-
When it comes to the construction of the computer room, I recommend Beijing Jinbang Shikai Technology Development **** to you to understand. The company is a high-tech enterprise specializing in data center construction and electronic intelligent engineering. The company's data center construction business mainly includes computer room decoration, power distribution precision air conditioning, gas fire protection, cloud computing platform, disaster recovery and backup, etc.
-
1. What is the safety evaluation of computer room operation?
To put it simply, it is a comprehensive evaluation of the property rights, fire resistance level, floor load, seismic grade, fire protection, power distribution, safety management, operation system and other aspects of the self-built computer room of the enterprise by the relevant ministries and commissions.
2. Why do we need to do a computer room security evaluation?
Generally speaking, this computer room operation safety evaluation is an assessment of all indicators of the computer room, not a single assessment of each department before, of course, we can understand that if the previous detection of each department is no problem, then it is basically equivalent to the basic operation safety evaluation is roughly no problem. However, there are still many details, such as whether the dynamic ring system of the computer room is easy to use, UPS power distribution problems, and even surrounding water sources, pollution and other problems. Often, problems in these links will affect the application of the public, so the industry authorities must lead the overall situation and then make evaluations.
3. What should be paid attention to in the preparation of safety evaluation materials for self-built computer rooms?
As mentioned above, more than 20 instructions and materials need to be prepared for the operation safety evaluation of the computer room, and it is often difficult to make corrections after the computer room is completed. For example, how to deploy and purchase the dynamic ring system, how to solve the power distribution problem of the computer room, whether the building has property rights and load-bearing problems, whether the computer room is on the bottom or top floor of the building, etc., which is not conducive to waterproof and moisture-proof.
4. Other precautions
It should be noted that not all enterprises applying for IDC licenses are required to conduct a self-built computer room operation security assessment, if the enterprise does not have a self-built computer room, but only rents the computer room of a basic operator such as China Telecom Unicom, there is no need to conduct a cumbersome computer room evaluation, and only a small amount of materials such as server hosting contracts need to be submitted to pass the computer room operation security evaluation.
-
IDC license refers to the use of the corresponding computer room facilities to provide placement, maintenance, system configuration and management services for the user's servers and other Internet or other network-related equipment in the form of outsourcing rental, as well as the rental of database systems or servers and other equipment and the rental of their storage space, the leasing of communication lines and egress bandwidth and other application services. From December 1, 2012, telecom enterprises that intend to operate IDC and ISP services shall apply to the telecommunications authorities for business licenses in accordance with relevant requirements. The competent department for telecommunications accepts the application and reviews whether the applicant enterprise meets the application requirements, and makes a decision to approve or not approve it in accordance with law.
The system evaluation that enterprises need to complete are:1. Evaluation of IDC computer room operation safety system;
2. Evaluation of the filing system;
3. Evaluation of enterprise resource management system;
4. Information security management evaluation.
The following points need to be taken into account for the evaluation of the IDC license system:
1. Enterprises must have service agreements such as IDC license hosting and private line access;
2. The enterprise has a local data room;
3. The owner of the IDC computer room and the backup power supply should be from different substations, with automatic fire sprinkler system, and at the same time meet the basic conditions such as temperature, humidity, lightning protection, waterproof, access control, etc.;
4. Enterprises need to purchase genuine information security systems;
5. The computer room system should be docked with the corresponding supervision system.
-
The noise emitted by the server is very large, especially in the computer room, where hundreds or thousands of servers are working at the same time, and the noise can be imagined.
Secondly, you need to pay attention to wearing dust-free electrostatic clothing, the IDC computer room has very high requirements for the environment, static electricity and dust may cause server failure, so you must take precautions before entering the IDC computer room.
-
Physical inspection, operators are better than self-built. Computer room**, word of mouth, service. The main thing is to test, basically the operator's computer room can be tested. You can send me a private message for details.
-
1.The cost of the computer room.
IDC data center to shop around, first find some IDC providers to inquire about the cost, and then choose the lowest cost of a few**, and then understand the company**, you can basically find the right one**.
2.Security of the server.
The security of the server can not be ignored, go to the office of the hosting service company to visit, take a look at the IDC computer room and business license, and then find the sales staff to understand.
3. Be fast.
If the IDC operator is a telecom or Netcom computer room, there is basically no problem with speed. There is an unexpected situation that the traffic of the company's own cabinet is too large, and the speed may be affected after being limited by telecom and Netcom.
4.After-sales service.
Confirm whether there is a person on duty and whether there is negative news on the Internet and **.
The steps are as follows:1. Remove the ingredients. >>>More
The automatic generation method of the catalog. There are two key points: one is the use of "style and formatting" for long documents; The second is the automatic generation of directories. >>>More
If you don't feel comfortable buying fried dough sticks outside, can you make your own fried dough sticks at home?
Ways to be yourself: Set a small goal every day and thus a big goal every month. Set a goal, let yourself follow the plan you have made to carry out your next step, make corresponding struggles for the goals you set, dare to work hard, and summarize your work once a month. >>>More
It's super simple, in fact, you can do this, first prepare your favorite cloth, pen, scissors and needle and thread. First, you use a cloth to form a circle, and then see if the mouse is suitable, and then sew it up according to the size of the mouse, cut off the excess part, [the length should also be measured] and then put it on, and then draw it with a pen with two hands, and then take it off and cut off the circle. Then, you can add some patterns or something. >>>More