Premium Content

Access "Data centre cases where PUE or power usage effectiveness doesn't work"

Published: 26 Nov 2012

Power Usage Effectiveness, or PUE, is the phrase du jour for measuring just how effective and energy efficient an organisation’s data centre is. But, PUE remains a pretty crude measurement in many data centre instances and data centre managers must look at effective PUE or ePUE. At its simplest level, PUE is a direct relationship between how much energy is used across the whole of a data centre divided by how much energy is used to power the IT equipment. The basic equation can be shown as such: PUE = Total energy             IT energy Therefore, energy used in powering cooling systems, uninterruptable power supplies (UPSes), lighting and so on causes the PUE to be a higher number. Theoretical perfection is a PUE of 1, where all power is put into the IT equipment, with none being put into the support environment. The majority of existing data centres are running at PUEs of around 2.4, with large, multi-tenanted systems running at around 1.8 or less. Many different approaches have been brought to the fore to enhance PUE. These include using free air cooling, ... Access >>>

Access TechTarget
Premium Content for Free.

By submitting you agree to receive email from TechTarget and its partners. If you reside outside of the United States, you consent to having your personal data transferred to and processed in the United States. Privacy

What's Inside

Features

More Premium Content Accessible For Free

  • The next frontier for managed print services
    The-next-frontier-for-managed-print-services-(1361197877_756).jpg
    E-Handbook

    The managed print services (MPS) market has matured since many organisations inked their first deal. Organisations moving beyond first generation ...

  • World-Class EA: The Agile Enterprise
    World-Class-EA---The-Agile-Enterprise-(1360587978_371).jpg
    E-Handbook

    The concept of “agile” has recently come to the fore, typically in connection with technical activities, such as software development. Subsequently, ...

  • Security Visualisation
    Security-visualisation-(1358519141_684).jpg
    E-Handbook

    This article is guideline of how to generate a visual representation of a given dataset and use in the evaluation of known security vulnerabilities. ...