Feeds

Canadian prof: Green IT is a waste of time

Digital nomads will destroy the planet

HP ProLiant Gen8: Integrated lifecycle automation

A prominent Canadian academic in the tech-policy field has said that "Green IT" initiatives don't work.

"Most of the negative environmental impacts [of IT] occur in the form of completely unintended, second and third order effects," says Professor Richard Hawkins of Calgary Uni. "These 'rebound' effects may not be mitigated by inventing 'greener' IT products and, indeed, may be intensified by such changes."

As an example, the prof cites mobile phones, saying that even if the phone itself has no environmental consequences its existence will still encourage people to move about more - in cars, planes, whatever - than they otherwise would, so contributing to carbon emissions and climate change.

"We didn't adopt the mobile phone so we could drive and talk on the phone, we adopted it because we were already driving so much. Creating a greener cell phone won't reduce the impact of increased mobility. The real question is what amount of mobility is sustainable?"

This line of argument would also no doubt apply to such technologies as mobile push email, voip, video calling, netbooks etc. If you didn't have that smartphone or UMPC you'd stay in the office and burn less transport fuel, sort of thing.

This isn't just your ordinary academic pondering - Hawkins' research may influence global policymakers. He and his team will be presenting their thoughts at a Euro comms-policy conference in Spain next month, and to the UN Earth Summit at the end of the year. This will inform the OECD IT'n'sustainability initiative, among other things.

There are full details from Calgary Uni here. ®

Eight steps to building an HP BladeSystem

More from The Register

next story
THUD! WD plonks down SIX TERABYTE 'consumer NAS' fatboy
Now that's a LOT of porn or pirated movies. Or, you know, other consumer stuff
EU's top data cops to meet Google, Microsoft et al over 'right to be forgotten'
Plan to hammer out 'coherent' guidelines. Good luck chaps!
US judge: YES, cops or feds so can slurp an ENTIRE Gmail account
Crooks don't have folders labelled 'drug records', opines NY beak
Manic malware Mayhem spreads through Linux, FreeBSD web servers
And how Google could cripple infection rate in a second
FLAPE – the next BIG THING in storage
Find cold data with flash, transmit it from tape
Seagate chances ARM with NAS boxes for the SOHO crowd
There's an Atom-powered offering, too
prev story

Whitepapers

Seven Steps to Software Security
Seven practical steps you can begin to take today to secure your applications and prevent the damages a successful cyber-attack can cause.
Consolidation: The Foundation for IT Business Transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.
Designing a Defense for Mobile Applications
Learn about the various considerations for defending mobile applications - from the application architecture itself to the myriad testing technologies.
Build a business case: developing custom apps
Learn how to maximize the value of custom applications by accelerating and simplifying their development.
Consolidation: the foundation for IT and business transformation
In this whitepaper learn how effective consolidation of IT and business resources can enable multiple, meaningful business benefits.