n a wired finding by a Harvard researcher, Google search generates 7 grams of carbon dioxide (CO2), slightly less than half as much CO2 as boiling a kettle for a cup of tea. Google on its official blog post has replied to the claims and explained well how they are helping the environment.

Here is a quick look at the energy efficiency of Google Products

Google News: Think how much energy is saved by reading the summary of the news in Google news than going to each individual news portal. Or the worst case how much savings from the printed edition of the news paper.

Google Apps: Think how many mail servers are sitting idle as many of the small scale companies moved all their emails to Google Apps.

Gmail : Think how much energy is saved by keeping all the emails online and not on multiple hard disk as a backup

Google suggest: how much energy is saved by having the suggestions online rather than clicking and going to each one of them.

Google Talk: how much energy and money saved by cutting the long distance calls and routing them online.

Google Search : How much energy is saved in comparison with other search engines which takes twice or thrice the time to load and most often to delivers most inappropriate results.

Google Adsense & Adwords : So much energy saving by cutting cost on untargeted TV and other mass media advertisements

Google books: What if all the book publishers move online and save trees on printed books.

Google Youtube: Huge energy saving if all the films were posted online and viewed from home. Cut on gasoline, DVD cover, DVDs, huge posters, marketing stuffs. Tremendous…

May be the research by Alex Wissner-Gross, Environmental Fellow at Harvard University research prove correct, but it’s the negligible price that we pay to keep the worlds information organized.

Explore More

New phishing scam targets high level executives

A new phishing attack has been circulating lately, but instead of trying to dupe millions of computer users into giving up their financial information, this one is aimed at high

What are the various steps in the pre-attack phase?

In the pre-attack phase, there are seven steps, which have been defined by the EC-Council, as follows: 1. Information gathering 2. Determining network range 3. Identifying active machines 4. Finding

Torrent Poisoning

=== Introduction === The BitTorrent protocol identifies peers using a tracker. Each peer announces itself to the tracker via HTTP. Certain parameters in the announce request itself can be altered