Diagram decorative image

Schlattman to Discuss Requirements of UL 3223

Mass adoption of cloud computing has created the risk of hampering companies and individuals during a cloud data center, infrastructure or network failure.

Paul Schlattman of ESD and Robert James of UL will identify key components geared toward improving reliability and safety of data centers in their presentation “The New UL Data Center Certification and Standard 3223” at the Critical Facilities Summit in Minneapolis on Tuesday, Oct. 24. They will analyze key components of critical infrastructure in the data center and discuss requirements of UL Standard 3223, among other topics.

Related News

Interested in learning more? Check out these related news items.

Shaping Future Healthcare Facilities

ESD Studio Leaders Craig Kos (Healthcare) and Erik Nelson (Technology) will be joining a panel of industry experts at an upcoming Chicago event sponsored by The Association of Medical Facility Professionals (AMFP). It is part of AMFP’s mission “To be the hub where healthcare-built environment leaders share ideas, gain knowledge, solve challenges, connect with peers, and shape the future of the industry.” (Learn more about the AMFP event.)

Karnatz Joins Conference to Talk Building Operations Technology

Getting the most out of buildings—cost, speed to market, sustainability, user experience, wellness, and more—is the focus of “The Buildings Conference 2023” sponsored by BuiltWorlds. ESD President Kurt Karnatz joins a panel of professional peers as part of the two-day event starting May 18 in Chicago. (Learn more about BuiltWorlds conference.)

Is Your Smart Building an Easy Target for Hackers?

The latest building system technologies being adopted bring many benefits in terms of operational efficiencies, reduced environmental impact, and enhanced occupant experience. But these systems also introduce new vulnerabilities and present a much more tempting target for malicious actors seeking to launch cyberattacks. So do the benefits outweigh the risks, and how should potential vulnerabilities be addressed? (Learn more about cybersecurity.)