Connect with us


How Many Servers Does Google Use? How Fast are the Google Servers?



Google Data Centers

Was the number of servers in the company’s data centre network overestimated by Google Watchers? More than 1 million Google server counts have been put in recent figures. However, recent Google data shows that Google possibly has around 900,000 servers in operation.

Google never informs you how many machines the data centres are running. The latest estimation is based on knowledge provided by Professor Jonathan Koomey of Stanford, who has recently published an update study on the use of data centre electricity.

Google boss David Jacobowitz told Koomey that the energy used by the data centres of the organisation is less than 1 percent of the 198.8-billion kWh — the approximate worldwide overall power consumption of data centres of 2010. That ensures that Google will use an energy base of approximately 220 megawatts across its entire global data centre network.

Amazon Cloud Servers
Amazon Cloud Servers

“Google’s data center electricity use is about 0.01% of total worldwide electricity use and less than 1 percent of global data center electricity use in 2010,” Koomey writes while cautioning that his numbers represent educated guesses extrapolated from the company’s information.

“This result is in part a function of the higher infrastructure efficiency of Google’s facilities compared to in-house data centers, which is consistent with efficiencies of other cloud computing installations, but it also reflects lower electricity use per server for Google’s highly optimized servers.”

Also Read: Are Samsung Phones Made in China? Read More

High-Efficiency Data Centers, Low-Power Servers

The data centres of Google are planned to benefit from the best practises of architecture and service in the industry. The business pioneered the activity of warmer appliances and the creation of energy-efficient chiller-free datacentres. The Custom Servers of Google feature a power supply combined with a battery, meaning that a custom power supply (UPS) will act as continuous. The architecture switches the UPS and the battery recovery features to the device cabinet from the data centre.

Google is equipped to handle far bigger server fleets in the future. A modern storage and processing framework named Spanner has been developed by the company to simplify the operation of Google resources across several data centers. This involves automatic resource distribution across ‘entire computer fleets’ ranging from 1 million to 10 million machines

In addition to not disclosing server counts, Google also doesn’t release data on the electricity it uses or provisions for its data centers. Local reports have suggested that Google arranges power capacity of 50 megawatts and beyond for some of its largest data centers. If the company is actually running its infrastructure using just 220 megawatts of power, that would suggest that Google is provisioning power for significant future expansion at these sites.

Apple Data Centres
Apple Data Centres

Cloud Vs Local Servers – Where to Store Data?

Data are the most important weapon in our study as scientists. Good data helps us to grow in our jobs and misdemeanours can interrupt this easily. In an era in which subjects such as data aggregation, data consistency, and open access to data are increasingly common, this article ensures you can determine correctly when it comes to the storage of your research.

Everyone speaks much about data privacy, security, and safety, but where should the data be placed? Here we will give you an insight into the advantages and drawbacks of accessing the research data from a cloud vs. a local server.

  1. Cloud and local servers
  2. Cloud pros & cons
  3. Local server pros & cons

Also Read: Are Xiaomi Phones Secure? All you need to know

Ebay Servers
Ebay Servers

Local & Cloud Servers

The constant digitization of the laboratory ecosystem translates into a tremendous increase in data generation at a digital level. This data, whether it is raw data or in your lab notebook, needs to be securely stored somewhere and two options are available: Cloud or local Servers.

A cloud is a type of a server, which is remote (usually in Data Centers), meaning you access it via the internet. You are renting the server space, rather than owning the server. A local (regular) server is one that you do buy and own physically, as well as have on-site with you.

Also Read: What is Intel Rapid Storage Technology? Explained

Cloud Servers – Pros & Cons

You are already using several cloud-based tools including email providers (Gmail, Outlook, etc…), storage/backup software (iCloud, Dropbox, Box, etc…) and all social media platforms that you might have an account in.


  • Maintenance & upgrades
  • Easy adjustment of storage space
  • Data stored remotely
  • Accessible wherever there is internet access

The first pro of using a cloud is that the cloud provider handles all of the maintenance and upgrades. This means you have one less thing to worry about. It is also easy to up or downscale the amount of space in the cloud. So, you are just paying for the amount you need.

The data is also stored remotely and never stored on your computer, meaning it is not occupying space unnecessarily. If there are technical issues on site, your data will be safe in the cloud. A final pro is that you can access the data stored in the cloud from wherever there is an internet connection.


  • Cannot access data without the internet
  • Transferring data out of the cloud

On the other side of accessing via the internet, a con can be that if your internet connection is not very strong you could have trouble accessing the data. However, with some software, you are still able to access the data offline. But you will either be unable to edit the data offline or you can edit it and then it will sync later. You will also need to check how easy it would be to transfer the data elsewhere should you stop using the cloud.

Also Read: What is Intel Optane Memory? Here is what it means

Samsung Data Centres
Samsung Data Centres

Local Servers – Pros & Cons

In your research group, department or institute you might already have a local server available. Instead of storing your microscope data in the microscope computer, you are transferring it to another storage device, so that you can access it from other computers and also assure that the microscope computer does not get filled with data in 1 day.


  • Up/download speed
  • System set-up control
  • Security

The first pro of using a local server is the speed. The speed refers to that with which you can up/download data to the server. You also have total control the system setup, to make sure it fits your exact needs.

The control also extends to your backups, and everything else to do with the data since you own the server completely. It may also feel more secure to have a local server, onsite, since only you and your team can physically, and of course digitally, access it.


  • Installation of expensive hardware
  • Will need maintenance

The main con of installing a local server is needing to install it and then maintain it. Sometimes the hardware can be costly and if problems arise, you will need to do the troubleshooting. However, this would, of course, be where the IT team would come to save the day!

Also Read: Are Android Phones Secure? All you need to Know

Facebook Data Centres
Facebook Data Centres

How Much faster is Google Server than a Normal PC?

How much faster is the Google server than a normal PC?

Besides the fact (as others have mentioned) that Google (and other major sites) do not use ONE server but millions of them in multiple giant computing centers, they also use another trick to respond faster: they store a lot of the common elements of the web pages in “edge cache” that is near your home.

It works like this:

Look at the web page you are viewing right now. There are parts that are very specific responses to your input, but many things are pretty generic and *everyone* sees them. Some are even quite static – icons and logos that don’t change for months or even years.

When you access a host system, your inquiry may go a long way over the internet to get to the host, and the host responds over that same path. That takes time. We might measure it in fractions of a second, but it still adds up.

So, a long time ago someone got clever and figured out that they could save time (and bandwidth) if the content that many people saw was stored near their location instead of at the host site. So they pre-positioned things like graphics that require a big file at ISPs who agreed to host their content. This meant that the time it takes for you to get their entire web page is much quicker.

For some, the speed of response was critical to their business. If you do a search, for example, you want the answers to come as quickly as possible.

These days, it is a common technique used by all the big web sites. Tens of thousands of internet service locations support “edge cache”. Back in the late 1990s, my job was to develop the procedures to implement 5,000 new locations per year, using satellites to broadcast the common content all over the world. We gave each participating ISP $30,000 in satellite equipment, which reduced their connection fees.

Source : Quora


Dave Daniel has been a Freelancer and Blogger for the past 3 years and is now the proud owner of The Tech Vamps. He has Expertise in the Areas of Technology, Science, Gaming, Gadgets, Hacking, Web Development, etc.

1 Comment

Leave a Reply

Your email address will not be published. Required fields are marked *


Hacking – A Fullstop On E-system




Hacking – A Fullstop On E-system

Passion or Madness: Now days, it has become a passion to learn how to hack. Some of us do it for the sheer challenge, some for the sheer love for learning and new technologies. Regardless of what the reason is, with every hack someone is trying to improve the technology we rely on.

There are many hacking related skills one can learn, depending on the person and the type of hacking they want to do. As there are many opportunities and facets to the hacking world, it makes it complex to learn all things related to it.

But, it is never too late if you have the right information and the right techniques. In order to make sure that you have all the information you need, you can always study and learn hacking. The best part of it all is that, for all you know, you can be the next hacker that redefines the way we think about security.

Mentoring: There are many opportunities available for collaboration and snooping on hackers. If you have an interest in snooping on hackers or have the opportunity to learn from them, consider taking a class or participating in a workshops. You might be surprised how much knowledge they have about the technologies they use… and you can use what you’ve learned and put it to good use.

Sniffer: We have tools now that can let us track IP addresses. We can also tell how far away the IP address is from us, and we can sniff for firewalls, viruses, and other threats. We can also reveal a lot of other information about the person/company that we are dealing with.

Cache: We refer to the temporary files that store all the information that has been fetched over the net. Actually, the term ‘cache’ is a bit misleading. The information is not stored in order and there is no order to it. The information is usually stored in memory and while it is loading it is also stored in a temporary location so that it is not immediately discarded. The temporary location is emptied when the request for the information is finished and then the information is discarded.

Many hacking tools use a variety of modes of communication Protocols (Speakers, Morse code, Direct Sensing, etc.)


•http which is a general term used for HTTP/ActiveX and often used by many InternetBrowsers, presents significant security risks. It is a specification supported by the Internet Engineering Task Force (IETF) and is responsible for the functioning of the World Wide Web. The primary concern of the IETF is the transfer of files and processes over the Internet.

The subsequent technologies, which are often but not always classified, follow between HTTP and TCP/IP and SPI.

Internet Protocol (IP)

•IP over SSL

• Internet Protocol (IP) is a set of protocols that offers Internet users the ability to communicate online using the TCP network. The IP protocol applies resource sharing and addressing methods among the computers on a network and is responsible for the flow of information exchanged during online transactions. Online users consists of computers that have been granted access by an Internet service provider (ISP).

Online Systems Management (OSMP)



o Virus Bulletin No. 9110 provides updates on viruses that are specific to the Microsoft IIS 5.0 Extended Validation SSL Certificate. This Microsoft SSL certificate enables you to secure private data that pass through, including documents, e-mail messages, and on to databases, which store user credentials and other private information. This certificate also enables your site to display a secured page now and later, when your users click a protected link.

The CSR data must be verified and properly transformed in the digital object before it can be authenticated and then encrypted. Therefore, to access the signed certificate, the user must have the Bit-Authentication turned on for the Microsoft Exchange 2007 Online Explorer (E), which comes with the SSL functionality.

Effects of Certificate Fraud

A fraudulent Certificate could cause several problems for the user. The certificate could be fraudulent in the sense that the name of the sender or any essential part of the signature block is misrepresented or false. Physical inspection of the AIA may also be performed by an authorized third party, such as an auditor, in order to confirm the fact that the web site is legitimate. If SSL authentication is possible and has been enabled on the site, the browser will display a padlock and indicate that an SSL certificate is secured.

Reasons to Prevent Certificate Fraud

The instances of certificate fraud may be reduced if users and businesses implement evolving strategies and are informed about how the security process & monitoring mechanisms work.

Continue Reading


How To Avoid Spyware Before It’s Too Late!




How To Avoid Spyware Before It’s Too Late!

Unfortunately, most people don’t pay much attention to the threat posed by spyware until their level of infection has become acute and their private information has been compromised. The final result is that they become subject to an identity theft attempt. New methods of attack are being developed all the time and you need to get up to speed on the subject and stay informed of changes as they occur in order to know how to protect yourself.

First of all, if you are a careless surfer you are living dangerously and eventually you will get nailed. The smart thing is to set your computer environment up with a secure defensive perimeter and to prevent unauthorized access to your computer and check out any personal information that you have stored on your hard disk. If you surf the web, open attachments or use peer to peer applications then you risk being victimized.

The statistics are staggering and reveal just some of the tremendous amount of personal information that is present across the internet. According to requirements imposed by the federal government, we can all be traced back to our IP address. With that information in the wrong hands, a lot of people have a lot of problems.

The only solution is to minimize your risk of exposure. This requires you to be careful about the type of information that you divulge while online. Don’t assume that you can just offload your personal information to sites that are willing to accept financial information. Sites that are willing to acquire your information will have an address that you can contact them to confirm their legitimacy.

Other risk factors include file sharing programs, so you should download and install programs like the well-known P2P file sharing programs like BeXTRA or CoolWebSearch that help you keep your computer free from harmful viruses, hackers and worms. Surfing anonymously will also help keep your privacy since no one will be able to trace you and your actions.

Why should you risk it?

Secure surfing is one of the best ways to protect your identity and personal information. It’s not hard to understand why most people begin to take a liking to the idea and begin to make regular trips to the local library to surf the internet and download files. The truth is that they should avoid these activities because it is possible that they are the victims of online thieves.

The trailblazing technology of today has helped to make the whole process much safer and understanding students to use the internet and avoid harmful viruses. However, these efforts have not been able to totally rid the internet of its infamous reputation as a source of crimes and victim of fraud. Users that have criminal intent will never be able to track you using your IP address because mobile malware and other malicious programs will also be unable to track you.

Using this technology will also help you to stay protected since you will be able to encrypt your data which will render it totally unrecoverable once it is deleted from your computer. There are numerous applications available when it comes to protecting yourself from cyber crimes; one of which that is available is the IP hiding software. This software enables you to surf the web undetected through the IP address of origin. After the IP address is hidden, the site you visit will pretend to be from the computer you are using.

This is because the site is actually acting as a proxy server; one that originates from the computer you are using. If you are currently using a site that you are not sure of, then visit a local library or search online for a few reviews about the product.

Continue Reading