Energy Efficient Microservers from Dell for Cloud Computing Infrastructures

Energy Efficient Microservers from Dell for Cloud Computing Infrastructures

Dell introduced its third generation of microservers, PowerEdge C5000 line, including the PowerEdge C5125 and C5220 for deploying shared infrastructure and cloud environments.  This new series of custom designed microservers enable building cloud computing infrastructures that allow applications to run on individual dedicated physical servers without comprosing on cost and power.

Dell’s newest microservers The PowerEdge C5125 and C5220 are optimized for dedicated and virtualized IT hosting and Web 2.0 environments. These microservers come with eight to 12 individual server nodes in one 3U chassis and can support both AMD and Intel architectures respectively.  4 x DDR3 UDIMMS, 2 x 3.5-inch or 4 x 2.5-inch HDDs, 2 x GbE ports, IPMI 2.0 management, iKVM, individually serviceable nodes, as well as a shared power and cooling infrastructure are the added features of PowerEdge C5000 line of microservers. These excellent features enable data centers to maximize their revenues by saving on sapce, energy and cabling needs.

Commenting on the product Andy Rhodes, executive director of marketing, Dell Data Center Solutions said, “Over the last four years, we’ve had the pleasure of working with some of the biggest data center operators in the world, whose complex environments require optimal efficiency. Our new PowerEdge C microservers further solidify our position as the premier vendor of specialized server solutions, leveraging our experience working with this unique set of customers and placing that power into the hands of a broader customer base including Web hosting and IT service providers“.

Reuben Miller, senior research analyst, IDC said, “The growth of various cloud computing models has resulted in many of these organizations grappling with the best way to optimize and scale the performance of their enormous data centers. This new microserver series, through a shared infrastructure and energy efficient design, helps these customers maximize their IT environments while helping them adapt to change with a highly modular and serviceable design“.

By Anuradha Shukla

do understand but it shouldn’t be brought up every month.  It puts me a difficult spot.  Writers seem to think that I’m making a fortune which is not case.  Its still a tough and competitive business.

Sorry, comments are closed for this post.

Comics
Cyber Criminals Are Business People Too

Cyber Criminals Are Business People Too

Cyber Crime Business You’re on the morning train on the way to work and take a look at the guy next to you. He’s clean-cut, wearing a crisp suit and holding a leather briefcase just like dozens of others. Just another worker headed to the office, right?. Yes, but not in the way you think…

Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Staying on Top of Your Infrastructure-as-a-Service Security Responsibilities

Infrastructure-as-a-Service Security It’s no secret many organizations rely on popular cloud providers like Amazon and Microsoft for access to computing infrastructure. The many perks of cloud services, such as the ability to quickly scale resources without the upfront cost of buying physical servers, have helped build a multibillion-dollar cloud industry that continues to grow each…

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups: Guarding Your Data Against Hackers

The Importance of Cloud Backups Cloud platforms have become a necessary part of modern business with the benefits far outweighing the risks. However, the risks are real and account for billions of dollars in losses across the globe per year. If you’ve been hacked, you’re not alone. Here are some other companies in the past…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

7 Common Cloud Security Missteps

7 Common Cloud Security Missteps

Cloud Security Missteps Cloud computing remains shrouded in mystery for the average American. The most common sentiment is, “It’s not secure.” Few realize how many cloud applications they access every day: Facebook, Gmail, Uber, Evernote, Venmo, and the list goes on and on… People flock to cloud services for convenient solutions to everyday tasks. They…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…