<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>Sarah Landrum, Author at Colocation America</title>
	<atom:link href="https://www.colocationamerica.com/blog/author/slandrum/feed" rel="self" type="application/rss+xml" />
	<link></link>
	<description>Dedicated Servers and Colocation Services &#124; Colocation America</description>
	<lastBuildDate>Tue, 22 Oct 2024 20:43:37 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	
	<item>
		<title>How to Increase Confidence in Your Data Security</title>
		<link>https://www.colocationamerica.com/blog/increase-confidence-in-data-security</link>
					<comments>https://www.colocationamerica.com/blog/increase-confidence-in-data-security#respond</comments>
		
		<dc:creator><![CDATA[Sarah Landrum]]></dc:creator>
		<pubDate>Thu, 18 Feb 2016 11:41:53 +0000</pubDate>
				<category><![CDATA[Cyber Security News]]></category>
		<guid isPermaLink="false">https://www.colocationamerica.com/?p=12436</guid>

					<description><![CDATA[<p>In a recent security report, Cisco revealed that merely 45 percent of organizations or businesses have true confidence in their digital security posture. In other words, less than half of all organizations polled indicated that they are confident in their<span class="excerpt-hellip"> […]</span></p>
<p>The post <a href="https://www.colocationamerica.com/blog/increase-confidence-in-data-security">How to Increase Confidence in Your Data Security</a> appeared first on <a href="https://www.colocationamerica.com">Colocation America</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">In a recent security report, Cisco revealed that merely </span><a href="http://www.cisco.com/c/m/en_us/offers/sc04/2016-annual-security-report/index.html" target="_blank" rel="noopener noreferrer"><span style="font-weight: 400;">45 percent of organizations or businesses have true confidence</span></a><span style="font-weight: 400;"> in their digital security posture. In other words, less than half of all organizations polled indicated that they are confident in their level of security – security which is protecting sensitive internal data from leaking, as well as that of their customers and clients. Needless to say, this is concerning for many reasons, but certainly understandable.</span></p>
<p><span style="font-weight: 400;">A massive rise in high-profile hacks and sensitive data leaks has shown us all that digital security is no joke. Cisco’s report comes right on the heels of </span><a href="http://www.zdnet.com/article/kmart-customer-details-hacked/" target="_blank" rel="noopener noreferrer"><span style="font-weight: 400;">a K-mart announcement claiming</span></a><span style="font-weight: 400;"> it’s experienced a security breach. They’re far from the only ones – </span><a href="https://www.engadget.com/2015/12/17/biggest-security-hacks-of-2015/" target="_blank" rel="noopener noreferrer"><span style="font-weight: 400;">other organizations that have experienced breaches</span></a><span style="font-weight: 400;"> include Target, Ashley Madison, Sony, the IRS, VTech and many more.</span></p>
<p><span style="font-weight: 400;">Anthony Stitt, the Australian and New Zealand security expert for Cisco, believes that this decline in confidence </span><span style="font-weight: 400;"><a href="http://www.zdnet.com/article/cisco-almost-half-of-organisations-lack-security-posture-confidence/" target="_blank" rel="noopener noreferrer">is because software vulnerabilities are proving more difficult to patch than ever</a>:</span></p>
<blockquote><p><span style="font-weight: 400;">&#8220;I think the declining levels of confidence that we&#8217;re seeing is in response to the fact that the number of software vulnerabilities that are appearing every year seems to be growing and that an organisation&#8217;s ability to even do fairly as basic patching seems to be declining over time. Compromises happen, breaches happen, but what&#8217;s the organisation&#8217;s level of preparedness to be able to deal with that quickly and easily? Because certainly the number of vulnerabilities are not going away – an organisation&#8217;s ability to patch and keep criminals out doesn&#8217;t seem to be working.&#8221;</span></p></blockquote>
<p><a href="https://www.trustwave.com/Resources/Security-Stats/" target="_blank" rel="noopener noreferrer"><span style="font-weight: 400;">According to Trustwave Holdings</span></a><span style="font-weight: 400;">, 98 percent of applications scanned for problems were found to have one or more vulnerabilities.</span></p>
<p><span style="font-weight: 400;">With the right amount of time, it’s not particularly difficult for unscrupulous individuals to take advantage of these vulnerabilities, many of which have not yet been discovered by official IT or security experts working for the affected organization.</span></p>
<p><span style="font-weight: 400;">For example, the IRS didn’t announce until May 2015 that tit was able to close a security hole which had been open since February of that same year. All that time, it was being used by hackers to gain sensitive information. </span><a href="https://www.engadget.com/2015/08/17/irs-breach-is-actually-much-worse/" target="_blank" rel="noopener noreferrer"><span style="font-weight: 400;">More than 300,000 taxpayers were affected</span></a><span style="font-weight: 400;">, as fraudsters stole info like names, Social Security numbers, addresses and more directly from the IRS website. This is a government agency we’re talking about here, one that is responsible for not only protecting the taxpayers it services, but also its own sensitive information.</span></p>
<p><span style="font-weight: 400;">It just goes to show that any organization can experience a breach. That doesn’t mean there’s no way to increase confidence in your security. In fact, if you handle things correctly, you can lower the chances of experiencing a breach significantly. Many of the aforementioned attacks happened because the affected companies were not vigilant about maintaining their security.</span></p>
<hr>
<p><em>Check out this infographic on how some infamous&nbsp;cyber-security&nbsp;vulnerabilities of 2014 affected data:</em></p>
<div id="attachment_12437" style="width: 608px" class="wp-caption aligncenter"><img fetchpriority="high" decoding="async" aria-describedby="caption-attachment-12437" class="size-full wp-image-12437" src="https://coloam.hostadillo.com/wp-content/uploads/2016/02/understanding-vulnerabilities.jpg" alt="understanding how to secure your data" width="598" height="1508" srcset="https://www.colocationamerica.com/wp-content/uploads/2016/02/understanding-vulnerabilities.jpg 598w, https://www.colocationamerica.com/wp-content/uploads/2016/02/understanding-vulnerabilities-300x757.jpg 300w, https://www.colocationamerica.com/wp-content/uploads/2016/02/understanding-vulnerabilities-119x300.jpg 119w, https://www.colocationamerica.com/wp-content/uploads/2016/02/understanding-vulnerabilities-406x1024.jpg 406w, https://www.colocationamerica.com/wp-content/uploads/2016/02/understanding-vulnerabilities-58x146.jpg 58w, https://www.colocationamerica.com/wp-content/uploads/2016/02/understanding-vulnerabilities-20x50.jpg 20w, https://www.colocationamerica.com/wp-content/uploads/2016/02/understanding-vulnerabilities-30x75.jpg 30w" sizes="(max-width:767px) 480px, 598px" /><p id="caption-attachment-12437" class="wp-caption-text">Photo Credit: <a href="https://www.incapsula.com/blog/2014-mega-vulnerabilities.html" target="_blank" rel="nofollow noopener noreferrer">incapsula.com</a></p></div>
<hr>
<h2>Why You Need a Technology Estate and Security Maintenance Team</h2>
<p><span style="font-weight: 400;">Managing the technology estate of a large organization or company is difficult enough, and that’s before said company goes through any kind of growth or restructuring. Because of this, you absolutely need a dedicated team working full time on maintaining technology systems, security and all IT-related tasks.</span></p>
<p><span style="font-weight: 400;">If you’d prefer not to have the team on your own payroll, you can hire a third party to handle the work. There are plenty of security providers out there that specialize in network and infrastructure monitoring, software and hardware maintenance, and much more.</span></p>
<p><span style="font-weight: 400;">Without delving into the particulars, one of the more obvious roles of a security team would be to ensure all software and hardware is up to date and running smoothly. There tends to be a lot more vulnerabilities in software applications and systems that are outdated. To improve security, it’s best to install all upgrades and security patches as soon as they are available. </span></p>
<p><span style="font-weight: 400;">The problem is this can be difficult to stay on top of if you already have a long list of other responsibilities. Updating a system becomes a lower priority, and security suffers by proxy. If you have a full-time team managing updates, there’s a lot less to worry about.</span></p>
<hr>
<h2>Tighten up Data Policies for Everyone</h2>
<p><span style="font-weight: 400;">There’s only one way to protect sensitive data, and that’s to lock it down as much as possible. Of course, encryption is always necessary when it comes to data storage, but external storage and how it’s used is just as important. For instance, employees should never be allowed to transfer confidential data to an external storage device – such as a USB drive – and take it with them off the job. This is even more crucial in environments where employees are allowed to take their work home, or when a company has BYOD (bring-your-own-device) policies in place. </span></p>
<p><span style="font-weight: 400;">The solution to this is to provide employees a portable work device that is encrypted and has access to the appropriate systems, both locally and remotely. If they need to work from home they can simply take their work device with them, and all sensitive data remains protected and secured behind active security protocols.</span></p>
<p><span style="font-weight: 400;">As for encryption, it should be used on any and all devices used within the organization, including mobile devices, laptops, desktop computers, external hard drives and storage options, and anything else that fits the bill.</span></p>
<hr>
<h2>Educate Your Team, and Plan for Emergencies</h2>
<p><span style="font-weight: 400;">Unfortunately, breaches are inevitable no matter how secure a system, network or device is. What happens during and after a breach, however, makes all the difference. That’s why it’s extremely important that you educate and train your team for emergencies, even if they aren’t part of your IT or security department.</span></p>
<p><span style="font-weight: 400;">Criminals are constantly using a bevy of tools to gain access to systems and information they shouldn’t, like ransomware, Trojans and keyloggers, phishing emails and websites, DDoS attacks and even the occasional brute force attack. All employees should be trained to spot problems, or at the very least should be able to recognize when something shady is happening so they can file a report.</span></p>
<p><span style="font-weight: 400;">Educating employees will also help protect them off the worksite while they’re browsing from personal computers and devices. It’s still possible for criminals to attack employees by extracting knowledge and information from them when they’re not at work.</span></p>
<div id="attachment_12438" style="width: 610px" class="wp-caption aligncenter"><img decoding="async" aria-describedby="caption-attachment-12438" class="size-full wp-image-12438" src="https://coloam.hostadillo.com/wp-content/uploads/2016/02/what-does-a-vpn-do.jpg" alt="understanding a vpn" width="600" height="613" srcset="https://www.colocationamerica.com/wp-content/uploads/2016/02/what-does-a-vpn-do.jpg 600w, https://www.colocationamerica.com/wp-content/uploads/2016/02/what-does-a-vpn-do-300x307.jpg 300w, https://www.colocationamerica.com/wp-content/uploads/2016/02/what-does-a-vpn-do-294x300.jpg 294w, https://www.colocationamerica.com/wp-content/uploads/2016/02/what-does-a-vpn-do-143x146.jpg 143w, https://www.colocationamerica.com/wp-content/uploads/2016/02/what-does-a-vpn-do-50x50.jpg 50w, https://www.colocationamerica.com/wp-content/uploads/2016/02/what-does-a-vpn-do-73x75.jpg 73w" sizes="(max-width:767px) 480px, 600px" /><p id="caption-attachment-12438" class="wp-caption-text">Photo Credit: <a href="http://neomam.com/infographics/how-to-set-up-a-vpn" target="_blank" rel="nofollow noopener noreferrer">neomam.com</a></p></div>
<hr>
<h2>Always Browse Behind a VPN</h2>
<p><span style="font-weight: 400;">Firewalls are a no-brainer when it comes to security, but few know that browsing should always be done from behind a VPN or virtual private network. A VPN is designed to mask the true IP address of a system, protecting both the anonymity and privacy of those using it.</span></p>
<p><span style="font-weight: 400;">Why is this important for an organization or business? It keeps the activity and data of all employees protected from outside prying. Most VPNS also offer </span><a href="https://www.le-vpn.com/increase-your-online-security/" target="_blank" rel="nofollow noopener noreferrer"><span style="font-weight: 400;">an advanced form of security to encrypt any and all data</span></a><span style="font-weight: 400;"> being transmitted via the system. Data packets are encrypted, meaning even if someone is able to hack into a network or listen to what’s going on, they’re going to have a hard time translating the data without the proper encryption key.</span></p>
<div id="attachment_12439" style="width: 610px" class="wp-caption aligncenter"><img decoding="async" aria-describedby="caption-attachment-12439" class="size-full wp-image-12439" src="https://coloam.hostadillo.com/wp-content/uploads/2016/02/leading-causes-of-data-loss.jpg" alt="top causes of lost data" width="600" height="594" srcset="https://www.colocationamerica.com/wp-content/uploads/2016/02/leading-causes-of-data-loss.jpg 600w, https://www.colocationamerica.com/wp-content/uploads/2016/02/leading-causes-of-data-loss-300x297.jpg 300w, https://www.colocationamerica.com/wp-content/uploads/2016/02/leading-causes-of-data-loss-150x150.jpg 150w, https://www.colocationamerica.com/wp-content/uploads/2016/02/leading-causes-of-data-loss-147x146.jpg 147w, https://www.colocationamerica.com/wp-content/uploads/2016/02/leading-causes-of-data-loss-50x50.jpg 50w, https://www.colocationamerica.com/wp-content/uploads/2016/02/leading-causes-of-data-loss-76x75.jpg 76w, https://www.colocationamerica.com/wp-content/uploads/2016/02/leading-causes-of-data-loss-85x85.jpg 85w, https://www.colocationamerica.com/wp-content/uploads/2016/02/leading-causes-of-data-loss-80x80.jpg 80w" sizes="(max-width:767px) 480px, 600px" /><p id="caption-attachment-12439" class="wp-caption-text">Photo Credit: <a href="http://visual.ly/data-protection-what%E2%80%99s-your-backup-plan" target="_blank" rel="nofollow noopener noreferrer">visual.ly</a></p></div>
<hr>
<h2>Incorporate a Data Backup Routine</h2>
<p><span style="font-weight: 400;">Every business or organization that <a href="https://www.colocationamerica.com/blog/safeguarding-your-sensitive-data">handles a great deal of data or sensitive information</a> should already have a backup routine in place. That is, should data be lost, backups can be used in place of the originals.</span></p>
<p><span style="font-weight: 400;">Backups should be given the same care and security because criminals can still use this information if they get their hands on it. There are service providers that will handle all the steps and maintenance for backing up a system. This is the preferred method for many companies, because the service provider will maintain the backups, monitor security and supply the necessary hardware.</span></p>
<p><span style="font-weight: 400;">This is one of the most important forms of protection you can offer clients. There are many ways criminals can alter or scramble data after they’ve gained access. If you only ever have one copy, after they destroy it you lose it completely. With data backups, at least you have the option to restore data for your clients and employees after an attack.</span></p>
<p><span style="font-weight: 400;">A Symantec report from 2013</span><span style="font-weight: 400;"> claims that 47 percent of enterprises lost cloud data and were forced to restore from backups. In addition, 66 percent of all organizations attempting a backup had their operations fail. Furthermore, 13 percent of those instances were caused in the first place by hackers who deleted the data.</span></p>
<p><span style="font-weight: 400;">The takeaway here is that no matter where your data is stored, backups are always necessary and should be a regular part of your security protocol.</span></p>
<hr>
<h3>Boost Confidence in Your Digital Security</h3>
<p><span style="font-weight: 400;">Following these steps won’t completely prevent a breach, but they can help you prolong it from happening. Having a strategy in place for your team and backups to access during and after an attack will help your damage control process significantly, as well.</span></p>
<p><span style="font-weight: 400;">Just remember, anyone can become the target of a hacker and when they want in, it’s incredibly difficult to keep them out. Security is no joke, so do what you can to bolster it and improve confidence.</span></p>
<hr>
<p>Sarah Landrum is the founder of <a href="http://www.punchedclocks.com/" target="_blank" rel="nofollow noopener noreferrer">Punched Clocks</a>. Follow her on Twitter <a href="https://twitter.com/SarahLandrum" target="_blank" rel="noopener noreferrer">@SarahLandrum</a>.</p>
<p>The post <a href="https://www.colocationamerica.com/blog/increase-confidence-in-data-security">How to Increase Confidence in Your Data Security</a> appeared first on <a href="https://www.colocationamerica.com">Colocation America</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.colocationamerica.com/blog/increase-confidence-in-data-security/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>8 Ways Data Centers Can Be More Energy Efficient</title>
		<link>https://www.colocationamerica.com/blog/8-ways-for-better-data-center-efficiency</link>
					<comments>https://www.colocationamerica.com/blog/8-ways-for-better-data-center-efficiency#respond</comments>
		
		<dc:creator><![CDATA[Sarah Landrum]]></dc:creator>
		<pubDate>Wed, 03 Feb 2016 11:45:51 +0000</pubDate>
				<category><![CDATA[Data Center News]]></category>
		<guid isPermaLink="false">https://www.colocationamerica.com/?p=12277</guid>

					<description><![CDATA[<p>Data centers are becoming increasingly prevalent in today’s technological landscape. They range from single-server rooms used by small businesses to gigantic server farms relied upon by companies such as Amazon that offer cloud computing access. However, one surprising revelation that<span class="excerpt-hellip"> […]</span></p>
<p>The post <a href="https://www.colocationamerica.com/blog/8-ways-for-better-data-center-efficiency">8 Ways Data Centers Can Be More Energy Efficient</a> appeared first on <a href="https://www.colocationamerica.com">Colocation America</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p><span style="font-weight: 400;">Data centers are becoming increasingly prevalent in today’s technological landscape. They range from single-server rooms used by small businesses to gigantic server farms relied upon by companies such as Amazon that offer cloud computing access. However, one surprising revelation that has become clear recently is that most data center managers admittedly don’t have plans in place to ensure their facilities are as energy efficient as possible.</span></p>
<p><a href="http://www.zdnet.com/article/data-centre-owners-in-the-dark-on-energy-efficiency/"><span style="font-weight: 400;">Research from an energy consortium called The Green Grid</span></a><span style="font-weight: 400;"> found eco-friendly practices are not treated like as much of a priority by some firms as other matters. Furthermore, 43 percent of respondents said they had no strategies in place to boost energy efficiency. If that sounds familiar, don’t worry. The tips below offer creative and worthwhile ways to make your data center as kind to the planet as possible.</span></p>
<hr />
<h2><b style="line-height: 1.5;">1. Don’t Keep the Environment Quite as Cool</b></h2>
<p><span style="font-weight: 400;">Even though the recommended temperature for data centers is between 65 and 80 degrees Fahrenheit, ENERGYSTAR data indicates it’s common to keep the temperature up to 10 degrees colder than the minimum in the range above. Furthermore, statistics indicate you could </span><a href="https://www.energystar.gov/sites/default/files/asset/document/DataCenter-Top12-Brochure-Final.pdf"><span style="font-weight: 400;">save up to five percent</span></a><span style="font-weight: 400;"> in energy costs for every degree you increase the server inlet temperature.</span></p>
<hr />
<h2><b style="line-height: 1.5;">2. Install Air-Side Economizers</b></h2>
<p><span style="font-weight: 400;">There’s no way to get around the fact that data centers must be kept cool year-round. However, if you live in a place characterized by lengthy winters and cool evenings, take advantage of the natural conditions by installing air-side economizers at your data center. </span></p>
<p><span style="font-weight: 400;">They pull in cool air from the outside and are especially effective when your data center’s operating temperature is normally on the higher side of the suggested range above. Speaking about air-side economizers installed at a data center in Texas, an IT specialist from Cisco suggested using outside air to cool the premises for more than half the year in the video below:</span></p>
<p><iframe src="https://www.youtube.com/embed/1IK5XGh_kCk" width="560" height="315" frameborder="0" allowfullscreen="allowfullscreen"></iframe></p>
<hr />
<h2><b style="line-height: 1.5;">3. </b><b style="line-height: 1.5;">Shut Down Non-Functional Servers</b></h2>
<p><span style="font-weight: 400;">You may be surprised to realize up to 30 percent of the energy consumption in your data center could be related to servers that aren’t actually doing any computing tasks. Periodically check to make sure the only servers running are those that are crucial for current operations. Take the others out of commission, and your <a href="https://www.colocationamerica.com/data-center-redundancy/power">energy consumption</a> levels should shrink.</span></p>
<hr />
<h2><b style="line-height: 1.5;">4. Upgrade Your Air Compressors</b></h2>
<p><a href="http://www.abb.com/product/ap/db0003db004052/e950c90f13518ffbc125788f0030bda0.aspx" target="_blank" rel="noopener noreferrer"><span style="font-weight: 400;">According to an infographic from ABB</span></a><span style="font-weight: 400;">, up to $281 million is sacrificed due to ineffective cooling systems. That’s why it’s such a good idea to think seriously about making worthwhile upgrades. The infographic also suggests the payback you’ll see from deciding to revamp a cooling system in your data center may be evident in as little as two years. </span></p>
<div id="attachment_12281" style="width: 510px" class="wp-caption aligncenter"><img decoding="async" aria-describedby="caption-attachment-12281" class="wp-image-12281 size-full" src="https://coloam.hostadillo.com/wp-content/uploads/2016/02/reduce-data-center-cooling-costs.jpg" alt="reduce the cost of data center cooling" width="500" height="310" srcset="https://www.colocationamerica.com/wp-content/uploads/2016/02/reduce-data-center-cooling-costs.jpg 500w, https://www.colocationamerica.com/wp-content/uploads/2016/02/reduce-data-center-cooling-costs-300x186.jpg 300w, https://www.colocationamerica.com/wp-content/uploads/2016/02/reduce-data-center-cooling-costs-235x146.jpg 235w, https://www.colocationamerica.com/wp-content/uploads/2016/02/reduce-data-center-cooling-costs-50x31.jpg 50w, https://www.colocationamerica.com/wp-content/uploads/2016/02/reduce-data-center-cooling-costs-121x75.jpg 121w" sizes="(max-width:767px) 480px, 500px" /><p id="caption-attachment-12281" class="wp-caption-text">Photo Credit: <a href="http://www.abb.com/product/ap/db0003db004052/e950c90f13518ffbc125788f0030bda0.aspx" target="_blank" rel="nofollow noopener noreferrer">abb.com</a></p></div>
<p><span style="font-weight: 400;">One smart way to improve an existing cooling setup in a data center is to switch from older load/unload air compressor designs to more modern variable-speed drive compressors. The newer types may bring </span><a href="http://www.quincycompressor.com/upgrading-with-quincy-air-compressors-to-save-money-and-energy/" target="_blank" rel="noopener noreferrer"><span style="font-weight: 400;">average energy savings of as much as 35 percent</span></a><span style="font-weight: 400;">.</span></p>
<hr />
<h2><b style="line-height: 1.5;">5. Consider Ultrasonic Humidification Methods</b></h2>
<p><span style="font-weight: 400;">Air conditioners and air handlers used in data centers both need humidification units to keep humidity levels consistent. Traditionally, data center managers use infrared and steam canister isothermal methods. However, eBay is one example of a mega company that opted to utilize ultrasonic techniques to achieve static humidity levels in the environment. </span></p>
<p><span style="font-weight: 400;">Ultrasonic methods vibrate water molecules to produce a fine mist. Unlike isothermal options, ultrasonic humidification does not produce heat. Case study data from eBay includes a comparison table that </span><a href="https://www.energystar.gov/sites/default/files/asset/document/Energy_Star_fact_sheet.pdf" target="_blank" rel="noopener noreferrer"><span style="font-weight: 400;">shows the company saved</span></a><span style="font-weight: 400;"> over $50,000 by using eight ultrasonic humidifiers.</span></p>
<div id="attachment_12282" style="width: 510px" class="wp-caption aligncenter"><img decoding="async" aria-describedby="caption-attachment-12282" class="wp-image-12282 size-full" src="https://coloam.hostadillo.com/wp-content/uploads/2016/02/ultrasonic-humidification-payback.jpg" alt="ultrasonic cooling methods" width="500" height="261" srcset="https://www.colocationamerica.com/wp-content/uploads/2016/02/ultrasonic-humidification-payback.jpg 500w, https://www.colocationamerica.com/wp-content/uploads/2016/02/ultrasonic-humidification-payback-300x157.jpg 300w, https://www.colocationamerica.com/wp-content/uploads/2016/02/ultrasonic-humidification-payback-260x136.jpg 260w, https://www.colocationamerica.com/wp-content/uploads/2016/02/ultrasonic-humidification-payback-50x26.jpg 50w, https://www.colocationamerica.com/wp-content/uploads/2016/02/ultrasonic-humidification-payback-144x75.jpg 144w" sizes="(max-width:767px) 480px, 500px" /><p id="caption-attachment-12282" class="wp-caption-text">Photo Credit: <a href="https://www.energystar.gov/sites/default/files/asset/document/Energy_Star_fact_sheet.pdf" target="_blank" rel="nofollow noopener noreferrer">energystar.gov</a></p></div>
<hr />
<h2><b style="line-height: 1.5;">6. Engage the Power-Saving Feature on Your CPUs</b></h2>
<p><span style="font-weight: 400;">The CPU may be responsible for up to half of total power consumption for a server. However, there’s a simple action you can take to combat excessive usage. See if your CPUs have a feature you can enable solely to save power. Many data center managers eventually find out their facilities have such CPUs but were unaware the power-saving capability existed.  </span></p>
<p><span style="font-weight: 400;">If a CPU has that built-in feature, it’ll switch between several performance modes to keep power consumption to a minimum. Even better, you won’t have to reset anything on the CPU to make the new setting kick in.</span></p>
<hr />
<h2><b style="line-height: 1.5;">7. View Climate Change as a Long-Term Concern</b></h2>
<p><span style="font-weight: 400;">Last year, an interactive, circle-shaped infographic was released that allowed people to place their cursors over certain sections to see the </span><a href="http://www.wri.org/blog/2015/06/infographic-what-do-your-countrys-emissions-look" target="_blank" rel="noopener noreferrer"><span style="font-weight: 400;">emissions impact for certain countries</span></a><span style="font-weight: 400;">. The data collected was from 2012 but only became available mid-2015. As it turns out, over 14 percent of global emissions can be linked back to the United States. As you can see from the chart below, that’s a slight improvement over totals for a timeframe that spanned between 1990 to 2011:</span></p>
<div id="attachment_12283" style="width: 510px" class="wp-caption aligncenter"><img decoding="async" aria-describedby="caption-attachment-12283" class="wp-image-12283 size-full" src="https://coloam.hostadillo.com/wp-content/uploads/2016/02/cumulative-ghg-emissions.jpg" alt="climate change and data center efficiency" width="500" height="335" srcset="https://www.colocationamerica.com/wp-content/uploads/2016/02/cumulative-ghg-emissions.jpg 500w, https://www.colocationamerica.com/wp-content/uploads/2016/02/cumulative-ghg-emissions-300x201.jpg 300w, https://www.colocationamerica.com/wp-content/uploads/2016/02/cumulative-ghg-emissions-218x146.jpg 218w, https://www.colocationamerica.com/wp-content/uploads/2016/02/cumulative-ghg-emissions-50x34.jpg 50w, https://www.colocationamerica.com/wp-content/uploads/2016/02/cumulative-ghg-emissions-112x75.jpg 112w" sizes="(max-width:767px) 480px, 500px" /><p id="caption-attachment-12283" class="wp-caption-text">Photo Credit: <a href="http://www.wri.org/blog/2014/11/6-graphs-explain-world%E2%80%99s-top-10-emitters" target="_blank" rel="nofollow noopener noreferrer">wri.org</a></p></div>
<p>If that’s concerning to you, think about following the lead of some data centers in the United Kingdom:</p>
<ul>
<li style="font-weight: 400;"><span style="font-weight: 400;">They’ve signed a Climate Change Agreement (CCA), which has allowed them to qualify for tax incentives. </span></li>
<li style="font-weight: 400;"><span style="font-weight: 400;">Since the United Kingdom has one of the largest data center industries in the world, it makes sense people are trying to be proactive. </span></li>
</ul>
<p><span style="font-weight: 400;">In fact, the United Kingdom was somewhat of a pioneering country because, prior to the time the CCAs were introduced in the data industry, the only other sectors that abided by such agreements to reduce climate change were associated with manufacturing. Supporters believe as the data industry adopts climate change-reducing practices, those decisions will have a widespread effect to prod data center managers who are reacting more slowly or not at all.</span></p>
<p><span style="font-weight: 400;">Even if it’s not possible to </span><a href="http://www.datacenterdynamics.com/power-cooling/uk-data-centers-get-climate-change-agreement/84034.fullarticle" target="_blank" rel="noopener noreferrer"><span style="font-weight: 400;">qualify for similar tax breaks</span></a><span style="font-weight: 400;">, it’s still smart to realize climate change is an international concern that certainly won’t go away. If anything, it’ll become more and more of a pressing matter as years pass. </span></p>
<p><span style="font-weight: 400;">With that in mind, try to understand how any alterations you make so your <a href="https://www.colocationamerica.com/data-center-metrics.htm">data center uses energy more effectively</a> don’t just look good for your bottom line. They could be serving the greater good by protecting the Earth for our generation, as well as future generations.</span></p>
<hr />
<h2><b style="line-height: 1.5;">8. Become Committed to Your Plan</b></h2>
<p><span style="font-weight: 400;">Earlier, you discovered how it’s not common for data center managers to have existing plans in place to promote energy efficiency. Hopefully, the suggestions above have proven you can make noticeable changes just by doing something as simple as adjusting a data center’s internal temperature. </span></p>
<p><span style="font-weight: 400;">No matter which techniques you choose to embrace, remember the best results are often seen by people who are decisive in their methods and willing to follow through with their plans. Your commitment, combined with measurable results, may be the factors that help your data center eventually be admired as one that has led the way by making energy efficiency a major and ongoing concern. </span></p>
<hr />
<p><span style="font-weight: 400;">Sarah Landrum is the founder of </span><a href="http://www.punchedclocks.com/" target="_blank" rel="nofollow noopener noreferrer"><span style="font-weight: 400;">Punched Clocks</span></a><span style="font-weight: 400;">. Follow her on Twitter </span><a href="https://twitter.com/SarahLandrum" target="_blank" rel="noopener noreferrer"><span style="font-weight: 400;">@SarahLandrum</span></a><span style="font-weight: 400;">.</span></p>
<p>The post <a href="https://www.colocationamerica.com/blog/8-ways-for-better-data-center-efficiency">8 Ways Data Centers Can Be More Energy Efficient</a> appeared first on <a href="https://www.colocationamerica.com">Colocation America</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.colocationamerica.com/blog/8-ways-for-better-data-center-efficiency/feed</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
	</channel>
</rss>

<!--
Performance optimized by W3 Total Cache. Learn more: https://www.boldgrid.com/w3-total-cache/?utm_source=w3tc&utm_medium=footer_comment&utm_campaign=free_plugin

Object Caching 38/71 objects using Redis
Page Caching using Disk: Enhanced 
Lazy Loading (feed)
Minified using Disk

Served from: colocationamerica.com @ 2026-04-04 12:58:46 by W3 Total Cache
-->