Electronics require a unique response to fire. In this video, you’ll learn about different fire suppression techniques and how they can be used in your data center?
CompTIA Security+ SY0-301
If you want to optimize your environment, then you’ll need to provide constant monitoring. In this video, you’ll learn about environmental monitoring, video monitoring, and the importance of EMI shielding.
The data center cooling system is a well-engineered system. In this video, you’ll learn how hot and cold aisles create the most efficient way to cool your computing environment.
The environment of a data center is a critical component of your uptime and availability. In this video, you’ll learn about HVAC and how temperature and humidity controls can make a big difference in your environmental management.
The IT contingency plan can keep things running during some very unexpected situations. In this video, you’ll learn how to build your own contingency plan through a seven-step planning process.
Disasters can be a surprise, but you should always have a plan to address whatever is thrown at you. In this video, you’ll learn about disaster recovery planning and why you can create a plan of succession.
How well would your plans work when put into action? The only way to really know is to test! In this video, you’ll learn more about the planning and testing process, and you’ll understand what you should consider to provide the most business continuity.
Most organizations have considered single points of failure and have added redundant options where necessary. In this video, you’ll learn about removing single points of failure and how some organizations have implemented redundancy to their networks and resources.
An event that affects business continuity is a big concern for security professionals. In this video, you’ll learn more about the questions and issues associated with the impact of an event to the business.
Today’s social networks are challenging our ideas of network security. In this video, you’ll learn about security concerns associated with peer-to-peer networks and social networking sites.