sponsored by Dell, Inc. and Intel®
Posted:  11 Jan 2010
Published:  11 Jan 2010
Format:  PDF
Length:  3  Page(s)
Type:  Presentation Transcript
Language:  English

In this presentation transcript, expert Scott Sawyer explains how Dell Services can help you plan for modernization of your legacy Unix infrastructure. Learn how Dell helps you transition your Unix environment by looking at existing applications, existing workloads and follows a multi-saves methodologies to transition environments from current state to a future state, achieving the following functionalities:

  • 24-Hour Support
  • Risk Reduction
  • Set-up Efficiency
  • Not making the same mistakes that have been made by colleagues in the past

In addition, you'll learn about services capabilities that Dell brings to the Data Center in their five phase methodology as well as best practices that they share, including:

  • Being self-supporting
  • Data Center Facilities
  • Storage Best Practices for Transitional Purposes
  • Unix Migration Open Source
  • Microsoft Best Practices for Transitioning
  • IT Simplification Processes


Scott Sawyer
Global Practice Lead, Dell Open Source and Unix Migration Services
Scott has been with Dell since 2004, and has held Senior Consulting, Project Manager, and Architect roles for Dell's services organization. Prior to joining Dell, Scott worked for Red Hat and VA Linux Systems.

Data Center Consolidation | Data Center Infrastructure Efficiency | Data Center Power Management | Data Centers | Linux | Linux Server Hardware | Open Source | Operating Equipment Efficiency or Effectiveness (OEE) | Storage Best Practices | UNIX

View All Resources sponsored by Dell, Inc. and Intel®

About TechTarget:

TechTarget provides enterprise IT professionals with the information they need to perform their jobs - from developing strategy, to making cost-effective IT purchase decisions and managing their organizations' IT projects - with its network of technology-specific Web sites, events and magazines

All Rights Reserved, Copyright 2000 - 2014, TechTarget | Read our Privacy Statement