![]() However, as information technology (IT) operations started to grow in complexity, organizations grew aware of the need to control IT resources. Basic design-guidelines for controlling access to the computer room were therefore devised.ĭuring the boom of the microcomputer industry, and especially during the 1980s, users started to deploy computers everywhere, in many cases with little or no care about operating requirements. Security became important – computers were expensive, and were often used for military purposes. A single mainframe required a great deal of power and had to be cooled to avoid overheating. Many cables were necessary to connect all the components, and methods to accommodate and organize these were devised such as standard racks to mount equipment, raised floors, and cable trays (installed overhead or under the elevated floor). Early computer systems, complex to operate and maintain, required a special environment in which to operate. 1962ĭata centers have their roots in the huge computer rooms of the 1940s, typified by ENIAC, one of the earliest examples of a data center. ![]() 5.6 Computational fluid dynamics (CFD) analysis.3.3 Uptime Institute – Data center Tier Classification Standard. ![]() 3.2 Telecommunications Industry Association.3.1 International standards EN50600 and ISO22237 Information technology - Data center facilities and infrastructures. ![]()
0 Comments
Leave a Reply. |
AuthorWrite something about yourself. No need to be fancy, just an overview. ArchivesCategories |