Browse Definitions :
Definition

server refresh cycle

The server refresh cycle is the length of time that normally passes between installations of new servers and related hardware in a data center. Traditionally, refresh cycles have averaged around five years, but they have accelerated during the last decade. Some businesses now work on a three-year replacement cycle.

Replacing servers and other critical hardware allows organizations to deploy updated equipment intended to improve reliability, enable new and anticipated capabilities, and save money in the long term. When contemplating a server replacement, business managers can ask themselves the following questions.

  • Does the replacement hardware offer new features and functionality?
  • Does the replacement hardware offer better processor power, memory, I/O (input/output) speed, and bus speed?
  • Will the hardware replacement result in improved system distribution and cooling?
  • Will the new hardware save enough power to recoup the investment before the next replacement becomes due?
  • Would leasing or renting new hardware prove more economical than buying it?

Memory constitutes a particularly crucial feature of servers in virtual environments, because VMs (virtual machines) are essentially disk images that reside in server memory. More memory is vital for higher levels of consolidation, and the reliability of that memory will impact the overall reliability of all the VMs on that server. Future capabilities may include support for new chipsets that can handle additional memory types, faster I/O, and higher bus speeds.

This was last updated in March 2013

Continue Reading About server refresh cycle

SearchCompliance
  • smart contract

    A smart contract is a decentralized application that executes business logic in response to events.

  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

SearchSecurity
  • social engineering

    Social engineering is an attack vector that relies heavily on human interaction and often involves manipulating people into ...

  • distributed denial-of-service (DDoS) attack

    A distributed denial-of-service (DDoS) attack is one in which multiple compromised computer systems attack a target, such as a ...

  • password cracking

    Password cracking is the process of using an application program to identify an unknown or forgotten password to a computer or ...

SearchHealthIT
SearchDisasterRecovery
  • change control

    Change control is a systematic approach to managing all changes made to a product or system.

  • disaster recovery (DR)

    Disaster recovery (DR) is an organization's ability to respond to and recover from an event that affects business operations.

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

SearchStorage
  • storage security

    Storage security is the group of parameters and settings that make storage resources available to authorized users and trusted ...

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud data management

    Cloud data management is a way to manage data across cloud platforms, either with or instead of on-premises storage.

Close