this post was submitted on 07 May 2024
73 points (100.0% liked)

Technology

34891 readers
548 users here now

This is the official technology community of Lemmy.ml for all news related to creation and use of technology, and to facilitate civil, meaningful discussion around it.


Ask in DM before posting product reviews or ads. All such posts otherwise are subject to removal.


Rules:

1: All Lemmy rules apply

2: Do not post low effort posts

3: NEVER post naziped*gore stuff

4: Always post article URLs or their archived version URLs as sources, NOT screenshots. Help the blind users.

5: personal rants of Big Tech CEOs like Elon Musk are unwelcome (does not include posts about their companies affecting wide range of people)

6: no advertisement posts unless verified as legitimate and non-exploitative/non-consumerist

7: crypto related posts, unless essential, are disallowed

founded 5 years ago
MODERATORS
 

The major takeaways of this work are:

(1) For specific workloads, clusters of repurposed phones are cheaper and more carbon efficient than traditional servers.

(2) More broadly, scavenging unwanted equipment shows excellent potential for building economic and carbon-efficient systems, especially when renewable energy is plentiful.

(3) Sustainability has operational and manufacturing facets; manufacturing dominates as operating trends towards zero with cleaner energy mixes.

(4) Accurate LCA information is essential for carbon-based analyses; it would be beneficial if more ICT manufacturers published this information, including cloud providers who build custom systems. Our work highlights the need for more holistic analyses of the environmental impact of computing. With the substantial carbon cost of manufacturing and the difficulties of responsible recycling, the energy efficiency of a device may be the least significant component of its environmental and human impact.

you are viewing a single comment's thread
view the rest of the comments
[โ€“] Moonrise2473@feddit.it 3 points 6 months ago (1 children)

If the person that lost them unlocked the bootloader, didn't use a lock screen password and enabled USB adb debugging on any connection hacking it to work without the confirmation on screen then it would work. Extremely unlikely that would be the case

[โ€“] over_clox@lemmy.world 1 points 6 months ago

Meh, depends on which device I'm using. Not looking to use my devices in such a way, unless they break, but I have a phone and a tablet that meet all those qualifications.

Granted, not very common, but they do exist.