Uncomplicated IT Logo

WATER WARS: THE HIDDEN COST OF RUNNING AI

Megan Poljacik • May 30, 2024

Earlier this month, OpenAI announced the release of GPT-4o. This AI model promises to be faster and more “human” than its predecessors, adding more value than ever before. AI has become the leading force of innovation. Yet, beneath the surface lies a significant challenge - the heavy consumption of water when cooling the data centers.


Research has indicated it takes approximately one 16.9oz bottle of water for ChatGPT to answer 50 questions. According to OpenAI CEO Sam Altman, ChatGPT now has 100 million active users weekly. That is a staggering amount of water! A single data center can consume millions of gallons of water per year. For instance, Google's data centers used approximately 4.3 billion gallons of water in 2021. To put this in perspective, that's enough to fill over 6,500 Olympic-sized swimming pools. The water is typically sourced from local municipalities, groundwater, or even man- made lakes and ponds, which can put a strain on local water supplies, especially in areas vulnerable to drought.

The amount of water used to run AI servers can vary depending on factors such as the type of cooling systems used, the weather at the location of the data center, and the efficiency of the server infrastructure. Water is primarily used for cooling the data centers to dissipate the heat generated by servers. There are several different methods that can be used. Direct liquid cooling involves circulating water directly to cool the heat-generating components inside the servers. Another is indirect liquid cooling, where water is used to cool a separate heat exchanger, which then cools the servers indirectly.

Some data centers use cooling towers that utilize water evaporation to dissipate heat from the servers. Water is then consumed in the evaporation process. The amount of water used in these methods will depend on the specific design and efficiency of the cooling system.

"Our goal is to become 'water positive' by 2030. We’re working to replenish more water than we consume globally and put back more water than we use."

-Satya Nadella (CEO of Microsoft)


Overall, water usage in data centers, including those hosting AI servers, remains a significant concern. To mitigate these impacts, the tech industry is taking steps to find sustainable solutions. Innovations such as liquid immersion cooling, which uses dielectric fluids instead of water, are being developed to reduce water consumption. Implementing water recycling systems within data centers can significantly cut down on water use. For example, Microsoft's data center in Quincy, Washington, has reduced its water usage by reusing water multiple times before discharge. Building data centers in cooler climates can reduce the need for water-intensive cooling systems, leveraging naturally lower temperatures to maintain optimal server conditions. Governments and industry leaders are also starting to introduce guidelines and standards for water usage in data centers to encourage more responsible water management practices.


As AI continues to drive the digital revolution, the environmental impact of its infrastructure must be addressed. In the end, the future of AI and data centers should be about balance—enjoying the benefits of technology while taking care of our planet. By making thoughtful choices now, we can ensure that our technological advances don’t come at the expense of our natural resources. Collaboration between the tech industry, governments, and environmental organizations is essential.

Policymakers can shape the future by enacting regulations that set clear standards for water usage in data centers, ensuring accountability and promoting best practices across the industry.

Uncomplicate IT News Blog

By Megan Poljacik March 27, 2025
Three things in life are certain: death, taxes and the persistent threat of cyberattacks. There are many layers of defense in the onion of cyber security, but at the helm is your firewall. Traditionally firewalls have always been the piece of hardware acting as a barrier between your office network and the wilds of the internet. Then in 2020 the way we work was transformed forever by the global pandemic. Nearly a third of the workforce transitioned to remote, leaving offices empty. Many employees continue to work in non-traditional spaces to this day. How can we defend them against cyberattacks if they are outside the protective reach of an on premise firewall? A firewall is a network security device or software that monitors and controls incoming and outgoing network traffic based on predetermined security rules. Think of it as a moat with a bridge and a guard shack that surrounds a castle. The guards and the moat are the firewall, acting as a barrier and between a trusted internal network (the castle) and untrusted external networks (random people trying to get in), helping to prevent unauthorized access to and from the castle while allowing legitimate traffic to pass through. The outside forces have to “check in” with the guards before they can cross the moat and access the castle.
By Megan Poljacik February 25, 2025
You may have heard recently that the FBI and Cyber Security and Infrastructure Security Agency are recommending cell phone users use end to end encryption when sending text messages. Why are they doing this and how does it affect you and your business? In December of 2024 authorities revealed that Chinese hackers have breached at least 8 major telecom network infrastructures, including those of Verizon and AT&T. Known as Salt Typhoon, the nefarious actors used a “back door” that is used by U.S. foreign intelligence surveillance systems (yes that’s legal wiretapping). Senior officials within the US Government have admitted the hackers have had access since summer of 2024. It appears that they focused heavily on users in the Washington DC area.
By Megan Poljacik December 19, 2024
Imagine a virus infecting over 85 million Android phones without anyone catching on. Believe it or not, this really happened in 2016! How could a virus be so easily distributed without human intervention? The HummingBad virus was a persistence rootkit, which is a very smart and nasty virus. It is difficult to find and even more difficult to remove. They embed themselves within the system without the users knowledge and they are designed to hide themselves and their activities, even from security software. A rootkit will take over an infected system on its own, or if it cannot gain root access, it will push a fake update prompt, tricking the user into installing. Once the malware has control of the device, it begins downloading and installing apps, and the lucrative business of conning users begins. The HummingBad virus was designed to click on the ads within the apps to generate advertising revenue. This inflated ad click and view counts, allowing the attackers to earn more revenue without actual user engagement. The malware also promoted and installed additional malicious
More Posts
Share by: