SlideShare a Scribd company logo
1 of 5
Download to read offline
DATA CENTER DECONTAMINATION
MAKE IT PART OF RISK MANAGEMENT STRATEGY

Author:
Date:

©2014 Premier Solutions Co.

Bill Montgomery
January 2014
Introduction:
The service of data center cleaning has been a major focus of
late for data centers, service companies and end users. This
renewed focus on cleaning services is prompted by ASHRAE
and manufacturers such as IBM, Dell and HP. None of these
well-respected entities would recommend that the service be
performed in-house. DCM is a risk management service ,

critical to the continuation of critical operations.
Our service called, Data Center Maintenance (DCM) and
Premier Solutions Co. was formed in 1998. To date, we have
cleaned over 9500 data centers, encompassing 27 (M) million
square feet (SF) of data center flooring, over one hundred
thousand server cabinets and over one million servers and
systems.
Our service began with little direction from the industry. Very few
firms were specializing in offering data center cleaning. We used
our knowledge from years of selling IT infrastructure solutions
such as UPS, enclosures, power and cooling products, and
disaster recovery services, to erect a service geared towards
protection of the environment and the equipment housed within.
With industry guidelines set forth, risk management and data
center tier status via Uptime institute, a clear direction can be
implemented in keeping the data center free of risk via
contaminates by incorporating a "tier 3" approach and improve
indoor air quality (IAQ).
Risk "is a function of the likelihood of a given threat-source’s
exercising a particular potential vulnerability, and the resulting
impact of that adverse event on the organization"
Risk management is the process that allows IT to balance the operational and economic costs of
protective measures and achieve gains in mission capability, availability by protecting the IT systems and
data that support their organizations’ missions-NIST

©2014 Premier Solutions Co.
Risk management processes:
1. Assessment: includes identification and evaluation of risks and risk impacts, and
recommendation of risk-reducing measures (Premier Solutions Co. rates the center on a PM
(particulate matter) scale of 1-5 . 5 being the high risk
2.

Mitigation: which refers to prioritizing, implementing, and maintaining the appropriate riskreducing measures recommended from the risk assessment process.

3. Implementation: proven action of a successful risk management program, controlled methods
4. Confirmation: "Check and balance" in place for confirmation of tier 3 program is adhered to

Data Center tier status defined:
TIER 1: Reactionary, when needed, no formal process, low bid. IAQ could be moderate to severe
Tier 2: unstructured maintenance: no formal process in place, no vendor diligence, not for mission critical
centers
TIER 3: structured to eliminate human unintentional error, discretion. Defines controlled processes
•
•
•
•

Service Orientation :designed to collaborate with client on a structured tier 3 assumption
Data gathering” :document process: questionnaire-onsite eval-orientation- approved MOP-post
service feedback –
MOP: structured method of process: precise management of processes of how and when work is
performed
SOP: Standard operations Procedures: "best practices"

As IT equipment shrinks in size, resulting in smaller components and less
physical space between them, the risk of contamination grows. Increased heat
loads per unit volume of air necessitates the need for more airflow, thus,
increasing the exposure of electronics to detrimental effects of accumulated
dust.
–ASHRAE TC9

©2014 Premier Solutions Co.
Frequency of Service Recommendations:
•

HP recommends weekly dry mop and monthly damp
mop

•

SUN recommends quarterly floor surface and hardware
decontamination

In today’s high-density, virtualized centers, it is extremely
important to keep the facility within “clean specifications” at all
times. To achieve this, it may be required to have a top floor
Inside An IBM Server

service done monthly, especially for sites located near freeways,
centers using outside air for cooling, continuous, personnel traffic
that bring contaminates into the room
Service
Top floor cleaning
Sub-floor service
Hardware and servers

Minimum Recommended Frequency
Once Quarterly
Once or Twice Annually
Twice Annually

Common service Fallacies/deficiencies in service:

X

Improper Sub-Floor Cleaning: Creating
Bypass Air Flow

©2014 Premier Solutions Co.

•

Use of “proprietary” cleaning solutions

•

ISO compliant

•

Using water to clean sub-floor (water and 480V don’t mix)

•

Bringing water source onto computer room floor

•

Floor tiles stripped and waxed

•

Improper sub-floor process
Caring For The Data Center
•

Utilize clean step-mats at doorways

•

Clean/replace CRAC unit filters regularly

•

consider air filter media to capture gases

•

conduct a semi annual IAQ corrosive analysis

•

Use particle testing as a gauge of environment condition

•

Close off server cabinet cut outs

•

Have delaminated or trip tiles replaced

•

Place perforated tiles in cold aisle/front of cabinet

•

Inspect water cooling units regularly

•

Disallow cardboard and pallets in center

•

Removal and repair of sub floor corrosives

•

Insert blanking panels in unused U SPACE of cabinets

•

Clean cabinets and hardware twice annually. Dust can create an
“insulating layer” that will lead to heat related failures

•

Clean sub floor twice annually minimum

•

seal off bottom of server cabinets. allows cool air to bypass server,
and traps dust under cabinets

Summary
A regularly scheduled service with Tier 3 parameters in place and the
identification of particulates will allow your data center to stay in optional
health.
This document is copyright © 2014 Premier Solutions Co. No part of this
publication may be reproduced by any method whatsoever without the prior
consent of Premier Solutions Co.
Due to the nature of this material, numerous hardware and software products
have been mentioned by name. In the majority, if not all, of the cases, these
product names are claimed as trademarks by the companies that manufacture
the products. It is not Premier Solutions Co.’s intent to claim these names or
trademarks as our own. Likewise, company logos, graphics or screen shots
have been reproduced with the consent of the owner and are subject to that
owner’s copyright.
Whilst every care has been taken in the preparation of this document to ensure
that the information is correct, the publishers cannot accept responsibility for
any errors or omissions.

©2014 Premier Solutions Co.

More Related Content

What's hot

Business continuity and disaster recovery
Business continuity and disaster recoveryBusiness continuity and disaster recovery
Business continuity and disaster recoveryAdeel Javaid
 
Data center maintenance
Data center maintenanceData center maintenance
Data center maintenanceanilinvns
 
In the Data Center: Five Keys to Achieving Ultra-Low PUEs
In the Data Center: Five Keys to Achieving Ultra-Low PUEsIn the Data Center: Five Keys to Achieving Ultra-Low PUEs
In the Data Center: Five Keys to Achieving Ultra-Low PUEsVantage Data Centers
 
The eDiscovery Primer for Lotus Domino Admins
The eDiscovery Primer for Lotus Domino AdminsThe eDiscovery Primer for Lotus Domino Admins
The eDiscovery Primer for Lotus Domino AdminsBill Malchisky Jr.
 
Preparing Your Business For A Disaster
Preparing Your Business For A DisasterPreparing Your Business For A Disaster
Preparing Your Business For A DisasterCIOOffice
 
20110204 alarm management seminar ureason v1 3
20110204 alarm management seminar ureason v1 320110204 alarm management seminar ureason v1 3
20110204 alarm management seminar ureason v1 3UReasonChannel
 
Alarm Rationalization Workshop - Tips, Tricks and Traps
Alarm Rationalization Workshop - Tips, Tricks and Traps Alarm Rationalization Workshop - Tips, Tricks and Traps
Alarm Rationalization Workshop - Tips, Tricks and Traps Mary Claire Simoneaux
 
Why Replication is Not Enough to Keep Your Business Running
Why Replication is Not Enough to Keep Your Business Running Why Replication is Not Enough to Keep Your Business Running
Why Replication is Not Enough to Keep Your Business Running Axcient
 
Deep Dive into Disaster Recovery in the Cloud
Deep Dive into Disaster Recovery in the CloudDeep Dive into Disaster Recovery in the Cloud
Deep Dive into Disaster Recovery in the CloudBluelock
 
Electronic recordkeeping
Electronic recordkeepingElectronic recordkeeping
Electronic recordkeepingExpoco
 
Best Practices in Disaster Recovery Planning and Testing
Best Practices in Disaster Recovery Planning and TestingBest Practices in Disaster Recovery Planning and Testing
Best Practices in Disaster Recovery Planning and TestingAxcient
 
7 Habits for High Effective Disaster Recovery Administrators
7 Habits for High Effective Disaster Recovery Administrators7 Habits for High Effective Disaster Recovery Administrators
7 Habits for High Effective Disaster Recovery AdministratorsQuorumLabs
 

What's hot (20)

Data center tier standards
Data center tier standardsData center tier standards
Data center tier standards
 
Business continuity and disaster recovery
Business continuity and disaster recoveryBusiness continuity and disaster recovery
Business continuity and disaster recovery
 
Data center maintenance
Data center maintenanceData center maintenance
Data center maintenance
 
Justify Your Reliability Budget
Justify Your Reliability Budget Justify Your Reliability Budget
Justify Your Reliability Budget
 
In the Data Center: Five Keys to Achieving Ultra-Low PUEs
In the Data Center: Five Keys to Achieving Ultra-Low PUEsIn the Data Center: Five Keys to Achieving Ultra-Low PUEs
In the Data Center: Five Keys to Achieving Ultra-Low PUEs
 
Small Business Backup & Disaster Recovery
Small Business Backup & Disaster RecoverySmall Business Backup & Disaster Recovery
Small Business Backup & Disaster Recovery
 
Server room
Server roomServer room
Server room
 
The eDiscovery Primer for Lotus Domino Admins
The eDiscovery Primer for Lotus Domino AdminsThe eDiscovery Primer for Lotus Domino Admins
The eDiscovery Primer for Lotus Domino Admins
 
Mark Davis
Mark DavisMark Davis
Mark Davis
 
Cloud based clinical trial management system
Cloud based clinical trial management systemCloud based clinical trial management system
Cloud based clinical trial management system
 
Preparing Your Business For A Disaster
Preparing Your Business For A DisasterPreparing Your Business For A Disaster
Preparing Your Business For A Disaster
 
20110204 alarm management seminar ureason v1 3
20110204 alarm management seminar ureason v1 320110204 alarm management seminar ureason v1 3
20110204 alarm management seminar ureason v1 3
 
Alarm Rationalization Workshop - Tips, Tricks and Traps
Alarm Rationalization Workshop - Tips, Tricks and Traps Alarm Rationalization Workshop - Tips, Tricks and Traps
Alarm Rationalization Workshop - Tips, Tricks and Traps
 
Why Replication is Not Enough to Keep Your Business Running
Why Replication is Not Enough to Keep Your Business Running Why Replication is Not Enough to Keep Your Business Running
Why Replication is Not Enough to Keep Your Business Running
 
Deep Dive into Disaster Recovery in the Cloud
Deep Dive into Disaster Recovery in the CloudDeep Dive into Disaster Recovery in the Cloud
Deep Dive into Disaster Recovery in the Cloud
 
Electronic recordkeeping
Electronic recordkeepingElectronic recordkeeping
Electronic recordkeeping
 
project report on DATACENTER
project report on DATACENTERproject report on DATACENTER
project report on DATACENTER
 
Best Practices in Disaster Recovery Planning and Testing
Best Practices in Disaster Recovery Planning and TestingBest Practices in Disaster Recovery Planning and Testing
Best Practices in Disaster Recovery Planning and Testing
 
7 Habits for High Effective Disaster Recovery Administrators
7 Habits for High Effective Disaster Recovery Administrators7 Habits for High Effective Disaster Recovery Administrators
7 Habits for High Effective Disaster Recovery Administrators
 
Hurricane Preparedness & Technology
Hurricane Preparedness & TechnologyHurricane Preparedness & Technology
Hurricane Preparedness & Technology
 

Similar to Dcm wp riskmgt2014

V mware quick start guide to disaster recovery
V mware   quick start guide to disaster recoveryV mware   quick start guide to disaster recovery
V mware quick start guide to disaster recoveryVMware_EMEA
 
Millennium Customer Service
Millennium Customer ServiceMillennium Customer Service
Millennium Customer Servicergraves0071
 
New Non Auto Overview
New Non Auto OverviewNew Non Auto Overview
New Non Auto OverviewTODD ULRICH
 
Boomerang Total Recall
Boomerang Total RecallBoomerang Total Recall
Boomerang Total Recallbdoyle05
 
This is my test slideshare
This is my test slideshareThis is my test slideshare
This is my test slidesharepapdev
 
5 Applications of Cloud Computing
5 Applications of Cloud Computing5 Applications of Cloud Computing
5 Applications of Cloud ComputingCentriLogic
 
NEC Backup as a Service reduces administrative tasks, helping it departments...
 NEC Backup as a Service reduces administrative tasks, helping it departments... NEC Backup as a Service reduces administrative tasks, helping it departments...
NEC Backup as a Service reduces administrative tasks, helping it departments...InteractiveNEC
 
Powernet Presentation
Powernet PresentationPowernet Presentation
Powernet PresentationPowernet
 
Powernet dossier
Powernet dossierPowernet dossier
Powernet dossierPowernet
 
Designing a Modern Disaster Recovery Environment
Designing a Modern Disaster Recovery EnvironmentDesigning a Modern Disaster Recovery Environment
Designing a Modern Disaster Recovery EnvironmentBrian Anderson
 
Designing a Modern Disaster Recovery Environment
Designing a Modern Disaster Recovery EnvironmentDesigning a Modern Disaster Recovery Environment
Designing a Modern Disaster Recovery EnvironmentEagle Technologies
 
Client presentation disaster recovery as a service
Client presentation   disaster recovery as a serviceClient presentation   disaster recovery as a service
Client presentation disaster recovery as a serviceAjay V Singh
 
NON CORE INDUSTRIAL SERVICES PROVIDER
NON CORE INDUSTRIAL SERVICES PROVIDERNON CORE INDUSTRIAL SERVICES PROVIDER
NON CORE INDUSTRIAL SERVICES PROVIDERguest013d4a
 
PHD Virtual Automating Disaster Recovery Testing to Ensure Application Recovery
PHD Virtual Automating Disaster Recovery Testing to Ensure Application RecoveryPHD Virtual Automating Disaster Recovery Testing to Ensure Application Recovery
PHD Virtual Automating Disaster Recovery Testing to Ensure Application RecoveryMark McHenry
 

Similar to Dcm wp riskmgt2014 (20)

Dcm slideshare
Dcm slideshareDcm slideshare
Dcm slideshare
 
Dcm whitepaperfinal
Dcm whitepaperfinalDcm whitepaperfinal
Dcm whitepaperfinal
 
Cloud computing
Cloud computingCloud computing
Cloud computing
 
Fm computer roomcleaningguide
Fm computer roomcleaningguideFm computer roomcleaningguide
Fm computer roomcleaningguide
 
V mware quick start guide to disaster recovery
V mware   quick start guide to disaster recoveryV mware   quick start guide to disaster recovery
V mware quick start guide to disaster recovery
 
MPSBrochure
MPSBrochureMPSBrochure
MPSBrochure
 
Millennium Customer Service
Millennium Customer ServiceMillennium Customer Service
Millennium Customer Service
 
Confisio Datacenter
Confisio DatacenterConfisio Datacenter
Confisio Datacenter
 
New Non Auto Overview
New Non Auto OverviewNew Non Auto Overview
New Non Auto Overview
 
Boomerang Total Recall
Boomerang Total RecallBoomerang Total Recall
Boomerang Total Recall
 
This is my test slideshare
This is my test slideshareThis is my test slideshare
This is my test slideshare
 
5 Applications of Cloud Computing
5 Applications of Cloud Computing5 Applications of Cloud Computing
5 Applications of Cloud Computing
 
NEC Backup as a Service reduces administrative tasks, helping it departments...
 NEC Backup as a Service reduces administrative tasks, helping it departments... NEC Backup as a Service reduces administrative tasks, helping it departments...
NEC Backup as a Service reduces administrative tasks, helping it departments...
 
Powernet Presentation
Powernet PresentationPowernet Presentation
Powernet Presentation
 
Powernet dossier
Powernet dossierPowernet dossier
Powernet dossier
 
Designing a Modern Disaster Recovery Environment
Designing a Modern Disaster Recovery EnvironmentDesigning a Modern Disaster Recovery Environment
Designing a Modern Disaster Recovery Environment
 
Designing a Modern Disaster Recovery Environment
Designing a Modern Disaster Recovery EnvironmentDesigning a Modern Disaster Recovery Environment
Designing a Modern Disaster Recovery Environment
 
Client presentation disaster recovery as a service
Client presentation   disaster recovery as a serviceClient presentation   disaster recovery as a service
Client presentation disaster recovery as a service
 
NON CORE INDUSTRIAL SERVICES PROVIDER
NON CORE INDUSTRIAL SERVICES PROVIDERNON CORE INDUSTRIAL SERVICES PROVIDER
NON CORE INDUSTRIAL SERVICES PROVIDER
 
PHD Virtual Automating Disaster Recovery Testing to Ensure Application Recovery
PHD Virtual Automating Disaster Recovery Testing to Ensure Application RecoveryPHD Virtual Automating Disaster Recovery Testing to Ensure Application Recovery
PHD Virtual Automating Disaster Recovery Testing to Ensure Application Recovery
 

Recently uploaded

Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfOverkill Security
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoffsammart93
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...apidays
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024The Digital Insurer
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?Igalia
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdflior mazor
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native ApplicationsWSO2
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Scriptwesley chun
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsNanddeep Nachan
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CVKhem
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelDeepika Singh
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Jeffrey Haguewood
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAndrey Devyatkin
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDropbox
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...DianaGray10
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesrafiqahmad00786416
 

Recently uploaded (20)

Ransomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdfRansomware_Q4_2023. The report. [EN].pdf
Ransomware_Q4_2023. The report. [EN].pdf
 
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot TakeoffStrategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
Strategize a Smooth Tenant-to-tenant Migration and Copilot Takeoff
 
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
Apidays Singapore 2024 - Scalable LLM APIs for AI and Generative AI Applicati...
 
Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024Axa Assurance Maroc - Insurer Innovation Award 2024
Axa Assurance Maroc - Insurer Innovation Award 2024
 
A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?A Year of the Servo Reboot: Where Are We Now?
A Year of the Servo Reboot: Where Are We Now?
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
GenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdfGenAI Risks & Security Meetup 01052024.pdf
GenAI Risks & Security Meetup 01052024.pdf
 
Architecting Cloud Native Applications
Architecting Cloud Native ApplicationsArchitecting Cloud Native Applications
Architecting Cloud Native Applications
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
+971581248768>> SAFE AND ORIGINAL ABORTION PILLS FOR SALE IN DUBAI AND ABUDHA...
 
Automating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps ScriptAutomating Google Workspace (GWS) & more with Apps Script
Automating Google Workspace (GWS) & more with Apps Script
 
MS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectorsMS Copilot expands with MS Graph connectors
MS Copilot expands with MS Graph connectors
 
Real Time Object Detection Using Open CV
Real Time Object Detection Using Open CVReal Time Object Detection Using Open CV
Real Time Object Detection Using Open CV
 
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot ModelNavi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
Navi Mumbai Call Girls 🥰 8617370543 Service Offer VIP Hot Model
 
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
Web Form Automation for Bonterra Impact Management (fka Social Solutions Apri...
 
AWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of TerraformAWS Community Day CPH - Three problems of Terraform
AWS Community Day CPH - Three problems of Terraform
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
DBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor PresentationDBX First Quarter 2024 Investor Presentation
DBX First Quarter 2024 Investor Presentation
 
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
Connector Corner: Accelerate revenue generation using UiPath API-centric busi...
 
ICT role in 21st century education and its challenges
ICT role in 21st century education and its challengesICT role in 21st century education and its challenges
ICT role in 21st century education and its challenges
 

Dcm wp riskmgt2014

  • 1. DATA CENTER DECONTAMINATION MAKE IT PART OF RISK MANAGEMENT STRATEGY Author: Date: ©2014 Premier Solutions Co. Bill Montgomery January 2014
  • 2. Introduction: The service of data center cleaning has been a major focus of late for data centers, service companies and end users. This renewed focus on cleaning services is prompted by ASHRAE and manufacturers such as IBM, Dell and HP. None of these well-respected entities would recommend that the service be performed in-house. DCM is a risk management service , critical to the continuation of critical operations. Our service called, Data Center Maintenance (DCM) and Premier Solutions Co. was formed in 1998. To date, we have cleaned over 9500 data centers, encompassing 27 (M) million square feet (SF) of data center flooring, over one hundred thousand server cabinets and over one million servers and systems. Our service began with little direction from the industry. Very few firms were specializing in offering data center cleaning. We used our knowledge from years of selling IT infrastructure solutions such as UPS, enclosures, power and cooling products, and disaster recovery services, to erect a service geared towards protection of the environment and the equipment housed within. With industry guidelines set forth, risk management and data center tier status via Uptime institute, a clear direction can be implemented in keeping the data center free of risk via contaminates by incorporating a "tier 3" approach and improve indoor air quality (IAQ). Risk "is a function of the likelihood of a given threat-source’s exercising a particular potential vulnerability, and the resulting impact of that adverse event on the organization" Risk management is the process that allows IT to balance the operational and economic costs of protective measures and achieve gains in mission capability, availability by protecting the IT systems and data that support their organizations’ missions-NIST ©2014 Premier Solutions Co.
  • 3. Risk management processes: 1. Assessment: includes identification and evaluation of risks and risk impacts, and recommendation of risk-reducing measures (Premier Solutions Co. rates the center on a PM (particulate matter) scale of 1-5 . 5 being the high risk 2. Mitigation: which refers to prioritizing, implementing, and maintaining the appropriate riskreducing measures recommended from the risk assessment process. 3. Implementation: proven action of a successful risk management program, controlled methods 4. Confirmation: "Check and balance" in place for confirmation of tier 3 program is adhered to Data Center tier status defined: TIER 1: Reactionary, when needed, no formal process, low bid. IAQ could be moderate to severe Tier 2: unstructured maintenance: no formal process in place, no vendor diligence, not for mission critical centers TIER 3: structured to eliminate human unintentional error, discretion. Defines controlled processes • • • • Service Orientation :designed to collaborate with client on a structured tier 3 assumption Data gathering” :document process: questionnaire-onsite eval-orientation- approved MOP-post service feedback – MOP: structured method of process: precise management of processes of how and when work is performed SOP: Standard operations Procedures: "best practices" As IT equipment shrinks in size, resulting in smaller components and less physical space between them, the risk of contamination grows. Increased heat loads per unit volume of air necessitates the need for more airflow, thus, increasing the exposure of electronics to detrimental effects of accumulated dust. –ASHRAE TC9 ©2014 Premier Solutions Co.
  • 4. Frequency of Service Recommendations: • HP recommends weekly dry mop and monthly damp mop • SUN recommends quarterly floor surface and hardware decontamination In today’s high-density, virtualized centers, it is extremely important to keep the facility within “clean specifications” at all times. To achieve this, it may be required to have a top floor Inside An IBM Server service done monthly, especially for sites located near freeways, centers using outside air for cooling, continuous, personnel traffic that bring contaminates into the room Service Top floor cleaning Sub-floor service Hardware and servers Minimum Recommended Frequency Once Quarterly Once or Twice Annually Twice Annually Common service Fallacies/deficiencies in service: X Improper Sub-Floor Cleaning: Creating Bypass Air Flow ©2014 Premier Solutions Co. • Use of “proprietary” cleaning solutions • ISO compliant • Using water to clean sub-floor (water and 480V don’t mix) • Bringing water source onto computer room floor • Floor tiles stripped and waxed • Improper sub-floor process
  • 5. Caring For The Data Center • Utilize clean step-mats at doorways • Clean/replace CRAC unit filters regularly • consider air filter media to capture gases • conduct a semi annual IAQ corrosive analysis • Use particle testing as a gauge of environment condition • Close off server cabinet cut outs • Have delaminated or trip tiles replaced • Place perforated tiles in cold aisle/front of cabinet • Inspect water cooling units regularly • Disallow cardboard and pallets in center • Removal and repair of sub floor corrosives • Insert blanking panels in unused U SPACE of cabinets • Clean cabinets and hardware twice annually. Dust can create an “insulating layer” that will lead to heat related failures • Clean sub floor twice annually minimum • seal off bottom of server cabinets. allows cool air to bypass server, and traps dust under cabinets Summary A regularly scheduled service with Tier 3 parameters in place and the identification of particulates will allow your data center to stay in optional health. This document is copyright © 2014 Premier Solutions Co. No part of this publication may be reproduced by any method whatsoever without the prior consent of Premier Solutions Co. Due to the nature of this material, numerous hardware and software products have been mentioned by name. In the majority, if not all, of the cases, these product names are claimed as trademarks by the companies that manufacture the products. It is not Premier Solutions Co.’s intent to claim these names or trademarks as our own. Likewise, company logos, graphics or screen shots have been reproduced with the consent of the owner and are subject to that owner’s copyright. Whilst every care has been taken in the preparation of this document to ensure that the information is correct, the publishers cannot accept responsibility for any errors or omissions. ©2014 Premier Solutions Co.