Browse Definitions :
Definition

Zettabyte Era

Contributor(s): Ivy Wigmore

The Zettabyte Era is a label coined by Cisco Systems to describe the digital landscape of the 21st century. Depending upon the writer's perspective, the Zettabyte Era is said to have begun either in 2012, when the amount of digital data globally surpassed the zettabyte mark, or in 2016, when the totality of global IP traffic surpassed that figure.

A zettabyte is a digital measurement unit: 2 to the 70th power bytes. It’s about a thousand exabytes or a billion terabytes. In analog terms, this is the equivalent to all the information in all the academic libraries in the United States -- times 500,000.

The Zettabyte Era and the years leading up to it are characterized as times of unforeseen growth in data. As former Google CEO Eric Schmidt explained, from the dawn of human history until the year 2003, humans created about 5 exabytes of information: 0.5% of a zettabyte. Within ten years of that date, 5 exabytes of data were being created every two days, and the rate of increase continues to grow.

According to the World Economic Forum, the digital landscape will reach 44 zettabytes before the end of 2020. The difficulty -- or impossibility -- of dealing with the exponential growth of digital data is sometimes referred to as the zettabyte apocalypse. 

Watch Mohammad Shokoohi's presentation on how big data and IoT are driving the Zettabyte Era.

This was last updated in January 2020

Continue Reading About Zettabyte Era

Start the conversation

Send me notifications when other members comment.

Please create a username to comment.

SearchCompliance

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

  • PCI DSS (Payment Card Industry Data Security Standard)

    The Payment Card Industry Data Security Standard (PCI DSS) is a widely accepted set of policies and procedures intended to ...

  • risk management

    Risk management is the process of identifying, assessing and controlling threats to an organization's capital and earnings.

SearchSecurity

SearchHealthIT

SearchDisasterRecovery

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

  • cloud disaster recovery (cloud DR)

    Cloud disaster recovery (cloud DR) is a combination of strategies and services intended to back up data, applications and other ...

SearchStorage

  • RAM (Random Access Memory)

    RAM (Random Access Memory) is the hardware in a computing device where the operating system (OS), application programs and data ...

  • business impact analysis (BIA)

    Business impact analysis (BIA) is a systematic process to determine and evaluate the potential effects of an interruption to ...

  • M.2 SSD

    An M.2 SSD is a solid-state drive that is used in internally mounted storage expansion cards of a small form factor.

Close