Download the app:

Google Play - Download Bob Landstrom app  Apple Store - download Bob Landstrom app

+1 404.510.7980
TwitterLinkedinYouTubeGoogle+
Bob LandstromBob Landstrom
Bob Landstrom
Data Center Consulting Services
  • Data Centre Services
  • Data Center Knowledge Base
  • Blog
  • Discover Bob
    • Recognized Data Center Expert
    • Speaker, Author And Trainer
    • Explorer
    • Hockey Fanatic
    • Internationally Exhibited & Collected Artist
  • Let’s Connect
  • Art of Bob Landstrom
  • Blog
  • Bob Landstrom
  • Data Center Knowledge Base
  • Data Centre Services
    • Business Continuity And Disaster Recovery
    • Data Center Consulting
    • Data Center Power And Energy Management
    • Data Center Training and Content Creation
    • Information Systems Security
  • Discover Bob
    • Explorer
    • Hockey Fanatic
    • Internationally Exhibited & Collected Artist
    • Recognized Data Center Expert
    • Speaker, Author And Trainer
  • Let’s Connect
  • Not Found
  • Privacy Policy
  • Returns
  • Sample Page
  • Terms & Conditions

Author Archives: Bob Landstrom

CPTED

Data Center Risk Avoidance with CPTED

CPTED Crime Prevention Through Environmental Design ( CPTED ) creates an environment around the data center to deter nefarious activity. CPTED lowers the  likelihood to breach the perimeter of the data center, and increases the ability to detect breach attempts.   A good description of the history of CPTED applied to urban planning is found here.…

May 9, 2017Leave a commentData Center, Data Center Security, IS SecurityBy Bob Landstrom

CIA Triad

It starts with the CIA Triad

Following my assertion that a data center is at its core, a risk management device, we have to bring in the CIA. We’re not talking about the Central Intelligence Agency. Nor are we talking about the Culinary Institute of America. The CIA that we’re talking about is the information security CIA Triad. CIA is an…

May 6, 2017Leave a commentData Center Security, IS SecurityBy Bob Landstrom

Secret Key

Symmetric Cryptography

Ok, now what in the world is symmetric cryptography? ‘And I suppose that if there’s a “symmetric cryptography,” there must be an “asymmetric cryptography” as well, right? In the broadest of terms, we group cryptographic algorithms into two categories- symmetric and asymmetric. A sort of hybrid arrangement, using both at the same time is common…

February 9, 2017Leave a commentData Center Security, IS SecurityBy Bob Landstrom

Looking at data centers differently

OSDA: Open Standard for Datacenter Availability

The Green Grid has recently published its first white paper explaining the OSDA project. The white paper is available for TGG members here. OSDA is the brain child of my friend Lex Coors. It is intended to facilitate creativity and innovation in data center designs, especially when using alternative energy sources, reliable grids, and multi-site…

January 3, 2017Leave a commentData Center DesignBy Bob Landstrom

Dice as a random number generator

Random Number Generators

It all seems so random How good are you at predicting the outcome of rolling a die? ‘Probably not very good, and even with a single cubical die, any outcome has a one-in-six chance. While it’s frustrating to predict the outcome of simple dice rolls, we know that we can see a number repeat if…

December 13, 2016Leave a commentData Center Security, IS SecurityBy Bob Landstrom

What is Cryptography

Cryptography is the science of encrypting information The science of encrypting information is called cryptography. It is the method of storing and transmitting data in a form that only those for whom it is intended can read and process it. The desire to conceal information in communications is nearly as old as written language itself.…

December 4, 2016Leave a commentData Center, Data Center Security, IS SecurityBy Bob Landstrom

Hashing Algorithm tag cloud

The SHA Hashing Algorithms

In our review of cryptographic algorithms, we will add to our Message-Digest discussion with the SHA (pronounced “Shaw”) hashing algorithms.  Remember from our previous post that hashing functions are not technically encryption algorithms.  More correctly, they are a mathematical way of generating a “fingerprint” of some type of data element.  They are an essential part…

November 22, 2016Leave a commentData Center Security, IS SecurityBy Bob Landstrom

MD5 Fingerprint

The MD5 Hashing Algorithm

In our review of cryptographic algorithms, we will start with the Message-Digest, MD5 hashing algorithm. This isn’t because MD5 is “the best” or even “the first” (it’s certainly neither of those). In fact, it’s not technically an encryption algorithm at all. It is important though, as a precursor to other encryption algorithms we will talk…

November 6, 20161 CommentData Center Security, IS SecurityBy Bob Landstrom

Making a little time for Kruger’s

This week I’m on a five city in six days circuit through Austria, Germany, and the UK. It’s a crazy week of conference rooms, taxis, trains and planes. However, being in a fantastic cigar-bar city like Vienna, I decided to steal away a couple of hours to relax. If you’re not aware, Vienna is one…

October 17, 2016Leave a commentCigar LoungesBy Bob Landstrom

Energy Use Breakdown in Data Centers

DCEP Needed for Data Centers

What in the world is a DCEP, and why should I even care? The Data Center Energy Practitioner, or “DCEP, is an important certification for you to know about. This is especially true if you are involved with government data centers, or if you’re involved with reducing the cost of operations even if it’s not…

September 5, 20161 CommentData Center, Energy EfficiencyBy Bob Landstrom
12345…
67891011121314151617
18
Next page
2016 © Bob Landstrom. All Rights Reserved
  • Data Center Knowledge Base
  • Blog
  • Let’s Connect
  • Privacy Policy
  • Returns
  • Terms & Conditions
Footer Menu
  • Search Knowledgebase
  • Ask A Question?
 

Ask Bob a Question

You will get a notification email when Knowledgebase answerd/updated!

+ = Verify Human or Spambot ?