes":[],"products":{},"vendoredProductsCount":29,"suppliedProductsCount":29,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":7,"vendorImplementationsCount":42,"vendorPartnersCount":0,"supplierPartnersCount":125,"b4r":0,"categories":{},"companyUrl":"https://www.cisco.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Cisco","keywords":"Index, networking, Cisco, company, Russell, 1000, June, Average","description":"<span lang=\"en\">Cisco Systems is a global manufacturer of network equipment: routers, switches and servers, as well as software for data transmission on the Internet and corporate networks. The company was founded in 1984 in San Jose (California, USA). Today, ","og:title":"Cisco","og:description":"<span lang=\"en\">Cisco Systems is a global manufacturer of network equipment: routers, switches and servers, as well as software for data transmission on the Internet and corporate networks. The company was founded in 1984 in San Jose (California, USA). Today, ","og:image":"https://old.roi4cio.com/uploads/roi/company/Cisco_logo.png"},"eventUrl":""}],"products":[{"id":443,"logo":false,"scheme":false,"title":"Cisco Unified Communications","vendorVerified":0,"rating":"2.40","implementationsCount":4,"suppliersCount":0,"alias":"cisco-unified-communications","companyTypes":[],"description":"Call Control\r\nUnified communications call-control platforms deliver the right experience to the right endpoint.\r\nCommunications Gateways\r\nFlexible platforms provide unified communications services for all types of gateway and session-border-control deployments.\r\nApplications and Telephony Extensions\r\nStay connected and productive with messaging, presence, and application integration. Add-ons extend core functionality to meet specific needs.\r\nCombine collaboration tools into a single solution to help your employees, customers, suppliers, and partners communicate quickly and easily.\r\n<span style=\"font-weight: bold; font-style: italic;\">Use Cisco Unified Communications to connect teams and information, and help enable comprehensive and effective collaborative experiences. Your organization can:</span>\r\nConnect co-workers, partners, vendors, and customers with the information and expertise they need\r\nAccess and share video on the desktop, on mobile devices, and on demand, as easily as making a phone call\r\nFacilitate better team interactions, dynamically bringing together individuals, virtual workgroups, and teams\r\nMake mobile devices extensions of the corporate network so workers can be productive anywhere\r\nIntegrate collaboration and communications into applications and business processes\r\nEstimate Your Savings\r\nCisco Unified Communications benefits include next-generation features and capabilities that can significantly reduce total cost of ownership (TCO). Gauge your potential savings with the Unified Communications Total Cost of Ownership Tool.","shortDescription":"Cisco® Unified Communications: Call Control, Communications Gateways, Applications and Telephony Extensions","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":19,"sellingCount":18,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Cisco Unified Communications","keywords":"Communications, Unified, with, communications, Cisco, help, information, easily","description":"Call Control\r\nUnified communications call-control platforms deliver the right experience to the right endpoint.\r\nCommunications Gateways\r\nFlexible platforms provide unified communications services for all types of gateway and session-border-control deployments","og:title":"Cisco Unified Communications","og:description":"Call Control\r\nUnified communications call-control platforms deliver the right experience to the right endpoint.\r\nCommunications Gateways\r\nFlexible platforms provide unified communications services for all types of gateway and session-border-control deployments"},"eventUrl":"","translationId":444,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":82,"title":"Unified Communications","alias":"unified-communications","description":"Unified communications (UC) is a framework for integrating various asynchronous and real-time communication tools. The goal of UC is to enhance business communication, collaboration and productivity. Unified communications do not represent a singular technology; rather, it describes a strategy for integrating interconnected systems of enterprise communication devices and applications that can be used in concert or successively.\r\nSome business communication tools - like Internet Protocol (IP) telephony and video conferencing - facilitate real-time communication, also called synchronous communication. Other enterprise communication tools, like email, facilitate asynchronous communication, which takes place at a person's convenience.\r\nIncreasingly, team collaboration tools have emerged to offer messaging-centric workflows and near-real-time communication. These tools also offer voice and video capabilities, API integrations and, ultimately, expound on instant messaging services by providing better UC features.\r\nThe goal of unified communications is to integrate the software that supports synchronous and asynchronous communication, so the end user has easy access to all tools from whatever device is in use.\r\nA unified communications environment is typically supported by one or more back-end systems, often referred to as UC platforms, that facilitate integration among services, as well as the front-end clients that provide access. For example, a web conferencing system would make use of an audio conferencing system - which, in turn, would be built on an underlying IP telephony platform - and a unified messaging client would allow click-to-talk (CTC), click-to-chat or click-to-video functionality.\r\nUC also supports users moving from one mode of communication to another within the same session. For example, a user may start communicating via email but then decide to escalate the interaction to real-time communication, transitioning the session to a voice call with one click and then to a video conference with another click without any disruption.\r\nUnified communications systems and their components can be deployed on premises, in a public or private cloud, or a combination of all three. Cloud-based unified communications is also called UC as a service (UCaaS). An open source project called WebRTC, for example, enables real-time communications to be embedded into web browsers.\r\nHistorically, single-vendor UC environments have demonstrated the tightest integration and compatibility. Interoperability among vendors remains an ongoing challenge in UC, but it has also been mitigated, in part, by partnerships, common protocols and open APIs.","materialsDescription":" <span style=\"font-weight: bold;\">What technology do unified communications have?</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Contrasting unified messaging</span></span>\r\nUnified communications are sometimes confused with unified messaging, but it is distinct. Unified communications refer to both real-time and non-real-time delivery of communications based on the preferred method and location of the recipient; unified messaging culls messages from several sources (such as e-mail, voice mail and faxes), but holds those messages only for retrieval at a later time. Unified communications allow for an individual to check and retrieve an e-mail or voice mail from any communication device at any time. It expands beyond voice mail services to data communications and video services.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Components</span></span>\r\nWith unified communications, multiple modes of business communications are integrated. Unified communications is not a single product but a collection of elements that include:\r\n<ul><li>Call control and multimodal communications</li><li>Presence</li><li>Instant messaging</li><li>Unified messaging</li><li>Speech access and personal assistant</li><li>Conferencing (audio, Web and video)</li><li>Collaboration tools</li><li>Mobility</li><li>Business process integration (BPI)</li><li>Software to enable business process integration</li></ul>\r\nPresence — knowing where intended recipients are, and if they are available, in real-time — is a key component of unified communications. Unified communications integrate all systems a user might already use, and helps those systems work together in real-time. For example, unified communications technology could allow a user to seamlessly collaborate with another person on a project, even if the two users are in separate locations. The user could quickly locate the necessary person by accessing an interactive directory, engage in a text messaging session, and then escalate the session to a voice call or even a video call.\r\nIn another example, an employee receives a call from a customer who wants answers. Unified communications enable that employee to call an expert colleague from a real-time list. This way, the employee can answer the customer faster by eliminating rounds of back-and-forth e-mails and phone-tag.\r\nThe examples in the previous paragraph primarily describe "personal productivity" enhancements that tend to benefit the individual user. While such benefits can be important, enterprises are finding that they can achieve even greater impact by using unified communications capabilities to transform business processes. This is achieved by integrating UC functionality directly into the business applications using development tools provided by many of the suppliers. Instead of the individual user invoking the UC functionality to, say, find an appropriate resource, the workflow or process application automatically identifies the resource at the point in the business activity where one is needed.\r\nWhen used in this manner, the concept of presence often changes. Most people associate presence with instant messaging (IM "buddy lists") the status of individuals is identified. But, in many business process applications, what is important is finding someone with a certain skill. In these environments, presence identifies available skills or capabilities.\r\nThis "business process" approach to integrating UC functionality can result in bottom-line benefits that are an order of magnitude greater than those achievable by personal productivity methods alone.\r\n<span style=\"font-weight: bold;\">Related concepts</span>\r\nUnified communications & collaboration (UCC) is the integration of various communications methods with collaboration tools such as virtual white boards, real-time audio and video conferencing, and enhanced call control capabilities. Before this fusion of communications and collaboration tools into a single platform, enterprise collaboration service vendors and enterprise communications service vendors offered distinctly different solutions. Now, collaboration service vendors also offer communications services, and communications service providers have developed collaboration tools.\r\nUnified communications & collaboration as a service (UCCaaS) is cloud-based UCC platforms. Compared to premises-based UCC solutions, UCCaaS platforms offer enhanced flexibility and scalability due to the SaaS subscription model.\r\nUnified communications provisioning is the act of entering and configuring the settings for users of phone systems, instant messaging, telepresence, and other collaboration channels. Provisioners refer to this process as making moves, adds, changes, and deletes or MAC-Ds.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Unified_Communications.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":6,"title":"Ensure Security and Business Continuity"},{"id":10,"title":"Ensure Compliance"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":370,"title":"No automated business processes"},{"id":373,"title":"IT infrastructure does not meet business tasks"},{"id":398,"title":"Poor communication and coordination among staff"}]}},"categories":[{"id":82,"title":"Unified Communications","alias":"unified-communications","description":"Unified communications (UC) is a framework for integrating various asynchronous and real-time communication tools. The goal of UC is to enhance business communication, collaboration and productivity. Unified communications do not represent a singular technology; rather, it describes a strategy for integrating interconnected systems of enterprise communication devices and applications that can be used in concert or successively.\r\nSome business communication tools - like Internet Protocol (IP) telephony and video conferencing - facilitate real-time communication, also called synchronous communication. Other enterprise communication tools, like email, facilitate asynchronous communication, which takes place at a person's convenience.\r\nIncreasingly, team collaboration tools have emerged to offer messaging-centric workflows and near-real-time communication. These tools also offer voice and video capabilities, API integrations and, ultimately, expound on instant messaging services by providing better UC features.\r\nThe goal of unified communications is to integrate the software that supports synchronous and asynchronous communication, so the end user has easy access to all tools from whatever device is in use.\r\nA unified communications environment is typically supported by one or more back-end systems, often referred to as UC platforms, that facilitate integration among services, as well as the front-end clients that provide access. For example, a web conferencing system would make use of an audio conferencing system - which, in turn, would be built on an underlying IP telephony platform - and a unified messaging client would allow click-to-talk (CTC), click-to-chat or click-to-video functionality.\r\nUC also supports users moving from one mode of communication to another within the same session. For example, a user may start communicating via email but then decide to escalate the interaction to real-time communication, transitioning the session to a voice call with one click and then to a video conference with another click without any disruption.\r\nUnified communications systems and their components can be deployed on premises, in a public or private cloud, or a combination of all three. Cloud-based unified communications is also called UC as a service (UCaaS). An open source project called WebRTC, for example, enables real-time communications to be embedded into web browsers.\r\nHistorically, single-vendor UC environments have demonstrated the tightest integration and compatibility. Interoperability among vendors remains an ongoing challenge in UC, but it has also been mitigated, in part, by partnerships, common protocols and open APIs.","materialsDescription":" <span style=\"font-weight: bold;\">What technology do unified communications have?</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Contrasting unified messaging</span></span>\r\nUnified communications are sometimes confused with unified messaging, but it is distinct. Unified communications refer to both real-time and non-real-time delivery of communications based on the preferred method and location of the recipient; unified messaging culls messages from several sources (such as e-mail, voice mail and faxes), but holds those messages only for retrieval at a later time. Unified communications allow for an individual to check and retrieve an e-mail or voice mail from any communication device at any time. It expands beyond voice mail services to data communications and video services.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Components</span></span>\r\nWith unified communications, multiple modes of business communications are integrated. Unified communications is not a single product but a collection of elements that include:\r\n<ul><li>Call control and multimodal communications</li><li>Presence</li><li>Instant messaging</li><li>Unified messaging</li><li>Speech access and personal assistant</li><li>Conferencing (audio, Web and video)</li><li>Collaboration tools</li><li>Mobility</li><li>Business process integration (BPI)</li><li>Software to enable business process integration</li></ul>\r\nPresence — knowing where intended recipients are, and if they are available, in real-time — is a key component of unified communications. Unified communications integrate all systems a user might already use, and helps those systems work together in real-time. For example, unified communications technology could allow a user to seamlessly collaborate with another person on a project, even if the two users are in separate locations. The user could quickly locate the necessary person by accessing an interactive directory, engage in a text messaging session, and then escalate the session to a voice call or even a video call.\r\nIn another example, an employee receives a call from a customer who wants answers. Unified communications enable that employee to call an expert colleague from a real-time list. This way, the employee can answer the customer faster by eliminating rounds of back-and-forth e-mails and phone-tag.\r\nThe examples in the previous paragraph primarily describe "personal productivity" enhancements that tend to benefit the individual user. While such benefits can be important, enterprises are finding that they can achieve even greater impact by using unified communications capabilities to transform business processes. This is achieved by integrating UC functionality directly into the business applications using development tools provided by many of the suppliers. Instead of the individual user invoking the UC functionality to, say, find an appropriate resource, the workflow or process application automatically identifies the resource at the point in the business activity where one is needed.\r\nWhen used in this manner, the concept of presence often changes. Most people associate presence with instant messaging (IM "buddy lists") the status of individuals is identified. But, in many business process applications, what is important is finding someone with a certain skill. In these environments, presence identifies available skills or capabilities.\r\nThis "business process" approach to integrating UC functionality can result in bottom-line benefits that are an order of magnitude greater than those achievable by personal productivity methods alone.\r\n<span style=\"font-weight: bold;\">Related concepts</span>\r\nUnified communications & collaboration (UCC) is the integration of various communications methods with collaboration tools such as virtual white boards, real-time audio and video conferencing, and enhanced call control capabilities. Before this fusion of communications and collaboration tools into a single platform, enterprise collaboration service vendors and enterprise communications service vendors offered distinctly different solutions. Now, collaboration service vendors also offer communications services, and communications service providers have developed collaboration tools.\r\nUnified communications & collaboration as a service (UCCaaS) is cloud-based UCC platforms. Compared to premises-based UCC solutions, UCCaaS platforms offer enhanced flexibility and scalability due to the SaaS subscription model.\r\nUnified communications provisioning is the act of entering and configuring the settings for users of phone systems, instant messaging, telepresence, and other collaboration channels. Provisioners refer to this process as making moves, adds, changes, and deletes or MAC-Ds.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Unified_Communications.png"}],"additionalInfo":{"budgetNotExceeded":"-1","functionallyTaskAssignment":"-1","projectWasPut":"-1","price":0,"source":{"url":"https://www.verna.ua/projects/seti-i-telekommunikatsii/item/410-vnedrenie-sistemy-videokonferentssvyazi-v-banke","title":"Supplier's web site"}},"comments":[],"referencesCount":0},{"id":79,"title":"Cisco Unified Communications for Design Bureau","description":"Description is not ready yet","alias":"cisco-unified-communications-for-design-bureau","roi":0,"seo":{"title":"Cisco Unified Communications for Design Bureau","keywords":"","description":"Description is not ready yet","og:title":"Cisco Unified Communications for Design Bureau","og:description":"Description is not ready yet"},"deal_info":"","user":{},"supplier":{},"vendors":[{"id":170,"title":"Cisco","logoURL":"https://old.roi4cio.com/uploads/roi/company/Cisco_logo.png","alias":"cisco","address":"","roles":[],"description":"<span lang=\"en\">Cisco Systems is a global manufacturer of network equipment: routers, switches and servers, as well as software for data transmission on the Internet and corporate networks. The company was founded in 1984 in San Jose (California, USA). Today, Cisco dominates the Internet Protocol (IP) -based network equipment segment, and also manufactures cybersecurity, video conferencing systems, and other network equipment and software. In addition, Cisco offers a number of cloud services. Cisco's primary customers are large enterprises and telecommunications service providers, but the company also sells products aimed at small businesses and the public sector. </span>\r\n\r\n<span lang=\"en\">Cisco offers products and services in four categories. The company's infrastructure platforms generate more than half of its revenue. This includes switching devices, routing devices, wireless communications, and data processing solutions. Applications that account for over 10% of revenue are primarily software related to networking and data processing platforms. </span>\r\n\r\n<span lang=\"en\">Applications include collaboration tools (unified communications, Cisco TelePresence video conferencing) as well as AppDynamics and Internet of Things software. The cybersecurity product category generates more than 5% of the company's revenue and includes network security, email security, identity and access, advanced threat protection, and unified exposure management products. In addition, Cisco offers consulting services. </span>\r\n\r\n<span lang=\"en\">Cisco's total revenue in fiscal 2020 was nearly $ 50 billion. The company is expanding its research and development (R&D) investments in areas such as the cloud platform, remote collaboration platform, analytics and telecommunications technologies.</span>","companyTypes":[],"products":{},"vendoredProductsCount":29,"suppliedProductsCount":29,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":7,"vendorImplementationsCount":42,"vendorPartnersCount":0,"supplierPartnersCount":125,"b4r":0,"categories":{},"companyUrl":"https://www.cisco.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Cisco","keywords":"Index, networking, Cisco, company, Russell, 1000, June, Average","description":"<span lang=\"en\">Cisco Systems is a global manufacturer of network equipment: routers, switches and servers, as well as software for data transmission on the Internet and corporate networks. The company was founded in 1984 in San Jose (California, USA). Today, ","og:title":"Cisco","og:description":"<span lang=\"en\">Cisco Systems is a global manufacturer of network equipment: routers, switches and servers, as well as software for data transmission on the Internet and corporate networks. The company was founded in 1984 in San Jose (California, USA). Today, ","og:image":"https://old.roi4cio.com/uploads/roi/company/Cisco_logo.png"},"eventUrl":""}],"products":[{"id":443,"logo":false,"scheme":false,"title":"Cisco Unified Communications","vendorVerified":0,"rating":"2.40","implementationsCount":4,"suppliersCount":0,"alias":"cisco-unified-communications","companyTypes":[],"description":"Call Control\r\nUnified communications call-control platforms deliver the right experience to the right endpoint.\r\nCommunications Gateways\r\nFlexible platforms provide unified communications services for all types of gateway and session-border-control deployments.\r\nApplications and Telephony Extensions\r\nStay connected and productive with messaging, presence, and application integration. Add-ons extend core functionality to meet specific needs.\r\nCombine collaboration tools into a single solution to help your employees, customers, suppliers, and partners communicate quickly and easily.\r\n<span style=\"font-weight: bold; font-style: italic;\">Use Cisco Unified Communications to connect teams and information, and help enable comprehensive and effective collaborative experiences. Your organization can:</span>\r\nConnect co-workers, partners, vendors, and customers with the information and expertise they need\r\nAccess and share video on the desktop, on mobile devices, and on demand, as easily as making a phone call\r\nFacilitate better team interactions, dynamically bringing together individuals, virtual workgroups, and teams\r\nMake mobile devices extensions of the corporate network so workers can be productive anywhere\r\nIntegrate collaboration and communications into applications and business processes\r\nEstimate Your Savings\r\nCisco Unified Communications benefits include next-generation features and capabilities that can significantly reduce total cost of ownership (TCO). Gauge your potential savings with the Unified Communications Total Cost of Ownership Tool.","shortDescription":"Cisco® Unified Communications: Call Control, Communications Gateways, Applications and Telephony Extensions","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":19,"sellingCount":18,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Cisco Unified Communications","keywords":"Communications, Unified, with, communications, Cisco, help, information, easily","description":"Call Control\r\nUnified communications call-control platforms deliver the right experience to the right endpoint.\r\nCommunications Gateways\r\nFlexible platforms provide unified communications services for all types of gateway and session-border-control deployments","og:title":"Cisco Unified Communications","og:description":"Call Control\r\nUnified communications call-control platforms deliver the right experience to the right endpoint.\r\nCommunications Gateways\r\nFlexible platforms provide unified communications services for all types of gateway and session-border-control deployments"},"eventUrl":"","translationId":444,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":82,"title":"Unified Communications","alias":"unified-communications","description":"Unified communications (UC) is a framework for integrating various asynchronous and real-time communication tools. The goal of UC is to enhance business communication, collaboration and productivity. Unified communications do not represent a singular technology; rather, it describes a strategy for integrating interconnected systems of enterprise communication devices and applications that can be used in concert or successively.\r\nSome business communication tools - like Internet Protocol (IP) telephony and video conferencing - facilitate real-time communication, also called synchronous communication. Other enterprise communication tools, like email, facilitate asynchronous communication, which takes place at a person's convenience.\r\nIncreasingly, team collaboration tools have emerged to offer messaging-centric workflows and near-real-time communication. These tools also offer voice and video capabilities, API integrations and, ultimately, expound on instant messaging services by providing better UC features.\r\nThe goal of unified communications is to integrate the software that supports synchronous and asynchronous communication, so the end user has easy access to all tools from whatever device is in use.\r\nA unified communications environment is typically supported by one or more back-end systems, often referred to as UC platforms, that facilitate integration among services, as well as the front-end clients that provide access. For example, a web conferencing system would make use of an audio conferencing system - which, in turn, would be built on an underlying IP telephony platform - and a unified messaging client would allow click-to-talk (CTC), click-to-chat or click-to-video functionality.\r\nUC also supports users moving from one mode of communication to another within the same session. For example, a user may start communicating via email but then decide to escalate the interaction to real-time communication, transitioning the session to a voice call with one click and then to a video conference with another click without any disruption.\r\nUnified communications systems and their components can be deployed on premises, in a public or private cloud, or a combination of all three. Cloud-based unified communications is also called UC as a service (UCaaS). An open source project called WebRTC, for example, enables real-time communications to be embedded into web browsers.\r\nHistorically, single-vendor UC environments have demonstrated the tightest integration and compatibility. Interoperability among vendors remains an ongoing challenge in UC, but it has also been mitigated, in part, by partnerships, common protocols and open APIs.","materialsDescription":" <span style=\"font-weight: bold;\">What technology do unified communications have?</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Contrasting unified messaging</span></span>\r\nUnified communications are sometimes confused with unified messaging, but it is distinct. Unified communications refer to both real-time and non-real-time delivery of communications based on the preferred method and location of the recipient; unified messaging culls messages from several sources (such as e-mail, voice mail and faxes), but holds those messages only for retrieval at a later time. Unified communications allow for an individual to check and retrieve an e-mail or voice mail from any communication device at any time. It expands beyond voice mail services to data communications and video services.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Components</span></span>\r\nWith unified communications, multiple modes of business communications are integrated. Unified communications is not a single product but a collection of elements that include:\r\n<ul><li>Call control and multimodal communications</li><li>Presence</li><li>Instant messaging</li><li>Unified messaging</li><li>Speech access and personal assistant</li><li>Conferencing (audio, Web and video)</li><li>Collaboration tools</li><li>Mobility</li><li>Business process integration (BPI)</li><li>Software to enable business process integration</li></ul>\r\nPresence — knowing where intended recipients are, and if they are available, in real-time — is a key component of unified communications. Unified communications integrate all systems a user might already use, and helps those systems work together in real-time. For example, unified communications technology could allow a user to seamlessly collaborate with another person on a project, even if the two users are in separate locations. The user could quickly locate the necessary person by accessing an interactive directory, engage in a text messaging session, and then escalate the session to a voice call or even a video call.\r\nIn another example, an employee receives a call from a customer who wants answers. Unified communications enable that employee to call an expert colleague from a real-time list. This way, the employee can answer the customer faster by eliminating rounds of back-and-forth e-mails and phone-tag.\r\nThe examples in the previous paragraph primarily describe "personal productivity" enhancements that tend to benefit the individual user. While such benefits can be important, enterprises are finding that they can achieve even greater impact by using unified communications capabilities to transform business processes. This is achieved by integrating UC functionality directly into the business applications using development tools provided by many of the suppliers. Instead of the individual user invoking the UC functionality to, say, find an appropriate resource, the workflow or process application automatically identifies the resource at the point in the business activity where one is needed.\r\nWhen used in this manner, the concept of presence often changes. Most people associate presence with instant messaging (IM "buddy lists") the status of individuals is identified. But, in many business process applications, what is important is finding someone with a certain skill. In these environments, presence identifies available skills or capabilities.\r\nThis "business process" approach to integrating UC functionality can result in bottom-line benefits that are an order of magnitude greater than those achievable by personal productivity methods alone.\r\n<span style=\"font-weight: bold;\">Related concepts</span>\r\nUnified communications & collaboration (UCC) is the integration of various communications methods with collaboration tools such as virtual white boards, real-time audio and video conferencing, and enhanced call control capabilities. Before this fusion of communications and collaboration tools into a single platform, enterprise collaboration service vendors and enterprise communications service vendors offered distinctly different solutions. Now, collaboration service vendors also offer communications services, and communications service providers have developed collaboration tools.\r\nUnified communications & collaboration as a service (UCCaaS) is cloud-based UCC platforms. Compared to premises-based UCC solutions, UCCaaS platforms offer enhanced flexibility and scalability due to the SaaS subscription model.\r\nUnified communications provisioning is the act of entering and configuring the settings for users of phone systems, instant messaging, telepresence, and other collaboration channels. Provisioners refer to this process as making moves, adds, changes, and deletes or MAC-Ds.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Unified_Communications.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":180,"title":"Russia","name":"RUS"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":9,"title":"Support Decision Making"}]}},"categories":[{"id":82,"title":"Unified Communications","alias":"unified-communications","description":"Unified communications (UC) is a framework for integrating various asynchronous and real-time communication tools. The goal of UC is to enhance business communication, collaboration and productivity. Unified communications do not represent a singular technology; rather, it describes a strategy for integrating interconnected systems of enterprise communication devices and applications that can be used in concert or successively.\r\nSome business communication tools - like Internet Protocol (IP) telephony and video conferencing - facilitate real-time communication, also called synchronous communication. Other enterprise communication tools, like email, facilitate asynchronous communication, which takes place at a person's convenience.\r\nIncreasingly, team collaboration tools have emerged to offer messaging-centric workflows and near-real-time communication. These tools also offer voice and video capabilities, API integrations and, ultimately, expound on instant messaging services by providing better UC features.\r\nThe goal of unified communications is to integrate the software that supports synchronous and asynchronous communication, so the end user has easy access to all tools from whatever device is in use.\r\nA unified communications environment is typically supported by one or more back-end systems, often referred to as UC platforms, that facilitate integration among services, as well as the front-end clients that provide access. For example, a web conferencing system would make use of an audio conferencing system - which, in turn, would be built on an underlying IP telephony platform - and a unified messaging client would allow click-to-talk (CTC), click-to-chat or click-to-video functionality.\r\nUC also supports users moving from one mode of communication to another within the same session. For example, a user may start communicating via email but then decide to escalate the interaction to real-time communication, transitioning the session to a voice call with one click and then to a video conference with another click without any disruption.\r\nUnified communications systems and their components can be deployed on premises, in a public or private cloud, or a combination of all three. Cloud-based unified communications is also called UC as a service (UCaaS). An open source project called WebRTC, for example, enables real-time communications to be embedded into web browsers.\r\nHistorically, single-vendor UC environments have demonstrated the tightest integration and compatibility. Interoperability among vendors remains an ongoing challenge in UC, but it has also been mitigated, in part, by partnerships, common protocols and open APIs.","materialsDescription":" <span style=\"font-weight: bold;\">What technology do unified communications have?</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Contrasting unified messaging</span></span>\r\nUnified communications are sometimes confused with unified messaging, but it is distinct. Unified communications refer to both real-time and non-real-time delivery of communications based on the preferred method and location of the recipient; unified messaging culls messages from several sources (such as e-mail, voice mail and faxes), but holds those messages only for retrieval at a later time. Unified communications allow for an individual to check and retrieve an e-mail or voice mail from any communication device at any time. It expands beyond voice mail services to data communications and video services.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Components</span></span>\r\nWith unified communications, multiple modes of business communications are integrated. Unified communications is not a single product but a collection of elements that include:\r\n<ul><li>Call control and multimodal communications</li><li>Presence</li><li>Instant messaging</li><li>Unified messaging</li><li>Speech access and personal assistant</li><li>Conferencing (audio, Web and video)</li><li>Collaboration tools</li><li>Mobility</li><li>Business process integration (BPI)</li><li>Software to enable business process integration</li></ul>\r\nPresence — knowing where intended recipients are, and if they are available, in real-time — is a key component of unified communications. Unified communications integrate all systems a user might already use, and helps those systems work together in real-time. For example, unified communications technology could allow a user to seamlessly collaborate with another person on a project, even if the two users are in separate locations. The user could quickly locate the necessary person by accessing an interactive directory, engage in a text messaging session, and then escalate the session to a voice call or even a video call.\r\nIn another example, an employee receives a call from a customer who wants answers. Unified communications enable that employee to call an expert colleague from a real-time list. This way, the employee can answer the customer faster by eliminating rounds of back-and-forth e-mails and phone-tag.\r\nThe examples in the previous paragraph primarily describe "personal productivity" enhancements that tend to benefit the individual user. While such benefits can be important, enterprises are finding that they can achieve even greater impact by using unified communications capabilities to transform business processes. This is achieved by integrating UC functionality directly into the business applications using development tools provided by many of the suppliers. Instead of the individual user invoking the UC functionality to, say, find an appropriate resource, the workflow or process application automatically identifies the resource at the point in the business activity where one is needed.\r\nWhen used in this manner, the concept of presence often changes. Most people associate presence with instant messaging (IM "buddy lists") the status of individuals is identified. But, in many business process applications, what is important is finding someone with a certain skill. In these environments, presence identifies available skills or capabilities.\r\nThis "business process" approach to integrating UC functionality can result in bottom-line benefits that are an order of magnitude greater than those achievable by personal productivity methods alone.\r\n<span style=\"font-weight: bold;\">Related concepts</span>\r\nUnified communications & collaboration (UCC) is the integration of various communications methods with collaboration tools such as virtual white boards, real-time audio and video conferencing, and enhanced call control capabilities. Before this fusion of communications and collaboration tools into a single platform, enterprise collaboration service vendors and enterprise communications service vendors offered distinctly different solutions. Now, collaboration service vendors also offer communications services, and communications service providers have developed collaboration tools.\r\nUnified communications & collaboration as a service (UCCaaS) is cloud-based UCC platforms. Compared to premises-based UCC solutions, UCCaaS platforms offer enhanced flexibility and scalability due to the SaaS subscription model.\r\nUnified communications provisioning is the act of entering and configuring the settings for users of phone systems, instant messaging, telepresence, and other collaboration channels. Provisioners refer to this process as making moves, adds, changes, and deletes or MAC-Ds.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Unified_Communications.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"http://www.cisco.com/c/ru_ru/about/press/press-releases/2014/11-111114a.html","title":"Supplier's web site"}},"comments":[],"referencesCount":0},{"id":907,"title":"Cisco Unified Communications Manager 9.X. for Ukrainian pharmaceutical company","description":"Description is not ready yet","alias":"cisco-unified-communications-manager-9x-for-ukrainian-pharmaceutical-company","roi":0,"seo":{"title":"Cisco Unified Communications Manager 9.X. for Ukrainian pharmaceutical company","keywords":"","description":"Description is not ready yet","og:title":"Cisco Unified Communications Manager 9.X. for Ukrainian pharmaceutical company","og:description":"Description is not ready yet"},"deal_info":"","user":{"id":592,"title":"Farmak","logoURL":"https://old.roi4cio.com/uploads/roi/company/Farmak.gif","alias":"farmak","address":"","roles":[],"description":" Quality and innovation allowed Farmak JSC to be the leader of the pharmaceutical market of Ukraine since 2010 (Sales of medicinal products in monetary terms, according to Proxima Research data in 2016) and being the largest exporter of medicine.\r\nFarmak has 20 production lines with national GMP certification. 14 production lines are certified by the European regulatory authorities. The pharmaceutical quality system has been introduced and is constantly being improved according to current GMP requirements and ISO 9001, ISO 13485, ISO22000 standards. Annually the company passes approximately 15 national and international inspections and audits.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://farmak.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Farmak","keywords":"Фармак, наименований, фармацевтических, лекарственных, около, виде, таблеток, выпускает","description":" Quality and innovation allowed Farmak JSC to be the leader of the pharmaceutical market of Ukraine since 2010 (Sales of medicinal products in monetary terms, according to Proxima Research data in 2016) and being the largest exporter of medicine.\r\nFarmak has 2","og:title":"Farmak","og:description":" Quality and innovation allowed Farmak JSC to be the leader of the pharmaceutical market of Ukraine since 2010 (Sales of medicinal products in monetary terms, according to Proxima Research data in 2016) and being the largest exporter of medicine.\r\nFarmak has 2","og:image":"https://old.roi4cio.com/uploads/roi/company/Farmak.gif"},"eventUrl":""},"supplier":{"id":246,"title":"SI BIS","logoURL":"https://old.roi4cio.com/uploads/roi/company/sibis-logo.png","alias":"si-bis","address":"г. Киев, 04073, ул. Рылеева, 10-А +38 (044) 499-12-12","roles":[],"description":"SI BIS Company specializes in implementing complex projects for the creation of modern communications infrastructure, based on the principles of integration of IT and business solutions. The company was founded in 2003 and has more than 12 years a reliable IT partner for more than 400 Ukrainian companies.\r\n\r\nSI BIS has a high competence in the promotion of integrated IBM solutions, Cisco and the Microsoft, is a recognized leader in the provision of services and technical support, implementing complex consulting projects and provides a wide range of services to optimize the information and business processes for organizations.\r\n\r\nUsing industry experience and global best practices, deep technological expertise, a balanced portfolio of solutions and predictive model of service and technical support, the company SI BIS helps customers to simplify and rationalize the management of their business.","companyTypes":[],"products":{},"vendoredProductsCount":6,"suppliedProductsCount":203,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":42,"vendorImplementationsCount":16,"vendorPartnersCount":9,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://sibis.com.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"SI BIS","keywords":"solutions, business, technical, services, support, than, more, company","description":"SI BIS Company specializes in implementing complex projects for the creation of modern communications infrastructure, based on the principles of integration of IT and business solutions. The company was founded in 2003 and has more than 12 years a reliable IT ","og:title":"SI BIS","og:description":"SI BIS Company specializes in implementing complex projects for the creation of modern communications infrastructure, based on the principles of integration of IT and business solutions. The company was founded in 2003 and has more than 12 years a reliable IT ","og:image":"https://old.roi4cio.com/uploads/roi/company/sibis-logo.png"},"eventUrl":""},"vendors":[{"id":170,"title":"Cisco","logoURL":"https://old.roi4cio.com/uploads/roi/company/Cisco_logo.png","alias":"cisco","address":"","roles":[],"description":"<span lang=\"en\">Cisco Systems is a global manufacturer of network equipment: routers, switches and servers, as well as software for data transmission on the Internet and corporate networks. The company was founded in 1984 in San Jose (California, USA). Today, Cisco dominates the Internet Protocol (IP) -based network equipment segment, and also manufactures cybersecurity, video conferencing systems, and other network equipment and software. In addition, Cisco offers a number of cloud services. Cisco's primary customers are large enterprises and telecommunications service providers, but the company also sells products aimed at small businesses and the public sector. </span>\r\n\r\n<span lang=\"en\">Cisco offers products and services in four categories. The company's infrastructure platforms generate more than half of its revenue. This includes switching devices, routing devices, wireless communications, and data processing solutions. Applications that account for over 10% of revenue are primarily software related to networking and data processing platforms. </span>\r\n\r\n<span lang=\"en\">Applications include collaboration tools (unified communications, Cisco TelePresence video conferencing) as well as AppDynamics and Internet of Things software. The cybersecurity product category generates more than 5% of the company's revenue and includes network security, email security, identity and access, advanced threat protection, and unified exposure management products. In addition, Cisco offers consulting services. </span>\r\n\r\n<span lang=\"en\">Cisco's total revenue in fiscal 2020 was nearly $ 50 billion. The company is expanding its research and development (R&D) investments in areas such as the cloud platform, remote collaboration platform, analytics and telecommunications technologies.</span>","companyTypes":[],"products":{},"vendoredProductsCount":29,"suppliedProductsCount":29,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":7,"vendorImplementationsCount":42,"vendorPartnersCount":0,"supplierPartnersCount":125,"b4r":0,"categories":{},"companyUrl":"https://www.cisco.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Cisco","keywords":"Index, networking, Cisco, company, Russell, 1000, June, Average","description":"<span lang=\"en\">Cisco Systems is a global manufacturer of network equipment: routers, switches and servers, as well as software for data transmission on the Internet and corporate networks. The company was founded in 1984 in San Jose (California, USA). Today, ","og:title":"Cisco","og:description":"<span lang=\"en\">Cisco Systems is a global manufacturer of network equipment: routers, switches and servers, as well as software for data transmission on the Internet and corporate networks. The company was founded in 1984 in San Jose (California, USA). Today, ","og:image":"https://old.roi4cio.com/uploads/roi/company/Cisco_logo.png"},"eventUrl":""}],"products":[{"id":443,"logo":false,"scheme":false,"title":"Cisco Unified Communications","vendorVerified":0,"rating":"2.40","implementationsCount":4,"suppliersCount":0,"alias":"cisco-unified-communications","companyTypes":[],"description":"Call Control\r\nUnified communications call-control platforms deliver the right experience to the right endpoint.\r\nCommunications Gateways\r\nFlexible platforms provide unified communications services for all types of gateway and session-border-control deployments.\r\nApplications and Telephony Extensions\r\nStay connected and productive with messaging, presence, and application integration. Add-ons extend core functionality to meet specific needs.\r\nCombine collaboration tools into a single solution to help your employees, customers, suppliers, and partners communicate quickly and easily.\r\n<span style=\"font-weight: bold; font-style: italic;\">Use Cisco Unified Communications to connect teams and information, and help enable comprehensive and effective collaborative experiences. Your organization can:</span>\r\nConnect co-workers, partners, vendors, and customers with the information and expertise they need\r\nAccess and share video on the desktop, on mobile devices, and on demand, as easily as making a phone call\r\nFacilitate better team interactions, dynamically bringing together individuals, virtual workgroups, and teams\r\nMake mobile devices extensions of the corporate network so workers can be productive anywhere\r\nIntegrate collaboration and communications into applications and business processes\r\nEstimate Your Savings\r\nCisco Unified Communications benefits include next-generation features and capabilities that can significantly reduce total cost of ownership (TCO). Gauge your potential savings with the Unified Communications Total Cost of Ownership Tool.","shortDescription":"Cisco® Unified Communications: Call Control, Communications Gateways, Applications and Telephony Extensions","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":19,"sellingCount":18,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Cisco Unified Communications","keywords":"Communications, Unified, with, communications, Cisco, help, information, easily","description":"Call Control\r\nUnified communications call-control platforms deliver the right experience to the right endpoint.\r\nCommunications Gateways\r\nFlexible platforms provide unified communications services for all types of gateway and session-border-control deployments","og:title":"Cisco Unified Communications","og:description":"Call Control\r\nUnified communications call-control platforms deliver the right experience to the right endpoint.\r\nCommunications Gateways\r\nFlexible platforms provide unified communications services for all types of gateway and session-border-control deployments"},"eventUrl":"","translationId":444,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":82,"title":"Unified Communications","alias":"unified-communications","description":"Unified communications (UC) is a framework for integrating various asynchronous and real-time communication tools. The goal of UC is to enhance business communication, collaboration and productivity. Unified communications do not represent a singular technology; rather, it describes a strategy for integrating interconnected systems of enterprise communication devices and applications that can be used in concert or successively.\r\nSome business communication tools - like Internet Protocol (IP) telephony and video conferencing - facilitate real-time communication, also called synchronous communication. Other enterprise communication tools, like email, facilitate asynchronous communication, which takes place at a person's convenience.\r\nIncreasingly, team collaboration tools have emerged to offer messaging-centric workflows and near-real-time communication. These tools also offer voice and video capabilities, API integrations and, ultimately, expound on instant messaging services by providing better UC features.\r\nThe goal of unified communications is to integrate the software that supports synchronous and asynchronous communication, so the end user has easy access to all tools from whatever device is in use.\r\nA unified communications environment is typically supported by one or more back-end systems, often referred to as UC platforms, that facilitate integration among services, as well as the front-end clients that provide access. For example, a web conferencing system would make use of an audio conferencing system - which, in turn, would be built on an underlying IP telephony platform - and a unified messaging client would allow click-to-talk (CTC), click-to-chat or click-to-video functionality.\r\nUC also supports users moving from one mode of communication to another within the same session. For example, a user may start communicating via email but then decide to escalate the interaction to real-time communication, transitioning the session to a voice call with one click and then to a video conference with another click without any disruption.\r\nUnified communications systems and their components can be deployed on premises, in a public or private cloud, or a combination of all three. Cloud-based unified communications is also called UC as a service (UCaaS). An open source project called WebRTC, for example, enables real-time communications to be embedded into web browsers.\r\nHistorically, single-vendor UC environments have demonstrated the tightest integration and compatibility. Interoperability among vendors remains an ongoing challenge in UC, but it has also been mitigated, in part, by partnerships, common protocols and open APIs.","materialsDescription":" <span style=\"font-weight: bold;\">What technology do unified communications have?</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Contrasting unified messaging</span></span>\r\nUnified communications are sometimes confused with unified messaging, but it is distinct. Unified communications refer to both real-time and non-real-time delivery of communications based on the preferred method and location of the recipient; unified messaging culls messages from several sources (such as e-mail, voice mail and faxes), but holds those messages only for retrieval at a later time. Unified communications allow for an individual to check and retrieve an e-mail or voice mail from any communication device at any time. It expands beyond voice mail services to data communications and video services.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Components</span></span>\r\nWith unified communications, multiple modes of business communications are integrated. Unified communications is not a single product but a collection of elements that include:\r\n<ul><li>Call control and multimodal communications</li><li>Presence</li><li>Instant messaging</li><li>Unified messaging</li><li>Speech access and personal assistant</li><li>Conferencing (audio, Web and video)</li><li>Collaboration tools</li><li>Mobility</li><li>Business process integration (BPI)</li><li>Software to enable business process integration</li></ul>\r\nPresence — knowing where intended recipients are, and if they are available, in real-time — is a key component of unified communications. Unified communications integrate all systems a user might already use, and helps those systems work together in real-time. For example, unified communications technology could allow a user to seamlessly collaborate with another person on a project, even if the two users are in separate locations. The user could quickly locate the necessary person by accessing an interactive directory, engage in a text messaging session, and then escalate the session to a voice call or even a video call.\r\nIn another example, an employee receives a call from a customer who wants answers. Unified communications enable that employee to call an expert colleague from a real-time list. This way, the employee can answer the customer faster by eliminating rounds of back-and-forth e-mails and phone-tag.\r\nThe examples in the previous paragraph primarily describe "personal productivity" enhancements that tend to benefit the individual user. While such benefits can be important, enterprises are finding that they can achieve even greater impact by using unified communications capabilities to transform business processes. This is achieved by integrating UC functionality directly into the business applications using development tools provided by many of the suppliers. Instead of the individual user invoking the UC functionality to, say, find an appropriate resource, the workflow or process application automatically identifies the resource at the point in the business activity where one is needed.\r\nWhen used in this manner, the concept of presence often changes. Most people associate presence with instant messaging (IM "buddy lists") the status of individuals is identified. But, in many business process applications, what is important is finding someone with a certain skill. In these environments, presence identifies available skills or capabilities.\r\nThis "business process" approach to integrating UC functionality can result in bottom-line benefits that are an order of magnitude greater than those achievable by personal productivity methods alone.\r\n<span style=\"font-weight: bold;\">Related concepts</span>\r\nUnified communications & collaboration (UCC) is the integration of various communications methods with collaboration tools such as virtual white boards, real-time audio and video conferencing, and enhanced call control capabilities. Before this fusion of communications and collaboration tools into a single platform, enterprise collaboration service vendors and enterprise communications service vendors offered distinctly different solutions. Now, collaboration service vendors also offer communications services, and communications service providers have developed collaboration tools.\r\nUnified communications & collaboration as a service (UCCaaS) is cloud-based UCC platforms. Compared to premises-based UCC solutions, UCCaaS platforms offer enhanced flexibility and scalability due to the SaaS subscription model.\r\nUnified communications provisioning is the act of entering and configuring the settings for users of phone systems, instant messaging, telepresence, and other collaboration channels. Provisioners refer to this process as making moves, adds, changes, and deletes or MAC-Ds.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Unified_Communications.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":7,"title":"Improve Customer Service"},{"id":10,"title":"Ensure Compliance"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":340,"title":"Low quality of customer service"},{"id":348,"title":"No centralized control over IT systems"},{"id":354,"title":"Low bandwidth data channels"},{"id":378,"title":"Low employee productivity"},{"id":398,"title":"Poor communication and coordination among staff"}]}},"categories":[{"id":82,"title":"Unified Communications","alias":"unified-communications","description":"Unified communications (UC) is a framework for integrating various asynchronous and real-time communication tools. The goal of UC is to enhance business communication, collaboration and productivity. Unified communications do not represent a singular technology; rather, it describes a strategy for integrating interconnected systems of enterprise communication devices and applications that can be used in concert or successively.\r\nSome business communication tools - like Internet Protocol (IP) telephony and video conferencing - facilitate real-time communication, also called synchronous communication. Other enterprise communication tools, like email, facilitate asynchronous communication, which takes place at a person's convenience.\r\nIncreasingly, team collaboration tools have emerged to offer messaging-centric workflows and near-real-time communication. These tools also offer voice and video capabilities, API integrations and, ultimately, expound on instant messaging services by providing better UC features.\r\nThe goal of unified communications is to integrate the software that supports synchronous and asynchronous communication, so the end user has easy access to all tools from whatever device is in use.\r\nA unified communications environment is typically supported by one or more back-end systems, often referred to as UC platforms, that facilitate integration among services, as well as the front-end clients that provide access. For example, a web conferencing system would make use of an audio conferencing system - which, in turn, would be built on an underlying IP telephony platform - and a unified messaging client would allow click-to-talk (CTC), click-to-chat or click-to-video functionality.\r\nUC also supports users moving from one mode of communication to another within the same session. For example, a user may start communicating via email but then decide to escalate the interaction to real-time communication, transitioning the session to a voice call with one click and then to a video conference with another click without any disruption.\r\nUnified communications systems and their components can be deployed on premises, in a public or private cloud, or a combination of all three. Cloud-based unified communications is also called UC as a service (UCaaS). An open source project called WebRTC, for example, enables real-time communications to be embedded into web browsers.\r\nHistorically, single-vendor UC environments have demonstrated the tightest integration and compatibility. Interoperability among vendors remains an ongoing challenge in UC, but it has also been mitigated, in part, by partnerships, common protocols and open APIs.","materialsDescription":" <span style=\"font-weight: bold;\">What technology do unified communications have?</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Contrasting unified messaging</span></span>\r\nUnified communications are sometimes confused with unified messaging, but it is distinct. Unified communications refer to both real-time and non-real-time delivery of communications based on the preferred method and location of the recipient; unified messaging culls messages from several sources (such as e-mail, voice mail and faxes), but holds those messages only for retrieval at a later time. Unified communications allow for an individual to check and retrieve an e-mail or voice mail from any communication device at any time. It expands beyond voice mail services to data communications and video services.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Components</span></span>\r\nWith unified communications, multiple modes of business communications are integrated. Unified communications is not a single product but a collection of elements that include:\r\n<ul><li>Call control and multimodal communications</li><li>Presence</li><li>Instant messaging</li><li>Unified messaging</li><li>Speech access and personal assistant</li><li>Conferencing (audio, Web and video)</li><li>Collaboration tools</li><li>Mobility</li><li>Business process integration (BPI)</li><li>Software to enable business process integration</li></ul>\r\nPresence — knowing where intended recipients are, and if they are available, in real-time — is a key component of unified communications. Unified communications integrate all systems a user might already use, and helps those systems work together in real-time. For example, unified communications technology could allow a user to seamlessly collaborate with another person on a project, even if the two users are in separate locations. The user could quickly locate the necessary person by accessing an interactive directory, engage in a text messaging session, and then escalate the session to a voice call or even a video call.\r\nIn another example, an employee receives a call from a customer who wants answers. Unified communications enable that employee to call an expert colleague from a real-time list. This way, the employee can answer the customer faster by eliminating rounds of back-and-forth e-mails and phone-tag.\r\nThe examples in the previous paragraph primarily describe "personal productivity" enhancements that tend to benefit the individual user. While such benefits can be important, enterprises are finding that they can achieve even greater impact by using unified communications capabilities to transform business processes. This is achieved by integrating UC functionality directly into the business applications using development tools provided by many of the suppliers. Instead of the individual user invoking the UC functionality to, say, find an appropriate resource, the workflow or process application automatically identifies the resource at the point in the business activity where one is needed.\r\nWhen used in this manner, the concept of presence often changes. Most people associate presence with instant messaging (IM "buddy lists") the status of individuals is identified. But, in many business process applications, what is important is finding someone with a certain skill. In these environments, presence identifies available skills or capabilities.\r\nThis "business process" approach to integrating UC functionality can result in bottom-line benefits that are an order of magnitude greater than those achievable by personal productivity methods alone.\r\n<span style=\"font-weight: bold;\">Related concepts</span>\r\nUnified communications & collaboration (UCC) is the integration of various communications methods with collaboration tools such as virtual white boards, real-time audio and video conferencing, and enhanced call control capabilities. Before this fusion of communications and collaboration tools into a single platform, enterprise collaboration service vendors and enterprise communications service vendors offered distinctly different solutions. Now, collaboration service vendors also offer communications services, and communications service providers have developed collaboration tools.\r\nUnified communications & collaboration as a service (UCCaaS) is cloud-based UCC platforms. Compared to premises-based UCC solutions, UCCaaS platforms offer enhanced flexibility and scalability due to the SaaS subscription model.\r\nUnified communications provisioning is the act of entering and configuring the settings for users of phone systems, instant messaging, telepresence, and other collaboration channels. Provisioners refer to this process as making moves, adds, changes, and deletes or MAC-Ds.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Unified_Communications.png"}],"additionalInfo":{"budgetNotExceeded":"-1","functionallyTaskAssignment":"-1","projectWasPut":"-1","price":0,"source":{"url":"https://www.sibis.com.ua/project/kompaniya-farmak-povysila-effektivnost-i-snizila-zatraty-na-kommunikatsii/","title":"Supplier's web site"}},"comments":[],"referencesCount":0},{"id":1039,"title":"Cisco Unified Communications Manager for Bank","description":"<span style=\"font-style: italic; \">Description is not ready yet</span>","alias":"cisco-unified-communications-manager-for-bank","roi":0,"seo":{"title":"Cisco Unified Communications Manager for Bank","keywords":"","description":"<span style=\"font-style: italic; \">Description is not ready yet</span>","og:title":"Cisco Unified Communications Manager for Bank","og:description":"<span style=\"font-style: italic; \">Description is not ready yet</span>"},"deal_info":"","user":{"id":4195,"title":"Hidden user","logoURL":"https://old.roi4cio.com/uploads/roi/company/hidden_user.jpg","alias":"skrytyi-polzovatel","address":"","roles":[],"description":"User Information is confidential ","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":98,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hidden user","keywords":"Hidden, user, User, Information, confidential","description":"User Information is confidential ","og:title":"Hidden user","og:description":"User Information is confidential ","og:image":"https://old.roi4cio.com/uploads/roi/company/hidden_user.jpg"},"eventUrl":""},"supplier":{"id":2701,"title":"VERNA","logoURL":"https://old.roi4cio.com/uploads/roi/company/VERNA.png","alias":"verna","address":"","roles":[],"description":"VERNA is one of the leading IT Integrators, specializing in design, implementation and support of technical solutions, aimed to improve the efficiency of corporate IT systems, - both on-site and on a remote basis. <br />VERNA has spent more than 15 successful years of dynamic development in the MSP area, having implemented 150 + projects for national-wide companies at Ukrainian market as well as outsourced projects for clients from USA and Western Europe.<br />The main customers are large geographically distributed enterprises: banks, retails, industrial enterprises (BNP Paribas Group, GlobalLogic, Volksbank, Kraft, ArcelorMittal, UniCredit Bank and others).<br />Technical expertise and skills of VERNA team are proven by certificates and partnership statuses with Cisco, Microsoft, HP, IBM, APC, Oracle, VMware, Citrix, Intel, Dell, Siemens, Systemax, etc.<br />VERNA specializes in planning, implementation and support of the following solutions:<br />- Virtualization (VMware,Hyper-V, Citrix, Dockers)<br />- Infrastructure (MS Active Directory, Office 365, Azure, AWS amazon)<br />- VoIP (Cisco, asterisk/FreePBX/Elastix)<br />- Unified Communications (Webex, Big Blue Button, Lync, Exchange, SharePoint)<br />- Networking (Cisco, FortiNet, OpenVPN, CheckPoint)<br />- Server & Storage (SAN, NAS, FAS)<br />- Business applications and databases (Microsoft, Oracle, IBM)<br />- VDI and terminal access solutions (Microsoft, VMware, Citrix)<br />- Storage virtualization (DataCore)<br />- DLP and Information Security (Antivirus systems, websence, Fortinet, DeviceLock e t.c.)<br />Source: https://www.linkedin.com/company/verna","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":205,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":41,"vendorImplementationsCount":0,"vendorPartnersCount":9,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.verna.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"VERNA","keywords":"solutions, infrastructure, providing, distributed, geographically, with, core, services","description":"VERNA is one of the leading IT Integrators, specializing in design, implementation and support of technical solutions, aimed to improve the efficiency of corporate IT systems, - both on-site and on a remote basis. <br />VERNA has spent more than 15 successful ","og:title":"VERNA","og:description":"VERNA is one of the leading IT Integrators, specializing in design, implementation and support of technical solutions, aimed to improve the efficiency of corporate IT systems, - both on-site and on a remote basis. <br />VERNA has spent more than 15 successful ","og:image":"https://old.roi4cio.com/uploads/roi/company/VERNA.png"},"eventUrl":""},"vendors":[{"id":170,"title":"Cisco","logoURL":"https://old.roi4cio.com/uploads/roi/company/Cisco_logo.png","alias":"cisco","address":"","roles":[],"description":"<span lang=\"en\">Cisco Systems is a global manufacturer of network equipment: routers, switches and servers, as well as software for data transmission on the Internet and corporate networks. The company was founded in 1984 in San Jose (California, USA). Today, Cisco dominates the Internet Protocol (IP) -based network equipment segment, and also manufactures cybersecurity, video conferencing systems, and other network equipment and software. In addition, Cisco offers a number of cloud services. Cisco's primary customers are large enterprises and telecommunications service providers, but the company also sells products aimed at small businesses and the public sector. </span>\r\n\r\n<span lang=\"en\">Cisco offers products and services in four categories. The company's infrastructure platforms generate more than half of its revenue. This includes switching devices, routing devices, wireless communications, and data processing solutions. Applications that account for over 10% of revenue are primarily software related to networking and data processing platforms. </span>\r\n\r\n<span lang=\"en\">Applications include collaboration tools (unified communications, Cisco TelePresence video conferencing) as well as AppDynamics and Internet of Things software. The cybersecurity product category generates more than 5% of the company's revenue and includes network security, email security, identity and access, advanced threat protection, and unified exposure management products. In addition, Cisco offers consulting services. </span>\r\n\r\n<span lang=\"en\">Cisco's total revenue in fiscal 2020 was nearly $ 50 billion. The company is expanding its research and development (R&D) investments in areas such as the cloud platform, remote collaboration platform, analytics and telecommunications technologies.</span>","companyTypes":[],"products":{},"vendoredProductsCount":29,"suppliedProductsCount":29,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":7,"vendorImplementationsCount":42,"vendorPartnersCount":0,"supplierPartnersCount":125,"b4r":0,"categories":{},"companyUrl":"https://www.cisco.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Cisco","keywords":"Index, networking, Cisco, company, Russell, 1000, June, Average","description":"<span lang=\"en\">Cisco Systems is a global manufacturer of network equipment: routers, switches and servers, as well as software for data transmission on the Internet and corporate networks. The company was founded in 1984 in San Jose (California, USA). Today, ","og:title":"Cisco","og:description":"<span lang=\"en\">Cisco Systems is a global manufacturer of network equipment: routers, switches and servers, as well as software for data transmission on the Internet and corporate networks. The company was founded in 1984 in San Jose (California, USA). Today, ","og:image":"https://old.roi4cio.com/uploads/roi/company/Cisco_logo.png"},"eventUrl":""}],"products":[{"id":443,"logo":false,"scheme":false,"title":"Cisco Unified Communications","vendorVerified":0,"rating":"2.40","implementationsCount":4,"suppliersCount":0,"alias":"cisco-unified-communications","companyTypes":[],"description":"Call Control\r\nUnified communications call-control platforms deliver the right experience to the right endpoint.\r\nCommunications Gateways\r\nFlexible platforms provide unified communications services for all types of gateway and session-border-control deployments.\r\nApplications and Telephony Extensions\r\nStay connected and productive with messaging, presence, and application integration. Add-ons extend core functionality to meet specific needs.\r\nCombine collaboration tools into a single solution to help your employees, customers, suppliers, and partners communicate quickly and easily.\r\n<span style=\"font-weight: bold; font-style: italic;\">Use Cisco Unified Communications to connect teams and information, and help enable comprehensive and effective collaborative experiences. Your organization can:</span>\r\nConnect co-workers, partners, vendors, and customers with the information and expertise they need\r\nAccess and share video on the desktop, on mobile devices, and on demand, as easily as making a phone call\r\nFacilitate better team interactions, dynamically bringing together individuals, virtual workgroups, and teams\r\nMake mobile devices extensions of the corporate network so workers can be productive anywhere\r\nIntegrate collaboration and communications into applications and business processes\r\nEstimate Your Savings\r\nCisco Unified Communications benefits include next-generation features and capabilities that can significantly reduce total cost of ownership (TCO). Gauge your potential savings with the Unified Communications Total Cost of Ownership Tool.","shortDescription":"Cisco® Unified Communications: Call Control, Communications Gateways, Applications and Telephony Extensions","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":19,"sellingCount":18,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Cisco Unified Communications","keywords":"Communications, Unified, with, communications, Cisco, help, information, easily","description":"Call Control\r\nUnified communications call-control platforms deliver the right experience to the right endpoint.\r\nCommunications Gateways\r\nFlexible platforms provide unified communications services for all types of gateway and session-border-control deployments","og:title":"Cisco Unified Communications","og:description":"Call Control\r\nUnified communications call-control platforms deliver the right experience to the right endpoint.\r\nCommunications Gateways\r\nFlexible platforms provide unified communications services for all types of gateway and session-border-control deployments"},"eventUrl":"","translationId":444,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":82,"title":"Unified Communications","alias":"unified-communications","description":"Unified communications (UC) is a framework for integrating various asynchronous and real-time communication tools. The goal of UC is to enhance business communication, collaboration and productivity. Unified communications do not represent a singular technology; rather, it describes a strategy for integrating interconnected systems of enterprise communication devices and applications that can be used in concert or successively.\r\nSome business communication tools - like Internet Protocol (IP) telephony and video conferencing - facilitate real-time communication, also called synchronous communication. Other enterprise communication tools, like email, facilitate asynchronous communication, which takes place at a person's convenience.\r\nIncreasingly, team collaboration tools have emerged to offer messaging-centric workflows and near-real-time communication. These tools also offer voice and video capabilities, API integrations and, ultimately, expound on instant messaging services by providing better UC features.\r\nThe goal of unified communications is to integrate the software that supports synchronous and asynchronous communication, so the end user has easy access to all tools from whatever device is in use.\r\nA unified communications environment is typically supported by one or more back-end systems, often referred to as UC platforms, that facilitate integration among services, as well as the front-end clients that provide access. For example, a web conferencing system would make use of an audio conferencing system - which, in turn, would be built on an underlying IP telephony platform - and a unified messaging client would allow click-to-talk (CTC), click-to-chat or click-to-video functionality.\r\nUC also supports users moving from one mode of communication to another within the same session. For example, a user may start communicating via email but then decide to escalate the interaction to real-time communication, transitioning the session to a voice call with one click and then to a video conference with another click without any disruption.\r\nUnified communications systems and their components can be deployed on premises, in a public or private cloud, or a combination of all three. Cloud-based unified communications is also called UC as a service (UCaaS). An open source project called WebRTC, for example, enables real-time communications to be embedded into web browsers.\r\nHistorically, single-vendor UC environments have demonstrated the tightest integration and compatibility. Interoperability among vendors remains an ongoing challenge in UC, but it has also been mitigated, in part, by partnerships, common protocols and open APIs.","materialsDescription":" <span style=\"font-weight: bold;\">What technology do unified communications have?</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Contrasting unified messaging</span></span>\r\nUnified communications are sometimes confused with unified messaging, but it is distinct. Unified communications refer to both real-time and non-real-time delivery of communications based on the preferred method and location of the recipient; unified messaging culls messages from several sources (such as e-mail, voice mail and faxes), but holds those messages only for retrieval at a later time. Unified communications allow for an individual to check and retrieve an e-mail or voice mail from any communication device at any time. It expands beyond voice mail services to data communications and video services.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Components</span></span>\r\nWith unified communications, multiple modes of business communications are integrated. Unified communications is not a single product but a collection of elements that include:\r\n<ul><li>Call control and multimodal communications</li><li>Presence</li><li>Instant messaging</li><li>Unified messaging</li><li>Speech access and personal assistant</li><li>Conferencing (audio, Web and video)</li><li>Collaboration tools</li><li>Mobility</li><li>Business process integration (BPI)</li><li>Software to enable business process integration</li></ul>\r\nPresence — knowing where intended recipients are, and if they are available, in real-time — is a key component of unified communications. Unified communications integrate all systems a user might already use, and helps those systems work together in real-time. For example, unified communications technology could allow a user to seamlessly collaborate with another person on a project, even if the two users are in separate locations. The user could quickly locate the necessary person by accessing an interactive directory, engage in a text messaging session, and then escalate the session to a voice call or even a video call.\r\nIn another example, an employee receives a call from a customer who wants answers. Unified communications enable that employee to call an expert colleague from a real-time list. This way, the employee can answer the customer faster by eliminating rounds of back-and-forth e-mails and phone-tag.\r\nThe examples in the previous paragraph primarily describe "personal productivity" enhancements that tend to benefit the individual user. While such benefits can be important, enterprises are finding that they can achieve even greater impact by using unified communications capabilities to transform business processes. This is achieved by integrating UC functionality directly into the business applications using development tools provided by many of the suppliers. Instead of the individual user invoking the UC functionality to, say, find an appropriate resource, the workflow or process application automatically identifies the resource at the point in the business activity where one is needed.\r\nWhen used in this manner, the concept of presence often changes. Most people associate presence with instant messaging (IM "buddy lists") the status of individuals is identified. But, in many business process applications, what is important is finding someone with a certain skill. In these environments, presence identifies available skills or capabilities.\r\nThis "business process" approach to integrating UC functionality can result in bottom-line benefits that are an order of magnitude greater than those achievable by personal productivity methods alone.\r\n<span style=\"font-weight: bold;\">Related concepts</span>\r\nUnified communications & collaboration (UCC) is the integration of various communications methods with collaboration tools such as virtual white boards, real-time audio and video conferencing, and enhanced call control capabilities. Before this fusion of communications and collaboration tools into a single platform, enterprise collaboration service vendors and enterprise communications service vendors offered distinctly different solutions. Now, collaboration service vendors also offer communications services, and communications service providers have developed collaboration tools.\r\nUnified communications & collaboration as a service (UCCaaS) is cloud-based UCC platforms. Compared to premises-based UCC solutions, UCCaaS platforms offer enhanced flexibility and scalability due to the SaaS subscription model.\r\nUnified communications provisioning is the act of entering and configuring the settings for users of phone systems, instant messaging, telepresence, and other collaboration channels. Provisioners refer to this process as making moves, adds, changes, and deletes or MAC-Ds.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Unified_Communications.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":6,"title":"Ensure Security and Business Continuity"},{"id":7,"title":"Improve Customer Service"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":175,"title":"Aging IT infrastructure"},{"id":340,"title":"Low quality of customer service"},{"id":370,"title":"No automated business processes"},{"id":373,"title":"IT infrastructure does not meet business tasks"}]}},"categories":[{"id":82,"title":"Unified Communications","alias":"unified-communications","description":"Unified communications (UC) is a framework for integrating various asynchronous and real-time communication tools. The goal of UC is to enhance business communication, collaboration and productivity. Unified communications do not represent a singular technology; rather, it describes a strategy for integrating interconnected systems of enterprise communication devices and applications that can be used in concert or successively.\r\nSome business communication tools - like Internet Protocol (IP) telephony and video conferencing - facilitate real-time communication, also called synchronous communication. Other enterprise communication tools, like email, facilitate asynchronous communication, which takes place at a person's convenience.\r\nIncreasingly, team collaboration tools have emerged to offer messaging-centric workflows and near-real-time communication. These tools also offer voice and video capabilities, API integrations and, ultimately, expound on instant messaging services by providing better UC features.\r\nThe goal of unified communications is to integrate the software that supports synchronous and asynchronous communication, so the end user has easy access to all tools from whatever device is in use.\r\nA unified communications environment is typically supported by one or more back-end systems, often referred to as UC platforms, that facilitate integration among services, as well as the front-end clients that provide access. For example, a web conferencing system would make use of an audio conferencing system - which, in turn, would be built on an underlying IP telephony platform - and a unified messaging client would allow click-to-talk (CTC), click-to-chat or click-to-video functionality.\r\nUC also supports users moving from one mode of communication to another within the same session. For example, a user may start communicating via email but then decide to escalate the interaction to real-time communication, transitioning the session to a voice call with one click and then to a video conference with another click without any disruption.\r\nUnified communications systems and their components can be deployed on premises, in a public or private cloud, or a combination of all three. Cloud-based unified communications is also called UC as a service (UCaaS). An open source project called WebRTC, for example, enables real-time communications to be embedded into web browsers.\r\nHistorically, single-vendor UC environments have demonstrated the tightest integration and compatibility. Interoperability among vendors remains an ongoing challenge in UC, but it has also been mitigated, in part, by partnerships, common protocols and open APIs.","materialsDescription":" <span style=\"font-weight: bold;\">What technology do unified communications have?</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Contrasting unified messaging</span></span>\r\nUnified communications are sometimes confused with unified messaging, but it is distinct. Unified communications refer to both real-time and non-real-time delivery of communications based on the preferred method and location of the recipient; unified messaging culls messages from several sources (such as e-mail, voice mail and faxes), but holds those messages only for retrieval at a later time. Unified communications allow for an individual to check and retrieve an e-mail or voice mail from any communication device at any time. It expands beyond voice mail services to data communications and video services.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Components</span></span>\r\nWith unified communications, multiple modes of business communications are integrated. Unified communications is not a single product but a collection of elements that include:\r\n<ul><li>Call control and multimodal communications</li><li>Presence</li><li>Instant messaging</li><li>Unified messaging</li><li>Speech access and personal assistant</li><li>Conferencing (audio, Web and video)</li><li>Collaboration tools</li><li>Mobility</li><li>Business process integration (BPI)</li><li>Software to enable business process integration</li></ul>\r\nPresence — knowing where intended recipients are, and if they are available, in real-time — is a key component of unified communications. Unified communications integrate all systems a user might already use, and helps those systems work together in real-time. For example, unified communications technology could allow a user to seamlessly collaborate with another person on a project, even if the two users are in separate locations. The user could quickly locate the necessary person by accessing an interactive directory, engage in a text messaging session, and then escalate the session to a voice call or even a video call.\r\nIn another example, an employee receives a call from a customer who wants answers. Unified communications enable that employee to call an expert colleague from a real-time list. This way, the employee can answer the customer faster by eliminating rounds of back-and-forth e-mails and phone-tag.\r\nThe examples in the previous paragraph primarily describe "personal productivity" enhancements that tend to benefit the individual user. While such benefits can be important, enterprises are finding that they can achieve even greater impact by using unified communications capabilities to transform business processes. This is achieved by integrating UC functionality directly into the business applications using development tools provided by many of the suppliers. Instead of the individual user invoking the UC functionality to, say, find an appropriate resource, the workflow or process application automatically identifies the resource at the point in the business activity where one is needed.\r\nWhen used in this manner, the concept of presence often changes. Most people associate presence with instant messaging (IM "buddy lists") the status of individuals is identified. But, in many business process applications, what is important is finding someone with a certain skill. In these environments, presence identifies available skills or capabilities.\r\nThis "business process" approach to integrating UC functionality can result in bottom-line benefits that are an order of magnitude greater than those achievable by personal productivity methods alone.\r\n<span style=\"font-weight: bold;\">Related concepts</span>\r\nUnified communications & collaboration (UCC) is the integration of various communications methods with collaboration tools such as virtual white boards, real-time audio and video conferencing, and enhanced call control capabilities. Before this fusion of communications and collaboration tools into a single platform, enterprise collaboration service vendors and enterprise communications service vendors offered distinctly different solutions. Now, collaboration service vendors also offer communications services, and communications service providers have developed collaboration tools.\r\nUnified communications & collaboration as a service (UCCaaS) is cloud-based UCC platforms. Compared to premises-based UCC solutions, UCCaaS platforms offer enhanced flexibility and scalability due to the SaaS subscription model.\r\nUnified communications provisioning is the act of entering and configuring the settings for users of phone systems, instant messaging, telepresence, and other collaboration channels. Provisioners refer to this process as making moves, adds, changes, and deletes or MAC-Ds.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Unified_Communications.png"}],"additionalInfo":{"budgetNotExceeded":"-1","functionallyTaskAssignment":"-1","projectWasPut":"-1","price":0,"source":{"url":"https://www.verna.ua/projects/seti-i-telekommunikatsii/item/340-vnedrenie-unifitsirovannykh-kommunikatsij","title":"Supplier's web site"}},"comments":[],"referencesCount":0},{"id":1056,"title":"Cisco Webex Meetings for the State Fiscal Service of Ukraine","description":"<span style=\"font-style: italic; \">Description is not ready yet</span>","alias":"cisco-webex-meetings-for-the-state-fiscal-service-of-ukraine","roi":0,"seo":{"title":"Cisco Webex Meetings for the State Fiscal Service of Ukraine","keywords":"","description":"<span style=\"font-style: italic; \">Description is not ready yet</span>","og:title":"Cisco Webex Meetings for the State Fiscal Service of Ukraine","og:description":"<span style=\"font-style: italic; \">Description is not ready yet</span>"},"deal_info":"","user":{"id":412,"title":"State Fiscal Service of Ukraine","logoURL":"https://old.roi4cio.com/uploads/roi/company/DFS_Ukraine_logo.png","alias":"gosudarstvennaja-fiskalnaja-sluzhba-ukrainy","address":"04655, г. Киев-53, Львовская пл., 8","roles":[],"description":" The State Fiscal Service (Derzhavna fiscal service (DFS)) is the central executive authority of Ukraine, the activities of which are directed and coordinated by the Cabinet of Ministers of Ukraine.\r\nFormed by the Resolution of the Cabinet of Ministers of May 21, 2014, by reorganizing the Ministry of Revenue and Duties.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":3,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://sfs.gov.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"State Fiscal Service of Ukraine","keywords":"Украины, служба, Государственная, Министров, фискальная, Кабинета, Образована, Постановлением","description":" The State Fiscal Service (Derzhavna fiscal service (DFS)) is the central executive authority of Ukraine, the activities of which are directed and coordinated by the Cabinet of Ministers of Ukraine.\r\nFormed by the Resolution of the Cabinet of Ministers of May ","og:title":"State Fiscal Service of Ukraine","og:description":" The State Fiscal Service (Derzhavna fiscal service (DFS)) is the central executive authority of Ukraine, the activities of which are directed and coordinated by the Cabinet of Ministers of Ukraine.\r\nFormed by the Resolution of the Cabinet of Ministers of May ","og:image":"https://old.roi4cio.com/uploads/roi/company/DFS_Ukraine_logo.png"},"eventUrl":""},"supplier":{"id":6447,"title":"AM Integrator (AMI)","logoURL":"https://old.roi4cio.com/uploads/roi/company/am_integrator.png","alias":"am-integrator","address":"Illinska St., 14/6 Kiev, 04070 Ukraine","roles":[],"description":"AM INTEGRATOR Group of Companies is one of the leading IT operators in Ukraine, being a supplier and integrator of a wide range of solutions in the field of modern IT infrastructure, multimedia solutions, engineering infrastructure, business applications and integrated business security systems for medium and large enterprises, as well as the public sector. AM Integrator helps companies:\r\n<ul><li>increase risk manageability and business productivity;</li></ul>\r\n<ul><li>reduce costs;</li></ul>\r\n<ul><li>protect data.</li></ul>\r\nAM Integrator offers intelligent and flexible solutions, including cloud services, that will help you strategically transform your business using technologies and platforms of industry leaders.<br />The company offers solutions for increasing productivity, effective collaboration, mobility and relationship management, identity-driven, advanced analytics, or the Internet of things. AM Integrator also helps with core infrastructure, from support to creating disaster recovery solutions. The team of company experts has been working with cloud technologies for more than 5 years, with virtual environments - more than 10 years.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":116,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":21,"vendorImplementationsCount":0,"vendorPartnersCount":8,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.amintegrator.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"AM Integrator (AMI)","keywords":"","description":"AM INTEGRATOR Group of Companies is one of the leading IT operators in Ukraine, being a supplier and integrator of a wide range of solutions in the field of modern IT infrastructure, multimedia solutions, engineering infrastructure, business applications and i","og:title":"AM Integrator (AMI)","og:description":"AM INTEGRATOR Group of Companies is one of the leading IT operators in Ukraine, being a supplier and integrator of a wide range of solutions in the field of modern IT infrastructure, multimedia solutions, engineering infrastructure, business applications and i","og:image":"https://old.roi4cio.com/uploads/roi/company/am_integrator.png"},"eventUrl":""},"vendors":[{"id":170,"title":"Cisco","logoURL":"https://old.roi4cio.com/uploads/roi/company/Cisco_logo.png","alias":"cisco","address":"","roles":[],"description":"<span lang=\"en\">Cisco Systems is a global manufacturer of network equipment: routers, switches and servers, as well as software for data transmission on the Internet and corporate networks. The company was founded in 1984 in San Jose (California, USA). Today, Cisco dominates the Internet Protocol (IP) -based network equipment segment, and also manufactures cybersecurity, video conferencing systems, and other network equipment and software. In addition, Cisco offers a number of cloud services. Cisco's primary customers are large enterprises and telecommunications service providers, but the company also sells products aimed at small businesses and the public sector. </span>\r\n\r\n<span lang=\"en\">Cisco offers products and services in four categories. The company's infrastructure platforms generate more than half of its revenue. This includes switching devices, routing devices, wireless communications, and data processing solutions. Applications that account for over 10% of revenue are primarily software related to networking and data processing platforms. </span>\r\n\r\n<span lang=\"en\">Applications include collaboration tools (unified communications, Cisco TelePresence video conferencing) as well as AppDynamics and Internet of Things software. The cybersecurity product category generates more than 5% of the company's revenue and includes network security, email security, identity and access, advanced threat protection, and unified exposure management products. In addition, Cisco offers consulting services. </span>\r\n\r\n<span lang=\"en\">Cisco's total revenue in fiscal 2020 was nearly $ 50 billion. The company is expanding its research and development (R&D) investments in areas such as the cloud platform, remote collaboration platform, analytics and telecommunications technologies.</span>","companyTypes":[],"products":{},"vendoredProductsCount":29,"suppliedProductsCount":29,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":7,"vendorImplementationsCount":42,"vendorPartnersCount":0,"supplierPartnersCount":125,"b4r":0,"categories":{},"companyUrl":"https://www.cisco.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Cisco","keywords":"Index, networking, Cisco, company, Russell, 1000, June, Average","description":"<span lang=\"en\">Cisco Systems is a global manufacturer of network equipment: routers, switches and servers, as well as software for data transmission on the Internet and corporate networks. The company was founded in 1984 in San Jose (California, USA). Today, ","og:title":"Cisco","og:description":"<span lang=\"en\">Cisco Systems is a global manufacturer of network equipment: routers, switches and servers, as well as software for data transmission on the Internet and corporate networks. The company was founded in 1984 in San Jose (California, USA). Today, ","og:image":"https://old.roi4cio.com/uploads/roi/company/Cisco_logo.png"},"eventUrl":""}],"products":[{"id":2002,"logo":false,"scheme":false,"title":"Cisco Webex Meetings","vendorVerified":0,"rating":"2.00","implementationsCount":1,"suppliersCount":0,"alias":"cisco-webex-meetings","companyTypes":[],"description":"<p>Cisco Webex offers industry leading audio and video conferencing with screen sharing, chat, and more. See why over 113 million people use Webex for collaboration each month. <span style=\"font-weight: bold;\">General features:</span></p>\r\n<ul>\r\n<li>Join and present from any meeting, event, or training session</li>\r\n<li>One-tap joining directly from your calendar or customizable widget</li>\r\n<li>Schedule meetings directly from your app</li>\r\n<li>Customizable video layouts</li>\r\n<li>Share your screen to everyone</li>\r\n</ul>\r\n<p><span style=\"font-weight: bold;\">System requirements:</span></p>\r\n<ul>\r\n<li>Intel Core2 Duo processor with a 2.XX GHz or AMD processor (2 GB of RAM recommended)</li>\r\n<li>Permissions must be enabled for javascript and cookies</li>\r\n<li>Active X is enabled and unlocked for Microsoft Internet Explorer (recommended)</li>\r\n<li>Java 6.0</li>\r\n</ul>","shortDescription":"With Cisco Webex Meetings, joining is a breeze, audio and video are clear, and screen sharing is easier than ever.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":13,"sellingCount":4,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Cisco Webex Meetings","keywords":"","description":"<p>Cisco Webex offers industry leading audio and video conferencing with screen sharing, chat, and more. See why over 113 million people use Webex for collaboration each month. <span style=\"font-weight: bold;\">General features:</span></p>\r\n<ul>\r\n<li>Join and p","og:title":"Cisco Webex Meetings","og:description":"<p>Cisco Webex offers industry leading audio and video conferencing with screen sharing, chat, and more. See why over 113 million people use Webex for collaboration each month. <span style=\"font-weight: bold;\">General features:</span></p>\r\n<ul>\r\n<li>Join and p"},"eventUrl":"","translationId":2004,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":367,"title":"Web Conferencing Applications","alias":"web-conferencing-applications","description":" Web conferencing is the common name for technology and tools for online meetings and real-time collaboration. Web conferencing allows you to conduct online presentations, collaborate on documents and applications, view websites, videos, images.\r\nWeb conferences, as a rule, are Internet services that require the installation of a client program on each participant’s computer. Some services also provide access to a web conference via a browser using flash, java or a special plug-in.\r\nServices for web conferencing can include features and tools such as screen sharing (screen sharing or individual applications), whiteboard (interactive whiteboard), the ability to show web presentations, co-browsing (the ability to synchronously browse web pages), tools for annotations, monitoring the presence of participants, text chat, integrated VoIP communication, video communication, the ability to change the leader, the ability to give control over the mouse and keyboard, meeting moderation tools, feedback collection tools (on example, polls), tools for scheduling and inviting participants, the ability to record the progress of a web conference.\r\nOften, web conferencing is used with Internet services for audio and video calls (for example, Skype) or they provide conference calling via a regular telephone.","materialsDescription":" What is the first thing that strikes you when we look at businessmen who are trying to establish communication with each other online? All of them require: “Give more opportunities for web conferencing!”. Therefore, it is not at all surprising that the WebRTC technology is gaining the favor of an increasing number of small and medium-sized businesses.\r\nA recent study conducted by Software Advice showed that more than half of employees in small businesses prefer web conferences, noting their efficiency and usability. The advantages are especially noticeable in comparison with communications via telephone or the use of special applications. However, the benefits of web conferencing do not end there - according to the study, they not only increase the speed and quality of online meetings, but also provide a lot of opportunities for collaboration. In addition, and this is obvious, they reduce travel costs.\r\n<span style=\"font-weight: bold;\">Speed and quality come first.</span>\r\nIt is worth noting that now small and medium businesses are almost gone from the use of communication hardware and use desktop computers and mobile devices. Despite the fact that audio and video conferences are still very popular (they are used by 45% and 50% of users, respectively), web conferences are actively replacing them. Judge for yourself - according to statistics, every third user selects them as a means of communication after the first experience of use.\r\nThe main reason for such a rapid growth in popularity is the speed and quality that web conferencing users provide. According to respondents, the main advantage of web conferences is the ability to organize a meeting much faster than before. Now there is no need to spend time on installing special applications like Skype or similar - any communication systems using any third-party programs are a thing of the past. Also worth noting is the ability to connect to the web conference literally in one click.\r\nMore than 40% of the people surveyed showed dissatisfaction with the tedious procedure of entering authorization data, noting the simplicity and convenience of connecting to the WebRTC web conference. All you need is access to the Internet!\r\n<span style=\"font-weight: bold;\">We work in a team</span>\r\nIt is no secret that the use of web conferencing significantly reduces the company's travel expenses. After all, booking tickets, searching for hotels and meeting places can result in a decent amount, which will seriously hurt the company's income. Using web conferences, you get the opportunity to arrange business meetings, even with overseas partners, without leaving your office. But that's not all! Web conferencing offers a range of tools to overcome language barriers. For example, in the field of healthcare, videoconferencing has been used to establish consultations between doctors and patients from completely different countries. With the help of online translators and other special features of web conferences, people can get the necessary help from qualified foreign specialists.\r\nDo not forget that web conferencing is not only a convenient way to hold a video call. You can arrange trainings for your team using file transfer and document display functions, as well as conduct job interviews without wasting time.\r\nIt is interesting to note that small and medium-sized businesses share their product samples with prospective clients using web conferences, turning them into a powerful marketing tool. This brings the business to a fundamentally new level, allowing the company to take a leading position in its industry!","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Web_Conferencing_Applications.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":306,"title":"Manage Risks"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":175,"title":"Aging IT infrastructure"},{"id":373,"title":"IT infrastructure does not meet business tasks"},{"id":378,"title":"Low employee productivity"},{"id":397,"title":"Insufficient risk management"},{"id":398,"title":"Poor communication and coordination among staff"}]}},"categories":[{"id":367,"title":"Web Conferencing Applications","alias":"web-conferencing-applications","description":" Web conferencing is the common name for technology and tools for online meetings and real-time collaboration. Web conferencing allows you to conduct online presentations, collaborate on documents and applications, view websites, videos, images.\r\nWeb conferences, as a rule, are Internet services that require the installation of a client program on each participant’s computer. Some services also provide access to a web conference via a browser using flash, java or a special plug-in.\r\nServices for web conferencing can include features and tools such as screen sharing (screen sharing or individual applications), whiteboard (interactive whiteboard), the ability to show web presentations, co-browsing (the ability to synchronously browse web pages), tools for annotations, monitoring the presence of participants, text chat, integrated VoIP communication, video communication, the ability to change the leader, the ability to give control over the mouse and keyboard, meeting moderation tools, feedback collection tools (on example, polls), tools for scheduling and inviting participants, the ability to record the progress of a web conference.\r\nOften, web conferencing is used with Internet services for audio and video calls (for example, Skype) or they provide conference calling via a regular telephone.","materialsDescription":" What is the first thing that strikes you when we look at businessmen who are trying to establish communication with each other online? All of them require: “Give more opportunities for web conferencing!”. Therefore, it is not at all surprising that the WebRTC technology is gaining the favor of an increasing number of small and medium-sized businesses.\r\nA recent study conducted by Software Advice showed that more than half of employees in small businesses prefer web conferences, noting their efficiency and usability. The advantages are especially noticeable in comparison with communications via telephone or the use of special applications. However, the benefits of web conferencing do not end there - according to the study, they not only increase the speed and quality of online meetings, but also provide a lot of opportunities for collaboration. In addition, and this is obvious, they reduce travel costs.\r\n<span style=\"font-weight: bold;\">Speed and quality come first.</span>\r\nIt is worth noting that now small and medium businesses are almost gone from the use of communication hardware and use desktop computers and mobile devices. Despite the fact that audio and video conferences are still very popular (they are used by 45% and 50% of users, respectively), web conferences are actively replacing them. Judge for yourself - according to statistics, every third user selects them as a means of communication after the first experience of use.\r\nThe main reason for such a rapid growth in popularity is the speed and quality that web conferencing users provide. According to respondents, the main advantage of web conferences is the ability to organize a meeting much faster than before. Now there is no need to spend time on installing special applications like Skype or similar - any communication systems using any third-party programs are a thing of the past. Also worth noting is the ability to connect to the web conference literally in one click.\r\nMore than 40% of the people surveyed showed dissatisfaction with the tedious procedure of entering authorization data, noting the simplicity and convenience of connecting to the WebRTC web conference. All you need is access to the Internet!\r\n<span style=\"font-weight: bold;\">We work in a team</span>\r\nIt is no secret that the use of web conferencing significantly reduces the company's travel expenses. After all, booking tickets, searching for hotels and meeting places can result in a decent amount, which will seriously hurt the company's income. Using web conferences, you get the opportunity to arrange business meetings, even with overseas partners, without leaving your office. But that's not all! Web conferencing offers a range of tools to overcome language barriers. For example, in the field of healthcare, videoconferencing has been used to establish consultations between doctors and patients from completely different countries. With the help of online translators and other special features of web conferences, people can get the necessary help from qualified foreign specialists.\r\nDo not forget that web conferencing is not only a convenient way to hold a video call. You can arrange trainings for your team using file transfer and document display functions, as well as conduct job interviews without wasting time.\r\nIt is interesting to note that small and medium-sized businesses share their product samples with prospective clients using web conferences, turning them into a powerful marketing tool. This brings the business to a fundamentally new level, allowing the company to take a leading position in its industry!","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Web_Conferencing_Applications.png"}],"additionalInfo":{"budgetNotExceeded":"-1","functionallyTaskAssignment":"-1","projectWasPut":"-1","price":0,"source":{"url":"https://amintegrator.com/ru/modernizirovala-videokonferentssvyaz-gfsu/","title":"Supplier's web site"}},"comments":[],"referencesCount":0},{"id":59,"title":"EMC VNX, Hyper-v for mechanical engineering","description":"Description is not ready yet","alias":"emc-vnx-hyper-v-for-mechanical-engineering","roi":0,"seo":{"title":"EMC VNX, Hyper-v for mechanical engineering","keywords":"","description":"Description is not ready yet","og:title":"EMC VNX, Hyper-v for mechanical engineering","og:description":"Description is not ready yet"},"deal_info":"","user":{},"supplier":{},"vendors":[{"id":163,"title":"Microsoft","logoURL":"https://old.roi4cio.com/uploads/roi/company/ms_dshchpshch.png","alias":"microsoft","address":"Microsoft","roles":[],"description":"Microsoft Corporation is an multinational technology company headquartered in Redmond, Washington, that develops, manufactures, licenses, supports and sells computer software, consumer electronics and personal computers and services. Its best known software products are the Microsoft Windows line of operating systems, Microsoft Office office suite, and Internet Explorer and Edge web browsers. Its flagship hardware products are the Xbox video game consoles and the Microsoft Surface tablet lineup. As of 2011, it was the world's largest software maker by revenue, and one of the world's most valuable companies.","companyTypes":[],"products":{},"vendoredProductsCount":39,"suppliedProductsCount":39,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":66,"vendorPartnersCount":0,"supplierPartnersCount":272,"b4r":0,"categories":{},"companyUrl":"www.microsoft.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Microsoft","keywords":"Microsoft, software, world, products, hardware, Xbox, video, game","description":"Microsoft Corporation is an multinational technology company headquartered in Redmond, Washington, that develops, manufactures, licenses, supports and sells computer software, consumer electronics and personal computers and services. Its best known software pr","og:title":"Microsoft","og:description":"Microsoft Corporation is an multinational technology company headquartered in Redmond, Washington, that develops, manufactures, licenses, supports and sells computer software, consumer electronics and personal computers and services. Its best known software pr","og:image":"https://old.roi4cio.com/uploads/roi/company/ms_dshchpshch.png"},"eventUrl":""},{"id":955,"title":"Dell EMC","logoURL":"https://old.roi4cio.com/uploads/roi/company/dell_emc_product.jpg","alias":"dell-emc","address":"","roles":[],"description":"Dell EMC (EMC Corporation until 2016) is an American multinational corporation headquartered in Hopkinton, Massachusetts, United States. Dell EMC sells data storage, information security, virtualization, analytics, cloud computing and other products and services that enable organizations to store, manage, protect, and analyze data. Dell EMC's target markets include large companies and small- and medium-sized businesses across various vertical markets. The company's stock (as EMC Corporation) was added to the New York Stock Exchange on April 6, 1986, and was also listed on the S&P 500 index.\r\n\r\nSource: https://en.wikipedia.org/wiki/Dell_EMC","companyTypes":[],"products":{},"vendoredProductsCount":17,"suppliedProductsCount":17,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":6,"vendorPartnersCount":0,"supplierPartnersCount":59,"b4r":0,"categories":{},"companyUrl":"https://www.dellemc.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Dell EMC","keywords":"Dell, markets, data, Corporation, until, added, York, Exchange","description":"Dell EMC (EMC Corporation until 2016) is an American multinational corporation headquartered in Hopkinton, Massachusetts, United States. Dell EMC sells data storage, information security, virtualization, analytics, cloud computing and other products and servic","og:title":"Dell EMC","og:description":"Dell EMC (EMC Corporation until 2016) is an American multinational corporation headquartered in Hopkinton, Massachusetts, United States. Dell EMC sells data storage, information security, virtualization, analytics, cloud computing and other products and servic","og:image":"https://old.roi4cio.com/uploads/roi/company/dell_emc_product.jpg"},"eventUrl":""}],"products":[{"id":5,"logo":false,"scheme":false,"title":"Microsoft Hyper-V","vendorVerified":0,"rating":"2.40","implementationsCount":12,"suppliersCount":0,"alias":"microsoft-hyper-v","companyTypes":[],"description":"The management tools for the Hyper-V role consist of:\r\nGUI-based management tools: Hyper-V Manager, a Microsoft Management Console (MMC) snap-in, and Virtual Machine Connection, which provides access to the video output of a virtual machine so you can interact with the virtual machine.\r\nHyper-V-specific cmdlets for Windows PowerShell. Windows Server 2012 includes a Hyper-V module, which provides command-line access to all the functionality available in the GUI, as well functionality not available through the GUI. For more information about the Hyper-V module, see Hyper-V Module for Windows PowerShell.\r\nIf you use Server Manager to install the Hyper-V role, the management tools are included unless you specifically exclude them. If you use Windows PowerShell to install the Hyper-V role, the management tools are not included by default. To install the tools, use the parameter –IncludeManagementTools. For instructions about installing the Hyper-V role, see Install Hyper-V and create a virtual machine.\r\n\r\nOverview of Hyper-V\r\nApplies To: Windows Server 2008 R2\r\nHyper-V provides software infrastructure and basic management tools that you can use to create and manage a virtualized server computing environment. This virtualized environment can be used to address a variety of business goals aimed at improving efficiency and reducing costs. For example, a virtualized server environment can help you:\r\nReduce the costs of operating and maintaining physical servers by increasing your hardware utilization. You can reduce the amount of hardware needed to run your server workloads.\r\nIncrease development and test efficiency by reducing the amount of time it takes to set up hardware and software and reproduce test environments.\r\nImprove server availability without using as many physical computers as you would need in a failover configuration that uses only physical computers.\r\nSome ways Hyper-V can help you\r\nHyper-V can help you:\r\nEstablish or expand a private cloud environment. Provide more flexible, on-demand IT services by moving to or expanding your use of shared resources and adjust utilization as demand changes.\r\nUse your hardware more effectively. Consolidate servers and workloads onto fewer, more powerful physical computers to use less power and physical space.\r\nImprove business continuity. Minimize the impact of both scheduled and unscheduled downtime of your workloads.\r\nEstablish or expand a virtual desktop infrastructure (VDI). Use a centralized desktop strategy with VDI can help you increase business agility and data security, as well as simplify regulatory compliance and manage desktop operating systems and applications. Deploy Hyper-V and Remote Desktop Virtualization Host (RD Virtualization Host) on the same server to make personal virtual desktops or virtual desktop pools available to your users.\r\nMake development and test more efficient. Reproduce different computing environments without having to buy or maintain all the hardware you'd need if you only used physical systems.\r\nHyper-V and other virtualization products\r\nHyper-V in Windows and Windows Server replaces older hardware virtualization products, such as Microsoft Virtual PC, Microsoft Virtual Server, and Windows Virtual PC. Hyper-V offers networking, performance, storage and security features not available in these older products.\r\nHyper-V and most third-party virtualization applications that require the same processor features aren't compatible. That's because the processor features, known as hardware virtualization extensions, are designed to not be shared. For details, see Virtualization applications do not work together with Hyper-V, Device Guard, and Credential Guard.","shortDescription":"The Hyper-V role enables you to create and manage a virtualized computing environment by using virtualization technology that is built in to Windows Server. Installing the Hyper-V role installs the required components and optionally installs management tools. The required components include Windows hypervisor, Hyper-V Virtual Machine Management Service, the virtualization WMI provider, and other virtualization components such as the virtual machine bus (VMbus), virtualization service provider (VSP) and virtual infrastructure driver (VID).","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":18,"sellingCount":10,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Microsoft Hyper-V","keywords":"Hyper-V, Windows, hardware, virtual, physical, your, tools, server","description":"The management tools for the Hyper-V role consist of:\r\nGUI-based management tools: Hyper-V Manager, a Microsoft Management Console (MMC) snap-in, and Virtual Machine Connection, which provides access to the video output of a virtual machine so you can interact","og:title":"Microsoft Hyper-V","og:description":"The management tools for the Hyper-V role consist of:\r\nGUI-based management tools: Hyper-V Manager, a Microsoft Management Console (MMC) snap-in, and Virtual Machine Connection, which provides access to the video output of a virtual machine so you can interact"},"eventUrl":"","translationId":617,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":1,"title":"Desktop virtualization","alias":"desktop-virtualization","description":" Desktop virtualization is a virtualization technology that separates an individual's PC applications from his or her desktop. Virtualized desktops are generally hosted on a remote central server, rather than the hard drive of the personal computer. Because the client-server computing model is used in virtualizing desktops, desktop virtualization is also known as client virtualization.\r\nDesktop virtualization provides a way for users to maintain their individual desktops on a single, central server. The users may be connected to the central server through a LAN, WAN or over the Internet.\r\nDesktop virtualization has many benefits, including a lower total cost of ownership (TCO), increased security, reduced energy costs, reduced downtime and centralized management.\r\nLimitations of desktop virtualization include difficulty in maintenance and set up of printer drivers; increased downtime in case of network failures; complexity and costs involved in VDI deployment and security risks in the event of improper network management.<br /><br />","materialsDescription":" <span style=\"font-weight: bold; \">What are types of desktop virtualization technologies?</span>\r\nHost-based forms of desktop virtualization require that users view and interact with their virtual desktops over a network by using a remote display protocol. Because processing takes place in a data center, client devices can be traditional PCs, but also thin clients, zero clients, smartphones and tablets. Examples of host-based desktop virtualization technology include:\r\n<span style=\"font-weight: bold; \">Host-based virtual machines:</span> Each user connects to an individual VM that is hosted in a data center. The user may connect to the same VM every time, allowing for personalization (known as a persistent desktop), or be given a fresh VM at each login (a nonpersistent desktop).\r\n<span style=\"font-weight: bold; \">Shared hosted:</span> Users connect to a shared desktop that runs on a server. Microsoft Remote Desktop Services, formerly Terminal Services, takes this client-server approach. Users may also connect to individual applications running on a server; this technology is an example of application virtualization.\r\n<span style=\"font-weight: bold; \">Host-based physical machines:</span> The operating system runs directly on another device's physical hardware.\r\nClient virtualization requires processing to occur on local hardware; the use of thin clients, zero clients and mobile devices is not possible. These types of desktop virtualization include:\r\n<span style=\"font-weight: bold; \">OS image streaming:</span> The operating system runs on local hardware, but it boots to a remote disk image across the network. This is useful for groups of desktops that use the same disk image. OS image streaming, also known as remote desktop virtualization, requires a constant network connection in order to function.\r\n<span style=\"font-weight: bold; \">Client-based virtual machines:</span> A VM runs on a fully functional PC, with a hypervisor in place. Client-based virtual machines can be managed by regularly syncing the disk image with a server, but a constant network connection is not necessary in order for them to function.\r\n<span style=\"font-weight: bold;\">Desktop virtualization vs. virtual desktop infrastructure</span>\r\nThe terms <span style=\"font-style: italic;\">desktop virtualization</span> and virtual desktop infrastructure (VDI) are often used interchangeably, but they are not the same. While VDI is a type of desktop virtualization, not all desktop virtualization uses VDI.\r\nVDI refers to the use of host-based VMs to deliver virtual desktops, which emerged in 2006 as an alternative to Terminal Services and Citrix's client-server approach to desktop virtualization technology. Other types of desktop virtualization -- including the shared hosted model, host-based physical machines and all methods of client virtualization -- are not examples of VDI.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Desktop_virtualization.png"},{"id":2,"title":"Virtual machine and cloud system software","alias":"virtual-machine-and-cloud-system-software","description":" A virtual machine (VM) is a software-based computer that exists within another computer’s operating system, often used for the purposes of testing, backing up data, or running SaaS applications. To fully grasp how VMs work, it’s important to first understand how computer software and hardware are typically integrated by an operating system.\r\n"The cloud" refers to servers that are accessed over the Internet, and the software and databases that run on those servers. Cloud servers are located in data centers all over the world. By using cloud computing, users and companies don't have to manage physical servers themselves or run software applications on their own machines.\r\nThe cloud enables users to access the same files and applications from almost any device, because the computing and storage take place on servers in a data center, instead of locally on the user device. This is why a user can log into their Instagram account on a new phone after their old phone breaks and still find their old account in place, with all their photos, videos, and conversation history. It works the same way with cloud email providers like Gmail or Microsoft Office 365, and with cloud storage providers like Dropbox or Google Drive.\r\nFor businesses, switching to cloud computing removes some IT costs and overhead: for instance, they no longer need to update and maintain their own servers, as the cloud vendor they are using will do that. This especially makes an impact on small businesses that may not have been able to afford their own internal infrastructure but can outsource their infrastructure needs affordably via the cloud. The cloud can also make it easier for companies to operate internationally because employees and customers can access the same files and applications from any location.\r\nSeveral cloud providers offer virtual machines to their customers. These virtual machines typically live on powerful servers that can act as a host to multiple VMs and can be used for a variety of reasons that wouldn’t be practical with a locally-hosted VM. These include:\r\n<ul><li>Running SaaS applications - Software-as-a-Service, or SaaS for short, is a cloud-based method of providing software to users. SaaS users subscribe to an application rather than purchasing it once and installing it. These applications are generally served to the user over the Internet. Often, it is virtual machines in the cloud that are doing the computation for SaaS applications as well as delivering them to users. If the cloud provider has a geographically distributed network edge, then the application will run closer to the user, resulting in faster performance.</li><li>Backing up data - Cloud-based VM services are very popular for backing up data because the data can be accessed from anywhere. Plus, cloud VMs provide better redundancy, require less maintenance, and generally scale better than physical data centers. (For example, it’s generally fairly easy to buy an extra gigabyte of storage space from a cloud VM provider, but much more difficult to build a new local data server for that extra gigabyte of data.)</li><li>Hosting services like email and access management - Hosting these services on cloud VMs is generally faster and more cost-effective, and helps minimize maintenance and offload security concerns as well.</li></ul>","materialsDescription":"What is an operating system?\r\nTraditional computers are built out of physical hardware, including hard disk drives, processor chips, RAM, etc. In order to utilize this hardware, computers rely on a type of software known as an operating system (OS). Some common examples of OSes are Mac OSX, Microsoft Windows, Linux, and Android.\r\nThe OS is what manages the computer’s hardware in ways that are useful to the user. For example, if the user wants to access the Internet, the OS directs the network interface card to make the connection. If the user wants to download a file, the OS will partition space on the hard drive for that file. The OS also runs and manages other pieces of software. For example, it can run a web browser and provide the browser with enough random access memory (RAM) to operate smoothly. Typically, operating systems exist within a physical computer at a one-to-one ratio; for each machine, there is a single OS managing its physical resources.\r\n<span style=\"font-weight: bold;\">Can you have two or more operating systems on one computer?</span>\r\nSome users want to be able to run multiple operating systems simultaneously on one computer, either for testing or one of the other reasons listed in the section below. This can be achieved through a process called virtualization. In virtualization, a piece of software behaves as if it were an independent computer. This piece of software is called a virtual machine, also known as a ‘guest’ computer. (The computer on which the VM is running is called the ‘host’.) The guest has an OS as well as its own virtual hardware.\r\n‘Virtual hardware’ may sound like a bit of an oxymoron, but it works by mapping to real hardware on the host computer. For example, the VM’s ‘hard drive’ is really just a file on the host computer’s hard drive. When the VM wants to save a new file, it actually has to communicate with the host OS, which will write this file to the host hard drive. Because virtual hardware must perform this added step of negotiating with the host to access hardware resources, virtual machines can’t run quite as fast as their host computers.\r\nWith virtualization, one computer can run two or more operating systems. The number of VMs that can run on one host is limited only by the host’s available resources. The user can run the OS of a VM in a window like any other program, or they can run it in fullscreen so that it looks and feels like a genuine host OS.\r\n <span style=\"font-weight: bold; \">What are virtual machines used for?</span>\r\nSome of the most popular reasons people run virtual machines include:\r\n<span style=\"font-weight: bold; \">Testing</span> - Oftentimes software developers want to be able to test their applications in different environments. They can use virtual machines to run their applications in various OSes on one computer. This is simpler and more cost-effective than having to test on several different physical machines.\r\n<span style=\"font-weight: bold; \">Running software designed for other OSes</span> - Although certain software applications are only available for a single platform, a VM can run software designed for a different OS. For example, a Mac user who wants to run software designed for Windows can run a Windows VM on their Mac host.\r\n<span style=\"font-weight: bold; \">Running outdated software</span> - Some pieces of older software can’t be run in modern OSes. Users who want to run these applications can run an old OS on a virtual machine.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Virtual_machine_and_cloud_system_software.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":405,"logo":false,"scheme":false,"title":"EMC VNX","vendorVerified":0,"rating":"2.00","implementationsCount":1,"suppliersCount":0,"alias":"emc-vnx","companyTypes":[],"description":"With the VNX Series, you’ll achieve new levels of performance, protection, compliance, and ease of management.","shortDescription":"EMC VNX - High-performing unified storage with unsurpassed simplicity and efficiency, optimised for virtual applications.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":17,"sellingCount":11,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"EMC VNX","keywords":"performance, compliance, protection, management, ease, With, Series, you’ll","description":"With the VNX Series, you’ll achieve new levels of performance, protection, compliance, and ease of management.","og:title":"EMC VNX","og:description":"With the VNX Series, you’ll achieve new levels of performance, protection, compliance, and ease of management."},"eventUrl":"","translationId":406,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":501,"title":"All-flash and Hybrid Storage","alias":"all-flash-and-hybrid-storage","description":" Costs have come down making hybrid and all-flash enterprise storage solutions the preferred choice for storing, processing and moving the massive volumes of business data generated in today’s cloud, mobile and IoT environment.\r\nll-flash storage arrays utilize solid-state drives (SSDs) to deliver high-performance and low-latency workloads using data compression and deduplication technologies. Hybrid Storage combines those same solid-state drives (SSDs) with SAS or NL-SAS drives to offer a more cost-effective storage solution that balances cost with superior performance and high storage density.\r\nBoth options lower the complexity of providing scale-out performance at ultralow latency for data-intensive loads and big data analytics.\r\nWhether you are building a new storage array or refreshing your existing storage infrastructure we will work with you to plan, source, install and configure a storage solution to meet you budgetary and business requirements.","materialsDescription":" <span style=\"font-weight: bold;\">What is flash storage and what is it used for?</span>\r\nFlash storage is any storage repository that uses flash memory. Flash memory comes in many form factors, and you probably use flash storage every day. From a single Flash chip on a simple circuit board attached to your computing device via USB to circuit boards in your phone or MP3 player, to a fully integrated “Enterprise Flash Disk” where lots of chips are attached to a circuit board in a form factor that can be used in place of a spinning disk.\r\n<span style=\"font-weight: bold;\">What is flash storage SSD?</span>\r\nA “Solid State Disk” or EFD “Enterprise Flash Disk” is a fully integrated circuit board where many Flash chips are engineered to represent a single Flash disk. Primarily used to replace a traditional spinning disk, SSDs are used in MP3 players, laptops, servers and enterprise storage systems.\r\n<span style=\"font-weight: bold;\">What is the difference between flash storage and SSD?</span>\r\nFlash storage is a reference to any device that can function as a storage repository. Flash storage can be a simple USB device or a fully integrated All-Flash Storage Array. SSD, “Solid State Disk” is an integrated device designed to replace spinning media, commonly used in enterprise storage arrays.\r\n<span style=\"font-weight: bold;\">What is the difference between flash storage and traditional hard drives?</span>\r\nA traditional hard drive leveraged rotating platters and heads to read data from a magnetic device, comparable to a traditional record player; while flash storage leveraged electronic media or flash memory, to vastly improve performance. Flash eliminates rotational delay and seeks time, functions that add latency to traditional storage media.\r\n<span style=\"font-weight: bold;\">What is the difference between an all-flash array and a hybrid array?</span>\r\nA Hybrid Storage Array uses a combination of spinning disk drives and Flash SSD. Along with the right software, a Hybrid Array can be configured to improve overall performance while reducing cost. An All-Flash-Array is designed to support only SSD media.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Al_flash_and_Hybrid_Storage.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":180,"title":"Russia","name":"RUS"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":6,"title":"Ensure Security and Business Continuity"}]}},"categories":[{"id":1,"title":"Desktop virtualization","alias":"desktop-virtualization","description":" Desktop virtualization is a virtualization technology that separates an individual's PC applications from his or her desktop. Virtualized desktops are generally hosted on a remote central server, rather than the hard drive of the personal computer. Because the client-server computing model is used in virtualizing desktops, desktop virtualization is also known as client virtualization.\r\nDesktop virtualization provides a way for users to maintain their individual desktops on a single, central server. The users may be connected to the central server through a LAN, WAN or over the Internet.\r\nDesktop virtualization has many benefits, including a lower total cost of ownership (TCO), increased security, reduced energy costs, reduced downtime and centralized management.\r\nLimitations of desktop virtualization include difficulty in maintenance and set up of printer drivers; increased downtime in case of network failures; complexity and costs involved in VDI deployment and security risks in the event of improper network management.<br /><br />","materialsDescription":" <span style=\"font-weight: bold; \">What are types of desktop virtualization technologies?</span>\r\nHost-based forms of desktop virtualization require that users view and interact with their virtual desktops over a network by using a remote display protocol. Because processing takes place in a data center, client devices can be traditional PCs, but also thin clients, zero clients, smartphones and tablets. Examples of host-based desktop virtualization technology include:\r\n<span style=\"font-weight: bold; \">Host-based virtual machines:</span> Each user connects to an individual VM that is hosted in a data center. The user may connect to the same VM every time, allowing for personalization (known as a persistent desktop), or be given a fresh VM at each login (a nonpersistent desktop).\r\n<span style=\"font-weight: bold; \">Shared hosted:</span> Users connect to a shared desktop that runs on a server. Microsoft Remote Desktop Services, formerly Terminal Services, takes this client-server approach. Users may also connect to individual applications running on a server; this technology is an example of application virtualization.\r\n<span style=\"font-weight: bold; \">Host-based physical machines:</span> The operating system runs directly on another device's physical hardware.\r\nClient virtualization requires processing to occur on local hardware; the use of thin clients, zero clients and mobile devices is not possible. These types of desktop virtualization include:\r\n<span style=\"font-weight: bold; \">OS image streaming:</span> The operating system runs on local hardware, but it boots to a remote disk image across the network. This is useful for groups of desktops that use the same disk image. OS image streaming, also known as remote desktop virtualization, requires a constant network connection in order to function.\r\n<span style=\"font-weight: bold; \">Client-based virtual machines:</span> A VM runs on a fully functional PC, with a hypervisor in place. Client-based virtual machines can be managed by regularly syncing the disk image with a server, but a constant network connection is not necessary in order for them to function.\r\n<span style=\"font-weight: bold;\">Desktop virtualization vs. virtual desktop infrastructure</span>\r\nThe terms <span style=\"font-style: italic;\">desktop virtualization</span> and virtual desktop infrastructure (VDI) are often used interchangeably, but they are not the same. While VDI is a type of desktop virtualization, not all desktop virtualization uses VDI.\r\nVDI refers to the use of host-based VMs to deliver virtual desktops, which emerged in 2006 as an alternative to Terminal Services and Citrix's client-server approach to desktop virtualization technology. Other types of desktop virtualization -- including the shared hosted model, host-based physical machines and all methods of client virtualization -- are not examples of VDI.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Desktop_virtualization.png"},{"id":2,"title":"Virtual machine and cloud system software","alias":"virtual-machine-and-cloud-system-software","description":" A virtual machine (VM) is a software-based computer that exists within another computer’s operating system, often used for the purposes of testing, backing up data, or running SaaS applications. To fully grasp how VMs work, it’s important to first understand how computer software and hardware are typically integrated by an operating system.\r\n"The cloud" refers to servers that are accessed over the Internet, and the software and databases that run on those servers. Cloud servers are located in data centers all over the world. By using cloud computing, users and companies don't have to manage physical servers themselves or run software applications on their own machines.\r\nThe cloud enables users to access the same files and applications from almost any device, because the computing and storage take place on servers in a data center, instead of locally on the user device. This is why a user can log into their Instagram account on a new phone after their old phone breaks and still find their old account in place, with all their photos, videos, and conversation history. It works the same way with cloud email providers like Gmail or Microsoft Office 365, and with cloud storage providers like Dropbox or Google Drive.\r\nFor businesses, switching to cloud computing removes some IT costs and overhead: for instance, they no longer need to update and maintain their own servers, as the cloud vendor they are using will do that. This especially makes an impact on small businesses that may not have been able to afford their own internal infrastructure but can outsource their infrastructure needs affordably via the cloud. The cloud can also make it easier for companies to operate internationally because employees and customers can access the same files and applications from any location.\r\nSeveral cloud providers offer virtual machines to their customers. These virtual machines typically live on powerful servers that can act as a host to multiple VMs and can be used for a variety of reasons that wouldn’t be practical with a locally-hosted VM. These include:\r\n<ul><li>Running SaaS applications - Software-as-a-Service, or SaaS for short, is a cloud-based method of providing software to users. SaaS users subscribe to an application rather than purchasing it once and installing it. These applications are generally served to the user over the Internet. Often, it is virtual machines in the cloud that are doing the computation for SaaS applications as well as delivering them to users. If the cloud provider has a geographically distributed network edge, then the application will run closer to the user, resulting in faster performance.</li><li>Backing up data - Cloud-based VM services are very popular for backing up data because the data can be accessed from anywhere. Plus, cloud VMs provide better redundancy, require less maintenance, and generally scale better than physical data centers. (For example, it’s generally fairly easy to buy an extra gigabyte of storage space from a cloud VM provider, but much more difficult to build a new local data server for that extra gigabyte of data.)</li><li>Hosting services like email and access management - Hosting these services on cloud VMs is generally faster and more cost-effective, and helps minimize maintenance and offload security concerns as well.</li></ul>","materialsDescription":"What is an operating system?\r\nTraditional computers are built out of physical hardware, including hard disk drives, processor chips, RAM, etc. In order to utilize this hardware, computers rely on a type of software known as an operating system (OS). Some common examples of OSes are Mac OSX, Microsoft Windows, Linux, and Android.\r\nThe OS is what manages the computer’s hardware in ways that are useful to the user. For example, if the user wants to access the Internet, the OS directs the network interface card to make the connection. If the user wants to download a file, the OS will partition space on the hard drive for that file. The OS also runs and manages other pieces of software. For example, it can run a web browser and provide the browser with enough random access memory (RAM) to operate smoothly. Typically, operating systems exist within a physical computer at a one-to-one ratio; for each machine, there is a single OS managing its physical resources.\r\n<span style=\"font-weight: bold;\">Can you have two or more operating systems on one computer?</span>\r\nSome users want to be able to run multiple operating systems simultaneously on one computer, either for testing or one of the other reasons listed in the section below. This can be achieved through a process called virtualization. In virtualization, a piece of software behaves as if it were an independent computer. This piece of software is called a virtual machine, also known as a ‘guest’ computer. (The computer on which the VM is running is called the ‘host’.) The guest has an OS as well as its own virtual hardware.\r\n‘Virtual hardware’ may sound like a bit of an oxymoron, but it works by mapping to real hardware on the host computer. For example, the VM’s ‘hard drive’ is really just a file on the host computer’s hard drive. When the VM wants to save a new file, it actually has to communicate with the host OS, which will write this file to the host hard drive. Because virtual hardware must perform this added step of negotiating with the host to access hardware resources, virtual machines can’t run quite as fast as their host computers.\r\nWith virtualization, one computer can run two or more operating systems. The number of VMs that can run on one host is limited only by the host’s available resources. The user can run the OS of a VM in a window like any other program, or they can run it in fullscreen so that it looks and feels like a genuine host OS.\r\n <span style=\"font-weight: bold; \">What are virtual machines used for?</span>\r\nSome of the most popular reasons people run virtual machines include:\r\n<span style=\"font-weight: bold; \">Testing</span> - Oftentimes software developers want to be able to test their applications in different environments. They can use virtual machines to run their applications in various OSes on one computer. This is simpler and more cost-effective than having to test on several different physical machines.\r\n<span style=\"font-weight: bold; \">Running software designed for other OSes</span> - Although certain software applications are only available for a single platform, a VM can run software designed for a different OS. For example, a Mac user who wants to run software designed for Windows can run a Windows VM on their Mac host.\r\n<span style=\"font-weight: bold; \">Running outdated software</span> - Some pieces of older software can’t be run in modern OSes. Users who want to run these applications can run an old OS on a virtual machine.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Virtual_machine_and_cloud_system_software.png"},{"id":501,"title":"All-flash and Hybrid Storage","alias":"all-flash-and-hybrid-storage","description":" Costs have come down making hybrid and all-flash enterprise storage solutions the preferred choice for storing, processing and moving the massive volumes of business data generated in today’s cloud, mobile and IoT environment.\r\nll-flash storage arrays utilize solid-state drives (SSDs) to deliver high-performance and low-latency workloads using data compression and deduplication technologies. Hybrid Storage combines those same solid-state drives (SSDs) with SAS or NL-SAS drives to offer a more cost-effective storage solution that balances cost with superior performance and high storage density.\r\nBoth options lower the complexity of providing scale-out performance at ultralow latency for data-intensive loads and big data analytics.\r\nWhether you are building a new storage array or refreshing your existing storage infrastructure we will work with you to plan, source, install and configure a storage solution to meet you budgetary and business requirements.","materialsDescription":" <span style=\"font-weight: bold;\">What is flash storage and what is it used for?</span>\r\nFlash storage is any storage repository that uses flash memory. Flash memory comes in many form factors, and you probably use flash storage every day. From a single Flash chip on a simple circuit board attached to your computing device via USB to circuit boards in your phone or MP3 player, to a fully integrated “Enterprise Flash Disk” where lots of chips are attached to a circuit board in a form factor that can be used in place of a spinning disk.\r\n<span style=\"font-weight: bold;\">What is flash storage SSD?</span>\r\nA “Solid State Disk” or EFD “Enterprise Flash Disk” is a fully integrated circuit board where many Flash chips are engineered to represent a single Flash disk. Primarily used to replace a traditional spinning disk, SSDs are used in MP3 players, laptops, servers and enterprise storage systems.\r\n<span style=\"font-weight: bold;\">What is the difference between flash storage and SSD?</span>\r\nFlash storage is a reference to any device that can function as a storage repository. Flash storage can be a simple USB device or a fully integrated All-Flash Storage Array. SSD, “Solid State Disk” is an integrated device designed to replace spinning media, commonly used in enterprise storage arrays.\r\n<span style=\"font-weight: bold;\">What is the difference between flash storage and traditional hard drives?</span>\r\nA traditional hard drive leveraged rotating platters and heads to read data from a magnetic device, comparable to a traditional record player; while flash storage leveraged electronic media or flash memory, to vastly improve performance. Flash eliminates rotational delay and seeks time, functions that add latency to traditional storage media.\r\n<span style=\"font-weight: bold;\">What is the difference between an all-flash array and a hybrid array?</span>\r\nA Hybrid Storage Array uses a combination of spinning disk drives and Flash SSD. Along with the right software, a Hybrid Array can be configured to improve overall performance while reducing cost. An All-Flash-Array is designed to support only SSD media.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Al_flash_and_Hybrid_Storage.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://www.technoserv.com/about/success-stories/detail.php?id=6104","title":"Supplier's web site"}},"comments":[],"referencesCount":0},{"id":1106,"title":"fieldengineer","description":"<p><span style=\"color: #767676; font-family: 'Open Sans', sans-serif; font-size: 13.6px;\">A field solution architecture is one of the essential parts of organizational success. The field solution architect (FSA) is responsible for working together with internal and external sales department to plan, organize, and sales strategies.visit us @ </span><a style=\"border: 0px; margin: 0px; padding: 0px; transition: color 0.1s ease-in-out 0s, background-color 0.1s ease-in-out 0s; text-decoration-line: none; color: #1e73be; font-family: 'Open Sans', sans-serif; font-size: 13.6px;\" href=\"https://www.fieldengineer.com/skills/field-solutions-architect\" rel=\"nofollow\">https://www.fieldengineer.com/skills/field-solutions-architect</a></p>","alias":"fieldengineer","roi":0,"seo":{"title":"fieldengineer","keywords":"","description":"<p><span style=\"color: #767676; font-family: 'Open Sans', sans-serif; font-size: 13.6px;\">A field solution architecture is one of the essential parts of organizational success. The field solution architect (FSA) is responsible for working together with interna","og:title":"fieldengineer","og:description":"<p><span style=\"color: #767676; font-family: 'Open Sans', sans-serif; font-size: 13.6px;\">A field solution architecture is one of the essential parts of organizational success. The field solution architect (FSA) is responsible for working together with interna"},"deal_info":"","user":{"id":8752,"title":"fieldengineer","logoURL":"https://old.roi4cio.com/uploads/roi/company/fieldengineer.jpg","alias":"fieldengineer","address":"","roles":[],"description":"A field solution architecture is one of the essential parts of organizational success. The field solution architect (FSA) is responsible for working together with internal and external sales departments to plan, organize, and sales strategies.visit us @ https://www.fieldengineer.com/skills/field-solutions-architect","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://www.fieldengineer.com/skills/field-solutions-architect","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"fieldengineer","keywords":"","description":"A field solution architecture is one of the essential parts of organizational success. The field solution architect (FSA) is responsible for working together with internal and external sales departments to plan, organize, and sales strategies.visit us @ h","og:title":"fieldengineer","og:description":"A field solution architecture is one of the essential parts of organizational success. The field solution architect (FSA) is responsible for working together with internal and external sales departments to plan, organize, and sales strategies.visit us @ h","og:image":"https://old.roi4cio.com/uploads/roi/company/fieldengineer.jpg"},"eventUrl":""},"supplier":{},"vendors":[{"id":163,"title":"Microsoft","logoURL":"https://old.roi4cio.com/uploads/roi/company/ms_dshchpshch.png","alias":"microsoft","address":"Microsoft","roles":[],"description":"Microsoft Corporation is an multinational technology company headquartered in Redmond, Washington, that develops, manufactures, licenses, supports and sells computer software, consumer electronics and personal computers and services. Its best known software products are the Microsoft Windows line of operating systems, Microsoft Office office suite, and Internet Explorer and Edge web browsers. Its flagship hardware products are the Xbox video game consoles and the Microsoft Surface tablet lineup. As of 2011, it was the world's largest software maker by revenue, and one of the world's most valuable companies.","companyTypes":[],"products":{},"vendoredProductsCount":39,"suppliedProductsCount":39,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":66,"vendorPartnersCount":0,"supplierPartnersCount":272,"b4r":0,"categories":{},"companyUrl":"www.microsoft.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Microsoft","keywords":"Microsoft, software, world, products, hardware, Xbox, video, game","description":"Microsoft Corporation is an multinational technology company headquartered in Redmond, Washington, that develops, manufactures, licenses, supports and sells computer software, consumer electronics and personal computers and services. Its best known software pr","og:title":"Microsoft","og:description":"Microsoft Corporation is an multinational technology company headquartered in Redmond, Washington, that develops, manufactures, licenses, supports and sells computer software, consumer electronics and personal computers and services. Its best known software pr","og:image":"https://old.roi4cio.com/uploads/roi/company/ms_dshchpshch.png"},"eventUrl":""}],"products":[{"id":826,"logo":false,"scheme":false,"title":"The next generation of Skype","vendorVerified":0,"rating":"2.00","implementationsCount":1,"suppliersCount":0,"alias":"the-next-generation-of-skype","companyTypes":[],"description":"The next generation of Skype will be available on devices with Android and iOS in June 2017. Versions for Windows and Mac will be released by the end of 2017.\r\nNew Skype made a group of chat more personalized with color settings, add-ons and bots. With the \"Search\" panel in the spotlight. New Skype feature: Highlights. The main features allow you to create a highlight of your day with photos and videos so you can share everyday moments. ","shortDescription":"Skype is software for making individual and group voice and free video calls, sending messages and files to other Skype users.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":8,"sellingCount":4,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"The next generation of Skype","keywords":"Skype, with, 2017, generation, next, will, features, allow","description":"The next generation of Skype will be available on devices with Android and iOS in June 2017. Versions for Windows and Mac will be released by the end of 2017.\r\nNew Skype made a group of chat more personalized with color settings, add-ons and bots. With the \"Se","og:title":"The next generation of Skype","og:description":"The next generation of Skype will be available on devices with Android and iOS in June 2017. Versions for Windows and Mac will be released by the end of 2017.\r\nNew Skype made a group of chat more personalized with color settings, add-ons and bots. With the \"Se"},"eventUrl":"","translationId":827,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":367,"title":"Web Conferencing Applications","alias":"web-conferencing-applications","description":" Web conferencing is the common name for technology and tools for online meetings and real-time collaboration. Web conferencing allows you to conduct online presentations, collaborate on documents and applications, view websites, videos, images.\r\nWeb conferences, as a rule, are Internet services that require the installation of a client program on each participant’s computer. Some services also provide access to a web conference via a browser using flash, java or a special plug-in.\r\nServices for web conferencing can include features and tools such as screen sharing (screen sharing or individual applications), whiteboard (interactive whiteboard), the ability to show web presentations, co-browsing (the ability to synchronously browse web pages), tools for annotations, monitoring the presence of participants, text chat, integrated VoIP communication, video communication, the ability to change the leader, the ability to give control over the mouse and keyboard, meeting moderation tools, feedback collection tools (on example, polls), tools for scheduling and inviting participants, the ability to record the progress of a web conference.\r\nOften, web conferencing is used with Internet services for audio and video calls (for example, Skype) or they provide conference calling via a regular telephone.","materialsDescription":" What is the first thing that strikes you when we look at businessmen who are trying to establish communication with each other online? All of them require: “Give more opportunities for web conferencing!”. Therefore, it is not at all surprising that the WebRTC technology is gaining the favor of an increasing number of small and medium-sized businesses.\r\nA recent study conducted by Software Advice showed that more than half of employees in small businesses prefer web conferences, noting their efficiency and usability. The advantages are especially noticeable in comparison with communications via telephone or the use of special applications. However, the benefits of web conferencing do not end there - according to the study, they not only increase the speed and quality of online meetings, but also provide a lot of opportunities for collaboration. In addition, and this is obvious, they reduce travel costs.\r\n<span style=\"font-weight: bold;\">Speed and quality come first.</span>\r\nIt is worth noting that now small and medium businesses are almost gone from the use of communication hardware and use desktop computers and mobile devices. Despite the fact that audio and video conferences are still very popular (they are used by 45% and 50% of users, respectively), web conferences are actively replacing them. Judge for yourself - according to statistics, every third user selects them as a means of communication after the first experience of use.\r\nThe main reason for such a rapid growth in popularity is the speed and quality that web conferencing users provide. According to respondents, the main advantage of web conferences is the ability to organize a meeting much faster than before. Now there is no need to spend time on installing special applications like Skype or similar - any communication systems using any third-party programs are a thing of the past. Also worth noting is the ability to connect to the web conference literally in one click.\r\nMore than 40% of the people surveyed showed dissatisfaction with the tedious procedure of entering authorization data, noting the simplicity and convenience of connecting to the WebRTC web conference. All you need is access to the Internet!\r\n<span style=\"font-weight: bold;\">We work in a team</span>\r\nIt is no secret that the use of web conferencing significantly reduces the company's travel expenses. After all, booking tickets, searching for hotels and meeting places can result in a decent amount, which will seriously hurt the company's income. Using web conferences, you get the opportunity to arrange business meetings, even with overseas partners, without leaving your office. But that's not all! Web conferencing offers a range of tools to overcome language barriers. For example, in the field of healthcare, videoconferencing has been used to establish consultations between doctors and patients from completely different countries. With the help of online translators and other special features of web conferences, people can get the necessary help from qualified foreign specialists.\r\nDo not forget that web conferencing is not only a convenient way to hold a video call. You can arrange trainings for your team using file transfer and document display functions, as well as conduct job interviews without wasting time.\r\nIt is interesting to note that small and medium-sized businesses share their product samples with prospective clients using web conferences, turning them into a powerful marketing tool. This brings the business to a fundamentally new level, allowing the company to take a leading position in its industry!","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Web_Conferencing_Applications.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{},"categories":[{"id":367,"title":"Web Conferencing Applications","alias":"web-conferencing-applications","description":" Web conferencing is the common name for technology and tools for online meetings and real-time collaboration. Web conferencing allows you to conduct online presentations, collaborate on documents and applications, view websites, videos, images.\r\nWeb conferences, as a rule, are Internet services that require the installation of a client program on each participant’s computer. Some services also provide access to a web conference via a browser using flash, java or a special plug-in.\r\nServices for web conferencing can include features and tools such as screen sharing (screen sharing or individual applications), whiteboard (interactive whiteboard), the ability to show web presentations, co-browsing (the ability to synchronously browse web pages), tools for annotations, monitoring the presence of participants, text chat, integrated VoIP communication, video communication, the ability to change the leader, the ability to give control over the mouse and keyboard, meeting moderation tools, feedback collection tools (on example, polls), tools for scheduling and inviting participants, the ability to record the progress of a web conference.\r\nOften, web conferencing is used with Internet services for audio and video calls (for example, Skype) or they provide conference calling via a regular telephone.","materialsDescription":" What is the first thing that strikes you when we look at businessmen who are trying to establish communication with each other online? All of them require: “Give more opportunities for web conferencing!”. Therefore, it is not at all surprising that the WebRTC technology is gaining the favor of an increasing number of small and medium-sized businesses.\r\nA recent study conducted by Software Advice showed that more than half of employees in small businesses prefer web conferences, noting their efficiency and usability. The advantages are especially noticeable in comparison with communications via telephone or the use of special applications. However, the benefits of web conferencing do not end there - according to the study, they not only increase the speed and quality of online meetings, but also provide a lot of opportunities for collaboration. In addition, and this is obvious, they reduce travel costs.\r\n<span style=\"font-weight: bold;\">Speed and quality come first.</span>\r\nIt is worth noting that now small and medium businesses are almost gone from the use of communication hardware and use desktop computers and mobile devices. Despite the fact that audio and video conferences are still very popular (they are used by 45% and 50% of users, respectively), web conferences are actively replacing them. Judge for yourself - according to statistics, every third user selects them as a means of communication after the first experience of use.\r\nThe main reason for such a rapid growth in popularity is the speed and quality that web conferencing users provide. According to respondents, the main advantage of web conferences is the ability to organize a meeting much faster than before. Now there is no need to spend time on installing special applications like Skype or similar - any communication systems using any third-party programs are a thing of the past. Also worth noting is the ability to connect to the web conference literally in one click.\r\nMore than 40% of the people surveyed showed dissatisfaction with the tedious procedure of entering authorization data, noting the simplicity and convenience of connecting to the WebRTC web conference. All you need is access to the Internet!\r\n<span style=\"font-weight: bold;\">We work in a team</span>\r\nIt is no secret that the use of web conferencing significantly reduces the company's travel expenses. After all, booking tickets, searching for hotels and meeting places can result in a decent amount, which will seriously hurt the company's income. Using web conferences, you get the opportunity to arrange business meetings, even with overseas partners, without leaving your office. But that's not all! Web conferencing offers a range of tools to overcome language barriers. For example, in the field of healthcare, videoconferencing has been used to establish consultations between doctors and patients from completely different countries. With the help of online translators and other special features of web conferences, people can get the necessary help from qualified foreign specialists.\r\nDo not forget that web conferencing is not only a convenient way to hold a video call. You can arrange trainings for your team using file transfer and document display functions, as well as conduct job interviews without wasting time.\r\nIt is interesting to note that small and medium-sized businesses share their product samples with prospective clients using web conferences, turning them into a powerful marketing tool. This brings the business to a fundamentally new level, allowing the company to take a leading position in its industry!","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Web_Conferencing_Applications.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"www.fieldengineer.com/skills/field-solutions-architect","title":"-"}},"comments":[],"referencesCount":0},{"id":942,"title":"HPE StoreVirtual VSA for large logistics company","description":"Description is not ready yet","alias":"hpe-storevirtual-vsa-for-large-logistics-company","roi":0,"seo":{"title":"HPE StoreVirtual VSA for large logistics company","keywords":"","description":"Description is not ready yet","og:title":"HPE StoreVirtual VSA for large logistics company","og:description":"Description is not ready yet"},"deal_info":"","user":{"id":7298,"title":"Raben Group","logoURL":"https://old.roi4cio.com/uploads/roi/company/Raben_logo.jpg","alias":"raben-group","address":"","roles":[],"description":" Raben Group is a Third Party Logistics operator with 85 years of experience. Present in 11 markets of the Western, Central, and Eastern Europe with its own logistic network, Raben Group is providing services to small, medium-sized and big companies which have decided to outsource their logistics processes.<br />Source: https://www.linkedin.com/company/the-raben-group/about/","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"https://raben-group.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Raben Group","keywords":"","description":" Raben Group is a Third Party Logistics operator with 85 years of experience. Present in 11 markets of the Western, Central, and Eastern Europe with its own logistic network, Raben Group is providing services to small, medium-sized and big companies which have","og:title":"Raben Group","og:description":" Raben Group is a Third Party Logistics operator with 85 years of experience. Present in 11 markets of the Western, Central, and Eastern Europe with its own logistic network, Raben Group is providing services to small, medium-sized and big companies which have","og:image":"https://old.roi4cio.com/uploads/roi/company/Raben_logo.jpg"},"eventUrl":""},"supplier":{"id":249,"title":"Integrity Systems","logoURL":"https://old.roi4cio.com/uploads/roi/company/integrity_systems.png","alias":"integrity-systems","address":"Київ 01032 вул. Саксаганського, 119, оф. 26","roles":[],"description":"Integrity Systems is a young company, system integrator dynamic. Integrity Systems specializes in the design and implementation of IT solutions for medium and large enterprises. The company "Systems Integration" was founded in 2007 and focuses its activities on solutions using various technologies IT business objectives corporate customers in Ukraine. The main asset is our team of qualified consultants, project managers and engineers, allowing us to offer our clients services that cover the full life cycle of IT solutions - from analyzing business objectives, design, implementation and further maintenance and support.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":197,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":15,"vendorImplementationsCount":0,"vendorPartnersCount":9,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://integritysys.com.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Integrity Systems","keywords":"Systems, solutions, Integrity, implementation, design, company, business, objectives","description":"Integrity Systems is a young company, system integrator dynamic. Integrity Systems specializes in the design and implementation of IT solutions for medium and large enterprises. The company "Systems Integration" was founded in 2007 and focuses its ac","og:title":"Integrity Systems","og:description":"Integrity Systems is a young company, system integrator dynamic. Integrity Systems specializes in the design and implementation of IT solutions for medium and large enterprises. The company "Systems Integration" was founded in 2007 and focuses its ac","og:image":"https://old.roi4cio.com/uploads/roi/company/integrity_systems.png"},"eventUrl":""},"vendors":[{"id":172,"title":"Hewlett Packard Enterprise","logoURL":"https://old.roi4cio.com/uploads/roi/company/HPE_logo.jpeg","alias":"hewlett-packard-enterprise","address":"","roles":[],"description":"The Hewlett Packard Enterprise Company (commonly referred to as HPE) is an American multinational enterprise information technology company based in San Jose, California,[2] founded on 1 November 2015 as part of splitting of the Hewlett-Packard company. HPE is a business-focused organization with two divisions: Enterprise Group, which works in servers, storage, networking, consulting and support, and Financial Services. On 4 December HPE reported FY2018 net revenue of $30.9 billion, up 7% from the prior year period.","companyTypes":[],"products":{},"vendoredProductsCount":19,"suppliedProductsCount":19,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":26,"vendorPartnersCount":0,"supplierPartnersCount":451,"b4r":0,"categories":{},"companyUrl":"www.hpe.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hewlett Packard Enterprise","keywords":"Packard, Hewlett, Enterprise, company, 2015, November, Hewlett-Packard, now-split","description":"The Hewlett Packard Enterprise Company (commonly referred to as HPE) is an American multinational enterprise information technology company based in San Jose, California,[2] founded on 1 November 2015 as part of splitting of the Hewlett-Packard company. HPE is","og:title":"Hewlett Packard Enterprise","og:description":"The Hewlett Packard Enterprise Company (commonly referred to as HPE) is an American multinational enterprise information technology company based in San Jose, California,[2] founded on 1 November 2015 as part of splitting of the Hewlett-Packard company. HPE is","og:image":"https://old.roi4cio.com/uploads/roi/company/HPE_logo.jpeg"},"eventUrl":""}],"products":[{"id":4844,"logo":false,"scheme":false,"title":"HPE StoreVirtual VSA Software","vendorVerified":0,"rating":"0.00","implementationsCount":2,"suppliersCount":0,"alias":"hpe-storevirtual-vsa-software","companyTypes":[],"description":"For developing converged compute and storage solutions in virtualized environments, HPE StoreVirtual VSA Software delivers high performance shared storage on your choice of servers and SSD or HDD media. Built on proven data services technology, HPE StoreVirtual VSA delivers software-defined storage by virtualizing up to 50TB of disk capacity per server running VMware vSphere, Microsoft Hyper-V or Linux KVM. The HPE StoreVirtual VSA eliminates the need for external shared storage required to implement advanced hypervisor features.\r\nHPE StoreVirtual VSA uses scale-out, distributed clustering to provide a pool of storage with enterprise storage features and simple management at reduced cost. Multiple StoreVirtual VSAs running on multiple servers create a clustered pool of storage with the ability to make data highly available by protecting volumes with Network RAID. Adding more StoreVirtual VSAs to the cluster grows the storage pool. With Network RAID, blocks of data are striped and mirrored across multiple StoreVirtual VSAs, allowing volumes and applications to stay online in the event of disk, storage subsystem or server failure. iSCSI connectivity on HPE StoreVirtual VSA supports the use of the storage pools by hypervisors as well as other applications. HPE StoreVirtual VSA fully supports 1GbE and 10GbE environments for connections to both virtual and physical hosts.<br />\r\nLeverage existing converged infrastructure with StoreVirtual VSA and enable higher levels of protection for business critical data services. Easy to use installation wizards assist in the deployment of HPE StoreVirtual VSA on VMware vSphere or Microsoft HyperV. Using the Centralized Management Console, StoreVirtual VSA can be deployed at remote sites and managed centrally as a virtual storage system.<br /><br /><span style=\"font-weight: bold;\">Benefits</span>\r\n<ul><li>Gain the benefits of an array without requiring a physical storage infrastructure by virtualizing storage resources in a server – reduces cost, footprint, power and cooling</li></ul>\r\n<ul><li>Take advantage of hypervisor advanced features such as vMotion and Live Migration without purchasing external storage system</li></ul>\r\n<ul><li>Create a storage pool which is available to hypervisors and other applications via iSCSI</li></ul>\r\n<ul><li>Comes complete with all storage management features - no additional software needed</li></ul>\r\n<ul><li>Easily build a clustered, highly available converged storage pool on existing servers</li></ul>\r\n<ul><li>Utilize internal (SATA, MDL, SAS, SSD, PCIe Flash) and external (iSCSI, FC, SAS) storage options supported by VMware, Microsoft or Linux as back end storage</li></ul>\r\n<ul><li>Enable disaster recovery (DR) solutions for remote or branch offices that do not have budget, space, or power for servers and a traditional array</li></ul>\r\n<ul><li>Easily replicate volumes between StoreVirtual VSA and 3PAR with Peer Copy</li></ul>\r\n<ul><li>Reduce cost and complexity with integrated backup to HPE StoreOnce systems using HPE RMC software</li></ul>","shortDescription":"The StoreVirtual VSA software delivers the scalability and high availability of HP StoreVirtual arrays to small and midsize customers.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":7,"sellingCount":14,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"HPE StoreVirtual VSA Software","keywords":"","description":"For developing converged compute and storage solutions in virtualized environments, HPE StoreVirtual VSA Software delivers high performance shared storage on your choice of servers and SSD or HDD media. Built on proven data services technology, HPE StoreVirtua","og:title":"HPE StoreVirtual VSA Software","og:description":"For developing converged compute and storage solutions in virtualized environments, HPE StoreVirtual VSA Software delivers high performance shared storage on your choice of servers and SSD or HDD media. Built on proven data services technology, HPE StoreVirtua"},"eventUrl":"","translationId":4845,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":1,"title":"Desktop virtualization","alias":"desktop-virtualization","description":" Desktop virtualization is a virtualization technology that separates an individual's PC applications from his or her desktop. Virtualized desktops are generally hosted on a remote central server, rather than the hard drive of the personal computer. Because the client-server computing model is used in virtualizing desktops, desktop virtualization is also known as client virtualization.\r\nDesktop virtualization provides a way for users to maintain their individual desktops on a single, central server. The users may be connected to the central server through a LAN, WAN or over the Internet.\r\nDesktop virtualization has many benefits, including a lower total cost of ownership (TCO), increased security, reduced energy costs, reduced downtime and centralized management.\r\nLimitations of desktop virtualization include difficulty in maintenance and set up of printer drivers; increased downtime in case of network failures; complexity and costs involved in VDI deployment and security risks in the event of improper network management.<br /><br />","materialsDescription":" <span style=\"font-weight: bold; \">What are types of desktop virtualization technologies?</span>\r\nHost-based forms of desktop virtualization require that users view and interact with their virtual desktops over a network by using a remote display protocol. Because processing takes place in a data center, client devices can be traditional PCs, but also thin clients, zero clients, smartphones and tablets. Examples of host-based desktop virtualization technology include:\r\n<span style=\"font-weight: bold; \">Host-based virtual machines:</span> Each user connects to an individual VM that is hosted in a data center. The user may connect to the same VM every time, allowing for personalization (known as a persistent desktop), or be given a fresh VM at each login (a nonpersistent desktop).\r\n<span style=\"font-weight: bold; \">Shared hosted:</span> Users connect to a shared desktop that runs on a server. Microsoft Remote Desktop Services, formerly Terminal Services, takes this client-server approach. Users may also connect to individual applications running on a server; this technology is an example of application virtualization.\r\n<span style=\"font-weight: bold; \">Host-based physical machines:</span> The operating system runs directly on another device's physical hardware.\r\nClient virtualization requires processing to occur on local hardware; the use of thin clients, zero clients and mobile devices is not possible. These types of desktop virtualization include:\r\n<span style=\"font-weight: bold; \">OS image streaming:</span> The operating system runs on local hardware, but it boots to a remote disk image across the network. This is useful for groups of desktops that use the same disk image. OS image streaming, also known as remote desktop virtualization, requires a constant network connection in order to function.\r\n<span style=\"font-weight: bold; \">Client-based virtual machines:</span> A VM runs on a fully functional PC, with a hypervisor in place. Client-based virtual machines can be managed by regularly syncing the disk image with a server, but a constant network connection is not necessary in order for them to function.\r\n<span style=\"font-weight: bold;\">Desktop virtualization vs. virtual desktop infrastructure</span>\r\nThe terms <span style=\"font-style: italic;\">desktop virtualization</span> and virtual desktop infrastructure (VDI) are often used interchangeably, but they are not the same. While VDI is a type of desktop virtualization, not all desktop virtualization uses VDI.\r\nVDI refers to the use of host-based VMs to deliver virtual desktops, which emerged in 2006 as an alternative to Terminal Services and Citrix's client-server approach to desktop virtualization technology. Other types of desktop virtualization -- including the shared hosted model, host-based physical machines and all methods of client virtualization -- are not examples of VDI.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Desktop_virtualization.png"},{"id":7,"title":"Storage - General-Purpose Disk Arrays","alias":"storage-general-purpose-disk-arrays","description":" General-purpose disk arrays refer to disk storage systems that work together with specialized array controllers to achieve high data transfer. They are designed to fulfill the requirement of a diverse set of workloads such as databases, virtual desktop infrastructure, and virtual networks. The market size in the study represents the revenue generated through various deployment modes such as NAS, SAN, and DAS. Some of the technologies used in the general-purpose disk arrays market include PATA, SATA, and SCSI. The application areas of general-purpose disk arrays include BFSI, IT, government, education & research, healthcare, and manufacturing.\r\nGeneral-Purpose Disk Arrays market in BFSI accounts for the largest revenue. IT industry and governments are investing heavily in the general-purpose disk arrays, as a huge amount of voluminous data is getting generated which requires high storage capacity to store the classified data for analytics purpose and consumer insights. General-Purpose Disk Arrays market in healthcare is expected to show robust growth during the forecast period, as hospitals are adopting the latest technology with huge storage spaces in an attempt to track the patient history for providing better healthcare facilities.\r\nThe global general-purpose disk arrays market is fragmented owing to the presence of a large number of local and regional players, which intensifies the degree of rivalry. The market is growing at a notable pace, which leads to high intensity of rivalry. Key market players such as Dell EMC, HPE, and IBM Corporation seek to gain market share through continuous innovations in storage technology. Some of the other key players operating in a market are Hitachi, Seagate Technologies, NetApp, Promise Technologies, Quantum Corporation, Oracle Corporation, Fujitsu, DataDirect Networks, and Infortrend Technology Inc. Key competitors are specifically focusing on Asia-Pacific and Middle-East & Africa regions, as they show strong tendency to adopt the general-purpose disk arrays in coming years.","materialsDescription":"<span style=\"font-weight: bold;\">What are the characteristics of storage?</span>\r\nStorage technologies at all levels of the storage hierarchy can be differentiated by evaluating certain core characteristics as well as measuring characteristics specific to a particular implementation. These core characteristics are volatility, mutability, accessibility, and addressability. For any particular implementation of any storage technology, the characteristics worth measuring are capacity and performance.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Volatility</span></span>\r\nNon-volatile memory retains the stored information even if not constantly supplied with electric power. It is suitable for long-term storage of information. Volatile memory requires constant power to maintain the stored information. The fastest memory technologies are volatile ones, although that is not a universal rule. Since the primary storage is required to be very fast, it predominantly uses volatile memory.\r\nDynamic random-access memory is a form of volatile memory that also requires the stored information to be periodically reread and rewritten, or refreshed, otherwise it would vanish. Static random-access memory is a form of volatile memory similar to DRAM with the exception that it never needs to be refreshed as long as power is applied; it loses its content when the power supply is lost.\r\nAn uninterruptible power supply (UPS) can be used to give a computer a brief window of time to move information from primary volatile storage into non-volatile storage before the batteries are exhausted. Some systems, for example EMC Symmetrix, have integrated batteries that maintain volatile storage for several minutes.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Mutability</span></span>\r\n<span style=\"font-weight: bold;\">Read/write storage or mutable storage</span>\r\n<div class=\"indent\">Allows information to be overwritten at any time. A computer without some amount of read/write storage for primary storage purposes would be useless for many tasks. Modern computers typically use read/write storage also for secondary storage.</div>\r\n<span style=\"font-weight: bold;\">Slow write, fast read storage</span>\r\n<div class=\"indent\">Read/write storage which allows information to be overwritten multiple times, but with the write operation being much slower than the read operation. Examples include CD-RW and SSD.</div>\r\n<span style=\"font-weight: bold;\">Write once storage</span>\r\n<div class=\"indent\">Write Once Read Many (WORM) allows the information to be written only once at some point after manufacture. Examples include semiconductor programmable read-only memory and CD-R.</div>\r\n<span style=\"font-weight: bold;\">Read only storage</span>\r\n<div class=\"indent\">Retains the information stored at the time of manufacture. Examples include mask ROM ICs and CD-ROM.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Accessibility</span></span>\r\n<span style=\"font-weight: bold;\">Random access</span>\r\n<div class=\"indent\">Any location in storage can be accessed at any moment in approximately the same amount of time. Such characteristic is well suited for primary and secondary storage. Most semiconductor memories and disk drives provide random access.</div>\r\n<span style=\"font-weight: bold;\">Sequential access</span>\r\n<div class=\"indent\">The accessing of pieces of information will be in a serial order, one after the other; therefore the time to access a particular piece of information depends upon which piece of information was last accessed. Such characteristic is typical of off-line storage.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Addressability</span></span>\r\n<span style=\"font-weight: bold;\">Location-addressable</span>\r\n<div class=\"indent\">Each individually accessible unit of information in storage is selected with its numerical memory address. In modern computers, location-addressable storage usually limits to primary storage, accessed internally by computer programs, since location-addressability is very efficient, but burdensome for humans.</div>\r\n<span style=\"font-weight: bold;\">File addressable</span>\r\n<div class=\"indent\">Information is divided into files of variable length, and a particular file is selected with human-readable directory and file names. The underlying device is still location-addressable, but the operating system of a computer provides the file system abstraction to make the operation more understandable. In modern computers, secondary, tertiary and off-line storage use file systems.</div>\r\n<span style=\"font-weight: bold;\">Content-addressable</span>\r\n<div class=\"indent\">Each individually accessible unit of information is selected based on the basis of (part of) the contents stored there. Content-addressable storage can be implemented using software (computer program) or hardware (computer device), with hardware being faster but more expensive option. Hardware content addressable memory is often used in a computer's CPU cache.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Capacity</span></span>\r\n<span style=\"font-weight: bold;\">Raw capacity</span>\r\n<div class=\"indent\">The total amount of stored information that a storage device or medium can hold. It is expressed as a quantity of bits or bytes (e.g. 10.4 megabytes).</div>\r\n<span style=\"font-weight: bold;\">Memory storage density</span>\r\n<div class=\"indent\">The compactness of stored information. It is the storage capacity of a medium divided with a unit of length, area or volume (e.g. 1.2 megabytes per square inch).</div>\r\n\r\n<span style=\"font-weight: bold;\"><span style=\"font-style: italic;\">Performance</span></span>\r\n<span style=\"font-weight: bold;\">Latency</span>\r\n<div class=\"indent\">The time it takes to access a particular location in storage. The relevant unit of measurement is typically nanosecond for primary storage, millisecond for secondary storage, and second for tertiary storage. It may make sense to separate read latency and write latency (especially for non-volatile memory[8]) and in case of sequential access storage, minimum, maximum and average latency.</div>\r\n<span style=\"font-weight: bold;\">Throughput</span>\r\n<div class=\"indent\">The rate at which information can be read from or written to the storage. In computer data storage, throughput is usually expressed in terms of megabytes per second (MB/s), though bit rate may also be used. As with latency, read rate and write rate may need to be differentiated. Also accessing media sequentially, as opposed to randomly, typically yields maximum throughput.</div>\r\n<span style=\"font-weight: bold;\">Granularity</span>\r\n<div class=\"indent\">The size of the largest "chunk" of data that can be efficiently accessed as a single unit, e.g. without introducing additional latency.</div>\r\n<span style=\"font-weight: bold;\">Reliability</span>\r\n<div class=\"indent\">The probability of spontaneous bit value change under various conditions, or overall failure rate.</div>\r\nUtilities such as hdparm and sar can be used to measure IO performance in Linux.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Energy use</span></span>\r\n<ul><li>Storage devices that reduce fan usage, automatically shut-down during inactivity, and low power hard drives can reduce energy consumption by 90 percent.</li><li>2.5-inch hard disk drives often consume less power than larger ones. Low capacity solid-state drives have no moving parts and consume less power than hard disks. Also, memory may use more power than hard disks. Large caches, which are used to avoid hitting the memory wall, may also consume a large amount of power.</li></ul>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Security</span></span>\r\nFull disk encryption, volume and virtual disk encryption, andor file/folder encryption is readily available for most storage devices.\r\nHardware memory encryption is available in Intel Architecture, supporting Total Memory Encryption (TME) and page granular memory encryption with multiple keys (MKTME) and in SPARC M7 generation since October 2015.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Storage_General_Purpose_Disk_Arrays.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":306,"title":"Manage Risks"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":175,"title":"Aging IT infrastructure"},{"id":180,"title":"Inability to forecast execution timelines"},{"id":346,"title":"Shortage of inhouse IT resources"},{"id":370,"title":"No automated business processes"},{"id":386,"title":"Risk of lost access to data and IT systems"},{"id":393,"title":"Complex and non-transparent business processes"}]}},"categories":[{"id":1,"title":"Desktop virtualization","alias":"desktop-virtualization","description":" Desktop virtualization is a virtualization technology that separates an individual's PC applications from his or her desktop. Virtualized desktops are generally hosted on a remote central server, rather than the hard drive of the personal computer. Because the client-server computing model is used in virtualizing desktops, desktop virtualization is also known as client virtualization.\r\nDesktop virtualization provides a way for users to maintain their individual desktops on a single, central server. The users may be connected to the central server through a LAN, WAN or over the Internet.\r\nDesktop virtualization has many benefits, including a lower total cost of ownership (TCO), increased security, reduced energy costs, reduced downtime and centralized management.\r\nLimitations of desktop virtualization include difficulty in maintenance and set up of printer drivers; increased downtime in case of network failures; complexity and costs involved in VDI deployment and security risks in the event of improper network management.<br /><br />","materialsDescription":" <span style=\"font-weight: bold; \">What are types of desktop virtualization technologies?</span>\r\nHost-based forms of desktop virtualization require that users view and interact with their virtual desktops over a network by using a remote display protocol. Because processing takes place in a data center, client devices can be traditional PCs, but also thin clients, zero clients, smartphones and tablets. Examples of host-based desktop virtualization technology include:\r\n<span style=\"font-weight: bold; \">Host-based virtual machines:</span> Each user connects to an individual VM that is hosted in a data center. The user may connect to the same VM every time, allowing for personalization (known as a persistent desktop), or be given a fresh VM at each login (a nonpersistent desktop).\r\n<span style=\"font-weight: bold; \">Shared hosted:</span> Users connect to a shared desktop that runs on a server. Microsoft Remote Desktop Services, formerly Terminal Services, takes this client-server approach. Users may also connect to individual applications running on a server; this technology is an example of application virtualization.\r\n<span style=\"font-weight: bold; \">Host-based physical machines:</span> The operating system runs directly on another device's physical hardware.\r\nClient virtualization requires processing to occur on local hardware; the use of thin clients, zero clients and mobile devices is not possible. These types of desktop virtualization include:\r\n<span style=\"font-weight: bold; \">OS image streaming:</span> The operating system runs on local hardware, but it boots to a remote disk image across the network. This is useful for groups of desktops that use the same disk image. OS image streaming, also known as remote desktop virtualization, requires a constant network connection in order to function.\r\n<span style=\"font-weight: bold; \">Client-based virtual machines:</span> A VM runs on a fully functional PC, with a hypervisor in place. Client-based virtual machines can be managed by regularly syncing the disk image with a server, but a constant network connection is not necessary in order for them to function.\r\n<span style=\"font-weight: bold;\">Desktop virtualization vs. virtual desktop infrastructure</span>\r\nThe terms <span style=\"font-style: italic;\">desktop virtualization</span> and virtual desktop infrastructure (VDI) are often used interchangeably, but they are not the same. While VDI is a type of desktop virtualization, not all desktop virtualization uses VDI.\r\nVDI refers to the use of host-based VMs to deliver virtual desktops, which emerged in 2006 as an alternative to Terminal Services and Citrix's client-server approach to desktop virtualization technology. Other types of desktop virtualization -- including the shared hosted model, host-based physical machines and all methods of client virtualization -- are not examples of VDI.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Desktop_virtualization.png"},{"id":7,"title":"Storage - General-Purpose Disk Arrays","alias":"storage-general-purpose-disk-arrays","description":" General-purpose disk arrays refer to disk storage systems that work together with specialized array controllers to achieve high data transfer. They are designed to fulfill the requirement of a diverse set of workloads such as databases, virtual desktop infrastructure, and virtual networks. The market size in the study represents the revenue generated through various deployment modes such as NAS, SAN, and DAS. Some of the technologies used in the general-purpose disk arrays market include PATA, SATA, and SCSI. The application areas of general-purpose disk arrays include BFSI, IT, government, education & research, healthcare, and manufacturing.\r\nGeneral-Purpose Disk Arrays market in BFSI accounts for the largest revenue. IT industry and governments are investing heavily in the general-purpose disk arrays, as a huge amount of voluminous data is getting generated which requires high storage capacity to store the classified data for analytics purpose and consumer insights. General-Purpose Disk Arrays market in healthcare is expected to show robust growth during the forecast period, as hospitals are adopting the latest technology with huge storage spaces in an attempt to track the patient history for providing better healthcare facilities.\r\nThe global general-purpose disk arrays market is fragmented owing to the presence of a large number of local and regional players, which intensifies the degree of rivalry. The market is growing at a notable pace, which leads to high intensity of rivalry. Key market players such as Dell EMC, HPE, and IBM Corporation seek to gain market share through continuous innovations in storage technology. Some of the other key players operating in a market are Hitachi, Seagate Technologies, NetApp, Promise Technologies, Quantum Corporation, Oracle Corporation, Fujitsu, DataDirect Networks, and Infortrend Technology Inc. Key competitors are specifically focusing on Asia-Pacific and Middle-East & Africa regions, as they show strong tendency to adopt the general-purpose disk arrays in coming years.","materialsDescription":"<span style=\"font-weight: bold;\">What are the characteristics of storage?</span>\r\nStorage technologies at all levels of the storage hierarchy can be differentiated by evaluating certain core characteristics as well as measuring characteristics specific to a particular implementation. These core characteristics are volatility, mutability, accessibility, and addressability. For any particular implementation of any storage technology, the characteristics worth measuring are capacity and performance.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Volatility</span></span>\r\nNon-volatile memory retains the stored information even if not constantly supplied with electric power. It is suitable for long-term storage of information. Volatile memory requires constant power to maintain the stored information. The fastest memory technologies are volatile ones, although that is not a universal rule. Since the primary storage is required to be very fast, it predominantly uses volatile memory.\r\nDynamic random-access memory is a form of volatile memory that also requires the stored information to be periodically reread and rewritten, or refreshed, otherwise it would vanish. Static random-access memory is a form of volatile memory similar to DRAM with the exception that it never needs to be refreshed as long as power is applied; it loses its content when the power supply is lost.\r\nAn uninterruptible power supply (UPS) can be used to give a computer a brief window of time to move information from primary volatile storage into non-volatile storage before the batteries are exhausted. Some systems, for example EMC Symmetrix, have integrated batteries that maintain volatile storage for several minutes.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Mutability</span></span>\r\n<span style=\"font-weight: bold;\">Read/write storage or mutable storage</span>\r\n<div class=\"indent\">Allows information to be overwritten at any time. A computer without some amount of read/write storage for primary storage purposes would be useless for many tasks. Modern computers typically use read/write storage also for secondary storage.</div>\r\n<span style=\"font-weight: bold;\">Slow write, fast read storage</span>\r\n<div class=\"indent\">Read/write storage which allows information to be overwritten multiple times, but with the write operation being much slower than the read operation. Examples include CD-RW and SSD.</div>\r\n<span style=\"font-weight: bold;\">Write once storage</span>\r\n<div class=\"indent\">Write Once Read Many (WORM) allows the information to be written only once at some point after manufacture. Examples include semiconductor programmable read-only memory and CD-R.</div>\r\n<span style=\"font-weight: bold;\">Read only storage</span>\r\n<div class=\"indent\">Retains the information stored at the time of manufacture. Examples include mask ROM ICs and CD-ROM.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Accessibility</span></span>\r\n<span style=\"font-weight: bold;\">Random access</span>\r\n<div class=\"indent\">Any location in storage can be accessed at any moment in approximately the same amount of time. Such characteristic is well suited for primary and secondary storage. Most semiconductor memories and disk drives provide random access.</div>\r\n<span style=\"font-weight: bold;\">Sequential access</span>\r\n<div class=\"indent\">The accessing of pieces of information will be in a serial order, one after the other; therefore the time to access a particular piece of information depends upon which piece of information was last accessed. Such characteristic is typical of off-line storage.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Addressability</span></span>\r\n<span style=\"font-weight: bold;\">Location-addressable</span>\r\n<div class=\"indent\">Each individually accessible unit of information in storage is selected with its numerical memory address. In modern computers, location-addressable storage usually limits to primary storage, accessed internally by computer programs, since location-addressability is very efficient, but burdensome for humans.</div>\r\n<span style=\"font-weight: bold;\">File addressable</span>\r\n<div class=\"indent\">Information is divided into files of variable length, and a particular file is selected with human-readable directory and file names. The underlying device is still location-addressable, but the operating system of a computer provides the file system abstraction to make the operation more understandable. In modern computers, secondary, tertiary and off-line storage use file systems.</div>\r\n<span style=\"font-weight: bold;\">Content-addressable</span>\r\n<div class=\"indent\">Each individually accessible unit of information is selected based on the basis of (part of) the contents stored there. Content-addressable storage can be implemented using software (computer program) or hardware (computer device), with hardware being faster but more expensive option. Hardware content addressable memory is often used in a computer's CPU cache.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Capacity</span></span>\r\n<span style=\"font-weight: bold;\">Raw capacity</span>\r\n<div class=\"indent\">The total amount of stored information that a storage device or medium can hold. It is expressed as a quantity of bits or bytes (e.g. 10.4 megabytes).</div>\r\n<span style=\"font-weight: bold;\">Memory storage density</span>\r\n<div class=\"indent\">The compactness of stored information. It is the storage capacity of a medium divided with a unit of length, area or volume (e.g. 1.2 megabytes per square inch).</div>\r\n\r\n<span style=\"font-weight: bold;\"><span style=\"font-style: italic;\">Performance</span></span>\r\n<span style=\"font-weight: bold;\">Latency</span>\r\n<div class=\"indent\">The time it takes to access a particular location in storage. The relevant unit of measurement is typically nanosecond for primary storage, millisecond for secondary storage, and second for tertiary storage. It may make sense to separate read latency and write latency (especially for non-volatile memory[8]) and in case of sequential access storage, minimum, maximum and average latency.</div>\r\n<span style=\"font-weight: bold;\">Throughput</span>\r\n<div class=\"indent\">The rate at which information can be read from or written to the storage. In computer data storage, throughput is usually expressed in terms of megabytes per second (MB/s), though bit rate may also be used. As with latency, read rate and write rate may need to be differentiated. Also accessing media sequentially, as opposed to randomly, typically yields maximum throughput.</div>\r\n<span style=\"font-weight: bold;\">Granularity</span>\r\n<div class=\"indent\">The size of the largest "chunk" of data that can be efficiently accessed as a single unit, e.g. without introducing additional latency.</div>\r\n<span style=\"font-weight: bold;\">Reliability</span>\r\n<div class=\"indent\">The probability of spontaneous bit value change under various conditions, or overall failure rate.</div>\r\nUtilities such as hdparm and sar can be used to measure IO performance in Linux.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Energy use</span></span>\r\n<ul><li>Storage devices that reduce fan usage, automatically shut-down during inactivity, and low power hard drives can reduce energy consumption by 90 percent.</li><li>2.5-inch hard disk drives often consume less power than larger ones. Low capacity solid-state drives have no moving parts and consume less power than hard disks. Also, memory may use more power than hard disks. Large caches, which are used to avoid hitting the memory wall, may also consume a large amount of power.</li></ul>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Security</span></span>\r\nFull disk encryption, volume and virtual disk encryption, andor file/folder encryption is readily available for most storage devices.\r\nHardware memory encryption is available in Intel Architecture, supporting Total Memory Encryption (TME) and page granular memory encryption with multiple keys (MKTME) and in SPARC M7 generation since October 2015.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Storage_General_Purpose_Disk_Arrays.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://ko.com.ua/it-proekt_v_raben_ukraina_112315","title":"Media"}},"comments":[],"referencesCount":0},{"id":941,"title":"HPE StoreVirtual VSA, HPE Proliant DL for branded store","description":"Description is not ready yet","alias":"hpe-storevirtual-vsa-hpe-proliant-dl-for-branded-store","roi":0,"seo":{"title":"HPE StoreVirtual VSA, HPE Proliant DL for branded store","keywords":"","description":"Description is not ready yet","og:title":"HPE StoreVirtual VSA, HPE Proliant DL for branded store","og:description":"Description is not ready yet"},"deal_info":"","user":{"id":7274,"title":"SANAHUNT Luxury Department Store","logoURL":"https://old.roi4cio.com/uploads/roi/company/Sanahunt.jpg","alias":"sanahunt-luxury-department-store","address":"ул. М. Грушевского, 8/16, Киев, 02000","roles":[],"description":" The brand new fashion room was opened in the historical center of Kyiv in 1998 offering its own philosophy – to live in Sanahunt style. Since then, Sanahunt Luxury Department Store has become the leader of the Ukrainian fashion world, setting the rhythm and tone of Kyiv cultural life, and accumulating in its space the most refined and fashionable pieces. Sanahunt – is the biggest luxury store, occupying 7000 sq. m. of five-storey antique mansion in the center of the capital. Harmonious atmosphere, exclusive interior with plenty of glass and light, art pieces represented in the store – all these things have made Sanahunt a mecca for celebrities and fashionistas from all over the world. Overall, more than 250 world-famous brands are represented in Sanahunt Luxury Department Store - collections of ladies’ and men’s wear, shoes, jewelry, accessories, rare books editions, exclusive household presents, as well as conceptual cosmetics brands and ‘haute perfumerie’ collections.\r\nSource: https://www.linkedin.com/company/sanahunt-group/about/","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":2,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.sanahunt.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"SANAHUNT Luxury Department Store","keywords":"","description":" The brand new fashion room was opened in the historical center of Kyiv in 1998 offering its own philosophy – to live in Sanahunt style. Since then, Sanahunt Luxury Department Store has become the leader of the Ukrainian fashion world, setting the rhythm and t","og:title":"SANAHUNT Luxury Department Store","og:description":" The brand new fashion room was opened in the historical center of Kyiv in 1998 offering its own philosophy – to live in Sanahunt style. Since then, Sanahunt Luxury Department Store has become the leader of the Ukrainian fashion world, setting the rhythm and t","og:image":"https://old.roi4cio.com/uploads/roi/company/Sanahunt.jpg"},"eventUrl":""},"supplier":{"id":249,"title":"Integrity Systems","logoURL":"https://old.roi4cio.com/uploads/roi/company/integrity_systems.png","alias":"integrity-systems","address":"Київ 01032 вул. Саксаганського, 119, оф. 26","roles":[],"description":"Integrity Systems is a young company, system integrator dynamic. Integrity Systems specializes in the design and implementation of IT solutions for medium and large enterprises. The company "Systems Integration" was founded in 2007 and focuses its activities on solutions using various technologies IT business objectives corporate customers in Ukraine. The main asset is our team of qualified consultants, project managers and engineers, allowing us to offer our clients services that cover the full life cycle of IT solutions - from analyzing business objectives, design, implementation and further maintenance and support.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":197,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":15,"vendorImplementationsCount":0,"vendorPartnersCount":9,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://integritysys.com.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Integrity Systems","keywords":"Systems, solutions, Integrity, implementation, design, company, business, objectives","description":"Integrity Systems is a young company, system integrator dynamic. Integrity Systems specializes in the design and implementation of IT solutions for medium and large enterprises. The company "Systems Integration" was founded in 2007 and focuses its ac","og:title":"Integrity Systems","og:description":"Integrity Systems is a young company, system integrator dynamic. Integrity Systems specializes in the design and implementation of IT solutions for medium and large enterprises. The company "Systems Integration" was founded in 2007 and focuses its ac","og:image":"https://old.roi4cio.com/uploads/roi/company/integrity_systems.png"},"eventUrl":""},"vendors":[{"id":172,"title":"Hewlett Packard Enterprise","logoURL":"https://old.roi4cio.com/uploads/roi/company/HPE_logo.jpeg","alias":"hewlett-packard-enterprise","address":"","roles":[],"description":"The Hewlett Packard Enterprise Company (commonly referred to as HPE) is an American multinational enterprise information technology company based in San Jose, California,[2] founded on 1 November 2015 as part of splitting of the Hewlett-Packard company. HPE is a business-focused organization with two divisions: Enterprise Group, which works in servers, storage, networking, consulting and support, and Financial Services. On 4 December HPE reported FY2018 net revenue of $30.9 billion, up 7% from the prior year period.","companyTypes":[],"products":{},"vendoredProductsCount":19,"suppliedProductsCount":19,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":26,"vendorPartnersCount":0,"supplierPartnersCount":451,"b4r":0,"categories":{},"companyUrl":"www.hpe.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Hewlett Packard Enterprise","keywords":"Packard, Hewlett, Enterprise, company, 2015, November, Hewlett-Packard, now-split","description":"The Hewlett Packard Enterprise Company (commonly referred to as HPE) is an American multinational enterprise information technology company based in San Jose, California,[2] founded on 1 November 2015 as part of splitting of the Hewlett-Packard company. HPE is","og:title":"Hewlett Packard Enterprise","og:description":"The Hewlett Packard Enterprise Company (commonly referred to as HPE) is an American multinational enterprise information technology company based in San Jose, California,[2] founded on 1 November 2015 as part of splitting of the Hewlett-Packard company. HPE is","og:image":"https://old.roi4cio.com/uploads/roi/company/HPE_logo.jpeg"},"eventUrl":""}],"products":[{"id":384,"logo":false,"scheme":false,"title":"HPE ProLiant DL360 Gen9 Server","vendorVerified":0,"rating":"2.00","implementationsCount":2,"suppliersCount":0,"alias":"hpe-proliant-dl360-gen9-server","companyTypes":[],"description":"Does your data center need a performance driven dense 1U server that you can confidently deploy for virtualization, data base, or high-performance computing? The HPE ProLiant DL360 Gen9 Server delivers a 1U chassis with up to two processors, delivering an optimal unit that combines high-performance, low energy consumption, improved uptime, and increased density. Leveraging Intel’s latest E5-2600 v4 processors with 21%1 performance gain, plus the latest HPE 2400MHz DDR4 SmartMemory supporting up to 3 TB and up to 23%2 performance increase. Manage your DL360 Gen9 Server in any IT environment by automating the most essential server lifecycle management tasks WITH OneView and iLO: deploy, update, monitor and maintain with ease.\r\n\r\nWhat's new\r\n\r\nIntel® Xeon® E5-2600 v4 Processors with 21%1 performance gain and up to 22 cores\r\n2400MHz DDR4 memory offering up to 23%2 performance gain and 3.0 TB max capacity with 128GB LRDIMMs\r\nHPE 25Gb Ethernet Adapters to help improve performance with latency sensitive applications\r\nIndustry-leading NVMe PCIe SFF SSDs up to 2.0 TB for low latency and top performance\r\nDirect connect up to (16) drives with HPE Smart Array P840ar Controller\r\nEnhanced security with Trusted Platform Module (TPM) 2.0\r\nFeatures\r\n\r\nDense and Flexible High-Performance Compute Power\r\nThe HPE ProLiant DL360 Gen9 Server has up to (24) HPE DDR4 SmartMemory DIMM slots with up to 3.0 TB max memory, built-in intelligence to improve performance, reduce downtime and energy costs resulting in up to 23% better throughput performance.2\r\nYou have a choice of Embedded 4x1GbE, HPE FlexibleLOM, PCIe standup 1GbE to 10/25GbE to 40GbE adapters which provides flexibility of networking bandwidth and fabric so you can adapt and grow to changing business needs.\r\nAchieve greater capacity with flexible drive configuration options with up to ten SFF, four LFF drive along with option to support up to six NVMe PCIe SSDs delivering optimal performance, capacity, and reliability to meet various customer segments and workload requirements at the right economics.\r\nHPE Persistent Memory, the world’s first Non-volatile DIMM (NVDIMM) optimized on ProLiant, offering unprecedented levels of performance for databases and analytic workloads.\r\nIndustry-Leading Energy Efficiency for a Quicker Return on Your Investment\r\nThe HPE ProLiant DL360 Gen9 Server supports industry standard Intel® Xeon® E5-2600 v3 and E5-2600 v4 processors with up to (22) cores and 3.0 TB of HPE DDR4 SmartMemory.\r\nThe HPE ProLiant DL360 Gen9 Server supports improved ambient temperature standards with HPE Extended Ambient Operating Support (ASHRAE A3 and A4) helping to reduce your cooling expenses.3\r\nHigh efficiency redundant HPE Flexible Slot Power Supplies provide up to 96% efficiency (Titanium), HPE Flexible Slot Battery Backup module and support for the HPE Power Discovery Services offering.\r\nENERGY STAR® qualified server configurations illustrate a continued commitment to helping customers conserve energy and save money.\r\nAgile Infrastructure Management for Accelerating IT Service Delivery\r\nWith the HPE ProLiant DL360 Gen9 Server, HPE OneView provides infrastructure management for automation simplicity across servers, storage and networking.\r\nOnline personalized dashboard for Converged Infrastructure health monitoring and support management with HPE Insight Online.\r\nEmbedded management to deploy, monitor and support your DL360 Gen9 Server remotely, out of band with HPE iLO.\r\nConfigure in Unified Extensible Firmware Interface (UEFI) boot mode, provision local and remote with Intelligent Provisioning and Scripting Toolkits.\r\nOptimize firmware and driver updates and reduce downtime with Smart Update, consisting of Smart Update Manager (SUM) and Service Pack for ProLiant (SPP).\r\nIndustry Leading Serviceability\r\nThe HPE ProLiant DL360 Gen9 Server comes with a complete set of Technology Services, delivering confidence, reducing risk and helping customers realize agility and stability. HPE provides consulting to transform your infrastructure; services to deploy, migrate and support your new ProLiant Servers.\r\nHPE provides consulting advice to transform and modernize your infrastructure; services to deploy, migrate and support your new ProLiant servers and education to help you succeed quickly.","shortDescription":"The HPE ProLiant DL360 Gen9 Server delivers a 1U chassis with up to two processors, delivering an optimal unit that combines high-performance, low energy consumption, improved uptime, and increased density.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":4,"sellingCount":2,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"HPE ProLiant DL360 Gen9 Server","keywords":"with, ProLiant, performance, Server, DL360, Gen9, your, support","description":"Does your data center need a performance driven dense 1U server that you can confidently deploy for virtualization, data base, or high-performance computing? The HPE ProLiant DL360 Gen9 Server delivers a 1U chassis with up to two processors, delivering an opti","og:title":"HPE ProLiant DL360 Gen9 Server","og:description":"Does your data center need a performance driven dense 1U server that you can confidently deploy for virtualization, data base, or high-performance computing? The HPE ProLiant DL360 Gen9 Server delivers a 1U chassis with up to two processors, delivering an opti"},"eventUrl":"","translationId":385,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":435,"title":"Rack Server","alias":"rack-server","description":"A rack mount server is a great way to maximize your shelf space by packing a lot of servers into a small space. Rackmount servers are typically easier for administrators to manage due to proximity, modularity and better cable management. Lockable rack cabinet doors and steel server front panels provide an additional level of physical security. Additionally, rack unit designed servers are better able to keep the server components cool than traditional tower form factor. Industry standard 19-inch racks will allow you to easily expand your business without taking up more valuable floor space.\r\nThere is a lot of thought that needs to go into which size rack server is best bet for your project. Both current requirements and future expansion plans need to be taken into account to ensure your server remains capable in the future.\r\nBoth large and small projects can be built on the 1U server platform. "U" stands for unit, “unit”, and this means thickness: server rack 1U = 1.75 inches or 44 mm wide. A reasonable amount of storage can fit within a 1U, processing power has no limits, and some models even allow up to two PCI-Express cards. Modern computer hardware uses much less power than it ever has in the past, which means less heat generation. Some 1U servers to still produce some acoustic noise, but is nowhere near the level of needing earmuffs like the old days. The only reason to go up in size is for additional expansion options.\r\n2U models allow for multiple "low-profile" PCI-Express cards while keeping a compact form factor and also providing some additional storage space. If the plan is to use multiple full height cards, then 3U or 4U servers should be the focus. The 4U models are very popular and offer flexible options. The 3U models do have limitations on expansion card compatibility and are really only for situations where rack space needs to be absolutely optimized (14x3U servers or 10x4U servers can fit in a 42u rack).","materialsDescription":"<span style=\"font-weight: bold;\">What is a ‘rack unit’?</span>\r\nA rack unit is the designated unit of measurement used when describing or quantifying the vertical space you have available in any equipment rack. One unit is equal to 1.75 inches, or 4.45 centimeters. Any equipment that has the ability to be mounted onto a rack is generally designed in a standard size to fit into many different server rack heights. It’s actually been standardized by the Electronic Industries Alliance (EIA). The most common heights are between 8U to 50U, but customization is also a viable option if you’re working with nonstandard sizes.\r\n<span style=\"font-weight: bold;\">Are there any specific ventilation requirements with server racks?</span>\r\nOver 65% of IT equipment failures are directly attributed to inadequate, poorly maintained, or failed air conditioning in the server room. So yes, proper ventilation is a critical part of maintaining any data center. Some cabinet manufacturers construct side panel ventilation instead of front and back ventilation, but experts say it’s inadequate for rack mount servers. This can be especially dangerous if more than one cabinet is being set up at once. The importance of proper ventilation should not be taken lightly, and you should always opt for front to back ventilation except in network applications where the IT equipment exhausts out the side.\r\n<span style=\"font-weight: bold;\">What is meant by ‘server rack depth’?</span>\r\nServer rack depth is a critical aspect of the ventilation process. Connectworld.net says, “Server cabinet depth is important not only because it has to allow room for the depth of the particular equipment to be rack-mounted (deep servers vs. routers or switches), but also it has to allow sufficient room for cables, PDU’s as well as airflow.<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Rack_Server.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":4844,"logo":false,"scheme":false,"title":"HPE StoreVirtual VSA Software","vendorVerified":0,"rating":"0.00","implementationsCount":2,"suppliersCount":0,"alias":"hpe-storevirtual-vsa-software","companyTypes":[],"description":"For developing converged compute and storage solutions in virtualized environments, HPE StoreVirtual VSA Software delivers high performance shared storage on your choice of servers and SSD or HDD media. Built on proven data services technology, HPE StoreVirtual VSA delivers software-defined storage by virtualizing up to 50TB of disk capacity per server running VMware vSphere, Microsoft Hyper-V or Linux KVM. The HPE StoreVirtual VSA eliminates the need for external shared storage required to implement advanced hypervisor features.\r\nHPE StoreVirtual VSA uses scale-out, distributed clustering to provide a pool of storage with enterprise storage features and simple management at reduced cost. Multiple StoreVirtual VSAs running on multiple servers create a clustered pool of storage with the ability to make data highly available by protecting volumes with Network RAID. Adding more StoreVirtual VSAs to the cluster grows the storage pool. With Network RAID, blocks of data are striped and mirrored across multiple StoreVirtual VSAs, allowing volumes and applications to stay online in the event of disk, storage subsystem or server failure. iSCSI connectivity on HPE StoreVirtual VSA supports the use of the storage pools by hypervisors as well as other applications. HPE StoreVirtual VSA fully supports 1GbE and 10GbE environments for connections to both virtual and physical hosts.<br />\r\nLeverage existing converged infrastructure with StoreVirtual VSA and enable higher levels of protection for business critical data services. Easy to use installation wizards assist in the deployment of HPE StoreVirtual VSA on VMware vSphere or Microsoft HyperV. Using the Centralized Management Console, StoreVirtual VSA can be deployed at remote sites and managed centrally as a virtual storage system.<br /><br /><span style=\"font-weight: bold;\">Benefits</span>\r\n<ul><li>Gain the benefits of an array without requiring a physical storage infrastructure by virtualizing storage resources in a server – reduces cost, footprint, power and cooling</li></ul>\r\n<ul><li>Take advantage of hypervisor advanced features such as vMotion and Live Migration without purchasing external storage system</li></ul>\r\n<ul><li>Create a storage pool which is available to hypervisors and other applications via iSCSI</li></ul>\r\n<ul><li>Comes complete with all storage management features - no additional software needed</li></ul>\r\n<ul><li>Easily build a clustered, highly available converged storage pool on existing servers</li></ul>\r\n<ul><li>Utilize internal (SATA, MDL, SAS, SSD, PCIe Flash) and external (iSCSI, FC, SAS) storage options supported by VMware, Microsoft or Linux as back end storage</li></ul>\r\n<ul><li>Enable disaster recovery (DR) solutions for remote or branch offices that do not have budget, space, or power for servers and a traditional array</li></ul>\r\n<ul><li>Easily replicate volumes between StoreVirtual VSA and 3PAR with Peer Copy</li></ul>\r\n<ul><li>Reduce cost and complexity with integrated backup to HPE StoreOnce systems using HPE RMC software</li></ul>","shortDescription":"The StoreVirtual VSA software delivers the scalability and high availability of HP StoreVirtual arrays to small and midsize customers.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":7,"sellingCount":14,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"HPE StoreVirtual VSA Software","keywords":"","description":"For developing converged compute and storage solutions in virtualized environments, HPE StoreVirtual VSA Software delivers high performance shared storage on your choice of servers and SSD or HDD media. Built on proven data services technology, HPE StoreVirtua","og:title":"HPE StoreVirtual VSA Software","og:description":"For developing converged compute and storage solutions in virtualized environments, HPE StoreVirtual VSA Software delivers high performance shared storage on your choice of servers and SSD or HDD media. Built on proven data services technology, HPE StoreVirtua"},"eventUrl":"","translationId":4845,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":1,"title":"Desktop virtualization","alias":"desktop-virtualization","description":" Desktop virtualization is a virtualization technology that separates an individual's PC applications from his or her desktop. Virtualized desktops are generally hosted on a remote central server, rather than the hard drive of the personal computer. Because the client-server computing model is used in virtualizing desktops, desktop virtualization is also known as client virtualization.\r\nDesktop virtualization provides a way for users to maintain their individual desktops on a single, central server. The users may be connected to the central server through a LAN, WAN or over the Internet.\r\nDesktop virtualization has many benefits, including a lower total cost of ownership (TCO), increased security, reduced energy costs, reduced downtime and centralized management.\r\nLimitations of desktop virtualization include difficulty in maintenance and set up of printer drivers; increased downtime in case of network failures; complexity and costs involved in VDI deployment and security risks in the event of improper network management.<br /><br />","materialsDescription":" <span style=\"font-weight: bold; \">What are types of desktop virtualization technologies?</span>\r\nHost-based forms of desktop virtualization require that users view and interact with their virtual desktops over a network by using a remote display protocol. Because processing takes place in a data center, client devices can be traditional PCs, but also thin clients, zero clients, smartphones and tablets. Examples of host-based desktop virtualization technology include:\r\n<span style=\"font-weight: bold; \">Host-based virtual machines:</span> Each user connects to an individual VM that is hosted in a data center. The user may connect to the same VM every time, allowing for personalization (known as a persistent desktop), or be given a fresh VM at each login (a nonpersistent desktop).\r\n<span style=\"font-weight: bold; \">Shared hosted:</span> Users connect to a shared desktop that runs on a server. Microsoft Remote Desktop Services, formerly Terminal Services, takes this client-server approach. Users may also connect to individual applications running on a server; this technology is an example of application virtualization.\r\n<span style=\"font-weight: bold; \">Host-based physical machines:</span> The operating system runs directly on another device's physical hardware.\r\nClient virtualization requires processing to occur on local hardware; the use of thin clients, zero clients and mobile devices is not possible. These types of desktop virtualization include:\r\n<span style=\"font-weight: bold; \">OS image streaming:</span> The operating system runs on local hardware, but it boots to a remote disk image across the network. This is useful for groups of desktops that use the same disk image. OS image streaming, also known as remote desktop virtualization, requires a constant network connection in order to function.\r\n<span style=\"font-weight: bold; \">Client-based virtual machines:</span> A VM runs on a fully functional PC, with a hypervisor in place. Client-based virtual machines can be managed by regularly syncing the disk image with a server, but a constant network connection is not necessary in order for them to function.\r\n<span style=\"font-weight: bold;\">Desktop virtualization vs. virtual desktop infrastructure</span>\r\nThe terms <span style=\"font-style: italic;\">desktop virtualization</span> and virtual desktop infrastructure (VDI) are often used interchangeably, but they are not the same. While VDI is a type of desktop virtualization, not all desktop virtualization uses VDI.\r\nVDI refers to the use of host-based VMs to deliver virtual desktops, which emerged in 2006 as an alternative to Terminal Services and Citrix's client-server approach to desktop virtualization technology. Other types of desktop virtualization -- including the shared hosted model, host-based physical machines and all methods of client virtualization -- are not examples of VDI.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Desktop_virtualization.png"},{"id":7,"title":"Storage - General-Purpose Disk Arrays","alias":"storage-general-purpose-disk-arrays","description":" General-purpose disk arrays refer to disk storage systems that work together with specialized array controllers to achieve high data transfer. They are designed to fulfill the requirement of a diverse set of workloads such as databases, virtual desktop infrastructure, and virtual networks. The market size in the study represents the revenue generated through various deployment modes such as NAS, SAN, and DAS. Some of the technologies used in the general-purpose disk arrays market include PATA, SATA, and SCSI. The application areas of general-purpose disk arrays include BFSI, IT, government, education & research, healthcare, and manufacturing.\r\nGeneral-Purpose Disk Arrays market in BFSI accounts for the largest revenue. IT industry and governments are investing heavily in the general-purpose disk arrays, as a huge amount of voluminous data is getting generated which requires high storage capacity to store the classified data for analytics purpose and consumer insights. General-Purpose Disk Arrays market in healthcare is expected to show robust growth during the forecast period, as hospitals are adopting the latest technology with huge storage spaces in an attempt to track the patient history for providing better healthcare facilities.\r\nThe global general-purpose disk arrays market is fragmented owing to the presence of a large number of local and regional players, which intensifies the degree of rivalry. The market is growing at a notable pace, which leads to high intensity of rivalry. Key market players such as Dell EMC, HPE, and IBM Corporation seek to gain market share through continuous innovations in storage technology. Some of the other key players operating in a market are Hitachi, Seagate Technologies, NetApp, Promise Technologies, Quantum Corporation, Oracle Corporation, Fujitsu, DataDirect Networks, and Infortrend Technology Inc. Key competitors are specifically focusing on Asia-Pacific and Middle-East & Africa regions, as they show strong tendency to adopt the general-purpose disk arrays in coming years.","materialsDescription":"<span style=\"font-weight: bold;\">What are the characteristics of storage?</span>\r\nStorage technologies at all levels of the storage hierarchy can be differentiated by evaluating certain core characteristics as well as measuring characteristics specific to a particular implementation. These core characteristics are volatility, mutability, accessibility, and addressability. For any particular implementation of any storage technology, the characteristics worth measuring are capacity and performance.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Volatility</span></span>\r\nNon-volatile memory retains the stored information even if not constantly supplied with electric power. It is suitable for long-term storage of information. Volatile memory requires constant power to maintain the stored information. The fastest memory technologies are volatile ones, although that is not a universal rule. Since the primary storage is required to be very fast, it predominantly uses volatile memory.\r\nDynamic random-access memory is a form of volatile memory that also requires the stored information to be periodically reread and rewritten, or refreshed, otherwise it would vanish. Static random-access memory is a form of volatile memory similar to DRAM with the exception that it never needs to be refreshed as long as power is applied; it loses its content when the power supply is lost.\r\nAn uninterruptible power supply (UPS) can be used to give a computer a brief window of time to move information from primary volatile storage into non-volatile storage before the batteries are exhausted. Some systems, for example EMC Symmetrix, have integrated batteries that maintain volatile storage for several minutes.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Mutability</span></span>\r\n<span style=\"font-weight: bold;\">Read/write storage or mutable storage</span>\r\n<div class=\"indent\">Allows information to be overwritten at any time. A computer without some amount of read/write storage for primary storage purposes would be useless for many tasks. Modern computers typically use read/write storage also for secondary storage.</div>\r\n<span style=\"font-weight: bold;\">Slow write, fast read storage</span>\r\n<div class=\"indent\">Read/write storage which allows information to be overwritten multiple times, but with the write operation being much slower than the read operation. Examples include CD-RW and SSD.</div>\r\n<span style=\"font-weight: bold;\">Write once storage</span>\r\n<div class=\"indent\">Write Once Read Many (WORM) allows the information to be written only once at some point after manufacture. Examples include semiconductor programmable read-only memory and CD-R.</div>\r\n<span style=\"font-weight: bold;\">Read only storage</span>\r\n<div class=\"indent\">Retains the information stored at the time of manufacture. Examples include mask ROM ICs and CD-ROM.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Accessibility</span></span>\r\n<span style=\"font-weight: bold;\">Random access</span>\r\n<div class=\"indent\">Any location in storage can be accessed at any moment in approximately the same amount of time. Such characteristic is well suited for primary and secondary storage. Most semiconductor memories and disk drives provide random access.</div>\r\n<span style=\"font-weight: bold;\">Sequential access</span>\r\n<div class=\"indent\">The accessing of pieces of information will be in a serial order, one after the other; therefore the time to access a particular piece of information depends upon which piece of information was last accessed. Such characteristic is typical of off-line storage.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Addressability</span></span>\r\n<span style=\"font-weight: bold;\">Location-addressable</span>\r\n<div class=\"indent\">Each individually accessible unit of information in storage is selected with its numerical memory address. In modern computers, location-addressable storage usually limits to primary storage, accessed internally by computer programs, since location-addressability is very efficient, but burdensome for humans.</div>\r\n<span style=\"font-weight: bold;\">File addressable</span>\r\n<div class=\"indent\">Information is divided into files of variable length, and a particular file is selected with human-readable directory and file names. The underlying device is still location-addressable, but the operating system of a computer provides the file system abstraction to make the operation more understandable. In modern computers, secondary, tertiary and off-line storage use file systems.</div>\r\n<span style=\"font-weight: bold;\">Content-addressable</span>\r\n<div class=\"indent\">Each individually accessible unit of information is selected based on the basis of (part of) the contents stored there. Content-addressable storage can be implemented using software (computer program) or hardware (computer device), with hardware being faster but more expensive option. Hardware content addressable memory is often used in a computer's CPU cache.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Capacity</span></span>\r\n<span style=\"font-weight: bold;\">Raw capacity</span>\r\n<div class=\"indent\">The total amount of stored information that a storage device or medium can hold. It is expressed as a quantity of bits or bytes (e.g. 10.4 megabytes).</div>\r\n<span style=\"font-weight: bold;\">Memory storage density</span>\r\n<div class=\"indent\">The compactness of stored information. It is the storage capacity of a medium divided with a unit of length, area or volume (e.g. 1.2 megabytes per square inch).</div>\r\n\r\n<span style=\"font-weight: bold;\"><span style=\"font-style: italic;\">Performance</span></span>\r\n<span style=\"font-weight: bold;\">Latency</span>\r\n<div class=\"indent\">The time it takes to access a particular location in storage. The relevant unit of measurement is typically nanosecond for primary storage, millisecond for secondary storage, and second for tertiary storage. It may make sense to separate read latency and write latency (especially for non-volatile memory[8]) and in case of sequential access storage, minimum, maximum and average latency.</div>\r\n<span style=\"font-weight: bold;\">Throughput</span>\r\n<div class=\"indent\">The rate at which information can be read from or written to the storage. In computer data storage, throughput is usually expressed in terms of megabytes per second (MB/s), though bit rate may also be used. As with latency, read rate and write rate may need to be differentiated. Also accessing media sequentially, as opposed to randomly, typically yields maximum throughput.</div>\r\n<span style=\"font-weight: bold;\">Granularity</span>\r\n<div class=\"indent\">The size of the largest "chunk" of data that can be efficiently accessed as a single unit, e.g. without introducing additional latency.</div>\r\n<span style=\"font-weight: bold;\">Reliability</span>\r\n<div class=\"indent\">The probability of spontaneous bit value change under various conditions, or overall failure rate.</div>\r\nUtilities such as hdparm and sar can be used to measure IO performance in Linux.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Energy use</span></span>\r\n<ul><li>Storage devices that reduce fan usage, automatically shut-down during inactivity, and low power hard drives can reduce energy consumption by 90 percent.</li><li>2.5-inch hard disk drives often consume less power than larger ones. Low capacity solid-state drives have no moving parts and consume less power than hard disks. Also, memory may use more power than hard disks. Large caches, which are used to avoid hitting the memory wall, may also consume a large amount of power.</li></ul>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Security</span></span>\r\nFull disk encryption, volume and virtual disk encryption, andor file/folder encryption is readily available for most storage devices.\r\nHardware memory encryption is available in Intel Architecture, supporting Total Memory Encryption (TME) and page granular memory encryption with multiple keys (MKTME) and in SPARC M7 generation since October 2015.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Storage_General_Purpose_Disk_Arrays.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":7,"title":"Improve Customer Service"},{"id":254,"title":"Centralize management"},{"id":306,"title":"Manage Risks"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":175,"title":"Aging IT infrastructure"},{"id":177,"title":"Decentralized IT systems"},{"id":340,"title":"Low quality of customer service"},{"id":342,"title":"Total high cost of ownership of IT infrastructure (TCO)"},{"id":350,"title":"No monitoring of corporate IT processes"},{"id":370,"title":"No automated business processes"},{"id":373,"title":"IT infrastructure does not meet business tasks"},{"id":376,"title":"Unstructured data"},{"id":386,"title":"Risk of lost access to data and IT systems"},{"id":393,"title":"Complex and non-transparent business processes"}]}},"categories":[{"id":435,"title":"Rack Server","alias":"rack-server","description":"A rack mount server is a great way to maximize your shelf space by packing a lot of servers into a small space. Rackmount servers are typically easier for administrators to manage due to proximity, modularity and better cable management. Lockable rack cabinet doors and steel server front panels provide an additional level of physical security. Additionally, rack unit designed servers are better able to keep the server components cool than traditional tower form factor. Industry standard 19-inch racks will allow you to easily expand your business without taking up more valuable floor space.\r\nThere is a lot of thought that needs to go into which size rack server is best bet for your project. Both current requirements and future expansion plans need to be taken into account to ensure your server remains capable in the future.\r\nBoth large and small projects can be built on the 1U server platform. "U" stands for unit, “unit”, and this means thickness: server rack 1U = 1.75 inches or 44 mm wide. A reasonable amount of storage can fit within a 1U, processing power has no limits, and some models even allow up to two PCI-Express cards. Modern computer hardware uses much less power than it ever has in the past, which means less heat generation. Some 1U servers to still produce some acoustic noise, but is nowhere near the level of needing earmuffs like the old days. The only reason to go up in size is for additional expansion options.\r\n2U models allow for multiple "low-profile" PCI-Express cards while keeping a compact form factor and also providing some additional storage space. If the plan is to use multiple full height cards, then 3U or 4U servers should be the focus. The 4U models are very popular and offer flexible options. The 3U models do have limitations on expansion card compatibility and are really only for situations where rack space needs to be absolutely optimized (14x3U servers or 10x4U servers can fit in a 42u rack).","materialsDescription":"<span style=\"font-weight: bold;\">What is a ‘rack unit’?</span>\r\nA rack unit is the designated unit of measurement used when describing or quantifying the vertical space you have available in any equipment rack. One unit is equal to 1.75 inches, or 4.45 centimeters. Any equipment that has the ability to be mounted onto a rack is generally designed in a standard size to fit into many different server rack heights. It’s actually been standardized by the Electronic Industries Alliance (EIA). The most common heights are between 8U to 50U, but customization is also a viable option if you’re working with nonstandard sizes.\r\n<span style=\"font-weight: bold;\">Are there any specific ventilation requirements with server racks?</span>\r\nOver 65% of IT equipment failures are directly attributed to inadequate, poorly maintained, or failed air conditioning in the server room. So yes, proper ventilation is a critical part of maintaining any data center. Some cabinet manufacturers construct side panel ventilation instead of front and back ventilation, but experts say it’s inadequate for rack mount servers. This can be especially dangerous if more than one cabinet is being set up at once. The importance of proper ventilation should not be taken lightly, and you should always opt for front to back ventilation except in network applications where the IT equipment exhausts out the side.\r\n<span style=\"font-weight: bold;\">What is meant by ‘server rack depth’?</span>\r\nServer rack depth is a critical aspect of the ventilation process. Connectworld.net says, “Server cabinet depth is important not only because it has to allow room for the depth of the particular equipment to be rack-mounted (deep servers vs. routers or switches), but also it has to allow sufficient room for cables, PDU’s as well as airflow.<br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Rack_Server.png"},{"id":1,"title":"Desktop virtualization","alias":"desktop-virtualization","description":" Desktop virtualization is a virtualization technology that separates an individual's PC applications from his or her desktop. Virtualized desktops are generally hosted on a remote central server, rather than the hard drive of the personal computer. Because the client-server computing model is used in virtualizing desktops, desktop virtualization is also known as client virtualization.\r\nDesktop virtualization provides a way for users to maintain their individual desktops on a single, central server. The users may be connected to the central server through a LAN, WAN or over the Internet.\r\nDesktop virtualization has many benefits, including a lower total cost of ownership (TCO), increased security, reduced energy costs, reduced downtime and centralized management.\r\nLimitations of desktop virtualization include difficulty in maintenance and set up of printer drivers; increased downtime in case of network failures; complexity and costs involved in VDI deployment and security risks in the event of improper network management.<br /><br />","materialsDescription":" <span style=\"font-weight: bold; \">What are types of desktop virtualization technologies?</span>\r\nHost-based forms of desktop virtualization require that users view and interact with their virtual desktops over a network by using a remote display protocol. Because processing takes place in a data center, client devices can be traditional PCs, but also thin clients, zero clients, smartphones and tablets. Examples of host-based desktop virtualization technology include:\r\n<span style=\"font-weight: bold; \">Host-based virtual machines:</span> Each user connects to an individual VM that is hosted in a data center. The user may connect to the same VM every time, allowing for personalization (known as a persistent desktop), or be given a fresh VM at each login (a nonpersistent desktop).\r\n<span style=\"font-weight: bold; \">Shared hosted:</span> Users connect to a shared desktop that runs on a server. Microsoft Remote Desktop Services, formerly Terminal Services, takes this client-server approach. Users may also connect to individual applications running on a server; this technology is an example of application virtualization.\r\n<span style=\"font-weight: bold; \">Host-based physical machines:</span> The operating system runs directly on another device's physical hardware.\r\nClient virtualization requires processing to occur on local hardware; the use of thin clients, zero clients and mobile devices is not possible. These types of desktop virtualization include:\r\n<span style=\"font-weight: bold; \">OS image streaming:</span> The operating system runs on local hardware, but it boots to a remote disk image across the network. This is useful for groups of desktops that use the same disk image. OS image streaming, also known as remote desktop virtualization, requires a constant network connection in order to function.\r\n<span style=\"font-weight: bold; \">Client-based virtual machines:</span> A VM runs on a fully functional PC, with a hypervisor in place. Client-based virtual machines can be managed by regularly syncing the disk image with a server, but a constant network connection is not necessary in order for them to function.\r\n<span style=\"font-weight: bold;\">Desktop virtualization vs. virtual desktop infrastructure</span>\r\nThe terms <span style=\"font-style: italic;\">desktop virtualization</span> and virtual desktop infrastructure (VDI) are often used interchangeably, but they are not the same. While VDI is a type of desktop virtualization, not all desktop virtualization uses VDI.\r\nVDI refers to the use of host-based VMs to deliver virtual desktops, which emerged in 2006 as an alternative to Terminal Services and Citrix's client-server approach to desktop virtualization technology. Other types of desktop virtualization -- including the shared hosted model, host-based physical machines and all methods of client virtualization -- are not examples of VDI.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Desktop_virtualization.png"},{"id":7,"title":"Storage - General-Purpose Disk Arrays","alias":"storage-general-purpose-disk-arrays","description":" General-purpose disk arrays refer to disk storage systems that work together with specialized array controllers to achieve high data transfer. They are designed to fulfill the requirement of a diverse set of workloads such as databases, virtual desktop infrastructure, and virtual networks. The market size in the study represents the revenue generated through various deployment modes such as NAS, SAN, and DAS. Some of the technologies used in the general-purpose disk arrays market include PATA, SATA, and SCSI. The application areas of general-purpose disk arrays include BFSI, IT, government, education & research, healthcare, and manufacturing.\r\nGeneral-Purpose Disk Arrays market in BFSI accounts for the largest revenue. IT industry and governments are investing heavily in the general-purpose disk arrays, as a huge amount of voluminous data is getting generated which requires high storage capacity to store the classified data for analytics purpose and consumer insights. General-Purpose Disk Arrays market in healthcare is expected to show robust growth during the forecast period, as hospitals are adopting the latest technology with huge storage spaces in an attempt to track the patient history for providing better healthcare facilities.\r\nThe global general-purpose disk arrays market is fragmented owing to the presence of a large number of local and regional players, which intensifies the degree of rivalry. The market is growing at a notable pace, which leads to high intensity of rivalry. Key market players such as Dell EMC, HPE, and IBM Corporation seek to gain market share through continuous innovations in storage technology. Some of the other key players operating in a market are Hitachi, Seagate Technologies, NetApp, Promise Technologies, Quantum Corporation, Oracle Corporation, Fujitsu, DataDirect Networks, and Infortrend Technology Inc. Key competitors are specifically focusing on Asia-Pacific and Middle-East & Africa regions, as they show strong tendency to adopt the general-purpose disk arrays in coming years.","materialsDescription":"<span style=\"font-weight: bold;\">What are the characteristics of storage?</span>\r\nStorage technologies at all levels of the storage hierarchy can be differentiated by evaluating certain core characteristics as well as measuring characteristics specific to a particular implementation. These core characteristics are volatility, mutability, accessibility, and addressability. For any particular implementation of any storage technology, the characteristics worth measuring are capacity and performance.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Volatility</span></span>\r\nNon-volatile memory retains the stored information even if not constantly supplied with electric power. It is suitable for long-term storage of information. Volatile memory requires constant power to maintain the stored information. The fastest memory technologies are volatile ones, although that is not a universal rule. Since the primary storage is required to be very fast, it predominantly uses volatile memory.\r\nDynamic random-access memory is a form of volatile memory that also requires the stored information to be periodically reread and rewritten, or refreshed, otherwise it would vanish. Static random-access memory is a form of volatile memory similar to DRAM with the exception that it never needs to be refreshed as long as power is applied; it loses its content when the power supply is lost.\r\nAn uninterruptible power supply (UPS) can be used to give a computer a brief window of time to move information from primary volatile storage into non-volatile storage before the batteries are exhausted. Some systems, for example EMC Symmetrix, have integrated batteries that maintain volatile storage for several minutes.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Mutability</span></span>\r\n<span style=\"font-weight: bold;\">Read/write storage or mutable storage</span>\r\n<div class=\"indent\">Allows information to be overwritten at any time. A computer without some amount of read/write storage for primary storage purposes would be useless for many tasks. Modern computers typically use read/write storage also for secondary storage.</div>\r\n<span style=\"font-weight: bold;\">Slow write, fast read storage</span>\r\n<div class=\"indent\">Read/write storage which allows information to be overwritten multiple times, but with the write operation being much slower than the read operation. Examples include CD-RW and SSD.</div>\r\n<span style=\"font-weight: bold;\">Write once storage</span>\r\n<div class=\"indent\">Write Once Read Many (WORM) allows the information to be written only once at some point after manufacture. Examples include semiconductor programmable read-only memory and CD-R.</div>\r\n<span style=\"font-weight: bold;\">Read only storage</span>\r\n<div class=\"indent\">Retains the information stored at the time of manufacture. Examples include mask ROM ICs and CD-ROM.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Accessibility</span></span>\r\n<span style=\"font-weight: bold;\">Random access</span>\r\n<div class=\"indent\">Any location in storage can be accessed at any moment in approximately the same amount of time. Such characteristic is well suited for primary and secondary storage. Most semiconductor memories and disk drives provide random access.</div>\r\n<span style=\"font-weight: bold;\">Sequential access</span>\r\n<div class=\"indent\">The accessing of pieces of information will be in a serial order, one after the other; therefore the time to access a particular piece of information depends upon which piece of information was last accessed. Such characteristic is typical of off-line storage.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Addressability</span></span>\r\n<span style=\"font-weight: bold;\">Location-addressable</span>\r\n<div class=\"indent\">Each individually accessible unit of information in storage is selected with its numerical memory address. In modern computers, location-addressable storage usually limits to primary storage, accessed internally by computer programs, since location-addressability is very efficient, but burdensome for humans.</div>\r\n<span style=\"font-weight: bold;\">File addressable</span>\r\n<div class=\"indent\">Information is divided into files of variable length, and a particular file is selected with human-readable directory and file names. The underlying device is still location-addressable, but the operating system of a computer provides the file system abstraction to make the operation more understandable. In modern computers, secondary, tertiary and off-line storage use file systems.</div>\r\n<span style=\"font-weight: bold;\">Content-addressable</span>\r\n<div class=\"indent\">Each individually accessible unit of information is selected based on the basis of (part of) the contents stored there. Content-addressable storage can be implemented using software (computer program) or hardware (computer device), with hardware being faster but more expensive option. Hardware content addressable memory is often used in a computer's CPU cache.</div>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Capacity</span></span>\r\n<span style=\"font-weight: bold;\">Raw capacity</span>\r\n<div class=\"indent\">The total amount of stored information that a storage device or medium can hold. It is expressed as a quantity of bits or bytes (e.g. 10.4 megabytes).</div>\r\n<span style=\"font-weight: bold;\">Memory storage density</span>\r\n<div class=\"indent\">The compactness of stored information. It is the storage capacity of a medium divided with a unit of length, area or volume (e.g. 1.2 megabytes per square inch).</div>\r\n\r\n<span style=\"font-weight: bold;\"><span style=\"font-style: italic;\">Performance</span></span>\r\n<span style=\"font-weight: bold;\">Latency</span>\r\n<div class=\"indent\">The time it takes to access a particular location in storage. The relevant unit of measurement is typically nanosecond for primary storage, millisecond for secondary storage, and second for tertiary storage. It may make sense to separate read latency and write latency (especially for non-volatile memory[8]) and in case of sequential access storage, minimum, maximum and average latency.</div>\r\n<span style=\"font-weight: bold;\">Throughput</span>\r\n<div class=\"indent\">The rate at which information can be read from or written to the storage. In computer data storage, throughput is usually expressed in terms of megabytes per second (MB/s), though bit rate may also be used. As with latency, read rate and write rate may need to be differentiated. Also accessing media sequentially, as opposed to randomly, typically yields maximum throughput.</div>\r\n<span style=\"font-weight: bold;\">Granularity</span>\r\n<div class=\"indent\">The size of the largest "chunk" of data that can be efficiently accessed as a single unit, e.g. without introducing additional latency.</div>\r\n<span style=\"font-weight: bold;\">Reliability</span>\r\n<div class=\"indent\">The probability of spontaneous bit value change under various conditions, or overall failure rate.</div>\r\nUtilities such as hdparm and sar can be used to measure IO performance in Linux.\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Energy use</span></span>\r\n<ul><li>Storage devices that reduce fan usage, automatically shut-down during inactivity, and low power hard drives can reduce energy consumption by 90 percent.</li><li>2.5-inch hard disk drives often consume less power than larger ones. Low capacity solid-state drives have no moving parts and consume less power than hard disks. Also, memory may use more power than hard disks. Large caches, which are used to avoid hitting the memory wall, may also consume a large amount of power.</li></ul>\r\n\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Security</span></span>\r\nFull disk encryption, volume and virtual disk encryption, andor file/folder encryption is readily available for most storage devices.\r\nHardware memory encryption is available in Intel Architecture, supporting Total Memory Encryption (TME) and page granular memory encryption with multiple keys (MKTME) and in SPARC M7 generation since October 2015.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Storage_General_Purpose_Disk_Arrays.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"https://ko.com.ua/proekt_v_sanahunt_vysokoj_mode_vysokie_tehnologii_114190","title":"Media"}},"comments":[],"referencesCount":0},{"id":93,"title":"Iskratel Fixed Mobile Convergence for mobile operator","description":"Description is not ready yet","alias":"iskratel-fixed-mobile-convergence-for-mobile-operator","roi":0,"seo":{"title":"Iskratel Fixed Mobile Convergence for mobile operator","keywords":"","description":"Description is not ready yet","og:title":"Iskratel Fixed Mobile Convergence for mobile operator","og:description":"Description is not ready yet"},"deal_info":"","user":{"id":2540,"title":"Kyivstar","logoURL":"https://old.roi4cio.com/uploads/roi/company/Kievstar.png","alias":"kievstar","address":"","roles":[],"description":"<span style=\"font-weight: bold;\">Kyivstar</span> – mobile operator No.1 and one of the best brands of Ukraine\r\n\r\nThe company's history started back in 1994, and on December 9, 1997, the first call in Kyivstar mobile network was made.\r\n\r\nToday Kyivstar is the largest Ukrainian telecommunication operator providing communications and data services based on a broad range of mobile and fixed-line technologies, including 3G. Company's customer base amounts to over 24 million in mobile and over 1.1 million in broadband Internet.\r\n\r\nKyivstar is a part of VimpelCom Ltd., one of the world's largest integrated telecommunications companies, headquartered in Netherlands. The holding company owns telecom assets in the CIS countries, Europe, Asia, and Africa, and its shares are freely traded on the stock exchange (NASDAQ). Jean-Yves Charlier is CEO of VimpelCom Ltd.\r\n\r\nKyivstar is one of few companies in VimpelCom Ltd. that provides services under its own, exclusively Ukrainian brand. Every year international control of Kyivstar network parameters is held. According to its results, the company demonstrates better quality and productivity than on the average in the region and in the world.\r\n\r\nKyivstar has achieved big success thanks to investment into development of its own fiber-optic network which is an important link in the traffic exchange between Europe and Asia, and it is a reliable partner of Ukrainians in the connection with the other countries of the world. The company provides roaming services in 195 countries on 5 continents.\r\n\r\nFor more than 25 years of operation on the territory of Ukraine Kyivstar has been developing the technical infrastructure of telecom-market and has been faithfully performing its obligations to the country and the society. For many years the company has been the largest taxpayer to the state budget of Ukraine among the companies in the sector of transport and communications, as well as one of the best employers and most socially responsible business entities.\r\n\r\nKyivstar was the first company to provide the best telecommunications services of European markets for Ukrainian subscribers. For instance, in 1998 the company was the first to suggest SMS service to subscribers, and in 2000 – was the first to start providing access to Internet by WAP. After that Kyivstar was the first to massively introduce packet tariff plans with no charge for minutes and to cancel megabyte billing of Internet in the most of the tariff plans.\r\n\r\nThe company was the first among telecommunications operators of Ukraine to fully upgrade switched network to prepare for high-speed mobile data transmission technologies. In Kyivstar's network, MSC Server Blade Cluster, unique equipment for Ukraine, is installed. It is new-generation switchers that support technologies from 2.5G to LTE. In 2012 the process of base stations' equipment replacement for a full transition to IP architecture was started.\r\n\r\nKyivstar's team amounts to around 4,000 professionals working all over Ukraine. A system of continuing education and professional development, encouragement and protection of employees has been created in the company:\r\n\r\n<ul><li>Every year more than 50% of employees upgrade their skills at various courses and trainings organized by the company;</li><li> 40% of employees use flexible work schedule; when needed, any employee can work remotely through "Virtual Office" system.</li></ul>\r\nThe company's care about employees' health is an essential part of the social package. Kyivstar's workers can get medical service in more than 1,000 clinics, health institutions and pharmacies in 99 Ukrainian cities.\r\n\r\n<span style=\"font-weight: bold;\">Information on the ownership structure of PJSC “Kyivstar”</span>\r\nThe sole shareholder of PJSC “Kyivstar” is the international telecom group of companies <span style=\"font-weight: bold;\">VEON</span>, the headquarters of which is located in the Kingdom of the Netherlands. VEON shares are traded on the stock exchanges of the USA and the European Union, and among the owners of the shares there are thousands of people, including large investment funds of the USA, Great Britain, Italy, such as Exor NV, Shah Capital, Prosperity Capital, Kopernik Global Investors, etc. No shareholder has a majority stake and does not have a decisive influence on the activities of the VEON group and, accordingly, on the activities of Kyivstar.\r\nIn February 2022, the VEON Group excluded persons who have been subject to EU sanctions from the Board of Directors, their financial assets are frozen, and they themselves do not take any part in or have any influence on the management of the VEON Group. The group also decided to withdraw from the russian market and on May 30, 2023, reported on the completion of all legal formalities and procedures related to this initiative.\r\nPJSC “Kyivstar” is managed by the President (a citizen of Ukraine) and the Supervisory Board of Kyivstar PJSC, which includes citizens of Ukraine, the United States, the European Union and Turkey. Each of these citizens is a person with an exceptionally high reputation in the business environment with long experience of managerial work on the international market.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":6,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.kyivstar.ua/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Kyivstar","keywords":"Kyivstar, company, Ukraine, first, network, mobile, been, employees","description":"<span style=\"font-weight: bold;\">Kyivstar</span> – mobile operator No.1 and one of the best brands of Ukraine\r\n\r\nThe company's history started back in 1994, and on December 9, 1997, the first call in Kyivstar mobile network was made.\r\n\r\nToday Kyivstar is the l","og:title":"Kyivstar","og:description":"<span style=\"font-weight: bold;\">Kyivstar</span> – mobile operator No.1 and one of the best brands of Ukraine\r\n\r\nThe company's history started back in 1994, and on December 9, 1997, the first call in Kyivstar mobile network was made.\r\n\r\nToday Kyivstar is the l","og:image":"https://old.roi4cio.com/uploads/roi/company/Kievstar.png"},"eventUrl":""},"supplier":{"id":1937,"title":"PrioCom","logoURL":"https://old.roi4cio.com/uploads/roi/company/PrioCom.png","alias":"priokom","address":"","roles":[],"description":"PrioCom is a leading Ukrainian system integrator and regular partner of major national telecom operators having been providing large-scale network integration and support services for over 13 years.\r\n\r\nThe company offers the following services to telecommunication operators:\r\n\r\nbuilding of complex network solutions at all levels of network,\r\nimplementation of OSS/BSS solutions,\r\nsupport.\r\nPrioCom's portfolio also includes:\r\n\r\ncloud services for infrastructure solutions (Infrastructure as a Service, IaaS) - cloud data center, corporate networks as a service, unified communications as a service,\r\nbuilding of infrastructure solutions (data centers and virtualization, corporate VPN networks)\r\nimplementation of enterprise activity automation information systems (BPM, ITSM, ERP).\r\nPrioCom earned a reputation of a reliable and competent business partner, thanks to the outstanding team of professionals, flexible system of unique project management, elaborate procedure of quality control and innovative thinking.\r\n\r\nThe corporate standard of projects management in PrioCom, allows conducting the large-scale projects on all territory of Ukraine in a set time frame, meeting all quality requirements and within the limits of the budget. The ISO 9001:2008 international certificate in the field of system integration and professional services for communication operators is the best evidence.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":151,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":2,"vendorImplementationsCount":0,"vendorPartnersCount":5,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://priocom.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"PrioCom","keywords":"PrioCom, solutions, services, operators, network, system, corporate, quality","description":"PrioCom is a leading Ukrainian system integrator and regular partner of major national telecom operators having been providing large-scale network integration and support services for over 13 years.\r\n\r\nThe company offers the following services to telecommunica","og:title":"PrioCom","og:description":"PrioCom is a leading Ukrainian system integrator and regular partner of major national telecom operators having been providing large-scale network integration and support services for over 13 years.\r\n\r\nThe company offers the following services to telecommunica","og:image":"https://old.roi4cio.com/uploads/roi/company/PrioCom.png"},"eventUrl":""},"vendors":[{"id":2918,"title":"Iskratel","logoURL":"https://old.roi4cio.com/uploads/roi/company/Iskratel.jpg","alias":"iskratel","address":"","roles":[],"description":"Iskratel, one of world's leading telecommunications equipment and solutions providers, has more than 70 years of experience in telecommunications and is probably the best EU-based technology company with own R&D and manufacturing.\r\n\r\nHighly integrated end-to-end solutions based on our extensive experience in fixed and mobile telecommunications are designed to be future proof, which is guaranteed by Iskratel's active involvement in numerous technology standardization and regulation bodies. Iskratel solutions blend into any environment. Iskratel develops complete solutions for fixed and mobile service providers, including convergence networks and next generation networks.\r\n\r\nThe company is based in Kranj, Slovenia (EU), has over 800 employees and affiliated companies in over 30 countries. The direct presence of Iskratel's employees in foreign countries ensures the full harmonization of the solutions that we provide with national requirements as well as our partners' needs.\r\n\r\nIskratel’s initial global trademark, the Iskratel SI2000, achieved huge recognition and bears immediate associations with telephony switches in the eastern part of the globe. Our next generation Iskratel SI3000 trademark represents a unified platform that combines all the IP-technology-based products and solutions, but concurrently supports a smooth transition from legacy technologies. The key advantages of the SI3000 product family are robustness and reliability, modular design and scalable architecture that facilitate solutions of all sizes. The SI3000 stands for wide interoperability and readiness for the delivery of every type of service. Iskratel’s CPE portfolio is also available on the market under the stand-alone Innbox brand.","companyTypes":[],"products":{},"vendoredProductsCount":1,"suppliedProductsCount":40,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":1,"vendorPartnersCount":1,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://iskratel.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Iskratel","keywords":"Iskratel, solutions, with, SI3000, that, telecommunications, based, countries","description":"Iskratel, one of world's leading telecommunications equipment and solutions providers, has more than 70 years of experience in telecommunications and is probably the best EU-based technology company with own R&D and manufacturing.\r\n\r\nHighly integrated end-to-e","og:title":"Iskratel","og:description":"Iskratel, one of world's leading telecommunications equipment and solutions providers, has more than 70 years of experience in telecommunications and is probably the best EU-based technology company with own R&D and manufacturing.\r\n\r\nHighly integrated end-to-e","og:image":"https://old.roi4cio.com/uploads/roi/company/Iskratel.jpg"},"eventUrl":""}],"products":[{"id":459,"logo":false,"scheme":false,"title":"Iskratel Fixed Mobile Convergence","vendorVerified":0,"rating":"1.40","implementationsCount":1,"suppliersCount":0,"alias":"iskratel-fixed-mobile-convergence","companyTypes":[],"description":"Operator benefits:\r\n• Seamless mobile and fixed network bridging\r\n• VoLTE- and VoWi-Fiready\r\n• New services on existing devices\r\n• Operator’s dedicated apps for all devices\r\n• Leverage of existing assets\r\n• Support for NGN and IMS\r\n• Reduced regulatorycompliance risks\r\n\r\nIskratel Fixed-Mobile Convergence with Unified Communications Solution (FMC with UC) embraces the services that exist on the market and are branded as “Virtual PBX” or “Mobile VPN”. However, the solution offers new, attractive converged applications and services on multiple devices over any type of access network (2G, 3G, WiFi, LTE, PSTN, and fixed broadband). Moreover, a true value of the solution is enabling new sources of revenue while reducing customer churn, and applicability for Enterprise, SME and consumer market as well.\r\nCONNECTING MOBILE AND SIP\r\nIskratel FMC with UC Solution is the result of close co-operation with service providers, as well as direct co-operation with business customers. Therefore, the solution provides best of both worlds – modern all-IP network convergence, based on SIP protocol, and a set of application with excellent user experience for most demanding business customers and even consumers.\r\nThe essence of the solution is Single identity, which unifies mobile, SIP and fixed terminals, on any type of the network. Converged identity can be presented to the outside world as fixed only, mobile only or the combination of both. Single identity service, based on MDU (Multi-Device User) and FMC functionality, provides handover of active connection (VCC) between all existing types of devices and this significantly improves end-customers’ experience.\r\nFurthermore, FMC with UC solution acts as a Virtual IP PBX (or Mobile VPN), grouping all employees of a particular customer into a virtual private network with access to virtual IP-PBX services.\r\n","shortDescription":"Iskratel Fixed-Mobile Convergence with Unified Communications Solution (FMC with UC) embraces the services that exist on the market and are branded as “Virtual PBX” or “Mobile VPN”.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":15,"sellingCount":13,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Iskratel Fixed Mobile Convergence","keywords":"with, network, solution, devices, services, fixed, identity, Iskratel","description":"Operator benefits:\r\n• Seamless mobile and fixed network bridging\r\n• VoLTE- and VoWi-Fiready\r\n• New services on existing devices\r\n• Operator’s dedicated apps for all devices\r\n• Leverage of existing assets\r\n• Support for NGN and IMS\r\n• Reduced regulatorycomplian","og:title":"Iskratel Fixed Mobile Convergence","og:description":"Operator benefits:\r\n• Seamless mobile and fixed network bridging\r\n• VoLTE- and VoWi-Fiready\r\n• New services on existing devices\r\n• Operator’s dedicated apps for all devices\r\n• Leverage of existing assets\r\n• Support for NGN and IMS\r\n• Reduced regulatorycomplian"},"eventUrl":"","translationId":460,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":82,"title":"Unified Communications","alias":"unified-communications","description":"Unified communications (UC) is a framework for integrating various asynchronous and real-time communication tools. The goal of UC is to enhance business communication, collaboration and productivity. Unified communications do not represent a singular technology; rather, it describes a strategy for integrating interconnected systems of enterprise communication devices and applications that can be used in concert or successively.\r\nSome business communication tools - like Internet Protocol (IP) telephony and video conferencing - facilitate real-time communication, also called synchronous communication. Other enterprise communication tools, like email, facilitate asynchronous communication, which takes place at a person's convenience.\r\nIncreasingly, team collaboration tools have emerged to offer messaging-centric workflows and near-real-time communication. These tools also offer voice and video capabilities, API integrations and, ultimately, expound on instant messaging services by providing better UC features.\r\nThe goal of unified communications is to integrate the software that supports synchronous and asynchronous communication, so the end user has easy access to all tools from whatever device is in use.\r\nA unified communications environment is typically supported by one or more back-end systems, often referred to as UC platforms, that facilitate integration among services, as well as the front-end clients that provide access. For example, a web conferencing system would make use of an audio conferencing system - which, in turn, would be built on an underlying IP telephony platform - and a unified messaging client would allow click-to-talk (CTC), click-to-chat or click-to-video functionality.\r\nUC also supports users moving from one mode of communication to another within the same session. For example, a user may start communicating via email but then decide to escalate the interaction to real-time communication, transitioning the session to a voice call with one click and then to a video conference with another click without any disruption.\r\nUnified communications systems and their components can be deployed on premises, in a public or private cloud, or a combination of all three. Cloud-based unified communications is also called UC as a service (UCaaS). An open source project called WebRTC, for example, enables real-time communications to be embedded into web browsers.\r\nHistorically, single-vendor UC environments have demonstrated the tightest integration and compatibility. Interoperability among vendors remains an ongoing challenge in UC, but it has also been mitigated, in part, by partnerships, common protocols and open APIs.","materialsDescription":" <span style=\"font-weight: bold;\">What technology do unified communications have?</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Contrasting unified messaging</span></span>\r\nUnified communications are sometimes confused with unified messaging, but it is distinct. Unified communications refer to both real-time and non-real-time delivery of communications based on the preferred method and location of the recipient; unified messaging culls messages from several sources (such as e-mail, voice mail and faxes), but holds those messages only for retrieval at a later time. Unified communications allow for an individual to check and retrieve an e-mail or voice mail from any communication device at any time. It expands beyond voice mail services to data communications and video services.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Components</span></span>\r\nWith unified communications, multiple modes of business communications are integrated. Unified communications is not a single product but a collection of elements that include:\r\n<ul><li>Call control and multimodal communications</li><li>Presence</li><li>Instant messaging</li><li>Unified messaging</li><li>Speech access and personal assistant</li><li>Conferencing (audio, Web and video)</li><li>Collaboration tools</li><li>Mobility</li><li>Business process integration (BPI)</li><li>Software to enable business process integration</li></ul>\r\nPresence — knowing where intended recipients are, and if they are available, in real-time — is a key component of unified communications. Unified communications integrate all systems a user might already use, and helps those systems work together in real-time. For example, unified communications technology could allow a user to seamlessly collaborate with another person on a project, even if the two users are in separate locations. The user could quickly locate the necessary person by accessing an interactive directory, engage in a text messaging session, and then escalate the session to a voice call or even a video call.\r\nIn another example, an employee receives a call from a customer who wants answers. Unified communications enable that employee to call an expert colleague from a real-time list. This way, the employee can answer the customer faster by eliminating rounds of back-and-forth e-mails and phone-tag.\r\nThe examples in the previous paragraph primarily describe "personal productivity" enhancements that tend to benefit the individual user. While such benefits can be important, enterprises are finding that they can achieve even greater impact by using unified communications capabilities to transform business processes. This is achieved by integrating UC functionality directly into the business applications using development tools provided by many of the suppliers. Instead of the individual user invoking the UC functionality to, say, find an appropriate resource, the workflow or process application automatically identifies the resource at the point in the business activity where one is needed.\r\nWhen used in this manner, the concept of presence often changes. Most people associate presence with instant messaging (IM "buddy lists") the status of individuals is identified. But, in many business process applications, what is important is finding someone with a certain skill. In these environments, presence identifies available skills or capabilities.\r\nThis "business process" approach to integrating UC functionality can result in bottom-line benefits that are an order of magnitude greater than those achievable by personal productivity methods alone.\r\n<span style=\"font-weight: bold;\">Related concepts</span>\r\nUnified communications & collaboration (UCC) is the integration of various communications methods with collaboration tools such as virtual white boards, real-time audio and video conferencing, and enhanced call control capabilities. Before this fusion of communications and collaboration tools into a single platform, enterprise collaboration service vendors and enterprise communications service vendors offered distinctly different solutions. Now, collaboration service vendors also offer communications services, and communications service providers have developed collaboration tools.\r\nUnified communications & collaboration as a service (UCCaaS) is cloud-based UCC platforms. Compared to premises-based UCC solutions, UCCaaS platforms offer enhanced flexibility and scalability due to the SaaS subscription model.\r\nUnified communications provisioning is the act of entering and configuring the settings for users of phone systems, instant messaging, telepresence, and other collaboration channels. Provisioners refer to this process as making moves, adds, changes, and deletes or MAC-Ds.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Unified_Communications.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":4,"title":"Reduce Costs"},{"id":6,"title":"Ensure Security and Business Continuity"},{"id":7,"title":"Improve Customer Service"},{"id":252,"title":"Increase Customer Base"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":377,"title":"Separate communications channels"}]}},"categories":[{"id":82,"title":"Unified Communications","alias":"unified-communications","description":"Unified communications (UC) is a framework for integrating various asynchronous and real-time communication tools. The goal of UC is to enhance business communication, collaboration and productivity. Unified communications do not represent a singular technology; rather, it describes a strategy for integrating interconnected systems of enterprise communication devices and applications that can be used in concert or successively.\r\nSome business communication tools - like Internet Protocol (IP) telephony and video conferencing - facilitate real-time communication, also called synchronous communication. Other enterprise communication tools, like email, facilitate asynchronous communication, which takes place at a person's convenience.\r\nIncreasingly, team collaboration tools have emerged to offer messaging-centric workflows and near-real-time communication. These tools also offer voice and video capabilities, API integrations and, ultimately, expound on instant messaging services by providing better UC features.\r\nThe goal of unified communications is to integrate the software that supports synchronous and asynchronous communication, so the end user has easy access to all tools from whatever device is in use.\r\nA unified communications environment is typically supported by one or more back-end systems, often referred to as UC platforms, that facilitate integration among services, as well as the front-end clients that provide access. For example, a web conferencing system would make use of an audio conferencing system - which, in turn, would be built on an underlying IP telephony platform - and a unified messaging client would allow click-to-talk (CTC), click-to-chat or click-to-video functionality.\r\nUC also supports users moving from one mode of communication to another within the same session. For example, a user may start communicating via email but then decide to escalate the interaction to real-time communication, transitioning the session to a voice call with one click and then to a video conference with another click without any disruption.\r\nUnified communications systems and their components can be deployed on premises, in a public or private cloud, or a combination of all three. Cloud-based unified communications is also called UC as a service (UCaaS). An open source project called WebRTC, for example, enables real-time communications to be embedded into web browsers.\r\nHistorically, single-vendor UC environments have demonstrated the tightest integration and compatibility. Interoperability among vendors remains an ongoing challenge in UC, but it has also been mitigated, in part, by partnerships, common protocols and open APIs.","materialsDescription":" <span style=\"font-weight: bold;\">What technology do unified communications have?</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Contrasting unified messaging</span></span>\r\nUnified communications are sometimes confused with unified messaging, but it is distinct. Unified communications refer to both real-time and non-real-time delivery of communications based on the preferred method and location of the recipient; unified messaging culls messages from several sources (such as e-mail, voice mail and faxes), but holds those messages only for retrieval at a later time. Unified communications allow for an individual to check and retrieve an e-mail or voice mail from any communication device at any time. It expands beyond voice mail services to data communications and video services.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Components</span></span>\r\nWith unified communications, multiple modes of business communications are integrated. Unified communications is not a single product but a collection of elements that include:\r\n<ul><li>Call control and multimodal communications</li><li>Presence</li><li>Instant messaging</li><li>Unified messaging</li><li>Speech access and personal assistant</li><li>Conferencing (audio, Web and video)</li><li>Collaboration tools</li><li>Mobility</li><li>Business process integration (BPI)</li><li>Software to enable business process integration</li></ul>\r\nPresence — knowing where intended recipients are, and if they are available, in real-time — is a key component of unified communications. Unified communications integrate all systems a user might already use, and helps those systems work together in real-time. For example, unified communications technology could allow a user to seamlessly collaborate with another person on a project, even if the two users are in separate locations. The user could quickly locate the necessary person by accessing an interactive directory, engage in a text messaging session, and then escalate the session to a voice call or even a video call.\r\nIn another example, an employee receives a call from a customer who wants answers. Unified communications enable that employee to call an expert colleague from a real-time list. This way, the employee can answer the customer faster by eliminating rounds of back-and-forth e-mails and phone-tag.\r\nThe examples in the previous paragraph primarily describe "personal productivity" enhancements that tend to benefit the individual user. While such benefits can be important, enterprises are finding that they can achieve even greater impact by using unified communications capabilities to transform business processes. This is achieved by integrating UC functionality directly into the business applications using development tools provided by many of the suppliers. Instead of the individual user invoking the UC functionality to, say, find an appropriate resource, the workflow or process application automatically identifies the resource at the point in the business activity where one is needed.\r\nWhen used in this manner, the concept of presence often changes. Most people associate presence with instant messaging (IM "buddy lists") the status of individuals is identified. But, in many business process applications, what is important is finding someone with a certain skill. In these environments, presence identifies available skills or capabilities.\r\nThis "business process" approach to integrating UC functionality can result in bottom-line benefits that are an order of magnitude greater than those achievable by personal productivity methods alone.\r\n<span style=\"font-weight: bold;\">Related concepts</span>\r\nUnified communications & collaboration (UCC) is the integration of various communications methods with collaboration tools such as virtual white boards, real-time audio and video conferencing, and enhanced call control capabilities. Before this fusion of communications and collaboration tools into a single platform, enterprise collaboration service vendors and enterprise communications service vendors offered distinctly different solutions. Now, collaboration service vendors also offer communications services, and communications service providers have developed collaboration tools.\r\nUnified communications & collaboration as a service (UCCaaS) is cloud-based UCC platforms. Compared to premises-based UCC solutions, UCCaaS platforms offer enhanced flexibility and scalability due to the SaaS subscription model.\r\nUnified communications provisioning is the act of entering and configuring the settings for users of phone systems, instant messaging, telepresence, and other collaboration channels. Provisioners refer to this process as making moves, adds, changes, and deletes or MAC-Ds.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Unified_Communications.png"}],"additionalInfo":{"budgetNotExceeded":"","functionallyTaskAssignment":"","projectWasPut":"","price":0,"source":{"url":"http://priocom.com/ru/about/press/news/news2013/kyivstar-FMC","title":"Supplier's web site"}},"comments":[],"referencesCount":0},{"id":1078,"title":"Microsoft Exchange 2010, Microsoft SharePoint Server 2010, Microsoft Lync Server for a logistics company","description":"<span style=\"font-style: italic;\">Description is not ready yet</span>","alias":"microsoft-exchange-2010-microsoft-sharepoint-server-2010-microsoft-lync-server-for-a-logistics-company","roi":0,"seo":{"title":"Microsoft Exchange 2010, Microsoft SharePoint Server 2010, Microsoft Lync Server for a logistics company","keywords":"","description":"<span style=\"font-style: italic;\">Description is not ready yet</span>","og:title":"Microsoft Exchange 2010, Microsoft SharePoint Server 2010, Microsoft Lync Server for a logistics company","og:description":"<span style=\"font-style: italic;\">Description is not ready yet</span>"},"deal_info":"","user":{"id":7889,"title":"Delivery, LTD","logoURL":"https://old.roi4cio.com/uploads/roi/company/delivery_ua.png","alias":"deliveri","address":"ул. Большая Васильковская 15/2 Киев, Киевская 01004, UA","roles":[],"description":" Today, Deliver is one of Ukraine's leading logistics companies in the B2B sector. Deliver has been operating in the domestic and international freight market since 2001. More than 15 years of successful activity in the field of logistics and transport services have allowed to accumulate considerable experience and establish partnerships with companies involved in trade, production and service.\r\nCurrently, Delivers is:\r\n<ul><li>273 representative offices throughout Ukraine</li></ul>\r\n<ul><li>More than 1000 daily flights</li></ul>\r\n<ul><li>More than 2000 highly qualified employees</li></ul>\r\n<ul><li>27 sorting and distribution centers</li></ul>\r\n<ul><li>15 regional customer service offices</li></ul>\r\n<ul><li>Modern Customer Service Center in the center of Kiev</li></ul>","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":0,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":1,"supplierImplementationsCount":0,"vendorImplementationsCount":0,"vendorPartnersCount":0,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.delivery-auto.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Delivery, LTD","keywords":"","description":" Today, Deliver is one of Ukraine's leading logistics companies in the B2B sector. Deliver has been operating in the domestic and international freight market since 2001. More than 15 years of successful activity in the field of logistics and transport service","og:title":"Delivery, LTD","og:description":" Today, Deliver is one of Ukraine's leading logistics companies in the B2B sector. Deliver has been operating in the domestic and international freight market since 2001. More than 15 years of successful activity in the field of logistics and transport service","og:image":"https://old.roi4cio.com/uploads/roi/company/delivery_ua.png"},"eventUrl":""},"supplier":{"id":6447,"title":"AM Integrator (AMI)","logoURL":"https://old.roi4cio.com/uploads/roi/company/am_integrator.png","alias":"am-integrator","address":"Illinska St., 14/6 Kiev, 04070 Ukraine","roles":[],"description":"AM INTEGRATOR Group of Companies is one of the leading IT operators in Ukraine, being a supplier and integrator of a wide range of solutions in the field of modern IT infrastructure, multimedia solutions, engineering infrastructure, business applications and integrated business security systems for medium and large enterprises, as well as the public sector. AM Integrator helps companies:\r\n<ul><li>increase risk manageability and business productivity;</li></ul>\r\n<ul><li>reduce costs;</li></ul>\r\n<ul><li>protect data.</li></ul>\r\nAM Integrator offers intelligent and flexible solutions, including cloud services, that will help you strategically transform your business using technologies and platforms of industry leaders.<br />The company offers solutions for increasing productivity, effective collaboration, mobility and relationship management, identity-driven, advanced analytics, or the Internet of things. AM Integrator also helps with core infrastructure, from support to creating disaster recovery solutions. The team of company experts has been working with cloud technologies for more than 5 years, with virtual environments - more than 10 years.","companyTypes":[],"products":{},"vendoredProductsCount":0,"suppliedProductsCount":116,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":21,"vendorImplementationsCount":0,"vendorPartnersCount":8,"supplierPartnersCount":0,"b4r":0,"categories":{},"companyUrl":"http://www.amintegrator.com/","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"AM Integrator (AMI)","keywords":"","description":"AM INTEGRATOR Group of Companies is one of the leading IT operators in Ukraine, being a supplier and integrator of a wide range of solutions in the field of modern IT infrastructure, multimedia solutions, engineering infrastructure, business applications and i","og:title":"AM Integrator (AMI)","og:description":"AM INTEGRATOR Group of Companies is one of the leading IT operators in Ukraine, being a supplier and integrator of a wide range of solutions in the field of modern IT infrastructure, multimedia solutions, engineering infrastructure, business applications and i","og:image":"https://old.roi4cio.com/uploads/roi/company/am_integrator.png"},"eventUrl":""},"vendors":[{"id":163,"title":"Microsoft","logoURL":"https://old.roi4cio.com/uploads/roi/company/ms_dshchpshch.png","alias":"microsoft","address":"Microsoft","roles":[],"description":"Microsoft Corporation is an multinational technology company headquartered in Redmond, Washington, that develops, manufactures, licenses, supports and sells computer software, consumer electronics and personal computers and services. Its best known software products are the Microsoft Windows line of operating systems, Microsoft Office office suite, and Internet Explorer and Edge web browsers. Its flagship hardware products are the Xbox video game consoles and the Microsoft Surface tablet lineup. As of 2011, it was the world's largest software maker by revenue, and one of the world's most valuable companies.","companyTypes":[],"products":{},"vendoredProductsCount":39,"suppliedProductsCount":39,"supplierImplementations":[],"vendorImplementations":[],"userImplementations":[],"userImplementationsCount":0,"supplierImplementationsCount":0,"vendorImplementationsCount":66,"vendorPartnersCount":0,"supplierPartnersCount":272,"b4r":0,"categories":{},"companyUrl":"www.microsoft.com","countryCodes":[],"certifications":[],"isSeller":false,"isSupplier":false,"isVendor":false,"presenterCodeLng":"","seo":{"title":"Microsoft","keywords":"Microsoft, software, world, products, hardware, Xbox, video, game","description":"Microsoft Corporation is an multinational technology company headquartered in Redmond, Washington, that develops, manufactures, licenses, supports and sells computer software, consumer electronics and personal computers and services. Its best known software pr","og:title":"Microsoft","og:description":"Microsoft Corporation is an multinational technology company headquartered in Redmond, Washington, that develops, manufactures, licenses, supports and sells computer software, consumer electronics and personal computers and services. Its best known software pr","og:image":"https://old.roi4cio.com/uploads/roi/company/ms_dshchpshch.png"},"eventUrl":""}],"products":[{"id":366,"logo":false,"scheme":false,"title":"Microsoft Sharepoint Server","vendorVerified":0,"rating":"2.70","implementationsCount":7,"suppliersCount":0,"alias":"microsoft-sharepoint-server","companyTypes":[],"description":"SharePoint Server is provided to organizations that seek greater control over SharePoint's behavior or design. This product is installed on the customer's IT infrastructure. It receives less frequent updates, but has access to a wider set of features and customization capabilities. There are three versions of SharePoint Server: Foundation (free), Standard, and Enterprise, although the free version may have been discontinued in 2016. These servers may be provisioned as normal virtual/cloud servers, or as hosted services.","shortDescription":"SharePoint is a web based application that integrates with Microsoft Office. Launched in 2001, SharePoint is primarily sold as a document management and storage system, but the product is highly configurable and usage varies substantially between organizations.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":6,"sellingCount":16,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Microsoft Sharepoint Server","keywords":"SharePoint, Server, free, servers, Standard, although, Enterprise, versions","description":"SharePoint Server is provided to organizations that seek greater control over SharePoint's behavior or design. This product is installed on the customer's IT infrastructure. It receives less frequent updates, but has access to a wider set of features and custo","og:title":"Microsoft Sharepoint Server","og:description":"SharePoint Server is provided to organizations that seek greater control over SharePoint's behavior or design. This product is installed on the customer's IT infrastructure. It receives less frequent updates, but has access to a wider set of features and custo"},"eventUrl":"","translationId":367,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":148,"title":"Enterprise Portal","alias":"enterprise-portal","description":"An enterprise portal, also known as an enterprise information portal (EIP), is a framework for integrating information, people and processes across organizational boundaries in a manner similar to the more general web portals. Enterprise portals provide a secure unified access point, often in the form of a web-based user interface, and are designed to aggregate and personalize information through application-specific portlets.\r\nOne hallmark of enterprise portals is the de-centralized content contribution and content management, which keeps the information always updated. Another distinguishing characteristic is that they cater for customers, vendors and others beyond an organization's boundaries. This contrasts with a corporate portal which is structured for roles within an organization.\r\nAn enterprise portal has two main functions; integration and presentation. It must be able to access information from multiple and varied sources and manipulate that information through the portal.\r\nOther common features include;\r\n<ul><li><span style=\"font-style: italic;\">Single sign-on</span> — enterprise portals can provide single sign-on capabilities between their users and various other systems. This requires a user to authenticate only once.</li><li><span style=\"font-style: italic;\">Integration</span> — the connection of functions and data from multiple systems into new components/portlets/web parts with an integrated navigation between these components.</li><li><span style=\"font-style: italic;\">Federation</span> — the integration of content provided by other portals, typically through the use of WSRP or similar technologies.</li><li><span style=\"font-style: italic;\">Customization</span> — Users can customize the look and feel of their environment. Customers who are using EIPs can edit and design their own web sites which are full of their own personality and own style; they can also choose the specific content and services they prefer. Also refers to the ability to prioritize most appropriate content based on attributes of the user and metadata of the available content.</li><li><span style=\"font-style: italic;\">Personalization</span> — Personalization is more about matching content with the user. Based on a user profile, personalization uses rules to match the "services", or content, to the specific user. To some degree, you can think of the two like this: customization is in hands of the end user, personalization is not. Of course actual personalization is often based on your role or job function within the portal context.</li><li><span style=\"font-style: italic;\">Access control</span> — the ability for portal to limit specific types of content and services users have access to. For example, a company's proprietary information can be entitled for only company employee access. This access rights may be provided by a portal administrator or by a provisioning process. Access control lists manage the mapping between portal content and services over the portal user base.</li><li><span style=\"font-style: italic;\">Enterprise search</span> — search enterprise content using enterprise search.</li><li><span style=\"font-style: italic;\">Omni channel enablement</span> — present the pages optimally on all channels and devices.</li><li><span style=\"font-style: italic;\">Analytics</span> — track and monitor user behaviour on portal pages (such as navigation, clicks, downloads, page exits and such) and generate reports.</li></ul>","materialsDescription":" <span style=\"font-weight: bold;\">What is an Enterprise Portal?</span>\r\nAbbreviated as EPS, Enterprise Portal Software is a prepackaged software kit used by the enterprise to integrate its information and processes. Organizations use portals primarily to aggregate information from a number of different sources, including disparate systems, and provide this information to authorized users in a neatly managed single screen or system.\r\n<span style=\"font-weight: bold;\">Typical Enterprise Portal's Interface</span>\r\nEPS usually offers a Web-based interface to provide a secure unified access point through which information is aggregated to application-specific portlets. Enterprise Portal Software lets authorized users access Web services, and portals can be combined to form portal networks that can cover an organization's entire enterprise system.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Enterprise_Portal.png"},{"id":273,"title":"Team Collaborative Applications","alias":"team-collaborative-applications","description":" Collaborative software or groupware is application software designed to help people working on a common task to attain their goals. One of the earliest definitions of groupware is "intentional group processes plus software to support them".\r\nThe worldwide team collaborative applications market continues to accelerate as collaboration becomes a key component of the future of work in a digital enterprise. The market is growing in revenue, leveraging IT integrations to both bridge functions and the enterprise. The market continues to move to the cloud and emphasizes usage across devices.\r\nThe total worldwide team collaborative applications market grew at 24.7% year over year, up from 21.5% growth the previous year. Growth was powered by the adoption of solutions that made working together more agile and seamless and favored solutions with integrations that centralize work, assets, and communications, including messaging and chat. In short, applications that made it easier to get work done by bringing content, context, and communications in a single place.\r\nFeeling the pinch to produce more with less, organizations have turned to collaborative applications to streamline workflow and engage employees, partners and, increasingly, customers. They are discovering new paths to productivity, a better digital user experience (UX), and loyalty. Companies are developing a new way to work together and across their workforce and the sales continuum. A more technology-savvy and digitally connected workforce is empowering and accelerating this trend. Artificial intelligence (AI) is more common across collaborative solutions and almost expected by employees to automate repetitive tasks. Increasingly, machine learning (ML) and AI will generate new forms of value from conversations, meetings, and other content assets.\r\nMake no mistake, the majority of the lead vendors in this space are heavily invested in the future of work and want to be either your future workspace — where work actually is done — or an application that integrates to facilitate better and more productive results with a better-engaged workforce.","materialsDescription":"<span style=\"font-weight: bold; \">What is groupware?</span>\r\nCollaborative software was originally designated as groupware and this term can be traced as far back as the late 1980s, when Richman and Slovak (1987) wrote: "Like an electronic sinew that binds teams together, the new groupware aims to place the computer squarely in the middle of communications among managers, technicians, and anyone else who interacts in groups, revolutionizing the way they work."\r\nEven further back, in 1978 Peter and Trudy Johnson-Lenz coined the term groupware; their initial 1978 definition of groupware was, "intentional group processes plus software to support them." Later in their article they went on to explain groupware as "computer-mediated culture... an embodiment of social organization in hyperspace." Groupware integrates co-evolving human and tool systems, yet is simply a single system.\r\nIn the early 1990s the first commercial groupware products were delivered, and big companies such as Boeing and IBM started using electronic meeting systems for key internal projects. Lotus Notes appeared as a major example of that product category, allowing remote group collaboration when the internet was still in its infancy. Kirkpatrick and Losee (1992) wrote then: "If GROUPWARE really makes a difference in productivity long term, the very definition of an office may change. You will be able to work efficiently as a member of a group wherever you have your computer. As computers become smaller and more powerful, that will mean anywhere." In 1999, Achacoso created and introduced the first wireless groupware.\r\n<span style=\"font-weight: bold;\">What are the levels of groupware?</span>\r\nGroupware can be divided into three categories depending on the level of collaboration:\r\n<ul><li>Communication can be thought of as unstructured interchange of information. A phone call or an IM Chat discussion are examples of this.</li><li>Conferencing (or collaboration level, as it is called in the academic papers that discuss these levels) refers to interactive work toward a shared goal. Brainstorming or voting are examples of this.</li><li>Co-ordination refers to complex interdependent work toward a shared goal. A good metaphor for understanding this is to think about a sports team; everyone has to contribute the right play at the right time as well as adjust their play to the unfolding situation - but everyone is doing something different - in order for the team to win. That is complex interdependent work toward a shared goal: collaborative management.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Team_Collaborative_Applications.png"},{"id":307,"title":"Archiving Software","alias":"archiving-software","description":" Enterprise <span style=\"font-weight: bold;\">archiving software </span>is designed to assist in storing a company’s structured and unstructured data. By incorporating unstructured data (e.g., email messages and media files), enterprise information archiving software provides more complete archives of business data across the board. Data can be stored on premise with local data servers or on cloud servers, or using a hybrid of the two. These solutions are used throughout a business by any employee, since all teams should be archiving their data for, at minimum, auditing purposes. Data archiving software are typically implemented and maintained by a company’s data team, and they can be used by companies of any size.\r\nWhile similar to a backup software solution, archiving solution handles the original data as opposed to a copy of that data. To qualify for the data archiving solutions category, a product must: \r\n<ul><li>Store both structured and unstructured data</li><li>Provide data management options for archived data</li><li>Protect access to archived data</li></ul>","materialsDescription":"<h1 class=\"align-center\"> What is Archiving Software?</h1>\r\nArchiving Software supports enterprises in retaining and rapidly retrieving structured and unstructured data over time while complying with security standards and the like. File archiving may include images, messages (e.g. IMs, social media posts, etc.), emails, and content from web pages and social sites. Compliant data retention may require retaining data in its native form and context so that it can be understood.\r\nAlso called Enterprise Information Archiving (EIA), archiving software is designed to meet discovery requirements. That means that the archive must be searchable so that all stored data can be retrieved with context intact.\r\nArchiving software is most commonly a requirement for banking institutions and governments. More stringent privacy laws means that EIA has become a concern for private corporations as well. Archiving software will contain features overlapping Enterprise Search, Data Governance and eDiscovery, and some features in common with ECM.\r\n<h1 class=\"align-center\">What’s the Difference: Backup vs Archive</h1>\r\nBackups and archives serve different functions, yet it’s common to hear the terms used interchangeably in cloud storage. \r\nA <span style=\"font-weight: bold;\">backup </span>is a copy of your data that is made to protect against loss of that data. Typically, backups are made on a regular basis according to a time schedule or when the original data changes. The original data is not deleted, but older backups are often deleted in favor of newer backups.<br /><span style=\"font-weight: bold;\">The goal of a backup</span> is to make a copy of anything in current use that can’t afford to be lost. A backup of a desktop or mobile device might include just the user data so that a previous version of a file can be recovered if necessary.\r\nOn these types of devices an assumption is often made that the OS and applications can easily be restored from original sources if necessary (and/or that restoring an OS to a new device could lead to significant corruption issues). In a virtual server environment, a backup could include.\r\nAn <span style=\"font-weight: bold;\">archive </span>is a copy of data made for long-term storage and reference. The original data may or may not be deleted from the source system after the archive copy is made and stored, though it is common for the archive to be the only copy of the data. \r\nIn contrast to a backup whose purpose is to be able to return a computer or file system to a state it existed in previously, <span style=\"font-weight: bold;\">data archiving can have multiple purposes</span>. An archiving system can provide an individual or organization with a permanent record of important papers, legal documents, correspondence, and other matters.\r\nOften, archive program is used to meet information retention requirements for corporations and businesses. If a dispute or inquiry arises about a business practice, contract, financial transaction, or employee, the records pertaining to that subject can be obtained from the archive.\r\nAn archive is frequently used to ease the burden on faster and more frequently accessed data storage systems. Older data that is unlikely to be needed often is put on systems that don’t need to have the speed and accessibility of systems that contain data still in use. Archival storage systems are usually less expensive, as well, so a strong motivation is to save money on data storage.\r\nArchives are often created based on the age of the data or whether the project the data belongs to is still active. Data archiving solutions might send data to an archive if it hasn’t been accessed in a specified amount of time, when it has reached a certain age, if a person is no longer with the organization, or the files have been marked for storage because the project has been completed or closed.<br /><br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Archiving_Software.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":392,"logo":false,"scheme":false,"title":"Microsoft Exchange","vendorVerified":0,"rating":"2.00","implementationsCount":11,"suppliersCount":0,"alias":"microsoft-exchange","companyTypes":[],"description":"Work smarter, anywhere Microsoft Exchange lets you accomplish more with a rich, business-class email experience on phones, tablets, desktops, and the web. Enjoy enterprise email capabilities with bigger and more reliable mailboxes Experience better collaboration with document sharing Add enhanced archiving, security, and compliance features <span style=\"font-weight: bold;\">Exchange Online</span> Exchange is available as a standalone hosted service from Microsoft. You can also get Exchange as part of an Office 365 plan that includes Office apps, SharePoint, and Skype for Business. <span style=\"font-weight: bold;\">Exchange Server 2016</span> Increase productivity and keep your business information safe, while maintaining the control you need. <span style=\"font-weight: bold;\">Other Exchange products</span> Exchange Online Archiving Exchange Online Protection Office 365 Advanced Threat Protection Exchange Online Kiosk Exchange for government agencies","shortDescription":"Microsoft Exchange lets you accomplish more with a rich, business-class email experience on phones, tablets, desktops, and the web.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":20,"sellingCount":2,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Microsoft Exchange","keywords":"Exchange, Online, Microsoft, Office, with, Protection, email, more","description":"Work smarter, anywhere Microsoft Exchange lets you accomplish more with a rich, business-class email experience on phones, tablets, desktops, and the web. Enjoy enterprise email capabilities with bigger and more reliable mailboxes Experience better collaborati","og:title":"Microsoft Exchange","og:description":"Work smarter, anywhere Microsoft Exchange lets you accomplish more with a rich, business-class email experience on phones, tablets, desktops, and the web. Enjoy enterprise email capabilities with bigger and more reliable mailboxes Experience better collaborati"},"eventUrl":"","translationId":393,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":271,"title":"Messaging Applications","alias":"messaging-applications","description":" Messaging apps (a.k.a. "Social messaging" or "chat applications") are apps and platforms that enable messaging, many of which started around social networking platforms, but many of which have now developed into broad platforms enabling status updates, chatbots, payments and conversational commerce (e-commerce via chat).\r\nSome examples of popular messaging apps include WhatsApp, China's WeChat and QQ Messenger, Viber, Line, Snapchat, Korea's KakaoTalk, Google Hangouts, Blackberry Messenger, Telegram, and Vietnam's Zalo. Slack focuses on messaging and file sharing for work teams. Some social networking services offer messaging services as a component of their overall platform, such as Facebook's Facebook Messenger, along with Instagram and Twitter's direct messaging functions.\r\nMessaging apps are the most widely used smartphone apps with in 2018 over 1.3 billion monthly users of WhatsApp and Facebook Messenger, 980 million monthly active users of WeChat and 843 million monthly active users of QQ Mobile.\r\nOnline chatting apps differ from the previous generation of instant messaging platforms like the defunct AIM, Yahoo! Messenger, and Windows Live Messenger, in that they are primarily used via mobile apps on smartphones as opposed to personal computers, although some messaging apps offer web-based versions or software for PC operating systems.\r\nAs people upgraded in the 2010s from feature phones to smartphones, they moved from traditional calling and SMS (which are paid services) to messaging apps which are free or only incur small data charges.\r\n<p class=\"align-left\"> </p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">Messaging apps each have some of the following features:</span></p>\r\n<ul><li>Chat</li></ul>\r\n<ol><li>One-on-one chat</li><li>Group chat</li><li> Broadcast lists</li><li>Chatbots (including "bot in group chats")</li><li>"Smart replies" (suggested replies to incoming messages provided by Google's Reply platform )</li></ol>\r\n<ul><li>Calls</li></ul>\r\n<ol><li>Voice calls</li><li> Video calls</li></ol>\r\n<ul><li>Audio alerts (on Line)</li><li>File sharing</li><li>Games</li><li>"Mini Programs" (e.g. WeChat Mini Program)</li><li>News discovery (e.g. Snapchat Discover)</li><li>Payments or mobile wallet, e.g. WeChat Pay which processes much of the Chinese mobile payment volume of US$5 trillion (2016)</li><li>Personal (cloud) storage</li><li>Push notifications</li><li>Status updates (WhatsApp Status, WeChat Moments)</li><li>Stickers</li><li>Virtual assistant, e.g. Google Assistant in Google Allo</li></ul>\r\n<p class=\"align-left\">Unlike chat rooms with many users engaging in multiple and overlapping conversations, instant messaging application sessions usually take place between two users in a private, back-and-forth style of communication.</p>\r\n<p class=\"align-left\">One of the core features of different messaging apps is the ability to see whether a friend or co-worker is online and connected through the selected service -- a capability known as presence. As the technology has evolved, many online messaging apps have added support for exchanging more than just text-based messages, allowing actions like file transfers and image sharing within the instant messaging session.</p>\r\n<p class=\"align-left\">Instant messaging also differs from email in the immediacy of the message exchange. It also tends to be session-based, having a start and an end. Because application message is intended to mimic in-person conversations, individual messages are often brief. Email, on the other hand, usually reflects a longer-form, letter-writing style.<br /><br /><br /></p>","materialsDescription":"<h1 class=\"align-center\"> <span style=\"font-weight: normal; \">What is instant messaging software?</span></h1>\r\nCompanies use instant messaging software to facilitate communication between their staff members who may be located in different places and countries. Popular websites such as Facebook offer instant chat services for free. Good quality messenger application solutions provide useful features such as video calling, web conferencing, and VoIP. Advanced platforms offer IP radio, IPTV, and desktop sharing tools. Large enterprises have greater communication needs and therefore they typically invest in installing an internal IM server to serve their thousands of employees.\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal; \">Why people use Messaging Apps?</span></h1>\r\n<ul><li>Real-time text transmission</li><li>Conveniency</li><li>Records of a chat history</li><li>Easy for multitasking</li><li>Operating anytime anywhere using the WiFi or Mobile Network operators</li><li>Stickers</li></ul>\r\nCommunication is an essential component of any business: interaction with external or internal customers, end users, employees. A good communication platform is vital to stay connected with the employees and broadcast information fast and efficiently. Thousands of people support the escalation from IM to other ways of communication, such as group chat, voice calls or video conferencing.<br />Depending on the purpose of use we can separate popular messenger nto those with business needs or for corporate use, such as Slack, Hangouts, Flock, Stride and those for everyday communications like WhatsApp, FB Messenger, WeChat, Telegram, and others.\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">How messaging apps can benefit your business?</span></h1>\r\n<p class=\"align-center\"></p>\r\nHeads bowed, shoulders hunched over glowing screens—we all might be a little guilty of smartphone addiction, and mobile usage is only increasing. We’re in constant communication with one another, and over the past few years messaging apps like Facebook Messenger and WeChat have become commonplace. Of the 10 most globally used apps, messaging apps account for 6.\r\nWith consumer messaging apps on the rise, businesses have begun to connect with customers on yet another channel. According to Gartner, “By 2019, requests for customer support through consumer mobile messaging apps will exceed requests for customer support through traditional social media.”\r\nServing up customer support through customer messaging software can deepen your brand’s relationship with customers. On the customer side, messaging apps provide an immediate way to connect with your business and get a response.\r\n<p class=\"align-center\"><span style=\"font-weight: bold;\">Here are three ways your business can benefit from connecting with customers over consumer messaging apps:</span></p>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Unrestricted communication.</span> No matter where they are in the world, messaging apps offer your customers unrestricted communication options. Unlike SMS, which often incurs charges, your customers can still reach out privately via messaging apps and receive a timely response without worrying about cost. That means happier customers, and happy customers mean a happy bottom line for your business.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Move customer queries from public to private. </span>Giving your customers an easy option to reach your business privately not only decreases their likelihood of publicly tweeting a complaint, it also offers a space to exchange sensitive information, like delivery details. With a more private outlet for customer interactions, your business can thoroughly help customers while simultaneously saving brand face.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Increase first contact resolution with chatbot integrations.</span> According to Gartner, artificial intelligence is a top trend for 2017. With the help of chatbots, your business can better manage workflows and automatically respond to customer requests via messaging. Chatbots can help point customers to the right information, helping them self-serve and ultimately allowing your support agents to focus on the issues that require a human touch. </li></ul>\r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Messaging_Applications.png"},{"id":273,"title":"Team Collaborative Applications","alias":"team-collaborative-applications","description":" Collaborative software or groupware is application software designed to help people working on a common task to attain their goals. One of the earliest definitions of groupware is "intentional group processes plus software to support them".\r\nThe worldwide team collaborative applications market continues to accelerate as collaboration becomes a key component of the future of work in a digital enterprise. The market is growing in revenue, leveraging IT integrations to both bridge functions and the enterprise. The market continues to move to the cloud and emphasizes usage across devices.\r\nThe total worldwide team collaborative applications market grew at 24.7% year over year, up from 21.5% growth the previous year. Growth was powered by the adoption of solutions that made working together more agile and seamless and favored solutions with integrations that centralize work, assets, and communications, including messaging and chat. In short, applications that made it easier to get work done by bringing content, context, and communications in a single place.\r\nFeeling the pinch to produce more with less, organizations have turned to collaborative applications to streamline workflow and engage employees, partners and, increasingly, customers. They are discovering new paths to productivity, a better digital user experience (UX), and loyalty. Companies are developing a new way to work together and across their workforce and the sales continuum. A more technology-savvy and digitally connected workforce is empowering and accelerating this trend. Artificial intelligence (AI) is more common across collaborative solutions and almost expected by employees to automate repetitive tasks. Increasingly, machine learning (ML) and AI will generate new forms of value from conversations, meetings, and other content assets.\r\nMake no mistake, the majority of the lead vendors in this space are heavily invested in the future of work and want to be either your future workspace — where work actually is done — or an application that integrates to facilitate better and more productive results with a better-engaged workforce.","materialsDescription":"<span style=\"font-weight: bold; \">What is groupware?</span>\r\nCollaborative software was originally designated as groupware and this term can be traced as far back as the late 1980s, when Richman and Slovak (1987) wrote: "Like an electronic sinew that binds teams together, the new groupware aims to place the computer squarely in the middle of communications among managers, technicians, and anyone else who interacts in groups, revolutionizing the way they work."\r\nEven further back, in 1978 Peter and Trudy Johnson-Lenz coined the term groupware; their initial 1978 definition of groupware was, "intentional group processes plus software to support them." Later in their article they went on to explain groupware as "computer-mediated culture... an embodiment of social organization in hyperspace." Groupware integrates co-evolving human and tool systems, yet is simply a single system.\r\nIn the early 1990s the first commercial groupware products were delivered, and big companies such as Boeing and IBM started using electronic meeting systems for key internal projects. Lotus Notes appeared as a major example of that product category, allowing remote group collaboration when the internet was still in its infancy. Kirkpatrick and Losee (1992) wrote then: "If GROUPWARE really makes a difference in productivity long term, the very definition of an office may change. You will be able to work efficiently as a member of a group wherever you have your computer. As computers become smaller and more powerful, that will mean anywhere." In 1999, Achacoso created and introduced the first wireless groupware.\r\n<span style=\"font-weight: bold;\">What are the levels of groupware?</span>\r\nGroupware can be divided into three categories depending on the level of collaboration:\r\n<ul><li>Communication can be thought of as unstructured interchange of information. A phone call or an IM Chat discussion are examples of this.</li><li>Conferencing (or collaboration level, as it is called in the academic papers that discuss these levels) refers to interactive work toward a shared goal. Brainstorming or voting are examples of this.</li><li>Co-ordination refers to complex interdependent work toward a shared goal. A good metaphor for understanding this is to think about a sports team; everyone has to contribute the right play at the right time as well as adjust their play to the unfolding situation - but everyone is doing something different - in order for the team to win. That is complex interdependent work toward a shared goal: collaborative management.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Team_Collaborative_Applications.png"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]},{"id":983,"logo":false,"scheme":false,"title":"Microsoft Skype for Business","vendorVerified":0,"rating":"2.00","implementationsCount":6,"suppliersCount":0,"alias":"microsoft-skype-for-business","companyTypes":[],"description":"Microsoft Skype for Business Basic gives you presence, instant messaging (IM), audio and video calls, online meetings, and sharing capabilities with the latest User Interface.. This is free download. For more information about features available in Skype for Business Basic in comparison to the Skype for Business client, please visit this page: Skype for Business client comparision chart Note: This Skype for Business Basic MSI desktop client provides presence, instant messaging and conferencing features. If you are licensed for Office 365 ProPlus, Office 365 Enterprise E3 or Office 365 Enterprise E4, you are also licensed for the full Skype for Business Windows desktop client, which includes additional features including advanced telephony support, archiving & compliance features. Please download full Skype for Business Windows desktop client from the Office 365 Software portal following the steps in Install Skype for Business on your PC.","shortDescription":"Microsoft Skype for Business gives you instant messaging (IM), audio and video calls, online meetings, availability (presence) information, and sharing capabilities all from one, easy-to-use program.","type":null,"isRoiCalculatorAvaliable":false,"isConfiguratorAvaliable":false,"bonus":100,"usingCount":5,"sellingCount":5,"discontinued":0,"rebateForPoc":0,"rebate":0,"seo":{"title":"Microsoft Skype for Business","keywords":"Business, Skype, client, Office, features, Basic, desktop, Microsoft","description":"Microsoft Skype for Business Basic gives you presence, instant messaging (IM), audio and video calls, online meetings, and sharing capabilities with the latest User Interface.. This is free download. For more information about features available in Skype for B","og:title":"Microsoft Skype for Business","og:description":"Microsoft Skype for Business Basic gives you presence, instant messaging (IM), audio and video calls, online meetings, and sharing capabilities with the latest User Interface.. This is free download. For more information about features available in Skype for B"},"eventUrl":"","translationId":984,"dealDetails":null,"roi":null,"price":null,"bonusForReference":null,"templateData":[],"testingArea":"","categories":[{"id":82,"title":"Unified Communications","alias":"unified-communications","description":"Unified communications (UC) is a framework for integrating various asynchronous and real-time communication tools. The goal of UC is to enhance business communication, collaboration and productivity. Unified communications do not represent a singular technology; rather, it describes a strategy for integrating interconnected systems of enterprise communication devices and applications that can be used in concert or successively.\r\nSome business communication tools - like Internet Protocol (IP) telephony and video conferencing - facilitate real-time communication, also called synchronous communication. Other enterprise communication tools, like email, facilitate asynchronous communication, which takes place at a person's convenience.\r\nIncreasingly, team collaboration tools have emerged to offer messaging-centric workflows and near-real-time communication. These tools also offer voice and video capabilities, API integrations and, ultimately, expound on instant messaging services by providing better UC features.\r\nThe goal of unified communications is to integrate the software that supports synchronous and asynchronous communication, so the end user has easy access to all tools from whatever device is in use.\r\nA unified communications environment is typically supported by one or more back-end systems, often referred to as UC platforms, that facilitate integration among services, as well as the front-end clients that provide access. For example, a web conferencing system would make use of an audio conferencing system - which, in turn, would be built on an underlying IP telephony platform - and a unified messaging client would allow click-to-talk (CTC), click-to-chat or click-to-video functionality.\r\nUC also supports users moving from one mode of communication to another within the same session. For example, a user may start communicating via email but then decide to escalate the interaction to real-time communication, transitioning the session to a voice call with one click and then to a video conference with another click without any disruption.\r\nUnified communications systems and their components can be deployed on premises, in a public or private cloud, or a combination of all three. Cloud-based unified communications is also called UC as a service (UCaaS). An open source project called WebRTC, for example, enables real-time communications to be embedded into web browsers.\r\nHistorically, single-vendor UC environments have demonstrated the tightest integration and compatibility. Interoperability among vendors remains an ongoing challenge in UC, but it has also been mitigated, in part, by partnerships, common protocols and open APIs.","materialsDescription":" <span style=\"font-weight: bold;\">What technology do unified communications have?</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Contrasting unified messaging</span></span>\r\nUnified communications are sometimes confused with unified messaging, but it is distinct. Unified communications refer to both real-time and non-real-time delivery of communications based on the preferred method and location of the recipient; unified messaging culls messages from several sources (such as e-mail, voice mail and faxes), but holds those messages only for retrieval at a later time. Unified communications allow for an individual to check and retrieve an e-mail or voice mail from any communication device at any time. It expands beyond voice mail services to data communications and video services.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Components</span></span>\r\nWith unified communications, multiple modes of business communications are integrated. Unified communications is not a single product but a collection of elements that include:\r\n<ul><li>Call control and multimodal communications</li><li>Presence</li><li>Instant messaging</li><li>Unified messaging</li><li>Speech access and personal assistant</li><li>Conferencing (audio, Web and video)</li><li>Collaboration tools</li><li>Mobility</li><li>Business process integration (BPI)</li><li>Software to enable business process integration</li></ul>\r\nPresence — knowing where intended recipients are, and if they are available, in real-time — is a key component of unified communications. Unified communications integrate all systems a user might already use, and helps those systems work together in real-time. For example, unified communications technology could allow a user to seamlessly collaborate with another person on a project, even if the two users are in separate locations. The user could quickly locate the necessary person by accessing an interactive directory, engage in a text messaging session, and then escalate the session to a voice call or even a video call.\r\nIn another example, an employee receives a call from a customer who wants answers. Unified communications enable that employee to call an expert colleague from a real-time list. This way, the employee can answer the customer faster by eliminating rounds of back-and-forth e-mails and phone-tag.\r\nThe examples in the previous paragraph primarily describe "personal productivity" enhancements that tend to benefit the individual user. While such benefits can be important, enterprises are finding that they can achieve even greater impact by using unified communications capabilities to transform business processes. This is achieved by integrating UC functionality directly into the business applications using development tools provided by many of the suppliers. Instead of the individual user invoking the UC functionality to, say, find an appropriate resource, the workflow or process application automatically identifies the resource at the point in the business activity where one is needed.\r\nWhen used in this manner, the concept of presence often changes. Most people associate presence with instant messaging (IM "buddy lists") the status of individuals is identified. But, in many business process applications, what is important is finding someone with a certain skill. In these environments, presence identifies available skills or capabilities.\r\nThis "business process" approach to integrating UC functionality can result in bottom-line benefits that are an order of magnitude greater than those achievable by personal productivity methods alone.\r\n<span style=\"font-weight: bold;\">Related concepts</span>\r\nUnified communications & collaboration (UCC) is the integration of various communications methods with collaboration tools such as virtual white boards, real-time audio and video conferencing, and enhanced call control capabilities. Before this fusion of communications and collaboration tools into a single platform, enterprise collaboration service vendors and enterprise communications service vendors offered distinctly different solutions. Now, collaboration service vendors also offer communications services, and communications service providers have developed collaboration tools.\r\nUnified communications & collaboration as a service (UCCaaS) is cloud-based UCC platforms. Compared to premises-based UCC solutions, UCCaaS platforms offer enhanced flexibility and scalability due to the SaaS subscription model.\r\nUnified communications provisioning is the act of entering and configuring the settings for users of phone systems, instant messaging, telepresence, and other collaboration channels. Provisioners refer to this process as making moves, adds, changes, and deletes or MAC-Ds.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Unified_Communications.png"},{"id":367,"title":"Web Conferencing Applications","alias":"web-conferencing-applications","description":" Web conferencing is the common name for technology and tools for online meetings and real-time collaboration. Web conferencing allows you to conduct online presentations, collaborate on documents and applications, view websites, videos, images.\r\nWeb conferences, as a rule, are Internet services that require the installation of a client program on each participant’s computer. Some services also provide access to a web conference via a browser using flash, java or a special plug-in.\r\nServices for web conferencing can include features and tools such as screen sharing (screen sharing or individual applications), whiteboard (interactive whiteboard), the ability to show web presentations, co-browsing (the ability to synchronously browse web pages), tools for annotations, monitoring the presence of participants, text chat, integrated VoIP communication, video communication, the ability to change the leader, the ability to give control over the mouse and keyboard, meeting moderation tools, feedback collection tools (on example, polls), tools for scheduling and inviting participants, the ability to record the progress of a web conference.\r\nOften, web conferencing is used with Internet services for audio and video calls (for example, Skype) or they provide conference calling via a regular telephone.","materialsDescription":" What is the first thing that strikes you when we look at businessmen who are trying to establish communication with each other online? All of them require: “Give more opportunities for web conferencing!”. Therefore, it is not at all surprising that the WebRTC technology is gaining the favor of an increasing number of small and medium-sized businesses.\r\nA recent study conducted by Software Advice showed that more than half of employees in small businesses prefer web conferences, noting their efficiency and usability. The advantages are especially noticeable in comparison with communications via telephone or the use of special applications. However, the benefits of web conferencing do not end there - according to the study, they not only increase the speed and quality of online meetings, but also provide a lot of opportunities for collaboration. In addition, and this is obvious, they reduce travel costs.\r\n<span style=\"font-weight: bold;\">Speed and quality come first.</span>\r\nIt is worth noting that now small and medium businesses are almost gone from the use of communication hardware and use desktop computers and mobile devices. Despite the fact that audio and video conferences are still very popular (they are used by 45% and 50% of users, respectively), web conferences are actively replacing them. Judge for yourself - according to statistics, every third user selects them as a means of communication after the first experience of use.\r\nThe main reason for such a rapid growth in popularity is the speed and quality that web conferencing users provide. According to respondents, the main advantage of web conferences is the ability to organize a meeting much faster than before. Now there is no need to spend time on installing special applications like Skype or similar - any communication systems using any third-party programs are a thing of the past. Also worth noting is the ability to connect to the web conference literally in one click.\r\nMore than 40% of the people surveyed showed dissatisfaction with the tedious procedure of entering authorization data, noting the simplicity and convenience of connecting to the WebRTC web conference. All you need is access to the Internet!\r\n<span style=\"font-weight: bold;\">We work in a team</span>\r\nIt is no secret that the use of web conferencing significantly reduces the company's travel expenses. After all, booking tickets, searching for hotels and meeting places can result in a decent amount, which will seriously hurt the company's income. Using web conferences, you get the opportunity to arrange business meetings, even with overseas partners, without leaving your office. But that's not all! Web conferencing offers a range of tools to overcome language barriers. For example, in the field of healthcare, videoconferencing has been used to establish consultations between doctors and patients from completely different countries. With the help of online translators and other special features of web conferences, people can get the necessary help from qualified foreign specialists.\r\nDo not forget that web conferencing is not only a convenient way to hold a video call. You can arrange trainings for your team using file transfer and document display functions, as well as conduct job interviews without wasting time.\r\nIt is interesting to note that small and medium-sized businesses share their product samples with prospective clients using web conferences, turning them into a powerful marketing tool. This brings the business to a fundamentally new level, allowing the company to take a leading position in its industry!","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Web_Conferencing_Applications.png"},{"id":415,"title":"Mobile Enterprise Applications","alias":"mobile-enterprise-applications","description":"The term <span style=\"font-weight: bold; \">enterprise mobile application</span> is used in context of mobile apps created/brought by individual organizations for their workers to carry out functions required to run the organization.\r\nAn enterprise mobile app belonging to an organization is expected to be used by only the workers of that organization. The definition of enterprise mobility apps do not include the mobile apps that an organization create for its customers or consumers of the products or services generated by the organization. \r\nProviders of mobile enterprise application solutions create and develop apps for individual organizations that can buy instead of creating the apps themselves. Reasons for Organizations buying the apps include time and cost savings, technical expertise. Today Enterprise Mobility is playing track role for enterprise transformation.\r\nCompanies are rapidly incorporating mobile applications into their larger IT strategies, allowing them to grow their mobile presence further. Big data, the Internet of Things (IoT), and machine learning are all propelling this growth.\r\nNeed for enterprise mobility applications arose with mobile devices becoming essential in the day to day life and with employees using mobile devices for business purposes. This lead companies to adapt to either Bring Your Own Device (BYOD) or Corporate Owned, Personally Enabled (COPE) approach for Enterprise Mobility. BYOD is making significant progress in the business world, with employees using their own technology at work.\r\nOrganizations having their internal mobile teams develop the apps internally and deploy them. However, some organizations go for enterprise mobile app development company with wide experience in creating Mobile strategies and deploying the apps for Medium to Large Scale Enterprises. These companies provide options for Pre built and custom built turn-key suite of apps. ","materialsDescription":"<h1 class=\"align-center\"><span style=\"font-weight: bold; \">What are corporate mobile apps?</span></h1>\r\nConventionally, corporate mobile applications can be divided into several groups.\r\n<ul><li><span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">The first group</span></span> is applications designed only for work. Their main goal is to reduce company costs, optimize business processes, and, as a result, increase profits. Another option is an application to increase the efficiency of the analytical department, giving its users the opportunity to improve monitoring of the market, competitors, quickly collect and process data on prices, points of sale of goods, etc.</li><li><span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">The second group</span></span> is applications that integrate work and communication. These include corporate social networks, so popular recently. Created in the image and likeness of social networks familiar to everyone, they successfully combine work functionality and allow employees to communicate with each other, create personal pages, workgroups, communities, keep blogs, receive news about the company, share important files, create a common information base and use it at any time. </li><li><span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">The third group</span></span> is applications for monitoring remote employees. Office workers are easy to control: most of the day they are at their workplace, and if necessary, you can organize a system of electronic passes. Remote employees are left to their own devices - it’s very difficult to check whether they arrived at the site on time and reached at all, how many points they visited in a day, and whether they used company materials and equipment to fulfill “left” orders. </li><li><span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">The fourth group</span></span> is Service Desk and Help Desk, designed to automate the processing of client requests while providing technical support to users of IT departments. Most of these systems are online, because it is important for the user to solve the problem as quickly as possible. With their help, you can provide customer support directly from your mobile device. Applications provide an opportunity in the background to access the list of applications, view in detail individual applications, make changes to them, respond and work with comments.</li></ul>\r\n<h1 class=\"align-center\">Top 5 enterprise mobility app features you must know</h1>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Centrally Moderated and Strongly Secured Data Infrastructure.</span> Security must never be at bay when it comes to enterprise mobility apps. In the age of information, data is undoubtedly the most valuable commodity, losing which can result in a massive loss for business enterprises. Data sharing done via enterprise mobility apps or solutions need to be monitored. Construct a centrally moderated and highly secure (multi-level security) infrastructure for enterprise mobility solutions. This approach enhances trust and ensures that critical business data remains safe always.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Automation of Processes.</span> Automation is the main factor behind the adoption of enterprise mobility in the core business processes by the organizations. Businesses aim to streamline their operations with minimal human intervention and cut back on time/cost. The number of device usage in the enterprise domain is increasing year-after-year. The growth showcases the seriousness of organizations to adopt top enterprise mobile apps for enhancing automation and processes for better efficiency. </p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Real-Time Analytics and Connectivity.</span> The integration of enterprise mobility applications in the existing system leverages the technology benefits for seeking better insights into the ongoing processes. Every enterprise app must have cognitive analytical capabilities to succeed. Modern organizations have to manage thousands of procedures, offerings and deal with hundreds of stakeholders at any point in time. In case of such massive data overloads, every enterprise aims to have a real-time data analysis to make better decisions for growth in the future.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Incredible User Experience. </span>An enterprise mobility app must deliver an intuitive user experience. Not only should it focus on making the functionality better, but also on offering the best experience to the users. This step, in turn, will boost app adoption within the enterprise, fulfilling the organization’s aim for automation. The app must contain futuristic features such as in-app notifications, multi-platform support, offline functionality, etc., to offer an incredible user experience. <br /><span style=\"font-weight: bold; \">Event-Driven Approach. </span>Event-driven approach and architecture is the main differentiator, which fuels digital business transformation. This approach mainly revolves around the delivery of solutions that fulfill organizational objectives by offering rapid response to specific events. Moreover, the event-driven approach aims to transform the task flow based on particular circumstances. Businesses would be able to leverage dynamic opportunities to the maximum potential and provide real-time solutions by choosing the event-driven approach for their enterprise mobility applications. </p>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Mobile_Enterprise_Applications.jpg"}],"characteristics":[],"concurentProducts":[],"jobRoles":[],"organizationalFeatures":[],"complementaryCategories":[],"solutions":[],"materials":[],"useCases":[],"best_practices":[],"values":[],"implementations":[]}],"countries":[{"id":217,"title":"Ukraine","name":"UKR"}],"startDate":"0000-00-00","endDate":"0000-00-00","dealDate":"0000-00-00","price":0,"status":"finished","statusLabel":"Finished","isImplementation":true,"isAgreement":false,"confirmed":1,"implementationDetails":{"businessObjectives":{"id":14,"title":"Business objectives","translationKey":"businessObjectives","options":[{"id":5,"title":"Enhance Staff Productivity"},{"id":6,"title":"Ensure Security and Business Continuity"}]},"businessProcesses":{"id":11,"title":"Business process","translationKey":"businessProcesses","options":[{"id":373,"title":"IT infrastructure does not meet business tasks"},{"id":375,"title":"No support for mobile and remote users"},{"id":378,"title":"Low employee productivity"},{"id":393,"title":"Complex and non-transparent business processes"},{"id":398,"title":"Poor communication and coordination among staff"}]}},"categories":[{"id":148,"title":"Enterprise Portal","alias":"enterprise-portal","description":"An enterprise portal, also known as an enterprise information portal (EIP), is a framework for integrating information, people and processes across organizational boundaries in a manner similar to the more general web portals. Enterprise portals provide a secure unified access point, often in the form of a web-based user interface, and are designed to aggregate and personalize information through application-specific portlets.\r\nOne hallmark of enterprise portals is the de-centralized content contribution and content management, which keeps the information always updated. Another distinguishing characteristic is that they cater for customers, vendors and others beyond an organization's boundaries. This contrasts with a corporate portal which is structured for roles within an organization.\r\nAn enterprise portal has two main functions; integration and presentation. It must be able to access information from multiple and varied sources and manipulate that information through the portal.\r\nOther common features include;\r\n<ul><li><span style=\"font-style: italic;\">Single sign-on</span> — enterprise portals can provide single sign-on capabilities between their users and various other systems. This requires a user to authenticate only once.</li><li><span style=\"font-style: italic;\">Integration</span> — the connection of functions and data from multiple systems into new components/portlets/web parts with an integrated navigation between these components.</li><li><span style=\"font-style: italic;\">Federation</span> — the integration of content provided by other portals, typically through the use of WSRP or similar technologies.</li><li><span style=\"font-style: italic;\">Customization</span> — Users can customize the look and feel of their environment. Customers who are using EIPs can edit and design their own web sites which are full of their own personality and own style; they can also choose the specific content and services they prefer. Also refers to the ability to prioritize most appropriate content based on attributes of the user and metadata of the available content.</li><li><span style=\"font-style: italic;\">Personalization</span> — Personalization is more about matching content with the user. Based on a user profile, personalization uses rules to match the "services", or content, to the specific user. To some degree, you can think of the two like this: customization is in hands of the end user, personalization is not. Of course actual personalization is often based on your role or job function within the portal context.</li><li><span style=\"font-style: italic;\">Access control</span> — the ability for portal to limit specific types of content and services users have access to. For example, a company's proprietary information can be entitled for only company employee access. This access rights may be provided by a portal administrator or by a provisioning process. Access control lists manage the mapping between portal content and services over the portal user base.</li><li><span style=\"font-style: italic;\">Enterprise search</span> — search enterprise content using enterprise search.</li><li><span style=\"font-style: italic;\">Omni channel enablement</span> — present the pages optimally on all channels and devices.</li><li><span style=\"font-style: italic;\">Analytics</span> — track and monitor user behaviour on portal pages (such as navigation, clicks, downloads, page exits and such) and generate reports.</li></ul>","materialsDescription":" <span style=\"font-weight: bold;\">What is an Enterprise Portal?</span>\r\nAbbreviated as EPS, Enterprise Portal Software is a prepackaged software kit used by the enterprise to integrate its information and processes. Organizations use portals primarily to aggregate information from a number of different sources, including disparate systems, and provide this information to authorized users in a neatly managed single screen or system.\r\n<span style=\"font-weight: bold;\">Typical Enterprise Portal's Interface</span>\r\nEPS usually offers a Web-based interface to provide a secure unified access point through which information is aggregated to application-specific portlets. Enterprise Portal Software lets authorized users access Web services, and portals can be combined to form portal networks that can cover an organization's entire enterprise system.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Enterprise_Portal.png"},{"id":273,"title":"Team Collaborative Applications","alias":"team-collaborative-applications","description":" Collaborative software or groupware is application software designed to help people working on a common task to attain their goals. One of the earliest definitions of groupware is "intentional group processes plus software to support them".\r\nThe worldwide team collaborative applications market continues to accelerate as collaboration becomes a key component of the future of work in a digital enterprise. The market is growing in revenue, leveraging IT integrations to both bridge functions and the enterprise. The market continues to move to the cloud and emphasizes usage across devices.\r\nThe total worldwide team collaborative applications market grew at 24.7% year over year, up from 21.5% growth the previous year. Growth was powered by the adoption of solutions that made working together more agile and seamless and favored solutions with integrations that centralize work, assets, and communications, including messaging and chat. In short, applications that made it easier to get work done by bringing content, context, and communications in a single place.\r\nFeeling the pinch to produce more with less, organizations have turned to collaborative applications to streamline workflow and engage employees, partners and, increasingly, customers. They are discovering new paths to productivity, a better digital user experience (UX), and loyalty. Companies are developing a new way to work together and across their workforce and the sales continuum. A more technology-savvy and digitally connected workforce is empowering and accelerating this trend. Artificial intelligence (AI) is more common across collaborative solutions and almost expected by employees to automate repetitive tasks. Increasingly, machine learning (ML) and AI will generate new forms of value from conversations, meetings, and other content assets.\r\nMake no mistake, the majority of the lead vendors in this space are heavily invested in the future of work and want to be either your future workspace — where work actually is done — or an application that integrates to facilitate better and more productive results with a better-engaged workforce.","materialsDescription":"<span style=\"font-weight: bold; \">What is groupware?</span>\r\nCollaborative software was originally designated as groupware and this term can be traced as far back as the late 1980s, when Richman and Slovak (1987) wrote: "Like an electronic sinew that binds teams together, the new groupware aims to place the computer squarely in the middle of communications among managers, technicians, and anyone else who interacts in groups, revolutionizing the way they work."\r\nEven further back, in 1978 Peter and Trudy Johnson-Lenz coined the term groupware; their initial 1978 definition of groupware was, "intentional group processes plus software to support them." Later in their article they went on to explain groupware as "computer-mediated culture... an embodiment of social organization in hyperspace." Groupware integrates co-evolving human and tool systems, yet is simply a single system.\r\nIn the early 1990s the first commercial groupware products were delivered, and big companies such as Boeing and IBM started using electronic meeting systems for key internal projects. Lotus Notes appeared as a major example of that product category, allowing remote group collaboration when the internet was still in its infancy. Kirkpatrick and Losee (1992) wrote then: "If GROUPWARE really makes a difference in productivity long term, the very definition of an office may change. You will be able to work efficiently as a member of a group wherever you have your computer. As computers become smaller and more powerful, that will mean anywhere." In 1999, Achacoso created and introduced the first wireless groupware.\r\n<span style=\"font-weight: bold;\">What are the levels of groupware?</span>\r\nGroupware can be divided into three categories depending on the level of collaboration:\r\n<ul><li>Communication can be thought of as unstructured interchange of information. A phone call or an IM Chat discussion are examples of this.</li><li>Conferencing (or collaboration level, as it is called in the academic papers that discuss these levels) refers to interactive work toward a shared goal. Brainstorming or voting are examples of this.</li><li>Co-ordination refers to complex interdependent work toward a shared goal. A good metaphor for understanding this is to think about a sports team; everyone has to contribute the right play at the right time as well as adjust their play to the unfolding situation - but everyone is doing something different - in order for the team to win. That is complex interdependent work toward a shared goal: collaborative management.</li></ul>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Team_Collaborative_Applications.png"},{"id":307,"title":"Archiving Software","alias":"archiving-software","description":" Enterprise <span style=\"font-weight: bold;\">archiving software </span>is designed to assist in storing a company’s structured and unstructured data. By incorporating unstructured data (e.g., email messages and media files), enterprise information archiving software provides more complete archives of business data across the board. Data can be stored on premise with local data servers or on cloud servers, or using a hybrid of the two. These solutions are used throughout a business by any employee, since all teams should be archiving their data for, at minimum, auditing purposes. Data archiving software are typically implemented and maintained by a company’s data team, and they can be used by companies of any size.\r\nWhile similar to a backup software solution, archiving solution handles the original data as opposed to a copy of that data. To qualify for the data archiving solutions category, a product must: \r\n<ul><li>Store both structured and unstructured data</li><li>Provide data management options for archived data</li><li>Protect access to archived data</li></ul>","materialsDescription":"<h1 class=\"align-center\"> What is Archiving Software?</h1>\r\nArchiving Software supports enterprises in retaining and rapidly retrieving structured and unstructured data over time while complying with security standards and the like. File archiving may include images, messages (e.g. IMs, social media posts, etc.), emails, and content from web pages and social sites. Compliant data retention may require retaining data in its native form and context so that it can be understood.\r\nAlso called Enterprise Information Archiving (EIA), archiving software is designed to meet discovery requirements. That means that the archive must be searchable so that all stored data can be retrieved with context intact.\r\nArchiving software is most commonly a requirement for banking institutions and governments. More stringent privacy laws means that EIA has become a concern for private corporations as well. Archiving software will contain features overlapping Enterprise Search, Data Governance and eDiscovery, and some features in common with ECM.\r\n<h1 class=\"align-center\">What’s the Difference: Backup vs Archive</h1>\r\nBackups and archives serve different functions, yet it’s common to hear the terms used interchangeably in cloud storage. \r\nA <span style=\"font-weight: bold;\">backup </span>is a copy of your data that is made to protect against loss of that data. Typically, backups are made on a regular basis according to a time schedule or when the original data changes. The original data is not deleted, but older backups are often deleted in favor of newer backups.<br /><span style=\"font-weight: bold;\">The goal of a backup</span> is to make a copy of anything in current use that can’t afford to be lost. A backup of a desktop or mobile device might include just the user data so that a previous version of a file can be recovered if necessary.\r\nOn these types of devices an assumption is often made that the OS and applications can easily be restored from original sources if necessary (and/or that restoring an OS to a new device could lead to significant corruption issues). In a virtual server environment, a backup could include.\r\nAn <span style=\"font-weight: bold;\">archive </span>is a copy of data made for long-term storage and reference. The original data may or may not be deleted from the source system after the archive copy is made and stored, though it is common for the archive to be the only copy of the data. \r\nIn contrast to a backup whose purpose is to be able to return a computer or file system to a state it existed in previously, <span style=\"font-weight: bold;\">data archiving can have multiple purposes</span>. An archiving system can provide an individual or organization with a permanent record of important papers, legal documents, correspondence, and other matters.\r\nOften, archive program is used to meet information retention requirements for corporations and businesses. If a dispute or inquiry arises about a business practice, contract, financial transaction, or employee, the records pertaining to that subject can be obtained from the archive.\r\nAn archive is frequently used to ease the burden on faster and more frequently accessed data storage systems. Older data that is unlikely to be needed often is put on systems that don’t need to have the speed and accessibility of systems that contain data still in use. Archival storage systems are usually less expensive, as well, so a strong motivation is to save money on data storage.\r\nArchives are often created based on the age of the data or whether the project the data belongs to is still active. Data archiving solutions might send data to an archive if it hasn’t been accessed in a specified amount of time, when it has reached a certain age, if a person is no longer with the organization, or the files have been marked for storage because the project has been completed or closed.<br /><br /><br />","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Archiving_Software.png"},{"id":271,"title":"Messaging Applications","alias":"messaging-applications","description":" Messaging apps (a.k.a. "Social messaging" or "chat applications") are apps and platforms that enable messaging, many of which started around social networking platforms, but many of which have now developed into broad platforms enabling status updates, chatbots, payments and conversational commerce (e-commerce via chat).\r\nSome examples of popular messaging apps include WhatsApp, China's WeChat and QQ Messenger, Viber, Line, Snapchat, Korea's KakaoTalk, Google Hangouts, Blackberry Messenger, Telegram, and Vietnam's Zalo. Slack focuses on messaging and file sharing for work teams. Some social networking services offer messaging services as a component of their overall platform, such as Facebook's Facebook Messenger, along with Instagram and Twitter's direct messaging functions.\r\nMessaging apps are the most widely used smartphone apps with in 2018 over 1.3 billion monthly users of WhatsApp and Facebook Messenger, 980 million monthly active users of WeChat and 843 million monthly active users of QQ Mobile.\r\nOnline chatting apps differ from the previous generation of instant messaging platforms like the defunct AIM, Yahoo! Messenger, and Windows Live Messenger, in that they are primarily used via mobile apps on smartphones as opposed to personal computers, although some messaging apps offer web-based versions or software for PC operating systems.\r\nAs people upgraded in the 2010s from feature phones to smartphones, they moved from traditional calling and SMS (which are paid services) to messaging apps which are free or only incur small data charges.\r\n<p class=\"align-left\"> </p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold;\">Messaging apps each have some of the following features:</span></p>\r\n<ul><li>Chat</li></ul>\r\n<ol><li>One-on-one chat</li><li>Group chat</li><li> Broadcast lists</li><li>Chatbots (including "bot in group chats")</li><li>"Smart replies" (suggested replies to incoming messages provided by Google's Reply platform )</li></ol>\r\n<ul><li>Calls</li></ul>\r\n<ol><li>Voice calls</li><li> Video calls</li></ol>\r\n<ul><li>Audio alerts (on Line)</li><li>File sharing</li><li>Games</li><li>"Mini Programs" (e.g. WeChat Mini Program)</li><li>News discovery (e.g. Snapchat Discover)</li><li>Payments or mobile wallet, e.g. WeChat Pay which processes much of the Chinese mobile payment volume of US$5 trillion (2016)</li><li>Personal (cloud) storage</li><li>Push notifications</li><li>Status updates (WhatsApp Status, WeChat Moments)</li><li>Stickers</li><li>Virtual assistant, e.g. Google Assistant in Google Allo</li></ul>\r\n<p class=\"align-left\">Unlike chat rooms with many users engaging in multiple and overlapping conversations, instant messaging application sessions usually take place between two users in a private, back-and-forth style of communication.</p>\r\n<p class=\"align-left\">One of the core features of different messaging apps is the ability to see whether a friend or co-worker is online and connected through the selected service -- a capability known as presence. As the technology has evolved, many online messaging apps have added support for exchanging more than just text-based messages, allowing actions like file transfers and image sharing within the instant messaging session.</p>\r\n<p class=\"align-left\">Instant messaging also differs from email in the immediacy of the message exchange. It also tends to be session-based, having a start and an end. Because application message is intended to mimic in-person conversations, individual messages are often brief. Email, on the other hand, usually reflects a longer-form, letter-writing style.<br /><br /><br /></p>","materialsDescription":"<h1 class=\"align-center\"> <span style=\"font-weight: normal; \">What is instant messaging software?</span></h1>\r\nCompanies use instant messaging software to facilitate communication between their staff members who may be located in different places and countries. Popular websites such as Facebook offer instant chat services for free. Good quality messenger application solutions provide useful features such as video calling, web conferencing, and VoIP. Advanced platforms offer IP radio, IPTV, and desktop sharing tools. Large enterprises have greater communication needs and therefore they typically invest in installing an internal IM server to serve their thousands of employees.\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal; \">Why people use Messaging Apps?</span></h1>\r\n<ul><li>Real-time text transmission</li><li>Conveniency</li><li>Records of a chat history</li><li>Easy for multitasking</li><li>Operating anytime anywhere using the WiFi or Mobile Network operators</li><li>Stickers</li></ul>\r\nCommunication is an essential component of any business: interaction with external or internal customers, end users, employees. A good communication platform is vital to stay connected with the employees and broadcast information fast and efficiently. Thousands of people support the escalation from IM to other ways of communication, such as group chat, voice calls or video conferencing.<br />Depending on the purpose of use we can separate popular messenger nto those with business needs or for corporate use, such as Slack, Hangouts, Flock, Stride and those for everyday communications like WhatsApp, FB Messenger, WeChat, Telegram, and others.\r\n<h1 class=\"align-center\"><span style=\"font-weight: normal;\">How messaging apps can benefit your business?</span></h1>\r\n<p class=\"align-center\"></p>\r\nHeads bowed, shoulders hunched over glowing screens—we all might be a little guilty of smartphone addiction, and mobile usage is only increasing. We’re in constant communication with one another, and over the past few years messaging apps like Facebook Messenger and WeChat have become commonplace. Of the 10 most globally used apps, messaging apps account for 6.\r\nWith consumer messaging apps on the rise, businesses have begun to connect with customers on yet another channel. According to Gartner, “By 2019, requests for customer support through consumer mobile messaging apps will exceed requests for customer support through traditional social media.”\r\nServing up customer support through customer messaging software can deepen your brand’s relationship with customers. On the customer side, messaging apps provide an immediate way to connect with your business and get a response.\r\n<p class=\"align-center\"><span style=\"font-weight: bold;\">Here are three ways your business can benefit from connecting with customers over consumer messaging apps:</span></p>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Unrestricted communication.</span> No matter where they are in the world, messaging apps offer your customers unrestricted communication options. Unlike SMS, which often incurs charges, your customers can still reach out privately via messaging apps and receive a timely response without worrying about cost. That means happier customers, and happy customers mean a happy bottom line for your business.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Move customer queries from public to private. </span>Giving your customers an easy option to reach your business privately not only decreases their likelihood of publicly tweeting a complaint, it also offers a space to exchange sensitive information, like delivery details. With a more private outlet for customer interactions, your business can thoroughly help customers while simultaneously saving brand face.</li></ul>\r\n\r\n<ul><li><span style=\"font-weight: bold;\">Increase first contact resolution with chatbot integrations.</span> According to Gartner, artificial intelligence is a top trend for 2017. With the help of chatbots, your business can better manage workflows and automatically respond to customer requests via messaging. Chatbots can help point customers to the right information, helping them self-serve and ultimately allowing your support agents to focus on the issues that require a human touch. </li></ul>\r\n\r\n","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Messaging_Applications.png"},{"id":82,"title":"Unified Communications","alias":"unified-communications","description":"Unified communications (UC) is a framework for integrating various asynchronous and real-time communication tools. The goal of UC is to enhance business communication, collaboration and productivity. Unified communications do not represent a singular technology; rather, it describes a strategy for integrating interconnected systems of enterprise communication devices and applications that can be used in concert or successively.\r\nSome business communication tools - like Internet Protocol (IP) telephony and video conferencing - facilitate real-time communication, also called synchronous communication. Other enterprise communication tools, like email, facilitate asynchronous communication, which takes place at a person's convenience.\r\nIncreasingly, team collaboration tools have emerged to offer messaging-centric workflows and near-real-time communication. These tools also offer voice and video capabilities, API integrations and, ultimately, expound on instant messaging services by providing better UC features.\r\nThe goal of unified communications is to integrate the software that supports synchronous and asynchronous communication, so the end user has easy access to all tools from whatever device is in use.\r\nA unified communications environment is typically supported by one or more back-end systems, often referred to as UC platforms, that facilitate integration among services, as well as the front-end clients that provide access. For example, a web conferencing system would make use of an audio conferencing system - which, in turn, would be built on an underlying IP telephony platform - and a unified messaging client would allow click-to-talk (CTC), click-to-chat or click-to-video functionality.\r\nUC also supports users moving from one mode of communication to another within the same session. For example, a user may start communicating via email but then decide to escalate the interaction to real-time communication, transitioning the session to a voice call with one click and then to a video conference with another click without any disruption.\r\nUnified communications systems and their components can be deployed on premises, in a public or private cloud, or a combination of all three. Cloud-based unified communications is also called UC as a service (UCaaS). An open source project called WebRTC, for example, enables real-time communications to be embedded into web browsers.\r\nHistorically, single-vendor UC environments have demonstrated the tightest integration and compatibility. Interoperability among vendors remains an ongoing challenge in UC, but it has also been mitigated, in part, by partnerships, common protocols and open APIs.","materialsDescription":" <span style=\"font-weight: bold;\">What technology do unified communications have?</span>\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Contrasting unified messaging</span></span>\r\nUnified communications are sometimes confused with unified messaging, but it is distinct. Unified communications refer to both real-time and non-real-time delivery of communications based on the preferred method and location of the recipient; unified messaging culls messages from several sources (such as e-mail, voice mail and faxes), but holds those messages only for retrieval at a later time. Unified communications allow for an individual to check and retrieve an e-mail or voice mail from any communication device at any time. It expands beyond voice mail services to data communications and video services.\r\n<span style=\"font-style: italic;\"><span style=\"font-weight: bold;\">Components</span></span>\r\nWith unified communications, multiple modes of business communications are integrated. Unified communications is not a single product but a collection of elements that include:\r\n<ul><li>Call control and multimodal communications</li><li>Presence</li><li>Instant messaging</li><li>Unified messaging</li><li>Speech access and personal assistant</li><li>Conferencing (audio, Web and video)</li><li>Collaboration tools</li><li>Mobility</li><li>Business process integration (BPI)</li><li>Software to enable business process integration</li></ul>\r\nPresence — knowing where intended recipients are, and if they are available, in real-time — is a key component of unified communications. Unified communications integrate all systems a user might already use, and helps those systems work together in real-time. For example, unified communications technology could allow a user to seamlessly collaborate with another person on a project, even if the two users are in separate locations. The user could quickly locate the necessary person by accessing an interactive directory, engage in a text messaging session, and then escalate the session to a voice call or even a video call.\r\nIn another example, an employee receives a call from a customer who wants answers. Unified communications enable that employee to call an expert colleague from a real-time list. This way, the employee can answer the customer faster by eliminating rounds of back-and-forth e-mails and phone-tag.\r\nThe examples in the previous paragraph primarily describe "personal productivity" enhancements that tend to benefit the individual user. While such benefits can be important, enterprises are finding that they can achieve even greater impact by using unified communications capabilities to transform business processes. This is achieved by integrating UC functionality directly into the business applications using development tools provided by many of the suppliers. Instead of the individual user invoking the UC functionality to, say, find an appropriate resource, the workflow or process application automatically identifies the resource at the point in the business activity where one is needed.\r\nWhen used in this manner, the concept of presence often changes. Most people associate presence with instant messaging (IM "buddy lists") the status of individuals is identified. But, in many business process applications, what is important is finding someone with a certain skill. In these environments, presence identifies available skills or capabilities.\r\nThis "business process" approach to integrating UC functionality can result in bottom-line benefits that are an order of magnitude greater than those achievable by personal productivity methods alone.\r\n<span style=\"font-weight: bold;\">Related concepts</span>\r\nUnified communications & collaboration (UCC) is the integration of various communications methods with collaboration tools such as virtual white boards, real-time audio and video conferencing, and enhanced call control capabilities. Before this fusion of communications and collaboration tools into a single platform, enterprise collaboration service vendors and enterprise communications service vendors offered distinctly different solutions. Now, collaboration service vendors also offer communications services, and communications service providers have developed collaboration tools.\r\nUnified communications & collaboration as a service (UCCaaS) is cloud-based UCC platforms. Compared to premises-based UCC solutions, UCCaaS platforms offer enhanced flexibility and scalability due to the SaaS subscription model.\r\nUnified communications provisioning is the act of entering and configuring the settings for users of phone systems, instant messaging, telepresence, and other collaboration channels. Provisioners refer to this process as making moves, adds, changes, and deletes or MAC-Ds.","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/Unified_Communications.png"},{"id":367,"title":"Web Conferencing Applications","alias":"web-conferencing-applications","description":" Web conferencing is the common name for technology and tools for online meetings and real-time collaboration. Web conferencing allows you to conduct online presentations, collaborate on documents and applications, view websites, videos, images.\r\nWeb conferences, as a rule, are Internet services that require the installation of a client program on each participant’s computer. Some services also provide access to a web conference via a browser using flash, java or a special plug-in.\r\nServices for web conferencing can include features and tools such as screen sharing (screen sharing or individual applications), whiteboard (interactive whiteboard), the ability to show web presentations, co-browsing (the ability to synchronously browse web pages), tools for annotations, monitoring the presence of participants, text chat, integrated VoIP communication, video communication, the ability to change the leader, the ability to give control over the mouse and keyboard, meeting moderation tools, feedback collection tools (on example, polls), tools for scheduling and inviting participants, the ability to record the progress of a web conference.\r\nOften, web conferencing is used with Internet services for audio and video calls (for example, Skype) or they provide conference calling via a regular telephone.","materialsDescription":" What is the first thing that strikes you when we look at businessmen who are trying to establish communication with each other online? All of them require: “Give more opportunities for web conferencing!”. Therefore, it is not at all surprising that the WebRTC technology is gaining the favor of an increasing number of small and medium-sized businesses.\r\nA recent study conducted by Software Advice showed that more than half of employees in small businesses prefer web conferences, noting their efficiency and usability. The advantages are especially noticeable in comparison with communications via telephone or the use of special applications. However, the benefits of web conferencing do not end there - according to the study, they not only increase the speed and quality of online meetings, but also provide a lot of opportunities for collaboration. In addition, and this is obvious, they reduce travel costs.\r\n<span style=\"font-weight: bold;\">Speed and quality come first.</span>\r\nIt is worth noting that now small and medium businesses are almost gone from the use of communication hardware and use desktop computers and mobile devices. Despite the fact that audio and video conferences are still very popular (they are used by 45% and 50% of users, respectively), web conferences are actively replacing them. Judge for yourself - according to statistics, every third user selects them as a means of communication after the first experience of use.\r\nThe main reason for such a rapid growth in popularity is the speed and quality that web conferencing users provide. According to respondents, the main advantage of web conferences is the ability to organize a meeting much faster than before. Now there is no need to spend time on installing special applications like Skype or similar - any communication systems using any third-party programs are a thing of the past. Also worth noting is the ability to connect to the web conference literally in one click.\r\nMore than 40% of the people surveyed showed dissatisfaction with the tedious procedure of entering authorization data, noting the simplicity and convenience of connecting to the WebRTC web conference. All you need is access to the Internet!\r\n<span style=\"font-weight: bold;\">We work in a team</span>\r\nIt is no secret that the use of web conferencing significantly reduces the company's travel expenses. After all, booking tickets, searching for hotels and meeting places can result in a decent amount, which will seriously hurt the company's income. Using web conferences, you get the opportunity to arrange business meetings, even with overseas partners, without leaving your office. But that's not all! Web conferencing offers a range of tools to overcome language barriers. For example, in the field of healthcare, videoconferencing has been used to establish consultations between doctors and patients from completely different countries. With the help of online translators and other special features of web conferences, people can get the necessary help from qualified foreign specialists.\r\nDo not forget that web conferencing is not only a convenient way to hold a video call. You can arrange trainings for your team using file transfer and document display functions, as well as conduct job interviews without wasting time.\r\nIt is interesting to note that small and medium-sized businesses share their product samples with prospective clients using web conferences, turning them into a powerful marketing tool. This brings the business to a fundamentally new level, allowing the company to take a leading position in its industry!","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Web_Conferencing_Applications.png"},{"id":415,"title":"Mobile Enterprise Applications","alias":"mobile-enterprise-applications","description":"The term <span style=\"font-weight: bold; \">enterprise mobile application</span> is used in context of mobile apps created/brought by individual organizations for their workers to carry out functions required to run the organization.\r\nAn enterprise mobile app belonging to an organization is expected to be used by only the workers of that organization. The definition of enterprise mobility apps do not include the mobile apps that an organization create for its customers or consumers of the products or services generated by the organization. \r\nProviders of mobile enterprise application solutions create and develop apps for individual organizations that can buy instead of creating the apps themselves. Reasons for Organizations buying the apps include time and cost savings, technical expertise. Today Enterprise Mobility is playing track role for enterprise transformation.\r\nCompanies are rapidly incorporating mobile applications into their larger IT strategies, allowing them to grow their mobile presence further. Big data, the Internet of Things (IoT), and machine learning are all propelling this growth.\r\nNeed for enterprise mobility applications arose with mobile devices becoming essential in the day to day life and with employees using mobile devices for business purposes. This lead companies to adapt to either Bring Your Own Device (BYOD) or Corporate Owned, Personally Enabled (COPE) approach for Enterprise Mobility. BYOD is making significant progress in the business world, with employees using their own technology at work.\r\nOrganizations having their internal mobile teams develop the apps internally and deploy them. However, some organizations go for enterprise mobile app development company with wide experience in creating Mobile strategies and deploying the apps for Medium to Large Scale Enterprises. These companies provide options for Pre built and custom built turn-key suite of apps. ","materialsDescription":"<h1 class=\"align-center\"><span style=\"font-weight: bold; \">What are corporate mobile apps?</span></h1>\r\nConventionally, corporate mobile applications can be divided into several groups.\r\n<ul><li><span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">The first group</span></span> is applications designed only for work. Their main goal is to reduce company costs, optimize business processes, and, as a result, increase profits. Another option is an application to increase the efficiency of the analytical department, giving its users the opportunity to improve monitoring of the market, competitors, quickly collect and process data on prices, points of sale of goods, etc.</li><li><span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">The second group</span></span> is applications that integrate work and communication. These include corporate social networks, so popular recently. Created in the image and likeness of social networks familiar to everyone, they successfully combine work functionality and allow employees to communicate with each other, create personal pages, workgroups, communities, keep blogs, receive news about the company, share important files, create a common information base and use it at any time. </li><li><span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">The third group</span></span> is applications for monitoring remote employees. Office workers are easy to control: most of the day they are at their workplace, and if necessary, you can organize a system of electronic passes. Remote employees are left to their own devices - it’s very difficult to check whether they arrived at the site on time and reached at all, how many points they visited in a day, and whether they used company materials and equipment to fulfill “left” orders. </li><li><span style=\"font-style: italic; \"><span style=\"font-weight: bold; \">The fourth group</span></span> is Service Desk and Help Desk, designed to automate the processing of client requests while providing technical support to users of IT departments. Most of these systems are online, because it is important for the user to solve the problem as quickly as possible. With their help, you can provide customer support directly from your mobile device. Applications provide an opportunity in the background to access the list of applications, view in detail individual applications, make changes to them, respond and work with comments.</li></ul>\r\n<h1 class=\"align-center\">Top 5 enterprise mobility app features you must know</h1>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Centrally Moderated and Strongly Secured Data Infrastructure.</span> Security must never be at bay when it comes to enterprise mobility apps. In the age of information, data is undoubtedly the most valuable commodity, losing which can result in a massive loss for business enterprises. Data sharing done via enterprise mobility apps or solutions need to be monitored. Construct a centrally moderated and highly secure (multi-level security) infrastructure for enterprise mobility solutions. This approach enhances trust and ensures that critical business data remains safe always.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Automation of Processes.</span> Automation is the main factor behind the adoption of enterprise mobility in the core business processes by the organizations. Businesses aim to streamline their operations with minimal human intervention and cut back on time/cost. The number of device usage in the enterprise domain is increasing year-after-year. The growth showcases the seriousness of organizations to adopt top enterprise mobile apps for enhancing automation and processes for better efficiency. </p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Real-Time Analytics and Connectivity.</span> The integration of enterprise mobility applications in the existing system leverages the technology benefits for seeking better insights into the ongoing processes. Every enterprise app must have cognitive analytical capabilities to succeed. Modern organizations have to manage thousands of procedures, offerings and deal with hundreds of stakeholders at any point in time. In case of such massive data overloads, every enterprise aims to have a real-time data analysis to make better decisions for growth in the future.</p>\r\n<p class=\"align-left\"><span style=\"font-weight: bold; \">Incredible User Experience. </span>An enterprise mobility app must deliver an intuitive user experience. Not only should it focus on making the functionality better, but also on offering the best experience to the users. This step, in turn, will boost app adoption within the enterprise, fulfilling the organization’s aim for automation. The app must contain futuristic features such as in-app notifications, multi-platform support, offline functionality, etc., to offer an incredible user experience. <br /><span style=\"font-weight: bold; \">Event-Driven Approach. </span>Event-driven approach and architecture is the main differentiator, which fuels digital business transformation. This approach mainly revolves around the delivery of solutions that fulfill organizational objectives by offering rapid response to specific events. Moreover, the event-driven approach aims to transform the task flow based on particular circumstances. Businesses would be able to leverage dynamic opportunities to the maximum potential and provide real-time solutions by choosing the event-driven approach for their enterprise mobility applications. </p>","iconURL":"https://old.roi4cio.com/fileadmin/user_upload/icon_Mobile_Enterprise_Applications.jpg"}],"additionalInfo":{"budgetNotExceeded":"-1","functionallyTaskAssignment":"-1","projectWasPut":"-1","price":0,"source":{"url":"https://ko.com.ua/ami_pomogla_uluchshit_kollektivnoe_vzaimodejstvie_v_kompanii_deliveri_80784","title":"Media"}},"comments":[],"referencesCount":0}]}},"aliases":{},"links":{},"meta":{},"loading":false,"error":null},"agreements":{"agreementById":{},"ids":{},"links":{},"meta":{},"loading":false,"error":null},"comparison":{"loading":false,"error":false,"templatesById":{},"comparisonByTemplateId":{},"products":[],"selectedTemplateId":null},"presentation":{"type":null,"company":{},"products":[],"partners":[],"formData":{},"dataLoading":false,"dataError":false,"loading":false,"error":false},"catalogsGlobal":{"subMenuItemTitle":""}}