Rack Level High Density Liquid Cooling

Thumb original nvent wpcs h85178 wphybridcooling uken

Increased heat densities of IT Equipment (ITE) in high performance data centers continues to drive the need for more efficient and effective cooling technologies. Traditional air cooling is not a sustainable solution in these settings. While liquid cooling offers far greater efficiencies than air cooling, many liquid cooling options require large capital expenditures, are difficult to integrate with existing infrastructure, and present complications when upgrades or added capacity are needed. This paper presents a rack level Hybrid Liquid Cooling System (HLCS) that couples direct-contact liquid cooling with a rear door cooler air-to-water heat exchanger. The rack-level Hybrid Liquid Cooling System presents a unique entry point to achieving much higher efficiencies of liquid cooling as well as built-in components that provide flexibility and scalability for attaining additional efficiencies long term.

View whitepaper
Date: 28 October 2019, 16:13 pm   |   Provider: Schroff GmbH   |   Size: 1.15 MB   |   Language: English
This may interest you too:
Img b52  1

Bundled White Papers: Strategies to Manage Obsolescence in Aerospace and Defense Test

Test engineers spend as much as 50 percent of their time (or even more in some cases) actively dealing with obsolescence in their test program sets. Read about different solutions in the marketplace to help you overcome the challenges you face today. Also explore best practices in operations implementation, hardware acquisition, and software design to reduce the sustainment burden of handling obsolescence in test systems long before the equipment goes end of life. ...

To the download
Thumb original forrestertei cylanceprotectandcylanceoptics  1

The Total Economic Impact™ Of CylancePROTECT® And CylanceOPTICS™

Employee endpoints are the interfaces between employees and the corporate data and applications they need to do their jobs. Attackers understand this — and actively target employee endpoints as well as the server endpoints hosting corporate data. More than 50% of companies experience a significant data breach each year, and endpoints, as a critical conduit for valuable corporate data, are the top targets for attack. Endpoint security solutions provide a critical line of defense, protecting PCs, laptops, and servers from malicious threats. ...

To the download
Thumb original new edr capes sb d

AI-Driven Threat and Incident Prevention, Detection, and Response

Traditional cybersecurity approaches suffer from two glaring weaknesses. First, they rely on the digital signatures of known malware in order to identify threats. This approach leaves systems vulnerable to new and non-catalogued malware. Second, they are reactive in nature, ascribing to the “it’s not a matter of if, but when” mentality and often responding to the damage caused by zero-day threats only after they execute. Guarding against known threats is important but in the modern threat, landscape organizations must also address the over 350, ...

To the download
Thumb original ai platform of choice wp   1

Artificial Intelligence: The Platform of Choice

Artificial intelligence (AI) leads the charge in the current wave of digital transformation underway at many global companies. Organizations large and small are actively expanding their AI footprints as executives try to comprehend more fully what AI is and how they can use it to capitalize on business opportunities by gaining insight to the data they collect that enables them to engage with customers and hone a competitive edge. But, while AI may indeed be the frontier of enterprise technology, there remain many misconceptions about it. ...

To the download
Thumb original ai driven edr

AI-Driven EDR: The Current and Future Path for More Intelligent Detection and Response

The security professional’s job has become an endless game of cat-and-mouse, continually pursuing invisible attackers that can out-think, out-run, and outsmart most security systems. No matter how efficient and nimble the professional, the attackers are fast, too. And getting faster every day. As a result, endpoints remain vulnerable. ...

To the download