home
***
CD-ROM
|
disk
|
FTP
|
other
***
search
/
Network Support Library
/
RoseWare - Network Support Library.iso
/
pressgen
/
fire.arc
/
FIRE4.DIA
Wrap
Text File
|
1989-07-12
|
30KB
|
600 lines
type 6/5/all
6/5/1
07120879 DATABASE: CD FILE 275
GTE launches expansion of Testmark labs. (GTE Testmark Laboratories)
Abel, Glenn
CommunicationsWeek ISSUE: n221 PAGINATION: p36(1)
PUBLICATION DATE: Nov 7, 1988
GTE Testmark Laboratories is investing $500,000 in an expansion program to
increase its product testing capabilities in the switching, transmission
and computer fields. The company says that the program is being undertaken
to offer clients comprehensive services with the goal of enhancing the
laboratory's position as a key provider of independent testing for
telecommunications and computer equipment. Key new facilities will include
a burn room that will be able to test certain flammable materials and
determine how quickly fire spreads and seismic testing facilities that will
let the laboratory measure how well equipment can handle damage that
results from earthquakes.
COMPANY NAME(S): GTE Testmark Laboratories - growth
SIC CODE: 8734
TICKER SYMBOL: GTE
DESCRIPTORS: Facility Construction; Investment; Testing; Growth
6/5/2
07019537 DATABASE: CD FILE 275
EPA targets halon: data site dilemma. (Environmental Protection Agency)
Betts, Mitch
Computerworld VOL.: v22 ISSUE: n40 PAGINATION: p1(2)
PUBLICATION DATE: Oct 3, 1988
SPECIAL FEATURES: illustration; table
The EPA calls for a complete phaseout of halon, the chemical used in fire
suppression equipment at many data processing centers, due to its
detrimental effect on the earth's protective ozone layer. Some MIS managers
are switching to water, but many are reluctant because of the damage water
can inflict on computer equipment. Halon 1301, which leaves no residue and
is non toxic to humans, is one of the few chemicals insurance companies
will recommend and MIS managers are counting on chemical companies, such as
Du Pont, to come up with a safe alternative.
CAPTIONS: (Atmospheric alert: halon consumption in the US.)
SIC CODE: 3569; 9511
DESCRIPTORS: Fire Fighting; MIS; United States. Environmental Protection
Agency; halon; Halogen Extinguishers
6/5/3
06681565 DATABASE: CD FILE 275 *Use Format 9 for FULL TEXT*
Repairs underway in wake of fire at Illinois Bell hub: Chicago customers
seek alternative services. (Special Section: Connectivity)
Pompili, Tony
PC Week VOL.: v5 ISSUE: n20 PAGINATION: pC1(2)
PUBLICATION DATE: May 17, 1988
AVAILABILITY: FULL TEXT Online LINE COUNT: 00057
Damage caused by a fire that destroyed most call routing equipment, and
voice and data communications services at Illinois Bell Telephones Co's
Hinsdale hub office is slowly being repaired. Neither the cause of the fire
nor the total damage has been determined, and Illinois Bell officials still
do not know when full service will be restored. Western Chicago suburbs and
O'Hare International Airport lost telephone service. The loss of
data-communications lines disabled computer services at O'Hare, resulting
in a 20 percent delay in local flights.
COMPANY NAME(S): Illinois Bell Telephone Co. - maintenance and repair
SIC CODE: 6719; 3669; 4580
DESCRIPTORS: Bell Operating Companies; Disaster Recovery; Telephone
Systems
6/5/4
06659163 DATABASE: CD FILE 275
Planning averts disaster at L.A. bond trading firm. (First Interstate
Bancorp)
Martin, James A.; Daly, James
Computerworld VOL.: v22 ISSUE: n19 PAGINATION: p4(1)
PUBLICATION DATE: May 9, 1988
First Interstate Bancorp's effective disaster recovery plan helped to
reduce the computer damage resulting from last week's fire at its 62-story
downtown Los Angeles headquarters. Hardware that was destroyed included a
DEC VAX, Prime minicomputers, Data General minicomputers, and between 50
and 70 IBM and compatible PCs. The bond trading division did not lose much
data and its operations were interrupted only slightly because a disaster
recovery plan was enhanced following recent earthquake tremors. Traders
used backup copies of their programs at home following the disaster.
COMPANY NAME(S): First Interstate Bancorp. - fires
SIC CODE: 6000
TICKER SYMBOL: I
DESCRIPTORS: Fires; Disaster Planning; Disaster Recovery; Computers
6/5/5
06580771 DATABASE: CD FILE 275 *Use Format 9 for FULL TEXT*
Law says vendors are liable for defects. (column)
Bequai, August
Digital Review VOL.: v5 ISSUE: n8 PAGINATION: p87(1)
PUBLICATION DATE: April 18, 1988
ARTICLE TYPE: column
AVAILABILITY: FULL TEXT Online LINE COUNT: 00068
In the case of a computer-caused fire, if a computer purchase agreement
does not cover liability for defective hardware, and if it can not be
proved that the company leasing the computer or the computer manufacturer
were negligent, then the victims of a fire will probably turn to 'strict
product liability' law. This could spell big trouble for the manufacturer
of the computer and the company that sold it. The courts hold
manufacturers, and sometimes vendors, responsible for product defects that
cause damage, injury, or death.
DESCRIPTORS: Vendors; Liability; Legal Issues
6/5/6
06303518 DATABASE: CD FILE 275
Multi-user micros pose greater security threat. (Information Management)
Data Management VOL.: v25 ISSUE: n4 PAGINATION: p42(2)
PUBLICATION DATE: April, 1987
SPECIAL FEATURES: illustration; chart
The increased use by organizations of multiuser microcomputers requires
that they commit more of their vital data to the systems, but
microcomputers by their nature lack the high-level data security features
of minicomputers and mainframes. Choosing appropriate controls for computer
systems need not be a long and difficult process; steps that can be taken
to protect data from such threats as fire, water damage, earthquake,
atmospheric conditions, electrical power problems, and unauthorized access
are described. Questions to ask that clarify security procedures are listed
and discussed.
CAPTIONS: An example of a user's security record.
DESCRIPTORS: Data Security; Multiuser Microcomputers; Information
Management; User Needs; Management of EDP; Access Controls
6/5/7
06286685 DATABASE: CD FILE 275
U.S. agency fire harms machines, not data. (National Rural Electric
Cooperative Association)
Betts, Mitch
Computerworld VOL.: v22 ISSUE: n2 PAGINATION: p2(1)
PUBLICATION DATE: Jan 11, 1988
Approximately 30 terminals at the National Rural Electric Cooperative
Association (NRECA) were destroyed by a fire on Dec 21, 1987. Damage is
estimated at $3.3 million. The I-O Magnetics Inc company was hired to clean
up the computer room housing an IBM 4361, Honeywell DPS 8, a Wang
Laboratories word processing system, 100 terminals and microcomputers, and
4,000 reels of tape. The IBM 4361 is in questionable condition and may have
to be replaced.
DESCRIPTORS: Government Agency; Disaster Recovery; Operations Services
6/5/8
06131040 DATABASE: CD FILE 275
United data scrambled in O'Hare terminal fire.
Bozman, Jean S.
Computerworld VOL.: v21 ISSUE: n50 PAGINATION: p2(1)
PUBLICATION DATE: Dec 14, 1987
United Airlines was forced to cancel 175 flights and strand roughly 10,000
passengers because of a fire below the concourse at its O'Hare
International Airport terminal. Data and voice lines were damaged by the
fire. The fire occurred on the night of Dec 3 and damage was made greater
the next day when repair personnel inadvertently cut live transmission
lines when attempting to replace the damaged lines. Accident such as this
emphasize how vulnerable computer and communications facilities are.
COMPANY NAME(S): United Airlines Inc. - fires
SIC CODE: 4511
DESCRIPTORS: Airline Industry; Fires; Transmission Lines; O'Hare
International Airport; Data Security; Computer Systems
6/5/9
06109220 DATABASE: CD FILE 275 *Use Format 9 for FULL TEXT*
Don't take any chances: every PC should have an extinguisher at hand.
Jelcich, Susan
PC Week VOL.: v4 ISSUE: n48 PAGINATION: p160(1)
PUBLICATION DATE: Dec 1, 1987
AVAILABILITY: FULL TEXT Online LINE COUNT: 00046
SPECIAL FEATURES: illustration; cartoon
Microcomputers are not inherent fire hazards, but pose the same threat of
fire as any electrical device, and should have an appropriate fire
extinguisher close at hand. Halon gas extinguishers are recommended, as
they will not damage computer components or leave behind any residue.
Microcomputer users should be given a training session in how to use the
extinguisher properly, and care should be taken to use halon extinguishers
only in well-ventilated areas. Prices for halon extinguishers range from
$175 to $200 dollars, and personal-size halon extinguishers can often be
obtained from office-supply dealers.
DESCRIPTORS: Fire Protection; Microcomputers; Halogen Extinguishers;
Building Management
6/5/10
06010134 DATABASE: CD FILE 275
The big picture. (computer systems and security)
Pastore, John
Data Base Monthly VOL.: v7 ISSUE: n9 PAGINATION: p36(6)
PUBLICATION DATE: July, 1987
The question of security if just one of three elements of the larger issue
of data integrity. The other two elements are backup-recovery and disaster
recovery. The concern of security is to avoid the problems of damage and
misuse, as well as to minimize inevitable problems. Backup-recovery
provides for frequent updating of files to minimize losses due to failure
of the system. Backup files should be stored off-site in case of fire or
other disasters.
DESCRIPTORS: Computer Systems; Security; Management of EDP; Back-Up
Systems; Disaster Planning; Data Security
6/5/11
05069932 DATABASE: CD FILE 275
Soot, corrosion wreak havoc in Postal Service blaze; disaster recovery
confab hears minute details of problems. (HSH Inc. Conference on
Disaster Recovery)
Fisher, Marsha Johnston
MIS Week VOL.: v8 ISSUE: n23 PAGINATION: p40(1)
PUBLICATION DATE: June 8, 1987
The HSH Inc-hosted Conference on Disaster Recovery in Florida heard the
disaster recovery experiences of the US Postal Service following a
two-to-three hour fire at its Washington, DC headquarters in Oct 1984.
Computer center managers were warned: (1) an accurate inventory of
equipment is essential to disaster recovery, (2) records of lease
agreements and warranties must be maintained to determine whether equipment
is covered by others, (3) equipment and data files should be removed from
the building as soon as the fire is out to minimize water and soot damage,
and (4) no floppy disks, files, or equipment should be thrown away after a
disaster, since often apparently irrecoverable damage is in fact
reversible. The US Postal Service managed to recover 92 percent of its data
following the Oct 1984 fire.
COMPANY NAME(S): HSH Inc. - conferences and congresses
SIC CODE: 4311
DESCRIPTORS: Clergy conferences; Recovery; Disaster relief; Disaster
Management; Fires; Case Study; United States. Postal Service;
Government Agency; Postal Service; United States; Losses; How-To
Information; Disaster Planning
6/5/12
04679336 DATABASE: CD FILE 275
'That's all that's left!' (disaster planning)
Rohm, Wendy G.
Infosystems VOL.: v34 ISSUE: n2 PAGINATION: p42(4)
PUBLICATION DATE: Feb, 1987
SPECIAL FEATURES: illustration; photograph
MIS is advised to consider how to successfully survive disasters. An
example involves a retail company, Steinburg Inc., which sustained water
and fire damage to its corporate headquarters. The $4.5 billion company had
an MIS backup hot site, so that a payroll for 28,000 union employees got
out on time. The hot site was fully-equipped with computer and
communication hardware and software and cost $5,000 per month to rent. The
backup hot site and disaster recovery plan had been formulated with
Comdisco Disaster Recovery Services. After two weeks, the firm moved to a
temporary cold site supplied from Compusource and renting the facility for
$3000 per month (Canadian dollars) until they find a new office space. The
cold site involves temporary trailers specially designed for computer
equipment. The company said the only data that was lost was the
microcomputer data that users neglected to tell MIS about. Suppliers of
disaster recovery products and services are also described.
COMPANY NAME(S): Comdisco Disaster Recovery Service Inc. - marketing;
Steinberg's Superstores - data processing; Compusource - marketing
SIC CODE: 7372
DESCRIPTORS: Applications; Natural Disasters; Disaster Management;
Disaster Recovery; Computer Systems; MIS
6/5/13
04675842 DATABASE: CD FILE 275
Damaged gear, data can be restored.
Schindler, Paul E., Jr.
Information Week ISSUE: n105 PAGINATION: p20(1)
PUBLICATION DATE: Feb 23, 1987
SPECIAL FEATURES: illustration; photograph
A computer or its accessories can often be repaired if they are damaged by
fire or water, according to an expert at Relectronic Service Corp., one of
the prominent companies that repair damaged electronic equipment. Many
times such equipment is discarded after the disaster but it can be brought
back to its original condition and data can be recovered if precautions are
taken. For example, power should not be turned on before the damage is
corrected. Professional repair services have saved in excess of $150
million for American companies since 1982. It is, however, impossible to
revive the system if the hardware is melted during the damage. MIS managers
should ascertain the professional competence and credentials of any company
offering such service before employing it to refurbish damaged equipment.
COMPANY NAME(S): Relectronic Service Corp. - services
SIC CODE: 7379
DESCRIPTORS: Hardware Maintenance; Computer Industry; Fires; Repair;
Disaster Recovery; Data Recovery
6/5/14
04537195 DATABASE: CD FILE 275
Voices of experience: are you ready for disaster?
Mandell, Mel
Computer Decisions VOL.: v18 ISSUE: n19 PAGINATION: p64(11)
PUBLICATION DATE: Sept 9, 1986
SPECIAL FEATURES: illustration; photograph; table
Computer disaster recovery, management, and planning are examined in seven
case studies. Steven Skolochenko, a manager of ADP security for the U.S.
Postal Service in Washington, D.C., describes the cleanup operation for
more than 500 calculating devices, 521 keyboards, 663 disk drives, 396
printers, 327 terminals, and 412 typewriters, following a fire in the
building. It was discovered that IBM Personal Computer XTs can absorb a
large amount of damage before they will lose data. Also, a fire at the
company building for Worlco Data Systems resulted in the loss of just one
service client account, worth roughly $5,000 each year, and though
computers did not burn up or melt, there was wide water and smoke damage.
Additional information on actual disaster recovery and disaster management
cases are given by John Nugent of Cap Gemini America, Don Lucas of Norwest
Corp., Larry States of Rockwell Corp., Earl Gomersall of A.C. Nielsen, and
Robert Hokom of First Chicago Corp.of A.C. Nielsen, and Robert Hokom of
First Chicago Corp.
CAPTIONS: Participants.; Power protection.
DESCRIPTORS: Disaster Recovery; Disaster Management; Disaster Planning;
Data Processing; MIS; Executive; Hardware
6/5/15
00648762 DATABASE: CD FILE 275
Data Security.
Romei, L.
Modern Office Technology VOL.: v30 ISSUE: n10 PAGINATION: p120
PUBLICATION DATE: Oct., 1985
SPECIAL FEATURES: illustration; chart
Effective multiuser microcomputer data security is a necessity for
business. In a distributed business computer system risks such as the
destruction of data, unauthorized modification of data and data theft, all
become more probable. An appropriate level of security should provide
adjustability so as not to encumber operating system productivity or
compromise user convenience. A data security system must provide protection
of hardware and software from physical threats, like fire, earthquake and
water damage. Then, procedures and precautions for protecting data from
unauthorized access should be implemented. Sample methods for identifying
legitimate access are listed in flow chart format. Finally, two available
microbased security features are suggested: "file-password" and "access
authorization". A diagram depicts possible sample decision paths for both a
large-scale and a minimal security system.
DESCRIPTORS: Multiuser Microcomputers; Software Protection; Data Security;
Access Controls
6/5/16
00639499 DATABASE: CD FILE 275
Protecting Computers against the Hazard of Fire.
Gast, B.M.
Office Administration and Automation VOL.: v46 ISSUE: n8 PAGINATION:
p50-52
PUBLICATION DATE: Aug., 1985
SPECIAL FEATURES: illustration; photograph; table
Businesses are advised to have a fire protection plan specifically for
computers and data storage areas. Extinguishers for use around electronic
equipment should contain agents that will do the last damage to plastics
and other materials of which data processing equipment is made. Halon
family chemicals in estinguishers have been found to leave no stains or
residue on computer equipment. Halon chemicals are colorless and odorless
gases, and do not reduce visibility when used. Halon 1301 has the best
toxicity rating possible and is expensive; it is effective on Class B and C
fires. Halon 1211 is less expensive, usable in portable extinguishers,
effective, leaves no residue and is not harmful to magnetic disks and tapes
used to store records. Fire extinguishers need to be maintained. A guide
for buying fire extinguishers including a table for comparing fire fighting
agents used in portable extinguishers is given. The BCF Halon 1211 portable
extinguisher from ICI Americas is shown. Class A, B, and C fires are
described.
DESCRIPTORS: Fire Protection; Halogen Extinguishers; Computers; Preventive
Maintenance; How-To Information
6/5/17
00630340 DATABASE: CD FILE 275
Coddling Your Computers.
Lacob, M.
Computer Decisions VOL.: v17 ISSUE: n12 PAGINATION: p76-78
PUBLICATION DATE: June 18, 1985
SPECIAL FEATURES: illustration; table
MIS-dp management must provide computer equipment a steady power supply,
regulate temperature and humidity, clean the air, protect against fire, and
install monitoring equipment. There are both water cooling and air cooling
systems. Air cleaning systems are crucial for protecting sensitive
hardware. Humidity can be preserved by sealing the data center with a vapor
barrier. Fires are caused by electrical problems and poor housekeeping.
Chemicals, like Halon 1301, are preferred to water-sprinkler systems
because they do not conduct electricity and do less damage to the
equipment. A table listing vendors supplying environmental controls is
included.
DESCRIPTORS: Computer Environment; Dust; Temperature; Vendors; Air
Conditioning; Fire Protection; Power Supply; Facility Support;
Uninterruptible Power Supply; Circuitry; Hardware; Humidity Protection
6/5/18
00622801 DATABASE: CD FILE 275
Combat-Ready Computer.
Office Administration and Automation VOL.: v45 ISSUE: n11 PAGINATION:
p76B
PUBLICATION DATE: Nov., 1984
The USS Tripoli has a personnel management system on board that allows
officers on the aircraft carrier to spend more time on planning rather than
administration. A Wang VS 80 computer system with 512KB of main memory,
twenty workstations and 288-megabyte disk drives plus other features is
used. The VS system is also a management tool for the ship. It performs
recordkeeping, inventory control, fire-fighting and damage control, and
zone inspection control, all managed with the help of tracking systems.
DESCRIPTORS: Defense; Automation; Management; Personnel; Tracking Systems;
Computer Systems; Applications
6/5/19
00600512 DATABASE: CD FILE 275
Data Security.
Immel, A.R.
Popular Computing VOL.: v3 ISSUE: n7 PAGINATION: p65-68
PUBLICATION DATE: May, 1984
Although computer hackers have attained a certain measure of notoriety,
the most damage to a company's data results from simple errors and
omissions, according to IBM director of security, Harry DeMaio. In order of
importance, potential threats to data integrity include human error,
disgruntled employees, dishonest employees, fire, water, and external
attack. The increasing use of personal computers in the corporate
environment makes computer crime more likely and efforts to control the
computing environment more difficult. The three factors that must be
balanced in any effort to maintain data integrity are: cost of security,
company productivity, and the consequences of data loss.
DESCRIPTORS: Data Security; Data Integrity; Data Management; Management of
EDP; Microcomputers
6/5/20
00584211 DATABASE: CD FILE 275
Real-Time Recovery.
Wolfe, J.
Data Base Monthly VOL.: v4 ISSUE: n4 PAGINATION: p10-11
PUBLICATION DATE: May, 1984
With the help of Data General Corp., Worlco Data Systems, a Data General
OEM, was able to quickly recover from a fire that completely destroyed its
building and $1.25 million in Data General equipment. Within three days of
the fire Data General was ready to ship the company's new computers that
were required to resume its data processing services. The following day the
company established a new headquarters where the computers could be
shipped. Within two weeks Data General had installed a new MV-10000
mainframe computer that enabled the company to resume normal operations. A
Data General Desktop Generation system was also installed to replace other
equipment destroyed in the fire. Photographs showing the damage caused by
the fire are included.
PRODUCT NAME(S): Data General MV-10000
COMPANY NAME(S): Worlco Data Systems
DESCRIPTORS: OEMs; Disaster Recovery; Manufacturers; Mainframe Computers
6/5/21
00580962 DATABASE: CD FILE 275
Assessing DP Site Security Gaining Priority Status.
Moyer, G.
Computerworld VOL.: v18 ISSUE: n44 PAGINATION: p17SR
PUBLICATION DATE: Oct. 29, 1984
There are several factors to consider when assessing a computer facility's
physical security, including its location, its site characteristics, its
fire protection systems, and its support systems. In recent years, there
has emerged a trend towards building stand-alone data centers. Separate
facilities have at least two advantages over shared facilities. First,
there is a reduced risk of water or fire damage caused by occupants of the
adjoining space. Second, it is easier to control access to the center.
DESCRIPTORS: Facility Security; Computer Facilities; Guidelines; Security;
Facility Support
6/5/22
00577408 DATABASE: CD FILE 275
Maintaining Your Computer System.
Allswang, J.M.
Interface Age VOL.: v9 ISSUE: n7 PAGINATION: p26
PUBLICATION DATE: July, 1984
ARTICLE TYPE: column
The service and maintenance of a computer system is an important
consideration. The maintenance of a computer system can occur as parts
require repair or according to the terms of a service contract. Service
options include carry-in, pick-up and delivery, or onsite maintenance.
Specific guidelines are necessary to determine price, location and dealer.
Computer insurance is necessary to protect hardware and software against
fire, theft, accident, water damage and power surges.
DESCRIPTORS: Computer Systems; Maintenance; Support Services; Maintenance
Contracts; Guidelines; Computer Insurance
6/5/23
00566023 DATABASE: CD FILE 275
Insuring Against the Perils of PC.
Cottrell, P.; Weiss, B.D.
PC Magazine VOL.: v3 ISSUE: n16 PAGINATION: p301-303
PUBLICATION DATE: Aug. 21, 1984
There are several options for insuring personal computers. Property
insurance covers loss from fire, flood and other physical perils. Most
homeowner's policies will cover a personal computer unless it is used for
business. Liability insurance covers the liability for damage to third
parties. Liability insurance is more indicated for personal computers used
in business.
DESCRIPTORS: Guidelines; Economics of Computing; Insurance; Computer
Insurance
6/5/24
00563329 DATABASE: CD FILE 275
Averting Data Disaster: What You Can Do.
Fountain, G.
New Zealand Interface PAGINATION: p12-14
PUBLICATION DATE: Aug., 1983
Security has to protect information, and is a matter for management.
Unauthorized access by individuals could impair an organization, disclosing
confidential information, and causing physical damage to the data
processing facility. Security programs should ensure integrity of data,
protect management, employees, and assets, ensure survival of hazards, and
identify sensitive data. Physical risks are fire, water, power, and
sabotage.
DESCRIPTORS: Security; Data Security; Guidelines; Planning; Companies;
Disaster Planning; Disaster Recovery; Computer Crime
6/5/25
00553473 DATABASE: CD FILE 275
Computer Graphics in Battlegames Simulation.
Jafek, B.
Electronic Imaging VOL.: v3 ISSUE: n4 PAGINATION: p22-24
PUBLICATION DATE: April, 1984
SPECIAL FEATURES: illustration Other; photograph
At the National Training Center (NTC) at Ft. Irwin in the Mohave Desert
several military technologies are integrated to allow the detailed
recording, replay and simulation-of battle games between the trainee
battalion BLUEFOR and the opposing force OPFOR residing at Ft. Irwin. A
Multiple Integrated Laser Engagement System (MILES) is used to simulate
gunfire during the games. Guns deploy non-destructive laser signals which
engage sensors on opposing troops and equipment defining three degrees of
damage. All fire and troop movements are digitally recorded on video and a
position-location tracking system for observation and later evaluation at
an After Action Review (AAR). The forty-two graphics stations at the Core
Instrument Subsystem (CIS) consist of a color monitor, digitizing tablet,
two CRTs and radio communication equipment. Data from battles can be
replayed or simulated while altering input variables to isolate the
contribution of several influences upon an effect. Extensive detail of the
capabilities and uses of the battle graphics system is given with eleven
screen displays.
DESCRIPTORS: Defense; Military; Cartography; Simulation; Modeling;
Graphics Systems; Graphics Tablets
6/5/26
00513607 DATABASE: CD FILE 275
How to Minimize the Threat of Fire and Crime.
Master, I.
Asian Computer Monthly ISSUE: n69 PAGINATION: p30
PUBLICATION DATE: Dec., 1983
A computer installation must be protected by a fire extinguishing system.
There are three types of fires which require three types of systems. Water
must be used on paper, wood or cloth. Liquids that are on fire must be
smothered. A non-conducting agent must be used for electrical fires. Halons
and C02 extinguishers should be used in the computer room. Additionally,
the risk of fire damage can be reduced by the use of magnetic media storage
cabinets, access control systems, and locating records off-site.
DESCRIPTORS: Computer Facilities; Fire Protection; Halogen Extinguishers;
Fires
6/5/27
00506185 DATABASE: CD FILE 275
State DP Centers Back to Work Day After Fire.
Bartolik, P.
Computerworld VOL.: v17 ISSUE: n43 PAGINATION: p31
PUBLICATION DATE: Oct. 24, 1983
A severe fire that destroyed two wings of a state agency building in
Olympia, Washington also threatened two computer centers that service
client groups throughout the state. There was water damage to terminals in
the building but its two computers, an IBM 3043 and a Sperry 1100-83,
withstood the blaze. The 110-83 was up within hours after the fire was
extinguished. The 3043 was up the following day.
DESCRIPTORS: Fires; Washington; State Government; Disaster Recovery; Down
Time; Mainframe Computers
6/5/28
00501879 DATABASE: CD FILE 275
Fire, Smoke and Computers.
Waring, L.
Information Age VOL.: v5 ISSUE: n3 PAGINATION: p167-171
PUBLICATION DATE: July, 1983
Fire and smoke damage to a computer can be costly and disruptive to a
company. Problems encountered by two companies after a fire are presented.
One company's computer was destroyed. The other's underwent restoration.
Prior planning for disasters could have reduced disruption in both areas.
DESCRIPTORS: Case Study; Disaster Planning; Computer Facilities;
Management of EDP; Facility Security; Disaster Recovery
6/5/29
00501260 DATABASE: CD FILE 275
Problems Anticipated - Problems Solved.
Jarvis, M.
Infosystems VOL.: v30 ISSUE: n3 PAGINATION: p54
PUBLICATION DATE: March, 1983
Many of the problems experienced by computer managers today can be
anticipated, and thus reduced or eliminated. These problems arise in such
site-related items as humidity, dust, power protection, heat, fire, and
noise control. It costs more to expand into an undeveloped area, than to
originally put in enough electrical, and other building-related needs for a
computer room. The high costs of power-related damage and down time are
discussed. A key needs checklist is included.
DESCRIPTORS: Planning; Facility Construction; Facility Location; Space
Planning; Computer Environment; Security; Power Supply; Uninterruptible
Power Supply
?