Solved

Data center Activities

Posted on 2011-02-22
2
775 Views
Last Modified: 2012-05-11
What are the three key data center management activities that are
interdependent?
A. Manageability, Integrity, Cost
B. Provisioning, Monitoring, Reporting
C. Installation, Configuration, Problem Solving
D. Scalability, Accessibility, Security

I think b since monitoring is simply RElATED TO REPORTING
0
Comment
Question by:kunalclk
[X]
Welcome to Experts Exchange

Add your voice to the tech community where 5M+ people just like you are talking about what matters.

  • Help others & share knowledge
  • Earn cash & points
  • Learn & ask questions
2 Comments
 
LVL 8

Accepted Solution

by:
sharkbot221984 earned 500 total points
ID: 34956671
I'm not sure what you're getting at, all possible combinations I think one could argue as being interdependent.

A: Depending on the dollar value you spend, you get a given about of integrity and manageability.  Being able to reliably manage your systems in your DC leads to greater integrity.

B: Provisioning new systems leads to adding monitoring and reporting services/devices/configuration.

C: Installation of new equipment leads to configuration of new equipment, at which point an unforeseen problem could arise.

D: Scalability can be related to your initial design of your DC and how accessible your DC is, if you've filled up your location and are limited to access additional space then scaling is difficult.  Access to additional space could be limited by security, perhaps you're inside a cage and you can't expand unless you expand the security perimeter of your cage.
0
 
LVL 2

Author Closing Comment

by:kunalclk
ID: 34957000
thnx
0

Featured Post

Free Tool: ZipGrep

ZipGrep is a utility that can list and search zip (.war, .ear, .jar, etc) archives for text patterns, without the need to extract the archive's contents.

One of a set of tools we're offering as a way to say thank you for being a part of the community.

Question has a verified solution.

If you are experiencing a similar issue, please ask a related question

Compliance and data security require steps be taken to prevent unauthorized users from copying data.  Here's one method to prevent data theft via USB drives (and writable optical media).
Let's recap what we learned from yesterday's Skyport Systems webinar.
This tutorial will show how to configure a single USB drive with a separate folder for each day of the week. This will allow each of the backups to be kept separate preventing the previous day’s backup from being overwritten. The USB drive must be s…
This video shows how to use Hyena, from SystemTools Software, to bulk import 100 user accounts from an external text file. View in 1080p for best video quality.
Suggested Courses

617 members asked questions and received personalized solutions in the past 7 days.

Join the community of 500,000 technology professionals and ask your questions.

Join & Ask a Question