Ehnaton Logo
Индустриална автоматизация
Решения от експерти


Schneider Electric Data Center Operation: IT Optimize

Schneider Electric Data Center Operation: IT Optimize

Gain insight into data center power consumption and server utilization to increase efficiency and decrease cost

Reduce IT system energy usage through in-depth optimization of server utilization for increased data center performance.

оцени серията
оценка 0 от 0 гласували
  • Data Center Operation: IT Optimize increases utilization of infrastructure and IT assets through accurate, detailed power consumption profile of data centers, server by server and rack by rack. IT Optimize monitors IT asset utilization and power consumption to help reduce costs associated with over-provisioning, underutilization, and imbalanced power and cooling throughout the data center. Business critical analytics tie IT costs to business groups for chargeback, provide critical information for build vs. buy decisions and track capacity at the rack, row and room level. At the core of IT Optimize is the GenomeTM library, which continually discovers and monitors individual IT components and collects information to keep track of server specific information. The information forms the building blocks for understanding IT energy consumption and how it impacts the business.


  • Agility:

• Track underutilized servers - Reduce costs by eliminating unnecessary servers and maximize efficiency and rack capacity
• IT power and server utilization monitoring - Determine the business usefulness for all IT assets helps eliminate underutilized servers and maximize IT capacity at the rack, row and room level
• Prevent physical server sprawl - Identify and remove non-utlized servers for optimal use of rack capacity
• Maximize rack utilization - Gain visibility into rack utilization for optimizing power, cooling and space at the rack level
• Server efficiency categorization - Provides the ability to categorize servers into non-utilized, underutilized and utilized for analyzing IT efficiency, remove non-utilized servers to recapture available capacity and virtualize underutilized servers to consolidate resources
• Server usage chargeback - Enables businesses to capture and assign IT costs to individual departments for accurate billing support down to the physical or virtual server level


  • Availability: 

• GenomeTM library - The continuously growing asset library enables the software to determine power consumption without the aid of hardware sensors
• IT asset monitoring - Continual discovery and monitoring of IT components through standard protocols for accurate and current inventory management
• Auto-association - Increases accuracy and saves time by auto-associating discovered IT devices with the inventory, based on properties such as make, model and IP address
• IT asset auto-discovery - Saves time and increases accuracy of your managed asset inventory
• Live dashboard - Gain transparency to data center key performance indicators through easily configured web dashboards, displaying customizable management-level information
• Global asset search - Quickly locate assets through free text search, and export equipment data to excel format


  • Manageability:

• KPI data - Key performance indicators on power cost, server utilization and retirement candidates, available in report and dashboard format
• Top power consumers - Identifies servers with the highest average power usage, providing data center operators with a list of likely candidates for upgrades, load sharing or retirement
• Underutilized servers - Provides a customizable list of underutilized servers, for identifying non-utilized and underutilized servers within the data center


  • Protection:

• Password security - User-selectable password with strong password rules and reset password mechanism
• Multi-user access - Enables several users to carry out work on the application simultaneously and merging changes from different users seamlessly
• User roles - Enable location and feature-based access through multi-user login and individual levels of user roles
• Read-only Access - Share access without risking unauthorized configuration changes

Свържете се с нас, за да получите допълнителна информация

Професионална консултация от експерти