Feeds

Colt loads up factory-built data centres

Pre-fab... is fab

High performance access to file storage

Colt has claimed it can supply factory-built, 500m2 Modular Data Centre internal hall buildings for installation in warehouse-type sheds at a faster speed and lower cost than new-build data centres.

These are not shipping container datacentres, which are 40ft long and 8ft wide and only have a 320ft2 (29.7m2) floorspace. You could get 16 of those into one of these Colt turnkey halls.

Colt, a telecoms supplier, says each turnkey modular datacentre includes all necessary power and cooling elements, and is is constructed and tested using modern component-based production line techniques in a Colt-approved manufacturing facility before being shipped to site in pieces and assembled on the spot.

The site could be a customer one or a Colt managed data centre. Customers can scale up their data centre by adding more Colt modules, either alongside each other or double-stacked.

A module takes four months from purchase to commissioning on site, compared to nine months or so for a conventional build. We understand a conventional build could cost €13,000m2 and the Colt modules will be less than this.

Costing is based on kilowatts rather than the floorspace. A range of power and cooling options are available, with the minimum base configuration capable of 750kW power and 1500W/m2 power density for a 500m2 hall.

The company has formed a new division, Colt Data Centre Services (Colt DCS), to do this, managed by Akber Joffer. It's keen to tell us that it's not new to the data centre game, currently operating 19 data centres and managing over 21,000m2 of data centre space across Europe.

It is building out further space and power capacity at its existing Paris 2 site to house some new modular data halls.

Colt CEO Rakesh Bhasin said the new modular halls will substantially reduce "deployment times as well as helping [customers] to minimise the environmental and cost impacts associated with the consumption of power". These are not buildings in the traditional sense and do not carry a BREEAM rating. The modules have a design target PUE (Power Usage Efficiency) rating of 1.21.

Apparently there is a customer using one of Colt's new halls but the name hasn't been released. One advantage of the new halls is that they won't necessarily be as tightly-packed with kit as the containerised data centres. ®

High performance access to file storage

More from The Register

next story
Seagate brings out 6TB HDD, did not need NO STEENKIN' SHINGLES
Or helium filling either, according to reports
European Court of Justice rips up Data Retention Directive
Rules 'interfering' measure to be 'invalid'
Dropbox defends fantastically badly timed Condoleezza Rice appointment
'Nothing is going to change with Dr. Rice's appointment,' file sharer promises
Cisco reps flog Whiptail's Invicta arrays against EMC and Pure
Storage reseller report reveals who's selling what
Bored with trading oil and gold? Why not flog some CLOUD servers?
Chicago Mercantile Exchange plans cloud spot exchange
Just what could be inside Dropbox's new 'Home For Life'?
Biz apps, messaging, photos, email, more storage – sorry, did you think there would be cake?
IT bods: How long does it take YOU to train up on new tech?
I'll leave my arrays to do the hard work, if you don't mind
prev story

Whitepapers

Mainstay ROI - Does application security pay?
In this whitepaper learn how you and your enterprise might benefit from better software security.
Five 3D headsets to be won!
We were so impressed by the Durovis Dive headset we’ve asked the company to give some away to Reg readers.
3 Big data security analytics techniques
Applying these Big Data security analytics techniques can help you make your business safer by detecting attacks early, before significant damage is done.
The benefits of software based PBX
Why you should break free from your proprietary PBX and how to leverage your existing server hardware.
Mobile application security study
Download this report to see the alarming realities regarding the sheer number of applications vulnerable to attack, as well as the most common and easily addressable vulnerability errors.