In today’s challenging business climate, designing, financing and constructing a multi-tenant data center project is a challenge; even for established data center owner / operators.
Having a design and engineering team that understands the challenges associated with this process can help. Highly qualified engineering firms understand not only the options and efficiencies of design, but also the cost to build and operate the data center. Increasingly, the design and engineering teams need to play a larger role in these investment and financial elements of the project. Although first cost is always of great importance, the cost to maintain and operate the data center over a 20 year period is even more substantial. The best design decisions today tend to be based on a total cost of ownership (TCO) model, and carefully measure costs of energy and water consumption as well as repairs and maintenance.
Let's move beyond greenwashing here. We'll be the first to admit that while many companies, including our own, may be extremely committed to energy efficiency, they also use it as a marketing tactic. There's a reason: it's a differentiator and a clear advantage to our services vs. the competition. This isn't us merely tooting our own horn or trying to play up our green practices. We're in it for the long haul. And I'm going to tell you why I think the technology industry as a whole should be leading the way to a greener future for everyone.
You’ve likely heard of “shadow IT” or BYOD (bring your own device). Both terms refer to employees using private devices or software at the workplace—think iPads for work, or Google Drive to share files in a department. These practices may not be sanctioned by the IT department, but they improve productivity and save provisioning costs. However, they come with the risk of security breaches or other issues, causing IT headaches. By implementing an official BYOD policy and deploying hybrid cloud tools, companies can eliminate shadow IT and empower employees at the same time.
The idea behind the Internet of Things is the complete automation of communication between all the things. In this situation a “thing” is essentially anything that can be assigned a piece of hardware and an IP address. The IP address allows the things to interact among themselves, thus removing the need for any human-to-human communication.
Kevin Ashton first coined the name for this technology filled future in 1999 but the foundation of the idea was started in the 1980’s when companies first began using technology to communicate with machines. Each year the advances in technology built on and confirmed the premise of the Internet of Things.
At the end of August, news broke that two hackers had broken the two-factor security deployed by Dropbox, a cloud storage platform used by millions of people across the globe. The hackers published their methods in order to promote an open-source version of the program that could, they claimed, be safer for users overall. The hack puts cloud providers and users on edge: how safe is SSL?