SlideShare a Scribd company logo
I D C            C O U N T R Y                        B R I E F

The Digital Universe in 2020: Big Data,
Bigger Digital Shadows, and Biggest Growth
in the Far East — Western Europe
February 2013
By John Gantz, David Reinsel, and Carla Arend
Sponsored by EMC Corporation

Content for this paper is adapted from the IDC Digital Universe Study 2012, December 2012,
sponsored by EMC. Additional content for the study can be viewed at
http://www.emc.com/leadership/digital-universe/iview/index.htm


Western Europe

Digital Universe in Western Europe to Grow Tenfold Between Now (2012) and 2020
The "digital universe" of Western Europe, or the digital bits captured, created, or consumed each
year in the region, is expected to grow from 538 exabytes to 5.0 zettabytes between 2012 and
2020, more than 30% a year (see Figure 1). That means it will double about every two and a half
years.

By 2020 the Western Europe digital universe, if printed out as text, would make a stack of books
as high as 6.5 trillion Eiffel Towers. Or put differently: in 2020, the Western Europe digital
universe, if carried on 1GB memory sticks, would equal to more than 12,000 sticks per person in
Western Europe, up from about 1,000 sticks per person in 2012.
What's driving this growth?

       Continued growth of Internet usage, social networks, and smartphones among
        consumers

       The falling costs of the technology that creates, captures, manages, protects, and stores
        information

       Migration from analog TV to digital TV

       Growth of machine-to-machine communication, including security images

       Growth of information about information

For instance, Western Europe now has a PC installed for every person over 15, more than 65%
of the population is online, and a third access the Internet from more than one device. In 2012 it
had as many camera phones in use as people, and nearly 50 million tablets and ereaders. Its
population and infrastructure meant it had more digital security camera footage than the U.S. or
China, and it consumes more digital TVs than China and India combined, despite the fact that it
has fewer TVs. And although the region has less than 6% of the world population, it accounts for
a quarter of IT spending.

It’s also worth noting that the Western European digital universe is growing faster than available
storage. This is a function of an increasing amount of transient data — from phone call routing
signals and digital TV signals watched but not stored to signals coming from the Large Hadron
Collider at CERN that are discarded within microseconds. The issue with storage in the digital
universe is less how to store all the bits as it is with the bits we do end up storing, how to do so
intelligently, economically, and securely.



The Consumer Influence
When we first started studying the digital universe, the origin of a majority of the bits within it
came from the mature markets: in 2005 the U.S. and Western Europe alone accounted for 49% of
the digital universe.

But as Moore's Law has made digital technology — computers, smartphones, cameras, TV,
movies, industrial equipment — cheaper it has become affordable for more and more people
around the world.

Over time the distribution of the bits within the digital universe by country of origin will more and
more closely mirror the distribution of population. By 2020 the U.S. and Western Europe will
generate only 30% of the bits in the digital universe. But in Western Europe the contribution of
individuals, as consumers or workers, creates a paradox. While individuals accounted for 58% of
the regional digital universe in 2012 and enterprises created 42% (see Figure 2), nevertheless
enterprises had responsibility or liability for 80%.

Somewhere in a byte's life as it travels from one consumer camera phone to another it passes
through an enterprise-owned network that must keep it secure and protect the privacy of the
sender and receiver. The same with almost all bytes in the digital universe.




                                                  2                                        ©2013 IDC
This responsibility for information security and privacy protection for so much of the digital
universe is one of the key challenges for the CIOs, data scientists and architects, governments,
and enterprises driving the development of the digital universe, especially in Western Europe,
where consumers are very sensitive to information security and privacy issues.

IDC analysis of the information in the region's portion of the digital universe by category of
information indicates that 46% of it might need information security at some level (much of the
rest is the transient data mentioned earlier). At the same time we estimate that less than 60% of
that needing protection actually has those protections (see Figure 3).




                                                3
As the years go on, the challenge is clear: to increase information security and privacy protection
fast enough and competently enough to keep up with that tenfold growth of the Western Europe
digital universe.



Opportunity for Big Data
One of the ironies of the digital universe is that as soon as information is created or captured and
enters the digital cosmos, much of it is lost. If a lot of it is not stored (see above), even more is not
tracked or analyzed. Of course, not all of it would be of value if it were tracked, but certainly some
of it would be.

IDC estimates that in 2012, 28% of the region's share of the digital universe would be valuable
were it tagged and analyzed. We also estimate that less than half a percent ever is analyzed. By
2020, we expect the percentage of the region's share of the digital universe that would be useful if
tagged and analyzed will be much bigger, 45% (see Figure 4). That's 15-fold growth of useful
information, which should be an inspiration for the adoption of Big Data technologies and
practices. However, in Western Europe specifically, the potential to track and analyze data needs
to be balanced with the respect for information security and privacy regulations and concerns.




                                                   4                                           ©2013 IDC
Impact of Cloud Computing
As the region's digital universe doubles every two and a half years — compared to the growth of
IT professionals in single digits a year — the complexity of managing, securing, storing, and
extracting value from it increases considerably. Dealing with this complexity implies a new
economy of scale revolving around specialties — an incentive for cloud computing.

Although cloud computing is in its early days, it is already having an impact on the digital
universe. IDC estimates that in 2012, of the region's share of the digital universe 17% was in
some way "touched" by the cloud — stored, transmitted, or processed. By 2020 that percentage
could be as high as 42% (see Figure 5).




                                               5
Call to Action
In just five years, the Western Europe share of the digital universe will be about the same size as
the entire digital universe in 2012. Its share of the digital universe will be many times more
valuable than today, but also many times more volatile. Many times more bytes will need
information security, many more systems will need real-time responses, and many more
demands for reliability and speedy access will be made of the IT managers, CIOs, data scientists,
and chief security officers that manage the actual digital universe.

Technology will evolve — algorithms for automatically creating metadata for unstructured data,
Big Data software that enables analysis of large, diverse data sets, optimization software for real-
time systems, and, of course, information management, data deduplication, and cyber security
tools. But the right technology tools will be necessary but not sufficient for the taming of the
region's digital universe. It will take new management practices, user education, and savvy
policies. This is the area where the technologists must rely on support from business units,
government, and consumers, and it is likely an area with bigger challenges than the technological
realm.

No country, no region, no company can halt the expansion of the digital universe. One can only
prepare as best as possible.




                                                 6                                        ©2013 IDC
A B O U T    T H I S   P U B L I C A T I O N

This publication was produced by IDC Go-to-Market Services. The opinion, analysis, and research results presented
herein are drawn from more detailed research and analysis independently conducted and published by IDC, unless
specific vendor sponsorship is noted. IDC Go-to-Market Services makes IDC content available in a wide range of formats
for distribution by various companies. A license to distribute IDC content does not imply endorsement of or opinion about
the licensee.

C O P Y R I G H T      A N D   R E S T R I C T I O N S

Any IDC information or reference to IDC that is to be used in advertising, press releases, or promotional materials requires
prior written approval from IDC. For permission requests contact the GMS information line at 508-988-7610 or
gms@idc.com. Translation and/or localization of this document requires an additional license from IDC.

For more information on IDC visit www.idc.com. For more information on IDC GMS visit www.idc.com/gms.

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com




                                                             7

More Related Content

Viewers also liked

Media Evaluation
Media EvaluationMedia Evaluation
Media Evaluation
loousmith
 
New russisan tank
New russisan tankNew russisan tank
New russisan tank
smacata
 
Considerations for Testing All-Flash Array Performance
Considerations for Testing All-Flash Array PerformanceConsiderations for Testing All-Flash Array Performance
Considerations for Testing All-Flash Array Performance
EMC
 
2014 Reformation plays
2014 Reformation plays2014 Reformation plays
2014 Reformation playsTravis Klein
 
AP stock market investing
AP stock market investingAP stock market investing
AP stock market investing
Travis Klein
 
Insaat kursu-arnavutkoy
Insaat kursu-arnavutkoyInsaat kursu-arnavutkoy
Insaat kursu-arnavutkoysersld54
 
02 allocative efficiency
02 allocative efficiency02 allocative efficiency
02 allocative efficiency
Travis Klein
 
Biynees khemjee awah
Biynees khemjee awahBiynees khemjee awah
Biynees khemjee awahpvsa_8990
 

Viewers also liked (8)

Media Evaluation
Media EvaluationMedia Evaluation
Media Evaluation
 
New russisan tank
New russisan tankNew russisan tank
New russisan tank
 
Considerations for Testing All-Flash Array Performance
Considerations for Testing All-Flash Array PerformanceConsiderations for Testing All-Flash Array Performance
Considerations for Testing All-Flash Array Performance
 
2014 Reformation plays
2014 Reformation plays2014 Reformation plays
2014 Reformation plays
 
AP stock market investing
AP stock market investingAP stock market investing
AP stock market investing
 
Insaat kursu-arnavutkoy
Insaat kursu-arnavutkoyInsaat kursu-arnavutkoy
Insaat kursu-arnavutkoy
 
02 allocative efficiency
02 allocative efficiency02 allocative efficiency
02 allocative efficiency
 
Biynees khemjee awah
Biynees khemjee awahBiynees khemjee awah
Biynees khemjee awah
 

More from EMC

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
EMC
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote
EMC
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX
EMC
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
EMC
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremio
EMC
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis Openstack
EMC
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lake
EMC
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop Elsewhere
EMC
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History
EMC
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical Review
EMC
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
EMC
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic
EMC
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for Security
EMC
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
EMC
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015
EMC
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015
EMC
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education Services
EMC
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere Environments
EMC
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBook
EMC
 

More from EMC (20)

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremio
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis Openstack
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lake
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop Elsewhere
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical Review
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for Security
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education Services
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere Environments
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBook
 

Recently uploaded

AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
IndexBug
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
kumardaparthi1024
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
Zilliz
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
DanBrown980551
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
Federico Razzoli
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
jpupo2018
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
Quotidiano Piemontese
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
panagenda
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
tolgahangng
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Jeffrey Haguewood
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Speck&Tech
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
Jason Packer
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
Postman
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
Ivanti
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
Chart Kalyan
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
Daiki Mogmet Ito
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
Mariano Tinti
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
Zilliz
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
fredae14
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
Brandon Minnick, MBA
 

Recently uploaded (20)

AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial IntelligenceAI 101: An Introduction to the Basics and Impact of Artificial Intelligence
AI 101: An Introduction to the Basics and Impact of Artificial Intelligence
 
GenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizationsGenAI Pilot Implementation in the organizations
GenAI Pilot Implementation in the organizations
 
Fueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte WebinarFueling AI with Great Data with Airbyte Webinar
Fueling AI with Great Data with Airbyte Webinar
 
5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides5th LF Energy Power Grid Model Meet-up Slides
5th LF Energy Power Grid Model Meet-up Slides
 
Webinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data WarehouseWebinar: Designing a schema for a Data Warehouse
Webinar: Designing a schema for a Data Warehouse
 
Project Management Semester Long Project - Acuity
Project Management Semester Long Project - AcuityProject Management Semester Long Project - Acuity
Project Management Semester Long Project - Acuity
 
National Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practicesNational Security Agency - NSA mobile device best practices
National Security Agency - NSA mobile device best practices
 
HCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAUHCL Notes and Domino License Cost Reduction in the World of DLAU
HCL Notes and Domino License Cost Reduction in the World of DLAU
 
Serial Arm Control in Real Time Presentation
Serial Arm Control in Real Time PresentationSerial Arm Control in Real Time Presentation
Serial Arm Control in Real Time Presentation
 
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
Salesforce Integration for Bonterra Impact Management (fka Social Solutions A...
 
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
Cosa hanno in comune un mattoncino Lego e la backdoor XZ?
 
Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024Columbus Data & Analytics Wednesdays - June 2024
Columbus Data & Analytics Wednesdays - June 2024
 
WeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation TechniquesWeTestAthens: Postman's AI & Automation Techniques
WeTestAthens: Postman's AI & Automation Techniques
 
June Patch Tuesday
June Patch TuesdayJune Patch Tuesday
June Patch Tuesday
 
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdfHow to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
How to Interpret Trends in the Kalyan Rajdhani Mix Chart.pdf
 
How to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For FlutterHow to use Firebase Data Connect For Flutter
How to use Firebase Data Connect For Flutter
 
Mariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceXMariano G Tinti - Decoding SpaceX
Mariano G Tinti - Decoding SpaceX
 
Building Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and MilvusBuilding Production Ready Search Pipelines with Spark and Milvus
Building Production Ready Search Pipelines with Spark and Milvus
 
Recommendation System using RAG Architecture
Recommendation System using RAG ArchitectureRecommendation System using RAG Architecture
Recommendation System using RAG Architecture
 
Choosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptxChoosing The Best AWS Service For Your Website + API.pptx
Choosing The Best AWS Service For Your Website + API.pptx
 

The Digital Universe in 2020 - Western Europe

  • 1. I D C C O U N T R Y B R I E F The Digital Universe in 2020: Big Data, Bigger Digital Shadows, and Biggest Growth in the Far East — Western Europe February 2013 By John Gantz, David Reinsel, and Carla Arend Sponsored by EMC Corporation Content for this paper is adapted from the IDC Digital Universe Study 2012, December 2012, sponsored by EMC. Additional content for the study can be viewed at http://www.emc.com/leadership/digital-universe/iview/index.htm Western Europe Digital Universe in Western Europe to Grow Tenfold Between Now (2012) and 2020 The "digital universe" of Western Europe, or the digital bits captured, created, or consumed each year in the region, is expected to grow from 538 exabytes to 5.0 zettabytes between 2012 and 2020, more than 30% a year (see Figure 1). That means it will double about every two and a half years. By 2020 the Western Europe digital universe, if printed out as text, would make a stack of books as high as 6.5 trillion Eiffel Towers. Or put differently: in 2020, the Western Europe digital universe, if carried on 1GB memory sticks, would equal to more than 12,000 sticks per person in Western Europe, up from about 1,000 sticks per person in 2012.
  • 2. What's driving this growth?  Continued growth of Internet usage, social networks, and smartphones among consumers  The falling costs of the technology that creates, captures, manages, protects, and stores information  Migration from analog TV to digital TV  Growth of machine-to-machine communication, including security images  Growth of information about information For instance, Western Europe now has a PC installed for every person over 15, more than 65% of the population is online, and a third access the Internet from more than one device. In 2012 it had as many camera phones in use as people, and nearly 50 million tablets and ereaders. Its population and infrastructure meant it had more digital security camera footage than the U.S. or China, and it consumes more digital TVs than China and India combined, despite the fact that it has fewer TVs. And although the region has less than 6% of the world population, it accounts for a quarter of IT spending. It’s also worth noting that the Western European digital universe is growing faster than available storage. This is a function of an increasing amount of transient data — from phone call routing signals and digital TV signals watched but not stored to signals coming from the Large Hadron Collider at CERN that are discarded within microseconds. The issue with storage in the digital universe is less how to store all the bits as it is with the bits we do end up storing, how to do so intelligently, economically, and securely. The Consumer Influence When we first started studying the digital universe, the origin of a majority of the bits within it came from the mature markets: in 2005 the U.S. and Western Europe alone accounted for 49% of the digital universe. But as Moore's Law has made digital technology — computers, smartphones, cameras, TV, movies, industrial equipment — cheaper it has become affordable for more and more people around the world. Over time the distribution of the bits within the digital universe by country of origin will more and more closely mirror the distribution of population. By 2020 the U.S. and Western Europe will generate only 30% of the bits in the digital universe. But in Western Europe the contribution of individuals, as consumers or workers, creates a paradox. While individuals accounted for 58% of the regional digital universe in 2012 and enterprises created 42% (see Figure 2), nevertheless enterprises had responsibility or liability for 80%. Somewhere in a byte's life as it travels from one consumer camera phone to another it passes through an enterprise-owned network that must keep it secure and protect the privacy of the sender and receiver. The same with almost all bytes in the digital universe. 2 ©2013 IDC
  • 3. This responsibility for information security and privacy protection for so much of the digital universe is one of the key challenges for the CIOs, data scientists and architects, governments, and enterprises driving the development of the digital universe, especially in Western Europe, where consumers are very sensitive to information security and privacy issues. IDC analysis of the information in the region's portion of the digital universe by category of information indicates that 46% of it might need information security at some level (much of the rest is the transient data mentioned earlier). At the same time we estimate that less than 60% of that needing protection actually has those protections (see Figure 3). 3
  • 4. As the years go on, the challenge is clear: to increase information security and privacy protection fast enough and competently enough to keep up with that tenfold growth of the Western Europe digital universe. Opportunity for Big Data One of the ironies of the digital universe is that as soon as information is created or captured and enters the digital cosmos, much of it is lost. If a lot of it is not stored (see above), even more is not tracked or analyzed. Of course, not all of it would be of value if it were tracked, but certainly some of it would be. IDC estimates that in 2012, 28% of the region's share of the digital universe would be valuable were it tagged and analyzed. We also estimate that less than half a percent ever is analyzed. By 2020, we expect the percentage of the region's share of the digital universe that would be useful if tagged and analyzed will be much bigger, 45% (see Figure 4). That's 15-fold growth of useful information, which should be an inspiration for the adoption of Big Data technologies and practices. However, in Western Europe specifically, the potential to track and analyze data needs to be balanced with the respect for information security and privacy regulations and concerns. 4 ©2013 IDC
  • 5. Impact of Cloud Computing As the region's digital universe doubles every two and a half years — compared to the growth of IT professionals in single digits a year — the complexity of managing, securing, storing, and extracting value from it increases considerably. Dealing with this complexity implies a new economy of scale revolving around specialties — an incentive for cloud computing. Although cloud computing is in its early days, it is already having an impact on the digital universe. IDC estimates that in 2012, of the region's share of the digital universe 17% was in some way "touched" by the cloud — stored, transmitted, or processed. By 2020 that percentage could be as high as 42% (see Figure 5). 5
  • 6. Call to Action In just five years, the Western Europe share of the digital universe will be about the same size as the entire digital universe in 2012. Its share of the digital universe will be many times more valuable than today, but also many times more volatile. Many times more bytes will need information security, many more systems will need real-time responses, and many more demands for reliability and speedy access will be made of the IT managers, CIOs, data scientists, and chief security officers that manage the actual digital universe. Technology will evolve — algorithms for automatically creating metadata for unstructured data, Big Data software that enables analysis of large, diverse data sets, optimization software for real- time systems, and, of course, information management, data deduplication, and cyber security tools. But the right technology tools will be necessary but not sufficient for the taming of the region's digital universe. It will take new management practices, user education, and savvy policies. This is the area where the technologists must rely on support from business units, government, and consumers, and it is likely an area with bigger challenges than the technological realm. No country, no region, no company can halt the expansion of the digital universe. One can only prepare as best as possible. 6 ©2013 IDC
  • 7. A B O U T T H I S P U B L I C A T I O N This publication was produced by IDC Go-to-Market Services. The opinion, analysis, and research results presented herein are drawn from more detailed research and analysis independently conducted and published by IDC, unless specific vendor sponsorship is noted. IDC Go-to-Market Services makes IDC content available in a wide range of formats for distribution by various companies. A license to distribute IDC content does not imply endorsement of or opinion about the licensee. C O P Y R I G H T A N D R E S T R I C T I O N S Any IDC information or reference to IDC that is to be used in advertising, press releases, or promotional materials requires prior written approval from IDC. For permission requests contact the GMS information line at 508-988-7610 or gms@idc.com. Translation and/or localization of this document requires an additional license from IDC. For more information on IDC visit www.idc.com. For more information on IDC GMS visit www.idc.com/gms. Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com 7