July 4, 2020  


VNXe3150 NAS and iSCSI Storage System

The EMC® VNXe™ series is a new unified storage solution for SMB and lower mid-market companies and remote/branch offices (ROBO) in enterprise organizations. It is designed for IT generalists with limited storage expertise. The VNXe facilitates complete storage consolidation with advanced file and block functionality as well as a simple, application-driven approach to managing shared storage. The VNXe series delivers advancements in efficiency, simplicity, and affordability.

The VNX series is part of a high-performance family designed for small, midsize to enterprise storage environments.

IBM RamSAN 810 Packs 10TB of SSD into 1U

The IBM RamSan-810 is the first enterprise multi-level cell (eMLC) Flash storage system. eMLC Flash combines the high speed and reliability of single-level cell (SLC) Flash with the low cost of MLC Flash. The system is optimized for use with read-intensive enterprise workloads.

The patented Variable Stripe RAID™ offered by the Series-7 Flash Controller reduces business interruptions and improves mean time between failures (MTBF) by providing a higher level of protection against both Flash plane failures and Flash device failures.

Nexsan e60 High Density Disk Tray

The Nexsan e60 is one of a new breed of high density storage systems. It packs up to 240 TB into an equipment rack drive tray just 7-inches tall (4U). Add another expansion tray, and up to 480 TB of SATA storage can be managed. With this high degree of density, up to (5) fully expanded e60 systems can be fitted into a single rack - for 2.4 PB of raw storage capacity.

Small Business Backup Made Simple

Symantec Backup Exec 2012 is a cost-effective backup & recovery solution designed for small and medium-sized companies and remote office backups. It provides disk-to-disk-to-tape backup and recovery for Windows, Linux, Solaris, Macintosh, and NetWare as well as VMware and Microsoft virtual machines. Backup Exec 2012 storage optimization enhancements include file and e-mail archiving and deduplication.

Vendor-Neutral Storage Courses Offer Breadth and Depth of Knowledge

Technical consulting firm Data Center Enhancements Inc. announces the formation of a new training services group. This new group will focus on delivery of instructor-led training classes for Advanced SAN & NAS Storage, TOGAF, CoBIT, and ITIL. We will present an in-depth explanation of each subject to ensure maximum depth and breadth of understanding. All courses will be designed to assist students in preparation for each topic's comprehensive certification examinations.

Training and Certification Services

Well-trained employees are an organzation's most valuable assets!

While the demand for highly skilled technical personnel continues to grow, the number of skilled IT specialists in key fields is declining. In response to this shortfall, companies are placing more emphasis on developing their internal employee assets to fill the void.

The purchase of IT training is an investment in the company's future. Intellectual capital is a highly perishable asset that must be refreshed and updated regularly to ensure maximum value. In return, an investment in employee training provides a high ROI, greater efficiency, and increased ability to compete and may be directly responsible for an improved bottom line.

Our company provides customized, high quality technical training for both technology-specific programs and general IT architectural design frameworks. Our accredited courseware is vendor-neutral and focuses on emphasizing the important concepts of the course, not how a specific vendor implements it or has designed it into their equipment.

The Data Center Enhancements Inc. suite of advanced technical courses includes:


ITIL® 2011

The Information Technology Infrastructure Library (ITIL®) is a set of best practices for IT service management (ITSM) that focuses on aligning IT services with business needs. ITIL advocates that IT services must be aligned with the needs of business and underpin the organization's core processes. It provides guidance to organizations on how to use IT as a tool to facilitate business change, transformation and growth. ITIL is the most widely accepted approach to IT service management in the world. ITIL provides a cohesive set of best practice, drawn from the public and private sectors globally. Because ITSM is driven both by technology and a huge a range of organizational environments in which it operates, it is constantly evolving."

TOGAF® 9.1 and ArchiMate® 2.0

TOGAF® (The Open Group Architecture Framework) is a framework for enterprise architecture which provides a comprehensive approach for designing, planning, implementing, and governing enterprise information architectures. It is a high level and holistic approach to design, which is typically modeled at four levels: Business, Application, Data, and Technology. TOGAF provides a well-tested overall starting model to information architects, which can then be built upon. It relies heavily on modularization, standardization, and already existing, proven technologies and products.

Cobit® 5

COBIT® 5 is a globally recognized IT governance framework that provides a comprehensive structure to help organizations achieve their objectives for the governance and management of enterprise IT. It has become the de facto industry standard for IT governance, IT risk management, IT controls and compliance. COBIT helps create optimal IT value by maintaining a balance between realizing benefits and optimizing risk levels and the use of resources. The principles and enablers COBIT 5 provides are useful for enterprises of all sizes, whether they are commercial, not-for-profit or in the public sector.

Virtualization & Cloud-Based Services

The term Cloud Computing generally applies to anything that involves delivering hosted services over the Internet. These Cloud courses were developed by the Cloud Credential Council (CCC), an international industry representation body mandated to develop and drive alignment of standards training and certification for individuals in the cloud computing domain. The CCC is independent and vendor neutral, who's members consist of public sector and academic institutions, cloud providers, cloud consumers, cloud brokers, professional associations and international certification bodies from across the world.

ISO/IEC 27001 Information Security

ISO/IEC 27001 is a specification for an information security management system (ISMS) standard published in October 2005 by the International Organization for Standardization (ISO) and the International Electrotechnical Commission (IEC). ISMS is a framework of policies and procedures that includes all legal, physical and technical controls involved in an organization's information risk management processes. It was developed to provide a model for establishing, implementing, operating, monitoring, reviewing, maintaining and improving an information security management system.

SAN/NAS Storage

Storage systems are a core technology in any data center. The storage infrastructure is responsible for tracking, retaining, transferring, protecting, monitoring, archiving, and preserving the data assets of a business or organization. This series of vendor-neutral courses address the Administration, Engineering, and Architecture needs of data storage, backup, troubleshooting, and disaster recovery in the enterprise environment. The Information presented is intended to explain the technological approach to resolving various problems, and not focus on any vendor’s equipment or approach.

PIMBOK PMP® Certification

The PMI PIMBOK® global standards provide guidelines, rules and characteristics for project, program and portfolio management. These standards are widely accepted and, when consistently applied, help companies achieve professional excellence in project execution and management. By ensuring that project management knowledge and frameworks are continually up-to-date, PMI’s global standards have become the foundation of the Project Management profession.

PRINCE2® Project Management

PRINCE2® (an acronym for Projects in Controlled Environments, version 2) is a project management methodology. It is based on seven principles (continued business justification, learn from experience, defined roles and responsibilities, manage by stages, manage by exception, focus on products and tailored to suit the project environment), seven themes (business case, organization, quality, plans, risk, change and progress) and seven processes. PRINCE2 is a process-driven project management method, which contrasts with reactive/adaptive methods such as Scrum.

Business Continuity and Risk

ISO/IEC 27005 provides guidelines for information security risk management. It is designed to assist the satisfactory implementation of information security based on a risk management approach. ISO 31000 is a family of standards relating to risk management. It’s purpose is to provide principles and generic guidelines on risk management. ISO 22301 specifies the requirements for a management system to protect against, reduce the likelihood of, and ensure businesses recover from disruptive incidents.

Business Info Services Library (BISL®)

The Business information Services Library (BiSL®) framework provides guidance on adopting a professional and systematic approach to the management of business information. While IT ensures that information is stored, processed and available, effective business information management ensures that an organization is able to respond to specific business demands. BiSL describes a standard for processes within business information management at the strategy, management and operations level. The BiSL framework is closely related to the ITIL and ASL frameworks


The Kepner-Tregoe® (KT) training courses help business managers solve problems, improve operations, oversee projects, and make business decisions more efficiently and effectively. The courses develop strategic problem solving skills and smart project planning skills, in addition to increasing management effectiveness. Kepner-Tregoe courses are designed for a variety of business roles, including C-Suite executives, project managers, team leaders and process engineers.

Other Courses and Services

We also offer other training topics, train-the-trainer programs, on-site training, course customization, and other services of relevance to the IT industry. For a complete listing of these, please click the "View Other Services" button above.

View more information about our training guarantee, payment information, and general terms and conditions. Contact us via phone at 630-513-9747, or email us at training@dc-ei.com.