Contact Us Today! 1-844-237-4300

Central Technology Solutions Blog

Planning for On-Premise Infrastructure Deployments

Planning for On-Premise Infrastructure Deployments

With cloud computing becoming a major benefit for organizations of all sizes, some have abandoned the idea of having on-premise servers at their place of business. This could end up being problematic, however, as data security and privacy of cloud-based resources have been known to be often less than reliable. If you are looking to host your own IT in-house, there are some issues you have to see to before you can start purchasing hardware.

For the small business, and especially the startup, setting up an on-premise server (or servers) can be intimidating. This is especially true if the organization already subscribes to using some online services. Understanding the basics can go a long way toward helping your business prepare for its new hardware. Here are a few suggestions:

Get a Server Rack

If you haven’t ever had on-premise hardware, you likely haven’t considered where this hardware will go, how it will keep, etc. The first thing you need to understand is that while it doesn’t seem like a problem to store your hardware on top of a cabinet or on a shelf, when your business invariably grows, any money you saved by shoving your centralized technology into any unused space will be thrown out the window (and then some) when you have to deal with downtime when your disorganized mass of wires and components has to be unhooked and reconnected properly by professionals.

On the other hand, if you get a server rack off the bat it may seem like a bit of overkill, but, rest assured, when you are looking to enhance your centralized infrastructure, adding additional machines to an orderly server rack will be of great benefit. Additionally, make sure to get a rack that is right for your needs. Server racks are measured in rack units, or “RU”, and typically come in either full-height (42U) or half-height (24U). There are also-wall mounted cabinets that can be used to house servers and switches.

Regardless of what server options your business chooses, when you aim to host your own hardware, you will definitely want to have a plan in place as to where you are going to put it. Servers are extremely hot and loud. They are also extremely important and likely hold a fair amount of sensitive data that you don’t want exposed.

Your best bet is to isolate your company’s servers in a closet or designed server room. If you don’t have anything like that in your space, you can build one by partitioning part of a closet or room simply to house your company’s central infrastructure. This will also give you the chance to consider what kind of cooling system you will have to install.

Cooling

You should know before you set out that cooling is one of the major considerations any organization looking to house its own hardware has to make. Since it is a bit of an investment, you should know exactly what your cooling system will have to look like before moving any piece of hardware into your new server room.

Now, if you are only going to be housing a BDR or some network attached storage (NAS) or some networking equipment, you won’t really need to consider cooling as long as the room has good ventilation. When you start filling a server rack, however, you have to consider that each of those machines puts off a certain amount of heat, and that heat can significantly shorten the life of that equipment and cause hardware failure and corresponding downtime.

Another variable you’ll have to consider is that you have coverage of your cooling efforts. Many businesses have dedicated HVAC systems in place that don’t function after people leave for the day. This means that any server-room-based air conditioning (or refrigeration) will have to be set up independent of the location’s HVAC system.

A Mess of Wires

Once your cooling system is taken care of and your servers are in place, you will inevitably be adding more hardware as your needs/business grows. This will result in a lot of new wires and cables connecting elements of your server rack. If you aren’t careful, good intentions could turn into a complete mess. With wiring a tedious process, after only a little while, your server cabinet could end up looking like the one pictured on the left.

For the server that looks like that, there is only one remedy, a complete renovation. The one on the right looks nice, but was only possible after the technician took a complete workday to sort through all the mess on the left. Nine hours of a technician’s time is expensive. To give you an idea, the average engine replacement for a car takes 18 hours.

You will want to label everything, as well as document the entire server rack so that you have a key in which to quickly get at certain hardware if the underlying performance starts to wane. Of course these things are always going to be handled by an IT technician, but ensuring that you have all the materials beforehand can make these processes easier for everyone. One suggestion is to leave a label printer in with your hardware. That way servers and networking equipment can be properly labeled with their names and the corresponding IP addresses.

Installing hardware for your small business can give you control over how you manage your own IT and allow you to make security a priority, but it can also be filled with hassles. If you would like more information about how to plan and manage a server room, contact Central Technology Solutions today at 1-844-237-4300.

Tip of the Week: Optimize Your Chrome Browser
How to Prioritize Your Upcoming Technology Impleme...
 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Thursday, June 20 2019

Captcha Image

Join our mailing list!

  • Company Name *
  • First Name *
  • Last Name *

      Mobile? Grab this Article!

      QR-Code dieser Seite

      Tag Cloud

      Security Tip of the Week Technology Best Practices Cloud Business Computing Email Productivity Hosted Solutions Malware Privacy IT Services Network Security Hackers Internet Data Software Productivity Data Backup Outsourced IT Managed IT Services Business IT Support Innovation Microsoft Mobile Devices Ransomware Data Recovery Hardware Tech Term Computer Google Cloud Computing Small Business Efficiency IT Support Backup Managed Service Provider User Tips Internet of Things Business Continuity Collaboration Smartphone Android Upgrade Communication Business Management Remote Monitoring Smartphones Paperless Office Disaster Recovery Windows 10 Data Management Phishing Windows 10 Encryption Social Media VoIP Server Windows Workplace Tips Browser Managed IT Managed IT Services Artificial Intelligence Cybersecurity communications Facebook Save Money Risk Management Mobile Device BYOD Passwords App Office 365 Mobile Device Management Holiday Saving Money Robot Compliance Apps Bring Your Own Device Gmail Managed Service BDR Business Technology Vendor Management Network Password Automation Recovery Analytics Virtualization Chrome Applications Government Firewall Bandwidth Wi-Fi Document Management Quick Tips Unified Threat Management Employer-Employee Relationship Money Infrastructure Content Filtering SaaS Data storage Telephone Systems Going Green Vulnerability Blockchain Information Wireless Microsoft Office File Sharing Big Data IT Management Help Desk Tip of the week Healthcare Scam Hosted Solution Website Project Management Antivirus Miscellaneous Customer Relationship Management Computing Data loss Data Security Regulations Training Office IT Service Printing Computers Storage Tablet Remote Computing Users Unified Communications Files Settings Downtime Customer Service Apple Two-factor Authentication Politics Router Social Work/Life Balance VPN Virtual Reality Patch Management Websites Identity Theft Wireless Technology Legal Networking Twitter Net Neutrality IT solutions Licensing Remote Workers Virtual Private Network End of Support Health Network Management Internet Exlporer HIPAA Budget Assessment Sports IoT Access Control Cooperation Information Technology How To Monitors Server Management Electronic Medical Records Gadgets Machine Learning Mobility Operating System Alert Mobile Security Uninterrupted Power Supply Mouse Employees Consultation Outlook Company Culture Google Drive RMM How To Samsung Word Spam YouTube Business Growth Redundancy Chromebook WiFi Flexibility Avoiding Downtime Private Cloud Proactive Software as a Service Tech Support The Internet of Things Mobile Computing Hacker Administration Maintenance Management Education Smart Technology Digital Payment Remote Monitoring and Management Upgrades LiFi Current Events Cost Management E-Commerce WannaCry Computer Repair Teamwork Virtual Desktop Technology Tips Chatbots Wires Human Error Time Management Cybercrime Physical Security Database Multi-Factor Security Wearable Technology Telephony Alt Codes Vulnerabilities Authentication Retail Cortana Database Management Microsoft Excel Modem Sync Connectivity Hacking Printer Alerts Law Enforcement Enterprise Resource Planning Bookmarks Display Options Distributed Denial of Service Annual Convention Public Cloud Cryptocurrency WPA3 Financial Servers Data Breach 3D Printing Notes Hard Drive Features Shared resources Comparison Identity Botnet Permission Processors Travel Disaster Trending Office Tips Voice over Internet Protocol Google Calendar Typing Geography Authorization Cookies Mobile Device Managment Software Tips Hacks PowerPoint Gadget Best Practice Mobile Favorites Mail Merge Update Marketing 5G Managed IT Service San Diego Automobile Computer Care Bitcoin Fleet Tracking Procurement Technology Laws Unsupported Software Virus Cache Electronic Health Records VoIP Sponsor OneDrive Specifications Test Touchscreen Techology Buisness Windows 7 Legislation IT Technicians GPS High-Speed Internet Lenovo Social Engineering USB Permissions Nanotechnology Star Wars Monitoring Professional Services SharePoint Staff Conferencing Address Wireless Internet Break Fix Social Networking Windows 8 Save Time Asset Tracking Statistics Mobile Data Crowdsourcing Meetings Recycling Cyberattacks Digital Obstacle Manufacturing Black Friday Roanoke — Central Technology Solutions Supercomputer Identities MSP Disaster Resistance Security Cameras Unified Threat Management Hotspot Utility Computing Consulting Search Dark Data Personal Information Transportation Mirgation Tracking Development Zero-Day Threat Superfish Safety Fraud Screen Reader G Suite History Virtual Assistant Downloads Augmented Reality Taxes Google Wallet Managing Stress Instant Messaging Employer/Employee Relationships Dark Web Motherboard Google Maps OneNote Bluetooth eWaste Read Only Spyware Course Hard Disk Drives Cyber Monday technology services provider IT Budget Hard Drives Google Docs Tech Terms Proactive IT Notifications Remote Worker User Error Language Humor Managed Services Provider Shortcut Migration Cables Backup and Disaster Recovery Black Market Smart Tech Cabling Wasting Time Operations Drones Enterprise Content Management Finance Firefox Writing Emoji Proactive Maintenance Data Warehousing Backups Employee-Employer Relationship Computing Infrastructure Point of Sale Deep Learning Network Congestion Solid State Drives Technology Assurance Group ’s 18 Solid State Drive Theft Heating/Cooling IT Consulting ROI Emergency Web Server CrashOverride GDPR Cameras Regulation Motion Sickness CCTV Administrator Relocation Webcam Hard Disk Drive Students IT Consultant Printers Error