Get an inside look at a secure data center

http://tr1.cbsistatic.com/hub/i/r/2013/12/17/7a591c0f-a43f-4c3b-b7c7-86bcc94de7ab/resize/620x485/colo_iStock_000023107420Small.jpg?hash=51be90bfb5fcb9702234dac80d0dcbd0

A friend of mine is a system administrator for an East Coast company with a secondary (DR) data center at a colocation in a western state. We chatted recently about some of the features of his secondary data center, which is dedicated to maintaining security and uptime for its clients. With his insights fresh in mind (and with his permission), I thought it might be interesting to outline the processes used by the hosting organization — which I’ll leave nameless for confidentiality purposes — by discussing what you might expect to encounter were you to visit it.

Read more: Get an inside look at a secure data center

Story added 18. December 2013, content source with full text you can find at link above.