Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

If You Care About the Earth, You May Want to Send Fewer Messages

If You Care About the Earth, You May Want to Send Fewer Messages

We all share a lot of data. There’s everything shared for professional purposes, of course, but there’s also all the casual things that we send back and forth—chats, requests to have people to pick up things on the way home, and (naturally) memes and pet pictures.

Most of this is sent off without a thought. However, let’s take a moment to think about it for a moment… is there an impact to all this data being sent around?

As it turns out, there is.

Remember: Everything You Send is Stored Somewhere

When you send someone any kind of message, it isn’t as though the message and its data exit your device and move directly to the recipient’s device. Instead, all that data is ultimately stored in the cloud... or, in other words, some data center someplace.

Every message we send lives in these data centers, stored in the hundreds of thousands—if not millions—of hard drives that these cloud platforms are built on. Each hard drive requires energy to function, with varying amounts based on the infrastructure used. The more data that is stored, the more energy is expended.

So, let’s sum up the situation:

  • More and more data is being generated and shared.
  • For this data to be shared, it is stored in data centers.
  • These data centers use up energy to maintain this information.

See where this is going?

The More Data Stored, the More Energy Used

It’s pretty simple. As we produce and store more data, more energy is needed to sustain it, which means more energy needs to be produced. This ultimately draws more from our environment, leading to a negative overall impact. 

So, when you consider that 68% of data that companies use (and presumably, similar amounts of personal data) is never used again, that is a lot of unnecessary energy used up… not to mention, eating up valuable storage space (which you likely pay for) and incurring opportunity and risk-related costs, missing out on potential business or adding extra data to be stolen in a breach.

How to Minimize Dark Data

Simply put: think twice before hitting send.

Whether it’s an email that could be a quick call or a message that doesn’t really contribute to the conversation, the more you send, the more data that is generated. Being a little more discerning with your messaging habits might help make a little difference.

Just so we’re clear, we are in no way suggesting that a few employees sending a few less memes will even nudge the needle. However, actions like these can help inspire greater efforts toward environmentally-friendly efforts on the organizational level, before potentially becoming the industry standard over time. Is it a lofty goal? Yes… but a worthwhile one.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Wednesday, 06 May 2026

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Hackers Cloud Efficiency Hardware Network Security User Tips Internet IT Services Malware IT Support Phishing Privacy Email Workplace Tips Google Computer Workplace Strategy Collaboration Backup Small Business Hosted Solutions Users Ransomware AI Managed Service Mobile Device Microsoft Productivity Passwords Saving Money Quick Tips Communication Cybersecurity Smartphone Data Backup Data Recovery Disaster Recovery Android VoIP Upgrade Business Management Smartphones communications Mobile Devices Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Internet of Things Remote Information Miscellaneous Holiday Facebook Automation Artificial Intelligence Compliance Cloud Computing Covid-19 Training Gadgets Server Managed Service Provider Remote Work IT Support Outsourced IT Encryption Employee/Employer Relationship Spam Office Windows 10 Government Data Management Business Continuity Blockchain Windows 10 Wi-Fi Vendor Virtualization Business Technology Bandwidth Data Security Mobile Office Two-factor Authentication Apps Managed Services Apple Networking App Mobile Device Management BYOD Gmail WiFi Tip of the week Employer-Employee Relationship Chrome Budget Voice over Internet Protocol Managed IT Services Avoiding Downtime How To BDR Marketing Computing Physical Security Information Technology HIPAA Applications Access Control Office 365 Password Conferencing Hacker Healthcare Website Operating System Virtual Private Network Risk Management Router Big Data Health Analytics Office Tips Augmented Reality 2FA Help Desk Retail Storage Computers Bring Your Own Device Telephone Going Green Patch Management Cooperation Free Resource Project Management Save Money Windows 7 Remote Monitoring Vulnerability End of Support Firewall Vendor Management Cybercrime Microsoft 365 Solutions Display The Internet of Things Printer Paperless Office Infrastructure Social Windows 11 Monitoring Document Management Excel Customer Service Scam Managed IT Service Remote Workers Data loss Wireless Technology Administration Downloads iPhone Licensing Vulnerabilities Entertainment Data Privacy Robot Word Settings Images 101 Printing Wireless Telephone System Multi-Factor Authentication Content Filtering Mobility Cost Management IT Management VPN YouTube Meetings Safety Cryptocurrency Employees Computer Repair Integration Virtual Desktop Data storage User Tip LiFi Modem Mobile Security Processor Outlook Holidays Machine Learning Money Data Storage Smart Technology Supply Chain Customer Relationship Management Humor Video Conferencing Managed Services Provider Professional Services Saving Time Maintenance Virtual Machines Sports Hacking Antivirus Presentation Mouse Download Net Neutrality Alerts SQL Server Technology Care Mobile Computing Financial Data Tablet History Search Business Communications Break Fix Scams IP Address Browsers Smartwatch Best Practice Connectivity IT Alert Upload Procurement Buisness File Sharing Azure Hybrid Work Dark Data Managed IT Legal Social Network Telework IT solutions Cyber security How To Multi-Factor Security Tech Human Resources Dark Web Cables Recovery CES Business Growth IoT Communitications Notifications Trends Supply Chain Management Travel Hard Drives Domains Techology Customer Resource management FinTech Google Maps Regulations Cortana Google Calendar Term Google Apps Microsoft Excel IT Maintenance Data Analysis Alt Codes Star Wars IT Assessment Gamification Flexibility Downtime Unified Threat Management Staff Value Business Intelligence Refrigeration Public Speaking Unified Threat Management Organization Hosted Solution Social Networking Legislation Shortcuts Smart Devices Ransmoware Lithium-ion battery Fileless Malware Digital Security Cameras Typing Entrepreneur Content Remote Working Wearable Technology Memory Vendors Network Congestion Comparison Google Play Be Proactive Google Drive User Error Health IT Motherboard Data Breach Knowledge Assessment Electronic Health Records Permissions Workforce Directions Videos Undo Point of Sale Wasting Time Threats 5G Specifications Security Cameras Workplace Strategies Google Docs Unified Communications Trend Micro Experience Internet Exlporer Software as a Service Running Cable Tech Support Fraud Meta Microchip Bitcoin Network Management Google Wallet Username Managing Costs Amazon Monitors Black Friday SSID eCommerce Database Surveillance Laptop Websites Virtual Assistant Outsource IT Application Windows 8 Drones IT Technicians Virtual Machine Environment Media Cyber Monday Medical IT IBM SharePoint Proxy Server Reviews Cookies Electronic Medical Records Tactics Development Halloween Hotspot Transportation Small Businesses Lenovo Mirgation Hypervisor Displays Writing PowerPoint Shopping Nanotechnology Optimization Virtual Reality Addiction Scary Stories Private Cloud Language Employer/Employee Relationships Outsourcing Hacks Server Management Competition Superfish Management PCI DSS Identity Theft Chatbots Fun Navigation Distributed Denial of Service Workplace Gig Economy Deep Learning Screen Reader Twitter Service Level Agreement Internet Service Provider Error Computing Infrastructure Teamwork Hiring/Firing Regulations Compliance Education Identity Social Engineering Evernote Paperless Co-managed IT User Bookmark Smart Tech Memes Remote Computing

Blog Archive