Data center power consumption economically affects businesses and environmentally affects society. Operating costs for data centers is very expensive. In the article, "Ubiquitous Green Computing Techniques for High Demand Applications in Smart Environments," the total operating costs, concerning electricity, of all data centers within the U.S. alone exceeded 7 billion dollars in 2010 (Ayala, J., Moya, J., Risco-Martín, J., Sanchez, C., Zapater, M. 2012). The article then explains that data centers consumed 61 billion kilowatt-hours in 2006;the Environmental Protection Agency provided this statistic to the US Congress in a report from 2007 (Ayala, J., Moya, J., Risco-Martín, J., Sanchez, C., Zapater, M. 2012). With this amount of energy being consumed by data centers, it is a cause for concern; consequently, data centers have an impact on the cost of business and negatively impact the environment via carbon footprint.
As the carbon footprint grows, there is a need to realign the way businesses looks at managing their data centers. Several companies including Cisco, Dell, Google, HP, IBM, and Intel have announced efforts to reduce the environmental footprint of their product offerings (Chang et al., 2012). Large technology companies are starting to understand that being environmentally friendly is good for the wallet and good public relations. Understanding how to manage and build better data centers with a green foot print becomes paramount. A large factor in data center efficiency or lack thereof is the architecture. In most data centers the cooling and power delivery infrastructure (air conditioners, power delivery units, etc.) accounts for a large fraction of the total electricity consumption (Chang et al., 2012). It is important to understand and identify how using different power sources, design, and technology can actually help improve data center environments going forward.
References: Ayala, J., Moya, J., Risco-Martín, J., Sanchez, C., Zapater, M. (2012). Ubiquitous Green Computing Techniques for High Demand Applications in Smart Environments. Sensors Vol. 12, Issue 8, p10659-10677. Amoretti, M Bovee, C. (2013). Business Communication Essentials. Upper Saddle River, New Jersey: Prentice Hall. BRANDEL, M. (2012). BYOD: Where the Costs Are. Network World, 29(20), 16. Callou, G., Ferreira, João., Maciel, P. (2013). Energies Vol. 6 Issue 7, p3422-3443. 22p. Cao. Chigona, W. L. (2012). Synchronised Smart Phones: The Collision of Personal Privacy and Organisational Data Security. South African Journal Of Business Management, 43(2), 31. Ciccarelli,P (2012.) Networking Basics 2nd Edition Dipert, Randall R. (2013). Other-Than-Internet (OTI) Cyberwarfare: Challenges for Ethics, Law, and Policy. Journal of Military Ethics. Apr2013, Vol. 12 Issue 1, p34-53. 20p. Droege, Cordula. (2012). Get Off My Cloud: Cyber Warfare, International Humanitarian Law, and the Protection of Civilians. International Review of the Red Cross. Vol. 94 Issue 886, p533-578. 46p. doi: 10.1017/S1816383113000246 García Godoy, María Jesús Goldman, G. (2012). Major Banks Hit with Biggest Cyberattacks in History. The Cybercrime Economy. CNN Money.com Retrieved from http://money.cnn.com/2012/09/27/technology/bank-cyberattacks/index.htm Ivarsson, L., & Larsson, P Kalkbrenner, J., & McCampbell, A. (2011). The Advent of Smartphones: A Study on the Effect of Handheld Electronics on Personal and Professional Productivity. Journal of Applied Global Research, 4(8), 1-9. Khan, S., Nauman, M., Othman, A. T., & Musa, S. (2012). How Secure is Your Smartphone: An Analysis of Smartphone Security Mechanisms. In Cyber Security, Cyber Warfare and Digital Forensic (CyberSec), 2012 International Conference on (pp. 76-81). IEEE. Kodak. (n.d.). Our Company. Retrieved October 9, 2013 from http://www.kodak.com/ek/US/en/About_Kodak_Top/Our_Company.htm Laudon, K., Laudon, J Laudon, K. C., & Laudon, J. P. & Brabston, M., E. (2012). Management information systems: Managing the Digital Firm (6th Canadian ed.). Toronto: Pearson Canada Lee, N Longbing. (2012). Social Security and Social Welfare Data Mining: An Overview. IEEE Transactions on Systems, Man & Cybernetics: Part C - Applications & Reviews. Nov2012, Vol. 42 Issue 6, p837-853. 17p. McMillan, Stuart Mod, Craig. (2012). How Magazines Will Be Forever Changed. Retrieved October 9, 2013 from http://www.cnn.com/2012/10/21/opinion/mod-digital-magazines/index.html Nica, Anisoara Nguyen, K. K., Cheriet, M., Lemay, M., Reijs, V., Mackarel, A., & Pastrama, A. (2012). Environmental-aware Virtual Data Center Network. Computer Networks, 56(10), 2538-2550.2 Ramsden, Jeremy Revels, Mark. Nussbaumer, Hélène. (2013). Data Mining and Data Warehousing in the Airline Industry. Academy of Business Research Journal. 2013, Vol. 3, p69-82. 14p. Schwertner, Krassimira. (2013). Modern Information Technology (IT): Factor for Business Efficiency and Business Driver. Journal of Modern Accounting and Auditing, 9(8), 1131-1139. Semer, L. (2013). Auditing the BOYD Program. Internal Auditor, 70(1), 23. Todkar, R., Limbore, N., & Zargad, B Yong, W., Streff, K. & Raman, S. (2012). Smartphone Security Challenges. IEEE Computer Society. 45(12), 52-58.