This website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
This Website Uses Cookies By closing this message or continuing to use our site, you agree to our cookie policy. Learn MoreThis website requires certain cookies to work and uses other cookies to help you have the best experience. By visiting this website, certain cookies have already been set, which you may delete and block. By closing this message or continuing to use our site, you agree to the use of cookies. Visit our updated privacy and cookie policy to learn more.
Smoke detection in data centers is critical, not only for life safety reasons, but also to reduce fire-related business interruption and property damage.
With today’s aging electric infrastructure, data centers, airports, critical care centers, and the like are investing a considerable amount of time, effort, and money into the selection of their backup data and power systems to protect critical information.
Think back to 2000. What did the data center look like? New, higher density server technology was trending, but adoption rates weren’t particularly impressive.
This next column addresses the selection of a data center colocation/wholesale provider. This selection becomes the basis of comparison between building one’s own data center and outsourcing to a data center provider.
In the summer of 2011, Time Warner Cable’s mission critical team was presented with a unique problem: How do you build nearly 15,000 sq ft of data center space in one of the most expensive and densely populated neighborhoods in the United States?
The number of mission critical and data center installations is rapidly increasing and these facilities are adopting technology that provides more re-dundancy and scalability than ever before.
In a world of constant IT security combat between hackers and security practitioners, advancement in newer hacking and intrusion methods puts pressure on corporate IT teams to strengthen IT security.