Forgot your password?
typodupeerror

Data Centers in Strange Places 187

Posted by ScuttleMonkey
from the where-is-my-underwater-data-center dept.
johannacw writes "Would you house a data center in a diamond mine or an old chapel? These organizations did, with great success; many of these facilities offer the latest in cooling and energy technology, among other advances. 'If you want an even more hardened environment for your data, you might look at the aptly named InfoBunker in Boone, Iowa, about an hour outside Des Moines. [...] The 65,000-square-foot, five-story site is dug deep into the ground. No one gets in without passing though the 4.5-ton steel door and then a three-step process. A scanner uses radio frequency to read the would-be entrant's skin as a biometric identifier. He then needs to use a keycard and enter a code on the keypad. This three-tier security is standard for high-level military installations, McGinnis explains.'"
This discussion has been archived. No new comments can be posted.

Data Centers in Strange Places

Comments Filter:
  • by Skewray (896393) on Wednesday October 10, 2007 @05:14PM (#20933269) Homepage
    Why would I want to physically access my botnet?
  • hmmm (Score:4, Funny)

    by User 956 (568564) on Wednesday October 10, 2007 @05:17PM (#20933309) Homepage
    Would you house a data center in a diamond mine or an old chapel?

    Only if I had enough bunk space for my horde of minions, but yes, probably.
    • by Sentri (910293) on Wednesday October 10, 2007 @08:56PM (#20935245) Homepage
      For the trifling sum of 1.5 million dollars you too can be lairing it up in style...

      "The Missile Base consists of 57 acres of real estate. The center secured portion of the property is protected by the original barbed-wire-topped chainlink fence. There is a paved road leading into the property with dual entry gates.

      Above ground is the original 40 X 100 shop building, two concrete targeting structures, two manufactured homes, two 8 X 8 X 40 storage containers, and the silo tops of the three missile silos, two antenna silos, one entry portal and a few other misc structures.

      Below ground is a huge complex consisting of 16 buildings and thousands of feet of connecting tunnels. The major underground structures are:

      Three - 160' Tall Missile Silos
      Three - 4 story Equipment Terminal Buildings
      Three - Fuel Terminal Buildings
      Two - 6 story Antenna Silos
      One Air Intake/Filtration Building
      One 100' diameter Control Dome Building
      One 125' diameter Power Dome Building
      One - 6 story Entry Portal Building
      and a few other misc buildings and areas."
      - http://www.themissilebase.com/ [themissilebase.com]

      http://cgi.ebay.com/Titan-Missile-Base-Central-Washington_W0QQcmdZViewItemQQcategoryZ1607QQihZ009QQitemZ190132455924QQrdZ1 [ebay.com]

      http://www.penny-arcade.com/comic/2007/10/10 [penny-arcade.com]

      If only I had the money and the crazy and the US citizenship necessary :-p
  • by ender81b (520454) <billdNO@SPAMinebraska.com> on Wednesday October 10, 2007 @05:18PM (#20933321) Homepage Journal
    I mean, honestly, is it just me or are all these "exotic" data centers just a way to boost your CIOs ego at gatherings? Is it really necessary to have military security? Do your competitors care that much? Furthermore, would they be willing to risk criminal charges to try and steal a few thousand hard drives full of potentially useless data?

    Basements with backup power, secured doors, & a good fire system in my opinion. Then again, I'm not a CIO. Once I become one though, well, I imagine MY data center will have a golf course. And blackjack. And possibly hookers.
    • Once I become one though, well, I imagine MY data center will have a golf course. And blackjack. And possibly hookers.

      And don't forget the full stock of Olde Fortran malt liquor.
      • by billstewart (78916) on Wednesday October 10, 2007 @07:38PM (#20934641) Journal
        A friend of mine bought an old missile bunker in the UK to use as a data center back during the late-90s boom. It had redundant power-grid connections, lots of cooling, and raised floors, so it cost a lot less to condition the space for data-center use than if he'd started with a basic warehouse shell like many of his competitors, and it was close enough to London for latency not to be a problem but far enough that the real-estate costs were cheaper.


        U.S. geography isn't always that cooperative - most of the missile bunkers were out in not-even-flyover parts of the country like North Dakota and eastern Montana, where there was almost no telecom infrastructure nearby and it was tens of milliseconds away from SF, NYC, or even Chicago.

        And Canada has their own problems - even though most of the people live within 50 miles of the US border, the Canadian government has been doing things like offering tax incentives to put call centers in remote areas to deal with unemployment - former fishing ports in Prince Edward Island, etc. - where there's not enough local telecom infrastructure to get high bandwidth connections or diverse routes. Too bad, since they've got a pool of educated people who speak good English and something that passes for French and could use the jobs.

      • by wlad (1171323) on Thursday October 11, 2007 @12:30AM (#20936483)
        I will build mine on the bottom of the sea, a data center where the artist would not fear the censor, where the scientist would not be bound by petty morality, and the great will be unconstrained by the small!
        • Re: (Score:3, Funny)

          by Cheesey (70139)
          But will it be secure against our evil RIAA overlords? I hear their army of sharks is even more dangerous than their army of lawyers, thanks to the recent addition of fricking laser beams.

          "Ah, Mr Wlad. I offer you a simple choice. Either die in my shark tank, or pay me... one trillion dollars per MP3 on your hard drive. Muhahahahaha..." Etc., etc.
    • by Fulcrum of Evil (560260) on Wednesday October 10, 2007 @05:21PM (#20933361)
      In fact, forget the datacenter!
    • by Mahjub Sa'aden (1100387) <msaaden@gmail.com> on Wednesday October 10, 2007 @05:26PM (#20933417)
      If I were a CIO, I'd turn the moon into a gigantic data centre.

      Cold? Check. Solar-power ready? Check. Visible from earth so that everyone can see my giant penis^H^H^H^H^H data-centre? CHECK.
    • by lelitsch (31136) on Wednesday October 10, 2007 @05:43PM (#20933605)
      Make that 3rd floor with backup power. Flooding [theregister.co.uk] can be a real bitch in a data center.
      • by Ours (596171)
        Flooding is no problem if you have a double-wall, pumps and redundant tubing downstream. Top floor datacenters are no longuer very desirable after certain planes crashed in certain towers. Plus it makes it easier to break into.
    • I mean, honestly, is it just me or are all these "exotic" data centers just a way to boost your CIOs ego at gatherings?

      You say that like it's a bad thing. Really, is making the CIO feel cool all that much worse than whatever the datacenter is doing anyway? It's probably calculating stock prices, keeping track of financial information, caching web pages, or whatever. It's all just the mental masturbation of modern society anyway. Might as well feel cool doing it, then some concrete good will come of it.

      • It is a bad thing (Score:5, Insightful)

        by Moraelin (679338) on Wednesday October 10, 2007 @06:50PM (#20934285) Journal
        Pseudo-security is a bad thing, because it gets people to let their guard down. When they think that some magical talisman they bought (or in this case a bunker) makes the server super-extra-uber-secure, then the next thing that happens is that they cut the funding for real security.

        Think of the dot-com era, really. How many times have you heard companies going "we're secure because we use 128 bit HTTPS! See that padlock icon? It means we're secure!" and then they forgot to check rights in their web site and/or just leave internal files around in the web server's directories or on some public FTP directory? Or leave their web server, some active ftp daemon, and God knows what else run with the default admin password? I can think of a couple which cheerfully left text files with user data and credit card numbers available for everyone. But, hey, they have 128 bit HTTPS, so they're secure.

        Or I know of at least one corporation which bought all sorts of expensive appliances to scan all JMS messages and SQL statements for malicious stuff... but then noone actually configured rules for those. They used them effectively as some magical talisman that makes them secure just by being there, no extra work required. And some of them were bogus talismans anyway, pure snake oil that couldn't even have done the job right.

        _That_ is the problem. When someone is as disconnected from reality as to think that security means preventing teams of ninjas from physically breaking in, something tells me that they probably didn't have thought much about actual security. And will think even less about it in the future.
        • It isn't the CIO's job to worry about security, though, he's got IT people for that. He's got other people's money to burn, and he doesn't want ninjas attacking his datacenter. I don't really see a problem with blowing a bit of the money on cool shit. It's not like a few extra thousand dollars would make all the stockholders trillionaires.
        • Speaking as someone who actually works with system that transfers hundreds of billions in assets and securities on an annual basis (yeah, hundreds of billions, that'll keep you awake at night from time to time), physical security is a very real, very important consideration. There is nothing pseudo about it. In fact, after 9/11, federal law requires companies like ours to have certain levels of physical security which are surprisingly stringent (on top of redundancy at widely separated physical locations an
          • by Moraelin (679338)
            Let's put it like this: the very same institutions "where a disruption will affect global markets and everything that follows" have, about a dozen times in the last year alone, copied sensitive data on some sales-guy's laptop and it got lost. Some of the very same institutions had got pwned and had zombies. Some of the very same institutions have offshored that kind of data to places where it's entirely out of their control, just because it was a couple of dollars cheaper. (And I don't mean just to India, b
            • You've got the scale all wrong. A relatively small breach of data (account data on a laptop or whatever) is a far cry from bringing down a major piece of the global financial market infrastructure (and yes, we really do process enough activity to warrant that description).

              My company lost two of our four major data centers in the 9/11 attack on the WTC. Completely independent of the many other effects of 9/11, the loss of those data centers and the related downtime and confusion and disruption of service had
    • Re: (Score:3, Interesting)

      by Stripe7 (571267)
      Data centers can be in strange locations, before the advent of data centers companies just put their computers anywhere. Two strange locations I know, a closet in the womens bathroom at a company and a closet in the another companies machine shop. One had access issues, the other had massive metal dust issues. One large company for some strange reason put all their printers in their computer room, talk about paper dust issues. One other one I remember was under the companies staircase.
    • by Blakey Rat (99501) on Wednesday October 10, 2007 @06:31PM (#20934113)
      Hey baby...

      I got a 65,000-square-foot, five-story data center with a 4.5-ton steel door... IN MY PANTS!
    • Basically, yes (Score:5, Insightful)

      by Moraelin (679338) on Wednesday October 10, 2007 @06:37PM (#20934167) Journal
      Basically, yes, they're there to boost some manager's ego. I haven't even heard of a recent data loss or theft that involved a team of ninjas breaking in and stealing hard drives. The ones I did hear about, offhand, involved stuff like:

      - pissed off admin exports the customer database and sells it to a spammer

      - a hired rent-a-coder working at home is given an export of the fucking productive database, just so he can work out the report formatting. So he asks for help in a forum and attaches a zip file of said productive database. Just so, you know, others can try their hand at formatting that data too. (And if you think that's a one-off thing, at a recent consulting job I've seen exactly that happen, with the dumbass PHB's blessing. They exported the productive database, installed it on a test machine, then let the external contractor -- not me, but the guy whose neverending mess I was supposed to help fix -- copy it all on his private laptop too. And since he was not supposed to connect an external laptop to the internal network, the PHB cheerfully supplied an USB stick to transfer the data with. Made me cringe. But, hey, he was cheaper than doing it in-house.)

      - productive data, complete with customer names and personal data, is copied on some salesman's laptop, because god forbid that you inconvenience the sales guys in the least bit, even by making them log in to a web site. Plus, I'm sure he thinks he's a wizard with Excel and God knows what ad-hoc graphs and reports he might need to generate on the spot from that data. Then said laptop is forgotten on the airport or stolen. (I can remember a dozen or so instances of this in the news without even googling.)

      - social engineering and/or lax security standards (As an extreme case, I've actually worked for a dot-com back in the day, who told their 1st level support to give anyone an admin account who calls in and asks for one. It's easier than just creating one for the regional managers -- although I'd debate whether those need one in the first place. Nah, just tell them to phone in and ask for one. Eventually after a year they realized that they have a few thousand admin accounts and nobody knows who those people are.)

      - pwned machines on the internal network that haven't been patched since Jurassic. I remember one touching story about IIRC Slammer, where a company got hit hard because they were running with completely unpatched workstations, since apparently installing any service pack broke one of the internal applications they were using. And, of course, they'd rather save money than fix the stupid application.

      - pwned machines on the internal network because some dumbass PHB or marketter figured out (or bribed an engineer for the knowledge) how to open a tunnel from inside to his home machine and leave it on, so he can access the company network from home. So when his unprotected, crapware-ladden home machine got pwned, it was connected to the intranet.

      - pwned machines on the internal network because just about anyone is allowed to plug their laptop in

      The last three are especially nice if everything is one big network zone.

      - pwned machines because some dumbass programmer would rather argue that SQL-injection and cross-site-scripting are just hype, instead of fixing his freakin' application. I'm still suprised at the number of people who don't even know how to quote a string for use in a web page or in the database. Or better yet, to use prepared statements and/or some template/framework that handles that kind of thing for you. And, yes, I remember at least one article linked even on Slashdot where the idiot was arguing that cross-site-scripting vulnerabilities are inevitable and harmless.

      - pwnage via any of the above methods (including social engineering or dishonest employees) because noone bothered setting productive database passwords more creative than the same as the app name, and/or using more than one account for a whole department. Or indeed for the whole company. It's too much work
      • by Patrik_AKA_RedX (624423) <patrik@vanostaeyen.gmail@com> on Thursday October 11, 2007 @12:52AM (#20936593) Journal

        I haven't even heard of a recent data loss or theft that involved a team of ninjas breaking in and stealing hard drives.
        Ofcourse you haven't heard of it. They're ninjas. They sneak in, replace your HD by a death one and leave without you knowing it. How else would you explain HD crashes? So next time you hear the sound of a death harddrive, you'll know there is a ninja nearby...
      • You forgot about outsourcing with insufficient control on the handling of data. You may work at a bank, for an example (but it could be medical data for a hospital or insurance company) but the person on minimum wage cleaning data who works for another company doesn't give a fig for the data.
      • by 3waygeek (58990)

        I haven't even heard of a recent data loss or theft that involved a team of ninjas breaking in and stealing hard drives.

        That's because they're too busy mining gold in Mongolia [guardian.co.uk].
    • by blhack (921171) *
      Well, you know that saying that if full tilt nuclear war breaks out that the intertubes will still function? There is a reason for that...ARMED GUARDS to kill off the zombies and pr0n starved nerds of course!!

      IN all honesty though, a freaking suspended glass NOC? Does it really matter whether you can see the server racks or not? //my data center will have an armory, and slides that go everywhere. (yes, those kinds of slides)
      • A glass NOC makes you feel like you have extra eyes to protect against somebody being where they shouldn't, but slides are cool stuff manard.

        Here is a list of other stuff a _real_ datacenter should have:

        • Firemen's pole
        • Hidden doors and secret passageways (Revolving bookcase is a classic)
        • Disco ball
        • Panels of blinking leds with giant tape spools
        • by j-cloth (862412)
          Don't forget about the screechy modem sounds. Datacentres need screechy modem sounds. weeeeeeeeeeoooooooooweooweooweeooweeoo
  • Hmmmmm (Score:5, Funny)

    by oborseth (636455) on Wednesday October 10, 2007 @05:20PM (#20933351)
    "No one gets in without passing though the 4.5-ton steel door and then a three-step process." Sounds like a lot of women I know.
  • Where else are they going to contain the evil emanating from the server hosting goatse?
  • Patented by Google (Score:2, Interesting)

    by KillerCow (213458)
    From TFA:

    [caption] DeBeers' data center, in the Arctic Circle, in two retrofitted shipping containers.


    So, they are paying Google royalties [slashdot.org] for the technology which Google invented, right?
  • by thatshortkid (808634) on Wednesday October 10, 2007 @05:29PM (#20933459)
    What, like the back of a Volkswagen?
  • So (Score:3, Insightful)

    by Colin Smith (2679) on Wednesday October 10, 2007 @05:42PM (#20933589)
    You bribe the people who work in the place.
     
  • Best one I've seen (Score:5, Interesting)

    by Render_Man (181666) on Wednesday October 10, 2007 @05:44PM (#20933623) Homepage
    The best data center I've seen is an un-named co-lo company in Canada who has their operations on the top floor of a mall in what used to be movie theaters.

    The escalators go up to the floor and promptly end at a wall. A one way mirror hides an RFID reader which 'open sesame' style activates the wall to move and let you in.

    No signs, or outward indications as to it being there. Lotsa space, redundant everything and all hiding in plain sight. It was pretty cool.
    • by g0at (135364)
      Funky; which city is this in?

      -b

      • Can't say (signed NDA to get the tour) but it's smack in the middle of a major western Canadian city.
    • Interesting. Sounds competently done. Other folks try for the same outcome and can fall short.

      I've had occasional reasons to visit some of our "secret" government offices, usually multi-agency installations sort-of gathered under a DHS umbrella. The last one I went to had no sign outside, no sign on the door, no number on the door. How did I know I was standing at the right door? In this non-descript office building in a ho-hum industrial park, there were 50 cars parked outside with US government plate
      • That reminds me of a story (maybe apocryphal) about how some foreign country with which there had been recent tensions knew the US was about to attack because one night at the Pentagon they observed a ton of people working after hours and a steady stream of late night pizza deliveries.
        • The way I heard it, the "something's up because of all the pizza deliveries" story had something to do with activity at the White House during Watergate. I looked it up at Snopes and couldn't find anything.

          Anybody out there know the source of this story?
      • Yeah, the NSA used to do that as well. They have their own exit off of the Baltimore-Washington parkway. It used to be unmarked and heavily-fortified.

        Gee whiz, wonder what that is there.
  • Where-is-my-underwater-data-center?

    I would tell you, but then I would have to kill you.
  • and beat the dogs and cheat the cold electronic eyes
    and if you make it past the shotgun in the hall
    dial the combination open the priesthole...

    There's frikken sharks with laser beams!!!
  • by smackenzie (912024) on Wednesday October 10, 2007 @05:50PM (#20933679)
    For those who don't know... there are three essential methods of identifying someone:

    1. What you are. (Iris scan, biometric readings, fingerprints, etc.)
    2. What you have. (ID card, USB flash drive, random number security key, etc.)
    3. What you know. (Password, etc.)

    You are going to see a lot more systems use a "two out of three" approach. I actually thought, at one point, that this was going to be a requirement for Vista. I guess not.

    The system in TFA requires all three: what you are, what you know, what you have. While requiring three out of three might seem a little nuts, it will seem less nuts in a few years when everyone has to have at least two out of three in order to do basic things like log onto their computer.
    • Re: (Score:3, Funny)

      by weeboo0104 (644849)
      1) What is your name?
            "Cowboy Neil"
      2) What is your quest?
            "To fix the bricked file server"
      3) What is the Emacs key binding for going to the previous line and decreasing the indent?
            "What? I don't know tha.. AARRRRGGGHHHHH!"
    • by tompaulco (629533)
      In most of the three-tiered identification methods I've seen, #2 and #3 provided all the real security and #1 was only able to make any kind of decision if it had #2 and #3 to back it up.
      Also, #3 also tells the system who you are unless you have given your password to someone else. If you give it away voluntarily, you are an idiot. If you give it away at gunpoint, then likely they would have found a way to drag your biometrics along with them.
  • Is a datacenter/colocation, and its own nation, and an off-shore WW2 fort. It did burn last year, but is still around [sealandgov.org], and has been looking for investors...

    tm

    • by Fizzl (209397)
      And pirate bay was interested in buying the whole artificial island, but current owner wants something like one beeelliyon dollars.
  • one isn't enough (Score:3, Insightful)

    by wkk2 (808881) on Wednesday October 10, 2007 @06:02PM (#20933823)
    Disasters come in many forms. Having more than one center is probably more important than extreme security at one site.

    The sites should be separated by physical distance and political jurisdictions. Data lost isn't limited to physical problems. It can come in the form of a legal scavenger hunt. Both can put you out of business.
  • by Colin Smith (2679) on Wednesday October 10, 2007 @06:07PM (#20933889)
    You know. The ritual sacrifice of chickens & goats required to keep the Windows servers operating normally.

     
    • by Tmack (593755)

      You know. The ritual sacrifice of chickens & goats required to keep the Windows servers operating normally.

      Probably have to, to keep all the daemons happy....

      tm

  • missile silos (Score:2, Insightful)

    by NoBozo99 (836289)
    I wonder why someone hasn't thought of using a abandon missile silo as a data center.

    • Re: (Score:2, Informative)

      by Tatisimo (1061320)
      God forbid they use an abandon missile silo! Let them use an abandoned missile silo instead!

    • Re: (Score:2, Interesting)

      by dharmadove (1119645)
      I have done quite a bit of research on using them. I had the idea to use it for hot sites, data storage and other DR related. One of the main problems is environmental. Old Titan II silos are FULL of asbestos and other carcinogens (PCB's). There is a very large cost to cleanup, drain, and refurbish the infrastructure. Much more than the purchase price. I found one in eastern Washington near major fiber optic lines, power and transportation that was ideal (with LOTS of work and $$$). If I had a 10-20+ milli
    • The InfoBunker, the Iowa site mentioned in TFA, is one of a number of cold war missile and/or communications facilities being used as data centers. The PJM Interconnection, which runs the East Coast power grid, is setting up a data center in a Pennsylvania site [datacenterknowledge.com] once used for White House-to-Kremlin communications during the Cuban Missile Crisis. The Bunker [thebunker.net] in the UK is in a former Ministry of Defense command-and-control center. Ask.com is building a major data center in the Titan building in Moses Lake, Wash
  • by bbdd (733681)
    "Also on-site are a 16,000-gallon water supply for fire suppression"

    not sure i want that in my datacenter...
  • Above the ceiling (Score:3, Interesting)

    by maggard (5579) <michael@michaelmaggard.com> on Wednesday October 10, 2007 @06:48PM (#20934265) Homepage Journal

    File server, print server, dual tape loaders, UPS, all setting on shelves, mounted above the level a suspended ceiling, with a mirrored fail-over setup at the opposite side of the building, also above ceiling-level.

    It was a medical office and they were floor-space constrained so 'going up' seemed the logical solution (there was an absurd amount of space up there.) They'd had the electrician in to put outlets up there, the shelves were reinforced and had a lip added so nothing accidentally slid off (there was even a strap with a buckle to make sure nothing ever dropped down.) The hardest part was lifting the hardware up into place.

    It was a complete "you've got to be kidding!" scenario when I first saw it, but I had to admit for a crazy location it was a sweet setup and worked great for their needs.

    • Re: (Score:2, Informative)

      by Anonymous Coward

      Installing computer equipment above the ceiling would be a violation of building codes in many cases, especially if the above ceiling space is used for air return. The national electric code prohibits such installations by banning the use of flexible cords above the ceiling:

      400.8(5) Flexible cords shall not be used where concealed by walls, floors or ceilings or located above suspended ceilings.

      Generally, the only time receptacles can be installed above a ceiling is the provide the receptacle requir

  • Mind, or "Church of the Poisoned, Mined"

    Re-done by Boy George...
  • this remembers me... (Score:2, Interesting)

    by medea (38161) *
    ...of a company which built a datacenter in the late nineties into an old swiss army bunker in the swiss alps. they even made a promotional video with the traditional heidi topic.

    you can have a look at it here [hochu.li]. internet-hype at it's finest... :)

    the company (mount10) does not exist anymore but the datacenter still does and is beeing actively used by Swiss Fort Knox [swissfortknox.com]... :)
  • Why the door? (Score:4, Insightful)

    by The -e**(i*pi) (1150927) on Wednesday October 10, 2007 @08:19PM (#20934935)
    wouldn't it be safer to have the 3 step process BEFORE the heavy door? I mean whats the point of the door if just anyone can walk through it to get to the security checkpoint.
    • "wouldn't it be safer to have the 3 step process BEFORE the heavy door? I mean whats the point of the door if just anyone can walk through it to get to the security checkpoint."

      Possibly to trap http://en.wikipedia.org/wiki/Mantrap [wikipedia.org] the person inside so the police can be called to arrest them?

      strike
  • by Allnighterking (74212) on Wednesday October 10, 2007 @10:35PM (#20935889) Homepage
    And username Administrator password p455w0rd will most likely get you in without a hitch.
  • "225 watts of power" (Score:3, Interesting)

    by crucini (98210) on Thursday October 11, 2007 @01:23AM (#20936735)

    To make the best use of the power available, ADC is building what Cohen calls state-of-the-art HVAC systems that can cool in excess of 225 watts of power.

    Sounds like a denominator is missing. Likely candidates are:
    • Square foot and
    • Rack unit.

    Reporters puzzle me. I realize they're not EE's, but don't they have some tenuous linkage to reality? Does 225 watts for an entire data center sound right to a reporter?

    And watts of power are my favorite watts. As opposed to watts of mass, newsprint, or innumeracy.
  • No one gets in without passing though the 4.5-ton steel door and then a three-step process. A scanner uses radio frequency to read the would-be entrant's skin as a biometric identifier. He then needs to use a keycard and enter a code on the keypad. This three-tier security is standard for high-level military installations, McGinnis explains.

    There are problems with playing "military installation" when you're not a government. What do you do when someone shows up at your front door with apparent legal author

  • In Frankfurt am Main, Germany, there is a datacenter in the old bunker at the airport. With all the security and technical infrastructure available at an airport, and the prime connection to every other airport of the world this just makes sense. ;)
  • Yeah it might be cool to put a data center in an abandoned missile silo, salt mine, catacomb or crypt. But the practical site administrator should look for low real estate costs, reliable low-cost green electricity. Companies no longer have to put their IT centers where their employees are. If you put data centers in places such as Silicon Valley, Bangalore, Beijing where real estate and electricity demand are so high that you're paying 2-10x per square foot 2-10X per watt what you'd be paying elsewhere.
  • Makes me worry about balrogs. Khazad-dûm had that problem you know and dwarves are known for their data centers.
  • There are a lot of great places to put datacenters, not just for novelty reasons but because of the natural advantages of the site. Where I live there are lots of old brick mill buildings that would be easy to cool, and could be powered at least partially by water power. The problem is that they're all many miles from any kind of existing backbone link.
  • I was in Italy this summer and when I was in Portofino, they were getting ready to film a movie at Castello Brown. As I was touring the castle, I came across a little greenhouse outside and couldn't help but notice that they (the movie people, apparently) had set up a small data center inside it.

    I dunno, seems like an awfully strange place to be setting up a data center.

If the code and the comments disagree, then both are probably wrong. -- Norm Schryer

Working...