Unusual Clandestine Cloud Data Centre Service Locations

Unusual Clandestine Cloud Data Centre Service Locations

Unusual Clandestine Cloud Data Centre Service Locations

Everyone knows what the cloud is, but does everybody know where the cloud is? We try to answer that as we look at some of the most unusual data centre locations in the world.

Under the Eyes of a Deity

Deep beneath the famous Uspenski Cathedral in the heart of Helsinki lies a converted World War II bomb shelter, which sees an unlikely fusion of data storage and green technology.

Estimates suggest that in a typical data centre only 40 percent of energy use is for computing, with the remainder being used for cooling down the servers. The problem is so serious that data centres account for as much as 30 percent of a corporation’s energy bills and 1 percent of energy usage worldwide.

Finnish IT company Academica designed the 2MW underground data centre to try and address this problem. Rather than using a traditional means of power to try and cool the servers, they use pumped seawater from the nearby Baltic Sea. As the servers are cooled the water is heated, and this heated water is then used to provide warmth for 500 local homes, before being recycled back into the system.

The technology itself is not new, but there are no other projects in the world that operate on this scale. The centre now saves Academica a remarkable $235,000 a year in energy costs and is prompting other large data centre providers to follow in their footsteps, with Google now also operating two centres that run on recycled water.

In a Disused Coal Mine

While Academica’s $235,000 per year saving is impressive, it pales in to insignificance when compared with a $3,000,000 per year saving by Sun Microsystems.

The former cloud-computing giant lowered 10,000 of its self-contained Blackbox data centres into a 100 metre deep coal mine located in the Chubu region of Japan’s Honshu Island.

With groundwater used as the coolant and a constant site temperature of 15 degrees Celsius, no air-conditioning is needed outside the containers. This significantly reduces the energy required when compared with the surface-level Blackbox containers.

At the time, Sun stated that added benefits include security against unauthorised entry and terrorist attacks, and that have designed all the units to capable of withstanding 6.7 magnitude earthquake.

An Independent World War II Sea Fort

Few locations on earth have a story quite as unique as that of Sealand. Just six miles of the coast of England, the self-declared sovereign state has seen a hostile takeover, rebel government, and hostage crisis since coming into existence in September 1967.

The micronation is now home to HavenCo, a self-styled data haven that has no copyright or intellectual property on data that it hosts.

HavenCo was founded in the year 2000, but ceased operating between 2008 and 2012 as a result of a legal dispute over project financing. Since its rebirth, the company offers proxies and VPNs using European and American servers, whilst storing hard data on servers on Sealand itself. The only restrictions on hosted data are child pornography, spamming and malicious hacking.

Unusual-Data-Centers

 

Do you know another unique data centre location? Let us know in the comments below.

(Infographic Source: http://www.whoishostingthis.com)

By Daniel Price

About Daniel Price

Daniel is a Manchester-born UK native who has abandoned cold and wet Northern Europe and currently lives on the Caribbean coast of Mexico. A former Financial Consultant, he now balances his time between writing articles for several industry-leading tech (CloudTweaks.com & MakeUseOf.com), sports, and travel sites and looking after his three dogs.

View Website
View All Articles

Sorry, comments are closed for this post.

Comics
How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart Change-Induced Network Outages and Breaches

How Formal Verification Can Thwart  Breaches Formal verification is not a new concept. In a nutshell, the process uses sophisticated math to prove or disprove whether a system achieves its desired functional specifications. It is employed by organizations that build products that absolutely cannot fail. One of the reasons NASA rovers are still roaming Mars…

Ending The Great Enterprise Disconnect

Ending The Great Enterprise Disconnect

Five Requirements for Supporting a Connected Workforce It used to be that enterprises dictated how workers spent their day: stuck in a cubicle, tied to an enterprise-mandated computer, an enterprise-mandated desk phone with mysterious buttons, and perhaps an enterprise-mandated mobile phone if they traveled. All that is history. Today, a modern workforce is dictating how…

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

5% Of Companies Have Embraced The Digital Innovation Fostered By Cloud Computing

Embracing The Cloud We love the stories of big complacent industry leaders having their positions sledge hammered by nimble cloud-based competitors. Saleforce.com chews up Oracle’s CRM business. Airbnb has a bigger market cap than Marriott. Amazon crushes Walmart (and pretty much every other retailer). We say: “How could they have not seen this coming?” But, more…

Lavabit, Edward Snowden and the Legal Battle For Privacy

Lavabit, Edward Snowden and the Legal Battle For Privacy

The Legal Battle For Privacy In early June 2013, Edward Snowden made headlines around the world when he leaked information about the National Security Agency (NSA) collecting the phone records of tens of millions of Americans. It was a dramatic story. Snowden flew to Hong Kong and then Russia to avoid deportation to the US,…

Using Private Cloud Architecture For Multi-Tier Applications

Using Private Cloud Architecture For Multi-Tier Applications

Cloud Architecture These days, Multi-Tier Applications are the norm. From SharePoint’s front-end/back-end configuration, to LAMP-based websites using multiple servers to handle different functions, a multitude of apps require public and private-facing components to work in tandem. Placing these apps in entirely public-facing platforms and networks simplifies the process, but at the cost of security vulnerabilities. Locating everything…

The Five Rules of Security and Compliance in the Public Cloud Era

The Five Rules of Security and Compliance in the Public Cloud Era

Security and Compliance  With technology at the heart of businesses today, IT systems and data are being targeted by criminals, competitors and even foreign governments. Every day, we hear about how another retailer, bank or Internet company has been hacked and private information of customers or employees stolen. Governments and oversight organizations are responding to…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud: Is It Really Worth It?

Cost of the Cloud Cloud computing is more than just another storage tier. Imagine if you’re able to scale up 10x just to handle seasonal volumes or rely on a true disaster-recovery solution without upfront capital. Although the pay-as-you-go pricing model of cloud computing makes it a noticeable expense, it’s the only solution for many…

The Key To Improving Business Lies In Eye-Interaction Tech

The Key To Improving Business Lies In Eye-Interaction Tech

Eye-Interaction Technology Analysts at Goldman Sachs predict virtual reality revenue will surpass TV within the next decade. More than just some gaming fad, VR represents a whole new way for organizations to train, research, and explore vast amounts of data. Despite its popularity, however, VR is still not in the hands of the majority, and…