Preview

What business and social problems does data center power consumption cause?

Powerful Essays
Open Document
Open Document
4078 Words
Grammar
Grammar
Plagiarism
Plagiarism
Writing
Writing
Score
Score
What business and social problems does data center power consumption cause?
1. What business and social problems does data center power consumption cause?
Data center power consumption economically affects businesses and environmentally affects society. Operating costs for data centers is very expensive. In the article, "Ubiquitous Green Computing Techniques for High Demand Applications in Smart Environments," the total operating costs, concerning electricity, of all data centers within the U.S. alone exceeded 7 billion dollars in 2010 (Ayala, J., Moya, J., Risco-Martín, J., Sanchez, C., Zapater, M. 2012). The article then explains that data centers consumed 61 billion kilowatt-hours in 2006;the Environmental Protection Agency provided this statistic to the US Congress in a report from 2007 (Ayala, J., Moya, J., Risco-Martín, J., Sanchez, C., Zapater, M. 2012). With this amount of energy being consumed by data centers, it is a cause for concern; consequently, data centers have an impact on the cost of business and negatively impact the environment via carbon footprint.
As the carbon footprint grows, there is a need to realign the way businesses looks at managing their data centers. Several companies including Cisco, Dell, Google, HP, IBM, and Intel have announced efforts to reduce the environmental footprint of their product offerings (Chang et al., 2012). Large technology companies are starting to understand that being environmentally friendly is good for the wallet and good public relations. Understanding how to manage and build better data centers with a green foot print becomes paramount. A large factor in data center efficiency or lack thereof is the architecture. In most data centers the cooling and power delivery infrastructure (air conditioners, power delivery units, etc.) accounts for a large fraction of the total electricity consumption (Chang et al., 2012). It is important to understand and identify how using different power sources, design, and technology can actually help improve data center environments going forward.



References: Ayala, J., Moya, J., Risco-Martín, J., Sanchez, C., Zapater, M. (2012). Ubiquitous Green Computing Techniques for High Demand Applications in Smart Environments. Sensors Vol. 12, Issue 8, p10659-10677. Amoretti, M Bovee, C. (2013). Business Communication Essentials. Upper Saddle River, New Jersey: Prentice Hall. BRANDEL, M. (2012). BYOD: Where the Costs Are. Network World, 29(20), 16. Callou, G., Ferreira, João., Maciel, P. (2013). Energies Vol. 6 Issue 7, p3422-3443. 22p. Cao. Chigona, W. L. (2012). Synchronised Smart Phones: The Collision of Personal Privacy and Organisational Data Security. South African Journal Of Business Management, 43(2), 31. Ciccarelli,P (2012.) Networking Basics 2nd Edition Dipert, Randall R. (2013). Other-Than-Internet (OTI) Cyberwarfare: Challenges for Ethics, Law, and Policy. Journal of Military Ethics. Apr2013, Vol. 12 Issue 1, p34-53. 20p. Droege, Cordula. (2012). Get Off My Cloud: Cyber Warfare, International Humanitarian Law, and the Protection of Civilians. International Review of the Red Cross. Vol. 94 Issue 886, p533-578. 46p. doi: 10.1017/S1816383113000246 García Godoy, María Jesús Goldman, G. (2012). Major Banks Hit with Biggest Cyberattacks in History. The Cybercrime Economy. CNN Money.com Retrieved from http://money.cnn.com/2012/09/27/technology/bank-cyberattacks/index.htm Ivarsson, L., & Larsson, P Kalkbrenner, J., & McCampbell, A. (2011). The Advent of Smartphones: A Study on the Effect of Handheld Electronics on Personal and Professional Productivity. Journal of Applied Global Research, 4(8), 1-9. Khan, S., Nauman, M., Othman, A. T., & Musa, S. (2012). How Secure is Your Smartphone: An Analysis of Smartphone Security Mechanisms. In Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012 International Conference on (pp. 76-81). IEEE. Kodak. (n.d.). Our Company. Retrieved October 9, 2013 from http://www.kodak.com/ek/US/en/About_Kodak_Top/Our_Company.htm Laudon, K., Laudon, J Laudon, K. C., & Laudon, J. P. & Brabston, M., E. (2012). Management information systems: Managing the Digital Firm (6th Canadian ed.). Toronto: Pearson Canada Lee, N Longbing. (2012). Social Security and Social Welfare Data Mining: An Overview. IEEE Transactions on Systems, Man & Cybernetics: Part C - Applications & Reviews. Nov2012, Vol. 42 Issue 6, p837-853. 17p. McMillan, Stuart Mod, Craig. (2012). How Magazines Will Be Forever Changed. Retrieved October 9, 2013 from http://www.cnn.com/2012/10/21/opinion/mod-digital-magazines/index.html Nica, Anisoara Nguyen, K. K., Cheriet, M., Lemay, M., Reijs, V., Mackarel, A., & Pastrama, A. (2012). Environmental-aware Virtual Data Center Network. Computer Networks, 56(10), 2538-2550.2 Ramsden, Jeremy Revels, Mark. Nussbaumer, Hélène. (2013). Data Mining and Data Warehousing in the Airline Industry. Academy of Business Research Journal. 2013, Vol. 3, p69-82. 14p. Schwertner, Krassimira. (2013). Modern Information Technology (IT): Factor for Business Efficiency and Business Driver. Journal of Modern Accounting and Auditing, 9(8), 1131-1139. Semer, L. (2013). Auditing the BOYD Program. Internal Auditor, 70(1), 23. Todkar, R., Limbore, N., & Zargad, B Yong, W., Streff, K. & Raman, S. (2012). Smartphone Security Challenges. IEEE Computer Society. 45(12), 52-58.

You May Also Find These Documents Helpful

  • Better Essays

    Twa1 Task1

    • 3773 Words
    • 11 Pages

    Summary Now a day’s Information Technology (IT) is playing an increasingly important role all over the world – in both business and individuals’ private lives. All the University in the world are focusing on environmental protection and improvement [1]. We are living in an era of industrialization. We are consuming a lot more products in our lives as compared to our ancestors; this is to improve the quality of life by saving time, facilitating ourselves and much more. Most of the world industries are grown with certain pace and they have achieved maturity with the time. Then there are many environmental control authorities and regulatory authorities which enforce certain environmental protection laws upon them. But unfortunately as far as Environmental protection is concerned Information and Communication industry is growing at such a faster pace that such kind of controls are not fully implemented or observed by ICT industry[2]. This is a huge danger for the world environment. The main focus has mostly been upon competing with the competitors and introducing latest technology as fast in the market as possible. It is also consuming ever greater amounts of energy and is therefore the source of significant CO² emissions. According to calculation IT now causes the release of as much carbon dioxide into the atmosphere as nearly 320 million cars, worldwide IT now generates CO² emissions of about 600 million metric tons a year. Green IT can help curb this alarming trend. Simply by consistently implementing known energy-conserving approaches, the CO² emitted by IT systems can be nearly halved [3]. “Green IT”…

    • 3773 Words
    • 11 Pages
    Better Essays
  • Best Essays

    “Making Mobile Devices, Cellular Devices More Secure.” (November 8, 2009). Retrieved on September 7, 2012 from…

    • 3710 Words
    • 15 Pages
    Best Essays
  • Powerful Essays

    References: Brenner, Joel (2011). America the Vulnerable: Inside the New Threat Matrix of Digital Espionage, Crime, and Warfare. New York: The Penguin Press…

    • 4009 Words
    • 17 Pages
    Powerful Essays
  • Best Essays

    554 Infrastructure

    • 3120 Words
    • 13 Pages

    Turban, E. & Volonino, L. (2009). Information technology for management: Improving performance in the digital…

    • 3120 Words
    • 13 Pages
    Best Essays
  • Satisfactory Essays

    CIS 517 WK 3 Case Study 1 - Green Computing Research Project – Part 1…

    • 273 Words
    • 1 Page
    Satisfactory Essays
  • Satisfactory Essays

    Cray Research Outline

    • 378 Words
    • 2 Pages

    Fountain, hated it, put ducks in it,* brought it to new bldg then blew it up, symbolize new ideas, fresh…

    • 378 Words
    • 2 Pages
    Satisfactory Essays
  • Satisfactory Essays

    Turban, E., & Volonino, L. (2010). Information technology for management: Improving performance in the digital economy (7th ed.). Hoboken, NJ: John Wiley & Sons.…

    • 1661 Words
    • 7 Pages
    Satisfactory Essays
  • Powerful Essays

    The budget for the project was $500,000, and the goal was to provide an extensive report, including detailed financial analysis and recommendations on what green computing technologies to implement. Official project request forms for the recommended solutions would also be created as part of the project.…

    • 1678 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Leed Certification

    • 1581 Words
    • 7 Pages

    Botelho, Bridget (2007, June, 06). Thinking green, data center aims for LEED certification. Data Center News, Retrieved 9/25/08, from http://searchdatacenter.techtarget.com/news/article/0,289142,sid80_gci1259897,00.html…

    • 1581 Words
    • 7 Pages
    Powerful Essays
  • Powerful Essays

    Cited: America 's Secret Drone War. Perf. Diane Sawyer. ABC News. ABC News Network, 6 Feb. 2013. Web. 28 Apr. 2014. Boyle, Michael J. "The Costs And Consequences Of Drone Warfare." International Affairs 89.1 (2013): 1-29. Academic Search Premier. Web. 5 Apr. 2014. Cullen, Peter M. "The Role Of Targeted Killing In The Campaign Against Terror.” Joint Force Quarterly 48 (2008): 22-29. Academic Search Premier. Web. 28 Apr. 2014. "Drone Wars Pakistan: Analysis." Welcome to The National Security Program. The New America Foundation, n.d. Web. 26 Apr. 2014. "Drones." ProCon.org Headlines. N.p., n.d. Web. 28 Apr. 2014. Etzioni, Amitai. "The Great Drone Debate." Military Review 93.2 (2013): 2-13. Academic Search Premier. Web. 10 May 2014. "Flight of the Drones." The Economist. The Economist Newspaper, 08 Oct. 2011. Web. 10 May 2014. Obama, Barack. "Drone Policy." Obama 's Speech on Drone Policy. National Defense University, Fort Lesley J. McNair, DC. 28 Apr. 2014. NY Times. Web. 28 Apr. 2014. Ruder, Eric. "Remote Control Warfare." Global Research. N.p., 8 Apr. 2013. Web. 28 Apr. 2014. Saletan, William. "In Defense of Drones." Slate Magazine. N.p., 19 Feb. 2013. Web. 28 Apr. 2014.…

    • 2050 Words
    • 59 Pages
    Powerful Essays
  • Best Essays

    Lynn, III, W. J. (2010, September/October). Defending a new domain: The Pentagon 's cyberstrategy. Foreign Affairs. Retrieved from http://www.foreignaffairs.com/articles/66552/william-j-lynn-iii/defending-a-new-domain…

    • 4737 Words
    • 19 Pages
    Best Essays
  • Satisfactory Essays

    Fire Truck Crash

    • 318 Words
    • 2 Pages

    The consequences of losing a smartphone or other mobile device are significant because these devices store personal and business data. The goal, therefore, for mobile devices users is to make their…

    • 318 Words
    • 2 Pages
    Satisfactory Essays
  • Good Essays

    “People ask me all the time, 'What keeps you up at night?' And I say, 'Spicy Mexican food, weapons of mass destruction, and cyber-attacks.” - Dutch Ruppersberger. In other words cyber-attacks and war fare has the potential to have the save destruction as WMDs. We need to pay attention towards cyber warfare because it is the way of the future. Fight has gone from bow and arrows to drone airplanes and now cyberspace. Cyber warfare is simple and inexpensive; all a terrorist needs is a computer and a connection. That is why terrorists are leaning towards cyber-attacks. Cyber terrorism has a huge impact on many lives across the globe. In order to end cyber warfare countries must find why they are being attacked and how they are being attacked. The primary reason for cyber warfare is the lack of sophisticated army encrypted security on public and…

    • 519 Words
    • 3 Pages
    Good Essays
  • Good Essays

    Current Event

    • 670 Words
    • 3 Pages

    More than 90 percent of American adults own a mobile phone, and more than half of the devices are smartphones. But “smartphone” is a misnomer. They are personal computers that happen to include a phone function, and like any computer they can store or wirelessly retrieve enormous amounts of personal information: emails, photos and videos; document files; financial and medical records; and virtually everywhere a person has been.…

    • 670 Words
    • 3 Pages
    Good Essays
  • Better Essays

    Week 7 Research Paper Sun

    • 1241 Words
    • 4 Pages

    M.A. Badamas, (2001),"Mobile computer systems - security considerations", Information Management & Computer Security, Vol. 9 Iss: 3 pp. 134 – 136…

    • 1241 Words
    • 4 Pages
    Better Essays