Browse Definitions :
Definition

Zettabyte Era

The Zettabyte Era is a label coined by Cisco Systems to describe the digital landscape of the 21st century. Depending upon the writer's perspective, the Zettabyte Era is said to have begun either in 2012, when the amount of digital data globally surpassed the zettabyte mark, or in 2016, when the totality of global IP traffic surpassed that figure.

A zettabyte is a digital measurement unit: 2 to the 70th power bytes. It’s about a thousand exabytes or a billion terabytes. In analog terms, this is the equivalent to all the information in all the academic libraries in the United States -- times 500,000.

The Zettabyte Era and the years leading up to it are characterized as times of unforeseen growth in data. As former Google CEO Eric Schmidt explained, from the dawn of human history until the year 2003, humans created about 5 exabytes of information: 0.5% of a zettabyte. Within ten years of that date, 5 exabytes of data were being created every two days, and the rate of increase continues to grow.

According to the World Economic Forum, the digital landscape will reach 44 zettabytes before the end of 2020. The difficulty -- or impossibility -- of dealing with the exponential growth of digital data is sometimes referred to as the zettabyte apocalypse. 

Watch Mohammad Shokoohi's presentation on how big data and IoT are driving the Zettabyte Era.

This was last updated in January 2020

Next Steps

Managing Data Growth in the Zettabyte Era

Continue Reading About Zettabyte Era

SearchCompliance
  • compliance risk

    Compliance risk is an organization's potential exposure to legal penalties, financial forfeiture and material loss, resulting ...

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

SearchSecurity
  • Extensible Authentication Protocol (EAP)

    The Extensible Authentication Protocol (EAP) is a protocol for wireless networks that expands the authentication methods used by ...

  • session key

    A session key is an encryption and decryption key that is randomly generated to ensure the security of a communications session ...

  • data breach

    A data breach is a cyber attack in which sensitive, confidential or otherwise protected data has been accessed and/or disclosed ...

SearchHealthIT
SearchDisasterRecovery
  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage
  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close