Home

A practical guide to sustainable IT

image

Contents

1. 16 Wikipedia Lightweight Linux distribution en wikipedia org wiki Lightweight_Linux_distribution 60 A practical guide to sustainable IT Box 4 3 System documentation Even where one user looks after their own system re membering all the relevant information about the sys tem is very difficult Where a group of people look after a number of computer systems it s wholly impractical It s a good time saving and security practice to docu ment each system installation Begin with details such as the model of the computer and any relevant serial numbers this is the sort of data insurers the police or repair agencies may require Then there s the hardware profile itself e g knowing what type of memory modules used in case you need to replace them Finally there s the system specific information such as the type of system installed hard drive configuration and critical passwords If you buy a system pre installed then you should be able to pull together much of this information Date installed technician ID from the vendor s hardware specifications and the data provided by BIOS or the operating system By documenting this information and storing it se curely it simplifies the process of system maintenance especially where there are a number of machines adminis tered by different people If you store this data as a simple text file not on the machine it is related to in the event of a fault you will need this da
2. The ecology of information technology Information Technology Is a tool like all other human tools that we have created through the ages This unit examines the general issue of how the human sys tem uses technology how digital technologies work for us how these technologies influence the wider environment we inhabit and the emerging restrictions on our future use of these tools Hardware Putting the system together 0 cess eeeee An exploration of computer hardware in its various guises and how the choices we make about hardware influence the ecological footprint of our use of IT While many may look primarily at power consumption the manufacture of digital electronics also has a major impact on the global environment In this unit we try and measure these impacts and find some ways to manage our demand for information systems Operating systems Making the system work 0008 What makes computer hardware more than an expensive collection of electronic circuits is the software we use to give the machine a purpose This unit looks at operating systems and computer hardware the issue of intellectual property rights and the influence of our choice of soft ware on the ecological performance of the hardware we use Desktops Programs peripherals and gadgets The computer desktop is the heart of our daily interaction with the power and versatility of information system
3. Adding memory allows more programs to be runin RAM rather than having data continually move to and from the hard disk Doubling the capacity of the RAM or better should make an appreciable difference to a slow computer Add a new hard disk For an existing system you can extend the storage spa ce by adding another hard disk That s the easiest op tion but it will use more power than installing a new larger hard disk but always check the largest size of drive the motherboard can address The drawback of installing a single larger disk is that you have to back up all the data on the system re install the operating software and then put all the old data back again Upgrade the motherboard Many parts vendors sell packs with a compatible mother board processor and memory which is the cheapest way to upgrade the whole system You should be able to reuse the case drives and other parts of the system with the new motherboard If you must install a new power hun gry operating system this is often the cheapest most ecological option Reuse the monitor The life of the monitor is likely if it s cared for to be much longer than the computer unit If you buy a new computer you can save money by reusing your existing monitor Upgrading laptops Laptops are a more technical problem Memory modu les are not always easily available Most 21 2 hard dri ves will work with a range of laptops but always check with the us
4. Cloud_computing an important element of the way they oper ate This is best explained by looking at Apple iTunes or Amazon s Kindle e book system In order to enforce intellectual property rights in the digital world it is necessary to track the use of data The most secure way to do that is to link the storage of data on an individual s computer to the data stored on the organisa tion s cloud servers This is enabled by having to register the device s which use these files with the company s information systems for example Apple s music files or Amazon s e book In this way services can be provided the movement of data tracked and the use of in tellectual property policed While there has been great interest in the efficiency of cloud storage there has been lit tle debate about the enforcement of tighter in tellectual property rights over digital data and the effect this has on society Human culture has traditionally been shared and that s been the key to the development of knowledge and learning In contrast lodging information in the cloud enforces strict boundaries on peo ple s ability to share and re work re imagine the elements which make up our culture One of the most debated points about the cloud is the way in which these systems log large quantities of data about individual s patterns of data use and communication This enables all sorts of profiling activities in order to identify people s attitudes and
5. In the final analysis in choosing which op erating system to use on the equipment you have the most important indicator must be that it satisfactorily does what you need to do Whether that is achieved using proprietary or free software must be part of the decision process that you undertake when you de sign the specification of the computer system The important issue is that you are aware that you have a choice between different operat ing systems that you do not have to accept sys tems as they are installed or provided and that those choices result in very different outcomes in terms of costs intellectual property restric tions and compatibility interoperability 4 2 OPERATING SYSTEMS AND OBJECTIVES perating systems are installed to fulfil a purpose although the system might be the same it is how the components of the system are selected and configured which give the sys tem the ability to carry out the tasks we require of it When it comes to defining the roles of different machines and selecting the software to fulfil those roles we see another distinction between proprietary and open source systems e With proprietary software there is a clear dis tinction between roles For example there is one system for Windows desktop use and another system for Windows server machines You pur chase software to fulfil the role you require of it e With free software and to some extent the Ma cintosh
6. The reason for this relates to the way the first IBM compatible PC was created Rather than being designed as a wholly proprietary product the rush to get a PC into market meant that it was quickly cobbled together from a range of off the shelf components available from hardware manufacturers While each individual module or circuit board is covered by the same intellectual property re strictions as closed hardware assembling these 5 Wikipedia Modding en wikipedia org wiki Modding 6 Wikipedia Hardware restrictions en wikipedia org wiki Hardware_restrictions 7 For example Electronic Frontier Foundation Jailbreaking Is Not A Crime www eff org pages jailbreaking not crime tell copyright office free your devices different elements together to make a computer system is not As we ll examine later this allows greater scope to create a more efficient computer system tailored to the user s needs 3 2 1 Closed hardware as an obstruction to repair and modification The major hurdle in managing the ecological im pacts of closed hardware are the obstacles to changing the components of the system or sim ply being able to repair them affordably Most mobile phones have software based power man agement controls which permit the user to select various modes to reduce the energy consumption of the device but this represents the limit to what is easily legally permitted Other consumer elec tronic devices such as
7. To further improve the demands made upon your system when using the web block pop ups from the browser and consider installing plug ins to filter adver tising and web bugs For a more comprehensive approach to controlling the amount of data downloaded and to filter connections against certain types of content or to block access to certain sites the most effective approach is to set up a proxy server Websites and content Many of the rules which apply for the sending of email attachments also apply for the creation of websites web pages The impact of a website is proportional to its use reducing the size of individual pages and downloaded files will reduce the bandwidth required to serve the site In general static content uses less power to serve pages than database driven websites and static pages require less power to view than pages heavily dependent on client side scripting There has been little debate on the issue of web bloat and its impacts Reducing the amount of data required to serve pages is a design issue and to control that impact requires a positive effort to control the amount of data required to view content across the site Thin client networks Thin clients utilise the power of a central computer to enable low powered terminals to undertake common IT applications consequently they are a way to use much older machines to achieve more powerful infor mation processing tasks As thin client netw
8. and on that simple analysis information technology has a number of serious problems which need to be addressed Some relate to the supply of min erals while others such as energy consump tion are implicit in the nature of the materials involved in the process There are ways to ad dress many of these issues However they re not business as usual which is why it requires a major institutional and ethical change within the information and communications technol ogy ICT industry As consumers of these goods we have a role to play in this process partly by lobbying for better reporting and environmental standards but also by changing our own prac tices to minimise the impacts of the work we carry out using these technologies To make the diminishing stock of raw ma terials last longer we need to extend the life of all electrical goods At present digital electron ics is only achieving a fraction of the lifetime that could be achieve if they were designed for a longer life The difficulty for the electronics in dustry is that longer life will lead to lower turn over and that in turn means that the nations who have specialised in the mass production of electrical goods will grow more slowly Another great step forward would be designing devices in ways that maximise recycling and reuse and to remove as much of the toxic content of elec trical goods as possible so that the end of life reclamation of IT equipment does n
9. open and closed hardware is is to look at one recent trend which defines the difference between the two the jail breaking of Apple and Android phones and the modding of certain types of games console Closed proprietary equipment such as mobile phones and games consoles are not intended to be serviced or modified by their owners In many countries it s an offence under intellectual property law to try to modify the de sign of these devices in order to adapt or extend the way they operate This has come to a head re cently as the result of computer enthusiasts cir cumventing or removing the manufacturer s limi tations on the functions of machines removing blocks to certain types of activity or to allow the running of new or modified software In response the companies involved have brought court cas es against those responsible which has in turn made modding and jail breaking campaigning is sues amongst many digital rights activists For most PCs and similar hardware the restric tions on modification are not so strict Much of the PC hardware people use both laptop and desktop machines are to some extent designed to be mod ified On laptop machines you can in most cases change the memory modules and hard disk drive and replace the internal battery when it fails On desktop machines almost all the components can be modified or swapped allowing much greater freedom over the configuration of the system
10. suchas running websites or file servers While this can be difficult for the average person to organise at home IT recycling projects offer the ideal space to experiment with wired and wireless networks and the configuration of services to run over networks Having such a capability can be ex tremely valuable for training as fully functional networks are usually only found in universities and corporate IT training centres For projects which include arts or multimedia components this also allows the testing and simulation of more complex multimedia content before pub lishing it online If the site doesn t have a live in ternet connection it s also possible to simulate online services over a local network to provide experience and training in the use of email the web and other internet services able disposal route for the waste it generates In those states which regulate electronic waste disposal the waste produced by community groups even not for profit groups may be classed as commercial waste and disposal will cost That need not be a barrier if the groups 16 Wikipedia DIY ethic en wikipedia org wiki DIY_ethic 17 For an example of offline Internet services training see Free Range Network accessed June 2012 The history of the Community Linux Training Centre Project www fraw org uk projects community_linux cltc_history shtml 146 A practical guide to sustainable IT charges a gate fee for the waste
11. we might believe that we are working many times faster than we were five or ten years ago In reality that s not true As the power of computers has developed and the speed of computer networks has increased so the amounts of data being moved around have grown too This raises an interesting ecological paradox for the entire IT industry as its capacity has never been constrained the IT industry has never had to try and make more efficient software or data standards The result of this is that while the pro 7 Wikipedia Moore s Law en wikipedia org wiki Moore s_ law cessing of data has increased for system users the perceived increased in performance is nothing like the actual increase in system speed A large part of those speed capacity increases have been expended moving more and more complex data One factor in the increasing bloat of soft ware is that older hardware can appear to be come slow and inefficient This usually happens when operating systems are significantly up graded for example the transition from Win dows XP to Windows Vista As a result per fectly serviceable hardware may be scrapped due to changes in software not as a result of the hardware s inability to function This is an 6 Wikipedia Cryptographic hash function en wikipedia org wiki Cryptographic_hash_function End of life and disposal 135 example of perceived obsolescence Whether it is because the older hardware can
12. Bremek terete Suara ars ol mip eRe mapt ett Tip en hhi Thap dee palo Popata iha naai ce reee ie eo er nee goara Boy a 82 A practical guide to sustainable IT Box 5 5 Check list for desktop systems While the impacts of the machine are important the time the user spends sitting in front of the machine is often more significant in terms of the ecological impacts therefore improving our personal skills and methods of using the system is an ecological issue Always configure the operating system s power man agement settings to minimise energy use both by the machine and by the monitor attached to it Besides configuring the shutdown of the monitor after a period of inactivity if the function is available con figure the system to dim the brightness of the monitor when it is not actively in use Operating systems that allow the configuration of a lightweight desktop environment or the lowering of the display resolution can be used for older hardware to increase the performance of the system and or re duce energy consumption Besides configuring suspend sleep or hibernation when the machine has been left idle include icons on the desktop to activate the suspend hibernation function easily or to lock the desktop when not in use Try to use a monitor speakers and USB devices which are able to power down automatically when the ma chine hibernates or is shut down On newer machines try not to inadvert
13. PHYSICAL SECURITY he physical security of the room or build ing where equipment is kept might not ap pear to be a critical component in sustainable IT However IT systems and information appli ances digital cameras music players etc are expensive pieces of equipment replacing them entails the expenditure of a large amount of energy and resources too Ensuring that they are physically secure both from theft and ca sual damage is an essential part of making the equipment function for as long as possible and keeping the information resources on the equip ment secure Improving the physical security around computer equipment must therefore be considered an essential part of how these sys tems are used 8 2 1 The building Addressing the security of a building is entirely dependent upon those who look after the build ing If you control the building that s simple it s your problem f the building is shared be tween many tenants that s a different problem Likewise if you share a single space be that a formal office or a space in a community centre you are reliant on others to do things for you to assist your security In that case improving se curity isn t just your problem it s about convinc ing others of the benefits they might get from the process The physical security of a building is reliant upon the individual elements from which it is constructed Doors and walls Doors are a weak point because
14. When creating passwords people routinely sub stitute 1 for i O of o 5S for s or 3 for e in order to add numbers to a dictionary word creating something like PaSswOrd instead of password or acc3s5 instead of access Such variations can easily by deduced and tested by password cracking programs using a dictionary or word list to guess words The greater problem is that because we need many different pass words users might use just a few across the whole sys tem or they might add easily guessable changes such as consecutive numbering of a root word password01 password02 etc To produce easily remembered and secure pass words you must find an approach that suits you If you re the sort of person who can remember long strings of numbers and digits then you could use truly random passwords using a random password generator to cre ate them if necessary If that s not the way you think then the strongest approach isn t to use a mnemonic password that reduces an easily remembered phrase into a string of characters To make a mnemonic pass word begin with a favourite phrase such as a line froma song or a poem Then take the initial letter of each word in the phrase to make the password while substituting easily remembered words or numbers to deal with repeti tion and significant meaning such as substituting the word space with a space
15. data downloaded by over 20 More generally proxy servers are becoming an important part of network and internet security Due to their capacity to filter connections made between machines and the outside world the proxy can monitor use of the network and block connections to sites associated with malware and other security problem For example Microsoft s Forefront Threat Management Gateway acts as a router firewall and proxy server integrating net work security and control functions into one sys tem On Linux systems one of the most popular web proxy servers is Squid which can filter net work traffic as well as caching regularly used files 25 Wikipedia Parental control en wikipedia org wiki Pa rental_control 26 Olatunde et al 2008 Proxy Server Experiment and the Changing Nature of the Web www ece jit edu tricha papers 04554305 pdf 27 Microsoft accessed June 2012 Forefront Threat Manage ment Gateway 2010 www microsoft com en us server cloud forefront threat management gateway aspx 28 Squid www squid cache org Local and global networks 107 Box 7 2 A case study The efficiency of web content There is no standard definition of the efficiency of a website Increasingly site design is about the visual appearance and usability of the user interface design not the impact of the data streams generated when the site is used With the wider introduction of broadband many
16. ever after just two years the latest upgrades to the iPad s software cannot be used with the first series iPad and so users of those devices are being forced to upgrade to the latest model 8 Leonard Annie 2008 The Story of Stuff Planned and Perceived Obsolescence www youtube com watch v N2KLyYKJGkO 9 Dannoritzer Cosima 2010 The Lightbulb Conspiracy www imdb com title tt1825163 Packard Vance 1970 The Waste Makers Reissued by IG Publishing 2011 ISBN 9781 9354 3937 0 Wikipedia Planned obsolescence en wikipedia org wiki Planned_obsolescence 1 12 Wikipedia Backwards compatibility en wikipedia org wiki Backwards_compatibility 13 Apple Computer 2010 iPad Environmental Report im ages apple com environment reports docs iPad_Environ mental_Report pdf of hardware if they wish to continue receiving software updates The problem with planned obsolescence is that there is little that the user can do to avoid the cost and environmental impacts of being forced to upgrade that s why many consider planned obsolescence to represent a greater problem than perceived obsolescence because it takes away consumer choice from the decision to upgrade In the final analysis the end of life of any device must be a balance between the service it gives the cost of using it in its current form and the costs or benefits of upgrading it Often that balance is reshaped by external f
17. generator engine should automatically slow down to an idling tick over At the simplest level using the power stored in the battery involves connecting a load across the terminals In practice it is more com plex as you also need to monitor the battery condition to prevent it being over discharged 19 Wikipedia Engine generator en wikipedia org wiki Engine generator Renewable power 157 Just like over charging regularly exceeding the battery s discharge limit will cause damage Most commercial off grid systems have a single com puterised controller This monitors both the charg ing and discharge of the battery store and gives a read out of how much energy is stored inside the battery Self built systems assembled from individual parts usually have a separate battery monitor often no more than a voltmeter and a low voltage disconnect unit Just like a charge con troller this monitors the battery voltage and in the event it falls too far it disconnects the load to prevent damage to the battery The power from the battery can be used di rectly if the equipment functions at that volt age As noted above it s essential to use a low voltage disconnect unit to protect the battery if you use the power directly For devices which do not operate at the battery voltage you will need either a power regulator to drop the voltage down to the required level or a power converter sometimes called a DC to DC or buck
18. issue of erasing data to prevent the disclosure of sensitive information 12 A practical guide to sustainable IT e Reuse and reclamation how machines can be upgraded or recycled and given a new lease of life This is a more ambitious unit which seeks to takes people beyond simply us ing a computer to thinking more technically about how they can reconfigure their hard ware to serve other needs We ll look at the options for donating old equipment but also how components can be upgraded to extend the lifetime of the equipment or installed with different software to give the machine a new function to support your information infrastructure Renewable power the options for sourcing electricity from lower carbon and renewable re sources Computers require electrical power to operate and the generation of electricity is one of the major carbon intensive industries on the planet which gives rise to a number of pollut ants besides carbon dioxide In this unit we ll look at alternative options to sourcing electric ity from the power grid and we ll also look at going off grid both to exploit renewable energy resources and as a means of taking computers outdoors beyond the reach of the mains grid The final unit contains a subject index for all the sections a glossary of the technical terms used in the guide as well as a bibliography and directory of online information sources Green advice for policy makers and a
19. only made the systems cheaper it allowed the devices to be smaller and more mobile mean ing they could be used in ways they hadn t been used before For example the pocket transistor radio or cassette player used pre existing tech nologies but in a way which created a new mass market for electrical goods Today it s the switch from analogue transistors to digital micropro cessors that is achieving the same revolutionary transformation of consumer behaviour 2 1 2 Human tools are based on rocks Within the growing ecological footprint of infor mation technology one of the most important limiting trends is the reliance of human systems on ever rarer materials To understand the sig 4 Information sourced from the World Bank s global indica tors dataset data worldbank org topic nificance of this we have to go back to the very first human technology rocks In our ancient history the first human tools were made of stone and stone is perhaps one of the most plentiful resources on the planet Wood plant matter and animal tissue were equally important resources but little of this material has survived For perhaps two to two and a half million years humans relied upon stone tools to support their daily activities The reason that the Stone Age ended was not that we ran out of rocks it was that we found some thing which was more useful than stone met als Metals are also made from rocks metal ores but these r
20. some of the most successful and longest run ning projects the groups which have had the greatest success have been those which are al lied to the free and open source software move ment It may be that because the free and open source philosophy puts a great emphasis on skills sharing and collaborative development they are more likely to create an environment which is more supportive and inclusive when training new members of the group 10 2 2 Space Most successful recycling projects in addi tion to having the motivated people with the right mix of skills usually possess another im portant commodity space It takes very little space to recycle a computer a small desktop or workbench and a few hand tools is all that is re quired Even so to be successful a project needs sufficient space e To provide for the storage of computers both waste computers which have been through the triage process and also for the secure storage of the tools and test equipment used in the reclamation process e To provide sufficient space for education and 14 Wikipedia History of free and open source software en wikipedia org wiki History_of_free_and_open_source_ software training to take place with sufficient seating to accommodate the groups who take part and e To provide if possible a space for a wider com munity of users to use the reclaimed equip ment informally perhaps with internet access note that public pa
21. 1 Guidance for internet service providers uring the late 1980s when the public first began accessing dial up bulletin boards and internet systems the role of internet ser vice providers ISPs was highly specialised and served a limited audience With the coming of the world wide web in the mid 90s the oppor tunities for public participation in computer mediated communication and expression grew and the role of service providers grew with this trend In turn as the social and political impor tance of electronic media grew civil rights cam paigners and ISPs sought to tackle the legal economic and technological restrictions ham pering wider public access to the internet en suring that the online community was open to as wide a range of social and ethnic groups as possible That objective became easier to secure in the first decade of the new millennium with the emergence of new ways to access electronics networks such as mobile smart phones as well as the development of many different interac tive and social media services which allowed easier communication Almost 30 years after it left the closed world of academia and industrial research the internet and electronic services are a vital part of many people s everyday lives and even those who do not directly use them benefit from their use in logistics manufactur ing and government administration Now we have to deal with the impacts of that success not only in t
22. 1000 512 Windows 7 32 bit P6 gt 1000 1024 Windows 7 64 bit 2048 nu Linux Graphical installation e g desktop Fedora 15 P4 1000 768 Ubuntu 11 04 P4 gt 1000 OpenSuSE 11 P3 gt 600 256 Debian 6 P4 gt 1000 512 Slackware 13 37 P1 gt 166 2128 Gnu Linux Lightweight and live distributions Knoppix 6 4 4 486 gt 90 Puppy Linux 5 2 P1 2166 Slackware 13 37 486 gt 90 Damn Small Linux 486 gt 90 Gnu Linux Text only install e g servers Fedora 15 P3 gt 600 gt 256 Ubuntu 11 04 P3 gt 600 gt 128 Debian 6 P1 gt 100 386 486 386 486 processor or better gt 256 P1 P6 Pentium through to Pentium VI processor or better including 32 bit or 64 bit multi core CPUs gt greater than the minimum for an installation gt greater than equal to the bare minimum required for operation for ease of installation double triple this figure live Live distribution runs from CD DVD so hard disk not required 38 A practical guide to sustainable IT to speed up the operation of the system That s because the more data the processor can hold in the memory the less it needs to access data from the hard disk at a far slower rate Before we move on system memory require ments are often quoted in mega or giga bytes and some new hard disks have a capacity in excess of a te
23. 2 Advanced power management options For servers where you don t always have a per son on hand to press the power button start ing the machine can be a problem especially if there are hundreds of them For machines being used as servers there s an option called wake on LAN WOL If a data packet is sent to a ma chine in suspension or hibernation containing the card s unique address number some also require a security password the machine will restart provided you have a WOL compatible network card Later the machine can be remote 18 Bemowski Karen Windows IT Pro September 2010 Buyer s Guide Power Management Software for Win dows Workstations www windowsitpro com article buyers guide Power Management Software for Windows Workstations Buyers Guide Download the product table from www windowsitpro com content content 125800 101910 updated 125800 table xls 19 For example the Less Watts projects www lesswatts org 20 powertop www lesswatts org projects powertop ly put into suspension hibernation or it can suspend operations according to its own power management configuration until it is needed again Using WOL allows a single operator to have control over hundreds of server machines often using load monitoring programs to shut them down or wake them up in order to match demand while minimising power consumption For small system users it can also be config ured to wake up file servers or data pro
24. 3 fitting machine to hardware 4 2 1 free vs proprietary software 4 1 system requirements box 3 3 thinclients eaea E A 7 4 PernpheralS E 3 4 table 3 3 5 2 1 Printina e a E E 5 3 printing versus screen e readers box 5 2 Repair and reuse 3 2 table 4 1 10 1 10 3 assembling PEST a 3 4 care and maintenance box 8 2 closed hardware aa 372M reclamation projects 10 2 Servicelife aere ee e 9 1 9 2 thimehentS aa a E N N us A 7 4 triage of used equipment 10 1 1 uses for recycled machines 4 2 2 box 4 2 Resource depletion footprint 22 poodim etas eee eer nere Dee Sl elo 8 oY titre Sacer or rerenaerun E ET 2 2 1 SCANGILY ae wea cess ceaseus nea Sele 23 2 SCENE sentence A N 8 2 8 4 buildings workplaces 8 2 configuring programs applications 6 3 PESIN See eee 8 3 2 box 8 2 S staina bility e e rene tats Zal definitions term a a a atta sence 1 1 information technology 1 2 2 4 ODCIONSisae erreur trea mnen rrs 8 1 recycling and downcycling 10 1 renewable electricity 11 1 11 3 resilience anna E e e cca were 8 1 3 technological obsolescence 9 2 Technological convergence 2 1 1 Waster ene enana naaraana 9 3 9 4 10 3 VAD ONE E a na aa aao aaao aaa aa 7212 Web sites online content 7 3 VirUSeS enone see malware Further information and index 163 ANNEX
25. 3 wc crDI
26. Age en wikipedia org wiki Stone_age Wi Wikipedia Ore en wikipedia org wiki Ore kipedia Metallurgy en wikipedia org wiki Metallurgy oN AH Wikipedia Liebig s Law of the Minimum en wikipedia org wiki Liebig s_law_of_the_minimum 9 Wikipedia The history of coal mining en wikipedia org wiki History_of_coal_mining The ecology of information technology 17 more heat for the same weight of fuel While the coal is easily accessible and reasonably priced this allows metals to be produced on a much larger scale than when wood was the only fuel source What allowed the Industrial Revolution to take off in the second half of the eighteenth century was the interaction of the technology of coal production and the improved technol ogy of metal production As metal technology improved we see the development of the first steam engines The first major application of the steam engine was pumping water from mines which allowed both greater metal and coal production from deeper mines and it was this self sustaining process which drove the In dustrial Revolution 2 2 GROWTH CONSUMPTION AND RESOURCES he effect of the information and communi cations revolution and its interaction with digital electronics has a direct parallel with ef fects of industrialisation on the use of metals Independently the elements which make up the technology computers communications lines and digital information existed well before the
27. CD R disc 0 7 0 2 0 3 no CD RW disc O17 0 6 0 9 x1 000 DVD R disc 4 4 0 3 0 07 no DVD RW disc 4 4 0 5 0 1 x1 000 DVD R dual layer DL disc 8 0 15 0 2 no 0 1 256 1 600 2 4 x100 000 10 15 0 25 128 6 750 23 x100 000 10 15 Micro drive 0 1 8 20 60 4 7 5 yes 5 Blu ray disc 25 2 0 1 no 30 50 Blu ray dual layer disc 50 iif 0 2 no 30 50 2 160 2 25 0 21 yes 10 12 320 2 000 60 300 0 12 0 18 yes 8 10 500 3 000 60 200 0 06 0 12 yes 5 12 30 50 15 30 30 50 15 30 30 50 USB memory stick Compact flash Smart media Digital data storage DDS tape USB external hard drive Hard drive in drive caddy Cost per unit for CD DVD Blu ray discs this is based on the price for a single disc when purchased in packs of 10 to 25 Price is the recommended retail price averaged across a number of brands sourced from amazon com An x figure represents the number of times the media can be reused before errors are likely to make it unusable If yes then the media can be reused over the expected working life of the technology For USB sticks memory cards this refers to the number of write operations which because of the way the storage is configured gives perhaps a fifth of this figure as complete write delete and re write operations due to the way the internal electronics of flash media function Figure represents the optimal storage lifetime of the technology before the media becomes unreadable ca
28. Hardware and Sound menu The power options dialogue allows you to configure the power management features available with the hardware you are using On the Macintosh OSX you ll find the power man agement icon in the hardware section of the System Preferences menu With Linux based systems the APM ACPI service is usually enabled automatically but to function you must be using hardware which conforms to the APM ACPI stan dard This is a particular problem with certain brands of lap top and desktop hardware developed for use primarily with Windows As is usually the case when installing Linux you need to check the compatibility of the hardware before you start As GNU Linux has become a more popular operating system power management is no longer the obstacle that it was five or more years ago To be certain that all hardware functions are available check the information and reviews of motherboard peripherals and laptop systems at linux hardware net or www linux drivers org The power management controls of the operat ing system interface with the APM ACPI firmware in the machine s motherboard The motherboard will then control both the devices connected to the motherboard as well as sending signals to the monitor and any com patible USB devices Depending upon the motherboard s BIOS settings it s possible that power management has been disabled or limited Although power management is often enabled by default you should check the c
29. Homepower Magazine website homepower com basics started lead acid batteries These have a longer life are more efficient to charge and can use up to half of their rated capacity before battery damage occurs There are a number of dif ferent types of deep cycle battery from the basic leisure batteries used in mobile homes to more advanced industrial batteries used in uninterruptible power supplies to the highly specialised gel batteries designed for use in so lar PV systems How well the system performs over its lifetime depends to a large extent on the type and quality of the battery technology used Which power source is used to charge the bat tery will depend upon the feasibility of each tech nology for the application chosen Some technolo gies are relatively mobile while others are only via ble on a fixed site Another factor is power density how much power can be produced with a given amount of space and equipment e Solar photovoltaic PV panels are the sim plest option They re essentially a passive technology you put them in the sunshine and they produce power e Wind power is the next most dense source of energy This is more complex to construct as it requires a tower to be erected e Hydro power is the next most dense The difficulty is that this requires the installation of pipework to tap a source of falling water the greater the height the water drops the greater the pressure in the pipe and t
30. Parallel processing Power server Download box Lightweight server Network support Educational recycling GNU Linux Windows Recent machine dual quad core 2GHz CPU 2 4GB RAM Good machine dual core 1 2GHz CPU 1 2GB RAM Fairly good single core 1GHz CPU 512MB 1GB RAM Old machine 800MHz 1GHz CPU 256 512MB RAM Older machine 500 800MHz CPU 128 256MB RAM Very old machine less than SOOMHz CPU 128MB RAM Challenge less than Pentium 3 500MHz and 128MB RAM GNU Linux system specs H heavy SuSE RedHat M medium Debian Fedora Mint Ubuntu L lightweight Damn Small Puppy Slackware Windows system specs 7 Win 7 V Vista X Win XP 2K Win 2000 08 Win Server 2008 03 Win Server 2003 98 Win ME 98 NT Win NT 95 Win 95 Note that Macintosh hardware hasn t been considered in the above list Different versions of MacOS are designed for different generations of Mac hardware and so the decision about which machine requires which version of MacOS is determined largely by the available hardware 58 A practical guide to sustainable IT do this but will take much longer to do so For these installations the latest versions of an operating system are used in order to have access to the latest software and hardware Medium desktop general purpose machine capable of most office type tasks communi cations
31. Production Waste reclamation Consumption Bg use of goods repair g spare parts end of life disposal other example are video display screens where although the older glass cathode ray tube CRT displays consume more electricity while in use the newer flat panel displays require as much or more energy to be expended during production 2 3 2 The importance of the embodied energy of equipment The latest digital electronics require some of the rarest metals on earth and this has increased the energy demand required to produce the devices That s partly due to the energy invested in produc ing rarer resources but also because of the high purity demanded by the semiconductor industry The laws of physics require that to make some thing purer through refining you have to use more and more energy to remove progressively more of the unwanted impurities The metals used to make microchips must be extremely pure as any impurities affect the conductive qualities and speed of the chip For those concerned about the ecological im pact of the machines they use this embodied en ergy the energy used to make the device and all the raw materials it contains is rarely measured or reported by equipment manufacturers To put that into perspective with regard to other tech nologies weight for weight the amount of fos 27 Socolof M Overly J Geibig J 2005 Environmental life cycle impacts of CRT and LCD desk
32. a significant effect on the file size The more pixels the more data is required to store the image Where the size of the file is greater than the size of the screen upon which it is displayed the image will automatically be scaled down to fit in which case it would required less data to store the image if it is scaled to a usable size before transmission Older computer monitors had a resolution of 800 by 600 pixels while newer ones can be anything from 1024 to 1920 by 768 to 1080 In deciding what size to scale the image to consideration should be given to the likely resolution of the monitor it will be viewed upon The greater the number of colours in an image the more data has to be stored for each pixel Image editing applications can reduce the number of colours in the image The effect of this makes the image look progressively more grainy although the use of filters to dither the colour distribution can help to reduce this slightly Some file formats e g JPEG allow a large number of colours to be used while others only allow a specific number of colours e g GIF The JPEG format is useful because it uses a lossy compression system to reduce the amount of data used to store colour information This has the effect of making the image look progressively more blurry as the quality factor of the image is reduced and that loss of quality is permanent if you try and re edit the image Other formats such as PNG are lossles
33. a single location such as a home or office is that disasters can happen Buildings can catch fire flood or the equipment can be stolen For this reason keep ing data in another location is advisable espe cially irreplaceable data The simplest method is to create two back up copies and store one of those in a different location The difficulty is organising how the data will be transported to the other location whether it is secure enough to hold the data and accessible if it becomes necessary to retrieve the data Another option for desktop users is to man ually back up their machine to a file server in a more secure location either within the same building via the local network or in a different building using an internet connection This can be done in many different ways e A formal network archiving program which will bundle up data and move it to a server e A network service such as file transfer proto col FTP to allow more secure access to stor age space ona local or remote server machine for sensitive data this transfer can be made using an encrypted connection e A networked file system such as shared fold ers on a Windows network or a networked file system on a Mac Linux network to share files directly between computers or e Amore secure virtual private network VPN which allows files to be shared to other linked computers across the internet both Windows 7 MacOS and Linux systems are supplied wit
34. a warning of the imminent arrival of alonger term decline in pro duction and the economic difficulties that this will create as hizghlighted by the French Prime Minister in April 2011 when told the National Assembly of France that global oil production had reached a peak and that this would have serious implications for the future of the global economy Information technology will be an important part of how humanity adapts to the restrictions imposed by the limits to growth That process begins when we accept that we must adapt our personal use of technology to work within these limits As a priority we must learn to extend the life of our electronic goods Making goods last two or three times longer creates a proportionate reduc tion in the demand for the materials from which they are made and the energy used to produce the raw materials and assemble the components To extend the life of existing equipment or remove the need to buy new more powerful equipment we have to look at the size and complexity of the software and data that are used on the machine By making the size of the software programs and the movements of data smaller and less repetiti ve it is possible to provide the services that we re quire using less powerful electronics and it reduces the amount of energy used by equipment 2 3 THE LIFE CYCLE IMPACTS OF INFORMATION TECHNOLOGY he ever greater use of IT is taking place wi thin a finite environmental sy
35. and attachments Email is still the backbone of the way people com municate and network online Email is simple to use and has the benefit that files can be 8 For example see LessWatts Tips amp Tricks Ethernet www lesswatts org tips ethernet php 9 Wikipedia Network switch en wikipedia org wiki Net work_switch the cable through twists and turns around the edge of large rooms can quickly reduce the prac tical distance between the network switch and the computer On small networks power can be saved by using a combined broadband ISDN router and multi port ethernet hub rather than using separate devices As part of the initiatives to control total and standby power consumption ethernet Wi Fi hardware now incorporate power saving func tions Unfortunately these only save significant amounts of power on larger ethernet switches For smaller devices for example in the home or a small office the greatest power savings are achieved by physically turning off the power sup ply when the computers network are not in use As noted earlier in the section on hardware it s a good idea to connect computers to a surge pro tected socket with a build in switch In a small office home the broadband router can also be connected to this type of central power socket so that when the computer is shut down the router powers down too attached to the email and easily sent to one or many recipients That ease of sending fil
36. and the server is hacked do you have an up to date back up copy of the site to quickly restore the online service Orif you routinely store data online and lose your internet service could you access that data if it is urgently required All data stored in online systems should if it has value be backed up locally too Replaceable personal data for example emails circulated reports files and informa tion shared between groups of users This type of data isn t irreplaceable because copies will be held on other computer systems The issue is how much effort it would take to reconsti tute this information if you were to lose it In most cases keeping back ups of this informa tion is a simpler option than trying to recover it from many other sources locations later Irreplaceable personal data for example draft work personal images or recordings and files which are not held on any other storage medium or computer system This is the most important data to back up because there are no redundant back up copies to replace this data in the event that the computer system is lost damaged or fails What this list illustrates is the importance of valuing the data we propose to back up If we re trying to minimise the ecological impacts of IT being able to plan how we back up and minimise the use of resources as part of that process is an essential part of a green IT strategy There is one key rule to take note of in this proces
37. and while there is a large effort devot ed to search engine optimisation or the inclu sion of advertising and web analytics as part of site design there is as yet little demand to op timise web content to reduce its download size and demand for power when displayed Many of the rules which apply to the send ing of email attachments also apply to the creation of websites web pages The content created should be optimised to provide the level of design or reproduction quality for the 7 4 THIN CLIENT NETWORKS he first computer time sharing networks were designed around the client server model Staff access the system from a num ber of simple dumb terminals sending com mands to the central computer and receiving the results of the request on their terminal displays As personal computers became more powerful especially with the development of more user friendly graphical user interfaces having many stand alone PCs on a network of fered a more flexible and scalable alternative to traditional client server networks Now the trend is swinging back towards client server networks once more As network speeds increase and cheap and scalable rack servers become more powerful the cost of developing networks of powerful stand alone 36 Wikipedia Client server model en wikipedia org wiki Client server_model application it is intended to serve Optimising PDF and images to reduce their size can save storage space r
38. argued that rather than continuing to rise as the quality of copper ore falls production will reach a peak and then decline What this means is that as they have done for the last decade or so av erage copper prices are likely to keep rising as the economy demands more of the metal and that will impact upon our use of information technology in the years to come 13 Wikipedia Peak copper en wikipedia org wiki Peak_copper 2 2 2 The limits to growth Copper is not the only limitation on our sustain able use of information technology and is not the only useful indicator of the state of human technological sustainability Forty years ago a group of scientists produced a study which fore cast that there were limits to growth This caused great controversy at the time and since then many politicians and economists have claimed that the projections were erroneous However not only does more recent research show that the forecasts are still largely correct when we use the latest data other work has shown that those who objected to the limits to growth hypothesis were wrong on a number of points At a recent conference to mark the fortieth anniversary of the publication of The Limits to Growth various scientists presented work showing that the projections of our future sustainability made in the 1970s are still largely correct today If we are to avoid this outcome then we must seek a radical change in the way
39. because if accidentally tugged they might snag and damage the other more delicate lightweight cables It s not dam age to the actual wire that s the problem If a lightweight connector is tugged hard at right angles to its connector it can be wrenched out damaging the plug the socket or both Damage to any of the essential sockets on the mother board might necessitate replacing the whole board All computer equipment needs good venti lation In a small or confined space the machine will very quickly raise the ambient temperature well above the human comfort zone and in a very small space it might be unhealthy for the machine too If you put any equipment inside a cupboard ensure that there are large ventila tion holes top and bottom either in the back or side of the cupboard to allow air to circulate If you install the computer unit the monitor or a Monitor Network RJ45 Switched surge protected socket Mouse Keyboard Hardware Putting the system together 45 laser printer in a small recess or under a shelf again make sure there is 15 20cm of free air space above and around the machine to ensure the free circulation of air And no matter how tempting it s never a good idea to leave pa pers books and files on top of computer units or monitors or in any position that obstructs the ventilation ducts of the equipment Not only does insufficient ventilation make the machine run hotter shortening the life o
40. been to eliminate the savings from new tech nology as more people use these technologies and generate a greater demand for paper 9 Business Week June 1975 The Office of the Future www businessweek com technology content may2008 tc20080526_547942 htm 10 Global Action Plan 2007 An Inefficient Truth www it energy co uk pdf GAP An Inefficient Truth Dec 2007 pdf The machine and all its peripherals are plugged into the strip and at the end of the day the user can shut down the system and then perform a hard shut down by disconnecting the power using a single switch From an ecological point of view the de bate over paper and printing also misses an important aspect of the technology of the printed word Not all printing is bad see box 5 2 It takes a lot of energy to make paper and a comparatively small amount to print infor mation upon it However once printed provid ing itis appropriately stored and cared for that information can be available to anyone with out investing further energy for years or de cades Digital information requires a computer system powered up with electricity in order to access the data and more equipment to store that data securely Each time it is accessed it requires energy the longer it takes a person to read through the more energy is consumed and if it is kept live online it requires a power ful server machine and network to hold it ready for access Depending on the ty
41. check list for in ternet service providers are then included in the appendices What is sustainable information technology 13 SECTION 2 THE ECOLOGY OF INFORMATION TECHNOLOGY This unit examines the way in which our use of information systems interacts with the human environment It encourages you to think about the context in which we use computers and the internet how our choices effect the wider environment and more importantly how global economic and environmental issues are inextricably tied to our use of information technology This not only includes the direct im pacts of power consumption or the mining of minerals but also the changes to the economy that have resulted from the greater techno logical development and mechanisation of what call the human sys tem the complex and interlinked network of interactions that we have created for ourselves 2 1 TOOLS TECHNOLOGY AND HUMAN DEVELOPMENT ou cannot look at the ecology of informa tion technology without reflecting upon the human system which has created these devic es Information and communications technol ogy are part of the human development story The trends which have created our modern day world are at work in the reasons why we created these technologies and are behind the explo sive growth in their use around the world As information and communications technolo gies have become more widespread especially consumer oriented technologie
42. con verter to step up the voltage to the required level For example most small self built sys tems operate at 12 volts but most laptops use 18 to 20 volts There are a number of power con verters available on the market Often these are designed for use in cars and can be adapted to work with small battery powered supplies Finally the battery s DC voltage can be convert ed into mains AC using a power inverter Some very expensive inverters can take any input volt age but most inverters are designed to be used with a specific battery voltage either 12 24 or 48 volts There are two general types of inverter e Modified sine wave inverters produce a very rough approximation of mains voltage This means they are more efficient but the modi fied sine wave can affect the operation of voltage sensitive equipment such as TVs and video recorders data projectors and desktop 20 Wikipedia Power inverter en wikipedia org wiki Power_inverter computers Mains lighting and many types of motor driven equipment are usually unaf fected e Sine wave inverters create a fully compatible mains supply although doing this can use 30 to 50 more energy than using a modi fied sine wave If you are only using an inverter a low voltage disconnect is not usually required as most in verters include an automatic disconnect How ever when you buy the inverter you should al ways check the voltage at which the inverter s
43. disk is easily removable and if the sensitivity of the data on the machine is a concern you would need to use hard disc encryption as well to pre vent theft of access to the data on the drive 17 Whole Building Design Guide Use environmentally preferable products www wbdg org design env_prefer able_products php 122 A practical guide to sustainable IT Box 8 1 Care and maintenance of electronic equipment The human world is not always kind to ICT equipment Dust can clog cooling ducts and reduce heat dissipation food and drink can be spilled on keyboards and other equipment and for mobile devices careless handling can slowly degrade the internal components until perhaps after a very heavy knock they fail All computers peripherals and other consumer electronics hardware should have a section in their user manual on care of the device This will give you the basics of how to care for your equipment how to carry out any routine cleaning or servicing and what methods not to use to clean the device For example some video displays especially touch screens can be sensitive to the solvents and detergents used in many household cleaners In gen eral all electronic devices can be easily cleaned using an antistatic or microfibre cloth Stains and splashes from food or drink are best removed by gentle scrubbing with a non abrasive cloth using warm water with no added cleaning agents If you spill a drink on a laptop it s
44. drive is removed from one ma chine it can be plugged into another computer and read quite easily Therefore as outlined earlier it is necessary to improve the security of all the layers in the system in order to make sure that security functions as an holistic process Assuming you ve physically secured the sys tem hardware then there are various methods of using passwords to control system access BIOS password BIOS is a firmware program held on the motherboard If you set a user 29 Yan Jianxin 2000 The memorability and security of passwords some empirical results Computer Laboratory Technical Report 500 University of Cambridge www cl cam ac uk techreports UCAM CL TR 500 pdf 30 Computer Academic Underground 2007 Mnemonic Password Formulas Remembering Secure Passwords www uninformed org v 76a 3 amp t pdf 31 Wikipedia BIOS en wikipedia org wiki BIOS Figure 8 2 Use of multiple passwords to secure desktop systems Prevents theft of hard drives Secure box case drives BIOS Prevents access password to hardware Linux only Prevents root account breach Boot loader password Encryption password Prevents access to hard drive data Account password Prevents access to user data Encryption digital signatures Public key encryption Application passworde Secures application files use of email or system password when the machine first starts up this has to be ente
45. enable similar power saving features to those used on laptops on most desktop systems in order to reduce their every day power consumption e For Windows XP to Windows 7 the standard power management system offers three modes High Performance Balanced and Power Saver If you re not editing large colour images or manipulating large databases and spreadsheets Power Saver mode will make little difference to the way the system ap pears to work and you can always switch back temporarily if you need to undertake more powerful data manipulation There are 17 Wikipedia PC power management en wikipedia org wiki PC_power_management Operating systems Making the system work 63 Box 4 4 Power management and the machine hardware Power management is an issue that developed alongside the growth in mobile equipment during the early 1990s especially laptops where prolonging battery life was an important consideration to the usability of the device As the technology has evolved it has become an important factor in managing the power consumed by desktop and server machines too New microprocessors particularly the multi core type can be configured to run at different speeds The amount of power the chip consumes is proportional to its operating speed and the supply voltage of the processor Varying the speed of the CPU from the operating system performs two roles It prevents excessive heat generation when the power of th
46. in curly brackets Over the last few years we ve seen some ports like the parallel printer port and 46 A practical guide to sustainable IT more recently the PS 2 keyboard and mouse ports fade away as the world has switched over to the ubiquitous USB Some like the DVI video port were often included but seldom used Irrespective of their popularity table 3 3 lists commonly occurring motherboard connec tors so that you know what s what To return to a point made earlier even if talking about it feels challenging hardware can not perform any useful function unless told to do so by a computer program Now to make the hardware into something useful we have to load an operating system onto the machine and that is an equally complex subject Hardware Putting the system together 47 Box 3 6 Purchasing and upgrade check list Upgrading is always better in the short term buy new for the long term Providing you can buy affordable components upgrading a system is often cheaper and less ecologically damag ing than buying a new system Most systems if cared for will last three to five years With some upgrading you could get that up to between five and seven years of useful life Unless you have to buy more powerful machine because you are required to use a certain op erating system there are a number of ways to increase the power of an existing system and prolong the life of its components Add more memory
47. inch floppy disk drives became obsolete long ago and even the 32 inch floppy drive is now almost history abandoned in favour of CDs DVDs and USB memory sticks There are commercial archive services which read old computer media and convert old file formats to modern equivalents but they are expensive Therefore much of the data generated on these early computer sys tems has effectively been lost Unlike books which are directly accessible to human interaction access to digital information is intermediated through technological standards and as those standards change important or his torically valuable data can be lost For example if an early Apple or IBM computer user had written a literary or technical work of great significance but it was never published in print it is now inacces sible as a result of the obsolescence of the tech 1 Wikipedia Apple II en wikipedia org wiki Apple_ll 2 Wikipedia IBM Personal Computer en wikipedia org wiki IBM_Personal_Computer 3 Wikipedia CP M en wikipedia org wiki CP M nology used to store the information One notable example of this problem was the BBC s Doomsday Project an update to the English Doomsday Book carried our in the mid 1980s the data from which was almost lost due to the obsolescence of the technology used to store it If data being created today has value for the future then you have to guard against the ob solescence of the hardware and sof
48. influence of desktop computers on the sustainability of information technology Surprisingly what we find is that the variable which has the greatest impact is not the ma chine it s the machine s user The way we use desktop computer systems and how we use and gen erate data has a great effect on the ecological footprint of the system For example the programs we use and how well we understand those programs and their functions have an impact on the environment Certain peripherals such as printers also have an impact as a result of the way we use them and if we look at recent trends it s the effects of information capture gadgets such as digital cameras and sound recording that are driving the storage capacity demand of IT When we consider the wider global network of computers the increasingly virtual nature of the relationships people maintain is driving the de mands on network connections and data storage Over the next four units we ll examine the ecological effects of desk top computers and the ways we can tackle them In this unit we ll look specifically at the issue of desktop computers in the next we ll look at information storage and the measures we can use to keep back up and secure information then we look at computer networks and how our use of data influences the efficiency of data movement and resource consumption and finally we ll look at physical security and maintenance 5 1 THE ROLE OF THE USE
49. interests Primarily this data has commercial value to marketing and public relations agencies and that has a whole number of negative ecological impacts given that such a large part of the in ternet s capacity and increasingly direct mail is tied up conveying sales information More controversially this same data has increas ing relevance to the state security role of po lice and security services and by extending the powers of the state over people s data these systems could potentially be used to police the freedom of thought expression and communi cation enabled by digital communications Finally through various online services people are lodging more of their data online As a result the demand for processing power and data storage is increasingly being driven by the 16 Taylor and Koomey 2008 Estimating Energy Use and Greenhouse Gas Emissions of Internet Advertising imc2 com Documents CarbonEmissions pdf 94 A practical guide to sustainable IT Box 6 3 Basic rules for making back ups on removable media However you choose to back up files there are certain ba sic rules to ensure that the process works well and that the data stored is readable in the event of the loss of cor ruption of files When regularly backing up current work using reusable media always store the back up in a secure location if storing sensitive information the back up should be stored with a level of physical security that
50. less resource hungry than Gnome although it provides many of the same features Finally LXDE is the lightest and on older hardware it definitely improves the usability of the desktop However while XFCE LXDE will work well with most applications fast video programs or the animated content of web pages may not work well or at all Finally with both Windows and Linux another way to squeeze some extra speed out of the system or slightly reduce power consumption further is to run the display hardware at a lower resolution For example most new high definition HD displays are 1920 pixels wide and 1080 pixels high If you re primarily carrying out office work or internet browsing on the machine rather than playing video games or watching DVDs you might be able to run the display at a lower setting to save pro cessing power e g 1280x1024 1152x864 or 1024x768 You may also be able to reduce the colour depth of the display Provided the video hardware can support the change without causing problems the effect of reducing display resolution and colour depth is to free up memory and reduce the amount of power used by the video dis play electronics 74 A practical guide to sustainable IT ing the equipment or electrical faults causing fires while the machine is unattended As out lined in section 3 4 and figure 3 8 the easiest way to isolate the system from the mains is to use a switched and surge protected plug strip 5 3 PRI
51. more energy during their production they are often no more efficient overall when we look at their life cycle impacts For example a life cycle study of a 2 gram 32 mega byte DRAM memory chip estimated that 1 600 grams fossil fuels 72 grams of chemicals 32 000 grams water and 700 grams of gases mainly nitrogen were used during its production and the production of silicon wafers from quartz used 160 times the energy re quired for ordinary silicon metal That means the laptop in which this chip would have been installed would use less energy during its working life than was required to manufacture its memory chip Note also that carbon dioxide from energy use is not the only significant greenhouse gas produced by semi conductor production For example nitrogen trifluoride is an etchant used in the production of silicon chips and LCD displays and although released in very small quanti ties it is 17 000 times more potent as a contributor to the greenhouse effect than carbon dioxide At the heart of most digital equipment is the moth erboard This is a large printed circuit board mounted with chips and other system components and connectors which link it to other parts of the system using wires and ribbon cables The motherboard is most easily seen inside a desktop computer When you look at a computer motherboard most visible is the aluminium in the cooling fins heat sinks on the microprocessor and other high power heat producing chip
52. of all the pages had a size of more than a mega byte and 2 were over three megabytes e Sorting the web pages by size there is a general trend for larger pages to be dominated by Javascript code files rather than text or graphical data smaller pages were proportionately made up of more graphical data and e Isolating the types of information contained in each page text and graphical data made up a third of the average page the rest was formatting style sheet and control flash Javascript data Using the knowledge gained from the study of other sites the Free Range Network redesigned their site using a minimalist standard Rather than use a database driven dynamically created approach a static page design was used instead of using automated tools to generate page content simple HTML editing tools allowed pages to be created with a minimal amount of HTML tags within them control and formatting data were kept to a minimum graphical data was processed to reduce its size and a design scheme was chosen to minimise the need for overly complex or large graphics At the end of the site redesign the average file size across the 10 pages from the Free Range Network s site was 169 kilo bytes about a sixth of a mega byte and on average each page had just eight graphic style or Javascript files associated with it As a result of the changes the amount of server space the website occupied decreased by 20 When the new site desig
53. of electrical circuits which need to be told what to do by a computer program The central processing unit CPU of the machine is designed to carry out a set of instructions contained in a computer program Each instruc tion is initiated by giving the CPU one or more numbers which represent the instruction called the opcode and any data it needs to carry out that instruction call the operand The CPU then executes the instruction and stores the result if any inside its own internal memory called registers or inside the main memory system Without the instructions supplied by the software program the hardware is just an expensive collection of plastic metal and chemically altered silicon connected to a power supply What makes the computer a useful tool is the operating system that controls the hard ware and that provides support for the appli cation programs which the user runs There are various forms of operating system and some are more complex than others but understanding the role and functions of the hardware is an es 20 Wikipedia Central processing unit en wikipedia org wiki Central_processing_unit 21 Wikipedia Operating system en wikipedia org wiki Oper ating_system sential part of understanding the role and func tions of the operating system By understanding the principles of how the functions of the com puter are organised you will be able to work more easily and efficiently and quickly id
54. of many power ful machines The practical difference is that the power and primary cost of the hardware is based around the server For example client server networks have become an attractive op tion for schools and educational institutions because of the lower upgrade costs Rather than replacing all the machines on the net work the older lower powered machines can be retained and their life extended by using 110 A practical guide to sustainable IT Figure 7 1 A client server network Thin clients them as thin clients Much of the expense of the upgrade is the cost of the powerful server which runs the system Then as the older cli ents fail or become unserviceable they can be replaced with cheaper purpose designed thin clients further reducing the power consump tion of the system The thin clients run a minimal operating system On old PC machines the system is in stalled like a conventional stand alone operat ing system on purpose designed thin clients the system is often an embedded software system held in flash memory Being able to do away with hard drives and other components of the stand alone desktop system is one of the reasons why purpose built thin clients are cheaper and use less power The central server runs a dedicated time sharing system This runs the programs re quested by users and sends information to generate the desktop display back to the ter minals Time share systems were originall
55. off site storage the system user admin istratoris involved but it also relies upon oth er agencies in order to provide these services These might be free services contracted ser vices or informally organised storage offered by virtual communities or social networks The main concern with all off site storage is how secure the data is and whether it can be accessed when required 6 2 2 System level back ups We ll work through figure 6 2 from left to right The process begins with the hard drive inside Information storage and security 89 Figure 6 2 Back up pathways Local network storage Individual files folders Computer hard drive s i 1 a i oy mastering program d 09 CD DVD Blu Ray Optical disc storage Drive caddy Digital tape File server or networked machine System administrator the computer Information on a computer hard drive is vulnerable to hardware failure corrup tion of the operating system for example by malware or user error and of course theft of the machine or a disaster which befalls the building the machine is located in There are various ways to protect the information stored on a machine and each option gives a differing level of protection Firstly it is a simple procedure to duplicate the contents of the hard drive most straightfor wardly by operating a second hard drive within the same machine There are systems which can do this automat
56. or eco nomic to refurbish repair them That does not mean the whole unit has no use and must be scrapped Parts of the mechanism could be stripped down and components reused in order to provide the parts to repair unservice able goods Stripping down old equipment can also act as a valuable teaching aid for those learning the skills of electrical repair and being able to separate waste materials into separate metals plastics and waste elec tronics allows a high price to made from the sale of these materials to commercial recla mation companies Repairing computers and information devices is a very much simpler task than trying to repair the previous generation of analogue electronics That s because digital electronics have a more standard format although the electronics are broadly similar it s the software which makes them function in different ways Desktop PCs are a good example of this As outlined in unit 3 the circuit boards cards hard drives and other components are manufactured according to a standard design which makes individual parts in terchangeable An unserviceable PC or a PC with an outdated motherboard could have its case hard drives and other components reclaimed and rebuilt with a more powerful motherboard only the old motherboard need be scrapped How the reclamation process is carried out is often determined by the structure and objec tives of the project There are many examples of computer reclamati
57. or underscore _ charac ter or the word up with the caret character For example e Take the phrase It is a far far better thing that do this reduces to iaf btld initial letters ignoring the repetition of characters and including the punctua tion e The phrase may the force be with you this reduces to mT4BwU alternates character case with each word but uses the sound of force to indicate a num ber and e The word encyclopaedia stringing out the word by its syllables this can reduce to Ns1clOPdA By turning the characters of a password into mnemon ics small units that represent an idea you can con struct a seemingly random password in a way that s far easier to remember We each have our own meanings and preferred ways of associating and breaking down words and phrases which introduces some randomness in the setting of the mnemonic As a result even if the phrase is the same two people may not reduce it to the same set of mnemonics 126 A practical guide to sustainable IT vent the passwords of the system s root user account Setting a password on the boot loader prevents this e Hard drive encryption password If the file system has been configured to encrypt the contents of one or more hard drives you will be prompted for this password before the ma chine can finish loading the operating system Hard drive encryption is the be
58. owner permission has happened on the Kindle service perhaps ironically one of the books deleted was George Orwell s 1984 5 5 FILES FOLDERS AND ORGANISING DATA A the speed of data networks has increased and with the advent of downloadable TV and radio programmes the amounts of data streaming into computers has grown exponen tially At the same time we have more digital capture devices from mobile phones to digital audio recorders video stills cameras and im age scanners for digitising images and printed materials which routinely generate giga bytes of data see box 5 3 All of this data fills our own computers and we re file sharing and emailing large quantities of it to friends and contacts via the internet replicating multiple copies across computer networks and creating a greater de mand for storage Once data has been downloaded to a com puter the next issue is how those files are or ganised Again the growing size of files has been driving the demand for larger hard drives on desktop computers That s partly due to the downloading and editing of video although the larger capacity of digital cameras and portable music players means that the data imported to the system are becoming ever larger as con sumer gadgets store larger quantities of files As the sources of data have grown so the total number of files on a hard drive has increased substantially too Perhaps a routine example of the growth in files w
59. reclaiming electronic goods so that they can di agnose any faults or problems which exist with them and classify them according to the likeli hood of repairing reconditioning them As the electrical goods come into the project they must be sorted into three categories e Serviceable the goods have no faults and are in working order In order to comply with electrical safety regulations in many states this may require a qualified electrician to carry out earthing and electrical safety tests in or der to certify them ready for reuse Once certi fied these goods can immediately be reused by the local community without the need for further work or modification Unserviceable the goods may have minor faults which need rectifying In contrast to 4 Wikipedia Portable appliance testing en wikipedia org wiki Portable_appliance_testing 142 A practical guide to sustainable IT the financial restrictions which operate within commercial reclamation organisations where the most practical economic option is to re cover the scrap value of the materials this is the type of repair and reclamation work which could be carried out at a low cost if a project could be developed to organise the required training and safety certification Once repairs have been carried out the goods can be passed as serviceable and made available for use e Unusable for a variety of reasons goods can be unusable if it is not practical
60. style cathode ray tube CRT monitors in order to stop the screen s phosphor coating degrading through over use and were use ful because they prolonged the life of the CRT monitor This feature is now redundant with the development of flat screen monitors Moreover screen savers don t save energy In fact when they create complex animated or fast moving images for example music visualisation soft ware they can use far more energy than a blank screen Even so screen savers are important Set ting your screen saver to start after four or five minutes without any activity and requiring a password to unlock it is an effective security measure against casual intrusion on a computer system As in the case of power saving put ting an icon on the desktop task bar to lock the desktop enables the user to activate the screen saver when you leave the computer With newer flat panel monitors it s im portant to configure the system so it turns the display off when not in use This is usually part of the power management configuration re cently manufactured CRT monitors have this feature too After a certain period of idleness the display will be switched into standby mode saving a large proportion of its power consump tion How long before the screen goes blank is set by a slider or list box in the power manage ment menu On most Linux systems and some proprietary Windows applications another im portant saving can be
61. switch to a power saving state when you are away from the computer There are two steps you should undertake to implement this e Configure the power management system to suspend also called sleep or hibernate the computer when you are away from it for a cer tain length of time Of the two hibernate is the most secure because it backs up any open programs to the hard disks rather than to the memory unless the programs used have the option to save a back up copy at regular in tervals to prevent data loss The downside is that restoring from hibernation takes longer than from suspend and for that reason peo ple avoid using it How long you set before the machine automatically enters the suspend hibernate mode depends upon your work pat terns Ideally set this to 20 to 30 minutes or less e A better option is to place an icon on the task bar or desktop that initiates suspend or hiber nation when you click it This is more predict able because you decide when the mode is ac tivated and if used routinely it will save more because the computer need not be inactive for a period before power saving is enabled The default time limit in the power saving configuration should still be set as a back up in case the user forgets to click the icon but putting an icon on the desktop allows more timely control over the power consumption Many people configure screen savers on their desktops These were developed for use with old
62. tal container to exclude all magnetic fields When archiving data onto CDs DVDs always label the disc with an identifiable index for example the date the back up was made and a few words to describe the content When making a large number of archive CDs DVDs crea te a listing of the directory tree on the disc and store it as a text file these files can be searched when you want to find a stored file rather than manually searching the discs Indexing the CDs DVDs according to the date they were made using the format year month day disc number e g 2012 03 12 01 This creates a unique index key to identify the disc and keeping the discs in date order allows them to be accessed quickly when required Optical discs require careful storage to maximise their working life e Store the discs in a CD DVD folder to protect them from damage or if making a large number of discs you can store them on the spindle containers that the blank discs are supplied in e Never expose the surface of the disc to strong light for long periods of time particularly sunlight or near to bright fluorescent lights ultra violet light damages the polymers in the disc e Keep the discs in an environment that has an even temperature and protect them from extremes of heat and cold e Handle the disc by its edge and centre hole and avoid touching the surface of the disc as the grease dirt from fingertips encourages dust and fine grit to stick to
63. text only access op tion which allows pages to be viewed without their active components which can be a prob lem not only for older lower power systems but also for those using Braille text to speech screen readers 7 2 3 Proxy servers So far we have looked at the steps which can be taken to minimise the impacts of world wide web use from the web browser For larger organisations many of the above features can be enabled with a web proxy server Users of the network access the web through the proxy and the rules defined 22 Adblock Plus accessed June 2012 adblockplus org 23 Wikipedia Screen reader en wikipedia org wiki Screen_reader 24 Wikipedia Proxy server en wikipedia org wiki Proxy_ server for serving pages will block and filter certain types of content as well as blocking selected websites Proxy servers are becoming more popular on small and home networks too as they are a simple way to implement content filtering as part of parental control systems The greatest benefit of proxy servers is that they help to control the amount of data down loaded by users of the network As popular con tent can be served from the local network they can also speed up access to information Reducing the amount of data downloaded has a positive ecolog ical impact and where data download is metered it can also reduce costs Recent research suggests that a proxy server might reduce the quantity of
64. that has a high mega pixel count turning down the image resolution will reduce the size of the files produced without significantly affecting the image quality 80 A practical guide to sustainable IT Figure 5 1 A traditional directory tree My Documents ii Holiday images To standardise the organising of files on a computer a collection of embedded labels called metadata box 5 4 has been developed to describe the contents of each file Rather like the track title and artist information used with MP3 music files by labelling files across the system with information on their content it makes the job of locating and using the files data stored on the system much easier In prac tice describing the content using metadata pro duces more accurate results Most desktop operating systems have a desktop search indexing system Windows Vista and Windows 7 come with Windows Search Macintosh systems use an application called Spotlight and Linux desktop environ ments usually have a search facility built in al though many use dedicated search applications such as Beagle In addition there are a variety of proprietary and free desktop search applica tions which can be installed The benefit of a more sophisticated search system is not only its ability to index data Most desktop search applications allow you greater control over the content and formatting of file metadata making the management of metadata
65. their licences in the 1990s they had an incentive to get as much capacity out of their networks as possible and through new transmission pro tocols they achieved a higher capacity than initially expected In contrast the designers of web systems have no such pressures on the quality and efficiency of their work Irrespective of whether we access the web or not we re all paying for bloat Not just in the extra money we have to pay to download and manipulate all that data we re paying for it ecologically Transferring greater quantities of data requires the internet industry to buy higher capacity hardware that in turn uses up the finite stocks of rare metals and generates toxic waste streams from manufacturing new machines and disposing of old equipment Making all that equipment also uses a large quantity of energy as does running it which also contributes to our depletion of finite en ergy resources the production of pollution and climate change Unfortunately there is no simple route to achieving greater efficiency in web design In 2010 the Free Range Network undertook a small scale study to evaluate the design related impacts of web use see summary in Box 7 2 The purpose of the study was to highlight strategies to redesign their own web site in order to make web pages more efficient when accessed reducing data downloads and the amount of processing power required to display the page A general prob
66. they accept and the fees collected are sufficient to fund the disposal costs of the project Before setting up any project it is important to identify any regu latory hurdles that need to be resolved before the project opens Often such restrictions only involve a one off fee for registration although there may be a burden of paperwork to com plete afterwards in order to demonstrate com pliance with the law Another important factor is the availability of disposal contractors These might be e waste reclamation companies but if the project can sort different waste streams to the required standard then they could sell the materials to 18 Wikipedia Gate fee en wikipedia org wiki Gate_fee merchant recyclers This creates a positive envi ronmental benefit because separated waste ma terials can be more easily and cheaply recycled than bulk disposed waste reducing both the pollution created and the resources wasted Bulk electrical waste is usually crushed fragmented and then incinerated to recover only the metal components waste separation allows more met als to be recovered from the e waste and the plastics can be recycled rather than incinerated Separation may also create a stream of usable components which can be sold to others engag ingin similar work for example people who have trained with the project and who are renovating maintaining their own equipment Reuse and reclamation 147 SECTION 11 RENEWABL
67. they are designed to open A door can be strengthened by adding more hinges and locks and reinforcing the door with ex 6 Wikipedia Door security en wikipedia org wiki Door_se curity have a regularly updated list of service provid ers or trades people so that in the event of a problem occurring with the regular provider you can quickly switch to another tra wood or metal If you use a deadlock once locked the door can t be opened from the inside without a key making it harder to remove objects if entry is gained by other means However there s no point strengthen ing a door to a point where it s much stron ger than the walls around it for example a door set in a stud work and plasterboard wall otherwise it s just as easy to go in through the wall e Windows Windows are a weak point but often a last resort for illicit access due to the hazards of climbing over broken glass Using key locks on window frames help be cause once broken the window frame can t be opened which makes it much harder to climb through The only effective way to se cure a window is with internal bars or welded mesh securely fixed to the wall external bars fittings can be removed more easily Roof and floor spaces These are often over looked For adjoining buildings if the roof space is shared then you ll need to secure any access point into the roof space from the inside In offices which share a void above a suspende
68. this is a simpler task because all the programs required to reformat open media files are usually included with the operating system or can be freely down loaded Of the three video is the most difficult media to work with Often reducing the size of vid eo files is a matter of trial and error in each case Using the video editing application s available for your operating system the file is first imported and then various options are tried to reduce the frame rate size of the video frame and the quality of the audio track In contrast the process of re 13 Adobe 2004 Adobe Acrobat 7 Reduce PDF file size www adobe com designcenter archive acrobat articles acr7optimize acr7optimize pdf 14 OpenOffice accessed June 2012 Extensions Presenta tion Minimizer extensions openoffice org en project PresentationMinimizer ducing the size of image and audio files is simpler and has more consistent results Audio and video files are processed using codecs encoding and decoding standards which convert the compressed data into audio video data ready for reproduction and vice versa The main consideration about processing digital media for transmission is quality file size and the quality of the video sound or image reproduction are directly related Often it s not simply shrinking the size of the video image which has the great est impact on file size Reducing the number of colours used to display the visual data o
69. tual property issue as more expensive multi 39 Edununtu help ubuntu com community Edubuntu Documentation EdubuntuCookbook ThinClient see also Hargadon Steve accessed June 2012 Rescuing a School Technology Program Linux Thin client Overview 40 Rais Mark accessed June 2012 Why Linux is the Logical Choice for the Classroom www reallylinux com docs inuxclassroom shtml 41 Lai Eric 2007 Microsoft adjusts to add support for thin client computing ComputerWorld www computerworld com s article 9015280 Microsoft_adjusts_to_add_sup port_for_thin_client_computing_ 42 Microsoft accessed June 2012 Windows Embedded Thin Client www microsoft com windowsembedded en us evaluate windows embedded thin client aspx Local and global networks 111 user licences may have to be purchased to run certain software across a client server network rather than a single licence for use on a stand alone machine Overall whether or not a client server network creates cost and energy savings depends upon the types of tasks carried out by existing network us ers and the extent to which any pre existing hard ware can be reused when creating the network Given the current trends in computing especially the shift towards more centralised online servic es it is likely that client server networks will be come more widely used in situations where many people share the same network system 112 A practical guide to sustainable
70. up as you perceive them the risks reliability and relative costs of different options to develop a sustainable solution to your IT needs and then choose the set of op tions that can be reliably and easily maintained as part of your everyday routine 8 1 2 Modular design It can be difficult to consider the whole system design in terms of its sustainability There are so many different aspects to sustainable IT that it is easy to become overwhelmed with the detail To assist in the design process it helps to break down the system into its constituent parts defining the larger system as a series of interconnected modules For more complex systems breaking down the problem into its constituent parts allows those with needs or expertise in different areas to evaluate the op tions that reflect their interest Creating a module design involves identify ing the physical or logical boundaries which de fine each part of the whole system The value of breaking down our needs or systems into small er parts is that the problems related to each small part of the system are more easily quanti fied and so can be more easily managed Each part independent of the rest can be designed 3 Willcocks and Lester 1996 Beyond the IT Productiv ity Paradox European Management Journal vol 14 no 3 pp 279 290 dx doi org 10 1016 0263 2373 96 00007 2 4 Wikipedia Triple bottom line en wikipedia org wiki Triple_bottom_line t
71. websites have allowed the scale of data transmission to expand without any perceptible check on the impacts this has Although there has been much discussion about the bloat of software as yet there is little information available on the bloat of web content and the impacts of this bloat on the increasing ecological footprint of information networks As part of efforts to produce a lower impact website in 2011 the Free Range Network conducted research on the websites of UK campaign groups political parties and new media Sixteen websites plus the Free Range Network s new site were selected for study On each site the ten most popular web pages were downloaded In most cases a web page is not a single file it is made up of a central HTML page and associated with that are separate files to provide graphical images control and formatting data Together the 170 web pages downloaded amounted to over 10 000 individual files comprising a total of 160 megabytes of data The content was sorted to produce a statistical snapshot of the 170 web pages and while the sample is not large enough to produce statistically rigorous results the analysis produced some startling facts e A fifth of the 170 web pages downloaded had 100 or more files associated with them as a general trend those with a higher advertising content primarily the new media sites had the highest file counts e Measuring the size of the page and its associated files a third
72. whole system and how best to address all the features involved When developing a sustainable IT system it is possible to achieve similar if not greater sav ings by attending to the design of the building and work areas This can be done through a for mal building energy audit or less formal steps to tackle the main areas of energy and resource use e Space heating and or cooling is the major consumer of energy in buildings often mak ing up over half the energy budget of the building Space heating can be controlled through better insulation but it is far more effec tive to reduce the operating temperature of the environment The need for cooling air conditioning can be managed by reducing the heat load 11 Whole Building Design Guide Sustainable www wbdg org design sustainable php 12 Wikipedia Energy audit en wikipedia org wiki Energy_ audit 13 Whole Building Design Guide Optimize energy use www wbdg org design minimize_consumption php Desktop machine Locking mechanism entering the workspace CRT computer monitors use a lot of energy compared to flat screens and switching to peripherals printers and other devices which quickly switch to a low power standby mode when not in use will reduce the heat they pro duce A major source of heating is sunlight entering through windows especially in more formal office environments which have large windows simple light colo
73. 00 000 000 000 000 tonnes or 5 million years worth of production but only a tiny fraction of these reserves is economically viable to extract According to the information from the US Geological Survey USGS which studies the global availability of the most im portant minerals the amount of copper avail able in the future is around 690 million tonnes In figure 2 1 the growth in mobile phones like the rest of the economy is an exponential curve Any exponential trend has a characteris tic called the doubling time a fixed period of time in which the quantity will double Copper is interesting because its growth over the last century is a well defined exponential curve with a doubling time of about 22 years As shown in figure 2 2 we can draw boxes to illustrate how the amounts of copper consumed by the world economy grow with each period of doubling time from around 19 million tonnes in the first 22 years of the last century to about 280 million tonnes in the period which is just ending The issue for our future use of copper and the viability of the technologies which depend on the metal is that the next 22 year doubling period will consume about four fifths of the remaining copper resource identified by the USGS However the production of minerals can t carry on at a constant rate As the best reserves are used up first so it becomes pro gressively harder to find and produce what re mains and more expensive It is
74. 22 VIC EOS play T 3 3 6 box 5 1 UnbUNCIin Coenen cre 4 1 2 Consumer electronics Re MEVCWANG soonssousocnovscusesnecuns 3 1 3 4 disitallcameras ne nenrrre box 5 3 applications and specifications 4 2 2 box 4 2 C NOAGEIS cicnenncu nets een em tenes 5 4 assemble e eee een Tete 3 4 CIBOASEENES onaacanccaccaccanasoanns 92 DUVIN Siete cute a E E E box 3 1 resource footprint ermee ener rer box 2 1 openmnardWare eee eee ner eer 32 Wasteelectronics ae rte rrr 9 4 UP SradinG a E A box 3 6 Data storage amp backing up 6 1 6 2 Intellectual property rights 4 1 1 6 1 1 162 A practical guide to sustainable IT liifescycleranalysis m ete 2 3 AppeCompute T 3292 cCOmpUterS a T box 2 1 MODI PHONG arr rie et box 2 1 Emits torerowthe rere 2 2 2 EInU Xenon e A es eetnlamte nite iia 4 1 box 4 1 Malware and phishing 8 4 Metadata eee ccnnmcuctenens 5 5 box 5 4 Mobile Phoneme reee ne ner nrrrr backing up mobile devices box 6 1 SHOW CMMI SC eerie etre iit 2 2 1 fig 2 1 resource footprint box 2 1 NGtWOnkStmncmecm emer ami nme maie 7 1 7 4 locallnetWOnkS ner rr tern te Tet off site back upS ee000s 6 2 4 Proxy Servers ao eae 7 2 3 sneakernets iaeiae ile emcee seer 6 2 6 thin clients networks 7 4 Wake on WANE 4 4 2 wired wireless networks 7 Operating systems 4 1 4 4 box 3 3 documenting systems 4 3 box 4
75. 24 7 4 2 2 Hardware specifications and practical applications Let s begin with hardware and the demands of different operating systems In table 3 1 we looked at the hardware specifications required by different operating systems In table 4 1 we look at this from a different perspective what applications can be achieved with a certain level of hardware Remember that the minimum requirements of different operating systems given in table 3 1 still apply For example to run a lightweight server on old hardware you would use a lightweight Linux distribution or Windows NT rather than the latest fully functional Linux or Microsoft server systems Table 4 1 lists a number of different appli cations for different classes of hardware Here s an explanation of what each one encompasses Desktops office related graphical and com munications tasks e High power desktop high end desktop work such as graphic design video editing and DVD mastering less powerful machines can 11 Wikipedia Remote desktop software en wikipedia org wiki Remote_desktop_software Operating systems Making the system work 57 Box 4 2 Hardware specs and potential system applications Matching the performance of hardware to potential appli cations is a rather complex subject The more powerful the hardware the simpler it is to install an operating system The skill lies in being able to determine what is the lowest specification you requi
76. DERS P rint is no longer a purely paper based medi um As well as traditional computer screens there are now a number of devices which are specifically designed to replace printed books Unfortunately the ecological impacts of read ing information on the latest tablet devices is a complex issue to interpret For example while designed for reading print based information they are also capable of undertaking other tasks as well It also requires information on the car bon footprint of the e reader and that is not always provided by the manufacturer There are some studies but they are often partisan For example one positive study of e readers didn t consider the lending or resale of printed books to other readers when it calculated the impacts of e books versus conventional books another report more favourable to the print industry notes the uncertainty in the figures which under lie comparisons between print and e books Of course with any electronic technology the gold en rule is always to maximise its use and keep it functioning for the longest time possible before replacing it which appears to be the bottom line of almost all studies on the comparison between conventional and electronic books 12 Palmer Brian August 2010 Should You Ditch Your Books for an E Reader The Slate www slate com articles health_and_science the_green_lantern 2010 08 should_you_ditch_your_books_for_an_ereader html 13 Cleantech Gro
77. Default asp Document ID 6126 Article ID 6471 23 Wikipedia Basel convention en wikipedia org wiki Basel_convention 24 United Nations 2012 UN backed initiative to address electronic waste problem in Africa adopted www un ore apps news story asp News D 415706Cr Electronic Was te amp Cr1 While recent revisions to the WEEE Directive have sought to increase the amounts of electri cal waste collected there has been criticism of the way the problem is being tackled At pres ent the focus of the directive is on waste col lection and without any other legislation which seeks to control the life cycle and service life of goods This means that functional usable elec trical goods can be disposed of which under the current system is likely to lead to them being crushed fragmented and incinerated For those who seek to reuse computers and other electrical items this takes away items which they might have been able to reuse as the centralised collec tion of e waste inevitably leads to usable com puters and other goods being scrapped At present the greatest difficulty with the reg ulation of e waste and to some extent the laws on the restriction of hazardous substances is that they deal with waste as an end point of the con sumer process We are still looking at resource use as a linear process involving production and dis posal rather than a cyclical process which focus es on reuse recycling and zero waste pro
78. E POWER When you have taken all practical measures to adapt your equipment and procedures to more efficient computing there remains one exter nal factor which can be improved the power supply Around two fifths of the carbon emissions produced each year are the result of electricity generation By comparison transportation produces just over a fifth and industrial emissions are another fifth Of the emissions from power generation the majority are the result of coal burning and coal burning also creates problems due to the emission of acid gases which damage wildlife and crops and polluting heavy metals Two thirds of the world s power is generated from fossil fuels and although de car bonising power production will not on its own solve the problem of climate change it is an essential step in tackling the problem For most ICT users their source of power is most likely to be the electricity grid Just as recent operating systems have become inextricably linked to the use of broadband data connections much of our modern electronics is tied to the 24 hour a day availability of a mains power supply and in many states there are few other options In that respect the modern elec tricity grid mirrors the global economic process generally it is built upon an underlying assumption that there will be a never ending supply of energy and resources in order to make society function In contrast users of off grid power systems know that the
79. Free software the freedom to unbundle The problem with bundling is that it removes choice and the ability for people to experiment and extend their knowledge without having to undertake costly and sometimes difficult chang es to their systems Using the breakfast corn flake analogy if there was a separate sachet of chocolate powder it would be possible to choose the strength of the chocolate flavour on the corn flake can decide to add a tiny sprinkle or could pour on half the sachet over a single bowl Free software enables this choice to be made In contrast bundling restricts your ability to mix n match a computer system that suits your own needs Often you get the lowest common de nominator of computer system which may be too much for your budget or too little for your needs It gets more interesting when we start to selectively buy the elements that make up our breakfast If can unbundle the brand I can chose who sells me my chocolate coating if don t like person X s chocolate coating can buy person Y s this was the basis of the anti trust lawsuits against Microsoft specifically the way Microsoft incorporates software such as web browsers into 7 Wikipedia Product bundling en wikipedia org wiki Prod uct_bundling their operating systems could even produce my own coating if no one produced a flavour liked Also if find that the quality of the corn flake is not consistent enough can expe
80. ICT for development ICTD practitioners to begin using technology in an environmentally sound way But its usefulness extends beyond this to everyday consumers of technology whether in the home or office environment We can all play our part and the practice of sustainable computing will go a long way in helping to tackle the environmental crisis facing our planet This is also more than just a how to guide Mobbs brings his specific perspective to the topic of sustainable IT and the practical lessons learned here suggest a bigger picture of how we as humans need to live and interact in order to secure our future The guide is divided into 12 sections or units with each unit building thematically on the ones that have come before They can be read consecutively or separately The unit approach allows the sections to be updated over time extracted for use as resource guides in workshops or shared easily with colleagues and friends The guide has been developed on behalf of the Association for Progressive Communications APC with funding support from the International Development Research Centre www idrc ca It is part of a APC s GreeningIT initiative which looks to promote an environmental consciousness amongst civil society groups using ICTs and amongst the public generally Other publications and research reports completed as part of the GreeninglT initiative can be downloaded at greeningit apc org CZ NON APG
81. IT Box 7 3 Networking check list Networking hardware If possible use wired connections as this has a lower power consumption than using Wi Fi Organise the power supply to ethernet switches Wi Fi base stations so it can be easily switched off when the computer s they are connected to are switched off Configure the network adapter to use the lowest practical speed for data transfer to reduce power consumption This is primarily an issue with gigabit ethernet because its high capacity is rarely utilised in routine operations Use the least amount of network hardware in order to reduce the overall demand for power for example rather than using two eight port switches to connect machines use a single 16 port switch Add new hard ware only when network congestion becomes a prob lem Using networks Take care when attaching files to emails especially when sent to long distribution lists email lists Always consider the implications of sending large multi mega byte files by email and where possible scale down or process the attachment to reduce its size Consider whether you need to use HTML formatted emails all the time set the default on your email cli ent to plain text and use HTML formatting only where it is necessary To reduce the need to repeatedly download data en sure that you have around 100 megabytes in your web browser cache to store the large files often used with advertising driven websites
82. NTING here is a modern marketing myth devel oped in the 1970s when the first word processors were available that one day paper would be eliminated from offices by the devel opment of better computer technology In 1980 before the IT revolution swept across the office environment world office paper consumption was 70 million tonnes a year by 1997 it was al most 150 million tonnes In Britain 120 billion pieces of paper are printed each year The aver age British office worker prints 22 pages every working day and research suggests that 44 of this is easily avoidable and over 21 of this printed matter is disposed of before the end of the day The paperless office hasn t arrived for many reasons These are partly technological not ev eryone uses computers well or feels comfortable reading from screens They are also partly psycho logical research shows that the physicality of pa peris an important part of how we comprehend its content and mentally map that information Per haps most importantly the change in the scale of office administration as part of the modern service led economy has made the market for paper grow compared to the 1970s It s this last point that is the least explored Yes the amount of office paper generated per person may have fallen with the ad vent of new technology but as the global economy has grown so the numbers involved in office and administration have grown too The overall effect has
83. OS are designed to be more secure and to enforce strict control over how users can use the operating system unlike the Windows system which has traditionally been designed for convenience and ease of use There are examples of Linux and Mac viruses In additional there are also cross platform vi ruses that can use Java or the scripting lan guage used in office based programs such as Microsoft Office and OpenOffice which can af fect all major operating systems Even the An droid mobile phone system now has malware developed for it Malware isn t just a security issue Ma chines with malware running in the back ground use more processor power and if part 38 Wikipedia Malware en wikipedia org wiki Malware 39 Wikipedia Linux malware en wikipedia org wiki Linux_malware of botnets they will use the broadband con nection to shift large amounts of data as part of spam or denial of service attacks This re sults in higher energy consumption and for those whose broadband connection is metered it can also result in very large bills for the data sent over the network However it is also true that running anti virus software which rou tinely scans the operating system and incom ing outgoing data for malware will add to the load on the processor and use more energy and on older machines it might reduce system performance slightly For Windows machines anti virus software is an essential part of running an int
84. OS because it is based on a Unix like sys tem the line is blurred It is not possible to enable a strict divide between what a desktop is and what a server is In practice as free software systems allow the installation of additional software more easily it is very easy to set up a desktop machine which can also act as a server on a local network for example running a web server to provide an intranet 4 2 1 Finding the best fit of machine to operating system Unlike the world of proprietary software where you have a limited choice of hardware to fit the power demands of the latest Windows or Apple iOS operating system with free software you have the option to design a system to fit the ap plication you need it for Older hardware which would be difficult or impossible to use with recent versions of Windows can be found new purposes have its working life extended using free software Even fairly new hardware can be configured in dif ferent ways to perform different functions in the process creating different levels of performance or security to match the needs of the user For example if you install a web server on a desktop machine then it is possible to carry out complex web design and then test the designs including scripting and other functions with out a network connection to a dedicated server Additionally when using proprietary systems you re penalised for using more than one ma chine because of th
85. PAUL MOBBS A practical guide to sustainable IT rr Se O gt A APE A practical guide to sustainable IT Author Paul Mobbs Copy editing Alan Finlay Layout proofreading Lori Nordstrom Publication production Karen Banks and Flavia Fascendini Graphic design Monocromo info monocromo com uy Phone 598 2 400 1685 Commissioned by the Association for Progressive Communications APC cr CNA CS a Conducted with support from the International Development Research Centre IDRC 36 IDRC CRDI Canada The views expressed in this publication are those of the individual authors and not necessarily those of APC or IDRC A practical guide to sustainable IT Published by the Association for Progressive Communications APC with support from the International Development Research Centre IDRC South Africa 2012 Creative Commons Attribution 3 0 Licence lt creativecommons org licenses by nc nd 3 0 gt Some rights reserved APC 201206 SU R EN DIGITAL 162 ISBN 978 92 95096 71 4 Table of contents 01 02 03 04 05 06 Introduction What is sustainable Information Technology An introduction to the themes of this series and an explanation of the reasons why we should view our use of technology as a system rather than as separate processes Too often we focus on the de mands or specifications of the machine instead we should look at our information needs
86. PU would find it difficult to shift 150 to 500 megabytes a second to the video display and do all the other tasks it needs to perform If you want to play videos or an animated video game without the display jumping and hiccuping all the time then the video display system has to be handled by purpose designed graphics card working separately from the CPU By making the AGP port an expansion slot you can fit the graph ics card of your choice into the motherboard Then instead of the CPU transferring data from the memory the video display is managed by the northbridge of the chipset without the CPU being involved All the CPU needs to do is update the display image held in the main memory On older machines without AGP the size and quality of the display is limited by the speed of the system With AGP and an accelerated graphics card the system can send far more data to the display and produce a much higher quality picture 3 3 7 The disk drive controller Next let s look at the southbridge and disk drive controller 3 The front side bus works at very high speeds to shift data from the memory to the CPU and AGP port That would be a waste of time when communicating with the hard disk and especially the keyboard because the data can t be supplied by the hardware at any thing near that rate If you can get hold of an old motherboard and look at the little copper wires on its surface you ll see that there s one set of wires linkin
87. R IN THE ECOLOGY OF INFORMATION TECHNOLOGY n unit 2 we looked at the ecology of informa tion technology the effect that our demand for information systems has on the environment generally There was a very important part miss ing from that analysis the user of the equip ment When we think of desktop computers an integral part of the system is the human user who sits in front of the computer The type of job that they are doing and how efficiently they work af fects how intensely the computer is utilised and how great the impact of that activity is There are many facts and figures about the impacts of computing in terms of emissions but because they often consider different sys tem boundaries or because they are based on certain industries or activities the results given vary widely Often the units these impacts are measured in differ too making direct compari sons difficult For example some give the emis sions as an equivalent of elemental carbon C some the emissions of carbon dioxide CO and others give measurements adjusted to reflect the value of different greenhouse gases as an equivalent of carbon dioxide CO eq To make comparing the impacts of using desktop systems less complex we ll take rough figures from the range of information available to look at the scale of the impacts from differ ent parts of a desktop computer system e Firstly the internet the energy used by the global di
88. Synergy s PowerMAN or 1E s NightWatch man and Verdiem produce a free application called Edison There are also proprietary ap plications for MacOS For Linux there are ap plications developed for large servers and as suggested there are also free programs such as powertop Operating systems Making the system work 65 Box 4 5 Operating systems check list Always match operating systems to hardware specifica tions A machine which doesn t have enough system resources to run its installed software will struggle and waste the user s time a system that is too powerful for the software installed upon it represents a waste of resources in effect the user is wasting the system s time What we should find by planning our needs and matching them to a machine specification is a balance between these two extremes Define a role for a machine and install a system that meets that role Operating systems work well when they perform a de fined purpose That could be a general purpose like a desktop machine or a specific purpose like a data server Sometimes you can combine both such as a desktop with a web server installed to allow web development In practice it s better to manage the load on machines in a way that optimises their role rather than obstructing it Find a role for the hardware you have and only buy new hardware when what you have can no longer perform the tasks you require reliably Old machines can be usefu
89. T consumes The more gadgets we have especially mobile devices that require charging the greater the demand for electric ity around the globe Though we might focus on the direct use of electricity by IT because that s the part of the system we can easily mea sure in terms of the overall life cycle of these devices more energy will have been used during their production for example see the figures for Apple computers shown in figure 3 1 As the level of direct energy use by electrical goods has reduced so the energy consumed during produc tion has become more significant For example the memory chip in a laptop computer can take more energy to produce than the laptop itself will consumer over its three yearservice life 7 An 23 Leonard Annie 2007 The Story of Stuff www storyof stuff org movies all story of stuff 24 International Energy Agency 2009 Gadgets and Giga watts OECD IEA Paris Gadgets and Gigawatts Summa ry www iea ore Textbase npsum Gigawatts2009SUM pdf 25 Williams E Ayres R Heller M 2002 The 1 7 Kilogram icrochip Energy and Material Use in the Production of Semiconductor Devices Environmental Science and Tech nology 36 24 p5504 5510 www it environment org publications 1 7 20kg 20microchip pdf 26 de Decker K The monster footprint of digital technology Low Tech Magazine June 16th 2009 www lowtechmaga zine com 2009 06 embodied energy of digital technol ogy html
90. That s because people find it difficult to re member a truly random password and so opt for easily guessable rules or formats which sig nificantly reduce the variability and hence the security of their passwords The solution is to use a mnemonic password created by a sim ple process which takes a more easily remem bered phrase and reduces it to a string of letters and numbers see Box 8 2 Secondly use multiple passwords for dif ferent functions on a machine As more people use passwords on remote internet systems the risks of using the same or similar passwords for all access controls is that if the passwords you use over a network are disclosed it is possible to launch remote attacks on your computer sys tem using similar style passwords to attempt a breach of security Therefore when using mul tiple passwords use different passwords and a different style of password on your local ma chine and on internet services The difficulty is that remembering multiple passwords is dif ficult but again using mnemonic passwords based upon a more easily remembered phrase can solve this problem With most computer systems it is possible to set multiple levels of access control pass words to secure access First and foremost it should be remembered that if the machine it self isn t secure in particular the hard drives containing the data then no amount of access controls will make the system secure If an un encrypted hard
91. While developing a grid connected renewable sys tem is likely to be competitive with buying re newable electricity from the grid it will never be a means to reduce the cost of electricity overall That s because even in those nations where electricity is very expensive the cost of installing and maintaining small scale grid connected systems will be greater than the large economies of scale offered by large power grids But as noted above if we wish to de velop an alternative to the fossil fuelled power grid then it is small local and largely self con tained systems such as this collectively called distributed generation which will be required to address our current demand for electricity Figure 11 1 shows a typical grid connected power system Electricity produced by one Or more renewable generating technologies is supplied to a synchronising inverter This converts the low voltage direct current DC of small renewable technologies into high volt age alternating current AC used by the power grid This allows the locally generated power to flow into the system without generating inter ference with the power from the grid If the renewable power sources do not gen erate enough current the grid supplies the dif ference between what is being generated and 6 For example see Wikipedia Grid connected photovoltaic power system en wikipedia org wiki Grid connected_ photovoltaic_power_system 7 Wikipedia Dist
92. a in Apple s cloud storage system Information storage and security 87 What s important is that we organise files in a way that assists the process of making back ups This means organising information in a way that separates the important data which requires reg ular backing up from other less important data Separating important data from the less used and superfluous files on the computer system is also good practice because it allows low value files to be regularly deleted from the system to free up space on the hard drive Organising data by its importance is easily done using a clear structure of directories folders on desktop or server machine to isolate the most important or regularly edited files from other data which has a low value or is infrequently changed For example e Users should store their current work impor tant files inside a single identifiable work directory This simplifies the process of decid ing which files to back up backing up all cur rent files can be easily carried out by copying the work directory to another machine ona network or to a removable storage media e Other user files that are used infrequently or which have already been archived can be segre gated into an archive directory e Low value or superfluous data such as web pages or downloaded files should be kept separately from the user s recent and archived data and these folders can be regularly sorted a
93. a lot of cable left over you can coil the cable loosely and tie with a cable tie to keep it together If the power point for the machine is not nearby tie or fix the cable from the switched socket to the leg of the desk table In the event of the cable being pulled hard it prevents the socket and its attached cables being dragged away Once all the mains cables are connected up and tidied away you can move on to the light er weight cables Again work from thickest to thinnest The next is probably the video cable then USB and network cables and finally the au dio cables Again leave loose coils in the cables which might get tugged especially the mouse keyboard and network cable or the phone line is you are using a modem to prevent acciden tal damage Web cams are usually fastened to the top of the monitor if you don t have a com patible bracket you can get Velcro pads stick ing one to the top of the monitor and the other to the bottom of the web cam to stick the two together Headsets and headphones also need to be carefully located to prevent the cable from being tugged You can buy small metal cable clamps with sticky foam backs stick them to the side of the case and then clamp the cable in the jaws to reduce the likelihood that it will be wrenched out Newer systems tend to have USB sockets on the front older ones do not If you regularly plug in MP3 players cameras or other devices get a short USB extension cab
94. a machine is not in use if you have a log of its vital statistics it makes it easier to decide if it can be re installed and put into service or stripped for the required parts if another machine fails In addition to the hardware it s also impor tant to keep a log of operational data For ex ample the connection details passwords for broadband access access configuration details of email and internet services if they are run by a third party and even details of insurance or maintenance contracts covering any equip ment By having a secure central location for this critical information you will save much time and resources at a later date should there be a problem be that with the hardware or an im portant staff member meeting with an accident 4 4 POWER MANAGEMENT SETTINGS ollowing installation the operating sys tem is configured to optimise its func tions to meet the intended purpose s of the machine When configuring a new newly in stalled desktop system after configuring user accounts the next step is to configure power management box 4 4 Power management is important not just because of the power consumption issue When you configure power management you re also setting up features such as screen Savers These are basic security measures to control access to the system Set ting a short lock down period on a screen saver or the power management menu doesn t just save energy it makes the system more secu
95. a person uses a program to generate a digital signature and this produces a block of data which can be attached to the file or held sepa rately Anyone can then check the authentic ity of the data by checking the digital signa ture against the file using another program With public key encryption this has become simpler as the public key can be used to ver ify the authenticity of any file that has been signed with the user s private key Many email programs now include features which allow the use of both digital signatures and encryption This allows the easy encryption of emails or attachments to prevent disclosure or by loading the public keys of email correspon dents into your system every time an email is received from them the program can verify that the email comes from that person email is a very insecure system and without digital signa tures emails can easily be forged As shown in figure 8 2 each user can con figure their own public and symmetric key en cryption to protect their data on the machine and use the passwords lock feature many ap plications use to secure files and the data they contain These work separately from the securi ty of the operating system meaning that each user can implement their own data security irre spective of that applied at the system level The principle security flaw in this process is the sys tem administrator They have the ability to log 37 Wikipedia Digital signat
96. a when the audio information is encoded and so sound quality can be lost with each re encoding What influences file size the most is the bit rate of encoding like sample rates it is measured in kilohertz A 32kHz bit rate sounds like a poor phone line while 320kHz sounds very clear and is often used to encode CD quality music Alternately data can be encoded using a variable bit rate VBR which varies the rate according to the complexity of the sound producing a slightly more space efficient encoding Video files Video files are the most difficult media to edit as the standards used are more complex and are often linked to proprietary codecs which require specialised application programs to edit them For video the frame rate is equivalent to the sample rate it represents the number of pictures displayed every second The standard is 25 and while reducing this can make the video progressively more jumpy it has a large effect on the file size Scaling down the size of the video image also has an effect on the file size The audio track usually represents about a fifth to a tenth of the total file data and while it can be edited it doesn t have a great effect on the overall file size 104 A practical guide to sustainable IT At the simplest level this is done be replacing repeated sequences of numbers with a key which represents that sequence For example if we think of a large file which contains the text of a book we could repl
97. able us to catalogue the files on our computers with far more relevant data than a simple file or folder name Just like web search engines desktop search or index ing systems read the content of the users files and create an index of the information held Of course the problem are those files which do not contain textual information that is intelligible by the machine such as videos sound files and 16 Johnson Bobbie July 2009 Why did Big Brother remove paid for content from Amazon s Kindles Guardian Online www guardian co uk technology 2009 jul 22 kindle amazon digital rights 17 Wikipedia Desktop search en wikipedia org wiki Desk op_search Desktops Programs peripherals and gadgets 79 Box 5 3 Digital cameras mega pixels and data overload One example of the way the increasing data capacity of equipment is driving data storage is digital cameras The obsessive selling point for all new digital cameras is the number of mega pixels inside the image sensor The higher the mega pixels figure the better the images are assumed to be This is not always the case since the true image quality is dependent upon the quality of the optics and the use of filtering and correction software to render a true image under different lighting conditions What has happened as the camera mega pixel count has risen is that the file size of photographs has risen but that doesn t necessarily translate into better pho tograp
98. ace long words with numbers which represent those words Some email applications will give the option of compressing attachments before they are sent Alternately you can use a free or proprietary application to compress the file The problem with many file formats in com mon use today such as OpenOffice or Adobe Ac robat is that they are already compressed as part of their formatting Therefore simply compress ing the file will not reduce its size significantly In these cases you have to change the way these files are created by the original application Adobe Acrobat and the Export PDF functions within office applications allow you to reduce the image resolution of the document and compress any im ages which it contains the text of Acrobat files is already compressed The proprietary Adobe Ac robat application offers many more options to re duce the size of the file which can reduce the size of PDF files significantly Many applications of fer additional plug ins or extensions to add extra functions which optimise file sizes For example OpenOffice Impress has a downloadable exten sion called Presentation Minimizer This adjusts the formatting of fonts images and animations within presentations to reduce the size of the file generated The greatest challenge in minimising the data transaction from email attachments relates to digital media files video sound and image data see Box 7 1 When using free software
99. achines that we use to access and manipulate them That requires that we consider everything from how we define our needs and plan the system the organisation of physical security protection against malware and other system failures right down to basic secu rity measures such as passwords and access controls In many ways this section is all about combining all the actions covered in previous sections into a single integrated method of managing our need for technology Rather than separating different issues and look ing at them in isolation we need to develop an integrated approach to system resilience and security trying to minimise the ecological im pacts of our demand for IT and to refine the elements that make the system function to produce the optimal solution to our needs 1 Wikipedia Resilience ecology en wikipedia org wiki Resilience_ ecology 8 1 SUSTAINABLE DESIGN here is no good or bad way to practice sus tainable design it either works to serve your particular needs or it doesn t In order to adapt to the diverse way in which we use ICTs it is often necessary to unpack and adapt certain ideas and strategies to fit your unique circumstances The true test of any system is that when you depend on it to work at its best it functions as designed to protect the integrity and reliability of the sys tem and the tasks it is designed to perform and does so while internalising ecological principles which mi
100. ack up storage media and to protect files in transit on a network or files stored on remote systems While the math ematical encryption of data is the basis of both file encryption and digital signatures they serve very different purposes e File encryption is intended to prevent ac cess to the data in a file Using mathemati cal functions the digital content of the file is scrambled to prevent access except by use of a digital key In symmetric file encryp tion both the person encoding the file and those decoding the file has to have a copy of the key which presents a problem because sharing the key by any means of communi cation might lead to its disclosure To avoid this public key encryption was developed Anyone can encrypt data using the public half of the key and send it to the recipient The recipient then decodes the data using their own private key and only the holder of the private key can decrypt the data 34 Wikipedia Encryption software en wikipedia org wiki Encryption_software 35 Wikipedia Symmetric key algorithm en wikipedia org wiki Symmetric key_algorithm 36 Wikipedia Public key cryptography en wikipedia org wiki Public key_cryptography Maintenance security and resilience 127 e Digital signatures are not intended to pre vent access to the content of the file they are a means of protecting the contents of the file from being modified As with encryption
101. across the system far easier Note that programs to import sound image or video files often have metadata editing options too and you should learn to use these when creating files in order to make indexing and finding files easier 18 Wikipedia Metadata en wikipedia org wiki Metadata 19 Wikipedia List of search engines en wikipedia org wiki List_of_search_engines Desktop_search_engines Music Singles Finally one of the problems about the large hard disks installed on many new desktop ma chines is the physical volume of data The size of new hard drives increasingly rated in tera bytes a terabyte is a million megabytes al lows users to fill up the storage system with files which are poorly organised and worst of all which are not backed up The physical scale of the data stored can also make backing up an even bigger headache When considering the efficiency of desktop systems having large amounts of files stored on the hard drive can complicate how we manage that data For ex ample the more files the more effort the desk top indexing system has to expend in keeping track of those files and that increases the pro cessor power and drive space required to map the system More problematically in the event of a system failure a drive full of superfluous data can hamper the recovery of more impor tant files With larger hard drives the temptation is to allow data to stack up on the system rather tha
102. ainly longer than the lifetime of the equipment involved By having an idea of what our needs might be in the future it is possible to invest in upgrades and replace ments more strategically to reduce costs and take advantage of new or more efficient sys tems Always consider the effects of changing tech nical standards Where certain technologies will obviously become obsolete we should plan for their replacement although adopting new standards too early for example a new software package or operating system might involve investment in equipment before its design has been perfected or its effectiveness proven Technological standards can create inflexible restrictions for example the use of propri etary designs which restrict compatibility with other similar systems as a classic ex ample think of the many different types of USB or laptop power connectors in common use Choosing hardware or software which uses generic standards avoids compatibility restrictions and allows the switching of com ponents parts between different systems in the event of a fault in the equipment It is important to question the cultural habits in the way people use ICT systems just as we query the technical specifications of different technologies Increasing efficiency and pro ductivity often requires people to learn new skills or adapt their methods of working to avoid habitual practices Improving people s understanding and perceptions o
103. ains electric ity supply However projects which work in less developed states with a poor quality power grid or which work in a mobile environment such as 10 3 WASTE DISPOSAL A noted above space is also required for storing the waste generated by the project In some states this may be required to meet a certain standard in order to comply with envi ronmental and safety laws For projects which accept large volumes of e waste the sorting and separation of different types of waste for recycling can represent a valuable source of in come How much space is required and how it is organised is usually determined by the con tacts opportunities the group has for disposing of its sorted waste to merchant recyclers Ideally no electronics recycling project should operate without first identifying a vi a bus may incorporate renewable energy sup plies They may also teach the skills to create and maintain off grid power supplies as part of the work they do Diversifying from an IT cen tric project to a more broad based approach to education and technology is commonly found in successful recycling projects in part because it reflects the do it yourself culture which mo tivates many of those taking part In unit 3 box 3 3 and unit 4 box 4 2 we looked at the range of applications it is possible to create with reclaimed equipment Many of these are related to the networking of comput ers to perform more complex functions
104. ake these systems perform and how we can maximise the benefit of IT equipment in cluding older equipment to get the most benefit from it and minimise the ecological impacts Even if you do not install the system on your machine by understanding the general principles of how they work you can improve your everyday understanding of how systems operate 4 1 THE DEBATE OVER FREE VERSUS PROPRIETARY SOFTWARE hen evaluating the potential uses of any computer hardware we first need to de cide which operating system to use For some this decision has already made on their behalf as the new systems people buy are usually pre installed For PC type machines bought from most commercial vendors that system will be a Microsoft Windows system Macintosh com puters have their own system that s specific to the hardware but for PC type machines there are also alternative free and open source soft ware FOSS operating systems which will ef ficiently meet the everyday needs of computer users To understand the difference between these two models of computing the proprietary software world and the world of FOSS you need to understand more about the objectives of each model 4 1 1 Intellectual property rights Intellectual property rights are the line which demarcates the clash between the desire for freedom of use and access to data and the need to preserve economic power in the new informa tion age The options available when in
105. amaged power supplies a large proportion of that power might be dumped back into the power grid unused you pay for the power but it s not used by the machine The difference between the amount of power supplied and the amount used by the equipment is called the power factor It s expressed as a number be tween 0 and 1 A high value 0 7 or better is very good a fig ure between 0 5 and 0 7 is adequate a figure below 0 5 is poor and you should consider buying a better power supply When measuring the power factor you shouldn t turn the machine on take the measurement and then switch off As the components warm up the power consumption can wander slightly and so its advisable to leave the me ter in place for an hour or so measure the initial power factor measure the total power consumed after at least an hour or two and then measure the power factor again before switching off This provides a more reliable figure for consumption Whether or not it s worth replacing a power supply is a matter of need or cost For equipment that s powered from an off grid supply minimising consumption is very impor tant irrespective of the cost you may choose to replace the power supply with a higher quality alternative off grid power is inevitably more expensive than grid power For a mains power system it s a matter of cost Let s say the system uses 0 25kW h of which half is the computer Figure 3 7 A power monitor box and runs for e
106. an anti static brush or cloth you can remove the wad of hair and dust which has built up between the fan and the heatsink Finally as well as the physical hardware the soft ware systems of the device may need occasional main tenance This is best carried out on a regular basis such as regular calendar dates for following a routine back up of information on the device How this should be done is explained in the documentation written for the operating system or on the producer s web site An important part of system maintenance is installing software patches and upgrades These not only fix system bugs they also prevent malware infecting the machine from previously unknown flaws in the operating system Some device manufacturers also offer firmware upgrades to fix flaws within the programs which make the hardware function Finally it is important to regularly clean the storage media inside the device of superfluous and unwanted files for example deleting the trash bin on the desk top This is most appropriately done before performing a routine back up Maintenance security and resilience 123 8 3 2 Passwords and access controls The purpose of access controls is to prevent anyone who shouldn t have access to a machine or a place having access We ve had complex machine based access controls in common use for a few hundred years keys Computer based access controls are more complex but that doesn t mean they re
107. an be The solution has been to include more than one CPU within the same chip allowing programs to be run in parallel The greater the number of cores in the CPU the more process ing power it has Multicore CPUs are available in 32 bit and 64 bit versions What makes the greatest difference to the speed of a system apart from the CPU is the specification of the motherboard s chipset in particular the speed of the front side bus FSB The higher the FSB speed the faster the data can move between the CPU the mem ory and peripherals Another feature to look out for is the amount of cache memory that the CPU has usually called the Level 1 L1 or Level 2 L2 cache This speeds up the reading of data from the memory and the bigger the cache memory the faster the CPU can operate Different generations of chip use different sock ets or slots to connect the chip to the motherboard In practice choosing the correct CPU chip to fit to a moth erboard isn t an issue you re likely to deal with Usually your computer will arrive ready built or if you upgrade a computer you can buy a motherboard with the CPU and memory already fitted more cheaply than buying each separately The only time you need to worry about find ing the right processor for a motherboard is when the old one has failed in which case you must get the manual for the motherboard to find which CPUs it is able to ac commodate Every motherboard has a technical m
108. and some graphic design editing It could run a Linux based web server for under taking web design work The latest operating systems would run slowly on these machines While using the latest system is not impossi ble it may be more productive to use slightly older software if that provided the required applications and hardware drivers Lightweight desktop for internet commu nications and simple word processing or it could act as a thin client connected to a more powerful machine over a network A problem when using Windows systems is that hardware drivers may no longer be avail able especially for printers Anti virus soft ware will also not be available and there may also be problems with network integration This makes free software preferable as these system have better hardware support use open network standards and malware isn t such an issue chines as the clients and the powerful ma chine as the terminal server Support systems machines to run networks and store data e Download box a dedicated machine to run 24 7 internet services such as file sharing or remote data file access for non profession al small scale applications this is most ef ficiently done using an old laptop due to its inherently low power consumption Where peer to peer file sharing is used for infor mation distribution the machine could be installed with a standard desktop operating system For low volume web or FTP acces
109. anual written for it if you can identify the design of the motherboard the maker s name is usually fairly prominent but find ing the code which identifies it can be more difficult then you can search online and find a copy of the manual The manual will tell you which CPUs memory modules the board can work with 36 A practical guide to sustainable IT getting rid of the heat generated by the moth erboard is a major problem and they can use as much electricity pumping air to cool the ma chines as the motherboards consume directly For hot climates maintaining the CPU fan or perhaps buying a larger more efficient fan to cool the CPU is essential to keep the machine functioning normally You must also organise a good circulation of cool and relatively dry air humid air can corrode the workings to prevent overheating Overheating will if it takes place for long periods shorten the life of the compo nents on the motherboard What few people seem to realise is that all that extra heat and powering the fans or other technology to remove the heat from inside the case represents wasted energy Many desktop computers now burn hundreds of watts when operating at full power laptops are naturally less power hungry because of the need to maxi mise the battery life For those living off the pow er grid using small power generating systems like photovoltaic panels or wind to charge batteries the power consumption of IT equipment i
110. any less fallible than their mechanical counterparts While there are recent biometric or token access systems available the most common form of computer access control are passwords Passwords are a means of access control guarding against the unauthorised access to an information system Some password systems are fairly weak such as the PIN number used with mobile phones and bank cards Some pass words such as the passphrases used with data encryption are stronger because they are more complex The principle of password access is that as there are so many possible alternatives it s unlikely anyone could guess the password How strong a password is relies on how many characters it contains how many different sym bols each character can represent and whether it has a unique or predictable format To illustrate how strong these access controls are let s look at how they work A PIN number usu ally has four digits each with 10 possible alterna tives 0 to 9 The number of potential PIN num bers is 10 x 10 x 10 x 10 or 10 ten to the power four or 10 000 possible alternatives In contrast an eight character password with at least 62 pos sible alternatives per character A to Z a to z and 0 to 9 has 62 8 or about 220 thousand billion 2 2x10 possible passwords Passphrases are usually much longer and can contain punctuation characters and spaces For an 18 character pass phrase with around 80 poss
111. atural resources isn t random or accidental We ve progressively developed technologies that have required ev er more specialised resources and materials as time has passed Technological progress has inherently increased the complexity of human What is sustainable information technology 11 systems and this has implications for our fu ture as the production of certain essential re sources is limited In this unit we ll look at the resource use inherent in our consumption of information technology but also at the wider human resource issue and the ecological limits which are increasingly apparent as the globe s appetite for natural resources grows Hardware Putting the system together the machine and its impacts on the environment Today computer hardware comes in many dif ferent forms from the large mainframe and server complexes of large organisations to the mobile phones people carry down the street In this unit we ll look at the resource implications of computer hardware and how our choices about design specifications but most impor tantly the period of time we plan to use the equipment affect the ecological footprint of our information processing Software the programs we use on the machine to perform the tasks we require This is a large subject and so it is divided into two sections e Operating systems Making the system work the programs which make the computer function Our choice of operating sys
112. cal guide to sustainable IT 4 4 3 Providing feedback on system load Finally for the user at their computer desktop there is very little indication as to the level of stress that their machine is experiencing at any point in time The machine can appear to slow for no apparent reason or the mouse can stop moving leading them to click buttons and press keys which will often exacerbate the problem The solution is to install a small power monitor application on the task bar of the desktop to give feedback This will show when the system load is reaching a problematic level More technical applications will also break down the display to show the overall system load processor s speed load network activity and hard drive activity By giving feedback you allow the user to moderate their demands on the system making it use less power and avoiding overloading the system to the point where applications crash or the system hangs There are free load monitors available for Windows systems and Linux desk tops usually come pre configured with applica tions such as system monitor Operating systems Making the system work 67 SECTION 5 DESKTOPS PROGRAMS PERIPHERALS AND GADGETS When we talk of computers most people will think of a desktop computer system with a mouse keyboard and video display screen In the previous units we ve looked at machine hardware and software In this unit we ll look specifically at the
113. can vary the theme of the desktop e g in Windows 7 you can configure a display theme which looks like Windows XP you can t change the nature of programs generating the display With Gnu Linux you are free to change the programs which generate user interface in order to change the amount of processing power required to generate the display and that can reduce power consumption Lightweight Linux distributions come with a lower power desktop environment already configured General purpose distributions are usually configured with one of the more powerful desktop environments usually Gnome or KDE but can change the display environment if re quired Often you can select which environment to use when you log into the system The main effect of chang ing the user interface is to reduce the amount of process ing power required to generate the display reducing the amount of memory required for the display which allows other programs to run faster On older hardware this can significantly increase the performance of the system Usually the selection of which desktop environ ments are available is made when the system is in stalled Depending upon which Linux distribution is used other desktop environments can be loaded very quickly from online software repositories The heaviest display manager is KDE followed by Gnome These are the standard desktops with most distributions and are optimised to provide a feature rich desktop XFCE is
114. cation of the hardware design While there has been little movement on this in the world of computing in the fields of intermediate technology and engineering there are a variety of projects now running around the globe which allow the owner or builder of a device or machine complete freedom to vary or improve the design usually on the condition that all such changes are fed back into the community sharing the design Other groups such as iFixit through their Self Repair Manifesto and online repair guides are promoting the rights of owners to maintain and repair their hardware Reconfiguring computer hardware can be fairly simple once you ve got the hang on it as we ll see later In general the aims of the open hardware movement are to extend the scope of people s involvement with their equipment Its key ob jective is to develop the designs and skills that people can use to motivate their involvement and to extend these open principles to a far greater part of the engineered systems which support our lives 3 3 UNDERSTANDING COMPUTER HARDWARE or those who find it difficult to understand how to use computer programs the idea of taking the case off their machine and fiddling with the workings inside can be very daunting There s a great mystique surrounding the workings of com puter hardware although this isn t deserved be cause compared to most other consumer electron ics such as radios or washing machines t
115. cerns about the use of IT were related to energy consumption and were initially addressed through the labelling of more efficient goods such as the US Environmental Protection Agency s EPA Energy Star logo As the ecological issues related to IT have be come more numerous there are various standards which have been developed to accredit goods which are made to a higher environmental standard USEPA DoE Energy Start Program The longest running energy labelling scheme for both commercial and domestic appliances including PC hard ware the scheme provides both audits labels for prod ucts as well as accrediting and giving awards for excel lence by organisations It s significant amongst schemes because it puts as much emphasis on the domestic use of hardware as it does on large corporate installations As well as product labels their website provides a series of downloadable guides on different aspects of energy efficiency and reducing energy consumption For more information see the website www enereystar gov Electronic Product Environmental Assessment Tool EPEAT This is an accreditation tool for electrical equipment managed by the Green Electronics Council It maintains an online database of products that have been accred ited using various environmental criteria awarding each either a gold silver or bronze classification While there has been criticism of this scheme because it doesn t evaluate more radical measures suc
116. cess ing machines so that they don t use as much power when not required The standard power management menu allows you to configure time limits to put the machine into either sleep hibernation or soft shutdown depending upon how long it has been idle for or for laptops when the battery is running down You will also have the option to spin down the hard drives and shut down the display a certain time before entering suspend hibernation This reduces power consumption without the inconvenience of locking out the user while the system re initialises As noted above of the two options provided the hardware is fully ACPI compatible hibernate is the more secure state In most operating systems strict criteria for power management are not configured as a default they have to be set by the user or the system installer That is why configuring power management should always be one of the final steps in system installation configuration In addition it s also possible to get power optimi sation programs which monitor system usage and suggest ways of changing power settings and system timing signals to reduce power con sumption although these often need more advanced knowledge of the operating system in order to enable them There are various proprie tary programs available for Windows a number of which allow remote system access over a net work so that power setting can be configured to optimise power consumption for example Data
117. ch Trashing of Asia www ban org E waste technotrashfinalcomp pdf Greenpeace International August 2005 Recycling of Electronic Wastes in China and India www greenpeace org international PageFiles 25502 recyclingelectronicwastein diachinafull pdf Global Witness 2009 Faced with a Gun What Can You Do www globalwitness org media_library_get php 980 1277197135 re port_en_final pdf Further information and index 161 INDEX ather than use page numbers the index be developing procedures 6 2 low uses section numbers box numbers to digitallsignatliresmepner ee rererer rer 8 3 3 direct the reader to the most relevant informa file encryption and locks 8 33 tion across a number topics organising files data 5 5 Check lists E Geren a E terete 6 2 4 backing up removable media box 6 3 removable media Box 6 2 table 6 1 backing up mobile devices box 6 1 reducing scaling digital media files box 7 1 desktop Systems n aooaa box 5 5 technological obsolescence 9 1 BaWaSte air vee merece tec ceene box9 1 Ecological design impacts 2 3 fig 2 3 hardware buying 000ee box 3 1 ackinesupidata mA et 6 1 2 Information Storage 6 s4 05 box 6 4 O WASTE oe eee eee eee eee eee 9 3 9 4 MEENOLKS ATE box 7 3 impacts of electricity generation box 11 1 operating systems e000 box 4 5 mod tilardesiontee seman 8 1 2 su
118. ck which clicks shut when pushed is extremely insecure By pushing a plastic card or a thin metal sheet called a shim around the edge of the door it is possible to release the bolt and the door will open un less the mechanism has a dead lock Combination locks are more secure because they don t have a key hole that can be tampered with but they still shouldn t be relied upon Padlocks are also insecure whether you use a key or combination version because like front door locks they can be opened with a shim 8 2 2 The room Working in one space makes it easier to secure the information and equipment that the space contains If security measures can concentrate on that space lesser physical security measures can be applied around the rest of the building Work carried out in more than one location mul tiplies the security problem General building security needs to be improved and secure stor age points such as a filing cabinet or strong cupboards need to be set up in each room work location You also have to give thought to how those measures are installed For example locked tamper proof cupboards are not secure if they can be carried away so if possible fix them to the wall or floor to prevent them being removed 7 Wikipedia Lock picking en wikipedia org wiki Lock_ picking 8 Wikihow How to open a door with a credit card www wikihow com Open a Door with a Credit Card 9 Wikiped
119. ckling this is obviously a very broad agen da While our use of computers has a direct effect on the environment if we re looking at how sustainable our use of those systems is we must include the related factors which in fluence that process Yes we must look at the machine hardware how those machines are made but also how they are disposed of In ad dition it s vital that we consider the features of the operating systems and programs that we use and the processing and storage of informa tion since it is the value of information which defines the purpose for which we build these machines If we re considering how sustainable our information keeping is then the reliability of our record keeping data storage systems is important and that in turn can raises issues related to intellectual property rights and other legal considerations This guide is organised as a serious of themed sections or what we call units each looking at the sustainability issue from a slight ly different angle The objective within each unit is to get you thinking more systematically about how you can physically organise your data pro grams or equipment to achieve the tasks you want to carry out 10 A practical guide to sustainable IT 1 2 IT S NOT EASY BEING GREEN o date there has been a lot of work around the issue of Green IT the design and or ganisation of computers to achieve certain eco logical objectives Examp
120. ctrical goods are dealt with as an other part of the general municipal waste system Cer tain parts of the e waste stream such as batteries or television monitors are covered by other legislation and some states implement controls over the disposal of articles containing toxic substances In 2009 the Sustainable Electronics Initiative was set up by the Institute of Natural Resource Sustainability to en courage a more proactive effort on electronics waste both managing the disposal of waste but also trying to minimise the production of it It is hoped that this and similar schemes will eventually lead to a national federal initiative on e waste Some states such as Washington and California are already enacting their own stricter controls over electronic waste For more information see www sustainelec tronics illinois edu Waste Electrical and Electronic Equipment Directive Globally the European Waste Electrical and Electronic Equipment Directive the WEEE Directive is the flagship scheme for the control and reclamation of electronic waste It covers all electrical goods both computers and every electronic appliances Con sumer electronic goods sold after 2005 are required to be collected by the companies producing or selling them although most companies contribute towards industry based schemes which organise the collection on their behalf through retailers and local authorities For more information see ec europa eu
121. d as required Hard disks have the advantage that they are inside the machine and so are not prone to loss or damaged like floppy disks they also op erate at a far higher speed and have a much larger capacity than floppy disks Although you might still find floppy disk drives on old computers using the drive is difficult as most operating systems no longer include the programs to make the hardware work Even so many motherboards still include a floppy drive connector 7b it looks like a shorter version of the hard drive IDE connector 7a A hard drive is a spinning aluminium disc or platen coated in a magnetic material The heads travel across the surface of the disk to write data by magnetising spots on the surface or read the stored data by sensing the magnetised areas pass ing beneath the head The disk is enclosed in a hermetically sealed metal housing to prevent dust 31 Wikipedia Hard disk drive en wikipedia org wiki Hard_ disk_drive 32 Wikipedia Computer data storage en wikipedia org wiki Computer_data_storage 33 Wikipedia Floppy disk en wikipedia org wiki Floppy_disk 34 Wikipedia Boot disk en wikipedia org wiki Boot_disk Hard disk drive schematic Rotation 0 Heads Armature Platen disc Armature turns to access tracks across the whole platen particles getting inside The heads hover above the spinning disk at less then the width of a human hair in t
122. d ceiling you should also consider the likelihood of access from adjacent rooms Likewise floor spaces can be vulnerable if their construction allows access from other rooms spaces within the building While all the above are sensible measures there is one very big note of caution Yes you can se cure the building against various forms of exter nal intrusion either natural accidental or delib erate However if the house building is on fire and those inside can t get out or the fire service can t get in you ve got a really big problem The general point about security is that by working in layers you can spread the security risks through many different mechanisms rather than relying Maintenance security and resilience 119 on just one or two options By spreading the se curity measures to secure the most important items it can become unnecessary to put intru sive or expensive general security measures in place around the whole building Traditionally the way to secure a building is with a lock Big heavy locks might give the appear ance of security but many locks have basic flaws which allow the perception of security they give to be quickly bypassed Both the building rooms and cabinets cupboards in the room can be locked but don t rely upon mechanical locks to guard against access by skilled operatives All key based locks can be picked if the person has the skills and the tools to do so The standard front door lo
123. d emit more carbon than storing a DVD at a location where it could be held se curely The implication of this is that backing up large quantities of data off site has the lowest im pact if carried out using storage media such as optical discs rather than using electronic networks The difficulty is organising how the data will be transported to the other location whether it is secure enough to hold the data and accessible if it becomes necessary to re trieve the data How these issues are dealt with and solutions found would have to be tackled as part of the process for planning and implementing a back up procedure When data CDs first became widely avail able but the use of computer networks was still in its infancy the publication of digital content often used CD based distribution as a means of moving large quantities of informa tion in a structured format Today with the ad vent of high speed networks disc based dis tribution of publications is going out of fashion in favour of network based web distribution of content and more recently the movement of large blocks of data using peer to peer file 23 BBC News April 2012 Google Drive to offer free storage in the cloud www bbc co uk news technology 17831725 Figure 6 3 Comparison of Internet versus Sneakernet impacts D pes D ct E Kg co2 Energy kWh wn D A 3 2 E Cost UK o Blu ray A DVD RDL A sharing T
124. d if using a machine with limited memory space If the machine has a lot of memory then it is possible from the programs configuration options to increase the number of undo steps How many steps you set depends upon your preference 30 to 40 steps is probably suffi cient for most applications Finally most operating systems use a waste basket to store files which have been removed from the hard drive This means that you have to occasionally go in and empty the waste While it is tempting to simply empty trash or use a delete command to directly re move files from the hard drive the waste basket feature serves a very useful purpose it stops the user deleting files accidentally Also do not blindly use the empty trash command al ways check what s in the waste bin before eras ing the contents 25 Wikipedia Software as a service en wikipedia org wiki Software_as_a_service 98 A practical guide to sustainable IT Box 6 4 Information storage check list The more common and easily accessible a resource the less we need to back it up the more unique or expen sive a resource the greater the need to create a back up copy value the files on the computer using this general principle Separate the information held on the machine into diffe rent directories one directory tree for current work ano ther for already archived files and another for low value superfluous files to simplify the proce
125. d of their ser viceable life 1 Wikipedia Downcycling en wikipedia org wiki Down cycling 2 Wikipedia Embodied energy en wikipedia org wiki Em bodied_energy 3 BBC News 2008 Throw away Britain How to recycle a television news bbc co uk 1 hi uk 7747975 stm This is why the level of technical skill pos sessed by the community is so important to how we can maintain the value invested in the production of technology Community based organisations can find ways of reusing electri cal goods which may not be open to commercial reclamation companies for example repairing electrical goods to supply at low cost to low in come families Community organisations can also respond to the needs of a community by using these materials to develop low cost com munity projects such as community ICT ac cess and training projects Such projects help to retain the value of the energy and resources originally invested in the production of these goods and can make them available at low cost to those who may otherwise not be able to ac cess them if they had to pay the market value for newly manufactured goods 10 1 1 Equipment triage The first important step in the reclamation of electrical goods is triage Like medical triage this involves separating the waste goods received by the project into different groups depending upon the serviceability of the items This needs to be carried out by someone with experience of
126. d reliability of household white goods such as washing machines fridges or cookers mean that they can last five to fifteen years before they are physically worn out Why then should a laptop or mobile phone only be used for two or three years and a mobile phone even less We need the same consumer pressure to push the design standards and service life of consumer electronics in a more sustainable direction Box A2 contains a list of points we should be working towards in order to make ICTs more sustainable Note that the list does not include many of the practical ideas outlined in the text of the guide That is because from the design of our hardware to the use of power management or se curity features many of those things are already achievable the fact they are not implemented is because people do not understand how to implement them or the benefits of doing so Box A2 focuses on those essential elements of sustainable ICTs which we currently do not have the ability to enact and for which change in national and international environmental and industrial policy is required to encourage change in the world s manufacturing systems The list represents a kind of sustainability manifesto for the types of political economic and techni cal changes that we need to enact to improve the ecological performance of information systems Finally no matter how clean and green our in formation technologies become it makes little differ
127. d to produce a car are only one to two times its weight and for an aluminium can around four to five times Another aspect of the limited supply of these critical materials is that as scarcity makes pric es rise the shortage of supply is an incentive to their illicit production Unlike conventional ag ricultural resources where supply can be drawn from a wide area and can shift with the global market mineral resources can only be produced where they are found Similar to the issue of oil and the Middle East as pressure is put on global mineral resources it is a handful of states who are becoming the focus of the world s trade in high tech minerals As a result of the problems with supply some governments are arguing for strategic policies to protect these critical raw materials to ensure the world has access to these resources in the future For example an important metal in the pro duction of miniaturised digital electronics is tantalum Half of the world s tantalum supply is mined in Australia and it is produced as a by product of other metal mining operations in many states but between 1 and 10 may be mined illegally in central Africa This trade in turn sup plies the finance that perpetuates the armed con flict in these areas and the human rights abuses thatare the result While it may soon be possible 29 Arizona State University undated Life Cycle Assess ment of IT hardware www it environment or
128. data Let s apply a very broad rule and assume that the total impact of the hardware is around 1 2 times the impact of the power consumed in which case the embodied energy of the PC hardware is 0 23 kilos of carbon per hour of use Finally the computer user The computer user runs on food rather than electricity In the most developed nations where the average diet consists of a lot of processed and out of season fruit and vegetables the amount of energy and carbon is much greater than in less developed states where more local and basic foodstuffs are consumed Research in the United States US puts the annual carbon emissions from the average diet at around 5 500 kilos of carbon per year Other Kris De Decker June 2009 The monster Brighter Planet Wikipedia Comparison of life cycle greenhouse gas emis sions en wikipedia org wiki Comparisons_of_life cycle_green house gas_emissions ootprint of digi tal technology www lowtechmagazine com 2009 06 embodied energy of digital technology html 2010 The American Carbon Foodprint Understanding and reducing your food s impact on climate change attachments brighterplanet com press_ items local_copies 52 original carbon_foodprint_wp pdf 70 A practical guide to sustainable IT estimates put European dietary emissions at about half that figure and in less developed states perhaps a quarter of the value in the US Given that desktop computers domi
129. disconnect functions to ensure that it doesn t over discharge the type of battery you are using For those without experience of electron ics or mechanics all this may seem rather daunting Even so if you were to buy a com mercially produced system the considerations and specifications that you need to answer to make a purchase would cover much of this same ground although perhaps not in the de tail explored here Before moving on to build or use a much larger system you might find it helpful to buy a small educational solar power kit These use exactly the same system com ponents albeit with a fraction of the power capacity This enables you to learn more about the design and construction of these systems and to get a basic grounding in the principles of their operation before you move on to con structing more large scale systems It should be noted that even with the best designed off grid system there may be times when it simply runs out of power That s the nature of renewable energy it is variable and occasional natural variation will challenge the assumptions made in the design of most sys tems On these occasions we just have to ac cept that we do no work nature has given us a holiday and we should do something else which does not involve the consumption of electricity 158 A practical guide to sustainable IT SECON 1 FURTHER INFORMATION AND INDEX FURTHER INFORMATION his publication cannot be a solutio
130. duction 25 Guardian Environment Network 2012 EU beefs up electronic waste recycling www guardian co uk environ ment 2012 jan 24 eu electronic waste recycling 26 Leonard Annie 2010 The Story of Electronics www storyofelectronics org 27 Wikipedia Zero waste en wikipedia org wiki Zero_ waste 138 A practical guide to sustainable IT Box 9 1 The control and recycling of electronic waste There are various schemes around the world which seek to control the production and disposal of electrical waste Some are run by industry organisations whilst others are mandated by national and regional law The notable schemes which exist at present are The Basel Convention The Basel Convention on the Control of Transbound ary Movements of Hazardous Wastes and Their Dis posal provides a basic minimum standard for the in ternational movement and processing of hazardous substances including waste electronics In 2006 the parties to the Treaty agreed the Nairobi Declaration on the Environmentally Sound Management of Electrical and Electronic Waste Under this agreement regional systems to control the shipment and processing of electronic waste are now being created The first of these regional agreements covering African nations should be completed during 2012 for more informa tion see www basel int e Sustainable Electronics Initiative The USA has no federal law on the control of electronic waste waste ele
131. e processed into finished goods a large quantity of energy is required and this entails the pro duction of pollution The investment of energy and resources in manufactured goods is often described as embodied energy The benefit of recycling is that much of the energy and re sources investment in the original production of the goods is retained avoiding the need to expend resources again to produce those mate rials Downcycling often involves breaking down or disassembling the goods to produce materi als of a lower quality which while they may be useful require that the value of energy embod ied within the goods is diminished It is tech nically possible to re manufacture goods from the downcycled materials but doing so requires that we invest a greater quantity of energy and resources to achieve this When we look at the options for reusing digital electronics and information systems the principles of downcycling and recycling can help us find the best options for the use of these goods Many commercial electronic waste com panies crush and fragment electrical goods even if they are serviceable because that is the cheapest way to extract value from the collect ed waste Community based schemes provided they have the skilled technicians available can look instead at the options for recycling find ing new uses for serviceable goods and only discarding those items which cannot be reused because they have reached the en
132. e capabilities of the hard ware For small offices older machines can take on roles which support or extend the functions carried out by the machines people routinely use thereby extend ing the functions available to the user or freeing up capacity on their main machine to allow them to work more easily Finding opportunities to do this requires that we understand more about the different roles machines are able to perform and then match the available hardware to those roles Too often the creative IT world focuses on the use of a single often new or powerful desktop machine when if we were to think more openly about using a local network it is possible create some very helpful solutions using older equip ment For example routinely processing large video files or mastering video DVDs can tie up a system for long periods of time affecting the completion of other work on that system But if a second machine were set up with a remote desktop accessed over a network you could undertake these same operation without re stricting the capacity of the main workstation machine This also does away with the need for the second machine to have a keyboard or mon itor Likewise given that laptops use a lot less power than desktop machines an old laptop is a much cheaper option to run 24 hours a day for file sharing or to configure as a server running a small local network rather than leaving a more power hungry machine running
133. e cases they might turn up the contrast to increase the definition of the text on the screen but it doesn t create a great improvement in readability Where users have difficulty viewing what s on the screen or with particular applications the best solution is to experiment with the colour scheme Particularly where the user s eye sight is poor or they have a small colour blindness or sensitivity changing the default colour scheme and changing the font size of characters can make a big differ ent to the readability of the display As well as changing the general desktop theme or colour scheme many applications allow you to vary their default colours to produce a more readable interface 5 2 1 Peripherals gadgets and power consumption Assuming that power management is enabled the machine suspends or hibernates when not in use and video display power management has been optimised the most significant remain ing power usage is going to be the peripherals attached to the computer Computer networks especially with the development of broadband are a problem because they re on all the time we ll examine this in unit 7 We ll also look at printers in section 5 4 below What remains are all those other devices which we plug into the machine speakers USB hard drives cameras scanners web cams etc USB peripherals usually draw their power from the computer and when the computer shuts down hibernates the power to the USB
134. e chip is not required and more importantly it reduces power consumption so that the amount of energy the machine uses can be scaled to the demands on the system On laptops it s often used to deliberately extend the battery life of the machine at the expense of operating speed Depending on the age of your hardware there are two power management systems in use e The Advanced Power Management APM system was developed in 1992 Support for APM be gan with Windows 95 but was not included with Vista the Linux 2 6 kernel still supports APM in most distri butions Any hardware which only supports APM will not be able to function with Vista or Windows 7 unless you have a specific driver for those systems e The Advanced Configuration and Power Interface ACPI was developed in 1996 and has superseded APM in most PC hardware ACPI is more versatile and offers more options to configure power consumption by the processor display hard drives and peripheral devices ACPI has been supported since Windows 98 and is supported in most Linux distributions With Windows systems the power management soft ware for specific types of hardware must be loaded along with the other driver software during system installation Power management is configured from the Control Panel In Windows XP you ll find the Power Options icon on the Performance and Maintenance menu in Vista the icon is on the System and Maintenance menu in Windows 7 it s on the
135. e for use with electrical de vices which have conductive nozzles to prevent a build up of static You can also buy special anti static brushes and cloths to remove dust without generating damaging static Another option is to use small canisters of com pressed air to blow the dust out of the case fans and heatsinks The cheapest option is to put your face close to the fan keyboard or heatsink close your eyes tightly to prevent damage from dust and grit and then gently blow to remove the dust Dust is a particular problem with laptop computers Laptops are often put down on top of soft furnishings and dusty table tops where the internal fan can suck up dirt and dust from beneath the machine and trap it inside against the heatsink The internal heatsink of lap tops use high density cooling fins with only a few mil limetres gap between each one Over a few months of in appropriate use these can easily clog with hair and dust preventing the processor from being cooled adequately You will notice this first when the area of the laptop where the processor is becomes unusually hot then the processor will slow down during heavy operations be cause it can t lose heat at a sufficient rate Finally the laptop may shutdown automatically to prevent damage to the system Laptops usually have a panel in the base sometimes secured by screws which covers the fan and cooling fins the user manual will usually show how to remove it Then using
136. e latest design of Apple products in particular the use of tamper proof screws to hold the case togeth er It is argued that this makes it harder for people to carry out their own repairs servicing in order to extend the life of the device The iPod case and other examples where equipment has been engineered to have a short life and or be difficult to repair were highlighted recently in the documentary The Light Bulb Conspiracy 3 2 2 What is open hardware Today a new open hardware movement is beginning to take off pushing the boundaries of how people can share skills information and designs in order to adapt or modify different types of equipment Open hardware at its 13 BBC News 3rd June 2005 Apple deal for iPod battery cases news bbc co uk 1 hi technology 4606481 stm 14 Kahney Leander January 2011 Is Apple Guilty of Planned Obsolescence www cultofmac com 77814 is apple guilty of planned obsolescence 15 Dannoritzer Cosima 2010 The Light Bulb Conspiracy www facebook com TheLightBulbConspiracy View online at documentaryheaven com the lightbulb conspiracy 16 Wikipedia Open hardware en wikipedia org wiki Open_hardware 17 For example see www openhardware org or opensour ceecology org Watch a short video from Open Source Ecology on the principles of open hardware at vimeo com 30171620 30 A practical guide to sustainable IT most open allows the copying and complete modifi
137. e need to license each instal lation With free software there s no such finan cial penalty additional installations are free In this way we can design machines inexpensively to serve specific purposes and undertake that task as securely and reliably as possible Using more than one machine and through this consuming more electrical power might not appear to be very green This ignores the embodied energy of the hardware If you can make equipment last for longer as such a large part of the overall impact is tied up in manufacturing the hardware you reduce the impacts overall Using an old machine can avoid the need to buy new more powerful equipment which saves money as well as energy and pollu tion For example an inexpensive way to back up a workstation computer without the time and expense of making lots of data discs or buy ing a new external hard drive is to take an old 10 Wikipedia Interoperability en wikipedia org wiki In teroperability 56 A practical guide to sustainable IT machine and install it as a data server to store copies of your important data This doesn t use a large amount of energy either because older equipment often consumes less power and in any case this type of system need only be turned on for an hour or two while the back up is taking place The first decision you need to make is What can do with this equipment This is a complex decision and has a direct relationship be
138. ed it is a fraction of the cost of a DVD For longer term archiving of data CDs DVDs and Blu ray discs are the cheapest and easiest option For infrequently used data or for regular back ups of user files they are a simple way of preserving files Optical discs can be a reliable means of storing data for a de Table 6 1 Profile of removable storage media Capacity cade or more if the contents of the discs are indexed to indicate their contents clearly and are stored in optimal conditions While you can reuse CD RWs and DVD RWs they can take more time to wipe and re record than using other reusable technologies such as USB sticks For larger quantities of data external hard drives digital data storage DDS tapes and hard drives mount ed in a drive caddy are the best option Digital tapes are good for cheaply backing up a single large volume of data but take longer to record and to read compared to hard drives External hard drives are a simple option to mirror a user s files on a large drive and are very simple to use because they are organised in the same way as the computer s internal hard drive Internal drives mounted in a drive caddy are cheaper to use than consumer oriented external hard drives but require a little more knowledge to use as it may involve re configuring the hardware or operating system permissions in order to ac cess the drive Cost per Cost UK Reusable Life years gigabytes gigabyte
139. eds from renewable sources While the cost of a renewable supply tariff is usually higher than the average grid price how green the sources are is often re flected in that price Large scale hydro and waste incineration are often priced around the same rate as fossil fuelled electricity The most sustainable sources such a geothermal wind and solar power are usually more expensive While not a solution for all the ills of the modern world buying renewable electricity is an important step in moving society towards more sustainable operation Unless people are willing to invest in non fossil fuel electricity the alter natives required to address climate change will not be created If it is affordable buying renew able electricity is a means to encourage invest ment in those alternative sources of energy 5 Benjamin Sovacool 2008 Valuing the greenhouse gas emissions from nuclear power A critical survey Energy Policy Vol 36 pp 2940 2953 www nirs org climate back ground sovacool_nuclear_ghg pdf The figures from this paper are quoted for each energy source listed in Box 11 1 Renewable power 151 Box 11 1 Impacts of electrical power generation technologies The impacts of our electricity supply depend upon the sources used to generate it At present the global power system is dominated by the use of fossil fuels renewable power sources make up less than a fifth of supply The list below outlines the impact of diff
140. educing the costs impacts of web hosting as well as reducing the scale of data downloads Reducing the energy required to generate and serve content is directly relat ed to the way the data is stored For example static web content does not require significant processing compared to dynamically generated content held in databases Finally managing the energy required to display a page is more complex as it requires optimisation of the scripting code used to control the page The difficulty is that the software industry does not apply consistent standards in the way browsers readers interpret the content This leads to an unnecessary duplication in script ing and style information in order to handle the display of content consistently across dif ferent operating system browser platforms It is especially difficult for sites which accept advertising as these blocks of code are loaded from external servers and unless they are will ing to look at the efficiency of their code it is not possible to address its impacts computers is becoming comparatively more expensive Add to that the reduced costs of managing one large server rather than main taining the operating systems of many stand alone computers and the costs of using client server networks rather than many powerful desktop systems becomes an attractive option for larger organisations and education institu tions In many ways a Client server network looks similar to a network
141. efforts created commercial or semi commercial organisations retailing their own version of a Linux system These different ver sions of GNU Linux became known as distributions or distros There are a whole range of Linux and Linux related systems available today Some are primarily desktop systems providing an equivalent range of creative and office based software that is commonly available with proprietary systems others focus on data servers and more technical computer science related applications while some have evolved into single purpose systems such as network routers firewalls and even digital vid eo recorders or media studios Other than the versions meant to be conventionally installed on computers sys tems are also configured as live media that boot direct from a CD DVD or memory stick into a working desktop system The issue when comparing Linux distributions isn t necessarily which is the best Usually a distribution represents a certain design philosophy that is optimised for certain applications rather than attempting to be the best distro There are many different Linux based systems to suit different needs and you need to find the distro that meets your expectations which is quite sim ple as you can freely download most Linux distros to try out For the latest news about Linux distributions avail able go to the DistroWatch site distrowatch com Operating systems Making the system work 55
142. embodied energy of the computer and to balance that we ll ignore the energy used in printing We ll also ignore the energy required to store and transmit the digital information Let s assume it takes three minutes to read a single side of A4 paper Let s also assume that the desktop computer consumes a quarter of a kilo Watt or 250 watt hours of electricity Therefore in a fifth of an hour or 12 minutes the computer will consume the same amount of energy as making a sheet of A4 paper If reading a page every three minutes the user is consuming a quarter of the energy reading from the screen than if they were reading from the paper which is obviously better for the environment However let s optimise this system Let s assume the paper is double sided That uses extra energy for printing but not significantly more because much of the energy is contained in the paper itself Reading from the screen will now take almost half the equivalent energy as reading both sides of the paper Now let s assume that three people read the information sharing the same piece of paper and reading it one after another They are now using the less energy reading the paper copy than it takes to read the information from the screen individu ally And of course if ten people read it then the paper version is using far less energy In reality the figures are not so simple For example if we were reading the information on a laptop comput er that uses a
143. ence if the rest of our everyday lifestyle is not sustainable ICTs are only one small aspect of our personal ecological footprint food trans port buildings and the use of other consumer goods far outweigh the effect of using comput ers and electronic networks Adapting our use of computers to significantly reduce energy and resource use is very important ICTs are reliant of certain types of minerals as well as fossil fu els and chemicals the production of which will become more constrained as we move through the 21 Century However in terms of the rela tive scale we cannot solve the ecological prob lems of the human system with ICTs alone we must also adapt those other aspects of our lives to take control of the unique set of impacts that our demand for those goods has Guidance for policy makers amp campaigners 167 A practical guide to sustainable IT This practical guide to sustainable IT offers a detailed hands on introduction to thinking about sustainable computing holistically starting with the choices you make when buying technology the software and peripherals you use through to how you store and work with information manage your security save power and maintain and dispose of your old hardware Suggestions and advice for policy makers are also included along with some practical tips for internet service providers Written by IT expert and environmentalist Paul Mobbs the purpose of the guideis to encourage
144. entify faults and problems when things start to go wrong 3 3 2 The motherboard Irrespective of what type of computer system you use all its components are arranged on a circuit board usually a single large board called the motherboard On a desktop computer you can see the motherboard quite easily if you re move the left side cover for tower cases or the top cover for desktop cases On laptops the motherboard is buried deep inside and you can t get at it without dismantling the whole ma chine so best not to try Even mobile phones and MP3 players are usually designed with a single large board which contains all the main components of the system That s because it s the simplest way to manufacture and assemble the device The easiest way to learn how to manipulate the hardware of a computer system is to get an old desktop computer take it to pieces and then put it back together again When assembling a new computer or recycling an old one you don t work inside the case of the computer it s too cramped a space to work without risking dam age to the components Instead you assemble the separate parts of the computer system on a bench desktop and then when you know ev erything works as it should you dismantle the system and then install each part into the case we ll return to the process for doing this in the unit on Reuse and reclamation Figure 3 2 shows a logical layout of acom puter motherboard It does
145. ently plug USB peripherals into the yellow sleep and charge ports un less they require power when the machine is shut down Use a printer that meets the demands you require Ink jet printers are better for low volume but for higher volumes laser printers are better suited to the task and in most cases it is better to share a printer between multiple users rather than each user having their own printer For information which is not time sensitive or does not date quickly and is to be widely shared print ing a hard copy on recycled paper for many people to read often requires less resources than each individual reading that information from a computer system Where possible use 100 recycled paper and ensure that white office paper is collected separately where a segregated collection can be arranged For larger print runs a photocopier is usually more ef ficient than a laser printer and for regular large print runs using the services of a commercial printer is more efficient than using a photocopier Take care with data capture devices such as digital cameras scanners and sound recording applications to store or encode the data at a quality or resolution that s compatible with the types of application you require the data for Storing excessively high defini tion data requires far more hard drive space To simplify finding or locating information on the computer use an organised system of directories subdirecto
146. environ ment waste weee index_en htm contacts for each EU member can be accessed from this site Chinese RoHS electronic waste law In 2007 the Chinese government enacted the Admin istrative Measure on the Control of Pollution Caused by Electronic Information Products law This law has many similarities to the European Union s Restriction on Hazardous Substances RoHS laws and is intend ed to encourage more responsible waste disposal pro vide better information on consumers of the hazards of certain goods as well as providing an incentive for cleaner production For more information see www chinarohs com End of life and disposal 139 SECTION 10 REUSE AND RECLAMATION Computers and the internet have enabled a capacity for human in teraction and creativity that has not previously existed in our history However while many enjoy the products of the digital electronics revo lution comparatively few understand the principles behind how these tools function and fewer still have the skills required to reconfigure these systems to perform different functions In order to ensure that these technologies support the needs of the broadest spectrum of civil society more people need to engage with the technical mechanics of information systems both to improve their everyday use and extend and adapt their function to meet new challenges One of the simplest ways to engage more people in the techniques and skills required to main
147. eplacing peripherals for newer ones which include more efficient stand by power supplies the power saved is negligible com pared to the waste of embodied energy caused by discarding a functional device when you replace equipment ensure that it meets these new standards While we can minimise power use from pe ripherals the most effective way of eliminating stand by power consumption is to have the abil ity to switch off the entire installation by having easy access to the mains switch This allows the user not only to shut down the computer but also to isolate the power supplied to all its as sociated peripherals It is also safer as it guards against the likelihood of power surges damag 8 Wikipedia One Watt Initiative en wikipedia org wiki One_Watt_Initiative Desktops Programs peripherals and gadgets 73 Box 5 1 Changing the desktop environment configuration On any desktop system the size of the video display has a significant impact upon the power consumed by the system As we saw in unit 3 when discussing video hardware and the AGP slot the higher the resolution and colour depth of the display the more data it requires to generate the display In turn the programs which create the graphical desktop and organise display data for other programs add to the demand on the system and that in creases with the scale of the display With Windows and MacOS you are locked into a sin gle display system while you
148. er manual first The most problematic part of laptops is the battery If regularly discharged it can lose a significant amount of storage capacity in 12 18 months If this happens there are suppliers who specialise in battery replacements Whether buying laptop memory modules hard drives or batteries it s worth shopping around as prices vary considerably Don t purchase on the processor speed alone both new systems and upgrades As noted earlier while the speed of the process is impor tant having a high quality chipset with a larger amount of cache memory and a fast front side bus will provide far more power overall especially when combined with a large memory capacity Buy the machine you need not what you are being sold Machines sold for the home market are increasingly be ing optimised for video gaming they have power hungry video cards and a large processor and memory capacity If you want a machine for browsing the internet and ba sic office tasks buying that extra power in not necessary Simple usage requires only a low end specification video gaming large quantities of video editing and graphic de sign require high spec machines Match the power of the machine to the operating system you wish to run Table 3 1 lists the bare minimum system specification quoted to run various operating systems Ideally you should double or triple these figures If you are buy ing second hand equipment and what you re buying is sli
149. ere are various colour codings in common use Lime green line out front speaker out Light blue line input Pink microphone input Orange centre subwoofer Black rear speaker out Grey side speaker out used with surround sound audio Ethernet port 20 RJ45 Ethernet connector Usually with indicator lights to show when connected in use Firewire port 21 IEEE 1394 firewire socket Alternative format to USB used on some video cameras digital AV equipment S PDIF coaxial output port RCA or phono coaxial connector used to connect digital sound output to home theatre system Usually yellow coded USB port 23 Universal serial bus USB standard type A socket Digital video port 29 pin Digital Visual Interface DVI socket used to connect digital video output to home theatre system video capture devices High definition multimedia interface HDMI HDMI type connector used to connect high definition HD video monitors video games displays Wide RS232 serial port 25 pin D plug Was once used for connecting modems but superseded by Ethernet USB devices a decade or so ago S video port Four pin DIN socket provides video output to a compatible TV video display Hardware Putting the system together 49 SECTION 4 OPERATING SYSTEMS MAKING THE SYSTEM WORK A good computer system isn t simply bought or built it s designed Even when you buy a syste
150. erent energy sourc es ordered from the highest to the lowest level of car bon emissions The figures are the life cycle emission of carbon dioxide in grams of carbon dioxide per kilowatt hour gCO2 kW he for a unit of electricity produced from each source Coal 960gC02 kW h Coal is primarily used for power generation around the world There are different grades of coal and while high quality bituminous coal produc es less carbon emissions the use of lower quality brown coal and lignite or even peat will produce more Heavy oil 778gC02 kW he Heavy oil is a low quality sticky tarry form of oil and for that reason it is cheaper than the price of oil quoted in the media While its low price makes it an alternative to coal for power produc tion it tends to produce more soot acid gases and heavy metal emissions than higher quality diesel fuel Diesel 778gC02 kW he Diesel is often used for power generation as a back up for the large power plants which supply the grid In states with a poor quality power supply diesel generators are often used as an alternative during blackouts Natural gas 443gC02 kW he Natural gas is used pri marily in more developed nations As it is a higher quality fuel it produces less emissions than other fossil fuels Nuclear 66gC02 kW he While there is much contro versy over the use of nuclear power it only makes up 13 of global power generation less than is produced from large hydroelectr
151. erial_ ATA 37 Wikipedia SCSI en wikipedia org wiki SCSI 38 Wikipedia CompactFlash en wikipedia org wiki Com pactFlash 40 A practical guide to sustainable IT Box 3 4 Hard disk drives Most PC hard drives until recently used the IDE stan dard The motherboard has two sockets called IDEO and IDE1 A 40 wire ribbon cable plugs into a socket and each cable has either one or two connectors so a maximum of four IDE drives can be attached to the motherboard Although all IDE drives work the same way when connected to the ribbon cable for two drives to share the same cable one has to be classed as the master drive and the other as the slave This is done by changing the position of a small jumper connector on the back of the drive If the drives are not correctly selected then there will be a clash when the motherboard tries to talk to them and they won t work Not all drives have the same jumper order to select the drive but the correct order is usually displayed on the top of the drive There is another option called cable select but in many cases that doesn t work Over the last few years a new standard serial ATA or SATA has been introduced This is an improvement over the previous IDE system not only because it gets rid of some of the barriers to the size of drive but it also gets rid of the ribbon cable Having two connectors on a rib bon cable was always difficult to arrange when putting a system
152. erms of direct energy consumption but also the indirect use of en ergy and resources in the manufacture of digi tal electronics and the waste and pollution this generates This creates a number of problems with many people s expectations of information systems because just like the problems of the human system within the physical world bal ancing the demand of information systems for materials and resources with the ability of the environment to sustain those activities indefi nitely will require redesigning our use of certain technologies At the same time the present economic crisis which arguably has a relationship to energy and resource use is generating calls for much wider social and economic change from the online organisation of the Occupy movement to the use of electronic media in the organising of the Arab Spring Electronic communications and internet services have a role to play in enabling these changes giving society a means to un derstand debate and act to solve its problems more directly In the short term addressing the historic leg acy of our development of IT systems is likely to involve slowing the pace of development That s not just an implication of the current eco nomic downturn and the financial pressure it is creating in order to improve the quality of the systems we use and reduce their ecological im pacts we have to extend service life and that in evitably means slowing the pace of upg
153. erms of the scale and speed involved it s been likened to a 747 airliner travelling at full speed about six feet off the ground Particles of dust or worse still a human hair would cause damage to the disk and the heads which is why it s sealed away The metal housing also protects the sensi tive magnetic materials inside from stray magnetic fields that might affect its operation There are two standards now in common use for PC drives Integrated Drive Electronics IDE or Parallel Advanced Technology Attachment E IDE or parallel ATA and Serial Advanced Tech nology Attachment serial ATA or SATA Any motherboard more than four or five years old will use IDE E IDE 7a a motherboard less then two years old will use SATA 6 although some retain IDE sockets for compatibility those motherboards manufactured between these times will use ei ther and a large number use both There is a third standard drive interface Small Computer System Interface SCSI but that s not commonly found on PC machines It was mostly used on server ma chines because it allowed a large number of hard drives to be connected to the system Early Apple Macintosh machines also used it Compact flash memory cards are used in stead of electro mechanical hard drives on note book and tablet machines and the latest disk 35 Wikipedia Parallel ATA en wikipedia org wiki Paral lel ATA 36 Wikipedia Serial ATA en wikipedia org wiki S
154. ernet con nected system There are some free anti virus packages available for Windows most nota bly Microsoft s own Windows Security Essen tials Programs which are paid by subscription usually provide a higher level of protection providing not only regularly updated anti virus functions but also the filtering of web traffic and email A particular problem with Windows are trojan programs which infect the machine and monitor its operation potentially sending secure personal data to online fraudsters who can use it to commit crime For Mac and Linux machines anti virus software is still an optional extra as it s not essential to everyday operation although it might be if these systems grow in popularity Where some form of anti virus software is re quired is on Linux servers not to protect the server but to prevent malware being trans mitted by the server which might affect Win dows users While Linux users often talk of the system s immunity to malware it is just as susceptible to unknown security flaws as other systems although one feature of open source software is that programmers are free to study the code in order to find such flaws and fix them Even if someone were to know ingly download a program or script containing 40 Wikipedia Botnet en wikipedia org wiki Botnet 41 Microsoft accessed June 2012 Microsoft Windows Secu rity Essentials windows microsoft com en GB windows products security esse
155. es is also one of the greatest problems with email If the at tachment has not been formatted for efficient de livery it will use an excessive amount of bandwidth in transmission and if saved it will occupy a large amount of storage capacity The simplest way to reduce the size of the files sent via email is to use a data compression pro gram This converts the data in text files and other raw data into a file which occupies a fraction of the space of the original file 10 Wikipedia Residential gateway en wikipedia org wiki Residential_gateway 11 Wikipedia Energy Efficient Ethernet en wikipedia org wiki Enerev Efficient_Ethernet 12 Harris Tom accessed June 2012 How File Compression Works How Stuff Works www howstuffworks com file compression htm Local and global networks 103 Box 7 1 Reducing scaling digital media files Howto edit and reformat digital media is a highly complex subject certainly too complex to explain here Even so there are certain options in the editing of digital media which influence the size of files produced reducing the energy used when they are sent over a network Image files There are three factors which influence the quality of an image file The size of the image in pixels the number of colours used to display the image and the file format the image is stored as specifically whether that format is a lossy or lossless format The size of the image file has
156. ess the re sources they require to work That might be on one machine or it might require configuring machines across the network for example allowing access to file servers or shared resources such as printers It helps to plan these details first so that you can organise how you will install any new machines or modify the configuration of others Where a group of people look after a small network keep ing written logs and procedures is essential so that everyone can co ordinate their efforts and not lose vital information about changes or modifications to machines or system settings Even when there is only a single machine in use there is still infor mation that is essential to its operation and main tenance such as the critical passwords for the machine and also the passwords to access and configure a broadband router or similar devices Each system that is installed should have its own log of critical and background data box 4 3 A system includes details of not just the machine but also any hardware that one or more machines are attached to While not es sential it s good practice If a machine should fail or if a critical password is forgotten by its user keeping a log securely stored on another machine or on a back up memory stick allows quick and easily access to the data you need to unlock the system or gives information to technical support staff so they can diagnose problems more easily Even if
157. essures are causing more businesses and individuals to make do with the resources they already have the skills ISPs develop to manage their own systems of fer the potential to offer new support services to solve their customers problems Changing the way society uses online services is a complex problem like many other eco logical issues Encouraging people to change their lifestyles requires that they understand the links between their own small actions the global impacts of all those similar actions by society and understand why changes to our established ways of working can have both per sonal and global benefits Education and raising awareness is the most direct method to allow people to understand their everyday impact and make the types of changes which benefit them the most This is a role which the internet and ISPs as the creators or hosts of content are well suited Alongside their traditional role in providing internet services ISPs are in an ideal position to provide advice and training on minimising the impacts of ICTs Whether they draw on their own knowledge and abilities to produce their own resources tailored to their users needs or work within the projects and programmes developed 2 WWF UK 2010 Common Cause The Case for Working with our Cultural Values assets wwf org uk downloads common_cause_report pdf by the industry or collaborate more proactively with researchers educators and campaig
158. euse and Abuse to Africa www ban org films TheDigitalDump html 19 Greenpeace International August 2005 Recycling of Electronic Wastes in China and India www greenpeace org international PageFiles 25502 recyclingelectronic wasteindiachinafull pdf 20 Basel Action Network Silicon Valley Toxics Coalition 2002 Exporting Harm The High Tech Trashing of Asia www ban org E waste technotrashfinalcomp pdf 21 United Nations 2010 As e waste mountains soar UN urges smart technologies to protect health www un org apps news story asp News lD 338456 amp Cr waste amp Cr1 End of life and disposal 137 Environment Programme has been working to develop a framework to control the impacts of e waste under the Basel Convention see box 9 1 which controls the global trade in hazard ous wastes In March 2012 the Basel Conven tion adopted new rules to address the move ment of e waste to African states Slowly the regulatory process is catching up with the problems of e waste To make this pro cess successful a more general change in the culture of use surrounding our consumption of electrical goods is required both reducing their toxic content and maximising their useful life in order to minimise their impact on the global en vironment In the end this is a design issue it is a matter of how we choose to build technologi cal systems It also requires the users of elec trical goods to be mindful about the impacts of the g
159. eveloped is a perfect example of the strength of this model of working The Linux system kernel was developed by Linus Tor valds during the early 1990s while he was a computer sci ence student in Finland The internet allowed him to share his ideas with software writers around the world which led him into organising a collective effort to develop an alterna tive Unix like operating system kernel for the PC Rather than a wholly proprietary system like Windows or a partial ly open system such as the Macintosh operating system Linux has been developed under a free licence allowing the code to be shared and modified by users The idea of free software was developed by Rich ard Stallman founder of the GNU Project The object of GNU was to support the development of free computer software by both professional and amateur program mers These programs were made freely available for others to use or adapt under the conditions of the GNU General Public License or GPL The Linux operating sys tem is the product of these two groups so it s often called GNU Linux to reflect the contribution of both Linus Torvalds in the development of the kernel and the GNU Project for the development of the licensing sys tem and the other programs with which the Linux kernel was originally developed The success of GNU Linux has been driven by its li cence It enables programs to evolve in a way that serves the needs of computer users rather than
160. f its components the thermal controls of the CPU and chipset will slow down the computer to re duce the heat load generated Next electrical power The electrical mains brings with it certain problems Electrical noise spikes from heavy industrial machines or loose electrical connections can accumulate damage to the components of the power supply and shorten its life In the worst case a prolonged power surge can disable the power supply and in the very worst case such as a lighten ing strike damage the motherboard as well The simplest solution to this is to plug all the mains plugs into a single switched and surge protected socket Surge protection minimises electrical noise and hopefully blocks the power surges More importantly having a single point to switch off the whole system means that with one switch it s possible to disconnect all the standby power drains of the computer unit printer and other power supplies Arguably assuming you always remember to switch off when the machine is not in use the electricity saved over the lifetime of the system will easily pay for the cost of your surge protected socket When laying out power cables always leave a little slack Ideally you place the switched sock et near or next to the computer partly so that it s always convenient to turn off but mainly so that you can plug in all the mains cables without leaving loops of cable which might get caught and pulled If you have
161. f the eco logical impacts of their work to be mindful of them and to understand how they can work differently to address them can be as cost effective as finding technical solutions Concentrate on what resources you already have Optimising existing systems using auditing or benchmarking tools to measure performance can reduce the pre existing eco logical footprint and might reduce the run ning costs or extend the working life of the equipment More importantly the process of optimising existing systems and working practices can highlight options or needs which 116 A practical guide to sustainable IT were not previously understood and this in formation and experience can become essen tial when planning a longer term strategy e Measurement is critical what is not mea sured is not managed In order to compare the effect of two different ideas or options we have to be able to objectively measure their costs and impacts Traditionally we use costs or prices to measure the bottom line By building in values of both ecological and social impacts in addition to traditional economic values it enables decisions to be taken ona broader triple bottom line Planning the transition towards a more sustain able way of working requires a balance between the ideal goals of sustainability and the prac tical ability to find better methods of purchas ing operating and maintaining equipment You must weigh
162. f the role of social media in recent protest movements see Mason Paul 2012 Why It s Kicking Off Everywhere The New Global Revolutions Verso Books ISBN 9781 8446 7851 8 tions which they ordinarily would be unable to accomplish The difference with information systems compared to for example a hammer is the advanced level of complexity required to create and use these tools If we re considering how sustainable information technology is then this inherent complexity has significant implications for the ecological footprint of the technology and also its future viability 2 1 1 Convergence The importance of programmable electronics has been the ability for one electrical device to serve many different purposes By varying the software program the electronic hardware can perform a wide variety of complex operations As a result not only have digital electronics made the production of technical or consumer goods simpler and cheaper what we increasing ly find is that different kinds of technology are converging into a single device removing the need to have separate devices to achieve those same functions That may seem environmen tally beneficial having one device instead of many but what has happened is that their suc cess has led to their adoption by an ever greater part of the global population and so over the last two decades the material and energy foot print of IT has steadily grown today its carbon fo
163. fe cycle assessment LCA of the prod uct Not only is the composition of the product measured but also the energy pollution and waste production that results from raw materials production manufacturing and use The avail ability of this data generally would enable policy makers and companies to tackle the problematic features of industrialisation more easily Perhaps more importantly for the users of technology it enables the consumer to preferentially buy goods which meet their demands for higher environ mental standards see box 2 2 The life cycle assessment studies carried out over the last decade or so have given us the first snapshot of the energy and resource foot print of IT see box 2 1 By studying the whole ecological footprint it has put the impacts of the consumer in context with the impact of the industries creating these goods and this has focussed the ecological agenda upon the manu facturers That in turn has allowed academics and campaigners to concentrate on the process 22 Wikipedia Life cycle assessment en wikipedia org wiki Life cycle_assessment 20 A practical guide to sustainable IT Figure 2 3 Ecological design and cyclical resource use Energy Resources Raw Inert waste disposal es which produce these goods in an attempt to apply greater pressure for change With the rising concern about climate change there is an increasing focus on the amount of electricity that I
164. fered by the manufac turer When a number of identical computers are purchased at the same time the chances are that they will begin to break down at roughly the same time too especially if a cer tain batch of equipment contained a systemic flaw Alternately if you plan the procurement of equipment to a longer term plan then the purchasing or renewal of equipment can be staggered and the chance that a large amount of equipment would break down over a short period is reduced At its simplest creating resilience is all about having pre planned alternatives to business as usual It begins with everyday procedures such as backing up data sothatifa computer fails you can still have access to the data it contained In addition you might choose to have email accounts with more than one ser vice provider so that if one provider s system fails you can still send and receive messages As part of the design process when evaluat ing options for different elements within the IT system it is wise to provide alternatives to essential parts or services to maintain the sys tem in the event of unexpected occurrences If you have the in house skills failures can be quickly fixed or worked around by repairing or 118 A practical guide to sustainable IT reconfiguring existing systems perhaps util ising components from an expendable ma chine until longer term repairs are made For external services and support it s important to 8 2
165. fferent pathways for backing up Which is the best suited most convenient pathway to use will depend upon how your data is organ ised what the objective of the process is and whether you are trying to secure just a few files or an entire computer hard drive 1 Wikipedia Backup en wikipedia org wiki Backup 6 1 DATA SOURCES AND REDUNDANCY he purpose of backing up is to preserve im portant data if we have to spend money and time backing up superfluous files then that represents an unnecessary waste of resources Therefore the first step in developing a system to back up data is to identify what needs to be backed up and avoid including data that does not need backing up 6 1 1 Identifying what to back up If we characterise the types of files manipulated or stored by computers and the need to back up that data we can broadly identify six categories e Freely available downloaded data for ex ample web pages commonly available files and data While this data may be important it is not irreplaceable Unless it forms an important part of the information we keep backing up this kind of information is not a priority because we can easily and cheaply using less time and resourc es than keeping our own back up copy down load another version if we need it Paid for downloaded data for example downloaded music subscription publica tions and paid for data files As this is not irreplaceable data the quest
166. fferent music delivery methods download intel com pressroom pdf CDsvsdownloadsre lease pdf 21 Taylor and Koomey 2008 Estimating Energy Use and Greenhouse Gas Emissions of Internet Advertising imc2 com Documents CarbonEmissions pdf 22 Pitney Bowes Inc 2008 The Environmental Impact of Mail A Baseline www pb com bv70 en_US extranet landingpages Environ_Impact_Mail_Web pdf 96 A practical guide to sustainable IT e Moving less than two or three gigabytes of data via the internet is more efficient in terms of energy and carbon emissions than posting an optical disc however that s primarily be cause of the high energy and carbon density of the disc If reusable media were used such as a rewritable CD or DVD that would signifi cantly reduce the impacts Even if only reused four times a CD RW disc would then be more efficient than the internet e Taking the cost of data at 1 per gigabyte if using commercial postal services it is cheap er to send up to two to three gigabytes via a network than via an optical disc e While for everyday small scale data move ments e g web pages download or email this analysis doesn t have a great relevance where these figures are very significant is the use of networks for backing up data For example Google has recently launched a large capacity cloud storage service If used for backing up routinely moving that quan tity of data via the internet would take more power an
167. fraud avoidance rule any organisation wishing to of fer money products or IT support either on the phone or online should not object to giving you a company name land line telephone number and postal address at which you can contact them In order to ensure that you have redress for any consumer fraud it s important that the organisation is based within your resident legal jurisdiction Any organisation which is not will ing to give a telephone number or postal ad dress to verify their identity or which insists on conducting business only through websites or email should not be trusted Maintenance security and resilience 131 SECTION 9 END OF LIFE AND DISPOSAL All types of tools and machines have a limited functional life How they are used cared for and maintained has an important role to play in maximising that working life but in the end they will fail or compared to a new device become inefficient to use Electrical devices due to the toxic materials they contain represent a hazard when disposed of inappropriately For this reason ensuring that all electrical items are collected and reprocessed to maximise the recovery of materials and minimise the impact to the environment of waste disposal is an im portant part of how we manage this equipment at the end of its life Assessing when a device has reached the end of its life and then dis posing of it in an ecologically safe way are the last two stages in the
168. freedom of expression and communication and which systems software applications allow this without expensive lock ins to one particular company or service provider Distinguishing the full range of options you have to solve a particular design technological or communications problem and managing the legal or other implications of pursuing those solutions is the practical method by which you enact this freedom of choice There is of course no easy way to acquire these skills it s something you have to work at by learning more about the systems and technologies involved 8 Wikipedia European Union Microsoft competition case en wikipedia org wiki European_Union_Microsoft_compe tition_case 9 Wikipedia Linux distribution en wikipedia org wiki Linux_distribution 54 A practical guide to sustainable IT Box 4 1 Free software and the GNU Linux system The free and open source software FOSS movement began in the 1980s as a reaction against the increasingly closed world of computer software A large part of the computer industry grew out of academia where the idea that knowledge should be open is generally cherished being open for this community was not a novel con cept Sharing prevents the duplication of effort and en sures that potential solutions can be peer reviewed and implemented far faster than if small groups are working in isolation GNU Linux the first viable free computer operating system to be d
169. g As a metaphor for the idea of moving data on foot this method of data transfer became known as the Sneakernet While we may focus on the use of the inter net it is arguable that a person walking with a bag full of data can move information faster than many electronic networking technolo gies That s because while the internet is fast for everyday small files and email transfers when considering the movement of giga bytes of data the throughput of the network can be 17 WSP Accenture 2010 Cloud Computing and Sustainabil ity The Environmental Benefits of Moving to the Cloud www accenture com SiteCollectionDocuments PDF Accenture_Sustainability_Cloud_Computing_TheEnviron mentalBenefitsofMovingtotheCloud pdf 18 ZDNet October 2011 BlackBerry issues statement over downed services www zdnet com blog btl blackberry issues statement over downed services 60450 19 Wikipedia Sneakernet en wikipedia org wiki Sneakernet very slow The different ecological impacts of moving data via electronic networks or manu ally carrying or sending storage media via the postal system or a courier service are also sig nificant There are various figures for how much en ergy it takes to move a gigabyte of data across the internet A general figure is somewhere around seven kilowatt hours per gigabyte and with power generation producing around 600g of carbon dioxide per kilowatt of power that entails the emissions of ar
170. g consumables and power consumption Often paying more initially can reduce the costs later The warranty period is the best guide to the ex pected service life The longer the warranty period the greater the likelihood that the machine will have a long service life In a choice between hardware with a similar specification a longer warranty can represent a more reliably engineered sys tem which is less likely to go wrong Does the manufacturer provide environmental reporting information The issue with environmental reporting such as mea surements of power consumption embodied energy waste production and carbon emissions isn t simply that it gives you extra information to decide between different brands or devices Companies which issue environmental reports are more likely to police the activities of their sup pliers to ensure that they conform with the product stan dard and that ensures that tight environmental stan dards are applied in everyday industry practice Check for non branded equivalents for the equipment Branded goods have the greatest exposure in the me dia but often more generic non branded equivalents are cheaper The spares for non branded goods may also be cheaper and more easily available as they are more likely to be used in a range of consumer goods Warranty periods terms are also important in making a choice be tween branded non branded goods Is the user able to service and repair the device E
171. g about 20project 20 20 LCA 200f 201T 20hardware html 30 European Commission 2010 Critical raw materials for the EU CEC ec europa eu enterprise policies raw materials files docs report_en pdf 31 Global Witness 2009 Faced with a Gun What Can You Do www globalwitness org media_library_get php 980 1277197135 report_en_final pdf 32 Sourt C The Congo s Blood Metals The Guardian Friday 26th December 2008 www guardian co uk commentis free 2008 dec 25 congo coltan to buy equipment which is accredited as blood metal free the basic laws of economics mean that everyone is benefiting indirectly as a result of this illicit trade By increasing supply within are tight market it lowers the price of these resources for all The only way to address the issue of con flict resources is to have a globally policed system which is able to accredit the trade in all resources The debate over green IT shows the value of life cycle analysis and also demonstrates the complexity of how we must manage the transition towards more sustainable industrial processes Some of the leading hardware manu facturers are now commissioning reports on the impacts of their activities and life cycle analy sis is a key part of providing this information But while life cycle assessment allows us to look at the impacts created by our demand for certain goods for those whose work or lives have be come dependent upon these technologies it can also thro
172. g metered access having to pay for the amount of data they transact down loading unnecessarily large files unfairly penalises them when the same quality of communication could have been achieved with a smaller file size 7 2 2 Web browsing Over recent years especially since the widespread adoption of broadband connections the size of web pages has grown significantly This is in part the result of more graphically complex pages and the increasing role that advertising and content tracking have in the design of many websites and blogs Especially for sites with animated advertis ing and which require large quantities of script ing code to control the behaviour of the page the ecological impacts are not just related to the amount of data downloaded executing local scripting can also require a large amount of the machine s processing power For example some newspaper sites now required a megabyte or more of data to be downloaded for each page and on some web pages especially where poorly designed or incompatible Javascript controls are used view ing the page will increase the load on the processor increasing the machine s power consumption The need to download data can to some ex tent be controlled through the configuration of the web browser Some aspects of minimising 17 Wikipedia Client side scripting en wikipedia org wiki Client side_scripting the downloading of data are part of the browser s config
173. g the CPU the northbridge and the memory a second set links the northbridge and Hardware Putting the system together 39 the southbridge and a third links the south bridge to the disk drive connectors and PCI card slots The southbridge runs its own slow data bus which controls the input output devices on the motherboard It collects together a large quantity of data in its memory buffer and then when there s a gap available on the front side bus it moves the data at high speed into the main memory This allows the CPU and memory to continue operating at high speed without continually being interrupted by data travelling to and from the peripheral devices Hard disk drives have been the main meth od of secondary storage on personal comput ers for over 20 years Before we had hard drives PCs relied entirely on cassette tapes or on floppy disks First the truly floppy 54 inch disks made of a plastic film sandwiched in a card sleeve then the more sturdy 32 inch disks held inside a rigid plastic shell The very first PCs used a floppy disk to boot up the computer with an operating system In fact most operating systems allow you to create a removable boot disk to restart the system in the event of a hard drive er ror although today you might use a CD or a USB stick since floppy drives are now obsolete When complete the system disk could be removed and other disks used to store data were inserte
174. gh HTML formatting will not be significant for small volumes of email when sending to popular email lists or emailing to long distribution lists the additional formatting can represent a large quantity of data Many email applications now select HTML formatted email by default Instead it would be more efficient to 15 Wikipedia Codec en wikipedia org wiki Codec 16 Wikipedia HTML email en wikipedia org wiki HTML_ email Local and global networks 105 use text only email by default and send HTML formatted email only when the use of formatting has a beneficial effect on the clarity presentation of the data being communicated Reducing the impact of our email use is quite simple to achieve provided that we are mindful of the way we construct the message before we send it Controlling our use of email and email attach ments quite apart from the issue of their environ mental impact is also an issue of digital equity and inclusiveness In less developed states par ticularly in South America and Africa which have lower regional connectivity accessing the internet at any appreciable speed can be difficult Even in many developed nations residents of more re mote rural areas cannot connect to high speed broadband If those with high speed broadband routinely email large data files across the web that can create problems for those who do not have the capacity to download those files at high speed For those who are usin
175. ghtly under spec you could perform a motherboard processor upgrade to boost the power at a lower price than a new machine Beware when buying hardware for Linux always check for compatibility Always check compatibility before buying computers or peripherals for Linux Laptops from certain manufactur ers are a problem as are some brands of scanner printer and imaging devices This is much less of a problem than it used to be as more manufacturers now sell Linux com patible hardware or provide driver software for these de vices on their websites 48 A practical guide to sustainable IT Table 3 3 PC ports and connectors DESCRIPTION PS 2 Keyboard 15 Round six pin PS 2 socket coloured purple on later boards It was the keyboard connector until recently when it was superseded by USB PS 2 Mouse 16 Round six pin PS 2 socket coloured lime green It was the standard mouse pointing device connector until superseded by USB Parallel printer port 17 25 pin D type socket coloured magenta on later boards Superseded by USB SPECTR ERR E tt bt tieistaee RS232 serial port 18 9 pin D plug coloured dark green on some boards Superseded by USB VGA video port 19 VGA graphics output 15 pin D socket coloured dark blue on some boards Audio lines 22 Between two and six 2 5mm stereo audio jack sockets microphone which is usually mono Audio input output from the sound card Th
176. gital devices irrespective of the impacts that might have For example we may argue about the carbon footprint of air travel or power gen eration at great length but the ecological foot print of consumer electronics is equally prob lematic As discussed in unit 2 our dependence upon scarce mineral resources poses some difficult questions for our technological society If digital and consumer electronics require these resourc es then just how much are we willing to compro mise to own them This is not an abstract ques tion it s one that s already being played out in the global market for resources and the ways in which the high prices for these materials drives 15 Greenpeace International 2010 Why BFRs and PVC should be phased out of electronic devices www green peace org international en campaigns toxics electron ics the e waste problem what s in electronic devices bfr pvc toxic 16 De Decker Kris 2008 The right to 35 mobiles Low Tech Magazine February 13th 2008 www lowtechmagazine com 2008 02 the right to 35 html 17 Greenpeace International 2010 Toxic Transformers Brief ing www greenpeace org international en publications reports toxic transformers briefing their production in areas stricken by conflict or using forced labour so called blood metals Similarly poor conditions exist in relation to the breaking up and reclamation of waste electron ics in many parts of the developing world T
177. gital networks that the computer is connected to This is a difficult figure to find because it assumes certain things about the user of the system To give a general figure let s take the annual estimate for the inter net s carbon emissions 300 million tonnes of CO2 and calculate that as an average figure for two billion internet users connecting for eight hours a day That gives a figure of around 0 05 kilos of carbon emitted per hour of use Secondly power consumption How much energy or carbon is produced for each unit of 1 Guardian Online August 2010 What s the carbon foot print of the internet www guardian co uk environ ment 2010 aug 12 carbon footprint internet electricity consumed depends upon how ef ficient the power generation system is and the types of fuel it uses Coal power plants generate around one kilo of carbon dioxide for each kilowatt hour of power consumed while natural gas produces around 0 44 kilos and wind turbines about 0 01 kilos Therefore as suming a mix of fuels which give around 0 6 kilos per kilowatt hour and assuming the desktop system consumes an average 250 watts of power the PC emits around 0 15 ki los of carbon per hour of use Thirdly embodied energy How much energy it takes to manufacture a PC and how much greenhouse gases are released as a result vary widely The results usually depend on what the researchers carrying out the work measure and where they sourced their
178. guring screen savers setting the sus pend period to a few minutes after the screen saver activates will save a lot of power The problem is that those who use their com puter as a high powered media player will object because their music will stop playing Consequently it s often less intrusive to leave the suspend option for ten minutes to half an hour after the screen saver activates A problem with suspend is when power is inter rupted or the laptop battery runs down Ona laptop the normal procedure is to transfer to hibernation mode or to execute a soft shut down On a desktop which has no battery back up a power cut or inadvertently turning off a machine in sleep mode can cause data loss from any open applications For this rea son of the two options hibernation is more secure 3 Hibernate this halts the machine backs up an image of the working machine on the hard drive and then powers down to an off state The difference between hibernation and sleep modes is the amount of time it takes to restart A machine in sleep mode will wake up after five or ten seconds of the wake button being pressed Restoring full operation from hibernation can take thirty seconds or more depending on the speed of your BIOS self check it is quicker than having to power down and reboot but some users find the wait problematic Hibernation can sometimes cause problems if an error occurs when the hardware is powered down or the machine
179. h the software required to configure VPN con nections allowing computer systems to se curely back up to a remote server The problem with network back ups is that even for a handful of machines this represents gigabytes of data being routinely transferred across the network and that requires a lot of energy we ll investigate this in unit 7 The shift to faster networks which use comparatively more power compared to the older slower stan dard is in part driven by running more opera tions across local networks such as data back ups While the centralised automated backing up of PCs from a server is very simple to organ 14 Wikipedia Virtual private network en wikipedia org wiki Virtual_private_network Information storage and security 93 ise the use of the network for backing up can create a heavy drain on the network s capacity Seeking the least ecologically damaging route to backing up requires us to value to the data we are copying against the impact this ac tion creates In many cases backing up across a small wired network using 100 megabit rather than gigabit speeds will use less energy than a wireless connection Backing up more than two or three gigabytes of data to an online service that keeps files live 24 7 is likely to consume more energy overall than reusable storage me dia In devising a policy for backing up it is nec essary to weight these different factors to pro duce the least ecologica
180. h as the elimina tion of common PVC polyvinyl chloride and flame retar dant plastics it is currently the main labelling scheme used by most IT equipment manufacturers To access the products database and learn more about the scheme see the website www epeat net Restriction of Hazardous Substances Directive RoHS This is a European law introduced in 2006 which seeks to restrict the use of certain metal and flame retardant compounds in all consumer goods Goods produced or marketed in the European Union EU have to meet these standards While there is no specific logo for goods those which are compliant have RoHS printed on the packaging or on the body of the product The RoHS legislation has recently been merged with the EU wide controls under the Waste Electrical and Electronic Equipment Directive WEEE this is discussed in detail in unit 9 By being WEEE compliant you not only tackle some of the toxics issues but you help to simplify the way that the waste industry collects and processes the equipment at the end of its life Greenpeace Guide to Greener Electronics This is the most wide ranging rating scheme for elec tronics based on energy use carbon emissions the use of recycled materials and the management of chemical hazards As well as the general report Greenpeace pro duces a report card for each major hardware manufac turer detailing their performance generally and which products meet Greenpeace s re
181. have a similar environmental footprint even though they have very different storage capacities For the greatest efficiency use the largest capac ity disc that s suitable for the scale of back up operation required Creating CDs DVDs and Blu ray discs re quires the use of a disc mastering application These come as Standard on all current operat 11 Wikipedia Optical disk authoring en wikipedia org wiki Optical_disc_authoring 92 A practical guide to sustainable IT ing systems although third party applications are often used as they give more functionality The mastering program bundles up the data files into an image of the disc to be created then writes that image to the blank disc in a single operation Third party applications usu ally provide extra often proprietary options to configure the format of the disc and to enable the creation of other disc formats such as au dio CDs and video DVDs CDs DVDs created on Windows machines have traditionally been a problem due to the use of Microsoft s proprietary format for cre ating data discs which restrict their compat ibility with non Windows systems Since Win dows Vista users have the option of creating a live file system format which is only com patible with Windows Vista Windows 7 or a mastered format which is more widely com patible with Mac and Linux machines MacOS and Linux machines usually create discs using the SO9660 international standard and
182. he higher the power output e It is possible to use a generator powered by biofuel or biogas This is a heavier and more complex operation but it represents a very dense source of power as gas and biofuel contain a lot of energy in a small volume of fuel The battery store has a fixed capacity If the battery was continually charged past that point it would slowly degrade the battery and in the worst case could lead to a fire or release of flammable gases To protect against this 14 Wikipedia Photovoltaic system en wikipedia org wiki Photovoltaic_system 15 Wikipedia Wind power en wikipedia org wiki Wind_ power 16 Wikipedia Microhydro en wikipedia org wiki Microhydro 17 Wikipedia Biofuel en wikipedia org wiki Biofuel 156 A practical guide to sustainable IT Figure 11 2 A typical off grid power system Charge controller Shunt regulator Generator the battery must have a cut out device which prevents overcharging e Certain power sources such as solar PV can be automatically disconnected to pre vent overcharging This is achieved with a voltage controlled switch called a charge controller When the battery reaches full capacity its voltage begins to rise expo nentially As it rises above a set point the controller disconnects the panels More ad vanced controllers for larger PV systems half a kilowatt or greater called maximum power point tracking controllers sense t
183. he highly complex mixture of materials in e waste and the problems of recovering the substances they contain without causing any toxic pollu tion make their reclamation in the developed world expensive Even when the best reclama tion technology is used and high recycling rates are achieved toxic waste streams requiring safe long term disposal are still produced As a result when many electronic devices reach the end of their life they are exported from western states to poorer countries with less demanding environmental laws for recy cling In many west African states India and east Asia this is creating a highly toxic legacy for future generations As these schemes tend to target only the easy to extract metals gold or steel it means that the metals valuable to digital devices are scrapped or lost in the sys tem Even when old computers and mobile phones are exported to Africa for reuse they will after a short period of use be discarded and in many African and east Asian states the lack of any formal collection systems and advanced processing of e waste means that they are un likely to be responsibly recycled As pressure groups highlight the issue and consumers begin to question the environmental costs of the products they buy government and policy organisations are beginning to address the problem of e waste The United Nations 18 Basel Action Network October 2005 The Digital Dump Exporting R
184. he optimum operating voltage of the solar pan els and adjust according This increases the efficiency of the system by 15 in summer and up to 30 in winter e Other power sources especially wind and hy dro cannot be disconnected to prevent over charging For example if you disconnected a wind turbine the resistance to the wind creat ed by the battery is removed and the turbine would spin faster and faster until it ripped itself apart In these cases a shunt regulator 18 Wikipedia Charge controller en wikipedia org wiki Charge_controller Voltmeter battery condition monitor Low voltage disconnect Inverter DC power AC mains power is used Like a charge controller it senses the battery voltage but instead of disconnecting it switches the current to a bank of high ca pacity resistors which dump the excess cur rent as heat in the most ecological designs the excess power might even be used to heat water Note that many of the diesel petrol genera tors designed for use with batteries include over charge controls as part of their design and will gradually slow the engine to an idle tick over once the battery is charged more ad vanced models will automatically turn off and on in response to the change in battery volt age If using a very basic generator without these advanced monitoring systems it should be connected to the battery using a charge controller This will disconnect the load and the
185. he phone line The router unit on a broadband phone connection should unless you get a direct lightening strike prevent power surges reaching the computer The ATX power socket on the motherboard has a lug on one side and the plug on the end of the cable has a small hook that engages with the lug to stop the connector working loose Since the development of the Pentium IV the CPU now needs its own power supply and this is provided by the four pin connector 12 on more recent ATX power supplies it also has the lug hook ar rangement to stop it falling out Also before you turn the power on the large fan on top of the CPU needs a power supply Depending on the type of fan you ll find either a two or three pin connec tor 14 somewhere near the CPU where the fan can plug into the motherboard Sometimes the northbridge chip also has a fan in which case that should plug in somewhere nearby too al though some are directly wired into the mother board meaning they re a pain to remove if they fail and have to be replaced As computers have become more power ful so their power consumption has risen Early PC power supplies were rated at less than 200 watts Most PCs today have power supplies rated at 600 to 800 watts and some of the latest high performance PC used for video games and num ber crunching can have power supplies of over 1 000 watts with water cooling of the chips to increase the rate of heat removal On top of
186. he relative ecological impacts of networked versus stored data distribution in dicate that we may need to re evaluate how information distribution is planned As general rule where the content is relatively static or is 24 Wikipedia Peer to peer file sharing en wikipedia org wiki Peer to peer_file_sharing Information storage and security 97 not regularly updated the impacts of distribu tion via optical discs may be lower than holding that information live online For example the data required to install an operating system to day fills a DVD and arguably the ecological im pacts of distribution on DVD would be marginal ly better than via the internet and yet the trend today is for greater network based software distribution to install and maintain operating systems or to run software remotely within the a cloud system 6 3 CONFIGURING THE DESKTOP TO IMPROVE DATA SECURITY AND USABILITY nother significant area of everyday data loss is user error or system crashes which affect the work program in current use While many programs are getting better at recovering data following a system crash it is possible to improve the way we use programs to reduce the likelihood of losing data Firstly many programs particularly word processor office applications and text editors can routinely create a back up copy This feature is enabled from the user configuration options for the program While some will create a bac
187. he way computer hardware works is fairly simple Even if you don t bother to modify your system know ing how the insides of the machine function can be very helpful to finding faults with your system and it can be immensely useful to understand all the acronyms and specifications you are bom barded with when you buy equipment 3 3 1 Types of PC hardware When we talk about computers we re conven tionally shown a large box with a screen and keyboard or a laptop which combines these el ements In fact computers come in all sorts of sizes and many don t have a screen or keyboard e At the smallest end are plug systems very small low power consumption computers such as the GuruPlug or SheevaPlug which plug into a mains plug socket and run your local network You access the machine over a network connection and the machine itself usually runs a Linux operating system 18 Ifixit Self Repair Manifesto www ifixit com Manifesto 19 Wikipedia Plug Computer en wikipedia org wiki Plug_computer e Next are mobile phones and palmtop ma chines and tablet pad computers and we should add games consoles and similar devic es into this category too As outlined earlier these are made from proprietary hardware components modules and are very difficult to modify Even the open mobile handsets which use the Android operating system are largely intended to allow users to change the software on the machine not the hardware
188. hough in some parts of the world off grid power supplies are the only option to run ICT equipment 150 A practical guide to sustainable IT 11 1 IMPROVING THE SOURCE OF YOUR ELECTRICITY SUPPLY he ability to vary the source of your electric ity supply is dependent upon the level of liberalisation of the power grid in your area In more developed states the supply of electricity is carried out by private companies either partly or wholly regulated by government As part of this process consumers may have a choice of different power suppliers and each supplier will have a range of electricity tariffs for different types of electricity generating technologies In less developed states power generation comes in a variety of forms from wholly state con trolled to wholly privatised The general prob lem here is that there is often a restricted choice of power sources available to purchase through the grid Different power generation technologies can be grouped according to how green they are see Box 11 1 While some forms of power are obviously renewable other power sources are less beneficial for the environment For example municipal waste incineration can create electri cal power and it is often promoted as an envi ronmentally advantageous technology although research suggests that waste incineration pro duces less power than the energy which could be saved if that waste had been recycled especially paper and plast
189. hs If we look at the mega pixel rating and the size of print that can be produced most cameras are taking impractically large images They are much higher resolu tion than commercial digital print machines which usu ally operate at around 300 pixels per inch resolution are far higher than can be displayed on the computer moni tor which operate at 75 to 150 pixels per inch and are excessively higher than is required for producing every day documents or web based content where images of a few hundred pixels square are often all that is required Buying a camera purely because it has more mega pix els is once it exceeds six to eight mega pixels an excessive use of resources for most everyday purposes Instead by matching the resolution of the image to the application you Camera mega pixel MP rating and maximum photo print size MP rating Maximum print size 3 6 8x5 1 inches 17x13cm 6 10x6 7 inches 25 4x17cm 10 12 9x8 6 inches 32 7x21 8cm 12 14 3x9 3 inches 36 3x23 6cm 16 16 4x10 8 inches 41 7x27 4cm To calculate the relative size of the image take the pixels width and height and divide by the image resolution E g a 3MP image with 2048x1536 pixels at 300 pixels per inch gives an image of 6 8x5 1 inches require the image for you can produce smaller image files and as a result fit more images on the camera or the stor age device where you keep the image files If using acamera
190. ia Dead bolt en wikipedia org wiki Dead_bolt 10 Lock Pick Guide Padlock shim www lockpickguide com padlockshim html The greatest problem with securing the items in a room are those things which are physically difficult to secure books large desk top computers DVD players etc Small high value items such as digital cameras or external hard drives can easily be locked in draws or cup boards Laptops can also be locked away when not in use Which items we choose to secure in a room depends upon their value and or whether they can easily be replaced For those things which are replaceable such as books subscription publications and computer peripherals the simplest option is to have insurance if they re taken or destroyed you buy another with the in surance money although some insurance poli cies might ask you to list all such items when obtaining the policy If you want to keep other non digital information safe such as the origi nal copies of important papers certificates and other documents then you ll need a fire proof cupboard or safe to lock them inside when not in use For irreplaceable items such as film based photographs or rare printed materials and books the best option is to scan digitise them use the digital copies day to day and store the originals in a secure location away from the workplace The general problem is desktop computers servers laser printers and other expensive pe
191. ible alternatives per character that s 80 or eighteen million billion billion billion or 1 8x10 3 possible alternatives 18 Wikipedia Access control en wikipedia org wiki Ac cess_control 19 Wikipedia Biometrics en wikipedia org wiki Biometrics 20 Wikipedia Security token en wikipedia org wiki Secu rity_token 21 Wikipedia Password en wikipedia org wiki Password 22 Wikipedia Personal identification number en wikipedia org wiki Personal_identification_number 23 Wikipedia Passphrase en wikipedia org wiki Pass phrase Manually entering a PIN number every 10 seconds assuming an unlimited number of tries it would take nearly 28 hours 10 000 x 10 seconds to enter them all This process is called a brute force attack 4 By using many processors in parallel the specially designed cracking computers created for IT research and intel ligence agencies can try millions of passwords per second Against such professional cracking technology an eight character password doesn t stand a chance and could be broken in a few weeks but an 18 character passphrase might take months or years to crack In reality a brute force attack doesn t start at O and step through each alternative The process of password cracking uses many steps to guess the most likely password passphrase based on the occurrence of certain words or let ters in the language used Another option is a dictio
192. ic dams Geothermal 38gC02 kW he Geothermal power is produced in volcanically active areas such as Iceland the US or Kenya It uses hot rocks to create steam to generate power Solar photovoltaic 32gC02 kW he Photovoltaic PV cells turn sunlight into electrical power While the greatest solar resource is in the tropics even at higher latitudes photovoltaic cells can still produce a viable amount of power Some manufacturers now produce solar PV kits to power laptops and mobile phones Biomass 14 35gC02 kW he Biomass is plant matter It can be burnt in power stations in the place of coal or turned into liquid fuels such as biodiesel for use in generating equipment Solar thermal 13gC02 kW he Solar thermal genera tion is used in desert regions using mirrors to focus solar heat and create high pressure gas to turn power generating turbines Small scale hydroelectric 13gC02 kW he Small scale hydro uses small flows of water in streams some times without the use of a dam to trap water As wa ter is relatively heavy micro hydro is a good source of power for off grid electrical systems Biogas anaerobic digestion 11gC02 kW he Biogas is created by the digestion of animal manure and plant matter by bacteria It produces methane which can be burnt in modified generators or gas engines to pro duce electricity Onshore wind 10gC02 kW he Onshore wind is one of the fastest growing sources of renewable electricity Whi
193. ically such as RAID hardware which automatically duplicates data on two hard drives This is effective at preventing loss due to hardware faults but will not prevent loss es from malware user error or physical dam age to the hardware Additionally running hard drives in parallel increases energy consumption in the machine Therefore for most small serv ers and desktop computers the simplest option is to copy an image of the hard drive to a back up storage system 5 Wikipedia Malware en wikipedia org wiki Malware 6 Wikipedia RAID en wikipedia org wiki RAID 7 Wikipedia Disk image en wikipedia org wiki Disk_image Removable media storage Archiving E E cS oe compression hice program USB USB external System users Off site storage Free rented server space Flash stick card Friends Removable contacts storage k et ssneakeng Social networks Commercial services e Using a drive caddy a second hard drive can be inserted into a machine but as it is removable it doesn t require a power supply at all times only when it is being used to record a back up This is often a cheaper option than using USB hard drives especially if you are reusing old hard drives from other machines When the machine is booted up the operating system can read and write from the hard drive allow ing individual files or the entire hard drive to be copied across When the operation is complete the
194. ics In the same way the burning of biomass wood and plant matter can be less damaging to the environment but if the land the fuel was grown upon had previously been forest or agricultural land producing food crops the im pacts are not much better than using fossil fuels For this reason it is essential to consider what 3 GAIA 2007 Incinerators vs Zero Waste Energy and the Climate www no burn org downloads GAIA_Incinera tors_vs_ZeroWaste pdf 4 European Environment Agency 2006 Paper and card board recovery or disposal EEA Technical report No 5 2006 www eea europa eu publications technical_re port_2006_5 at_download file power sources are used to create the electricity that support our ICT needs Rather than consid ering just the direct carbon emissions it s impor tant to use life cycle analysis studies of power production which take land use change and other indirect effects into account In states with a liberalised energy supply many different producers supply the grid with power The power produced from these sources is then balanced by the amount of power individual us ers buy from the grid Therefore with a green energy tariff while you may not be physically us ing renewable generated electricity the amount you consume will be balanced by the amount of renewable power entering the grid By contracting with a provider of renewable electricity you can purchase some or all of your electricity ne
195. ield Ac cess Space Irrespective of the purposes reclamation proj ects are usually based around the vision and drive of a handful of people Most computer rec lamation groups are motivated by people who have in depth practical ICT skills although they may not necessarily be employed by the in 10 Hole in the Wall www hole in the wall com 11 NepaLinux www nepalinux org 12 iStreetLab istreetbhae ning com video mervin s bin 13 Sheffield Access Space access space org 144 A practical guide to sustainable IT dustry Others within the group may represent specific community or educational stakeholders who work alongside the more IT literate mem bers bringing their community organising and networking skills to the project While groups may come and go what marks out the most successful projects is that they are able to transfer the skills held by the founders to successive members who have joined at a later date Although organisational and logis tical problems often dominate the activities of the organisers particular in more commercial projects the longest running projects are of ten the most successful in transferring skills to a large number of people within their com munity of users Without such skills transfer the whole project might be jeopardised by one or two members leaving taking with them the essential skills required to undertake practical recycling work As it is the sharing of skills which identify
196. ig difference to the efficiency overall when multiplied by the millions of transactions a day that flow through a single large computer installation However equally significant sav ings in time and energy can be made for small office and individual computer users and multiplied by the millions of computer users 1 Wikipedia Operating system en wikipedia org wiki Operating system around the globe that potentially adds up to a very large amount of time and resources too If we include the human resource side of the system not just the hard ware the use of operating systems and configuring the features of the system to protect data is a critical resource issue as significant as energy consumption If data is lost it has to be recreated if files are corrupted and there is no effective system of backing up the work has to be done again Secure and resilient system design ensures that data loss is avoided and security is maintained and in this way we avoid the need to expend more time and energy recreating lost or damaged information In this section we re not going to examine the mechanics of how an individual operating system is installed There are more than enough books and guides already available on this subject as well as the oper ating systems own installation documentation Instead we re going to look at how operating systems are configured to provide certain func tions or services what useful functions we can m
197. ight hours a day five days per week 46 weeks per year That s a total consumption of 460kW h year Taking a typical UK electricity tariff as an example at 0 14 kW h that s 64 year If you could improve the power factor from 0 5 to 0 7 that saves around 20 or 12 year but only half of that figure 6 year is due to the computer box and its internal power supply Whether or not it s worth replacing the power supply depends upon the costs of replacement A high efficiency power supply might cost 50 Assuming a usable life of four years it will never repay the cost of the new supply Let s say that the power factor was 0 4 increasing to 0 7 would save almost 10 year which makes it almost worthwhile That s why the adequate power factor is 0 5 a result any higher is unlikely to merit changing the power supply unless you were able to do so at a negligible cost There are of course other ways to save energy and costs A laptop computer will generally use a tenth of the power of a desktop its monitor and speakers An LCD monitor will generally use around half to two thirds of the power of a plasma display Again these are the kind of decisions you need to take before you buy or obtain equipment changing components after the purchase is unlikely to pay for itself in the amount of power saved even if you re sell the unwanted parts 44 A practical guide to sustainable IT 3 4 PUTTING IT ALL TOGETHER y walking through
198. ill be restricted not to improve our experience of the technology or to protect fun damental civic rights but primarily to protect the economic interests of their manufacturers These new systems backed up by the pro tection of intellectual property law create other restrictions which generate a number of hidden costs to the computer user Once a user commits to a certain system standard for example the choice of using either a Macintosh Windows or Linux based PC the barriers that this creates can make it difficult to change after that deci sion is made Primarily there is a cost penalty either for changing the machine technology buy ing new operating software and licensing it or converting the media that you used with the old technological standard to the new Technological standards create a means whereby system de signers have control over the market for certain goods and services locking people into using their products in the future As we move towards a society where information systems are an ines capable part of everyone s lives we have to pose a very important question about the informa tion systems we create How do we square the development of a new networked society where information is intended to flow more freely with an intellectual property system whose primary purpose is to restrict information flows in order to extract greater value from them To examine this idea in more detail lets con sider somethi
199. inting or copying devices e Purely on the basis on the embodied energy of manufacturing having a large number of users share a printer is more efficient than having a printer for individuals small groups The capital savings also means that buying a more expensive more efficient printer is cost effective for larger groups e Small laser printers which will duplex are now available This means they print both sides of the sheet automatically Even though they cost more routinely double siding print jobs will cut paper use and due to the high price of paper pay for itself fairly quickly While you can print both sides by printing odd and even pages separately and reloading the paper if there is a fault during the printing of the second side this can often waste paper so a duplexing printer is the best option Duplexing can be enabled from the printer configuration interface in order to reduce the amount of paper used in routine print operations users can still print single sided but they must deliberately select this option before printing e Most word processors and other applications create documents from a standard template and most allow the configuration of this template file to be edited Editing the tem plate can enable a a specific set of printer settings in order to ensure the most efficient Fraunhofer IZM PE Europe 2007 EuP Preparatory Stud ies Imaging Equipment Lot 4 www eup network de fi
200. ion is whether backing up would cost more than the value of the data you may potentially lose Another difficulty is that music or other downloaded files may only work on the authorised com puter they were downloaded onto backing up digitally locked files such as this only has value if you can transfer them to another ma chine later e g the iTunes service allows you to authorise up to five machines to play your downloaded music e Stored data offline for example software installation discs bought CDs DVDs or your own data back ups As with downloadable data if you already have an offline copy there is no need to back up this data again unless there is a reason to do so for example if you have edited changed the contents of a stored file since it was read from the storage me dium e Stored data online for example websites files kept in online systems e g social media or information stored in online services e g web based email and file storage One of the problems of backing up is the scale of the data that is now routinely stored on many different computer systems With the growth of online services this data is increasingly not under the control of the person who created the file or data While backing up to an online system is a way to avoid backing up using physical media DVD USB sticks etc the question is what would happen if the online system was unavailable For example if you run a website
201. ipheral parts of the system 3 3 4 Assessing the speed of the system Whenever you see adverts for computers they always stress the speed of the processor as the most important selling point That s not wrong but it s not necessarily true see box 3 2 While the speed of the chip is important the design of the other components in the system also has a big contribution to the overall speed The main difference when you buy a very expensive com puter isn t just the speed of the CPU or the size of the memory it s the quality of the other chips on the motherboard This increases the data transfer rate between the CPU the memory the disk drives and the accelerated graphics display The more expensive the motherboard the faster the chipset of the motherboard will function and so you ll squeeze more data through the system every second Even so and irrespective the sys tem specification of your computer you need to match what your hardware can provide to the de mands of the operating system see box 3 3 When you look at a motherboard the CPU ap pears to be the largest component on the board That s because it has to have a large fan fixed to the top of the chip to remove the heat it gen erates In older designs of CPU if the fan failed the chip would burn itself out Modern designs of chip are temperature controlled and will slow down as they heat up so if your computer ap pears to be working very slowly it s possible that
202. is switched off at the mains When the machine restarts instead of booting the operating system it copies the memory im age back from the hard drive and resumes operation from the point it was told to hi bernate Errors can cause the reboot to crash and the machine has to be reset and rebooted from scratch e 4 Soft shutdown telling the machine to shutdown powers down the system This means that the system is off but the power is still connected at the power supply hence soft shutdown as only the software has been stopped With soft shutdown you restart the machine by pressing the power button and then the system reboots from scratch e 5 Hard shutdown the human operator physically switches off the machine at the mains This disconnects all power so that the machine consumes nothing On laptop systems not only are the major components integrated into a single unit they are optimised to use as little power as pos sible but to do this you trade off some of the processing power available with desktop ma chines For demanding jobs the power saving limitations on laptops mean that jobs can take longer unless you deliberately turn off the power saving features on the laptop at least while its running on AC power However for most everyday office related tasks a lot of processing power isn t required and so enabling these features will have little effect on the speed of operation You can also
203. itself e Next there are laptop and notepad comput ers Unlike wholly proprietary systems which are not intended to be modified by their users these allow limited scope for maintenance and upgrading Usually you have the option to change the memory hard drive and internal battery although finding the right memory module or drive can be difficult e Next there are desktop machines the large metal boxes that we traditionally associate with the term computer With the excep tion of Apple machines and some other pro prietary designs almost all of the components in a PC compatible desktop machine can be modified or upgraded This not only allows you to increase the power of the machine easily but the hardware itself is far easier to reuse recycle at the end of its life e Finally there are server machines These are like the plug in machines noted above but they re many times more powerful and for that Hardware Putting the system together 31 Box 3 1 Hardware buying check list Cheapest is not necessarily best Often you get what you pay for Devices which use non reusable or disposable goods such as the ink or toner in printers are often sold at cheap prices because the proprietary components they consumed are sold at a relatively higher price What you need to consider is the total cost of ownership how much over the likely life of the equipment you are going to spend on purchasing servicin
204. ive rather than two or three smaller drives The exception would be where you are using another hard drive as a back up for the primary hard drive but as we ll examine in the section on Infor mation storage you can use a removable drive caddy to avoid the need to have that drive connected to the sys tem at all times Finally hard drives also produce a lot of heat and in hot climates they can become very hot which can signif icantly shorten the life of the electronic components If a drive is running too hot to touch when in use you should consider adding an extra fan to the system to draw air across the hard drives That might use more electricity but that s not much when compared to the embodied en ergy of the hard drive if the excess heat causes it to fail connector Serial data connector Power connector SATA drive 0 SATA O SATA 1 SATA 2 SATA 3 a Motherboard a v D v m D A SATA cables SATA drive 1 Hardware Putting the system together 41 less low power notebook computers These use IDE parallel ATA electronics However there is an issue as to how long lived this technology is especially if the card is used heavily for very long periods Flash drives rather like the USB sticks commonly used with computers work very fast and don t use much power The largest amount of drive space you can organise on the machine is limited by the num ber of hard disks you can attached to the s
205. k up file with a slightly modified file name others will set up a specific directory to store back up copies of the files documents being worked on Each time you save a copy of the file it stores the previous version as a back up If a crash cor rupts the original file or the contents of the file are accidentally lost or erased or if saving the file erases some valuable data that had existed in the previous version of the file it is possible to revert to the back up copy and recover lost data Secondly it s always a good idea to regularly save work Some programs allow you to configure an auto save option to save the document at a specified time interval Rather than remembering to save the program will take care of that for you The difficulty is that sometimes if you make a mistake the auto save option can over write the back up version of the file being worked on The trick is to set the auto save interval to be short enough that you will not lose data if the system crashes but not so short that it repeatedly stores the current document which restricts the ability to reuse the previously saved copy of the docu ment if data is lost during editing Thirdly most programs allow you to undo the editing or processing of data The more steps that it is possible to undo the greater the chance that mistakes can be corrected The main restriction on the undo facility is the amount of memory it takes up Your options are limite
206. ks used a number of different systems but over the last two decades network connections have become standardised around different technologies that have been adapted to work in different spatial environments e Ethernet is a wire based network which physically links machines together In terms of the number of machines connected it is the most widely used networking standard eth ernet uses multi core cables to carry data be tween a local hub and the machines connect ed to it In turn that hub can be connected to other hubs and machines or using a router it can be connected to the global internet Eth ernet has historically used different speeds the most common today being fast ethernet 100 megahertz MHz and gigabit ethernet 1 000MHz Faster speeds are now in devel opment and while some use wire based con nections increasingly fibre optic cables are used to connect devices together e Wi Fi is a radio based network operating around 2 4 gigahertz The frequency band is divided into a number of channels and ma chines switch between them in order to find an unused space to establish a wireless link With the development of more portable equipment and changes in the way workplac es are organised to encourage more mobile working Wi Fi has become a popular means of connecting to a local network because it is not necessary to find a cable or network sock et to connect to It has become popular in the home as it allows compu
207. l if you assign them a suitable role in the system Some roles require little processing power such as a printer server file server or running network services such as DHCP and email A new server will do all this and more but if you have a suitable old machine the ecolog ical option is to use that equipment until it can no longer reliably fulfil the role Always document the machine hardware and the system installation Knowing your hardware is essential to maintaining it and especially for dealing with faults and bugs when they crop up More importantly data secured behind password access controls and especially encrypted data can be lost if the password is forgotten Securely stored system documentation listing system and hardware configurations can avoid this Configure power management options to reduce consumption but avoid settings that are so obstructive that the user disables them Power management can make savings in energy use provided that it does not become so obstructive that the user disables it After a period of idleness switching to hibernation is more secure than sleep mode as it s less likely to create data loss in the event of a power failure the machine being switched off Give feedback on power management The best way for a user to understand the load of their system is to get direct feedback on the desktop allow ing them to change their behaviour and not over tax their system 66 A practi
208. l with a computer the machine should be designed to serve its purpose as well and securely as possible For example a general purpose desk top machine could undertake all the roles listed in table 4 1 but to do so simultaneously would drain some of the CPU s power if it all took place on the same machine every extra program running on the system takes a little bit of power away from the important job you re doing at the time It s more efficient to design boxes for specific tasks optimising the hardware and software to provide both functionality and an efficient level of power consumption for the job concerned for exam ple server machines do not need a monitor Making a redundant computer into some thing useful doesn t require an expensive up grade of its components as outlined in unit 3 as is usually the case when installing a fully functional desktop system Again it s a matter of design and matching the minimum specifi cation of the job to the hardware available Of course there comes a point when a machine is beyond practical use usually when it can only run a lightweight text only operating system or you can t install enough hard disk storage or memory to provide a useful level of service Even then old machines can be useful for learn ing how to maintain or rebuild computers or installing operating systems These matters are examined further in unit 10 Reuse and reclama tion and unit 9 End of life and disposal
209. le plug it in around the back and then trail it around the front of the computer This prevents continual rummaging behind the computer which will eventually cause cables to work loose or break Finally let s look at the dazzling array of port connectors which emerge from the motherboard through the back of the computer case It s very difficult to plug a connector into the wrong sock et as they are all constructed very differently More often the question arises as to whether the motherboard has the connector you require There is no standard set of ports on moth erboards although with more expensive boards you are often presented with a wider range of sockets Depending upon the design of the motherboard you ll have a variety of standard ports video USB and Ethernet but new moth erboards might not be compatible with older peripherals If you re in the situation where you need a port but there s none provided or if there are not enough provided then you ll need to in stall a PC card in one of the slots to provide the extra interface s required For very old ports such as the 9 pin serial connectors used by vari ous old types of technical equipment you can buy short adapter cables which will connect the serial cable to a USB socket although not all software may be able to work with this system Table 3 3 lists various ports and shows the design of their associated connectors the index numbers from figure 3 3 are also listed
210. le the largest turbines now produce up to five mil lion watts of power small scale turbines producing 75 to 150 watts can be used to power a laptop computer Large scale hydroelectric dams 10gC02 kW he Large hydroelectric dams which tap the power of the world s largest river basins produce 16 of the worlds power While they produce low carbon electricity they are highly damaging to build and often flood valuable ag ricultural land and wildlife habitats Offshore wind 9gC02 kW he Offshore wind is slight ly more efficient than onshore wind because of the higher and more consistent wind resource available out at sea Even so it is more expensive because of the problems of building and developing turbines at sea 152 A practical guide to sustainable IT 11 2 GRID CONNECTED RENEWABLE POWER SYSTEMS A nother way of using renewable electricity is to generate your own from on site re newable systems This option depends upon the suitability of the location to construct an efficient renewable power system and wheth er the electricity supplier power grid operator allows power to be fed back into the grid Ide ally the amount of generating capacity should match the average amount of power con sumed although the cost size and ability to dump excess power back into the grid are all factors in the planning and installation of grid connected systems An important consideration in creating a grid connected power system is cost
211. leadmin user_upload Produkt gruppen Lots Final_Documents Lot4_T5_Final_Report pdf use of paper and ink toner In addition by minimising the size of the margins and not using an excessively large font size it is pos sible to increase the amount of information on the page The use of ink or toner use can be minimised if the draft mode is used for printing not only with draft documents but for any pub lication that is not intended for formal use memos circulars etc Again this is some thing that must be set in the printer con figuration menu on the operating system or software application Most printer control software allows control over who has access to printers Filtering which users have access can limit the use of more expensive high quality machines and allow general printing to be carried out from a cheaper to run general purpose printer which uses lower quality paper This will save money and environmental impacts for ex ample limiting access to printing on colour printers and allow all access for printing on the cheapest printer On a plain printed page only 5 of the area is covered with ink toner If printing graphs or slides using solid blocks of colour the amount of the paper covered is far higher Using a hatched infill on graphs images rather than solid colour especially when us ing ink jet printers reduces the amount of ink or toner required for printing documents significantly Recyc
212. led paper requires half the energy and produces less pollution than using non re cycled paper If possible rather than bright white paper which has to be chemically bleached to get it clean using lower grade off white paper will save more While there are various various sustainable forestry cer tification schemes for paper these products still use new rather than recycled pulp which uses more energy and emits more pollution Using 100 recycled paper or paper with a majority of recycled pulp is always the better option Waste white office paper is worth more as a product for recycling and is more efficiently recycled if it is segregated from other lower quality coloured papers If it is possible to or ganise a separate paper collection for higher 76 A practical guide to sustainable IT Box 5 2 Printing information is not necessarily a bad thing Paper is a very energy intensive product to manufacture There are various estimates for how much energy it takes to produce and the impact depends upon many variables from whether the paper plant is run by coal or hydro power to how far the paper pulp is transported For the sake of this comparison let s take a general figure of 10 kilo Watt hours per kilo of paper The weight of a single A4 sheet of 80 gram per square metre paper is around five grams The energy required to produce one A4 sheet is therefore 50 watt hours For the sake of simplicity we ll ignore the
213. lem is that 32 Faist et al 2005 Life Cycle Assessment of the Mobile Communication System UMTS Towards Eco efficient Sys tems www fraw org uk files economics faist_2005 pdf 33 APC 2010 Global Information Society Watch 2010 ICTs and Environmental Sustainability www giswatch org en 2010 34 Pelley Janet 2009 Consumer culture keeps carbon emissions high Journal of Environmental Science and Technology vol 43 no 16 p 6116 pubs acs org doi pdf 10 1021 es901774u 35 As yet unpublished a general summary of the findings is available Mobbs Paul 2011 Web design environmental impact and the much ignored ecological efficiency of the Internet Ecolonomics No 12 May 2011 www fraw org uk mei ecolonomics 01 ecolonomics 012 20110523 pdf Local and global networks 109 the use of content creation programs encour ages inefficient site design those creating content do not understand the factors which cause bloat in online content and so cannot format their information in a more efficient manner The solution to this is to seek more direct means of content creation which allow for the optimisation of the content generated This would require a greater level of training and knowledge of web design and the methods which can minimise the impacts of online con tent such as the reformatting of files to reduce their size outlined above in relation to email at tachments At present this is a novel area for research
214. les of recent green IT studies and useful publications are listed in the bibliography at the end of the guide Green IT studies and programmes often take energy con sumption as the lead indicator of sustainability for example the Energy Star labelling scheme developed by computer manufacturers and the US government in 1992 Others go further con sidering the effects of disposing of those ma chines on the environment More recent work seeks to examine the machine as part of a ho listic system considering the whole life cycle of the machines during production and use Across the array of green IT publications available there is little connection made to the other equally important issues related to our use of computers such as systems standards data formats or information security That s a pity be cause there are many common themes between green issues and the everyday concerns which arise from our use of computers and information networks It s by combining the existing green ideas of sustainability with a far broader con sideration of the factors which influence our ev eryday use of IT that has led us to produce this guide to sustainable information technology 1 2 1 The information flower Rather than base our considerations around a definition which begins with hardware in this guide we ll look at our use of IT from the point of view of the information which the system manipulates I
215. life cycle of ICT equipment In this unit we ll examine the environmen tal impacts of electronics and electronic waste disposal In the next section we ll examine ways in which devices might be reused to prolong their service life 9 1 THE PROBLEM OF TECHNOLOGICAL OBSOLESCENCE hen we examine our use of computers the issue of obsolescence not only applies to failed hardware we also need to consider the logical as well as physical methods used to store data A desktop computer or any other informa tion storage device such as a smart phone is only as sustainable as the software and hard ware used to store the data it holds The rea sons behind that statement are not obvious so let s consider a practical example One of the earliest mass market personal computers was the Apple Il It used 51 4 inch floppy disks and ran a bespoke disk storage system and could store around 100 kilobytes of data In the early 1980s the first versions of the IBM Personal Computer also used 5 inch floppy disks and ran the PC DOS disk operating system which wasn t compatible with Apple s system At the time there was another competi tor disk operating system CP M which was also incompatible Jump forward 25 years to the world of computing today Both the Apple early IBM and CP M disk operating systems are ob solete If you had any 5 4 inch floppy disks con taining some important information it would be very difficult to access it 54
216. lly damaging option 6 2 5 The cloud The greatest movement in computing at pres ent is the storage of data in the cloud Cloud computing has evolved with the ever greater use of mobile handsets and computers Ten years ago this wasn t viable but with the greater availability of broadband services and the development of cheap high capacity serv ers storing large quantities of data online is now a viable option Apple s mobile devices Google s Android operating system and Microsoft s new Win dows 8 system are tied to the use of cloud stor age Online services such as banking or social media also use data stored on many machines which are part of the cloud Unlike an identifi able server where you know where your data is stored how the cloud handles and stores data isn t managed by the user it s automati cally determined by the rules that govern the cloud system Cloud storage operators often run multiple data centres and files can be spread across one or many of those locations depending upon which represents the most ef ficient way to move and hold the information concerned However the important issue about the cloud is that it s not just a data storage sys tem it represents a whole business model for online commerce If we look at the services using cloud storage enforcing intellectual property rights in the digital domain is often 15 Wikipedia Cloud computing en wikipedia org wiki
217. longer functions it s broken or when it can t isn t capable of performing a useful function any more This unit examines how much life we can extract from our information systems and what we should do with them when they have served their useful purpose 10 Reuse and reclamation 0 0 00 ccc cee cece eens Can we recycle digital equipment And how can we determine what s best to do with old equipment when it no longer serves its primary purpose To answer these questions we need to consider the options available for reusing or upgrading old equipment and identify what the limitations are on using old equipment 11 Renewable power 220 2000 ccdiecneracia nied nticen bed anne cad Information systems consume electricity and while in most cases the power might be sourced from the electricity grid there are alter natives Renewable electricity can offer an alternative lower carbon source of electricity For those who live away from the electricity grid or where the grid is unreliable it can also offer a means to use IT with out the restrictions imposed by the local grid 12 Further information and index 00 cee ccc eee ee eens Annex A Suggestions and advice for policy makers A digest of the ideas and information for managers and policy mak ers and those campaigning on access to information and communi cations technology Annex B Suggestions and advice for internet service providers server opera
218. losophers Exploiting the revolutionary information technology of the 16 Century the metal movable type printing press they were able to share and then collab oratively develop ideas which formed the basis of the political economic and technological sci ences which make society function today Today the technological diversity and ease of use of information systems is driving a similar revolu tionary process However this time the process is broadening the ability for groups across the social spectrum to access and share information The result from the crowd funding of social projects to the production of computer software which uses first native languages to the recent upheavals in the Middle East is a trend towards greater social debate and diversity within societ ies where ICTs are widely available The downside of this is that as more people access and use the network so the ecologi cal impacts of this the system multiply At the same time while computing and network speeds increase the movement of more data at higher speeds creates a rebound effect eras ing many of the technological efficiencies and energy savings that these new system create Finding solutions to these ecological impacts does not require prohibiting or restricting the use of ICTs in the future By redesigning the technologies involved to reduce the impacts of their use both the physical hardware soft ware and technological standards the s
219. lying link takes the user to a web site where they will be persuaded to release sensi tive information or load software which might install malware on their system Before click ing on any link in an HTML email it is always essential to look at the web address Often this will give an indication of fraudulent use as the address does not match the site organisation it claims to represent While a more technical issue for novice users if you inspect the head er data contained in the email it is possible to look at which address the email originated and then check if that address matches the real ad dress of the organisation s claimed identity Another recent phishing phenomena are hoax phone calls where an operator tells you that they have detected a problem with your Windows computer at present this is a prob lem specific to Windows Mac Linux users usually have the call terminated when they say that they do not use Windows The caller asks 45 Microsoft accessed June 2012 Avoid tech support phone scams www microsoft com en gb security online privacy avoid phone scams aspx 130 A practical guide to sustainable IT you to perform some commands on your com puter and then pay to download some software to solve the problem In fact apart from the scam of making you pay for software that is not required downloading that software is likely to introduce real malware onto the system As a general anti phishing online
220. m commercially the process of defining the correct hardware specification and operating system components still applies The process begins with the construction of computer hard ware then installing the operating system and finally you decide what application programs to install how to protect data on the machine secure access to the system and devise back up systems for data to look after your information To a great extent the specification of the hardware affects which op erating system s can be installed on the machine Even so operating systems the collection of programs which run the hardware and pro vide programs and functions for users and networks are themselves very versatile and define what the system will provide for the user A single machine can have many different functions These can be very general such as in a work station for office or creative work or they can be highly specialised such as a file server which shares informa tion across a local network What determines the role of a system is the type of operating software used desktop server or a thin client terminal and how it is installed and configured Traditionally green IT has concentrated on power consumption and carbon emissions and has largely been centred on the needs of large data centre operators In this kind of environment saving a few mil liseconds here or there by changing the way the operating system is configured can make a b
221. machine can be shut down and the second hard drive removed and securely stored in an other location In the event of a loss of data the removable drive can be re inserted and the re quired data restored e Using a digital tape drive a copy of the hard drive can be written to tape and then removed and securely stored As with the removable hard drive data can be read back from the tape although the process for doing this can take longer Removable media represents an extra level of data security because the data they contain 8 Wikipedia Drive enclosure en wikipedia org wiki Disk_ enclosure 9 Wikipedia Tape drive en wikipedia org wiki Tape_drive 90 A practical guide to sustainable IT Box 6 2 Removable storage media for backing up For offline storage and backing up of data there are a number of different technologies available Which is the best suited depends primarily upon cost the storage Capacity the viable lifetime of the storage media and whether or not the media can be reused Selecting which technology to use should be considered part of develop ing backing up procedures For day to day backing up of small volumes of data such as the daily weekly backing up of current work cheap reusable USB sticks or flash memory cards are the simplest option For the amount of data stored they are faster to use than DVDs and although more expensive than DVDs when you factor in the number of times they can be reus
222. made by dimming the dis play brightness after a certain period of idleness usually around ten or twenty seconds without movement of the mouse or pressing a key This reduces the level of power consumed by the monitor s back light This feature is also en abled from the power management menu usu ally a check box to dim display brightness For both CRT and flat monitors the bright ness of the monitor is also an issue Bright ness isn t usually a feature solely related to the workings of the monitor It is influenced by the 72 A practical guide to sustainable IT relative contrast of the background we view the display against For example if there is a bright sunny window behind your monitor or the sun shines across the monitor it appears that the display is dimmer than it actually is In these situation users are often tempted to turn up the brightness and that in turn will increase power consumption A brighter monitor can also cause greater stress on the eyes of the user Locat ing the monitor in a position where it is viewed against a darker background and where bright lights or sun light do not shine directly across the surface of the screen achieve the opposite the monitor will appear to look brighter This allows the monitor brightness to be reduced and that in turn can reduce the stress on the user s eyes Sometimes particularly where the moni tor is small users can have problems reading the screen In thes
223. maintain than storing data live using online services e Where data is not updated on a regular basis the embodied energy of complex or semicon ductor based technologies is higher than oth er storage options e g keeping archived data on magnetic tapes or discs or on optical CDs DVDs has a lower impact than using external hard drives memory card USB sticks or online storage e Where data is regularly updated meaning that any static back up would quickly become out of date then online storage external hard drives and memory card USB storage are a better option Figure 6 1 illustrates the relative embodied energy of different storage technologies and their relative storage capacity Certain technologies offer a high er storage capacity but often this is associated with a higher ecological impact Even similar tech nologies can differ for example a local PC or server machine has a higher impact than an online service because in most cases online services will be opti mised to operate more efficiently than a compa rable small server or PC There are also differences between compatible technologies for instance because a re writeable CD RW or DVD RW can be reused many times it has a comparatively lower impact than a single use CD R DVD R 6 2 DEVELOPING BACK UP SYSTEMS AND PROCEDURES eciding how often to back up is a balance between practicality and the cost of data loss Where back ups can be automated for exa
224. mall wires on the board leading away towards other chips on the circuit board That s the front side bus FSB Near to the processor there will be an other large chip on the board usually about an inch 2cm to 3cm square often it has its own small metal heatsink on top and sometimes a fan to keep it cool That s the northbridge 2 a chip that controls communication between 34 A practical guide to sustainable IT Figure 3 3 Physical organisation of a motherboard 1 CPU heatsink fan 2 Northbridge chip 3 Southbridge chip 4 Memory slots x3 5 AGP graphics slots 6 SATA sockets x6 7a IDE sockets x2 7b Floppy disk socket 8 PCI card slots x3 9 Front panel connector 10 CD DVD audio input 11 Battery and BIOS 12 CPU power 13 Main power 14 CPU fan power 15 PS2 keyboard 16 PS2 mouse 17 Printer port 18 Serial port 19 Video port 20 Ethernet port 21 Firewire port 22 Audio ports 23 USB ports x4 the memory the CPU and the rest of the ma chine Some of the latest machines don t have a northbridge because due the problems of trying to increase the speed of the system many of its functions are now carried out by the CPU itself A little further away from the northbridge you should see another fairly large chip that should be the southbridge 3 sometimes especially on fairly new motherboards this has a heatsink on top as well This controls the disk drives and the other per
225. me retardants vinyl chloride and other vola tile compounds which affect air quality e As well as using more sustainable IT systems it s important to use products which have a lower environmental impact generally Using recycled materials helps but as a general rule we should seek to use fewer goods overall more reusable and repairable goods and try to extend the working life of products for as long as possible One solution for electricity supply is to buy from a renewable energy supplier or seek to develop a renewable power installation This issue is considered in section 11 Laptops are a different problem It is pos sible to take the hard drive or on new disc less machines the flash card out of a laptop Usu ally they slot into a compartment inside the body accessed through a flap in the case The problem is the connectors on the laptop s hard drive are not designed for regular removal if you did this repeatedly they will become damaged However if you were in an exceptional situation where you felt it necessary to secure the data on the laptop you could remove the hard drive from the laptop in order to store it in a more se cure location For more effective laptop security the most common option is a cable lock One end of the steel cable is bolted to a wall or worktop and the other slots into the body of the laptop and is locked with a key preventing it from being taken away The problem is that the hard
226. monplace the use of UPSs to prevent data loss can be more common although often the costs of these units deters their wider use How expensive the UPS is depends upon how long you want it to function The cheapest only provide a few minutes of power just enough to enable the server desktop to close down the running programs and prevent data loss or to prevent small fluctuations in the supply interrupting the computer More expensive systems use a large bank of batteries to provide power for longer periods or have a small battery bank to keep the equipment running while a generator starts up to supply power If data loss from an unreliable power supply is a problem using a UPS is often a good investment because of the time and data saved However for most small computer users having a UPS for a single desktop machine can be expensive it is more practical to use a laptop computer instead The internal battery of the laptop will cover temporary losses of power just like a UPS although you will have a problem if using other mains powered printers and peripherals Using a laptop is also better suited to off grid power supplies not only because of their greater efficiency but also because laptops run at low voltages which can be matched by most small renewable power systems 154 A practical guide to sustainable IT Figure 11 1 Grid connected power system Electricity meter s the building To get around this problem some sy
227. more processing power than the van sized CPUs of the 1950s There are many types of CPU available and often what you pay for isn t simply a higher speed it s the amount of extra memory or par allel processing systems that the chip contains For much of their early lives Macintosh comput ers used a different type of processor to IBM PC style machines That changed a few years ago when Apple adopted the same processor family as the PC the x86 The first generation of x86 processors was produced in 1978 and formed the heart of the first IBM compatible PC which 23 Wikipedia Microprocessor en wikipedia org wiki Micro processor 24 Wikipedia x86 en wikipedia org wiki X86 all later designs emulated We re now up to somewhere around the ninth generation of x86 processor and the range of processors has broadened to include designs for desktops low power versions for laptops basic chips for cheap mass market machines or more advanced ver sions for those who need lots of computing power More specialised computers such as the server machines that run the internet often use more specialised chips that are designed to perform a narrow set of functions at very high speed unlike the standard x86 family of PC chips which are made to perform a wider variety of functions from processing graphics data or doing complex decimal arithmetic If you look around the processor connector on the motherboard 1 you ll see a network of s
228. mple copying a whole hard drive to a digital tape the process is less demanding of time and so can be carried out more frequently Where individual users back up their files to removable storage such as a USB hard drive it requires more time and so would be carried out less frequently What s important is that some form of back up is put in place and then proce dures are agreed to ensure that these systems are used on a regular basis 6 2 1 Backing up pathways Figure 6 2 illustrates various methods of back ing up There are three different roles in this process which are defined by who has control over the system hardware e System administrators are responsible for back ups which require special actions or se curity privileges for example backing up a hard drive to digital tape Where a single user looks after their own system they would carry out this role but for larger installations where there are defined roles these actions are the responsibility of the individual who has re sponsibility for the IT infrastructure e System users are responsible for the files which exist within their own storage space whether that be on their own machine or ona networked server While their machine can be backed up centrally encouraging users to un dertake their own back ups of essential files adds an extra level of security to the process and helps discriminate between essential data files and other superfluous data e For
229. ms equipped with e reader software there is greater scope to share files but only while the operating system permits that to take place Consequently it s hard to minimise the resource impact of e books by sharing the files between many readers Additionally all the transactions of book download and loans are logged and that poten tially has an effect upon our privacy and free dom of thought When you download files to the e book reader from a service the details of the book and the account are logged and data is available to the company and its corporate part ners to mine as a source for marketing or cus tomer profiling or by security services profiling members of the public from their online brows ing habits While intended for use by com 15 EFF 2010 Digital Books and Your Rights A Checklist for Readers www eff org wp digital books and your rights 78 A practical guide to sustainable IT mercial interests this same technology could enable control over public debate traditionally associated with more repressive states On certain services it is also possible for the service provider to read and manage the content of the e reader device For example it is pos sible for the online services to delete books on a device if there are rights issues about selling the book meaning that a book could be digitally banned from e readers by the service provid er Deletion of books on customers e readers without
230. n be much less if not optimally stored and cared for especially optical discs Information storage and security 91 can be stored securely for example inside a fire proof safe This protects against theft and disasters The difficulty is that restoring just a few files from removable bulk storage devices can take time For this reason it is often more convenient to use a file server machine con nected to the local network and allow users to back up files from across the network The data held on this machine can also be backed up to a bulk storage device such as a tape or remov able drive If restoring files on other computers on the system it will be relatively faster to read back files from the central server than having to locate and install removable media However if there is a disaster then the back up of the central file server can be used to restore all the important files held on the network Where there are a number of machine shar ing a network using a file server is likely to be more efficient than individually backing up each system on the network both in terms of the administrator s time and the hardware required Windows 7 has a built in software application for network based back ups for Windows 7 and earlier Windows systems there are also various third party applications that run across a network to automate backing up to a central server For Linux systems there are a number of free network back up and a
231. n in it self it is a starting point from which you can hopefully gain the inspiration to change and adapt your use of ICTs to minimise your impacts on the environment Below sorted by theme is a list of reports books videos and websites which can help to fill in the detail that is beyond the scope of this guide Green amp sustainable IT Global Action Plan 2007 An Inefficient Truth www it energy co uk pdf GAP An Inefficient Truth Dec 2007 pdf Unhelkar Bhuvan 2011 Green IT Strategies and Applications Using Environmental Intel ligence CRC Press ISBN 9781 4398 3780 1 Willcocks and Lester 1996 Beyond the IT Productivity Paradox European Management Journal vol 14 no 3 pp 279 290 June 1996 dx doi org 10 1016 0263 2373 96 00007 2 Murugesan San Harnessing Green IT Princi ples and Practices IT Pro Journal of the IEEE Computer Society January February 2008 www sis pitt edu dtipper 2011 GreenPaper pdf International Energy Agency 2009 Gad gets and Cigawatts Summary OECD IEA Paris www iea org Textbase npsum Giga watts2009SUM pdf Velte and Elsenpeter 2008 Green IT Reduce Your Information System s Environmental Impact While Adding to the Bottom Line Mc Graw Hill Osborne ISBN 9780 0715 9923 8 Whole Building Design Guide Sustainability www wbdg org design sustainable php Ecological limits sustainability and resource depletion Leonard Annie 2007 The Story of Stuff www sto
232. n moving the important files to a back up storage system and deleting the outdated un wanted files One of the most important skills to learn in organising the files on a computer system is to know when to delete them or to move them onto other forms of data storage that are less demanding of power and resourc es We ll examine this subject in detail in the next unit Desktops Programs peripherals and gadgets 81 Box 5 4 Using metadata to label files Metadata is often described as data about data In addi tion to the image or textual information in a file additional strings of information are used to identify the content of the file when it was created and copyright or other information on ownership Almost all commonly used file formats sup port metadata in order to describe the content of the file and other statistics relevant to it When creating images or capturing other data many of the latest gadgets will auto matically add metadata tags to describe the conditions setting under which the data was processed and stored For example the type of metadata that people commonly see is the track and artists information displayed when playing MP3 music files by labelling the sound file with text which identifies the music the computer is able to order the files more logically when they are queued for playing The value of metadata is that by allowing the operat ing system to know what is inside the file it allow
233. n t really look like this and the precise design of motherboards vary but if you look at most motherboards there are various illustrated guides available on the net you ll probably be able to pick out the components listed in this diagram Figure 3 3 shows what a motherboard might physically looks like and the important parts are labelled to help you these are referenced in the text be low in curly brackets Let s go through the dia gram and explore what each piece does within the system 22 Wikipedia Motherboard en wikipedia org wiki Motherboard Hardware Putting the system together 33 Figure 3 2 Logical organisation of a motherboard Fast graphics port AGP Microprocessor CPU Front side bus FSB On board 1 0 sound USB IR keyboard mouse on board graphics amp network control BIOS chip Northbridge Input output or Memory controller D 3 f lt 3 i a E R Chipset Southbridge or Disk drive controller controller Expansion slots PCI 3 3 3 The processor and chipset Firstly let s look at the microprocessor or CPU the chipset and the front side bus The CPU is the heart of the machine In the 1950s the cen tral processing unit would have been a cabinet the size of a delivery van containing the racks of circuits which made up the CPU Today it s a single chip about the size of a postage stamp and it has thousands of times
234. n was evaluated alongside the results from the other sixteen for most of the indicators used to assess efficiency the Free Range site had the smallest data transaction for an average web page The Free Range Network s efforts were essentially a scoping study to explore the issues related to the bloat of web content and the type of steps which could be taken to address it as part of site design This project is ongoing and it is hoped that this snapshot of the influence of data bloat on web use and its ecological footprint will spur a more general debate and research on ecological web design strategies 108 A practical guide to sustainable IT 7 3 WEBSITES AND CONTENT Ithough email and file sharing download ing make up a large part of internet traffic a significant quantity of the impacts are re lated to everyday web browsing While the im pacts of the world wide web can be controlled to a small extent through the configuration of the browser or use of a proxy server the great est savings on the impacts of the web can be made by the design choices which guide the development of sites It s not so much a tech nological issue or the type of content created it s all about design The operators of websites and services must deliberately set out to cre ate a site that uses the least possible resourc es when it is accessed by its users The IT industry has been able to grow sig nificantly over of the last thirty
235. nary attack which tries words from a dictionary first on the assumption that peo ple use plain words for their password By us ing people s habit of selecting whole words names birth dates people s names and other such trends the most common options can be eliminated first However an equally success ful means of getting passwords is not the use of technology but the use of human to human social engineering techniques Given the right scenarios people will give away passwords or can be tricked into doing so There are two ways to create strong security using passwords Firstly by using more complex and random passwords and passphrases While there s all sorts of recommendations on the length and format of passwords such as how many up per lower case letters and numbers you should use research on the use of passwords suggest 24 Wikipedia Brute force attack en wikipedia org wiki Brute force_attack 25 Wikipedia Password cracking en wikipedia org wiki Password_cracking 26 Wikipedia Dictionary attach en wikipedia org wiki Dic tionary_attack 27 Wikipedia Social engineering security en wikipedia org wiki Social_engineering_ security 28 Mitnick Kevin 2003 The Art of Deception Controlling the Human Element of Security John Wiley amp Sons ISBN 9780 7645 4280 0 paperback 124 A practical guide to sustainable IT that this doesn t create much better security
236. nate the business world in the US and Europe let s take a figure for food emissions as some where between Europe and the US 4 000 kilos of CO per year Therefore averaged over a year the computer user emits 0 46 kilos of carbon per hour of use While green IT guides often look at the carbon emitted by the system hardware it s the sys tem s wetware the human component that s also a significant source of carbon emis sions In the example above the desktop com puter system emitted half the carbon emissions of the food used to fuel the system user if we had used the example of a laptop computer the user might have emitted twenty times more than the computer system they were using Yes the efficiency of power generation and how we make our IT equipment is very important but if we look at the factors which influence the use of IT then the role of the computer user is very important too As the computer user is a significant part of the process it s important that our efforts to re duce energy and resource use include the needs of the computer operator For example e Training learning how to use all the features of the system allows us to more efficiently use the software on the machine and helps us to work more fluidly e Software and hardware if the computer can t easily run the software programs or the operating system regularly crashes and requires rebooting then that affects the ef ficiency of
237. nce PCs became widely used consumers and the PC marketing companies they bought their systems from has a wide choice of parts with different qualities in order to construct the type of system that suited them but due to the IBM compatible PC standard the compo nents could work together Now that era is slowly coming to an end as the world moves away from desktop PCs to other kinds of information appliances As we move from the open design of the IBM PC to mobile phones tablets notepads and palm top devices we are losing the freedom to maintain repair reconfigure and reuse computing technologies Unlike the ad vantages of the IBM PC s open design these new appliances are mostly closed technology unable to be modified by the user or retailer and which vest control over the technology they contain to a handful of companies involved in their production In sustainability terms this is taking us in the wrong direction it encourages obsolescence and short service lives because of the lack of compe tition in the market for parts and because there is very little chance that we could repair the technology if it went wrong proprietary compo nents are often linked to one manufacturer so buying one small part can often cost a large pro portion of the cost of buying a new device To make this clearer let s look at this another way Even without a coherent policy on sustainable design consumer pressure for greater service an
238. nd its MAC address Administration Root password Critical password you should log this and keep it safe User accounts For each user account document user ID and any user specific configurations used with the account e g access permissions Boot loader password Linux A boot loader password prevents bypassing of the root password Hard drive encryption password Critical password if you use hard drive encryption log this Enabled network services upon the technical level of control you wish to have over the system Finally all this information is of course very sensi tive It s not the sort of data that you would print and pin to the wall For that reason the file should ideally be encrypted Keeping the information on an encrypted memory stick or hard disk is one option Another is to Note which services are enabled on the machine use a symmetric cipher so that it is not necessary to keep a public private key pair with the file In the event of someone needing to access that data they could read the file from the network and decrypt it to obtain the in formation they require If changes are made it s a simple matter to decrypt edit and re encrypt the file and then replace the copy kept for maintenance with the new file Operating systems Making the system work 61 4 3 PLANNING AND DOCUMENTING INSTALLATIONS hen installing systems planning is impor tant each user needs to acc
239. nd their contents deleted to free up hard drive space e Where digital rights copyright is an issue data which presents a legal problem if copied or backed up for example commercial music or video files can also be segregated from the bulk of user data and excluded from the back up process to avoid any legal difficulties which result from making copies of that data 6 1 2 Ecological impacts of backing up How we decide to back up will have an impact on the ecological footprint of our IT needs For ex ample if we use reusable back up media such as digital tape or external hard drives that can over time have a lower impact than options where we use the storage media once The difficulty is that there is little detailed information on the impacts of different back up technologies and there has been no comprehensive life cycle analysis of backing up options to compare one option di rectly to another While there are some studies Figure 6 1 Relative storage capacity and embodied energy of back up technologies Local PC External hard drive Digital tape Embodied energy Memory card USB stick Storage capacity which show that downloading music is less eco logically damaging than buying music on a CD or that buying software online is better than get ting it on DVD once you back up those files onto a CD DVD or other offline storage media to keep them secure most of these benefits are lost Much of
240. nels iaa 6075432 more efficient way If those involved know the standard or purpose of equipment they require waste can be refused before delivery and when waste goods are accepted the triage process can focus more clearly on accepting only that equip ment which meets their specifications As a re sult of a more focussed approach the project is less likely to become a dumping ground for un usable superfluous types of waste electronics cycling projects as a means of providing skills training in economically disadvantaged areas such as supporting practical training for the long term unemployed Such funding can form an important part of the project s bud gets as well as providing connections to the local business community in order to source discarded equipment There are a number of examples of this around the globe such as Hole in the Wall education in India e For some reclamation work is incidental to the purposes of the project but the work car ried out can provide a means to provide cheap IT equipment to support the educational or cultural activities of the group Some groups have developed operating system support in native languages usually ignored by main stream systems developers as part of their work to support the local indigenous culture for example the NepaLinux system in Nepal others use recycled technology to offer new opportunities to express local culture such as the iStreetLab project or the Sheff
241. ners ISPs are in a position to help promote change in the way society uses ICTs through the contact they have with their users customer base Box A1 lists 10 priority areas for change some are found in all green IT guides such as improv ing energy efficiency others are rarely included in guides such as highlighting the role of ISPs in defending the public s right to expression and communication If you review the content of the whole guide the points in Box A1 are not exhaustive What they are meant to dois act as general headings or signposts they are there to point a direction from which you can carry out your own research measurement and analysis Unit 12 1 1 Green amp sustainable IT lists a number of publications and reports which ex amine the issues These are usually intended for use by medium and large system operators smaller systems have not been well served by green ICT research as the costs and savings are often only significant when applied across a large IT systems To redress this balance much of this guide is tailored to the needs of those using small networks and stand alone com puter systems The publications listed in unit 12 1 1 are more appropriate to the highly specific needs of large IT system users Guidance for internet service providers 165 ANNEX 2 Guidance for policy makers amp campaigners M odern democratic principles are founded upon the work of 16 and 18 Century Enlightenment phi
242. new mother board with a processor already attached However no matter what speed your processor runs at add ing more memory to the system will usually help Hardware Putting the system together 37 Box 3 3 System requirements Each operating system is usually accompanied by a wad of documentation called release notes a list of the fea tures of the new system installation instructions and any significant changes from the previous version It should list the system requirements a specification of the type of processor s the minimum speed of the pro cessor and the amount of memory and hard disk space required to run the operating system When installing a computer or recycling old parts to make a new one you need to have an idea of what Table 3 1 Systems and system requirements Operating system the system is capable of doing To a great extent that is determined by the memory but also by the processor Table 3 1 lists the system requirements for various oper ating systems Consider all these figures the minimum for installation Wherever possible use the fastest processor the largest amount of memory and the largest hard disk drive to make installation and use as simple as possible Note also earlier versions of the Linux distributions listed in the table will require less RAM and HDD space to function Microsoft Windows Windows ME P2 gt 233 Windows XP P3 gt 600 Windows Vista P4 gt
243. nformation is after all the vi tal human resource which we wish to sustain independently of the hardware with which we choose to process it at any point in time In order to give this definition of sustainability a practi cal meaning we ve broken down the operations 4 Wikipedia Green computing en wikipedia org wiki Green_computing 5 Murugesan San Harnessing Green IT Principles and Practices IT Pro Journal of the IEEE Computer Society January February 2008 www comp dit ie rfitzpatrick Business Perspectives slides Papers Harnessing Green IT Principles and Practice San Murugesan pdf Figure 1 1 The sustainable IT flower Resources al 6 Ss Disposal Hardware Storage Renewable power or processes which define our use of informa tion technology and from each we have drawn a set of ideas and activities which allow us to review audit and improve the way we organise and work with information To illustrate this we ve organised the guide s themes around the holistic motif of an informa tion flower each petal representing one aspect of the sustainable use of IT and the stem as the source of electrical power Each unit in the guide corresponds to an element of the flower Resources or perhaps more appropriately The ecology of technology ageneral outline of how our demand for computers affects the world but also how those demands have changed us Our use of energy sources and n
244. ng that we do every day breakfast When we eat a modern consumer friendly pre prepared breakfast meal we eat brands we chew on other people s intellectual property At the same time the acceptance of the brand means that you leave it to others to decide the taste or texture of your breakfast It s difficult 6 Wikipedia Digital rights management en wikipedia org wiki Digital_rights_management Operating systems Making the system work 53 to customise the brand To make a branded commodity meet the needs of the individual user invalidates the generic standard that the purchase of a national or global brand implies Instead we are required to adhere to the stan dards the brand conveys and conform to the conditions that this entails The process of combining one product with another to create a distinctive brand identity is called product bundling For example Microsoft select what they believe you need to have on a computer or home entertainment console and in the process confer a certain amount of economic power not just on their own products but on the product or hardware providers that Microsoft retains an economic relationship with Likewise Sky s satellite TV system is based upon bundling different pay per view channels and increasing ly telecommunications companies offer bundles containing land line broadband internet and mobile services as well as the ability to down load TV programmes or films 4 1 2
245. nimise the impacts of the system upon the environment 8 1 1 Examining options There is no one method to achieve a good sus tainable design When we build in an ecological dimension to planning our IT needs it quickly becomes apparent that we have to change our working practices not just the tools we use to carry out our work For example while us ing more efficient machines can lower energy use changing the culture or expectation of the people using the equipment offers many more options to reduce impacts for example turning it off using power saving options when equip ment is not in use The best way to approach sustainable design is to think more strategically about our present and future needs Thinking over a longer period allows time for cultural changes changes in working practices to evolve alongside technical change In practical terms what many organisa tions seek to achieve is a compromise between deep green sustainability where ecological principles completely determine how we work and more practical sustainability where we try and implement what is possible today and set longer term goals for improvement How we do this is a matter of setting the context within which we ask questions or find solutions to problems e Take a long term strategy which defines the need for certain equipment over a number of 2 Wikipedia Sustainable design en wikipedia org wiki Sustainable_design years cert
246. not run new software to the users expectations or because older hardware is rejected because of the appeal of new more fashionable products the user scraps the system and buys a new one The idea of perceived obsolescence has been at the heart of the marketing of new products since the 1950s and has been criticised since its devel opment because of the costs to the consumer and the environment Another process related to the use of tech nology is planned obsolescence This involves the developers or vendors of a particular system or product deciding not to support or service older equipment in order to promote the adop tion of a newer model Sometimes the operat ing life of a device can be hard wired into the logic of its electronics and without having access to the detailed designs of the system it can be difficult to circumvent these restrictions More commonly the producers of hardware or software will upgrade systems without back wards compatibility restricting the ability of the latest systems to read files from or export data to older versions This tends to be more of a problem with proprietary systems as open source free software systems allow developers and enthusiasts to continue support for older versions long after the equipment has ceased being supported by its manufacturers For example according the environmental report produced for the first series of Apple iPad it has a design life of three years How
247. nquire if the device is a sealed unit or whether the user can easily replace components which might fail over its operating life Check if the device uses proprietary or standard generic cables connectors If a device uses a generic power supply and the connectors e g sound audio or ethernet use standard fittings these will be easier and cheaper to replace For power supplies especially being able to use a generic power supply means that you can reuse the unit with other equipment when the machine reaches the end of its working life Check that repair is an option rather than whole sale replacement Check that spares for the most likely parts of the equip ment to fail such as rechargeable batteries hard drives cables and connectors are available at a reasonable cost even if it requires a service technician to undertake repairs Does the equipment contain hazardous substances In compliance with recent legislation in Europe and else where goods should indicate whether they contain haz ardous compounds such as mercury cadmium or lead Some manufacturers are also producing goods which are free of PVC and flame retardants Is there are take back trade in option If you rent lease goods you should expect them to be taken back at the end of the lease For goods which are bought check if the manufacturer runs a take back scheme for the machine or the machine s consumables such as ink toner cartridges Does the warran
248. ns the same piece of equipment might be repli cated two or three times which of course has a much higher ecological impact In high avail ability computer systems multiple machines work in parallel enabling the whole system to keep working if one or two machines fail and 5 Wikipedia Redundancy engineering even data storage might use an array of hard drives so that if one drive fails there is an exact copy of the data it contained on a second drive ready for use Unlike these highly specialised examples improving the resilience of our everyday use of technology need not entail a large amount of expenditure and high ecological impacts For example on an average PC the only unique part of the machine is the data stored on the hard drive the rest of the machine is expend able By using a removable hard drive taken from the machine at the end of each day and secured in a safe or locked cupboard if the computer is stolen the data can be quickly re loaded from the old drive onto a new machine Another option is to regularly back up the com puter to an external hard drive so that if the machine breaks down the information on the external drive can be used on another machine Another way to develop resilience is to plan the purchase of equipment so that the likeli hood of many failures occurring at the same time is minimised All hardware has an ex pected working life defined as a minimum by the guarantee period of
249. ntial part of carrying out the initial triage on the waste goods taken in by the project To en sure safe working a bench is required for each person undertaking recycling work In addition to the basic hand tools required for servicing projects can also benefit from hav ing access to 15 Paul Mobbs accessed June 2012 The Container Project www fraw org uk mei container_project Reuse and reclamation 145 Sufficient storage space both racks shelving and drawers to safely store IT equipment computer components and tools A properly installed signal earth to connect anti static mats and wrist straps to for servic ing computer circuit boards connecting to the mains earth can be highly dangerous A voltmeter electronic multimeter for circuit testing e A bench space for soldering de soldering and electrical assembly work with good ven tilation to extract the fumes created by this process this is an important part of electron ics multimedia based projects as they of ten involve the assembly and repair of many different types of audio hifi equipment and cables e Test units for identifying testing memory modules and other components Network cable test unit for checking manu facturing ethernet cables e A bench power supply Speakers audio amplifiers data projectors and other peripherals to aid in the practical use of the equipment refurbished by the project Ordinarily projects would have a m
250. ntials Renewable power 129 malware and execute it depending upon the permissions used to configure the system it is likely to affect only the user account it is run from The use of the suite of security harden ing tools which are now available for use with Linux such as Security Enhanced Linux re duce the likelihood that malware would cause significant damage to the system Lastly an increasing problem on the in ternet is phishing Phishing is the use of the internet as a means to make people disclose sensitive financial and personal information That information can then in turn be used to perform various forms of fraud and identify theft Often such frauds ask people to pay small sums of money as a handling charge in order to arrange the transfer or to receive the goods promised which ultimately will never turn up Email users will regularly receive emails telling them that they have won money or someone wants to give them money in return for their bank details The best response to emails such as this is to hit the delete key A 42 Wikipedia Security Enhanced Linux en wikipedia org wiki Security Enhanced_Linux 43 Wikipedia Phishing en wikipedia org wiki Phishing 44 Wikipedia Identity theft en wikipedia org wiki Iden tity_theft significant problem is the use of HTML emails as this allows the display of web addresses to indicate one web location such as a bank when the under
251. nvironment reports Hardware Putting the system together 29 a half or more are produced during the produc tion of the device the remainder is expended in transport and during materials reclamation One of the important variables in the calcula tion of these impacts is the length of product s service life For the Apple devices shown above they are expected to have a three year life span except for the Macbook which is expected to last four If you can make these devices work for lon ger than this then you will decrease the impact of the product overall Even though using the de vice for longer will mean that the user s propor tion of the total impact will rise because you use more power that fact the most of the impacts are created during production mean that you are unlikely to tip the balance the other way And in any case by delaying buying a new product you are delaying the creation of new pollution in order to replace it with a new one For example using an iPod or iPhone for four years instead of three will reduce the overall impact by almost a third The problem with trying to use many con sumer electronics goods for longer than their manufacturer s anticipated life span is that you run up against the issue of planned obsoles cence Analogue mechanical devices will work right up until individual components fail or wear out although it might be that the device has had its components engineered to last a certain pe
252. o display Next let s look at the accelerated graphics port AGP 5 A modern video display is made up of points of data called pixels the more pixels and the more colours they use the finer the image your display can reproduce The first computer terminals didn t do pixels at all they just dis played characters In terms of the amount of data 28 Wikipedia ASCII en wikipedia org wiki ASCII 29 Wikipedia Unicode en wikipedia org wiki Unicode 30 Wikipedia Accelerated graphics port en wikipedia org wiki Accelerated_graphics_port involved 24 lines of 80 characters at one byte per character is 1 920 bytes Now think of a modern wide screen video display It usually has 1 366 pix els across the screen and 768 from top to bottom Each pixel is capable of representing in excess of a million colours which means each pixel takes 24 bits or three bytes of data to represent its value 1 366 pixels x 768 pixels x 24 bits three bytes is 3 147 264 bytes and given that the screen re freshes its image at least 50 times a second that represents a data flow in excess of 150 megabytes per second In physical terms that s the content of a data CD disc every 434 seconds In fact the AGP slot is designed to handle over 500 megabytes per second equivalent to a blank DVD disc every 834 seconds that s far more data than the mother board s PCI slots can handle which usually have a capacity of 128 megabytes per second The C
253. o function in the best way possible and it is by systematically working through each mod ule one by one that we progressively produce a more sustainable system For example an ethernet network operates according to a technological standard The ma chines which connect to the network use the same standard irrespective of which manufac turer s equipment is used For that reason we can consider the network and the machines which connect to it as representing different modules and each module can be evaluated as a single unit in order to select the optimum design For network hardware this division en ables us to measure the different performance of a wired network versus wifi or a single large network versus a series of smaller subnets and then combine those options to produce a sys tem with the least impact in terms of economic and ecological costs The software that comput ers use to connect to a local server on the net work also functions according to a technological standard distinct from the network hardware This allows us to consider the desktop machines people use as distinct from the servers routers and other parts of the network enabling mea surements or research to be carried out to find the most effective efficient solution for each of these parts By adopting a modular plan as part of a lon ger term strategy for improvement it is possible to progressively upgrade different parts of the system in isolation withou
254. o longer has a useful application should it be disposed of and even then other uses may be found for it if the machine is recycled via a local computer refur bishing or training scheme 14 Bevan Kate 2012 You mean my two year old iPad can t take this year s software The Guardian 4th July 2012 www guardian co uk technology 2012 jul 04 apple ipad software update 136 A practical guide to sustainable IT 9 3 IMPACTS OF E WASTE hen hardware does reach the end of its life it has to be disposed of How that is carried out is intimately linked to the types of materials these devices contain and how the ecological impacts of those materials can be controlled to prevent harm It is difficult to control what substances our electrical devices are made from as many manufacturers provide little information on the environmental impacts of production with the goods we buy although some manufacturers now produce goods free of toxins such as brominated flame retardants and PVC Ultimately no matter how much we can reduce the toxic load the physical volume of electrical waste will always represent a large expenditure of energy resources and pollu tion to create it which is why concentrating on maximising the use of these systems for as long as possible is so important Perhaps due to the separation of our use of modern technology from wider ecological debate there seems to be a sense that people have the right to access di
255. oads blocking pop ups will reduce the load on the processor and avoid loading more data into the system memory each time a new browser window is opened e Advertising filters Even with a pop up block ing enabled many sites now use dynamic HTML to display adverts or animated content which float over the browser window As these stay within the control of the existing window this circumvents control by pop up blocking Instead what is required is an advertising filter plug 18 Wikipedia Web cache en wikipedia org wiki Web_cache 19 Wikipedia Pop up ad en wikipedia org wiki Pop up_ad 20 Wikipedia Hover ads en wikipedia org wiki Hover_ad 21 Wikipedia Advertising filtering en wikipedia org wiki Ad_ filtering 106 A practical guide to sustainable IT in for the browser such as Ad Block which monitors the use of dynamic HTML to prevent frames hovering over the browser window As with pop up blocking this saves processor pow er and memory Disabling Java Javascript and flash The dy namic content of web pages especially that related to advertising can be a drain on the power of older hardware If this presents a prob lem the simplest measure is to disable Java and Javascript and perhaps de install Adobe flash player This difficulty with this approach is that disabling Javascript will prevent many websites displaying their content properly Few websites now maintain a static or
256. ocks are far less plentiful as a proportion of all the stones available This meant that in ancient societies metals had very high price and were only used for very special applications What eliminated the rarity of metals was in dustrialisation and more importantly the early use of fossil fuels to power the furnaces which made metals Before the eighteenth century the limitation on metal production even where the rocks it is produced from were plentiful was the amount of wood required to fire the furnaces to produce pure metal In short the limitation was the quality and scale of the energy available to smelt the ores not just the minerals resources avail able to produce metals This restriction known as the Law of the minimum applies to all other living organisms on the planet too and in that sense today s technological society is no differ ent from our ancient arboreal past In ecological terms the limiting factor is time and the shift to coal allowed the human econo my to escape the restrictions imposed by nature Wood represents stored solar energy and that takes time to grow and mature and so metal pro duction was constrained by the sustainable limits of local wood production For that reason coal has been used in metal production since the time of the Ancient Greeks Coal represents thousands of years of stored solar energy meaning it has a higher energy density than wood and so produces Wikipedia Stone
257. of using large amounts of online data storage When moving large quantities of data between two systems posting optical discs digital tapes can have a lower ecological impact and financial cost than transfer over a network Configure the features of desktop applications to preser ve data Always create back up copies of files being wor ked on auto save at regular intervals set increase the number of undo operations and always use the waste basket rather than directly deleting files Information storage and security 99 SECTION 7 LOCAL AND GLOBAL NETWORKS Early personal computers had a number of advantages over previous infor mation technologies especially in fields such as word processing and the use of spreadsheets However it was when personal computers were first networked together so that data could be shared between users in the same building or across the globe that they began to reshape the world of infor mation and communications Today it is difficult to conceive of a desktop or laptop computer without a network connection and over the last few years the general expectation is that this connection will be a high speed broad band link rather than the slow dial up connections which preceded them While the use of electronic networks has developed computers into a significant new global technology this has not come without an adverse impact As communications have increased so the amount of data flow ing be
258. on figuration of power management in BIOS and change as required if necessary identify the make model of the motherboard then search for and download the board s user manual to check power management options 64 A practical guide to sustainable IT also a number of third party power appli cations which allow you to refine these set tings and which manage the programs that run on the system to reduce the demands on the processor memory and hard drive e Most Linux distributions offer similar power management features to Windows As with the FOSS world in general there are also spe cialised projects which develop power man agement systems for use across the Linux community Many of the popular Linux dis tributions are now producing their own de tailed system documentation on implement ing power saving features policies in server and desktop machines and these guides are available free on the distribution website For the more technically minded there are also free programs which work across most distri butions to audit and improve power perfor mance The leading application is powertop which not only monitors how the system run ning programs consume energy it also sug gests ways of improving system configuration to reduce power consumption e MacOS also has its own built in power man agement modes and there are third party applications which can monitor and optimise the operation of the system 4 4
259. on projects in operation around the world International organisations such as Compteraid specifically work with aid organisations to provide computers to devel oping countries for education and community projects some groups are more focussed on 5 Computeraid UK www computeraid org recycling such as Free Geek an urban project in the US who work on a semi commercial ba sis providing a community service training and volunteering opportunities related to the reuse of ICTs others such as The Container Project based in rural Jamaica are wholly community based using IT reclamation as part of wider cul tural and educational projects within the local community 10 1 2 Finding a purpose for the equipment Projects can run into trouble if their objectives are poorly designed or because they lack the capacity to provide the service they desire In the worst case they can rapidly become a dumping ground for waste electronics Espe cially in those states where the disposal of electrical goods is regulated donating equip ment to community groups can be seen as the easy option for disposing of old equipment As a result the groups can become quickly sub merged in old equipment with no immediate outlet for its reuse and no funds to pay for the disposal of it An important element within community based recycling projects is having a community or body of people who are ready and able to put the reconditioned equi
260. oods they demand and how they should care for and responsibly dispose of those goods in order to minimise the global impacts of their use If we respect the physical boundaries to the natural world then we can make a truly sustain able culture The difficulty is that recognising these limits inevitably means applying limits to ourselves 9 4 E WASTE DISPOSAL SCHEMES A legislation has only recently begun to catch up with the increasing use of electri cal goods the system of controls for e waste management is at the global level still frag mented see box 9 1 While global legislation is in development both the electronics industry and many national governments are waiting to see what procedures current negotiations will enact At present the world leader in the control of e waste is the European Union The directive on e waste the WEEE directive was agreed a decade ago This enacted controls over the dis posal of e waste Since then the EU has also agreed on the Directive on the restriction of the use of certain hazardous substances in electrical and electronic equipment RoHS This seeks to control the range and concentration of toxic ma terials in industrial and consumer products and complements the objectives of the WEEE Direc tive by reducing the toxic contaminants present in the waste stream 22 UNEP 2010 Urgent Need to Prepare Developing Coun tries for Surge in E Wastes www unep org Documents Multilingual
261. orces rather than being motivated by a change in the way we organ ise our use of the system For those who perform largely office related and internet communica tion activities the use of the same computer sys tem fora significant length of time should no af fect the way they carry out that work What tends to create problems are changes to the applications and related software required to view web con tent to read documents or files imported onto the system or problems finding compatible hardware when existing devices cease to function As noted elsewhere in this guide one of the best ways to minimise our ecological impacts is to extend the service life of the equipment we use In order to achieve that goal we must find ways to manage these external incompatibilities find ing alternatives which avoid the need to upgrade until it is absolutely necessary Just because a computer or other device ceases to have a viable function in one role does not mean it would not have a viable future in another As outlined in unit 4 older PC hardware can perform a variety of functions from a small file server to back ing up a laptop or other machine via a network cable to a machine which provides local services on the network or just a machine to play with practising your skills manipulating hardware or installing software Provided that the application serves a useful purpose it is a valid use of that technology Only when a machine n
262. orks become a cheaper and more popular way of providing access to information and networks specialised low power consumption termi nal clients are being developed these consumed much less energy than traditional stand alone fat com puters used on large networks Switching to a thin client network is most commonly associated with the need to perform system upgrades where the reduced cost and ability to recycle existing equipment create a more affordable alternative to re placing many stand alone PC systems Local and global networks 113 SECTION 8 MAINTENANCE SECURITY AND RESILIENCE The term sustainability generally means the ability of a system to continue to function In practice we must not only consider the abil ity to function it s the ability to function even when external events are destabilising the system Just like natural ecosystems what a truly sustainable system must embody is not just the ability to work but to continue to work after events have caused temporary interruptions or problems This characteristic is called resilience and it s a feature that can be designed into the way we build and use computer technology This section looks at resilience of information systems in the broadest sense considering how the equipment is used how the hardware is maintained and how the software is configured to maximise security The objective of this process is to protect our information resources and the m
263. ot create in tractable toxic waste residues While making gadgets last longer has an impact on manufacturers perhaps the great est impact will be upon the software commu nity They too focus on short product lifetimes planned obsolescence and restricting back wards compatibility to ensure that users must upgrade However this culture of obsolescence is predominantly the preserve of the proprietary software industry The most sustainable life cycle for IT involves the use of open standards and open intellectual property This enables a progression of development rather than con tinual reinvention and is far more likely to lead to extended lifetimes because the pressures to continually upgrade are not so great For this reason the free and open source software movement and fledgling open source hardware movement offer a greater potential to develop a more sustainable IT industry in the future and we need to work to support them both as users and if possible developers In the end this is a design issue it is a mat ter of how we choose to build human systems If we respect the physical boundaries to the natu ral world and work within these limits then we can make a truly sustainable culture The dif ficulty is that in recognising these limits glob ally we must begin the process by first applying these limits to ourselves 24 A practical guide to sustainable IT Box 2 2 Sustainability check list The initial con
264. otprint is of a similar scale to that of the glob al air transport industry The clearest example of technological con vergence is the smart phone This is a telephone with a video display screen and digital camera built in capable of playing music radio television and radio Most importantly backing up these various functions is a powerful computer able to interact with the internet via communications networks allowing all the information stored or captured on the device to be shared and ad ditional information downloaded As a result we are no longer restricted to communicating with spoken words we can converse in text images and video or even in the machine instructions 2 Wikipedia Complexity en wikipedia org wiki Complexity 3 Wikipedia Convergence telecommunications en wikipedia org wiki Convergence_ telecommunications 16 A practical guide to sustainable IT Figure 2 1 Global growth in communications technology Internet users n 2 E o 2 E E 2 Telephone lines 1980 1990 2000 Year or language required to manipulate the net works we are connected to As shown in figure 2 1 4 the global growth in the new digital commu nications services has been exponential for the last three decades This same kind of transition took place forty years ago but then as a result of the electronics revolution created by the technological advance from thermionic valves to the transistor This not
265. ould be saving a web page with allis associated formatting and image files which for websites with large amounts of adver tising can produce 40 to 100 files along with the main HTML page file The traditional method of organising data is by using directories or folders describing the types of file contained in the name of the folder as shown in figure 5 1 As we work and create files it is important to store these in subdirec tories folders to hold them separately from the mass of data held on the system Ideally the folder name should identify the contents but as time passes and as old files get shuffled around the system keeping track of all these files folders names and what they relate to becomes progressively harder The difficulty with this approach is that the directory names only have meaning to the hu man operator They have no special meaning to the operating system and may even be vague or confusing for other users too Organising files into a directory tree also requires care and con sistency Without attention to the details of which files go where important data can be lost in a sea of files and subdirectories very quickly The point is the user can soon spend progres sively longer periods of time searching for infor mation and that s because the design of the storage system does not match the complexity of the collection of information being held What has developed over the last decade are systems which en
266. ound 4 2 kilos of CO per gigabyte of data An optical disc with a plastic jewel case takes around 16 kilowatt hours of energy to produce releasing about a kilo of CO2 as a result of its production and while there are no detailed figures a DDS tape might take three times that because it is more complex product containing mixed materials Figure 6 3 shows a comparison of moving data via the internet shown as hatched bars and using storage media via Sneakernet shad ed dots For the given storage capacity of each media type the impacts of moving that data electronically via the internet or creating the back up and then transporting it are calculat ed There are studies of the ecological impacts of the postal service and conservatively these figures have been multiplied by a factor of five to take account of the higher package weight The costs of moving data online have been as sumed to be 1 per gigabyte while the cost of sending an optical disc DDS tape via post and purchasing the blank media is also calculated for comparison What the results show is that e Producing an optical disc and a plastic jewel case to protect it takes around 16kW h of energy and emits a kilo of CO2 however as moving data via the internet is also energy intensive sending a DVD via the post has a slightly lower impact than sending the same data across the internet 20 Koomey et al August 2009 The energy and climate change impacts of di
267. pe of publica tion there will inevitably come a point when it is more efficient to print information which will be required in an unchanging form for the long term for example libraries of books technical information and important reports Where information is short lived or changes rapidly or is only valid for a short period then it is more suited to storage and viewing on digital media The two printer technologies in widespread use are laser and ink jet printers How you interpret the ecological impact of these two technologies is complex and depends upon how much printing you do There are some life cycle studies of different printing tech nologies but they do not produce a clear result Desktops Programs peripherals and gadgets 75 in terms of which is the better option While laser printers are cheaper to run for large vol umes and so have a lower energy expenditure per sheet printed they can produce a larger vol ume of solid waste if they require replacement of the toner cartridge refilling with toner pow der is usually only an option on larger more ex pensive laser printers In contrast while ink jet printers produce less solid waste they use more energy per sheet and can have a higher embodied energy because of the smaller vol ume of printing during their operating life If we look for some general rules and advice about printing there are a number of ways we can maximise the efficiency of using pr
268. pen source software FOSS e Free Software Foundation www fsf org e Free Range Network 2009 Thinking Out side the Cage An introduction to Free Open Source Philosophy www fraw org uk fwd j1 e Lesswatts Saving Power with Linux less watts org e Open Source Ecology opensourceecology org e Open Hardware www openhardware org e Open Source Windows opensourcewindows org 160 A practical guide to sustainable IT Electronic waste management and cleaner production e Waste Electrical and Electronic Equipment Di rective ec europa eu environment waste weee index_en htm Leonard Annie 2010 The Story of Electron ics www storyofelectronics org U S Geological Survey July 2006 Recycled Cell Phones A Treasure Trove of Valuable Metals USGS Fact Sheet 2006 3097 pubs usgs gov fs 2006 3097 fs2006 3097 pdf Greenpeace International 2010 Why BFRs and PVC should be phased out of electronic devices www greenpeace org international en campaigns tox ics electronics the e waste problem what s in electronicdevices bfr pvc toxic e Greenpeace International 2010 Toxic Trans formers Briefing www greenpeace org in ternational en publications reports toxic transformers briefing Basel Action Network October 2005 The Digital Dump Exporting Reuse and Abuse to Africa www ban ore films TheDigitalDump html Basel Action Network Silicon Valley Tox ics Coalition 2002 Exporting Harm The High Te
269. pent searching for or recreating lost data How we configure the operating system and programs we use and how we run systems for backing up and data storage can have an im pact on the extent or likelihood of data loss 6 Guardian Online October 2010 What s the carbon foot print of email www guardian co uk environment green living blog 2010 oct 21 carbon footprint email 7 For example QASys 2009 Statistics About Leading Causes Of Data Loss www aztecsystems com downloads OASys_Protect_FAQ pdf Desktops Programs peripherals and gadgets 71 5 2 MANAGING THE ENERGY USE OF DESKTOP SYSTEMS et s consider a more traditional approach to green IT the energy and resources con sumed by the desktop system In section 4 4 we examined the power saving features of operat ing systems Changing the way programs are executed or the system is configured can eas ily save 5 to 10 of the power consumed by a desktop machine perhaps more if the system is switched into the most efficient power saving mode Unlike laptops desktop systems often have no power saving features enabled by de fault it requires the user to manually activate these features Of all the power saving features perhaps the most valuable is the hibernate or sleep mode This is often used with laptops for example when you close the lid the system is suspended into memory For desktops it can save a large amount of power by configuring the system to
270. plications it s likely the password will be lost If you need to en sure the integrity of files use detached digital signatures to verify their authenticity for ex ample by using a cryptographic hash function such as MD5 or SHA2 e A popular file format or a format conforming to an open standard not a patented software format is preferable to storing data usinga file format tied to a single program or application What s important is that the conversion of data files is carried out when you are finishing and ar chiving a large project That s because at a later date when the system application is about to become obsolete to suddenly convert all the data that you have created over many months or years will be an onerous chore By converting the formats when you finish a project writing a significant piece of work you also guard again hardware obsolescence If all the files are openly readable on their current storage media e g CD DVD memory card etc then they can be eas ily copied to any new standard of storage media in the future By collating our data in a future proof way today we remove the obstacle of con verting large amounts of data in a short space of time in the future and make it easier to migrate those files to new types of storage media 9 2 PLANNED PERCEIVED OBSOLESCENCE AND SERVICE LIFE f we look at graphs of how fast computers have become for example the graphs which illustrate Moore s Law
271. pment to good use Ir respective of how many technicians the group has available to carry out work without a group of people ready and able to use take away the equipment the project will again become a stor age area albeit a store of repaired rather than scrap electrical equipment Setting up a recycling project depends upon finding people with the skills and motivation to seed their skills into the project Even if the project has sufficient people to undertake the work it is important that those adminis tering the project take a cold hard attitude to the acceptance of any and all waste electron ics There has to be a balance between the de mand for the service by the wider community the project supports and the acceptance of ex cessive volumes of waste or unusable types of equipment Although having too little waste to recondition can be a problem for projects hav ing too much is equally problematic because it gives rise to storage problems and potential 6 Free Geek www freegeek org 7 The Container Project www container project net Reuse and reclamation 143 regulatory liabilities for storing e waste all of which increase the costs and legal liabilities of the project Ideally any community based recycling scheme should have its purpose defined by the users of the goods to be recycled In that way the sup ply of waste goods doesn t drive the project it s the needs of the users By having a clear pur
272. porting criteria For more information see www greenpeace org rankingguide In addition to the above sources you can often find more in the environmental reporting or corporate social respon sibility of most IT equipment manufacturers websites The ecology of information technology 25 SECTION 3 HARDWARE PUTTING THE SYSTEM TOGETHER Hardware is the physical components which make up a computer sys tem In this section we ll look at hardware computers and how we can design and arrange the components of computer systems to work more efficiently Today computers come in all shapes and sizes and the electrical technologies on which they are based can have a serious impact on the environment How we plan our need for information and communications and the equipment we use can in turn have an ef fect on the level of these impacts That doesn t just involve what type of machine you use one of the important factors is to maximise the working life of the device before you dispose of it 3 1 WHAT IS COMPUTER HARDWARE F ifty years ago a computer was a collection of electrical hardware which filled a small build ing Today that term encompasses a very broad variety of equipment some of which are the size of a grain of sand The commonest programmable computer devices do not resemble the archetypal vision of a machine with a screen and keyboard Most computers are small and insignificant chips embedded in
273. ports is cut As a result they won t draw power when the machine is not in use The exceptions are the yellow coloured sleep and charge USB ports included on more recent motherboards These are intended to power charge mobile phones and other devices and keep the power turned on even when the machine has been put in a soft shut down not turned off at the mains When using USB hard drives and other similar devices don t plug them in the yellow port or they will keep running even when the machine has powered down When the machine shuts down or goes into a suspend hibernation mode the power to de vices which have their own power supply will not be cut Ideally these devices should have their own internal electronics to monitor the activity of the machine and go into a standby mode when they receive no signal Most new video displays and PC speakers have an auto power on off feature and will turn on and off depending upon whether they receive a video audio signal Of course all mains powered devices even if they power down with the system are still drawing power in their stand by mode All re cently manufactured devices should when in stand by mode meet the requirement of the International Energy Agency s One Watt Initia tive This requires that devices marketed after 2010 should have a maximum standby power demand of one watt and after 2013 that fig ure should be halved While it s not worth de liberately r
274. pose the triage of equipment can proceed in a 10 2 RECLAMATION PROJECTS f we look at the examples of successful com puter IT recycling projects around the world we can find that there are certain characteris tics which are common to all Those wishing to develop ICT education and computer recycling projects should consider these factors and look at the information available to guide their own thoughts and planning 10 2 1 Types of project As outlined earlier projects which recycle com puter and other electrical equipment can have a varied purpose e For some groups the recycling of equipment is the only reason they exist and those joining the project would not look at social or educa tional applications of their work An example would be local Linux user groups who under take recycling work as part of their promotion of free and open source software This is not always the case and for some technology centred groups reclaimed and re purposed technology is a critical part of how they pro mote their social and political agenda for ex ample the Institute for Applied Autonomy e Others may use the equipment they recycle to support community based education and training initiatives Some charities and edu cation agencies give financial support to IT re 8 Wikipedia Linux user group en wikipedia org wiki Linux_user_group 9 Vimeo accessed June 2012 Institute for Applied Autono my vimeo com chan
275. r chiving applications such as Amanda or Bacu la For Mac OS there is also a built in applica tion Timemachine which will back up across a network or to an external hard drive and third party applications are also available Another advantage of network back up software is that it can incrementally back up the contents of a desktop PC while it is in use meaning that PC need not be left on to perform back ups when the operator is not using the machine The concern with any backed up data par ticularly removable media is the security of the information stored With file servers it is pos sible to configure additional security measures such as hard drive encryption to preserve the security of the data stored on the machine Similar encryption options are possible with removable media The difficulty is that encryption uses more processing power and that in turn increases power demand overall if routinely used for servers or desktop PCs Also 10 Wikipedia Disk encryption en wikipedia org wiki Disk_encryption if the encrypted media degrades or is corrupt ed compressed or encrypted data is also more likely to suffer a catastrophic loss of the whole block of data rather than the corruption of one or two files within the back up 6 2 3 User based back ups Now let s look at the computer user The benefit of the user backing up is that because they know which files are the most important it is pos sible to targe
276. r consumption and power factor measurement For mains powered systems the simplest way to mea sure power consumption is to use a plug in power meter These are available for both 230V and 110V supplies and can give a variety of data about the power consumption of the computer system If you plug the monitor into the socket which powers the system you can measure the consumption of all the parts or you can isolate just one component the monitor printer or computer box to see how much power it consumes What is important to understand is that the power a PC system consumes varies all the time When idling it may consume only 15 of the maximum load if you re encoding video or some other power hungry exercise and using the speakers at full volume it will use much more Most power monitors will measure the supply volt age and the instantaneous power consumption What s more useful is to use the power meter function which measures the supplied power in kilo Watt hours kW h from when the unit is turned on This allows you to plug in the meter and measure consumption over an average day or week in order to get a more realistic value for the energy routinely consumed by the system Another important test these meters can perform is to measure the power factor The mains electricity supply is an oscillating wave When that waveform interacts with the electronics of the power supply most of it is used but not all of it In poorly made or d
277. r depleting the resources from which they are manufactured we must learn to plan our use of information systems to maximise material efficiency while minimising their environmental impact In short we must make them more sustainable 1 Computing climate change How much carbon dioxide do computers emit The Economist 24th August 2009 www economist com node 14297036 2 Wikipedia Sustainability en wikipedia org wiki Sustainability 1 1 A PROBLEM OF WORDS AND DEFINITIONS H ow do we define sustainable That s a question which has been taxing the brains of policy makers scientists and environmental ists for the last few decades The problem is that over the years different groups have applied slightly different meanings to the term often based around the objectives of the study or policy they were considering at the time A literal definition of the term means the ability of an activity to endure or function for a certain period of time or perhaps indefinitely Unfortunately for computing telecommunica tions and related technologies there is no agreed standard on how we should measure these im pacts Narrow definitions of sustainability may only consider one or two features of an activity without looking at how other important factors interact with the wider world More general defi nitions may look at a larger number of related factors which collectively define how sustain able the activity i
278. r reducing the sample rate of audio files or the frame rate of video files will reduce the file size without neces sarily affecting the quality of reproduction For example one common problem is that the popularity of digital cameras camera phones has led to people routinely emailing multi megabyte images files If they had taken a few minutes to scale the image to a fraction of its original size it could shrink the file significantly As discussed earlier in Box 5 3 each one mega pixel of a digi tal camera is roughly equivalent to 100 dots per inch DPI when displayed printed Therefore a six mega pixel camera is roughly 600DPI which is four to six times higher than the resolution of most video displays As a result that image could be scaled to a third of its former size without sig nificantly affecting the picture quality Last but not least over the last few years the original standard of plain text email has been slowly replaced by HTML email Rather like web pages these use formatting codes to specify the font size and text decoration of the text as well as adding features such as lists and tables The difficulty is that all this additional formatting data adds to the size of the transmission and when formatting is configured used badly or only a very small email is sent there can be up to three or four times more formatting data within the body of the email than data texts and images that humans actually see Althou
279. r sensitive work as they re a weak link in system security Another potential problem is the local network Any other computer con nected to the network due to deliberate use or infection with malware can monitor data pass 32 Leyden John 2007 Microsoft wireless keyboards crypto cracked www theregister co uk 2007 12 03 wireless_ keyboard_crypto_cracked 33 Securiteam 2007 27Mhz Wireless Key board Analysis Report www securiteam com securityreviews 6G0030KKKI html ing between local machines in order to detect passwords and other security information ex changed between machines 8 3 3 File wrappers and locks If you are the only user of a machine security is less of a problem but if a machine is shared be tween a number of people that creates security issues that must be addressed That not only includes desktop machines but also access to a shared file or network server and of course online services As more data is lodged within the cloud using online services how we secure the files we use from unauthorised access is be coming a more important issue There are two ways of securing the data in side files Firstly using file wrappers As the name implies a wrapper is something the file is enclosed in in order to protect it The two com monest forms of wrapper are file encryption and digital signatures Wrappers can be used with files stored on the hard drive of the computer files stored on a b
280. rabyte What do these numbers mean Computers use binary numbers or num ber base two Humans use decimal or number base ten Counting in magnitudes of 1 000 the human readable sequence would be 7 1 000 1 000 000 etc The nearest whole value to 1 000 in binary is two to the power ten 2 10 or 1 024 Table 3 1 shows the magnitude of the different prefixes applied to the size of data storage As the difference between each magnitude is a multiple of 1 024 this means a megabyte con tains 1 024 kilobytes a gigabyte contains 1 024 megabytes or 1 048 576 kilobytes etc Also what is a byte Today PCs use 32 or 64 bit processors A bit is one binary digit a single binary 0 or 1 When a CPU reads data from the memory it reads 32 or 64 bits at a time The greater the width of the data bus the more data the computer can read in one action and the faster the CPU processes data The first PCs had an eight bit data bus and eight bits were known as a byte As one byte eight bits is what you need to represent a single character of informa tion using the ASCII encoding system we came to associate one byte with one character of text However today s computers need to represent far more characters including those from lan guages other than English than are available us ing ASCII As a result ASCII has been superseded by Unicode which requires at least two bytes 16 bits or more to represent a single character 3 3 6 The vide
281. rading If we look at the roots of human sustainability it is the scale of growth in the use of information systems which has driven the ecological issues surrounding their use today Slowing that physi cal scale of growth by optimising the productiv ity of existing infrastructure can reduce the cap ital costs related to the turnover of equipment The primary role of ISPs is to provide network connectivity technical services and training to those who use its electronic networks In car rying out these functions ISPs have to oppor tunity to take a lead in reforming the way we acquire use and dispose of technology That begins by changing the way the service provider meets its own needs As their own efforts to ad dress these problems develop it is likely they will need to engage their users customers in that process to make the changes viable and more effective for example optimising soft ware to reduce system load or bandwidth use or scheduling tasks to spread the load across a longer time period utilising the space capac ity available at off peak hours This requires change in the ways ISPs function although it might also create new areas to provide support 1 Hall and Klitgaard 2011 Energy and the Wealth of Na tions Understanding the Biophysical Economy Springer Publishing ISBN 9781 4419 9397 7 164 A practical guide to sustainable IT and services as part of their business model In a world where economic pr
282. radios which run the electronics of TVs cars and washing machines If we look at the number of high perfor mance processors which are intended for crunching data many of those are in computer servers telecommunications centres and su percomputers invisibly serving data to other machines rather than real people Even if we think of devices specifically intended to con nect people directly to information there are between five and six billion mobile phone ac counts in use around the world compared to around two billion personal computers And even when we talk of personal computers PCs many people accessing the internet and online services are doing so via video game consoles and set top TV boxes not just stand alone PC style computers That s why putting together a guide to sus tainable IT is so difficult the market is so diverse that it s difficult to give a concise guide which will cover all the possible means by which people might use computers and electronic networks 1 Wikipedia Embedded computer en wikipedia org wiki Embedded_computer 2 BBC News July 2010 Over 5 billion mobile phone connec tions worldwide www bbc co uk news 10569081 3 Wikipedia Personal computer en wikipedia org wiki Personal_computer Even when we talk of PC hardware there are many different types of machine in use which loosely fulfil the definition The managers of data centres made from thousands of micro p
283. re by preventing casual access 4 4 1 How power management functions Power management offers various options The primary one is giving the machine time limits to define what happens after it has been idle for a certain period There are five levels of power management which determine how much power the system consumes 1 Fully operational the machine is work ing normally Note that the level of normal power consumption can be also modified in various ways The hard drives can be powered down after a certain period of inactivity and the priority given to different parts of the op erating system The user applications can also be changed to manage the load on the operat ing system This is normally only implement 62 A practical guide to sustainable IT ed on laptop systems but there s no reason you cannot implement the same policies on a desktop machine The trade off for optimis ing power management is to lose some power for user applications which often means that users playing high power hungry video games will deliberately disable power management 2 Stand by sleep or suspend this is a low power standby mode in which the machine s operation is halted hard drives and the video display are powered down but power is main tained to the memory It does not consume as much compared to running at full power but it s significantly more than if the machine is put into hibernation or shut down When confi
284. re are finite limits to their power supply and the scale and seasonal variation of off grid power systems requires that electricity use must be monitored and adapted if they are to have power available when they need it How we use electrical power is influenced by the equipment we use but the source of power production has a significant effect on our eco logical footprint How you go about addressing this issue is dependent 1 International Energy Agency 2011 CO2 Emissions from Fuel Combustion www iea org co2high lights co2highlights pdf 2 International Energy Agency 2011 Key World Energy Statistics www iea org publications freepub lications publication key_world_energy_stats 1 pdf upon the budget you have available to purchase alternatives to fossil fuelled grid power and your technical capabilities to purchase and op erate these alternatives In this section we ll look at three potential options for improving the ecological impact of your power supply Changing the contract or tariff paid to your electricity supplier in or der to support lower carbon or renewable energy technologies this is the simplest option as it requires little change on the part of the consumer Installing a grid connected renewable power generation system this is a more complex and expensive option than simply changing electricity supplier and Developing an off grid power supply system this a more techni cally challenging option alt
285. re for a certain task so that you can maximise the lifetime of equipment and keep costs down Installing systems on older equipment with restricted memory and disk space can be more of a challenge espe cially if it requires the use of a text command line interface which requires more details knowledge of the operating system rather than a graphical interface where the options are usually presented as simple menus If you only want a desktop machine you need a com puter with a desktop level specification Even then there s Table 4 1 a considerable difference between simple typing word processing applications and the type of power required to edit large colour images or process video files When considering the more creative use of computers such as backing up or networking support you can use a far wider range of equipment to solve a particular problem Table 4 1 lists various grades of hardware and the types of application that it can perform Note that the demarcation between what is possible and what is practical isn t as clear cut as shown in the table what matters is that the machine can run the tasks that you design it to perform at the speed reliability that you re quire of the system The use and reuse of computer hardware for different applications Application Desktop processing Operating Support systems system System specification High power desktop Medium desktop Lightweight desktop
286. recent growth of electronic networks It was only when these technologies were brought to gether at prices affordable in a mass market that the power of the network generated its own self sustaining growth It s not just that these trends allowed people to do pre existing jobs more easily the process created wholly new applications which caused the level of con sumption and the economy as a whole to grow Like the step change in energy and resource use 250 years ago with industrialisation or the first use of metals over 7 000 years before that the information and communications revolution is creating a fundamental change in the organisa tion of human society 2 2 1 Copper an indicator of technological development and sustainability As noted above advances in human technol ogy consume comparatively rarer metals Of these copper provides one of the best case studies of the importance of minerals to the global economy but also the fragility of that global system due to the natural constraints on human resource consumption Copper is one of the most important minerals in the technologi cal economy It s important for micro electron 10 Paul Mobbs Free Range Network 2011 The Limits to Technology www fraw org uk fwd wslimits Figure 2 2 Growth in world copper consumption and future projections 1944 1966 1922 1943 TEAMS 38Mte 1990 2011 282Mte 1967 1989 163Mte 2012 2033 USGS world copper reserves e
287. red before the machine will boot an operating system Un fortunately the BIOS password is easily cir cumvented by clearing the contents of the BIOS chip or removing the internal battery from the machine although if that were the case you d notice when you next used the computer because you wouldn t be asked for your usual password Boot loader password This is only of relevance on Linux based operating systems Ordinarily the boot loader program would load the oper ating system When the machine boots it is possible to interrupt the boot loader to give it instructions which can with a little knowl edge of the Linux system be used to circum Maintenance security and resilience 125 Box 8 2 Mnemonic passwords Almost all user based security features are based on the use of passwords and understanding how passwords should be constructed and used is an important aspect of user security For example if the password password were used for many years for every password on a com puter system that would be incredibly insecure likewise if the same password was used with a sequential num ber added for different programs that s insecure because the pattern can be easily guessed In contrast if each of the different passwords required to start and login to the machine were different was only used for a few months or preferably less and looked something like cv6Td2Qb that presents a far greater security challenge
288. reflects the importance of the data it contains If data is to be archived and is of great value two copies of the archive media should be created and one of those should be stored in a different location This ensures that the data it contains can be recovered even if the copy kept locally is lost damaged or destroyed Always check the readability of back ups after creating them e When making CDs DVDs and Blu ray disks always ensure that the disc mastering program performs a verification read after writing the disk to check its content e Back up applications should automatically check that the files moved are readable but if manually copying files to a USB stick or external drive copy them back into an empty directory to ensure that the back up is readable Mechanical external internal hard drives and micro drives can have their lives shortened if shaken or dropped and must to be stored in a location that is well away from strong magnetic field electric motors video displays etc USB sticks and memory cards should also be care fully stored in secure locations as mechanical stress e g being dropped or subjected to heat and cold can break the internal electrical contacts and render them unusable Magnetic media such as digital tapes must be kept at an even temperature protected from extremes of heat and cold and shielded from magnetic fields ideally if stored for a long period they should be kept inside a me
289. ributed generation en wikipedia org wiki Distributed_generation what is being used Where the local system produces more than required it is possible if the grid operator allows it to feed that excess power back into the grid This is usually done by having two electricity meters One mea sures the power used from the grid while the other measures the power flowing back to the grid When the utility company sends the bill they calculate the price of the power supplied to the grid and subtract that from the price of the power consumed note grid operators may not pay the same amount for the power you supply them as they charge for the power they supply to you Over the last two decades grid connected renewable power systems have become popu lar in many states because they allow people to produce their own energy without the prob lematic restrictions of being wholly cut off from the grid In some European states govern ments pay a premium for the power produced and so the public can earn money from oper ating these systems in homes and businesses they have become especially popular on rural farms where the large space available allows a much larger scale of installation One difficul ty that has arisen with these systems is that the synchronising inverter requires electricity to function If the generating system produces insufficient power or it s sited in a very poor location the system can actually consume more elec
290. rid power supply manageable the equipment used must function as efficiently as possible The cost of supplying each additional kilo watt hour of power is greater than for mains powered equipment and adding more power generation or storage capacity to supply inef ficient equipment represents an unnecessary expense As a result the cost of more expen sive but efficient computers and other equip ment can often be justified by the cost savings from the power saved Figure 11 2 shows a schematic of a typi cal off grid power system By examining this you should be able to understand how these Renewable power 155 systems work There are many companies producing systems such as this and they will construct install it in order to ensure its safe operation in accordance with national building and electrical codes With a basic understand ing of electronics it s relatively simple to con struct one from individual parts Either way in order to specify the size and performance of the installation it is necessary to have a basic grasp of the principles involved At the heart of the system is the battery storage Its capacity determines how much power the system can supply and for how long It s also the most significant hazard in the system A battery is a reserve of potential energy When supplied at the required rate that s quite safe but if a major fault occurs that potential energy can be released almost instantaneously crea
291. ries to hold the files and also configure a desktop search indexing system to make finding indi vidual files easier and quicker When creating documents or files always try and complete the metadata properties provided with that file format to allow easier and more accurate indexing by desktop search systems Desktops Programs peripherals and gadgets 83 SECTION 6 INFORMATION STORAGE AND SECURITY Managing information storage securely and reliably is one of the ways that we can reduce energy use in IT Apart from the impacts of creating and storing information a significant factor in the energy and carbon footprint is the human user and if the user has to spend time search ing for information or recreating lost information that represents a waste of time and resources Learning to manage our use of storage devices is where we begin to tackle this problem Then we can move on to looking at solutions that protect sensitive data from disclosure important data from being lost on the hard drive and all data being accidentally lost wiped or corrupted This unit examines various methods to improve the security and reli ability of computer systems and the information that they contain by considering the work of backing up The simplest rule to secure information on a computer system is to back up Backing up works on the principle of redundancy if one copy is lost or damaged you can revert to the back up copy There are many di
292. riment and switch to another manufacturer s flake with out sacrificing the use of the particular chocolate flavour had grown to love When we unbundle products we allow a greater number of options as to how the collection of products can be config ured by the user It is this kind of real choice that branding or bundling stifles by managing the menu of consumer selections those involved dictate the market The fundamental difference between the proprietary versus the free open model of com puting can also be demonstrated using the corn flake analogy The FOSS movement would stress the ability to chose the flavour of the flake and the quality of the chocolate coating For example the GNU Linux operating system has many different flavours called distribu tions box 4 1 They are all roughly compatible and run the same standard set of programs even though they are made by different organisations You can even combine elements of the different flavours to make your own customised version of Linux and a number of Linux developers distri bution producers provide information and extra programs for free to help you do this To sum up the intellectual property issue and how it relates to software what defines the dif ference between the proprietary and open models of the Information Society is The dif ference between what constitutes selection versus choice how this preserves our creativity and
293. riod of time and then fail In contrast digital devices can have their service life programmed into them They are designed to work for acertain period of time and then irrespective of whether they are serviceable or not they will cease to function The only way to circumvent problems such as planned obsolescence in order to ex tend the service life of a product is to find ways of repairing the hardware or reprogramming the firmware the counters or other limiting controls set in the on board programming of the device which is preventing the device operating For example returning to the Apple iPod again in 2003 it was the subject of a short film which highlighted how the batteries in the early models failed after 18 months As a result of a 10 Wikipedia Planned obsolescence en wikipedia org wiki Planned_obsolescence 11 Wikipedia Firmware en wikipedia org wiki Firmware 12 The Neistat Brothers 2003 iPod s Dirty Secret www ipodsdirtysecret com Film available via YouTube www youtube com watch v F7ZsGIndF7E Figure 3 1 Carbon emissions from Apple products iPhone 4 iPod Classic 15 Macbook Pro Proportion of life cycle CO emitted during D Consumer use Device production subsequent court cases brought against Apple which showed that the design of the battery limited the life of the device Apple offered re placement batteries for the early iPods More recently claims have emerged about th
294. ripherals If we look at where the value lies in computers the hardware is expendable but the data that the computer contains is not it s very valuable and often irreplaceable For that reason it is easier to treat the hardware as ex pendable but organise the data it contains so it can be easily secured On desktop computers use a removable drive caddy to hold the ma chine s hard drive so that when not in use the drive can be removed and securely locked away Compared to the value of the information on the hard drive a drive caddy is a minor expense and can be easily installed in the machine Lap tops mobile phones and other mobile devices should be backed up to some form of removable media as outlined in unit 6 8 2 3 Other building impacts IT equipment uses electricity but the environ ment within which these systems are used also consumes energy in the form of space heating air conditioning lighting and fresh water for 120 A practical guide to sustainable IT Figure 8 1 Removable hard drive caddy IDE SATA connectors to motherboard Caddy frame Hard drive Caddy body human consumption and flushing toilets Cre ating a super efficient computer system makes little sense if the environment within which it is used is not also optimised to minimise the impacts of the activities that the IT system supports Again this is the value of thinking in modules and layers we can consider the needs of the
295. rm a useful function as a training platform to learn practice hard ware and operating system installation skills By dismantling re assembling and then in stalling the machine people get the skills confidence required to do the same types of operation on more expensive equipment but without making expensive mistakes if they do something wrong Any quality of machine can perform this purpose although because of the risk of damage to the machine it should be considered expendable e Scrap scrap doesn t necessarily mean throw the whole thing away Old boxes can be scavenged for their screws cables connec tors fans heat sinks and other reusable com ponents to be kept as spares for the repair of other machines Hard drives can be used with drive caddies to back up large amounts of data from other machines Unless they have no further use or have a poor picture quality one or two old monitors can be kept for use in emergencies if another monitor fails The only thing that must go for electronic waste dis posal and recycling as they have little value for reuse are the metal chassis of the desk top box plastic enclosures and motherboard electronic circuits 15 Wikipedia Downcycling en wikipedia org wiki Down cycling Looking at the list of potential uses for equipment above it might seem a rather com plex approach to design different machines to perform different jobs In practice to perform a task wel
296. rocessors and consuming perhaps thousands of kilo watt hours of electricity have a strong influ ence over the ecological footprint of IT The fact that most green IT reports address large com puter centres is a measure of their importance Even so if we weigh up which group of computer users collectively has the greatest influence on the ecological footprint of IT then it s the ev eryday users of personal computers and com munications devices That s partly because their equipment does not function as efficiently as the highly managed computers of data centres and primarily because it s the mass of computer users at work and at home connecting to online services who are driving the demand both for new hardware and the greater network capacity required to support online services In this section we ll look first at the issue of open and closed hardware and using propri etary devices such as mobile phones or games consoles in contrast to more conventional per sonal computers Then we ll move on to look specifically at PCs and the factors which influ ence the way they work At each stage what we ll try to do is give an idea of the impact of these devices and how you can get involved in changing managing that impact 4 Wikipedia Personal computer hardware en wikipedia org wiki Personal_computer_hardware 28 A practical guide to sustainable IT 3 2 OPEN AND CLOSED HARDWARE he simplest way to consider what
297. rticipation is an important part of promoting the work of the project and a means to gain new active members e For the most successful projects an exhibi tion space or small theatre space for show ing training educational films or multimedia presentations created by the project Many projects fold when the space they origi nally used is lost Some get around this by using vans or buses converted into travelling work shops to act as a base for the project Others use low cost or reclaimed buildings such as shipping containers Projects which do not have a secure base will often founder because of the problems of continually relocating and because not having a fixed base prevents them from building up a critical mass of membership in the area Often the most successful projects have an association with educational establish ments particularly universities as this provides a secure base and a regular turnover of enthusi astic members 10 2 3 Tools The simplest recycling projects can be based around nothing more than a workbench and some hand tools For more ambitious projects particularly tied to education and training a larger and more secure space is required in order to store the test equipment required for servic ing IT equipment As outlined earlier in unit 3 computers are assembled and serviced on a workbench A bench with sufficient lighting to allow for the inspection and repair of equipment is also an esse
298. ryofstuff org movies all story of stuff Smithsonian Institute MIT March 2012 Per spectives on Limits to Growth Challenges to Building a Sustainable Planet si edu consor tia limitstogrowth2012 e Randers Jorgen 2012 2052 A Global Fore cast for the Next Forty Years Chelsea Green Publishing ISBN 9781 6035 8467 8 e APC 2010 Global Information Society Watch 2010 ICTs and Environmental Sustainability www giswatch org en 2010 e Bardi Ugo 2011 The Limits to Growth Revisit ed Springer Publishing ISBN 9781 4419 9415 8 e Turner Graham June 2008 A Comparison of the Limits to Growth with Thirty Years of Re ality Commonwealth Scientific and Industrial Research Organisation CSIRO www csiro au files files plje pdf e Raghavan and Ma 2011 The Energy and Emergy of the Internet www cs berkeley edu jtma papers emergy hotnets2011 pdf e European Commission 2010 Critical raw ma terials for the EU CEC ec europa eu enterprise policies raw materials files docs report_en pdf e WWF UK 2010 Common Cause The Case for Working with our Cultural Values assets wwf org uk downloads common_cause_report pdf Computer reclamation e Computeraid International www computer aid org e Ifixit Self Repair Manifesto www ifixit com Manifesto e Sheffield Access Space access space org e Mueller Scott 2011 Upgrading and Repair ing PCs 20th Edition QUE Publishing ISBN 9780 7897 4710 5 Free and o
299. s How we configure the desktop but also how we use the various gadgets and peripheral de vices that we connect to the system has a big effect on the ecological footprint of our use of technology Information Storage s 0 4 cccccac esa ed idee ae eens ea EE Information is a resource and obeys many of the physical laws that govern our use of matter and energy How we choose to store and back up information has a direct bearing on the ecological impacts of our use of IT in general and also the reliability and resilience of the information that we store 07 08 09 Local and global networks u c become so versatile but that in itself has spawned the exponential growth of both data transactions and the growth of power hungry online storage systems to support them Understanding how the net work consumes power and how our use of the network drives con sumption can allow us to keep these demands under control Maintenance security and resilience a All tools need looking after if they are to have a long and productive life and that requires that we understand a little more about how they work and how to care for them This section considers the ba sics of system maintenance both hardware and software and the basic physical security precautions to take in order to prevent theft and damage End of life and disposal 0 00 cece eee eee When does the life of digital equipment end Is it when it no
300. s The circuit board itself is clad in a thin layer of cop per The various connectors on the board are made of iron copper and tin alloys often with a gold layer of electroplat Figure 2 4 Composition by weight of a typical computer system and mobile phone Computer system with CRT monitor Mobile phone Metals Plastics N Ceramics glass ing to enhance the conductivity of the mechanical connec tions The small round components are capacitors manu factured using titanium barium and sometimes other rarer metals Some of the minute devices on the board are also capacitors but their small size means they contain much higher quality and rarer materials such as niobium or tantalum minerals extracted from the ore coltan which is associated with the blood metals trade in Africa The board itself and most of the connectors are made from laminated materials or thermoplastic resins which are made from oil Most of these components are fixed to the board with solder made from alloys contain ing tin copper silver bismuth indium zinc antimony and some other metals Many circuit boards are also given protective lacquer coating made from oil based resins to prevent moisture corroding the circuit board or its components 22 A practical guide to sustainable IT sil fuels required to produce a computer chip are 600 times greater than the weight of the chip by comparison the fossil fuels require
301. s The more common and easily accessible a resource the less we need to back it up the more unique or expen sive a resource the greater the need to create a back up copy 86 A practical guide to sustainable IT Box 6 1 Backing up mobile devices Today there are a variety of mobile computing devices in use from mobile phones to personal digital assistants and fully functional laptop PCs Mobile devices need spe cial attention when it comes to backing up their contents because they are more likely to be lost stolen or dam aged Many smart phones have built in back up software to copy the files they contain to a PC Connect the phone to a PC and the contents of the phone can be copied either to a single large file full back up or a directory containing the files on the phone selective back up It s important to use the internal back up software of the device in order to capture the operational and configura tion files the device requires but which are not normally available for the user to manipulate Android phones are technically already backed up to the cloud the data storage system operated by Google It s not technically possible to make a local back up although there are third party applications which allow an Android phone to back up to other online services There are also an increasing number of commercial services usually run from pre paid mobile applications which will automati cally back up the data on
302. s and so produce the same quality no matter how many times they are edited although the cost of that is a larger file size Sound audio files Sound is recorded as raw audio data this is what is found in WMV files and so WMV is the least efficient way of sending audio data Other file formats encode the data and while this reduces the file size it progressively results in lower quality sound reproduction There are three factors which have a great influence on file size The sample rate the number of channels and whether the codec the standard used to encode decode the audio data is lossy or lossless The sample rate measured in kilohertz kHz is the number of sound measurements taken each second the higher the sample rate the clearer and more deep the audio reproduction will sound Most audio codecs require specific sample rates to be selected 8kHz sounds like a bad phone line conversation 22kHz sounds like an FM radio while 48kHz has the quality of a CD For speech a low sample rate is possible for music higher sample rates are required The number of channels increases the file size a stereo two channels file has almost twice the data as a mono file To reduce the channels use an application to down sample from stereo to mono The file format chosen also has an effect on the file size FLAC files are a lossless format meaning that they do not lose their quality if edited In contrast MP3 files lose dat
303. s or to run encrypted tunnels for remote access to the network a server system is a better op tion Lightweight server a simple server machine to support services across a network rather than a single user Like the power server class above powerful machines could be used as a terminal server service for a thin client network but many older machines might struggle to do that for more than one or two client terminals Instead older equip ment could be configured as a file server en crypted storage server for backing up desktop machines using FTP or a shared networked file system or a simple web server to run an intranet for a small office or a mail server to Data processing heavy duty data processing storage and network control e Parallel processing use as a second machine for processing tasks that interfere with your everyday work For example video file con version DVD mastering creating DVDs and any other tasks that runs for many hours or use a lot of power You could use a screen and keyboard but it s easier to access the box from your main machine using a remote desktop for graphical applications or secure shell for command line control As well as single machines many small machines can be connected together to form a more power ful cluster for specialist applications e g video animation scientific analysis Power server a dedicated server machine for a small office or to
304. s be coming a pressing issue If you want to conserve power then you need to use a laptop and other battery operated mobile digital equipment as these are optimised to use a little power as pos sible 3 3 5 System memory Next let s look at the memory 4 also called the primary storage or random access memory RAM Over the last decade or so memory chips have become extremely complex devices Depend ing upon the speed of the motherboard the mem ory modules must match the transfer speed of the front side bus or you ll get errors or more likely it ll refuse to work and the motherboard will signal a hardware error Confusingly there are different classes of memory DRAM SDRAM etc which operate at different data rates DDR DDR1 DDR2 etc and which come in different sized packages to fit different sized slots on the motherboard If you look at the Wikipedia page for DIMM dual in line memory module you can get a list of all 25 Wikipedia Computer data storage en wikipedia org wiki Primary_storage 26 Wikipedia Random access memory en wikipedia org wiki Random access_memory 27 Wikipedia DIMM en wikipedia org wiki DIMM a Bytes and magnitude Magnitude Size bytes 1 byte 1 1 kilobyte 1 megabyte 1 048 576 1 gigabyte 1 073 741 824 1 terabyte 1 099 511 627 776 1 125 899 906 842 624 1 petabyte the different types Look under the speeds sub sec
305. s such as mo bile phones they have become invisible They have become such an everyday part of people s lives that we blindly accept they are there In fact we only understand their significance to our lives when the electronic device or the in formation network it connects to breaks down The implicit association of these technologies with a modern lifestyle has in turn become a driver for their adoption in less developed states The rapid adoption of information tech nology has not only enabled greater economic development it has arguably brought with it social and political change as people have used these same media as a conduit for political ex pression for example the events of the Arab Spring Computers and information systems are tools human made technologies intended to extend our biological capabilities We might in vest our lives in them commit our most secret facts and thoughts to them and rely upon them to organise our work and social lives but if we are to understand how information systems operate then we have to examine them as we would any other aspect of human society and that means looking at the role of these tools in the human system and how that in turn relates to the global environment that humanity is a part of Like other tools made by the human species technology extends the physical and or mental capabilities of its user achieving practical ac 1 For a detailed exploration o
306. s the search for files to be automated For example instead of searching the content of a file for keywords which often will result in many false matches for common words if the metadata contains a string of keywords which spe Document properties cifically describe the file the system can present you with far more relevant results Taking a minute or two to add metadata to a file can over the period that the file is kept save far more time when you are trying to mange hundreds or thousands of data files Most applications have a properties option usually in the file menu where you can add metadata labels Fig ure 5 2 shows the properties menu from OpenOffice other applications are very similar Usually there will be a default list of properties allowing a title keywords and other com ments to be defined top box It is also possible to define additional labels that provide a more narrow description of the content bottom menu box and which provide descrip tions that are relevant to your own work In addition to providing information for desktop searching and indexing many applications and online services now use metadata to configure imported up loaded files automatically inserting into the relevant fields the labels which describe the data This makes uploading easier and also ensures that the labels used properly describe the content Girmi Geetripiss Cathars Pipihi eternal Gecrity aian De ee ee ES bee
307. s when considered as a whole Many definitions take their cue from the United Nations World Commission on Envi ronment and Development report also known as the Brundtland report published in 1987 which launched the modern policy debate on sustainability Development that meets the needs of the present without compromising the ability of future generations to meet their own needs Going from this all encompassing definition of sustainability to one which fits the peculiar features of information technology is a very big jump We could take a very narrow definition for example looking purely at the electricity con sumed by machine hardware but if we are to give the consideration of sustainability a broader and more meaningful definition then we have to con sider the operation of the whole system 3 World Commission on Environment and Development Paragraph 1 chapter 2 Our Common Future report to the UN General Assembly 1987 www un documents net wced ocf htm Assessing the sustainability of our use of information technology isn t just a matter of measuring environmental pollution It s an all encompassing view of how we design organise and operate the information systems that allow us to carry out our work and live our lives and doing so in a way which considers not only the impact on the planet today but also how we de velop use and preserve information resources for ourselves and others in the future Ta
308. sabled in the hardware BIOS set up options in order to conserve power if allowed to routinely search for wireless connections the interface will create a large power drain as the device will search using full transmitter power Most Wi Fi routers and other hardware allow you to configure power saving options from their configuration interface For example where wireless devices are used in a small area it may be possible to switch the base station to transmit using its lowest power set ting Operating systems also give some scope to control the use of wireless links In contrast to Wi Fi bluetooth uses less power because it involves short distance links The next significant factor in local network power consumption is the speed of communica tion As a general rule of thumb doubling the pro cessing speed of digital electronics can increase power consumption by up to four times This has relevance to the increasing use of gigabit ether net For most online browsing and video stream ing fast 100MHz2 Ethernet has enough capacity to handle routine data movement Higher speeds become more relevant when very large files are routinely moved between computers for exam ple backing up machines across a local network 7 For example see LessWatts Tips amp Tricks Wi Fi Wire less www lesswatts org tips wireless php 102 A practical guide to sustainable IT or for the connections between the ethernet hubs which link gro
309. serve content to a busy network running a range of protocols data bases or even thin clients using older ma 12 Wikipedia Cluster computing en wikipedia org wiki Cluster_ computing 13 Wikipedia Thin client en wikipedia org wiki Thin_client forward incoming mail for users on the local network Network support if good quality it could perform some lightweight server functions although it may be difficult creating enough hard drive storage to make it worthwhile If using a system which required minimal hard ware it could be used to run the programs required to operate a local network and per haps act as a firewall gateway for a broad band internet connection Note that as well as installing a full operating system there are a number of stand alone installations which will provide dedicated secure network servic es Wi Fi access points and router firewalls They boot from CD DVD install largely auto matically and can be configured from menus rather than requiring the more expert skills 14 For example Smoothwall www smoothwall net En Garded Linux www engardelinux org or Zeroshell www zeroshell net Operating systems Making the system work 59 required to configure an operating system to perform these functions Downcycling productive end of life uses for old machines e Educational reuse if the machine can still run a lightweight Windows or Linux system then it can still perfo
310. set top boxes and TVs may also have such options built in The general problem is that as the power consumption of individual devices has dropped a greater proportion of the ecological impacts occur during manufacturing If we look at the life cycle impacts over a wide range of digital consumer electronics much of the energy and carbon impact and certainly much of the waste is created during the production of the device Therefore the majority of the impact that the device will have on the environment already ex ists on the day it is purchased our ongoing role as the user of the device powering it from the electricity grid is less significant For example let s look at Apple s products as shown in figure 3 1 Usefully Apple produces life cycle environmental reports for their prod ucts compiled under international standards for environmental reporting Apple should be praised for this and it is something that all manufacturers should be required to compile for their products Roughly a quarter of the life cycle carbon emissions of Apple products are the result of their use by the consumer around 8 The Story of Electronics Annie Leonard Free Range Stu dios 2010 www storyofelectronics org See also The Story of Stuff Annotated Script Annie Le onard Story of Stuff Project 2010 www storyofstuff org wp content uploads 2011 02 SoE_footnoted_script pdf 9 Apple Computer Apple and the Environment www apple com e
311. so are more broadly compatible across different ma chines and operating systems A problem with keeping an archive of many CDs or DVDs is that it s not possibly remember what is on every disc and it s very difficult to handwrite the contents on the disc itself The solution is to capture a directory tree listing of the directory and file names on the disc and store it as a text file Then instead of search ing the actual discs one at a time looking for a file search the text files containing the di rectory trees using the find tool of the word processor text editor Microsoft keeps a guide to capturing directory trees on its website For Linux and MacOS the Unix command tree if path_to_directory gt file_name txt will create a directory tree which can be captured as a text file While it takes a few minutes to make a directory tree and store it keeping a tree of each disc in the archive can cut the amount of time it takes to find a file That s because the search process can be automated by word searching the text files to find which disc contains the data rather than manually searching each disc to find the data 12 Microsoft April 2011 How to add the Print Directory feature for folders in Windows XP in Windows Vista in Windows 7 support microsoft com kb 321379 13 See the manual page for tree command at linux die net man 1 tree 6 2 4 Off site and online storage The risk with holding data in
312. ss of backing up and reduce the amounts of data requiring storage Identify roles and responsibilities for backing up data and agree policies and procedures for regularly backing up data e System administrators managers should be respon sible for backing up at the system level and co ordi nating the use of network based software for backing up to a central server e Computer users should be responsible for backing up current work and other important data using remov able storage Backing up with the least ecological impact requires that we match the type of data being stored with the charac teristics of the storage media used e Data that is being archived for long periods and other data which changes infrequently should be backed up on optical discs as these have the lowest ecological impact and a long storage life e Routine daily weekly back ups should be made using reusable media such as USB sticks memory cards or removable hard drives When creating archives on optical disc create a text file containing a directory listing of the disc s contents searching this disc using a text editor or integrating it into a desktop search system takes less time and energy than physically searching each disc Using the internet for backing up has a high impact when moving many gigabytes of data While cloud computing is becoming popular always consider the alternatives to overcome the data security and ecological drawbacks
313. st line of de fence against the theft of the computer or its hard drives The disadvantage is that it uses a lot of processor power to run the encryption process a problem on older machines and if you experience a data corruption problem you ll potentially lose access to all the data on that partition or the entire hard drive e User account passwords These are set when the computer is installed and users can select their own passwords afterwards The purpose of a user password is to protect data on a shared machine or prevent opportunistic access to the user s files after they have logged in for example through the use of a password lock on a screen saver and through the access per missions controlling access to files within the system Although the system administrator can still change and override the user s account password users can implement their own pass words outside the control of the system admin istrator using file locks and file encryption If you use a wireless or infra red keyboard that can be even more insecure because it s de signed to transmit a weakly encrypted signal which can be easily cracked by those with the required expertise and computing power In turn any strong encryption codes entered and intercepted from a wireless keyboard can be disclosed by cracking the weak encryption its signals are encoded with Basically never use any wireless gadgets including networks for secure o
314. stainability check list box 2 2 Restriction of Hazardous Substances box 2 2 lipetading a eens ee box 3 6 technological obsolescence 9 1 coud compute eer 6 2 5 toxicmaterio le mE Doa Economicerowtme T 2 2 Computers Ema E E TA E ES 2a BOS E E A A A E SE mMbodied ener T 2 3 2 CHIPSELS Taare nate sata E E A os wts Shee M ENerey USE 5 2 11 1 11 3 hard drive drive caddy3 3 7 box 3 4 6 2 2 8 2 2 building Si oases sea seta ecto ces scree 8 2 3 IMOMOIV naea E cavteem eee 335 Enerev Star ta a eee ree box 2 2 motherboards aa aE Ble lee EPEAT A eerae ae reerinienn mere box 2 2 PGiG ard Sie sccercc use wily ence sisters sesteren 3 3 8 scaleiof impact rereana oreen eer Sal ports and connectors table 3 3 measuring consumption box 3 5 power management 4 4 box 4 4 Ofif erni dleleCtricity e tnt ew ie 11 3 powersupplies E 399 one watt initiative 5 2 1 Brocessor GRU i errr rer 3 3 3 box 3 2 OMEN HEN oo acaocageaaadnaaener box 3 5 oreanisinemles data maa T 5 5 power management 5 4 4 resource footprint 2 3 box 2 1 power supplicsae annaa 33 9 SECUN a a E E recat 83 sources of electricity 11 1 box 11 1 Speed POWER renin 3 3 4 uninterruptible power supplies box 11 2 s staima DIEVA 2 2 8 1 userfeedbDack etnies 4 4 3 5 1 LVPeSiotshandWar ernrn ttre ntti 3 1 1 Free and Open Technology 4 1 Uperadine a eer box 3 6 Naa A A AS 3
315. stalling operating system software are wholly entwined with intellectual property issues and the choices we make will in turn affect how users are affected by the growing restrictions on in tellectual property Intellectual property rights are the issue which will more than any other political or technical obstruction define the economic and legal pressures governing how in formation systems and the internet will evolve in the near future Unlike the technology humans have developed over history the technology of the information society is not benign Devices can be made to be semi intelligent able to control the terms of how we use the operating system and or its stored N Wikipedia Free and open source software en wikipedia org wiki Free_and_open_source_software w Wikipedia Proprietary software en wikipedia org wiki Proprietary_software 4 Wikipedia Intellectual property en wikipedia org wiki Intellectual_property ea Wikipedia Information society en wikipedia org wiki Information_society information after we have bought them In this way society is becoming increasingly constrained by the technological standards that manufactur ers develop rather than the political decisions of policy makers And if with the development of more intelligent systems manufacturers choose to lock up the functions of their products with digital rights management systems then society s use of these new tools w
316. stem which means our technology must also have finite li mits 2 To understand the sustainability of com puters and information appliances we must look at the life cycle of the devices themselves from the source of raw materials they are made out of through the production process their use by the consumer and finally their disposal This will give us the information we require to redesign the products and the systems which produce them to shift from a linear to a cyclical system of resource use as shown in figure 2 3 This repre sents a challenge to many aspects of the way our industrial systems work today For example shi fting away from the maximisation of production and short product lives and instead designing go ods to have a longer life and be easily repairable 18 Wikipedia Peak oil en wikipedia org wiki Peak_oil 19 Matthieu Auzanneau Le Monde April 2011 Petroleum blog 8th in French Fillon la production de p trole ne peut que d croitre in French petrole blog lemonde fr 2011 04 08 fillon la production de petrole C2 AB ne peut que decroitre C2 BB 20 Wikipedia Limits to Growth en wikipedia org wiki Lim its_to_growth 21 Leonard Annie 2010 The Story of Electronics www storyofelectronics org 2 3 1 Measuring what goes into the system In order to make sense of this complex system we need more precise information on what each product contains This is produced by carrying out a li
317. stems incorporate battery storage allowing them to keep the inverter running without a grid supply In effect they function like a large unin terruptible power supply for the whole building Due to their greater complexity these systems Building power supply Synchronising inverter are more expensive to install and require more maintenance Even so if the reliability of the grid supply is an issue grid connected renew able generation can be a means of securing the power supply to the building in the event of the grid going down 11 3 OFF GRID RENEWABLE POWER SYSTEMS A n advantage of renewable power technol ogy is that it allows the development of power systems well beyond the reach of the power grid This has obvious benefits for de veloping nations and also for the use of mo bile systems for example built into vehicles or vans which allow ICTs to go on tour into rural areas The critical factor in the design of an off grid system is the average amount of power that needs to be supplied and how long it must be supplied for These two measures determine the amount of equipment required and thus the costs of the system Unlike the power grid where more power can be supplied instantaneously on demand 11 Wikipedia Off the grid en wikipedia org wiki Off the grid the generating and storage capacity of an off grid system has absolute limits to its use In order to make the costs and scale of the off g
318. stimate approximately 690 million tonnes Consumption in next 22 year doubling period approximately 564 million tonnes ics although the bulk of annual consumption is for electric cables pipes and metal alloys For example a quarter of the weight of a mobile phone is made of metal and up to half of that could be copper As the world economy grows so the amount of copper demanded by the world economy grows too Copper has been in use for at least 7 500 years but more than 95 of all copper ever mined and smelted into metal has been ex tracted since 1900 Despite the fact that cop per is one of the most recycled metals and per 11 U S Geological Survey July 2006 Recycled Cell Phones A Treasure Trove of Valuable Metals USGS Fact Sheet 2006 3097 pubs usgs gov fs 2006 3097 fs2006 3097 pdf 12 U S Geological Survey Copper Statistics and Information minerals usgs gov minerals pubs commodity copper 18 A practical guide to sustainable IT haps 75 of the copper ever mined by humanity is still in use in 2011 around 16 million tonnes of new copper were produced from mines around the world This is because as society becomes more technological and especially as many developing countries begin to build power and telecommunications infrastructures the de mand for copper continues to grow year on year As with many natural resources the amount of copper in the top kilometre of the earth s crust is huge around 9
319. t have direct effect upon the handful of hardware and soft ware companies who produce the bulk of the world s information systems As a result new programs or operating systems could introduce restrictions on communication and there would be nothing the public could do to remedy that situation Consumers could change their oper ating system or hardware but as the produc tion of equipment is concentrated amongst so few companies there is not a lot of choice to be had and often these choices lead to other problems or arbitrary incompatibilities between different hardware and software technologies There are a number of solutions to this and many of them have a positive effect on the sus tainability of ICT equipment In unit 4 we exam ined the idea of unbundling removing the restrictions which close the design of products to a limited set of technologies preventing the use of components from other manufacturers On this 4 APC July 2012 The UN recognises freedom of expres sion on the internet as a human right www apc org en node 14772 5 Wikipedia Product bundling en wikipedia org wiki Prod uct_bundling 166 A practical guide to sustainable IT issue we re approaching an interesting moment in time One of the successes of the IBM compatible PC was that while the design was copyrighted the functional components of which it was made were the property of a range of hardware manufactur ers That meant o
320. t necessitating the upgrading or modification of other parts Or ganisational complexity also plays a role here Breaking down the organisation s infrastruc ture into manageable sections which mirror the structure of the organisation allows roles to be assigned projects developed and targets set to implement changes and the monitoring of longer term objectives to be reported For large IT systems developing a modular plan can be an elaborate process involving con sultation planning and finding options which meet the needs of many different system us ers For small or stand alone IT systems it can be a more informal process because in practice there are fewer alternative options to consider What s important in either case is that for each part of the system you have a clear view of the purpose and function of the module the op tions available to provide it and the costs and impacts of each option The overall cost or per Maintenance security and resilience 117 formance of the system as a whole is then an aggregate of the results for all the modules and providing that each module represents the optimum design the whole system will then provide the best solution 8 1 3 Building in resilience While modular designs allows more flexibility in planning or upgrading making it easier to optimise performance when we consider se curity and resilience we think of layers The concept of layering involves systematicall
321. t which sections of the hard drive are backed up This can generate a much lower demand for data storage making it a popular option Because of this a wider range of back up technologies are available for use How and how often the user backs up should integrate with the types of activity carried out on the system the sensitivity of the data and the frequency with which that data is changed What s important is that those carrying out the process know how to create reliable back ups how to configure the programs used to create the right kind of data format and ensure that the back up media is tested afterwards to be certain it is usable Box 6 2 table 6 1 outline various storage me dia and their characteristics Which is the most appropriate depends on the skills of the user on the costs of the media and most importantly on the scale of data to be stored Some me dia can be reused to reduce costs and ecological impacts Due to their high environmental impact USB sticks and memory cards should be regularly reused many times for as long as possible Al though single use optical discs cannot be reused their benefit is that they have a long storage life For these reasons USB sticks and memory cards are better for routine daily weekly backing up while optical discs are preferred for the long term archiving of data and the offline storage of in frequently used data While there is little hard data available CDs DVD and Blu ray discs
322. ta it can be used as a working document adding information on system maintenance any faults which occur and any remedial action which was taken In this way it s possible to keep a log for the machine which makes system maintenance a far simpler procedure The table below outlines the types of data that is relevant to keep Whether you keep all of this depends It s useful to keep a note of the date installed and the identity of the person installing the system Operating system version Include details of any service pack upgrades Linux kernel ID Processor type Make model speed number of cores L1 L2 cache System memory Note the type speed amp no of modules not just the memory size Hard drives For each hard drive note the make model its capacity and an outline of the partitions on the drive and file systems used BIOS serial number Usually displayed on the BIOS splash screen useful to keep in case of theft or if the insurer or repair contractor asks for it BIOS key Which key to press to enter the BIOS configuration menu BIOS passwords Note the BIOS set up administrator and user passwords if used Motherboard Make and model as well as the serial number if you can find it Plug in cards peripherals Make and model and serial number IP configuration address Note whether the interface is configured with a static IP address or DHCP its gateway DNS addresses a
323. tain and adapt information systems is to set up computer reuse and reclamation projects Such projects offer a wide scope of opportunities for those who wish to take part e They can learn more about how these systems can be used to create more interactive media through the development of online content and audio video media recording editing e They can learn about the functioning of information systems through the installation and configuration of operating systems and software and e They can develop electrical and mechanical skills through the main tenance disassembly and construction of machine hardware In this unit we ll examine the last of these options developing prac tical computer reuse and recycling projects Such projects are the foundation on which the community use of information technology is based Creating the independent capacity to reclaim and re purpose IT hardware allows a whole range of other projects which rely on the use of these technologies to take place 10 1 ICT RE CYCLING AND DOWNCYCLING he term recycling has been widely used since its promotion by the green movement in the 1970s What is less familiar if the term downcycling Recycling implies that goods or materials are reused for similar purposes downcycling implies that the waste is processed to produce materials of a lower quality The quality of the material produced by rec lamation is important When raw materials ar
324. tem has an effect on how the hardware functions and more importantly it can have an impact on the service life of the machine e Desktops Programs peripherals and gadgets in which we consider how we interact with our computer systems and the programs we use to perform the information processing tasks that we demand from our computer systems Information storage or more precisely informa tion storage and backing up Information pro cessing is the reason we have created a diversity of machines and networks and in turn preserv ing that information is a vital part of making the system secure resilient and sustainable In this section we look at how we store information the options for backing up data and how our choices create different levels of security and determine our ecological footprints Local and global networks it is by linking computers together that we have created such a powerful system for human interaction and exchange but this in turn has amplified the environmental impacts of information technol ogy As more information and services are digi tised so the energy and resource demands of the system grow In this section we look at how we network computers together to meet our own information needs and how all machines have become increasingly dependent upon the global network both for communication and as a means of storage and distributing updating software Care or more precisely Maintenance sec
325. tenth of the power of a desktop system you d have to share the piece of double sided paper be tween twenty five to thirty people before the paper ver sion was better than reading it on a laptop Quite simply we must think before we print What we can say is that where often used information is static meaning it is infrequently revised or changed it is probably better that this information is kept as a printed volume which people can pull from a shelf and read at any time For example reference materials and technical manuals Where information is in flux and in continually being updated or it is only required for a single use by a few individuals then online distribution is probably the best option For example news bulletins and memos emails What this analysis shows is that there is no one sim ple solution when it comes to the ecological footprint of our decisions on the use of technology It is the peculiar characteristics of the factors in each decision which de termine what it the best option overall Desktops Programs peripherals and gadgets 77 quality paper segregate the collection of white waste printer photocopier paper e Most digital photocopiers are little differ ent in function to a laser printer although they are usually more energy efficient than a laser printer when producing a large num ber of copies For making a large number of multiple copies a photocopier is likely to be 5 4 E REA
326. ters to be connected without the inconvenience of having to set up a wired network e Bluetooth is also a radio based network al though it only functions over very short distanc es It became popular as a result of its adoption in mobile phones and wireless mobile headsets 3 Wikipedia Local area network en wikipedia org wiki Lo cal_area_network 4 Wikipedia Ethernet en wikipedia org wiki Ethernet 5 Wikipedia Wi Fi en wikipedia org wiki Wi Fi 6 Wikipedia Bluetooth en wikipedia org wiki Bluetooth but is increasingly used to link computers and peripherals such as the mouse keyboard and printer Recently it s become commonly used in games consoles to connect controllers and mo tion capture devices to the main console Each networking technology has a different eco logical footprint For example Wi Fi uses more energy to function than ethernet sometimes twice as much in order to communicate between the base station and the mobile device That s because the energy of the radio signal falls away quite quickly the further the user is from the base station and so both the base station and the de vice must use a high signal strength to maintain the communications link On a typical laptop while the video display and processor use the most power the next most significant power drain is likely to be the Wi Fi interface This assumes that the Wi Fi interface is used if not then it should be di
327. that the monitor might consume anywhere from 50 watts LCD to 250 watts plasma and printers speakers and other peripherals can consume an other 50 to 200 watts Put to gether a high pow ered PC can consume about the same as a small electric heater when running at full power which is why they produce so much heat However how much power the computer appears to use might not actually be consumed by the computer That s because the quality of power supplies varies and lower quality power supplies can have a very low power factor a value which expresses the amount of power drawn versus that actually used by the equip ment Measuring power consumption and es pecially measuring the power factor can give you an idea of how much power is consumed by all or part of the computer system Whether you choose to upgrade or replace parts of the system then depends on the likely cost savings and the cost of upgrades see box 3 5 Recently anew 80 Plus standard was introduced for power supplies guaranteeing a very high power factor and thus much lower power consumption When replacing power supplies look for an 80 Plus certified unit or browse the web for accredited suppliers 41 Wikipedia Power factor en wikipedia org wiki Power_factor 42 Plug Load Solutions 80 Plus Certified Power Supplies and Manufacturers www plugloadsolutions com 80PlusPowerSupplies aspx Hardware Putting the system together 43 Box 3 5 Powe
328. that human society produces and uses goods and manages the unwanted materials from in dustrial processes As noted earlier energy is an important part of our ability to produce raw materials What s also important is price as this affects the price of commodities generally Over the last half of the twentieth century the price of energy and mineral resources was at an all time low but in the first decade of the twenty first century both energy and mineral prices have been con stantly rising This it is argued is a symptom of the ecological limits predicted in The Limits to Growth For example oil production data shows that since 2005 global oil production 14 Wikipedia The Limits to Growth en wikipedia org wiki The_Limits_to_Growth 15 Graham Turner June 2008 A Comparison of the Limits to Growth with Thirty Years of Reality Commonwealth Scientific and Industrial Research Organisation CSIRO www csiro au files files plje pdf 16 Ugo Bardi 2011 The Limits to Growth Revisited Springer ISBN 9781 4419 9415 8 17 Smithsonian Institute MIT March 2012 Perspectives on Limits to Growth Challenges to Building a Sustain able Planet si edu consortia limitstogrowth2012 View the conference presentations on the YouTube playlist at www youtube com watch v ZiG3ISDaPrE amp feature list_re lated amp playnext 1 amp list SP2817969CA87E5B47 The ecology of information technology 19 has reached a plateau This is
329. the CPU fan has broken or it needs the dust cleared from the cooling fins to improve the rate of heat loss As the amount of heat that the CPU and motherboard generate increases with the CPU s power some manufacturers are even de veloping miniature refrigeration systems to fit inside the computer s case For the large server farms and data centres which run the internet Hardware Putting the system together 35 Box 3 2 Processors and motherboards A PC motherboard is designed to take a specific type or range of x86 CPU chips There are two main manufactur ers of x86 CPUs Intel and AMD Each produces a range of chips with different specifications but there are two general differences between all CPU chips e 32 bit versus 64 bit The bits refer to the width of the data bus What this means is that a 64 bit chip will move twice as much data during each operation as a 32 bit chip For 64 bit chips you have to use a 64 bit operating system a 64 bit processor might work with a 32 bit operating system but you ll be wasting its processing power as none of its 64 bit features will be available Even if you use a 64 bit operating system some programs might not be able to use the extra power available from the chip and so for some tasks you re not going to be processing data much faster than on a 32 bit CPU e Number of cores A recent innovation As the com plexity of CPUs has grown we re reaching the physical limits of how big they c
330. the ambitions of the developers which gives it a significant advan tage over closed systems such as Windows where adaptation or extension is usually prohibited The fact that systems programs can be downloaded for free or bought at a low cost has implications for its users too You can install it on any number of computers without having to pay for extra licences you can copy the system for friends or colleagues to use if required you can take the system apart and modify it to suit your own needs and pass on those modifications to others If these same actions were carried out with the programs developed by closed software developers those involved would be liable for prosecution Linux is the kernel of the GNU Linux system the core program which runs the computer hardware and makes the memory disks and other components avail able for programs to use Within the whole GNU Linux system there are hundreds of other programs required to provide all its functions and the user friendly applica tions that provide for people s everyday needs Early on in the development of GNU Linux enthusiasts devel oped FTP sites containing all the files to install a Linux system Then shortly after that as the internet was slow when moving large quantities of data they developed CDs with helpful installation programs which automated the process of installing and configuring the system for less experienced users Eventually these
331. the components which make up a desktop computer system you should hopefully have a better idea of what s in the box and what each of those parts does If you wish to take these ideas further we ll cover maintaining and assembling computers later Hopefully what you have gained from studying the innards of a computer system is an under standing of the significance of system specifi cations and what those specifications relate to This should enable you to purchase or plan the upgrade of systems with a little more attention to the details which influence the power of the system and the energy consumed by the ma chine Box 3 6 contains a check list of points to consider when purchasing a system or deciding how to upgrade it Once you have a system you have to connect all the parts together With a laptop that s done already all you do is plug in the power and network connectors and perhaps an external speaker With desktop systems it s a little more difficult You have to connect many different cables to the main computer unit and there are Figure 3 8 Schematic of a desktop computer system speakers Router gateway Video 15 pin D or HDMI Sound Printer 2 5mm USB jack keyboard PS 2 or USB Computer some simple rules which can help protect and preserve the equipment Figure 3 8 shows a very simple desktop system as an example As a general rule you connect the thickest and heaviest cables first
332. the computer user 5 Wikipedia Wetware brain en wikipedia org wiki Wet ware_ brain e The use of networks if the user is overloaded by emails not directly related to their work or are swamped with spam email that affects the rate at which they can use the system and e The way we create and manipulate files with a little training or practice we could minimise the resources our work required increasing the efficiency with which we use the system One of the most important factors is data loss Information is a resource just like metals or other commodities It costs time and energy to create the information we store on our comput ers and in that process the emissions created by the computer user are as significant as the machine itself The loss of data especially if such losses are avoidable represents a waste of energy and an excess of carbon emissions Surveys on the causes of data loss show that hardware or system malfunctions account for 44 of data losses human error 32 software errors 14 computer viruses 7 and natural di sasters such as fire or flooding only 3 An other problem when machines become clogged with files is that we can lose track of data and spend time on the computer blindly searching for something stored on the hard drive By avoiding data loss or losing track of in formation and spending a lot of time searching we can reduce the repetitious and unnecessary time s
333. the recent research on the impacts of computing to date has focussed on the use of servers and cloud computing rather than the impacts of everyday data storage technologies such as CDs external hard drives or tape stor age Just as many green IT studies do not con sider the embodied energy of the equipment involved studies on the electronic distribution of data do not consider the human resources in volved in creating or purchasing data and the relative value of backing up that data via differ ent means to prevent its loss or corruption 2 Koomey et al August 2009 The energy and climate change impacts of different music delivery methods download intel com pressroom pdf CDsvsdownloadsre ease pdf 3 Accenture WSP October 2009 Demonstrating the Ben efits of Electronic Software Distribution A study of green house gas emissions reduction www digitalbychoice com en gb 483648_CarbonFootprint PDF 4 Wikipedia Embodied energy en wikipedia org wiki Em bodied_energy 88 A practical guide to sustainable IT While we can t make decisions with certain ty what we can do is form general rules on the impacts of different storage options based upon the characteristics of the technologies involved e For long term storage years rather than months passively held data has a lower im pact than actively maintained data e g stor ing data for long periods on optical discs like CDs or DVDs requires less energy to
334. the surface Information storage and security 95 needs of large data centres rather than individ ual computers The ecological advantages of the cloud are predicated on the basis that this new demand for computing power can be managed more efficiently in a large data centre than on a large number of small systems The difficulty is that by keeping data in the cloud you are put ting all your trust in the availability of the online services If the service fails e g the problems with the Blackberry service in 2011 or the us er s account is compromised or blocked or the company providing the service collapses access to data in the cloud can be lost To have secure access to our most valued information at all times it is necessary to keep back ups where they can be accessed locally The difficulty for the cloud computing model is that if users keep back ups of their information on their own machine for the purposes of secu rity many of the arguments for the ecological efficiencies of the cloud system disappear 6 2 6 Manually transporting data the Sneakernet In the early days of personal computing dial up internet connections were very slow While to day s broadband internet connections run at a few hundred to a thousand kilo bits per second early dial up modems ran at 0 3 kilo bits per second For this reason the fastest way to move data wasn t via a network it was physically car rying floppy disks in a ba
335. ting both a fire and flash burn hazard Guarding against this is a matter of system design protecting against short cir cuits power surges etc and mechanical good design ensuring that the battery is housed in a suitable enclosure to protect it against physi cal damage rain frost and heat Off grid systems operate at low voltages using direct current A commercial system might use 24 volts or 48 volts whereas most self built systems will use 12 volts as this is the standard used in leisure off grid consumer systems The voltage is a factor because it has an effect on efficiency the higher the voltage the more efficient the system It is also impor tant to consider the ease of maintaining and repairing the system 24 and 48 volt compo nents are relatively harder to source than the 12 volt units available through many outdoors and mobile home dealers There are a number of different battery technologies available each with different costs and characteristics The batteries used in cars and lorries are of low quality and while they can be used to store power it s very inef ficient to do so as they lose so much during charging and can only be discharged by a small amount before cell damage occurs Most bat teries for power systems while similar to auto motive batteries are more advanced sealed 12 Wikipedia Lead acid battery en wikipedia org wiki Lead acid_battery 13 For a general introduction see the
336. tion for a list of the different classifications of DIMM module Usually a motherboard has at least two memory slots Sometimes the board requires that they are used in a certain order and so problems arise when you use more than one memory module If the memory modules do not have exactly the same speed data rate speci fication the board may have problems reading data because it can t synchronise the reading and writing cycles It s all very complicated and on older hardware where you might have problems finding large memory modules it can be quite annoying The general rule is to either use one large memory module big enough to provide the memory space you need or to find matched pairs of modules and always keep them together For all operating systems the amount of memory that the system has is one of the most critical limitations The table in box 3 3 lists a number of different operating systems and the absolute minimum system requirements to run them Although the system designers say that the system will run with these specs that doesn t mean that it will do so comfortably These are the bare minimum and so in practice it s best to dou ble or triple these figures e g if it states a Pen tium 2 processor use a Pentium 3 or 4 if it says 256MB of memory use at least 512MB or more In practice you re stuck with the processor that you have for the cost of buying a new processor on its own you can often buy a whole
337. together and it also interfered with the air flow needed to cool the drives SATA uses thin cables which are far easier to connect up than ribbon cables and also does away with the need to select the drive using a jump er Instead each drive plugs into a socket on the mother board so the maximum number of drives is limited by the number of SATA sockets available on the board Figure 3 5 IDE and SATA drive configuration Enetenene srererese state 40 way ribbon cable connector Power Jumper connector block Ribbon cable Motherboard d IDE 0 slave device 49 Se i E IDE 0 master device Note Not all drives use this order Note that the miniature 22 inch hard drives used on laptops operate in the same way as the standard 31 2 inch hard drives used in desktop PCs and come in both IDE and SATA versions If you want to upgrade a laptop hard drive the manual for the machine should tell you what type of drive is used and what capacity of drive the machine is capable of accommodating One very important point adding extra hard disks can add a large power drain to the computer system For that reason you need to have the minimum practi cal number of hard drives to create the amount of data storage required For example a single one terabyte TB hard drive will use less power than two 512 gigabyte GB hard drives If reducing power consumption is important then use just one large hard dr
338. top computer displays Journal of Cleaner Production 13 p 1281 1294 28 Wikipedia Embodied energy en wikipedia org wiki Em bodied_energy The ecology of information technology 21 Box 2 1 The resource footprint of consumer electronics Computers mobile phones and other digital electronics are a modern treasure trove of rare and exotic substances For example a quarter of the weight of a mobile phone is made of metals about half of that is copper and the rest is most ly aluminium tin iron silver and gold as well as minute quantities of platinum palladium barium hafnium indium gallium and rare earth metals You also get metals cropping up in unexpected places such as the 2 or 3 kilos of lead in the glass of old TVs and computer monitors or the gold which coats many of the connectors inside our IT equipment The diagram on the right shows the relative com position of a computer system with old style glass CRT monitor and a mobile phone There is little detailed in formation on the composition of most digital appliances although that situation is improving with the introduc tion of life cycle analysis reporting By their nature devices that rely on extremely pure materials engineered at microscopic levels of detail re quire far more energy to create than old fashioned ana logue devices Digital electronics might be more efficient or require less energy during their operational lives but as they demand
339. tors A check list of procedures and options for IT managers service pro viders and data centres SECTION 1 WHAT IS SUSTAINABLE INFORMATION TECHNOLOGY Welcome to A practical guide to sustainable IT This publication will guide you on a journey to examine how the information systems which support our lives work and how their ecological footprint has grown to become a distinct part of the human impact upon the planet In developed nations information systems are now an indispensable part of most people s lives In developing nations information systems are a means of enabling communication and exchange where no such infra structure existed before and that in turn creates many new opportunities from education to economic development But the development of the global communications network and the equipment attached to it has come at a cost The reality is that these services are not free quite apart from the financial cost the produc tion and use of these systems is affecting the global ecosystem which supports life on earth For example by some estimates the impact of information systems and telecommunications has as great an effect on climate as the air transport system How great those impacts are or how we can reduce or manage them is defined by the choices we make when buying using or disposing of these machines If we re going to have access to these technologies in the future with out harming the planet o
340. tricity than it creates this was a par ticular problem identified with small wind tur bines designed for installation on rooftops in the UK The problem with grid connected renew able systems is that many of them do not function during a power cut That s because the synchronising inverter requires the signal from the power grid to function even if you are generating power it will not be supplied to 00 Wikipedia Grid connected photovoltaic power system en wikipedia org wiki Grid connected_photovoltaic_pow er_system 9 Wikipedia Feed in tariff en wikipedia org wiki Feed in_tariff 10 Encraft 2009 Warwick Wind Trials www warwickwind trials org uk Renewable power 153 Box 11 2 Uninterruptible power supplies While not directly related to renewable energy this is a topic of relevance to the provision of power to computers Uninterruptible power supplies UPS are a means of protecting equipment against power cuts For servers and small networks especially when using a client server network a UPS protects against the data loss caused by small fluctuations or temporary interruption of mains power In the most developed states where the electricity grid has a very high reliability UPSs are only used in large data centres and corporate networks where high reliability is an essential part of the services provided In less developed states where brown outs and temporary interruptions are more com
341. tware used to create it Thinking about how we create in formation and how we store it for the future is an essential part of how we should plan our use of computers The physical media which we store the data on the file formats which we use to hold the data and the operating systems which we use to run the programs which read those files are all likely to become obsolete one day While operating systems evolve many of the programs we run on them stay largely the same Even so while the name or purpose of the program may not change the way the data is physically stored by those programs changes from generation to generation of technology In the proprietary software world newer appli cations retain some backwards compatibility with the older version but only for two or three generations As a result old files can after a time become inaccessible to more recent pro grams If we are creating valuable work and we want to ensure that the information is available for future generations an idea which forms the core of the concept of sustainability then we have to think carefully how we decide to cre ate and store our data The basic rule to guard against future obso lescence is to keep copies of data in different formats preferably formats which do not use proprietary encoding systems and do not lock up the data in ways which might block access to it in the future There are a number of com monly used formats which d
342. tween what functions you need from the machine and what its internal electronics are capable of supporting see box 4 2 Breaking down our IT needs into a series of clear roles and specifica tions requires thought and planning to define what we really want In the corporate environ ment the aim is often to provide new infrastruc ture usually under contract because it repre sents the most economically efficient solution In contrast in smaller organisations and the voluntary sector there is the option of adapt ing existing hardware to work more flexibly us ing the skills of those who will use the system because that represents the least cost route to finding a solution to their needs As outlined in unit two one of the impor tant objectives of sustainable IT is to maximise the life of the equipment There are two ways of looking at this e Firstly we can maximise the use of a sin gle machine so that it is using as much of its processing capacity as possible for as much time as possible This is the objec tive for dedicated server machines and large data centre rack servers often because there s a cost penalty to hav ing unused machine capacity sitting idle Achieving this outcome requires attention to the minute details of system configu ration and the organisation of hardware e Secondly we can prolong the life of equip ment usually older equipment by giv ing it less intensive processing tasks which match th
343. tween users around the globe has increased leading to a leap in the amount of data now routinely stored on personal computers as more people connect to the network through mobile devices more data is stored in large online systems to enable people to communicate on the move and this is now maturing as a large cloud storage network and while the efficiency of online technology has increased the increase in data traf fic more than offsets that improvement and so the energy and resources used to support the global communications network are still increasing As users of this global network there are various measures we can take to improve the ecological footprint of our network usage Some of these steps are simple while others are a matter of adopting differ ent working methods Some such as the way we design websites are more problematic because they entail redefining the way in which we present ourselves to the world online breaking with the fashion for more elaborate web interfaces in order to slim down the amounts of data transacted 1 Minnesota Internet Traffic Studies accessed June 2012 Internet Growth Trends amp Moore s Law www dtc umn edu mints igrowth html 2 Raghavan and Ma 2011 The Energy and Emergy of the Internet www cs berkeley edu jtma papers emergy hotnets2011 pdf 7 1 LOCAL NETWORKS ocal networks connect computer users in a building or people at home to their broadband router Early networ
344. ty offer on site service If the device fails you may have to send it back to the manufacturer s service department for repair which is likely to cost time and money Check if the manufacturer can offer a contract with a service company to carry on site repairs as this may take less time to organise 32 A practical guide to sustainable IT reason power hungry They are intended to run computer networks or large internet data cen tres and so are not the sort of machine you d use for general purpose computing Some servers are stand alone boxes rather like a desktop machine For the last decade or so the trend is to shift away from single machines to rack or blade hardware where multiple server machines operate in a single large case In the rest of this unit and the unit on Reuse and reclamation later we ll primarily deal with desk top computers The principles involved in desktop machines also apply to most laptop machines although the hardware is more difficult for the inexperienced user to modify We ll investigate the installation software on the machine in the next section Operating systems What we ll look at below is how a standard desktop machine works how to identify the different parts of the machine and what all that jargon about hard ware specifications actually means There is one golden rule to remember when using computers Computers are stupid At the simplest level computer hardware is a col lection
345. ue to their history of use to exchange data between different op erating systems or software applications are more suited to long term data storage 4 Wikipedia BBC Doomsday Project en wikipedia org wiki BBC_Domesday_Project 5 Wikipedia Backward compatibility en wikipedia org wiki Backward_compatibility 134 A practical guide to sustainable IT e Ifyou are using a proprietary program such as Microsoft Word then save copies of the most important files in other file formats such as plain text RTF PDF or an open formatting standard such as XML or HTML e When creating graphical data or using pro prietary CAD or publishing programs export a copy of the final work to a common open im age format such as TIF JPG PNG or GIF or if the program permits export it as a PDF e When using databases or spreadsheets ex port a copy of the data into flat text based files such as tab or comma separated tables or as an XML data file e Avoid compressing or collecting data inside archive files for example ZIP RAR TAR GZ etc Not only are compressed files more likely to suffer a greater amount of data loss as a result of later file corruption certain proprie tary compression formats may fall out of use and become inaccessible in the future e As a general rule when storing data for long term retrieval unless there are security con cerns do not lock files using the encryption or password locks of ap
346. uilding de signs which reduce ventilation The solution is to use products which do not contain solvents 8 3 THE MACHINE M any aspects of the installation and configu ration of the computer are dealt with in units 3 4 and 5 All machines need care and mainte nance as outlined in Box 8 1 and by regularly attending to the well being of the computer sys tem you can improve its performance and extend its operating life What is equally important in the day to day use of these systems are the security specific aspects of computer use 8 3 1 Securing the machine Computer security begins with the design of the the box the case containing the com ponents of the computer system The most important component in your computer is not the CPU or the memory or even the mother board it s the hard drive s That s because the hard drive holds all the data on the system Protecting the box is therefore primarily centred around protecting the hard drives and the data they contain The simplest option is to install a hard drive caddy into the machine as discussed earlier The other option with desktop boxes is to get a cage or a clamp These fit over the case and then bolt to a table top or the floor Com mercial ones are quite expensive but they re fairly easy to make by anyone with basic met alworking skills 16 Whole Building Design Guide Enhance indoor environ mental quality www wbdg org design ieq php fla
347. ument s contents rather than just restrict access to it cryptographic digi tal signatures are far more complex and can t be easily circumvented 128 A practical guide to sustainable IT 8 4 MALWARE AND PHISHING alware or to use the more popular la bel viruses have been a problem with computers for at least the past 20 years Origi nally they were carried in files and on floppy disks swapped between machines Today with the advent of high speed broadband the malware problem has become much larger and more complex and can be transferred from the active code used in websites email as well as software programs The motivation for pro ducing malware has also changed 20 years ago writing malware was a past time for computer geeks and pranksters whereas today the pro duction of malware is increasingly related to organised crime and the work of intelligence agencies Most of the viruses trojans and related malware in circulation are designed specifically for use with the Windows operating system That is partly a reflection of the widespread use of Windows if you want to write malware for nefarious purposes then it makes sense to target the most popular operating system Both Linux and Mac OS have far fewer prob lems with malware That s partly because they are used less than Windows but it is also re lated to the design of the operating system itself Unix like operating systems such as Linux and Mac
348. up 2009 The environmental impact of Amazon s Kindle www tkearth com downloads thoughts_ereaders pdf 14 Green Press Initiative 2011 Environmental Impacts of E books www greenpressinitiative org documents ebooks pdf more efficient than a laser printer However if you are routinely producing large print runs on a photocopier getting the job produced by a conventional commercial printer using wet inks and a conventional printing press will be more efficient Using conventional printing also al lows a range of lower quality recycled papers to be used Another aspect of e reader technology not of ten discussed is intellectual property and in par ticular the use of digital rights management to control the use of the devices and the files they contain For example Amazon s Kindle service al lows books to be shared by up to six devices reg istered to the same Amazon account but not be tween Amazon accounts There is a facility to loan an e book you have bought to another Amazon user but only once and only if the publisher per mits it One of the great features of the traditional printed book is that it can be shared freely by many people and can be given sold back to shops who will re sell the book The resale recycling of sec ond hand books means that the impact per person of printing the book becomes progressively less as it is passed around With e readers the sharing of the data is usually blocked on desktop syste
349. ups of computers and the network s data servers or high speed internet connection Depending upon the capability of the hardware and the operating system it is possible to switch gigabit ethernet to work at the slower fast ether net speed and conserve power Another major factor in running a network is the power used by the network electronics to provide connectivity All devices use power and when not in use they will still draw a minimum amount of energy while they wait to move pack ets of data between machines For that reason it is better to have the smallest number of eth ernet switches or Wi Fi base stations and use them to their maximum capacity only add ing new devices when the network experiences congestion There is no easy advice to give on this point How a network is physically laid out depends upon both the number of machines involved and the layout of the space they oc cupy Theoretically the maximum length of an ethernet cable is 100 metres although taking 7 2 USING NETWORKS sing networks efficiently has many benefits The energy used to transmit data is directly proportional to the size of the files being trans mitted therefore using various means to mi nimise the amount of data you need to send will reduce the energy consumed by your use of elec tronic networks And a result by minimising the data moved we can also reduce the amounts of data which clog the file systems of our computers 7 2 1 Email
350. uration while others require plug ins or ad ditional software Web cache Web browsers use a cache to hold copies of commonly downloaded files When a page is requested if the cache al ready has a copy it checks if the copy on the site has been changed since it was last down loaded If the content is unchanged the local copy is used and so it need not be repeatedly downloaded If routinely browsing advertis ing graphically rich websites it is a good idea to increase the size of the cache to take ac count of the large script and image flash files used by these sites For example the Firefox browser defaults to a limit of 50 megabytes of cached files extending this to around 100 to 120 megabytes will allow more of those re peatedly displayed adverts and the code data files which go with them to be cached and will help to speed loading of the page and reduce the amount of data downloaded e Pop ups A common feature on advertising driven sites is that certain actions by the user such as clicking on buttons or lists will cause another browser page to pop up This page invariably contains advertising or other un wanted information and can launch additional code within the browser than can tie up the processing power of the system and even com promise security Most browsers include an op tion to block pop ups which is enabled from the browser s configuration menu Quite apart from avoiding additional data downl
351. ure en wikipedia org wiki Digi tal_signature the user s activity using key logging software which monitors the keystrokes entered from the keyboard Therefore if you don t know or trust the system administrator of the machine you have to work on it s best to assume that the system is not secure even if you have the ability to configure high grade encryption of the data on the system The second type of password protection is the built in passwords used for many popular office based applications This allows the use of passwords to control access to the content of files without the password the file cannot be opened and read Some applications such as the programs used to create PDF files allow you to set conditions for how the document can be accessed preventing those accessing the file from printing using cut and paste or modifying the contents unless the file is unlocked with the correct password The general problem with the file locks used by application programs is that they re very weak Most applications such as PDF files word processor files and spreadsheets or ZIP archive files have downloadable crack ing programs available to find the password and unlock the file These are brute force pro grams and with a reasonable amount of paral lel computing power it is possible to crack the passwords on applications within a matter of hours or days In contrast if you wish to protect the integrity of the doc
352. ured screens and curtains are the simplest way to reduce the solar gain from windows e Lighting is a significant factor in commercial office environments While compact fluores cent lighting reduces energy consumption significantly compared to incandescent bulbs the latest tubular fluorescent luminaires and LED lighting modules require even less pow er for the amount of light they can generate Using timers on lighting systems can also en sure that lights are automatically switched off outside normal office hours e Water resources are an increasingly press ing ecological issue Public water supply re quires one to two kilowatt hours per person per day to treat and supply drinking water 14 Whole Building Design Guide Energy efficient lighting www wbdg org resources efficientlighting php 15 Whole Building Design Guide Protect and conserve wa ter www wbdg org design conserve_water php Maintenance security and resilience 121 perhaps two or three times that figure in those areas which rely on desalinated wa ter or water pumped for tens of miles from the nearest source Minimising wastage and using low flush toilets are essential and will become more so as the global climate warms e Indoor air quality is becoming a more signifi cant health issue as research highlights the pollution created by modern construction materials and furnishings This can be exac erbated by sealed air conditioned b
353. urity and resilience looking after our information sys tems Like any complex tool or mechanism com puter systems need care and maintenance While solid state technology of the silicon chip may have no moving parts there are many aspects of every day computer use which require physical care and maintenance Besides hardware the computer s software and the file system also need occasion al attention to keep the logical elements of the machine working reliably In this unit we look at how we can care for our information systems to keep them functioning reliably but also to get the greatest possible service life from the hardware We ll also look at how we can plan for system fail ures or more serious events to secure our infor mation even when the hardware fails Disposal in which we examine how we can deal with equipment which has reached the end of its useful life This is divided into two parts End of life and disposal how to know when equipment has reached the end of its useful life and how to dispose of it safely The com ponents inside computer systems can fail but sometimes they are discarded because of other factors such as changes in software or operating systems which necessitate us ing more powerful hardware In this unit we ll look at the environmental risks of computer hardware how to determine if any item of hardware can be used for other tasks how to dispose of it if necessary and the problematic
354. usual ly easier to buy a replacement keyboard for the machine and that s certainly cheaper than buying a whole new machine For mobile gadgets the greatest risk is dropping them on a hard surface The simplest way to guard against this is to buy a purpose built soft case to hold the device In the event the gadget is dropped the case prevents a large mechanical shock being transmitted from the hard surface through the case Many mobile devices such as iPods or mobile phones can be fitted with a lanyard so the device can be worn around the neck or wrist Some even incorporate headphones so that you do not stress the headphone connector of mobile phones and MP3 players by tugging on the cord A major problem for digital electronics is static elec tricity This can be generated by human made fibres in clothes and carpets and is made worse in a hot dry envi ronment such as an office Static discharges can damage electronic components when the inside of the machine is exposed or when you touch the metal contacts on cables or connectors Another way of generating static electricity is from air moving across dry plastic surface For this rea son you should never use an ordinary household vacuum cleaner to remove dust from electrical equipment Quite apart from the static risk the high force of the vacuum can damage internal fans or rip the keys from keyboards If you wish to remove dust there are small low suc tion vacuum cleaners availabl
355. w for your laptop if you forget the user set up password you ll need to download the manual for the motherboard laptop and look up the BIOS settings information 3 3 9 Power supplies Next let s look at power supplies These days PCs only have one large power connector 13 In ancient times before the Pentium ll and the introduction of the ATX motherboard the AT power supply used two connectors side by side 39 Wikipedia BIOS en wikipedia org wiki BIOS 40 Wikipedia ATX en wikipedia org wiki Atx 42 A practical guide to sustainable IT but you re unlikely to run into one of those these days The advantage of the ATX supply is that it gives the computer the ability to turn itself off when it shuts down However the ecological cost is that when the ATX supply shuts down the sys tem it s still consuming a small amount of power to keep the electronics in standby mode ready to start the machine when the user presses the on button Therefore when you ve shut a system down it should also be isolated from the mains power supply Not just because of the power con sumption on older desktop machines usually the power drain is about five to 15 watts about the equivalent of a small low energy light bulb but also because power surges might damage the electronics Note if you use a modem connect ed to a phone line disconnect that too or get a surge protected phone adapter to prevent dam aging power surges coming down t
356. w up some problematic questions on the impacts implicit in their use of technology Knowing that the activities which you undertake on a daily basis require the expenditure of such resources puts our individual lifestyles under a critical microscope Although the scope and standards of life cycle analysis reports vary if we utilise what information is available see box 2 2 we can make better purchasing decisions and so begin to address the impacts created by our demands for these technologies The ecology of information technology 23 2 4 IS INFORMATION TECHNOLOGY SUSTAINABLE he answer to that question is both yes and no Under its current design the way we build and utilise information systems is completely unsustainable for many different reasons In part that s linked to the unsustain ability of the human system in general as de scribed in The Limits to Growth However that s not to say that we couldn t address many of the present problems with IT to keep these technol ogies functioning in the future The difficulty is that doing so will require the structure of the IT industry and the products it designs and mar kets to change to a wholly different model of working and without consumer and legisla tive encouragement that is likely to result in both a cultural and economic resistance from the industry as it exists today The bottom line of sustainability is the abil ity of a system to keep functioning
357. without installing a card in the machine this will minimise power use If you must install a card such as a parallel interface card for an old style printer cable then check with the manufacturer s specifications to find a the card which has a low power consump tion Next let s look at the front panel connectors 9 A PC has a power and reset switch a hard disc A PC card drive HDD and power light and recently a sleep light These all connect at a small group of ter minal posts usually in one corner of the mother board There s also an internal speaker that makes a beeping noise to warn of errors although some motherboards have the sounder fixed on the board and so don t need an external speaker The small button cell battery on the mother board 11 is there to keep power to the machines Basic Input Output System BIOS chip when the machine is switched off This stores all the configuration settings for the motherboard If removed after a few hours you ll lose these set tings which is a good way of clearing the access passwords on the motherboard Also if this bat tery runs down the BIOS settings might be lost or corrupted in which case you ll need to replace the button cell Most motherboards especially laptops where the battery is buried deep inside the machine have a pair of terminals which can instantly reset the contents of the BIOS memory if connected together To find them very useful to kno
358. y building in security and reliability by spread ing similar functions across different systems This approach ensures that if one layer fails then there are further layers to maintain sys tem security and resilience As with defining modules within a system by breaking down the problem into individual layers those re sponsible for that segment of the problem can take responsibility for it and work these tasks into their everyday routine rather than having one person take on the whole task For example the physical security in a building protects the computers inside the building but if physical security fails and the computers are stolen then data back up proce dures should minimise the loss of data the ma chines contained We can in turn break this ex ample down into further layers to improve the system design Building security can be broken down into separate zones meaning that more important machines or information are pro tected by more levels of security In a similar way on a single computer non sensitive infor mation can be stored insecurely while secure data can be stored in encrypted formats Another common means of achieving better security and reliability is through redundancy In the event of one piece of equipment a mod ule in the system failing there is always a spare available to replace it For certain applications where high reliability is essential for example the safety systems of nuclear power statio
359. y developed for Unix machines These ideas were taken on by the Linux community and developed into a variety of low cost terminal server systems Their low cost and ability to utilise cheaper recycled equipment has made these systems especially popular in education 37 Wikipedia Thin client en wikipedia org wiki Thin_client 38 Popular systems include The Linux Terminal Server Proj ect www Iitsp org OpenThinClient openthinclient org and Thinstation thinstation org Network Internet router gateway Server al establishments particularly in developing nations While initially sceptical even Mi crosoft now offer a terminal server system compatible with Windows applications and there are programs available to convert older Windows XP machines into thin clients The major difficulty with thin client net works is that the server represents a single point of failure With stand alone PCs even when the network is down it is still possible for people to carry out some work With client server systems any failure of the server or the network prevents everyone connected to the network from using the system The other problem with thin clients is that they are not very flexible in their application Although for routine applications they have few problems if specialised or unconventional software is re quired for certain tasks it may not be easy to run this on the server There is also an intellec
360. years due in a large part to the increasing power and pro cessing capacity of the equipment involved It s really easy to grow your industry when the tools of the trade double their power and halve their utilisation costs every 18 months or so As a result the industry need not put a lot of effort into being more productive getting a greater output from your existing body of pro duction resources when the power of IT sys tems is growing exponentially This is the root of the IT productivity para dox paradox It is not necessary to work hard to increase productivity if there is no incentive to create efficient resources the rising power capacity and functionality of technology is able to make up for the lack of attention to the ef ficiency of design This of course is where the problem of bloat arises If computers become more powerful there is no incentive to improve the quality of the code use to make them func tion and for web bloat if network speeds are rising there is no need to be more creative with site information design For example when 29 Wikipedia Moore s Law en wikipedia org wiki Moore 27s_law 30 Willcocks and Lester 1996 Beyond the IT Productiv ity Paradox European Management Journal vol 14 no 3 pp 279 290 June 1996 dx doi org 10 1016 0263 2373 96 00007 2 31 Wikipedia Software bloat en wikipedia org wiki Soft ware_bloat mobile phone operators paid billions for
361. your phone In the event of loss or damage to the phone the data can be recovered from the service and downloaded to a new phone For ordinary mobile phones there are methods to back up the contents of the SIM card but these tend to be expensive as they often require a physical device to read the card Some mobile operators give the option of back ing up the address book and other features of the phone to the operator s system and these can be downloaded to a new phone in the event of loss or damage Backing up iPods and similar music playing devices is more complex in part because it runs into problems of digital rights copyright In most cases you are loading data from another machine so keeping a back up copy is un necessary unless files are only stored on the device and nowhere else Most music download services will register a number of playing devices and so again in the event of loss or damage the old device can be unregistered and the new device registered in order to transfer files onto it Finally laptop and notebook PCs can be updated just like any other desktop system The machine can perform a back up over a network either to another PC or to a network server or connected to an external stor age device such as a hard drive USB stick external hard drive or memory card to copy the files that require back ing up iPads can back up to another computer via a cable or Wi Fi connection or you have the option to store dat
362. ys tem and how big those drives can be see box 3 4 A problem with IDE was that the mother board could only handle a certain size of hard drive beyond a certain limit the motherboard couldn t address the disk That can be a prob lem when using some older motherboards be cause only small hard drives are accepted by the motherboard This limits the maximum storage available and is a problem because small hard drives a few gigabytes or less are hard to find these days SATA doesn t have these same re strictions as it is designed to handle very large storage capacities and as a recent standard there s no problem getting hold of large SATA compatible hard drives 3 3 8 PC cards front panel connectors and BIOS The AGP 5 and PCI 8 slots are edge connec tors they re designed to have a circuit board slotted into them to extend the functions of the motherboard For most everyday functions you won t need to bother about the slots It s only when you need something out of the ordinary such as an internal modem or something non standard like a data logging or specialist inter face card that you ll need to use these slots An important consideration about PC cards is that they consume power Some such as the high performance AGP card used by the lat est video gaming machines use a very large amount of power a good indication that a card consumes a lot of power is when it has its own cooling fan If you can get by
363. ystem is built upon and the manufacturing and waste disposal processes related to the device we can create a significant reduction in the global impact of these systems To illustrate the subtle implications of this ap proach let s look at a highly significant develop 1 Wikipedia Age of Enlightenment en wikipedia org wiki Age_of_Enlightenment 2 Wikipedia Crowd funding en wikipedia org wiki Crowd_ funding 3 Wikipedia Rebound effect conservation en wikipedia org wiki Rebound_effect_ conservation ment in the field of ICT policy On 5 July 2012 the UN Human Rights Council approved a resolution stating that the right to freedom of expression on the internet should be protected by state parties To quote the most significant part of the text the General Assembly at its sixty sixth ses sion on freedom of expression on the Inter net affirms that he same rights that people have offline must also be protected online in particular freedom of expression which is applicable regardless of frontiers and through any media of one s choice in accordance with articles 19 of the Universal Declaration of Hu man Rights and the International Covenant on Civil and Political Rights This is a significant breakthrough in the long campaign for digital rights and should be cel ebrated Unfortunately while this applies to the policies created by national and international governmental agencies it does no

Download Pdf Manuals

image

Related Search

Related Contents

DEH-X1750UB (Inglès, Espanhol, Português) Baixe  le télécharger ici - Université de Genève  KOHLER K-2364-47 Installation Guide  descargar - John Deere  Start-up and use  téléchargez le manuel d`utilisation Pile Poil  Shin-ei Electronic Measuring Co., Ltd. 1  Frymaster 1824/2424G Fryer User Manual    

Copyright © All rights reserved.
Failed to retrieve file