Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Planning for On-Premise Infrastructure Deployments

Planning for On-Premise Infrastructure Deployments

With cloud computing becoming a major benefit for organizations of all sizes, some have abandoned the idea of having on-premise servers at their place of business. This could end up being problematic, however, as data security and privacy of cloud-based resources have been known to be often less than reliable. If you are looking to host your own IT in-house, there are some issues you have to see to before you can start purchasing hardware.

For the small business, and especially the startup, setting up an on-premise server (or servers) can be intimidating. This is especially true if the organization already subscribes to using some online services. Understanding the basics can go a long way toward helping your business prepare for its new hardware. Here are a few suggestions:

Get a Server Rack

If you haven’t ever had on-premise hardware, you likely haven’t considered where this hardware will go, how it will keep, etc. The first thing you need to understand is that while it doesn’t seem like a problem to store your hardware on top of a cabinet or on a shelf, when your business invariably grows, any money you saved by shoving your centralized technology into any unused space will be thrown out the window (and then some) when you have to deal with downtime when your disorganized mass of wires and components has to be unhooked and reconnected properly by professionals.

On the other hand, if you get a server rack off the bat it may seem like a bit of overkill, but, rest assured, when you are looking to enhance your centralized infrastructure, adding additional machines to an orderly server rack will be of great benefit. Additionally, make sure to get a rack that is right for your needs. Server racks are measured in rack units, or “RU”, and typically come in either full-height (42U) or half-height (24U). There are also-wall mounted cabinets that can be used to house servers and switches.

Regardless of what server options your business chooses, when you aim to host your own hardware, you will definitely want to have a plan in place as to where you are going to put it. Servers are extremely hot and loud. They are also extremely important and likely hold a fair amount of sensitive data that you don’t want exposed.

Your best bet is to isolate your company’s servers in a closet or designed server room. If you don’t have anything like that in your space, you can build one by partitioning part of a closet or room simply to house your company’s central infrastructure. This will also give you the chance to consider what kind of cooling system you will have to install.

Cooling

You should know before you set out that cooling is one of the major considerations any organization looking to house its own hardware has to make. Since it is a bit of an investment, you should know exactly what your cooling system will have to look like before moving any piece of hardware into your new server room.

Now, if you are only going to be housing a BDR or some network attached storage (NAS) or some networking equipment, you won’t really need to consider cooling as long as the room has good ventilation. When you start filling a server rack, however, you have to consider that each of those machines puts off a certain amount of heat, and that heat can significantly shorten the life of that equipment and cause hardware failure and corresponding downtime.

Another variable you’ll have to consider is that you have coverage of your cooling efforts. Many businesses have dedicated HVAC systems in place that don’t function after people leave for the day. This means that any server-room-based air conditioning (or refrigeration) will have to be set up independent of the location’s HVAC system.

A Mess of Wires

Once your cooling system is taken care of and your servers are in place, you will inevitably be adding more hardware as your needs/business grows. This will result in a lot of new wires and cables connecting elements of your server rack. If you aren’t careful, good intentions could turn into a complete mess. With wiring a tedious process, after only a little while, your server cabinet could end up looking like the one pictured on the left.

For the server that looks like that, there is only one remedy, a complete renovation. The one on the right looks nice, but was only possible after the technician took a complete workday to sort through all the mess on the left. Nine hours of a technician’s time is expensive. To give you an idea, the average engine replacement for a car takes 18 hours.

You will want to label everything, as well as document the entire server rack so that you have a key in which to quickly get at certain hardware if the underlying performance starts to wane. Of course these things are always going to be handled by an IT technician, but ensuring that you have all the materials beforehand can make these processes easier for everyone. One suggestion is to leave a label printer in with your hardware. That way servers and networking equipment can be properly labeled with their names and the corresponding IP addresses.

Installing hardware for your small business can give you control over how you manage your own IT and allow you to make security a priority, but it can also be filled with hassles. If you would like more information about how to plan and manage a server room, contact Central Technology Solutions today at 1-844-237-4300.

Tip of the Week: Optimize Your Chrome Browser
How to Prioritize Your Upcoming Technology Impleme...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Saturday, April 20 2019

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Business Computing Email Privacy Malware Hosted Solutions Hackers IT Services Productivity Internet Network Security Data Productivity Managed IT Services Outsourced IT Data Backup Software Business IT Support Innovation Mobile Devices Data Recovery Ransomware Computer Tech Term Hardware Microsoft Google Backup Cloud Computing Small Business Efficiency Internet of Things Business Continuity Managed Service Provider IT Support Smartphone Upgrade Business Management User Tips Android Disaster Recovery Remote Monitoring VoIP Encryption Data Management Social Media Paperless Office Windows 10 Phishing Smartphones Communication Artificial Intelligence Browser Workplace Tips Collaboration Managed IT Windows Facebook Server Cybersecurity BYOD Risk Management Windows 10 Save Money Managed IT Services communications Mobile Device Saving Money Holiday Passwords Mobile Device Management App Network Wi-Fi Firewall BDR Chrome Employer-Employee Relationship Robot Compliance Bandwidth Office 365 Bring Your Own Device Vendor Management Apps Government Applications Unified Threat Management Automation Recovery Document Management Gmail Analytics Big Data Tip of the week Quick Tips Scam Project Management Antivirus Telephone Systems Healthcare SaaS Money Infrastructure Data storage Hosted Solution Going Green Website Vulnerability Business Technology Microsoft Office Wireless Password Content Filtering Managed Service Information Virtualization IT Management Customer Service Apple Social Unified Communications Virtual Reality Training VPN Miscellaneous Customer Relationship Management Blockchain File Sharing Tablet Computing Regulations Data Security Office IT Service Data loss Files Computers Storage Printing Politics Work/Life Balance Remote Computing Settings Router Help Desk Two-factor Authentication Smart Technology Company Culture Maintenance Mobile Computing Net Neutrality Upgrades Hacker Users Spam Twitter Proactive YouTube Networking Internet Exlporer Machine Learning Mobility Wireless Technology Legal WiFi Patch Management Downtime HIPAA Virtual Private Network End of Support Health Access Control Remote Monitoring and Management Network Management Management Mobile Security Administration Assessment LiFi Monitors Budget Education How To Remote Workers Electronic Medical Records Information Technology Server Management Alert Private Cloud Operating System IT solutions Outlook Tech Support Mouse Uninterrupted Power Supply IoT How To Samsung Digital Payment Sports Google Drive Software as a Service Flexibility The Internet of Things Chromebook Websites Identity Theft Word Licensing Redundancy Avoiding Downtime Business Growth Employees Hard Drives Google Docs Spyware Course Asset Tracking Technology Assurance Group ’s 18 Law Enforcement Proactive IT Conferencing Computing Infrastructure Black Market Public Cloud MSP RMM Technology Tips Chatbots Wasting Time Travel Humor Recycling Cyberattacks Writing Emoji Botnet Shortcut Mobile Device Managment Software Tips Backups Firefox Utility Computing Consulting Microsoft Excel Modem Network Congestion Drones Development Zero-Day Threat Multi-Factor Security Wearable Technology ROI Automobile Computer Care Solid State Drive OneNote Distributed Denial of Service Annual Convention Computer Repair Gadget Deep Learning Heating/Cooling IT Consulting Managing Stress Instant Messaging Printer Alerts Tech Terms Comparison Identity Database Physical Security Current Events Time Management eWaste Read Only Retail Cortana WannaCry Notes 3D Printing Managed Services Provider Cookies Display GPS Alt Codes Hacking Cables Backup and Disaster Recovery Google Calendar Cryptocurrency Employee-Employer Relationship Managed IT Service San Diego Servers Data Breach Enterprise Content Management Finance Cooperation Processors Theft Specifications Voice over Internet Protocol Office Tips Crowdsourcing Meetings Supercomputer IT Technicians PowerPoint Unsupported Software Virus G Suite History Hacks Cost Management E-Commerce Permissions Nanotechnology Update Tracking Typing Disaster Trending Wires Human Error Legislation Google Maps Bitcoin Mail Merge Connectivity Break Fix Social Networking Taxes Best Practice Virtual Desktop Technology Laws Vulnerabilities Authentication SharePoint Staff WPA3 Financial Black Friday Roanoke — Central Technology Solutions Windows 7 Touchscreen Techology Enterprise Resource Planning Bookmarks Unified Threat Management Hotspot Social Engineering USB IT Budget VoIP Sponsor Mirgation Professional Services Mobile Data Cabling Consultation Lenovo Hard Drive Features Fraud Screen Reader Permission Windows 8 Save Time Address Dark Web Motherboard Statistics Geography Authorization Downloads Augmented Reality Security Cameras Digital Obstacle Fleet Tracking Procurement Cyber Monday technology services provider Transportation Dark Data Personal Information Point of Sale Disaster Resistance Mobile Favorites User Error Language Safety Identities Test Migration Virtual Assistant Superfish Cache Electronic Health Records Smart Tech Marketing Search Notifications Sync Buisness Star Wars Monitoring Data Warehousing Telephony Gadgets Google Wallet Bluetooth High-Speed Internet Operations Remote Worker Students Web Server Hard Disk Drive Teamwork Cameras Motion Sickness Emergency Administrator CrashOverride Shared resources CCTV Printers Relocation Webcam IT Consultant Error Cybercrime Regulation