813 KB | 3 files | DOC, PDF
This excerpt explains how to choose an appropriate location for your data center, from the hazards you should avoid to the physical attributes you want.
All data centers are unique, but they all share the same mission: to protect your company's valuable information. "Build the Best Data Center Facility for Your Business," by author Douglas Alger, answers your individual questions in one flexible step-by-step reference guide.
This book is divided into two parts: Part I covers data center design and physical infrastructure details, and Part II covers data center management and operations. You can also access supplementary online materials for installation instructions, which include customizable data center design templates, written cabling specifications, and sample drawings.
If you need a starting point for designing your first data center, regardless of size, if you need to prepare yourself with comprehensive strategies to retrofit or improve an existing one, or if you need proven methods to manage a data center for maximum productivity, this book is your readily accessible, comprehensive resource for answers and insights.
This excerpt is the book's entire second chapter entitled, "Choosing an Optimal Site." This chapter explains how to choose an appropriate location for your data center, from the hazards you should avoid to the physical attributes you want. The chapter spells out the risks that can jeopardize a data center site, how to safeguard your server environment against them, and what agency to go to in order to learn if a specific parcel of land is susceptible. Finally, the chapter outlines what seemingly minor building elements can make or break a property's suitability to house a data center.
The attached Zip file includes:
The guidelines in this document include requirements on servers to mitigate the execution of malicious or corrupt BIOS code. ... More >>
This excerpt from chapter 2 deals with contracting for maintenance for both hardware and software purposes in the initial negotiation. ... More >>
The purpose of this paper is to analyze IaaS protection options from the viewpoint of security functionality and the architecture that governs their deployment. ... More >>