Beginning around 2011, the mainstream media and activist outlets began paying attention to data centers, putting the pressure on industry leaders like Apple, Microsoft, and Google to clean up their power sources. These companies were already pursuing efficient operations – after all, every saved watt is saved money. But the increased coverage did seem to push them towards using renewables, as the general public realized that data centers use a staggering amount of energy and produce thousands of tons of greenhouse gas emissions.
We’ve covered all that before, and we’ve also touched on the swelling focus on data center water use, as well (facilities often require significant water use for cooling systems). But the environmental footprint of a data center goes beyond electricity or water. With systems this complex and engineering designed for 24/7, year-round operation, there are many additional factors that can often have negative impact on the planet.
Here are eight overlooked areas of the data center that have significant environmental implications.
If you’ve spent much time around data centers, you’re likely familiar with load balancing. But if you haven’t, it’s a vital concept to understanding how to keep your infrastructure available to all of your users, while also maximizing the efficient use of your computing resources. Even if you’re familiar with load balancing, there are some recently released tools and similar concepts that we’ll cover in order to share your workloads across your servers — and even across the country.
If you missed it, President Obama designated October as National Cybersecurity Awareness Month. The move was designed to engage and educate the public to increase awareness about cybersecurity issues and increase the resiliency of the nation in the event of a cyber incident.
As Cybersecurity Awareness Month comes to a close, now is an ideal time to evaluate your security measures to keep your information safe.
Businesses are increasingly dependent on the internet for their daily operations. With vital information to protect, a regular assessment of your business’ security protocol should become habit. Consider what information your organization collects, how you store information internally, who has access to the information and what measures your organization takes to protect this data. Is it secure? Would your customers feel secure with your data storage techniques?
These three areas should be among the first on your list when evaluating your cybersecurity.
By now you’ve likely heard the news. It is after all the biggest technology acquisition in history: Dell plans to purchase VMware parent company EMC for a whopping $67 billion. While many other industry giants are downsizing and focusing themselves, this will create a behemoth.
What does it mean for service providers who might purchase equipment from Dell or EMC, plus virtualization from VMware? Ultimately it comes down to a balance between competition (vendor neutrality) and the additional resources and integration offered by a one-stop vendor.
Amazon stirred the cloud hosting pot a bit early this month by announcing that users could now bring their own Windows or Oracle licenses to the EC2 public cloud, supposedly solving the dilemma of high license costs in the cloud. In truth, the solution is a simple one that many cloud providers—including Green House Data—have offered for a long time.