SlideShare a Scribd company logo
1 of 23
Structuring Data Center Leases and Service Level Agreements
Trends in Data 
Center Leasing 
Aaron L. Pawlitz
INTRODUCTION
Some of the “Basics” 
 Become familiar with the language. 
 Become familiar with the business needs that drive 
the differences between leases of data centers (on 
the one hand) and leases of other real property, 
such as office or warehouse space (on the other 
hand). 
 Acknowledge the emerging, dynamic environment 
in which data center leasing is occurring.
What does a data center look like? 
 A data center could be located in a re-purposed 
warehouse building:
What does a data center look like? (Continued) 
 Or a former missile defense command center/silo:
What are Data Center Leases “All About”? 
 Among the most prominent unique features found in 
data centers are these (each of which will be discussed 
in greater detail throughout this presentation): 
· The importance of access to uninterrupted power; 
· The importance of the space’s climate (temperature and humidity); 
· The importance of the space’s data connectivity and data security; 
· The importance of access issues (physical security); and 
· The importance of the space’s physical integrity (think: natural 
disaster).
FIVE TRENDS RELATED TO DATA 
CENTERS 
(Source: Cisco Global Cloud Index: 
Forecast and Methodology, 2012-2017)
Growth of Global Data Center Relevance and Traffic 
 Since 2008, most Internet traffic has originated from or 
terminated at a data center. 
 The increasing use of cloud computing is changing the 
nature of data center traffic: Although increases in data 
traffic across the Internet are occurring as might be 
expected, there has been a sharp increase in traffic 
among different units with a data center due to cloud-based 
interaction. 
 Multiple factors are driving increased use of “the cloud”.
Continued Global Data Center Virtualization 
 Increases in server capacity and virtualization have resulted in a 
cloud architecture that allows one physical server to handle 
multiple times the workloads such servers handled in the past. 
 This approach results in multiple streams of data traffic within 
and between data centers. 
 As a further illustration of the impact of the cloud, Cisco 
estimates: 
• That the ratio of workloads to non-virtualized traditional servers will grow from 
1.7 in 2012 to 2.3 in 2017, while 
• The ratio of workloads to non-virtualized cloud servers will grow at a greater 
pace—from 6.5 in 2012 to 16.7 in 2017.
Growth in Demand for Data Storage and Access 
 Businesses are increasingly using solutions for data storage 
and access that are cloud-based. 
 Individuals have an increasing expectation to be able to 
store and access content.
The “Internet of Everything” 
 The quantity and complexity of communications among 
people, data, and machines are rapidly increasing. 
 Cisco estimates: 
• That machine-to-machine connections will grow from 2012 to 2022 at a rate 
that is twenty-two times faster than the increase in the global population 
over that period, and 
• That by 2022, there will be 84 trillion data transmissions per year from 
machines to other machines.
Increased Expectations Regarding Connectivity 
 Consumers of data storage and transmission services will 
continue to demand improvements, world-wide, in 
“connectivity”. 
 The metrics by which these improvements are measured 
include: 
• The ubiquity of broadband around the world; 
• Increases in available download speed; 
• Increases in available upload speed; and 
• Improvements in network latency.
Technology 
Issues Driving 
Lease Terms 
and Needs 
Aaron L. Pawlitz
Remember “the Basics”? 
 Prominent, Unique Data Center Features: 
· The importance of access to uninterrupted power; 
· The importance of the space’s climate (temperature and humidity); 
· The importance of the space’s data connectivity and data security; 
· The importance of access issues (physical security); and 
· The importance of the space’s physical integrity (think: natural disaster).
Types of Equipment in a Data Center:
Types of Equipment in a Data Center (Continued)
Power 
 Electricity powers servers. 
 Electricity powers redundancy equipment. 
 Other fuel further powers back-up generators. 
 The bottom line is that a lack of power means a server isn’t 
functioning, which means that applications aren’t running and 
data can’t be accessed, manipulated, or shared, and that 
communications can’t occur.
Climate 
 Servers function most optimally under controlled temperature 
and humidity circumstances. 
 Thus, electricity is not only critical for the reasons identified 
on the previous slide, but also because electricity powers the 
air conditioning units that create and maintain the proper 
climate.
Data Connectivity and Data Security 
 As the prior discussion about trends illustrated, a 
significant driver of growth in data center usage will be the 
world’s expectations regarding access, use and security of 
data. 
 A data center must have the physical connections that 
allow the flow of data in and out of the data center. 
 A data center must also have the proper hardware, 
software, and other safeguards necessary to protect the 
housed data.
Physical Access to a Data Center 
 Efforts to digitally protect data would be useless if 
the data center space could be easily accessed and 
physically disturbed by trouble-makers. 
 Data centers employ a host of safeguards designed 
to limit physical access to the data center space 
generally and to certain servers specifically.
Physical Integrity 
 Data center operators attempt to avoid building 
data centers in areas prone to flooding, 
earthquakes, and/or other natural disasters. 
 These matters are less commonly addressed in data 
center lease documents, but they are certainly 
important deal considerations for data center users. 
 The importance of continuous operation is 
illustrated by the rigorous terms of service level 
agreement provisions (which will be discussed later 
in this presentation).
ADDITIONAL COMMENTS / QUESTIONS

More Related Content

What's hot

Cloud DC Transforming
Cloud DC TransformingCloud DC Transforming
Cloud DC TransformingDuy Tan Geek
 
Comparative study of Data management for cloud computing deployment
Comparative study of Data management for cloud computing deploymentComparative study of Data management for cloud computing deployment
Comparative study of Data management for cloud computing deploymentAkanksha Chandel
 
Grid computing [2005]
Grid computing [2005]Grid computing [2005]
Grid computing [2005]Raul Soto
 
Inroduction to grid computing by gargi shankar verma
Inroduction to grid computing by gargi shankar vermaInroduction to grid computing by gargi shankar verma
Inroduction to grid computing by gargi shankar vermagargishankar1981
 
Challenges and advantages of grid computing
Challenges and advantages of grid computingChallenges and advantages of grid computing
Challenges and advantages of grid computingPooja Dixit
 
Grid computing by vaishali sahare [katkar]
Grid computing by vaishali sahare [katkar]Grid computing by vaishali sahare [katkar]
Grid computing by vaishali sahare [katkar]vaishalisahare123
 
Introduction to Grid Computing
Introduction to Grid ComputingIntroduction to Grid Computing
Introduction to Grid Computingabhijeetnawal
 
Application-Aware Big Data Deduplication in Cloud Environment
Application-Aware Big Data Deduplication in Cloud EnvironmentApplication-Aware Big Data Deduplication in Cloud Environment
Application-Aware Big Data Deduplication in Cloud EnvironmentSafayet Hossain
 
Grid Computing
Grid ComputingGrid Computing
Grid Computingabhiritva
 
Grid computing
Grid computingGrid computing
Grid computingWipro
 

What's hot (20)

Grid computing ppt
Grid computing pptGrid computing ppt
Grid computing ppt
 
Grid Computing
Grid ComputingGrid Computing
Grid Computing
 
Grid computing
Grid computingGrid computing
Grid computing
 
Cloud vs grid
Cloud vs gridCloud vs grid
Cloud vs grid
 
Cloud DC Transforming
Cloud DC TransformingCloud DC Transforming
Cloud DC Transforming
 
Comparative study of Data management for cloud computing deployment
Comparative study of Data management for cloud computing deploymentComparative study of Data management for cloud computing deployment
Comparative study of Data management for cloud computing deployment
 
Grid computing [2005]
Grid computing [2005]Grid computing [2005]
Grid computing [2005]
 
Grid Computing
Grid ComputingGrid Computing
Grid Computing
 
Inroduction to grid computing by gargi shankar verma
Inroduction to grid computing by gargi shankar vermaInroduction to grid computing by gargi shankar verma
Inroduction to grid computing by gargi shankar verma
 
Challenges and advantages of grid computing
Challenges and advantages of grid computingChallenges and advantages of grid computing
Challenges and advantages of grid computing
 
Grid Computing
Grid ComputingGrid Computing
Grid Computing
 
Grid computing by vaishali sahare [katkar]
Grid computing by vaishali sahare [katkar]Grid computing by vaishali sahare [katkar]
Grid computing by vaishali sahare [katkar]
 
Introduction to Grid Computing
Introduction to Grid ComputingIntroduction to Grid Computing
Introduction to Grid Computing
 
Application-Aware Big Data Deduplication in Cloud Environment
Application-Aware Big Data Deduplication in Cloud EnvironmentApplication-Aware Big Data Deduplication in Cloud Environment
Application-Aware Big Data Deduplication in Cloud Environment
 
Grid computing
Grid computingGrid computing
Grid computing
 
Grid computing
Grid computingGrid computing
Grid computing
 
Grid computing by ahlam ansari
Grid computing by  ahlam ansariGrid computing by  ahlam ansari
Grid computing by ahlam ansari
 
Grid Computing
Grid ComputingGrid Computing
Grid Computing
 
Grid computing
Grid computingGrid computing
Grid computing
 
Grid computing
Grid computingGrid computing
Grid computing
 

Viewers also liked

Chap 03 strategy
Chap 03 strategyChap 03 strategy
Chap 03 strategySmit Kumar
 
Bearcom extended warranty plan on commercial two way radios
Bearcom extended warranty plan on commercial two way radiosBearcom extended warranty plan on commercial two way radios
Bearcom extended warranty plan on commercial two way radiosjames Anderson
 
Advanced Testing Laboratory services presentation
Advanced Testing Laboratory services presentationAdvanced Testing Laboratory services presentation
Advanced Testing Laboratory services presentationmikea888
 
Wikipedia Views As A Proxy For Social Engagement
Wikipedia Views As A Proxy For Social EngagementWikipedia Views As A Proxy For Social Engagement
Wikipedia Views As A Proxy For Social EngagementDaniel Cuneo
 
What is a warranty? The complete guide for understanding warranties
What is a warranty? The complete guide for understanding warrantiesWhat is a warranty? The complete guide for understanding warranties
What is a warranty? The complete guide for understanding warrantiesUnioncy
 
Extended warranty industry in us
Extended warranty industry in usExtended warranty industry in us
Extended warranty industry in usAbhishek Yadav
 
ROI Analysis Teller Incentive Programs
ROI Analysis Teller Incentive ProgramsROI Analysis Teller Incentive Programs
ROI Analysis Teller Incentive ProgramsChad Davis
 
The Role of Reporting in Governance
The Role of Reporting in GovernanceThe Role of Reporting in Governance
The Role of Reporting in GovernanceChristian Buckley
 
Self Funded Presentation
Self Funded PresentationSelf Funded Presentation
Self Funded PresentationBrett Webster
 
Show Me the Money: Incentive Comp for SaaS
Show Me the Money: Incentive Comp for SaaSShow Me the Money: Incentive Comp for SaaS
Show Me the Money: Incentive Comp for SaaSKeychain Logic
 
Accenture service value chain driving high performance in service and spare p...
Accenture service value chain driving high performance in service and spare p...Accenture service value chain driving high performance in service and spare p...
Accenture service value chain driving high performance in service and spare p...KitKate Puzzle
 
caveat emptor: what you need to know about online journals, open access, and ...
caveat emptor: what you need to know about online journals, open access, and ...caveat emptor: what you need to know about online journals, open access, and ...
caveat emptor: what you need to know about online journals, open access, and ...Brian Bot
 

Viewers also liked (14)

Chap 03 strategy
Chap 03 strategyChap 03 strategy
Chap 03 strategy
 
Bearcom extended warranty plan on commercial two way radios
Bearcom extended warranty plan on commercial two way radiosBearcom extended warranty plan on commercial two way radios
Bearcom extended warranty plan on commercial two way radios
 
Advanced Testing Laboratory services presentation
Advanced Testing Laboratory services presentationAdvanced Testing Laboratory services presentation
Advanced Testing Laboratory services presentation
 
Wikipedia Views As A Proxy For Social Engagement
Wikipedia Views As A Proxy For Social EngagementWikipedia Views As A Proxy For Social Engagement
Wikipedia Views As A Proxy For Social Engagement
 
Mazda Brakes
Mazda BrakesMazda Brakes
Mazda Brakes
 
OEM/ODM Service
OEM/ODM ServiceOEM/ODM Service
OEM/ODM Service
 
What is a warranty? The complete guide for understanding warranties
What is a warranty? The complete guide for understanding warrantiesWhat is a warranty? The complete guide for understanding warranties
What is a warranty? The complete guide for understanding warranties
 
Extended warranty industry in us
Extended warranty industry in usExtended warranty industry in us
Extended warranty industry in us
 
ROI Analysis Teller Incentive Programs
ROI Analysis Teller Incentive ProgramsROI Analysis Teller Incentive Programs
ROI Analysis Teller Incentive Programs
 
The Role of Reporting in Governance
The Role of Reporting in GovernanceThe Role of Reporting in Governance
The Role of Reporting in Governance
 
Self Funded Presentation
Self Funded PresentationSelf Funded Presentation
Self Funded Presentation
 
Show Me the Money: Incentive Comp for SaaS
Show Me the Money: Incentive Comp for SaaSShow Me the Money: Incentive Comp for SaaS
Show Me the Money: Incentive Comp for SaaS
 
Accenture service value chain driving high performance in service and spare p...
Accenture service value chain driving high performance in service and spare p...Accenture service value chain driving high performance in service and spare p...
Accenture service value chain driving high performance in service and spare p...
 
caveat emptor: what you need to know about online journals, open access, and ...
caveat emptor: what you need to know about online journals, open access, and ...caveat emptor: what you need to know about online journals, open access, and ...
caveat emptor: what you need to know about online journals, open access, and ...
 

Similar to Structuring Data Center Leases and Service Level Agreements

Oct 2011 JPT DataStorage
Oct 2011 JPT DataStorageOct 2011 JPT DataStorage
Oct 2011 JPT DataStorageJANERB
 
wp-security-dbsec-cloud-3225125
wp-security-dbsec-cloud-3225125wp-security-dbsec-cloud-3225125
wp-security-dbsec-cloud-3225125Gabor Bokor
 
Enhancement of the Cloud Data Storage Architectural Framework in Private Cloud
Enhancement of the Cloud Data Storage Architectural Framework in Private CloudEnhancement of the Cloud Data Storage Architectural Framework in Private Cloud
Enhancement of the Cloud Data Storage Architectural Framework in Private CloudINFOGAIN PUBLICATION
 
Privacy Issues In Cloud Computing
Privacy Issues In Cloud ComputingPrivacy Issues In Cloud Computing
Privacy Issues In Cloud Computingiosrjce
 
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...Zac Darcy
 
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Zac Darcy
 
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud StorageEnhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud StorageIRJET Journal
 
Above the Clouds: A Berkeley View of Cloud Computing: Paper Review
Above the Clouds: A Berkeley View of Cloud Computing:  Paper Review Above the Clouds: A Berkeley View of Cloud Computing:  Paper Review
Above the Clouds: A Berkeley View of Cloud Computing: Paper Review Mala Deep Upadhaya
 
HIGH LEVEL VIEW OF CLOUD SECURITY: ISSUES AND SOLUTIONS
HIGH LEVEL VIEW OF CLOUD SECURITY: ISSUES AND SOLUTIONSHIGH LEVEL VIEW OF CLOUD SECURITY: ISSUES AND SOLUTIONS
HIGH LEVEL VIEW OF CLOUD SECURITY: ISSUES AND SOLUTIONScscpconf
 
High level view of cloud security
High level view of cloud securityHigh level view of cloud security
High level view of cloud securitycsandit
 
The Growth Of Data Centers
The Growth Of Data CentersThe Growth Of Data Centers
The Growth Of Data CentersGina Buck
 
Cloud computing final format(1)
Cloud computing final format(1)Cloud computing final format(1)
Cloud computing final format(1)ahmed elmeghiny
 
Authenticated and unrestricted auditing of big data space on cloud through v...
Authenticated and unrestricted auditing of big data space on  cloud through v...Authenticated and unrestricted auditing of big data space on  cloud through v...
Authenticated and unrestricted auditing of big data space on cloud through v...IJMER
 

Similar to Structuring Data Center Leases and Service Level Agreements (20)

B1802041217
B1802041217B1802041217
B1802041217
 
Oct 2011 JPT DataStorage
Oct 2011 JPT DataStorageOct 2011 JPT DataStorage
Oct 2011 JPT DataStorage
 
wp-security-dbsec-cloud-3225125
wp-security-dbsec-cloud-3225125wp-security-dbsec-cloud-3225125
wp-security-dbsec-cloud-3225125
 
Enhancement of the Cloud Data Storage Architectural Framework in Private Cloud
Enhancement of the Cloud Data Storage Architectural Framework in Private CloudEnhancement of the Cloud Data Storage Architectural Framework in Private Cloud
Enhancement of the Cloud Data Storage Architectural Framework in Private Cloud
 
B017660813
B017660813B017660813
B017660813
 
Privacy Issues In Cloud Computing
Privacy Issues In Cloud ComputingPrivacy Issues In Cloud Computing
Privacy Issues In Cloud Computing
 
Disaster recovery toolkit final version
Disaster recovery toolkit final versionDisaster recovery toolkit final version
Disaster recovery toolkit final version
 
Containing Chaos
Containing ChaosContaining Chaos
Containing Chaos
 
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
SECURITY AND PRIVACY SOLUTIONS IN CLOUD COMPUTING AT OPENSTACK TO SUSTAIN USE...
 
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
Security and Privacy Solutions in Cloud Computing at Openstack to Sustain Use...
 
CC01.pptx
CC01.pptxCC01.pptx
CC01.pptx
 
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud StorageEnhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
Enhanced Integrity Preserving Homomorphic Scheme for Cloud Storage
 
Above the Clouds: A Berkeley View of Cloud Computing: Paper Review
Above the Clouds: A Berkeley View of Cloud Computing:  Paper Review Above the Clouds: A Berkeley View of Cloud Computing:  Paper Review
Above the Clouds: A Berkeley View of Cloud Computing: Paper Review
 
HIGH LEVEL VIEW OF CLOUD SECURITY: ISSUES AND SOLUTIONS
HIGH LEVEL VIEW OF CLOUD SECURITY: ISSUES AND SOLUTIONSHIGH LEVEL VIEW OF CLOUD SECURITY: ISSUES AND SOLUTIONS
HIGH LEVEL VIEW OF CLOUD SECURITY: ISSUES AND SOLUTIONS
 
High level view of cloud security
High level view of cloud securityHigh level view of cloud security
High level view of cloud security
 
The Growth Of Data Centers
The Growth Of Data CentersThe Growth Of Data Centers
The Growth Of Data Centers
 
B042306013
B042306013B042306013
B042306013
 
Cloud computing final format(1)
Cloud computing final format(1)Cloud computing final format(1)
Cloud computing final format(1)
 
V04405122126
V04405122126V04405122126
V04405122126
 
Authenticated and unrestricted auditing of big data space on cloud through v...
Authenticated and unrestricted auditing of big data space on  cloud through v...Authenticated and unrestricted auditing of big data space on  cloud through v...
Authenticated and unrestricted auditing of big data space on cloud through v...
 

Recently uploaded

Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...Sangyun Lee
 
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategyJong Hyuk Choi
 
买(rice毕业证书)莱斯大学毕业证本科文凭证书原版质量
买(rice毕业证书)莱斯大学毕业证本科文凭证书原版质量买(rice毕业证书)莱斯大学毕业证本科文凭证书原版质量
买(rice毕业证书)莱斯大学毕业证本科文凭证书原版质量acyefsa
 
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理ss
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理Airst S
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentationKhushdeep Kaur
 
Understanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective BargainingUnderstanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective Bargainingbartzlawgroup1
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理e9733fc35af6
 
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理e9733fc35af6
 
一比一原版(UWA毕业证书)西澳大学毕业证如何办理
一比一原版(UWA毕业证书)西澳大学毕业证如何办理一比一原版(UWA毕业证书)西澳大学毕业证如何办理
一比一原版(UWA毕业证书)西澳大学毕业证如何办理bd2c5966a56d
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理bd2c5966a56d
 
judicial remedies against administrative actions.pptx
judicial remedies against administrative actions.pptxjudicial remedies against administrative actions.pptx
judicial remedies against administrative actions.pptxIshikaChauhan30
 
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理F La
 
Elective Course on Forensic Science in Law
Elective Course on Forensic Science  in LawElective Course on Forensic Science  in Law
Elective Course on Forensic Science in LawNilendra Kumar
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理bd2c5966a56d
 
一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理Airst S
 
5-6-24 David Kennedy Article Law 360.pdf
5-6-24 David Kennedy Article Law 360.pdf5-6-24 David Kennedy Article Law 360.pdf
5-6-24 David Kennedy Article Law 360.pdfTodd Spodek
 
Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?Abdul-Hakim Shabazz
 
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSCssSpamx
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxelysemiller87
 

Recently uploaded (20)

Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
Sangyun Lee, Duplicate Powers in the Criminal Referral Process and the Overla...
 
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation StrategySmarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
Smarp Snapshot 210 -- Google's Social Media Ad Fraud & Disinformation Strategy
 
买(rice毕业证书)莱斯大学毕业证本科文凭证书原版质量
买(rice毕业证书)莱斯大学毕业证本科文凭证书原版质量买(rice毕业证书)莱斯大学毕业证本科文凭证书原版质量
买(rice毕业证书)莱斯大学毕业证本科文凭证书原版质量
 
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
一比一原版(RMIT毕业证书)皇家墨尔本理工大学毕业证如何办理
 
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
一比一原版(ECU毕业证书)埃迪斯科文大学毕业证如何办理
 
Performance of contract-1 law presentation
Performance of contract-1 law presentationPerformance of contract-1 law presentation
Performance of contract-1 law presentation
 
Understanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective BargainingUnderstanding the Role of Labor Unions and Collective Bargaining
Understanding the Role of Labor Unions and Collective Bargaining
 
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
一比一原版(纽大毕业证书)美国纽约大学毕业证如何办理
 
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
一比一原版(Carleton毕业证书)加拿大卡尔顿大学毕业证如何办理
 
一比一原版(UWA毕业证书)西澳大学毕业证如何办理
一比一原版(UWA毕业证书)西澳大学毕业证如何办理一比一原版(UWA毕业证书)西澳大学毕业证如何办理
一比一原版(UWA毕业证书)西澳大学毕业证如何办理
 
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
一比一原版(Griffith毕业证书)格里菲斯大学毕业证如何办理
 
judicial remedies against administrative actions.pptx
judicial remedies against administrative actions.pptxjudicial remedies against administrative actions.pptx
judicial remedies against administrative actions.pptx
 
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
一比一原版(Monash毕业证书)澳洲莫纳什大学毕业证如何办理
 
Elective Course on Forensic Science in Law
Elective Course on Forensic Science  in LawElective Course on Forensic Science  in Law
Elective Course on Forensic Science in Law
 
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
一比一原版(QUT毕业证书)昆士兰科技大学毕业证如何办理
 
一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理一比一原版赫瑞瓦特大学毕业证如何办理
一比一原版赫瑞瓦特大学毕业证如何办理
 
5-6-24 David Kennedy Article Law 360.pdf
5-6-24 David Kennedy Article Law 360.pdf5-6-24 David Kennedy Article Law 360.pdf
5-6-24 David Kennedy Article Law 360.pdf
 
Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?Who is Spencer McDaniel? And Does He Actually Exist?
Who is Spencer McDaniel? And Does He Actually Exist?
 
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSSASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
ASMA JILANI EXPLAINED CASE PLD 1972 FOR CSS
 
Navigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptxNavigating Employment Law - Term Project.pptx
Navigating Employment Law - Term Project.pptx
 

Structuring Data Center Leases and Service Level Agreements

  • 1. Structuring Data Center Leases and Service Level Agreements
  • 2. Trends in Data Center Leasing Aaron L. Pawlitz
  • 4. Some of the “Basics”  Become familiar with the language.  Become familiar with the business needs that drive the differences between leases of data centers (on the one hand) and leases of other real property, such as office or warehouse space (on the other hand).  Acknowledge the emerging, dynamic environment in which data center leasing is occurring.
  • 5. What does a data center look like?  A data center could be located in a re-purposed warehouse building:
  • 6. What does a data center look like? (Continued)  Or a former missile defense command center/silo:
  • 7. What are Data Center Leases “All About”?  Among the most prominent unique features found in data centers are these (each of which will be discussed in greater detail throughout this presentation): · The importance of access to uninterrupted power; · The importance of the space’s climate (temperature and humidity); · The importance of the space’s data connectivity and data security; · The importance of access issues (physical security); and · The importance of the space’s physical integrity (think: natural disaster).
  • 8. FIVE TRENDS RELATED TO DATA CENTERS (Source: Cisco Global Cloud Index: Forecast and Methodology, 2012-2017)
  • 9. Growth of Global Data Center Relevance and Traffic  Since 2008, most Internet traffic has originated from or terminated at a data center.  The increasing use of cloud computing is changing the nature of data center traffic: Although increases in data traffic across the Internet are occurring as might be expected, there has been a sharp increase in traffic among different units with a data center due to cloud-based interaction.  Multiple factors are driving increased use of “the cloud”.
  • 10. Continued Global Data Center Virtualization  Increases in server capacity and virtualization have resulted in a cloud architecture that allows one physical server to handle multiple times the workloads such servers handled in the past.  This approach results in multiple streams of data traffic within and between data centers.  As a further illustration of the impact of the cloud, Cisco estimates: • That the ratio of workloads to non-virtualized traditional servers will grow from 1.7 in 2012 to 2.3 in 2017, while • The ratio of workloads to non-virtualized cloud servers will grow at a greater pace—from 6.5 in 2012 to 16.7 in 2017.
  • 11. Growth in Demand for Data Storage and Access  Businesses are increasingly using solutions for data storage and access that are cloud-based.  Individuals have an increasing expectation to be able to store and access content.
  • 12. The “Internet of Everything”  The quantity and complexity of communications among people, data, and machines are rapidly increasing.  Cisco estimates: • That machine-to-machine connections will grow from 2012 to 2022 at a rate that is twenty-two times faster than the increase in the global population over that period, and • That by 2022, there will be 84 trillion data transmissions per year from machines to other machines.
  • 13. Increased Expectations Regarding Connectivity  Consumers of data storage and transmission services will continue to demand improvements, world-wide, in “connectivity”.  The metrics by which these improvements are measured include: • The ubiquity of broadband around the world; • Increases in available download speed; • Increases in available upload speed; and • Improvements in network latency.
  • 14. Technology Issues Driving Lease Terms and Needs Aaron L. Pawlitz
  • 15. Remember “the Basics”?  Prominent, Unique Data Center Features: · The importance of access to uninterrupted power; · The importance of the space’s climate (temperature and humidity); · The importance of the space’s data connectivity and data security; · The importance of access issues (physical security); and · The importance of the space’s physical integrity (think: natural disaster).
  • 16. Types of Equipment in a Data Center:
  • 17. Types of Equipment in a Data Center (Continued)
  • 18. Power  Electricity powers servers.  Electricity powers redundancy equipment.  Other fuel further powers back-up generators.  The bottom line is that a lack of power means a server isn’t functioning, which means that applications aren’t running and data can’t be accessed, manipulated, or shared, and that communications can’t occur.
  • 19. Climate  Servers function most optimally under controlled temperature and humidity circumstances.  Thus, electricity is not only critical for the reasons identified on the previous slide, but also because electricity powers the air conditioning units that create and maintain the proper climate.
  • 20. Data Connectivity and Data Security  As the prior discussion about trends illustrated, a significant driver of growth in data center usage will be the world’s expectations regarding access, use and security of data.  A data center must have the physical connections that allow the flow of data in and out of the data center.  A data center must also have the proper hardware, software, and other safeguards necessary to protect the housed data.
  • 21. Physical Access to a Data Center  Efforts to digitally protect data would be useless if the data center space could be easily accessed and physically disturbed by trouble-makers.  Data centers employ a host of safeguards designed to limit physical access to the data center space generally and to certain servers specifically.
  • 22. Physical Integrity  Data center operators attempt to avoid building data centers in areas prone to flooding, earthquakes, and/or other natural disasters.  These matters are less commonly addressed in data center lease documents, but they are certainly important deal considerations for data center users.  The importance of continuous operation is illustrated by the rigorous terms of service level agreement provisions (which will be discussed later in this presentation).