This IDC Country Brief covers Western Europe, in which the amount of data created, replicated, and consumed annually will double every two and a half years through the end of the decade, according to the 2012 EMC-IDC Digital Universe study.
This EMC Engineering TechBook provides insight and understanding of some options available for managing your data center connectivity, including information on some new software management tools developed to bridge the gap in the I/O consolidation environment.
Este documento contiene la agenda telefónica de 35 contactos con sus respectivos nombres, números de identificación, números telefónicos, ciudades y tipo de contacto (familiar, personal o profesional).
Windows Server 2012 and Windows 8 introduce several new security features including secure boot, early malware detection, BitLocker enhancements, virtual smart cards, claims-based access control, data classification, DNSSEC, unified remote access, PowerShell remoting, fine-grained password policies, and improved security auditing. These features help harden the security of Windows infrastructures.
This document discusses factors that influence starting a business, including:
1) The three factors of production needed - land, labor, and capital. It defines each factor and gives examples.
2) It explains entrepreneurs take risks by combining these factors of production to start new businesses or come up with new ideas within existing businesses.
3) Most people get jobs instead of starting businesses due to the risks and resources required, like obtaining land, hiring employees, and acquiring startup capital.
This document discusses monopolies and compares them to perfect competition. It provides information on different types of monopolies, including geographic, government-granted, and technological monopolies. The document examines how a monopoly determines its profit-maximizing quantity and price, noting that a monopoly faces a downward-sloping demand curve rather than being a price taker. It also discusses how a monopoly results in a deadweight loss compared to perfect competition. The document concludes by reviewing different public policy options for dealing with monopolies, such as antitrust laws, regulation, and public ownership.
This document contains notes from an economics class discussing the law of demand and consumer surplus. It defines demand as the amount of a good that consumers are willing and able to buy at various prices over time. It explains the law of demand, which states that as price decreases, quantity demanded increases, and as price increases, quantity demanded decreases. Finally, it defines consumer surplus as the difference between what people are willing to pay for goods and what they actually pay at market prices.
This EMC Engineering TechBook provides insight and understanding of some options available for managing your data center connectivity, including information on some new software management tools developed to bridge the gap in the I/O consolidation environment.
Este documento contiene la agenda telefónica de 35 contactos con sus respectivos nombres, números de identificación, números telefónicos, ciudades y tipo de contacto (familiar, personal o profesional).
Windows Server 2012 and Windows 8 introduce several new security features including secure boot, early malware detection, BitLocker enhancements, virtual smart cards, claims-based access control, data classification, DNSSEC, unified remote access, PowerShell remoting, fine-grained password policies, and improved security auditing. These features help harden the security of Windows infrastructures.
This document discusses factors that influence starting a business, including:
1) The three factors of production needed - land, labor, and capital. It defines each factor and gives examples.
2) It explains entrepreneurs take risks by combining these factors of production to start new businesses or come up with new ideas within existing businesses.
3) Most people get jobs instead of starting businesses due to the risks and resources required, like obtaining land, hiring employees, and acquiring startup capital.
This document discusses monopolies and compares them to perfect competition. It provides information on different types of monopolies, including geographic, government-granted, and technological monopolies. The document examines how a monopoly determines its profit-maximizing quantity and price, noting that a monopoly faces a downward-sloping demand curve rather than being a price taker. It also discusses how a monopoly results in a deadweight loss compared to perfect competition. The document concludes by reviewing different public policy options for dealing with monopolies, such as antitrust laws, regulation, and public ownership.
This document contains notes from an economics class discussing the law of demand and consumer surplus. It defines demand as the amount of a good that consumers are willing and able to buy at various prices over time. It explains the law of demand, which states that as price decreases, quantity demanded increases, and as price increases, quantity demanded decreases. Finally, it defines consumer surplus as the difference between what people are willing to pay for goods and what they actually pay at market prices.
The document describes a new Russian tank called the "Sibirsk 1000". It has big shells, enough cannons, and can travel at 90 mph due to its aerodynamic form. The tank is described as excellent for combat. The document concludes by telling the reader to get back to work and not spend free time with war toys or nude images.
This document provides an overview of investing and the stock market. It discusses different types of investments like stocks and bonds. It explains how the stock market works and lists some major stock exchanges. Key investing terms are defined, like bull and bear markets. Popular stock market indexes like the Dow Jones Industrial Average are also introduced. The document gives examples of famous investors like Warren Buffett and provides a basic introduction to finance-related careers and brokerage services.
This document discusses different types of economic efficiency including allocative efficiency, productive efficiency, and dynamic efficiency. It examines these efficiencies in the context of perfect competition, monopoly, and monopolistic competition market structures. Productive efficiency refers to producing at lowest cost while dynamic efficiency involves reinvesting supernormal profits into lowering costs further. The document considers which market structure results in each type of efficiency.
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDEMC
CloudBoost is a cloud-enabling solution from EMC
Facilitates secure, automatic, efficient data transfer to private and public clouds for Long-Term Retention (LTR) of backups. Seamlessly extends existing data protection solutions to elastic, resilient, scale-out cloud storage
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOEMC
With EMC XtremIO all-flash array, improve
1) your competitive agility with real-time analytics & development
2) your infrastructure agility with elastic provisioning for performance & capacity
3) your TCO with 50% lower capex and opex and double the storage lifecycle.
• Citrix & EMC XtremIO: Better Together
• XtremIO Design Fundamentals for VDI
• Citrix XenDesktop & XtremIO
-- Image Management & Storage
-- Demonstrations
-- XtremIO XenDesktop Integration
EMC XtremIO and Citrix XenDesktop provide an optimized virtual desktop infrastructure solution. XtremIO's all-flash storage delivers high performance, scalability, and predictable low latency required for large VDI deployments. Its agile copy services and data reduction features help reduce storage costs. Joint demonstrations showed XtremIO supporting thousands of desktops with sub-millisecond response times during boot storms and login storms. A unique plug-in streamlines the automated deployment and management of large XenDesktop environments using XtremIO's advanced capabilities.
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC
Explore findings from the EMC Forum IT Study and learn how cloud computing, social, mobile, and big data megatrends are shaping IT as a business driver globally.
Reference architecture with MIRANTIS OPENSTACK PLATFORM.The changes that are going on in IT with disruptions from technology, business and culture and so IT to solve the issues has to change from moving from traditional models to broker provider model.
This document summarizes a presentation about scale-out converged solutions for analytics. The presentation covers the history of analytic infrastructure, why scale-out converged solutions are beneficial, an analytic workflow enabled by EMC Isilon storage and Hadoop, test results showing performance benefits, customer use cases, and next steps. It includes an agenda, diagrams demonstrating analytic workflows, performance comparisons, and descriptions of enterprise features provided by using EMC Isilon with Hadoop.
The document discusses identity and access management challenges for retailers. It outlines security concerns retailers face, including the need to protect customer data and payment card information from cyber criminals. It then describes specific identity challenges retailers deal with related to compliance, access governance, and managing identity lifecycles. The document proposes using RSA Identity Management and Governance solutions to help retailers with access reviews, governing access through policies, and keeping compliant with regulations. Use cases are provided showing how IMG can help with challenges like point of sale monitoring, unowned accounts, seasonal workers, and operational issues.
Container-based technology has experienced a recent revival and is becoming adopted at an explosive rate. For those that are new to the conversation, containers offer a way to virtualize an operating system. This virtualization isolates processes, providing limited visibility and resource utilization to each, such that the processes appear to be running on separate machines. In short, allowing more applications to run on a single machine. Here is a brief timeline of key moments in container history.
This white paper provides an overview of EMC's data protection solutions for the data lake - an active repository to manage varied and complex Big Data workloads
This infographic highlights key stats and messages from the analyst report from J.Gold Associates that addresses the growing economic impact of mobile cybercrime and fraud.
Virtualization does not have to be expensive, cause downtime, or require specialized skills. In fact, virtualization can reduce hardware and energy costs by up to 50% and 80% respectively, accelerate provisioning time from weeks to hours, and improve average uptime and business response times. With proper training and resources, virtualization can be easier to manage than physical environments and save over $3,000 per year for each virtualized server workload through server consolidation.
An Intelligence Driven GRC model provides organizations with comprehensive visibility and context across their digital assets, processes, and relationships. It enables prioritization of risks based on their potential business impact and streamlines remediation. By collecting and analyzing data in real time, an Intelligence Driven GRC strategy reveals insights into critical risks and compliance issues and facilitates coordinated responses across security, risk management, and compliance functions.
The document describes a new Russian tank called the "Sibirsk 1000". It has big shells, enough cannons, and can travel at 90 mph due to its aerodynamic form. The tank is described as excellent for combat. The document concludes by telling the reader to get back to work and not spend free time with war toys or nude images.
This document provides an overview of investing and the stock market. It discusses different types of investments like stocks and bonds. It explains how the stock market works and lists some major stock exchanges. Key investing terms are defined, like bull and bear markets. Popular stock market indexes like the Dow Jones Industrial Average are also introduced. The document gives examples of famous investors like Warren Buffett and provides a basic introduction to finance-related careers and brokerage services.
This document discusses different types of economic efficiency including allocative efficiency, productive efficiency, and dynamic efficiency. It examines these efficiencies in the context of perfect competition, monopoly, and monopolistic competition market structures. Productive efficiency refers to producing at lowest cost while dynamic efficiency involves reinvesting supernormal profits into lowering costs further. The document considers which market structure results in each type of efficiency.
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDEMC
CloudBoost is a cloud-enabling solution from EMC
Facilitates secure, automatic, efficient data transfer to private and public clouds for Long-Term Retention (LTR) of backups. Seamlessly extends existing data protection solutions to elastic, resilient, scale-out cloud storage
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOEMC
With EMC XtremIO all-flash array, improve
1) your competitive agility with real-time analytics & development
2) your infrastructure agility with elastic provisioning for performance & capacity
3) your TCO with 50% lower capex and opex and double the storage lifecycle.
• Citrix & EMC XtremIO: Better Together
• XtremIO Design Fundamentals for VDI
• Citrix XenDesktop & XtremIO
-- Image Management & Storage
-- Demonstrations
-- XtremIO XenDesktop Integration
EMC XtremIO and Citrix XenDesktop provide an optimized virtual desktop infrastructure solution. XtremIO's all-flash storage delivers high performance, scalability, and predictable low latency required for large VDI deployments. Its agile copy services and data reduction features help reduce storage costs. Joint demonstrations showed XtremIO supporting thousands of desktops with sub-millisecond response times during boot storms and login storms. A unique plug-in streamlines the automated deployment and management of large XenDesktop environments using XtremIO's advanced capabilities.
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC
Explore findings from the EMC Forum IT Study and learn how cloud computing, social, mobile, and big data megatrends are shaping IT as a business driver globally.
Reference architecture with MIRANTIS OPENSTACK PLATFORM.The changes that are going on in IT with disruptions from technology, business and culture and so IT to solve the issues has to change from moving from traditional models to broker provider model.
This document summarizes a presentation about scale-out converged solutions for analytics. The presentation covers the history of analytic infrastructure, why scale-out converged solutions are beneficial, an analytic workflow enabled by EMC Isilon storage and Hadoop, test results showing performance benefits, customer use cases, and next steps. It includes an agenda, diagrams demonstrating analytic workflows, performance comparisons, and descriptions of enterprise features provided by using EMC Isilon with Hadoop.
The document discusses identity and access management challenges for retailers. It outlines security concerns retailers face, including the need to protect customer data and payment card information from cyber criminals. It then describes specific identity challenges retailers deal with related to compliance, access governance, and managing identity lifecycles. The document proposes using RSA Identity Management and Governance solutions to help retailers with access reviews, governing access through policies, and keeping compliant with regulations. Use cases are provided showing how IMG can help with challenges like point of sale monitoring, unowned accounts, seasonal workers, and operational issues.
Container-based technology has experienced a recent revival and is becoming adopted at an explosive rate. For those that are new to the conversation, containers offer a way to virtualize an operating system. This virtualization isolates processes, providing limited visibility and resource utilization to each, such that the processes appear to be running on separate machines. In short, allowing more applications to run on a single machine. Here is a brief timeline of key moments in container history.
This white paper provides an overview of EMC's data protection solutions for the data lake - an active repository to manage varied and complex Big Data workloads
This infographic highlights key stats and messages from the analyst report from J.Gold Associates that addresses the growing economic impact of mobile cybercrime and fraud.
Virtualization does not have to be expensive, cause downtime, or require specialized skills. In fact, virtualization can reduce hardware and energy costs by up to 50% and 80% respectively, accelerate provisioning time from weeks to hours, and improve average uptime and business response times. With proper training and resources, virtualization can be easier to manage than physical environments and save over $3,000 per year for each virtualized server workload through server consolidation.
An Intelligence Driven GRC model provides organizations with comprehensive visibility and context across their digital assets, processes, and relationships. It enables prioritization of risks based on their potential business impact and streamlines remediation. By collecting and analyzing data in real time, an Intelligence Driven GRC strategy reveals insights into critical risks and compliance issues and facilitates coordinated responses across security, risk management, and compliance functions.
The Trust Paradox: Access Management and Trust in an Insecure AgeEMC
This white paper discusses the results of a CIO UK survey on a“Trust Paradox,” defined as employees and business partners being both the weakest link in an organization’s security as well as trusted agents in achieving the company’s goals.
Emory's 2015 Technology Day conference brought together faculty, staff and students to discuss innovative uses of technology in teaching and research. Attendees learned about new tools and platforms through hands-on workshops and presentations by Emory experts. The conference highlighted how technology is enhancing collaboration and creativity across Emory's campus.
Data Science and Big Data Analytics Book from EMC Education ServicesEMC
This document provides information about data science and big data analytics. It discusses discovering, analyzing, visualizing and presenting data as key activities for data scientists. It also provides a website for further information on a book covering the tools and methods used by data scientists.
Using EMC VNX storage with VMware vSphereTechBookEMC
This document provides an overview of using EMC VNX storage with VMware vSphere. It covers topics such as VNX technology and management tools, installing vSphere on VNX, configuring storage access, provisioning storage, cloning virtual machines, backup and recovery options, data replication solutions, data migration, and monitoring. Configuration steps and best practices are also discussed.
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceIndexBug
Imagine a world where machines not only perform tasks but also learn, adapt, and make decisions. This is the promise of Artificial Intelligence (AI), a technology that's not just enhancing our lives but revolutionizing entire industries.
Fueling AI with Great Data with Airbyte WebinarZilliz
This talk will focus on how to collect data from a variety of sources, leveraging this data for RAG and other GenAI use cases, and finally charting your course to productionalization.
5th LF Energy Power Grid Model Meet-up SlidesDanBrown980551
5th Power Grid Model Meet-up
It is with great pleasure that we extend to you an invitation to the 5th Power Grid Model Meet-up, scheduled for 6th June 2024. This event will adopt a hybrid format, allowing participants to join us either through an online Mircosoft Teams session or in person at TU/e located at Den Dolech 2, Eindhoven, Netherlands. The meet-up will be hosted by Eindhoven University of Technology (TU/e), a research university specializing in engineering science & technology.
Power Grid Model
The global energy transition is placing new and unprecedented demands on Distribution System Operators (DSOs). Alongside upgrades to grid capacity, processes such as digitization, capacity optimization, and congestion management are becoming vital for delivering reliable services.
Power Grid Model is an open source project from Linux Foundation Energy and provides a calculation engine that is increasingly essential for DSOs. It offers a standards-based foundation enabling real-time power systems analysis, simulations of electrical power grids, and sophisticated what-if analysis. In addition, it enables in-depth studies and analysis of the electrical power grid’s behavior and performance. This comprehensive model incorporates essential factors such as power generation capacity, electrical losses, voltage levels, power flows, and system stability.
Power Grid Model is currently being applied in a wide variety of use cases, including grid planning, expansion, reliability, and congestion studies. It can also help in analyzing the impact of renewable energy integration, assessing the effects of disturbances or faults, and developing strategies for grid control and optimization.
What to expect
For the upcoming meetup we are organizing, we have an exciting lineup of activities planned:
-Insightful presentations covering two practical applications of the Power Grid Model.
-An update on the latest advancements in Power Grid -Model technology during the first and second quarters of 2024.
-An interactive brainstorming session to discuss and propose new feature requests.
-An opportunity to connect with fellow Power Grid Model enthusiasts and users.
Webinar: Designing a schema for a Data WarehouseFederico Razzoli
Are you new to data warehouses (DWH)? Do you need to check whether your data warehouse follows the best practices for a good design? In both cases, this webinar is for you.
A data warehouse is a central relational database that contains all measurements about a business or an organisation. This data comes from a variety of heterogeneous data sources, which includes databases of any type that back the applications used by the company, data files exported by some applications, or APIs provided by internal or external services.
But designing a data warehouse correctly is a hard task, which requires gathering information about the business processes that need to be analysed in the first place. These processes must be translated into so-called star schemas, which means, denormalised databases where each table represents a dimension or facts.
We will discuss these topics:
- How to gather information about a business;
- Understanding dictionaries and how to identify business entities;
- Dimensions and facts;
- Setting a table granularity;
- Types of facts;
- Types of dimensions;
- Snowflakes and how to avoid them;
- Expanding existing dimensions and facts.
Project Management Semester Long Project - Acuityjpupo2018
Acuity is an innovative learning app designed to transform the way you engage with knowledge. Powered by AI technology, Acuity takes complex topics and distills them into concise, interactive summaries that are easy to read & understand. Whether you're exploring the depths of quantum mechanics or seeking insight into historical events, Acuity provides the key information you need without the burden of lengthy texts.
Threats to mobile devices are more prevalent and increasing in scope and complexity. Users of mobile devices desire to take full advantage of the features
available on those devices, but many of the features provide convenience and capability but sacrifice security. This best practices guide outlines steps the users can take to better protect personal devices and information.
HCL Notes and Domino License Cost Reduction in the World of DLAUpanagenda
Webinar Recording: https://www.panagenda.com/webinars/hcl-notes-and-domino-license-cost-reduction-in-the-world-of-dlau/
The introduction of DLAU and the CCB & CCX licensing model caused quite a stir in the HCL community. As a Notes and Domino customer, you may have faced challenges with unexpected user counts and license costs. You probably have questions on how this new licensing approach works and how to benefit from it. Most importantly, you likely have budget constraints and want to save money where possible. Don’t worry, we can help with all of this!
We’ll show you how to fix common misconfigurations that cause higher-than-expected user counts, and how to identify accounts which you can deactivate to save money. There are also frequent patterns that can cause unnecessary cost, like using a person document instead of a mail-in for shared mailboxes. We’ll provide examples and solutions for those as well. And naturally we’ll explain the new licensing model.
Join HCL Ambassador Marc Thomas in this webinar with a special guest appearance from Franz Walder. It will give you the tools and know-how to stay on top of what is going on with Domino licensing. You will be able lower your cost through an optimized configuration and keep it low going forward.
These topics will be covered
- Reducing license cost by finding and fixing misconfigurations and superfluous accounts
- How do CCB and CCX licenses really work?
- Understanding the DLAU tool and how to best utilize it
- Tips for common problem areas, like team mailboxes, functional/test users, etc
- Practical examples and best practices to implement right away
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on integration of Salesforce with Bonterra Impact Management.
Interested in deploying an integration with Salesforce for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Speck&Tech
ABSTRACT: A prima vista, un mattoncino Lego e la backdoor XZ potrebbero avere in comune il fatto di essere entrambi blocchi di costruzione, o dipendenze di progetti creativi e software. La realtà è che un mattoncino Lego e il caso della backdoor XZ hanno molto di più di tutto ciò in comune.
Partecipate alla presentazione per immergervi in una storia di interoperabilità, standard e formati aperti, per poi discutere del ruolo importante che i contributori hanno in una comunità open source sostenibile.
BIO: Sostenitrice del software libero e dei formati standard e aperti. È stata un membro attivo dei progetti Fedora e openSUSE e ha co-fondato l'Associazione LibreItalia dove è stata coinvolta in diversi eventi, migrazioni e formazione relativi a LibreOffice. In precedenza ha lavorato a migrazioni e corsi di formazione su LibreOffice per diverse amministrazioni pubbliche e privati. Da gennaio 2020 lavora in SUSE come Software Release Engineer per Uyuni e SUSE Manager e quando non segue la sua passione per i computer e per Geeko coltiva la sua curiosità per l'astronomia (da cui deriva il suo nickname deneb_alpha).
Ivanti’s Patch Tuesday breakdown goes beyond patching your applications and brings you the intelligence and guidance needed to prioritize where to focus your attention first. Catch early analysis on our Ivanti blog, then join industry expert Chris Goettl for the Patch Tuesday Webinar Event. There we’ll do a deep dive into each of the bulletins and give guidance on the risks associated with the newly-identified vulnerabilities.
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfChart Kalyan
A Mix Chart displays historical data of numbers in a graphical or tabular form. The Kalyan Rajdhani Mix Chart specifically shows the results of a sequence of numbers over different periods.
Building Production Ready Search Pipelines with Spark and MilvusZilliz
Spark is the widely used ETL tool for processing, indexing and ingesting data to serving stack for search. Milvus is the production-ready open-source vector database. In this talk we will show how to use Spark to process unstructured data to extract vector representations, and push the vectors to Milvus vector database for search serving.
Have you ever been confused by the myriad of choices offered by AWS for hosting a website or an API?
Lambda, Elastic Beanstalk, Lightsail, Amplify, S3 (and more!) can each host websites + APIs. But which one should we choose?
Which one is cheapest? Which one is fastest? Which one will scale to meet our needs?
Join me in this session as we dive into each AWS hosting service to determine which one is best for your scenario and explain why!
Choosing The Best AWS Service For Your Website + API.pptx
The Digital Universe in 2020 - Western Europe
1. I D C C O U N T R Y B R I E F
The Digital Universe in 2020: Big Data,
Bigger Digital Shadows, and Biggest Growth
in the Far East — Western Europe
February 2013
By John Gantz, David Reinsel, and Carla Arend
Sponsored by EMC Corporation
Content for this paper is adapted from the IDC Digital Universe Study 2012, December 2012,
sponsored by EMC. Additional content for the study can be viewed at
http://www.emc.com/leadership/digital-universe/iview/index.htm
Western Europe
Digital Universe in Western Europe to Grow Tenfold Between Now (2012) and 2020
The "digital universe" of Western Europe, or the digital bits captured, created, or consumed each
year in the region, is expected to grow from 538 exabytes to 5.0 zettabytes between 2012 and
2020, more than 30% a year (see Figure 1). That means it will double about every two and a half
years.
By 2020 the Western Europe digital universe, if printed out as text, would make a stack of books
as high as 6.5 trillion Eiffel Towers. Or put differently: in 2020, the Western Europe digital
universe, if carried on 1GB memory sticks, would equal to more than 12,000 sticks per person in
Western Europe, up from about 1,000 sticks per person in 2012.
3. This responsibility for information security and privacy protection for so much of the digital
universe is one of the key challenges for the CIOs, data scientists and architects, governments,
and enterprises driving the development of the digital universe, especially in Western Europe,
where consumers are very sensitive to information security and privacy issues.
IDC analysis of the information in the region's portion of the digital universe by category of
information indicates that 46% of it might need information security at some level (much of the
rest is the transient data mentioned earlier). At the same time we estimate that less than 60% of
that needing protection actually has those protections (see Figure 3).
3
5. Impact of Cloud Computing
As the region's digital universe doubles every two and a half years — compared to the growth of
IT professionals in single digits a year — the complexity of managing, securing, storing, and
extracting value from it increases considerably. Dealing with this complexity implies a new
economy of scale revolving around specialties — an incentive for cloud computing.
Although cloud computing is in its early days, it is already having an impact on the digital
universe. IDC estimates that in 2012, of the region's share of the digital universe 17% was in
some way "touched" by the cloud — stored, transmitted, or processed. By 2020 that percentage
could be as high as 42% (see Figure 5).
5
7. A B O U T T H I S P U B L I C A T I O N
This publication was produced by IDC Go-to-Market Services. The opinion, analysis, and research results presented
herein are drawn from more detailed research and analysis independently conducted and published by IDC, unless
specific vendor sponsorship is noted. IDC Go-to-Market Services makes IDC content available in a wide range of formats
for distribution by various companies. A license to distribute IDC content does not imply endorsement of or opinion about
the licensee.
C O P Y R I G H T A N D R E S T R I C T I O N S
Any IDC information or reference to IDC that is to be used in advertising, press releases, or promotional materials requires
prior written approval from IDC. For permission requests contact the GMS information line at 508-988-7610 or
gms@idc.com. Translation and/or localization of this document requires an additional license from IDC.
For more information on IDC visit www.idc.com. For more information on IDC GMS visit www.idc.com/gms.
Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com
7