Can We Afford The Resources We Spend On The Cloud?

Can We Afford The Resources We Spend on the Cloud?

We often think about the Cloud in terms of security, services provided, storage space and price so it is fairly easy to forget about the resources that are needed to keep the Cloud floating in the blue, virtual sky. And yet even our home computers are sucking enough power that if you did not use them for a month and you and would set in place green measures like auto sleep, you would see a significant improvement in your electrical bill.

So how much electricity does the Cloud eat up? It is nearly impossible for any one person or business to tell because the Cloud is made up of thousands of data centers and they are all owned by different entities. Even more significant is that one of the best ways to secure those data centers is to keep their physical location secret. Needless to say, the details about their makeup are closely guarded secrets.

Still there is one thing that can be said about how much power the least of these data centers consumes: it would be enough to power a medium-sized town.

The worst thing about it is that the priority of these data centers is to operate at peak efficiency. That means that they could save almost 90% of the energy that they currently use if they agreed to power down unused parts of the system until it is needed. But, since that would affect both the security of the system and its efficiency, the power keeps going in.

Yet we have never shied away from making great sacrifices when they were made for a good cause and, despite what some may argue, the cloud can be more than just a fad. There are more and more applications that are available for free or for a fraction of the cost it would take to buy them privately. And letting more people make use of them at any given time means that there are more chances for some fantastic works of art to be created or for some outstanding medical breakthroughs to be made.

Even as we speak the fantastic computing power that Watson, the Jeopardy winning super computer created by IBM, represents is being prepared to be uploaded on the Cloud. Watson is already using its 90 servers and 16,000 gigabytes of RAM to go through hundreds of peer-reviewed cancer research papers to become one of the best diagnosticians that oncologists can use.

The only problem is that we, as humans, already need to set aside our preconceptions about computers. There are doctors who will regard Watson as trustworthy as any other of their tools. Yet, since it does not merely provide a sharper hearing, but perhaps a broader knowledge of symptoms, there will undoubtedly be doctors who will feel threatened by it and reject it.

However, if history has thought us anything, is that we need to be flexible and learn to use the smarter tools at our disposal. So the Cloud is here to stay and Watson will certainly be just the first super computer to change the way specialists around the globe do things.

By Luchi Gabriel Manescu

About Luchi

Luchi is a Sociology major that worked as a technician in a computer shop to put himself through collage. He then continued to work for HP as a data analyst while trying to assert himself as a soft skills trainer. Finally he found the perfect balance between his diverging skills when he started writing tech related articles almost 3 years ago and since then he has continued to learn about almost every aspect of the IT world while continuously working on his writing skills.

View All Articles

Sorry, comments are closed for this post.

Comics
Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

Adopting A Cohesive GRC Mindset For Cloud Security

Adopting A Cohesive GRC Mindset For Cloud Security

Cloud Security Mindset Businesses are becoming wise to the compelling benefits of cloud computing. When adopting cloud, they need a high level of confidence in how it will be risk-managed and controlled, to preserve the security of their information and integrity of their operations. Cloud implementation is sometimes built up over time in a business,…

The Future Of Cloud Storage And Sharing…

The Future Of Cloud Storage And Sharing…

Box.net, Amazon Cloud Drive The online (or cloud) storage business has always been a really interesting industry. When we started Box in 2005, it was a somewhat untouchable category of technology, perceived to be a commodity service with low margins and little consumer willingness to pay. All three of these factors remain today, but with…

The Security Gap: What Is Your Core Strength?

The Security Gap: What Is Your Core Strength?

The Security Gap You’re out of your mind if you think blocking access to file sharing services is filling a security gap. You’re out of your mind if you think making people jump through hoops like Citrix and VPNs to get at content is secure. You’re out of your mind if you think putting your…

Journey Science In Telecom: Take Customer Experience To The Next Level

Journey Science In Telecom: Take Customer Experience To The Next Level

Journey Science In Telecom Journey Science, being derived from connected data from different customer activities, has become pivotal for the telecommunications industry, providing the means to drastically improve the customer experience and retention. It has the ability to link together scattered pieces of data, and enhance a telco business’s objectives. Siloed approaches are becoming obsolete…

The Rise Of BI Data And How To Use It Effectively

The Rise Of BI Data And How To Use It Effectively

The Rise of BI Data Every few years, a new concept or technological development is introduced that drastically improves the business world as a whole. In 1983, the first commercially handheld mobile phone debuted and provided workers with an unprecedented amount of availability, leading to more productivity and profits. More recently, the Cloud has taken…

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Despite Record Breaches, Secure Third Party Access Still Not An IT Priority

Secure Third Party Access Still Not An IT Priority Research has revealed that third parties cause 63 percent of all data breaches. From HVAC contractors, to IT consultants, to supply chain analysts and beyond, the threats posed by third parties are real and growing. Deloitte, in its Global Survey 2016 of third party risk, reported…

Three Tips To Simplify Governance, Risk and Compliance

Three Tips To Simplify Governance, Risk and Compliance

Governance, Risk and Compliance Businesses are under pressure to deliver against a backdrop of evolving regulations and security threats. In the face of such challenges they strive to perform better, be leaner, cut costs and be more efficient. Effective governance, risk and compliance (GRC) can help preserve the business’ corporate integrity and protect the brand,…