In part one of this series, I highlighted the first five of what I think are the top 10 underutilized or less understood data center security best practices.
When determining a cooling strategy, data center designers and operators face many decision points regarding the cost of owning and operating their cooling equipment.
Through the seemingly never-ending onslaught of security breaches making headlines day after day, we are learning that the most intrusive and harmful attacks are actually the ones related to low-level security holes.
There are few things more frustrating over the course of a construction project than to realize that the built facility does not meet the fundamental requirements set forth at the onset of the project.