What is electronics disposal efficiency? Where does this fit in the scheme of data center metrics?
By submitting your personal information, you agree that TechTarget and its partners may contact you regarding relevant content, products and special offers.
IT equipment is replaced every few years to take advantage of new computing resources, greater power efficiency and affordable service or maintenance agreements. But what happens to failed equipment or systems replaced by a technology refresh?
Some older equipment may be redistributed across the business, but some of it will be thrown into the trash, often resulting in e-waste that can pile up in landfills. The Green Grid has recently proposed a new metric to help organizations measure electronics disposal efficiency (EDE).
The EDE metric is a way to objectively measure recycling or reuse effectiveness by expressing the weight of equipment "responsibly" disposed of versus the total equipment weight disposed of. This leaves a ratio ranging from a dismal state of 0.0 -- with no responsible disposal -- to the ideal 1.0, which indicates all electronic equipment has been responsibly disposed of.
The more electronic equipment you reuse, refurbish or recycle through a compliant recycler as a proportion of your total equipment disposal, the more efficient your EDE will be.
As with other metrics from The Green Grid, such as power usage effectiveness, carbon usage effectiveness or water usage effectiveness, EDE metrics are not an industry or government standard; organizations typically are not compelled to apply EDE. But organizations eager to showcase their environmental initiatives have adopted other metrics as a standard means of comparing one company to another or to industry averages. The Green Grid hopes that EDE will raise awareness of e-waste and prompt organizations to watch waste streams more closely.
Dig Deeper on IT compliance and governance strategies
Related Q&A from Stephen J. Bigelow
Our enterprise wants to limit the time it spends generating Identity and Access Management policies. What tools are available to automate this task?continue reading
Multifactor authentication helps organizations verify account and user identities in the public cloud. But what do I do when my MFA devices fall out ...continue reading
We have restrictions imposed on in-house IT staff with AWS Identity and Access Management. How do IAM roles protect access to services, applications ...continue reading
Have a question for an expert?
Please add a title for your question
Get answers from a TechTarget expert on whatever's puzzling you.