Still celebrating National IT Professionals Day with 3 months of free Premium Membership. Use Code ITDAY17

x
?
Solved

Data center Activities

Posted on 2011-02-22
2
Medium Priority
?
778 Views
Last Modified: 2012-05-11
What are the three key data center management activities that are
interdependent?
A. Manageability, Integrity, Cost
B. Provisioning, Monitoring, Reporting
C. Installation, Configuration, Problem Solving
D. Scalability, Accessibility, Security

I think b since monitoring is simply RElATED TO REPORTING
0
Comment
Question by:kunalclk
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 8

Accepted Solution

by:
sharkbot221984 earned 2000 total points
ID: 34956671
I'm not sure what you're getting at, all possible combinations I think one could argue as being interdependent.

A: Depending on the dollar value you spend, you get a given about of integrity and manageability.  Being able to reliably manage your systems in your DC leads to greater integrity.

B: Provisioning new systems leads to adding monitoring and reporting services/devices/configuration.

C: Installation of new equipment leads to configuration of new equipment, at which point an unforeseen problem could arise.

D: Scalability can be related to your initial design of your DC and how accessible your DC is, if you've filled up your location and are limited to access additional space then scaling is difficult.  Access to additional space could be limited by security, perhaps you're inside a cage and you can't expand unless you expand the security perimeter of your cage.
0
 
LVL 2

Author Closing Comment

by:kunalclk
ID: 34957000
thnx
0

Featured Post

Important Lessons on Recovering from Petya

In their most recent webinar, Skyport Systems explores ways to isolate and protect critical databases to keep the core of your company safe from harm.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Group policies can be applied selectively to specific devices with the help of groups. Utilising this, it is possible to phase-in group policies, over a period of time, by randomly adding non-members user or computers at a set interval, to a group f…
In the absence of a fully-fledged GPO Management product like AGPM, the script in this article will provide you with a simple way to watch the domain (or a select OU) for GPOs changes and automatically take backups when policies are added, removed o…
There are cases when e.g. an IT administrator wants to have full access and view into selected mailboxes on Exchange server, directly from his own email account in Outlook or Outlook Web Access. This proves useful when for example administrator want…
Sometimes it takes a new vantage point, apart from our everyday security practices, to truly see our Active Directory (AD) vulnerabilities. We get used to implementing the same techniques and checking the same areas for a breach. This pattern can re…
Suggested Courses

660 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question