560 KB | 3 files | PDF
Explaining how going green can pay for itself, this book ties the green agenda in IT to the broader corporate agenda in risk management, brand management, and reputation management.
Explaining how going green can pay for itself, Green Computing: Tools and Techniques for Saving Energy, Money, and Resources ties the green agenda in IT to the broader corporate agenda in risk management, brand management, and reputation management. Written by a leading author in the IT field, this authoritative reference provides easy access to quotable budget justifications that readers can use to place IT stakeholders on the same page for this new agenda that can save valuable resources and the planet.
The book’s comprehensive coverage includes various types of hardware and software, including the changes currently happening, underlying trends, products currently on the market, and what to expect—or, in some cases, what organizations should ask for—from suppliers in the future.
On the hardware side, the book considers tablet computers—examining the iPad® and Android®-based tablets. On the software side, it examines the general trend toward cloud computing. It provides important examples of this rapidly emerging trend as well as guidance on how to use the cloud to make software available and to store large amounts of data.
Demonstrating the savings and increased business resiliency that can result from green computing, this book offers C-suite executives, senior IT management, project managers, suppliers, and market analysts with the tools required to understand why you need to act, how to act, what to buy, when to do it, and who should act.
Excerpted with permission from the publisher, Auerbach Publications, from Green Computing: Tools and Techniques for Saving Energy, Money, and Resources by Bud E. Smith. Copyright © 2013.
The attached zip file includes:
This excerpt from chapter 2 deals with contracting for maintenance for both hardware and software purposes in the initial negotiation. ... More >>
The purpose of this paper is to analyze IaaS protection options from the viewpoint of security functionality and the architecture that governs their deployment. ... More >>
Virtualization-related components (such as Hypervisor, Virtual Network and Virtual Machines [VMs]) in a virtualized data center infrastructure need effective security controls. ... More >>