Contact Us
Sign In / Sign Up for FREE
Go to advanced search...

Green Computing- - Annotated Bibliography Example

Comments (0) Cite this document
The article asserts that though public awareness of the environmental sustainability is undoubtedly growing, economic costs attracts concern of shifting to a greener economy. The article also talks…
Download full paperFile format: .doc, available for editing
GRAB THE BEST PAPER99% of users find it useful
Green Computing- Annotated Bibliography
Read TextPreview

Extract of sample "Green Computing-"

Download file to see previous pages IT is also used in increasing the energy efficiency of buildings, supply chains, transportation systems, and electrical grids. In addition, the production and use of computers is growing fast in the consumption of global energy and greenhouse gas emissions.
This article talks about sustainable IT services and also assesses the effects of green computing practices. The article defines green computing as the practice of efficiently using computing resources while increasing or maintaining their overall performance. The article asserts that sustainable IT services needs the integration of practices of green computing such as virtualization, power management, improving cooling technology, electronic waste disposal, recycling, and optimization of the IT infrastructure in order to meet sustainability requirements. According to the author, recent studies show that power costs utilized by departments of IT approaches 50% of the total organizational energy costs. This paper provides a literature review on sustainable IT and identifies a set of principles that guide sustainable IT service design.
This paper addresses the challenges of environmental design for computing systems. The paper argues that pervasive computing do not only provide exciting research challenges and tremendous opportunities, but also negative environmental impacts, especially in terms of energy consumption and physical waste. The paper also asserts that environmental impacts come under consumer scrutiny and increasing government. Just like the rest of the disciplines (e.g. architecture, transportation), pervasive computing adapt accordingly. The paper also discusses specific research questions and issues arising from three phases of lifecycle device: maximizing device lifetime, improving recyclability, and minimizing resource usage for manufacture and operation.
This paper addresses green ...Download file to see next pagesRead More
Cite this document
  • APA
  • MLA
(“Green Computing- Annotated Bibliography Example | Topics and Well Written Essays - 1000 words”, n.d.)
Green Computing- Annotated Bibliography Example | Topics and Well Written Essays - 1000 words. Retrieved from
(Green Computing- Annotated Bibliography Example | Topics and Well Written Essays - 1000 Words)
Green Computing- Annotated Bibliography Example | Topics and Well Written Essays - 1000 Words.
“Green Computing- Annotated Bibliography Example | Topics and Well Written Essays - 1000 Words”, n.d.
  • Cited: 0 times
Comments (0)
Click to create a comment or rate a document

CHECK THESE SAMPLES OF Green Computing- Annotated Bibliography

Human computer interaction

...?Bewley The involved are all renowned ities on user interface design and are pioneers in this field. A major part of the design processof the “Star” workstation was the user interface. Human cognition was taken as the base guideline and three human factors were experimented with. Selection scheme tests showed the amount of buttons and kind of pointing device to select text. Icon tests showed the optimal shapes for recognition. Graphics tests showed that the line drawings interface needed revision. The focus was on basic users of computers who relied on recognition largely. The system was to be kept as simple as possible so that learning did not pose much of a problem. The studies conducted were largely qualitative in design except... ...
15 Pages(3750 words)Annotated Bibliography

Network Security

...Jackson, Chris. Network security auditing. San Francisco: Cisco Press, Print. Jackson’s book takes a very specific approach to computer network security at all levels. It examines the importance of network security in organizations and the importance of protecting data. It further analyses the security requirements of an organization and how to meet the desired customer satisfaction by proving them with solutions that make economic sense and those that help protect their data. The classification of data into several states; confidential, normal priority and critical, gives more light to the importance of having secure networks (Chris 2010). The book does for a fact live up to the state of being a comprehensive reference...
18 Pages(4500 words)Annotated Bibliography

Profit Implications of Malware

...? Profit implications of malware Malware refers to any program or file that can harm a computer system. Despite the fact that there no standard categorization of malware, still they can be grouped based on their effects, behaviors and intentions (David A. Elizondo, Computational Intelligence for Privacy and Security). However a malware will not specifically fall into either these groups as some malwares fall into more than one category. The most common groups are virus, worms Trojan horse, rootkit, spywares and adware. Viruses are small software programs that are designed to spread replicate from one computer to another (Karen Mercedes Goertzel). They are malicious as they interfere with...
15 Pages(3750 words)Annotated Bibliography

Computer Ethics and Professional Responsibility

...Leonardo's Laptop Mr. Ben Shneiderman is a of computer science and founder director of the Human computer interaction laboratory. It is located at University of Maryland, College park. In this he raises expectations of computer users. The expectations are about the knowledge and facilities they need to get from technology. This book opens eyes to the new possibilities. He even invites them to think freshly and innovatively. This makes them to use the available technology to maximum extent. They can even expect about future technology. The available technology can make them to think about new technologies by thoughts and expectations raised by him in the book. The shifts focus from the capacity of the computers to the caliber... of the...
6 Pages(1500 words)Annotated Bibliography

Annotated Bibliography for Preventive Computer Medicine

...Annotated Bibliography for Preventive Medicine - Avoiding Infections from Computer Viruses, Spyware, and Malware Acohido, B. (2009, April 29). Panda puts antivirus service on Net for free. USA Today, April 29, 2009, Money section p. 6b. Acohido discusses the new innovation from Panda Security Corporation in which antivirus software resides on a secure data server rather than the individual user’s hard drive. Using the Internet cloud allows a faster and more seamless user experience because hard drive space and memory resources aren’t taken up with running a system wide scan. This is an important innovation because there are far fewer downloads for the end user and the experience does not drain memory during a...
4 Pages(1000 words)Annotated Bibliography

Is cloud computing beneficial to organizations

...Annotated Bibliography of Cloud Computing Mell, P, and Grance, T, “The NIST Definition of Cloud Computing”. [Online Available at [http] Last Accessed on 24th Sep 2012 This sophisticated publication addresses a wide spectrum of concerns including definitions, models architecture, operational costs, benefits and security issues in cloud computing. Chapters present details of these topics and also compiles a number of research finding based on cloud computing. 2. Shazia K, Saima K, and Surraya G. (2011). Cloud Computing an Emerging Technology: Changing Ways of Libraries Collaboration. International...
1 Pages(250 words)Annotated Bibliography

Portfolio individual to the effects of birth control on abortion rates. National Public Radio (2012, October 8). Cloud Computing Saves Health Care Industry Time And Money: All Tech Considered: NPR. Retrieved October 8, 2012, from This article explains how cloud computing power makes it less expensive and easier for clinicians and firms to find out newfangled cures and medicinal drugs. Notably, the article portrays that analysis of data that used to take a long time and was expensive can now be done for lesser time and at a lesser cost. In essence, health care organizations...
9 Pages(2250 words)Annotated Bibliography

Annotated Bibliogrphy

.... The article expounds on the strength of the homeland security in the U.S. It achieves by evaluating the homeland security policy that was brought into formation after the September 2001 terrorist attack. The article claims that the Department of Homeland Security was formed thirty days after the attack through the coming together of many agencies in order to combat terrorism. Reiter, M., & Rohatgi, P. (2004). Homeland security. Internet Computing, IEEE, 8(6), 16-17. The article asserts that “Homeland Security” is a key area of concern for governments worldwide, which is obliged to provide protection to the citizens as well as the infrastructures that support them. The article also claims that role of information...
1 Pages(250 words)Annotated Bibliography

Write an annotation entry consisting of a Citation, a brief Summary, and a short paragraph Evaluation

... of the term “sustainable communities” and goes ahead to focus on “green action plans.” My essay holds that the creation of sustainable communities through green action plans is an imperative key for human survival. Accordingly, the text will allow me to provide a succinct definition of “green action plans” as it features the general principles of sustainability that a community could utilize when choosing and creating green action plans. The text’s primary limitation is that it was last updated around three years ago. Nonetheless, it will form the basis of my essay. Works Cited "Action Planning and the Sustainable Community." EPA. Environmental Protection Agency, 1 Nov. 2012. Web. 3 May 2015. ... Annotated Bibliography "Action Planning and...
1 Pages(250 words)Annotated Bibliography

Green Computing

...Green computing: Introduction: The modern era is dominated and driven by technology and digital equipment. All around us we see digital devices in one form or other. They have become an integral part of our life both in domestic sphere and in social sphere. However these digital devices pose a considerable threat in the context of environmental consideration. The mankind has contributed to the environmental imbalance through use of technology in one way or the other, some direct while others indirect. Aims and objectives: The paper looks into the reasons of global imbalances in the environmental, the different sources of hazards and pollutants and latter on provides an insight into the overall concept of Green Computing which has come...
9 Pages(2250 words)Annotated Bibliography
sponsored ads
We use cookies to create the best experience for you. Keep on browsing if you are OK with that, or find out how to manage cookies.

Let us find you another Annotated Bibliography on topic Green Computing- Annotated Bibliography for FREE!

Contact Us