Skip to main content

U.S. Government shutting down 800 data centers by 2015

ServerFarm
Image used with permission by copyright holder

The federal government released information on a plan to close over 350 data centers around the United States by the end of 2012 and another 400 by the end of 2015. This is an effort to bring the remaining data centers up to capacity. Chief Information Officer Vivek Kundra stated that more than 2,000 data centers around the nation have been running at about 40 percent storage capacity and 27 percent computing capacity. Compared to a regular office building, the average data center consumes 200 times the amount of electricity.

data_center_map__2This move is estimated to save U.S. taxpayers $3 billion. The White House sited examples of the current waste including a 195,000 square foot facility in Alabama that’s used by the Department of Homeland Security, the equivalent of three and a half football fields. A facility used by the Department of the Treasury in Maryland costs taxpayers over $400, 000 a year for leasing and electricity, all for 250 servers. Since 1998, the number of data centers has more than quadrupled across the United States.

Recommended Videos

Thirty states will be effected by the closures, however there are few jobs associated with managing the server farms. The Department of Defense is most effected by the closures with 113 data centers shutting down. All the data from the closed facilities will be moved to the remaining 1,200 facilities around the nation. Many of the locations have been undisclosed to protect the security of the data.

While the remaining data centers will house the relocated data, there has been no announcement around energy efficiency improvements to those facilities. Google recently showed off a new data center in Finland constructed inside an old paper mill. The building uses 20-year-old pumps to send water from the Baltic Sea into the facility to cool the systems. The data center will also use wind power to help run the facility.

Topics
Mike Flacy
By day, I'm the content and social media manager for High-Def Digest, Steve's Digicams and The CheckOut on Ben's Bargains…
This gorgeous Mac mini hub exacerbates the power button placement problem
M4 Mac mini with Satechi hub on a desk.

Satechi, known for its high-quality tech accessories, is updating its Mac mini hub for the new M4 model. Like previous hubs, it allows Mac mini owners to expand their storage and ports while preserving airflow, wireless signal, and performance. It looks awesome, but this time, the design highlights the problematic nature of the new Mac mini's placement of its power button.

With previous Mac mini models, the power button was at the back, making it easily accessible even when it was in a Satechi hub. The new button placement on the bottom of the PC, however, may prove even more annoying for anyone who wants to buy this accessory.

Read more
Proton VPN vs. Mullvad: Which is the best open-source VPN?
Proton VPN Plus and Mullvad websites appear in a split-screen on a PC monitor.

Open-source software is exploding in popularity and even virtual private networks (VPNs) share code for transparency. With over 100 million open-source developers contributing to the community, there’s an improved chance to find bugs and patch vulnerabilities.

Proton VPN and Mullvad are among the best VPNs available, and both are open-source solutions. You can browse the code used in Proton VPN and Mullvad on GitHub to check that there isn’t any secret logging or undisclosed data collection.

Read more
Some older D-Link routers are vulnerable to attack
D-Link Omna 180 Cam HD

A few legacy D-Link routers can be vulnerable to Remote Code Execution (RCE) attacks since the company refuses to send any updates to patch them up, claiming they have reached end-of-life, as recently posted on its announcement page.

The vulnerability is a serious issue since it allows hackers to take control from anywhere in the world and use a stack buffer overflow. This attack sends more data than the buffer size can handle, potentially corrupting critical information like the return address. Thus, hackers can take control of your PC. However, the company did not detail how the threat works, possibly not informing the hackers too much about the issue.

Read more