Browse Definitions :
Definition

Zettabyte Era

The Zettabyte Era is a label coined by Cisco Systems to describe the digital landscape of the 21st century. Depending upon the writer's perspective, the Zettabyte Era is said to have begun either in 2012, when the amount of digital data globally surpassed the zettabyte mark, or in 2016, when the totality of global IP traffic surpassed that figure.

A zettabyte is a digital measurement unit: 2 to the 70th power bytes. It’s about a thousand exabytes or a billion terabytes. In analog terms, this is the equivalent to all the information in all the academic libraries in the United States -- times 500,000.

The Zettabyte Era and the years leading up to it are characterized as times of unforeseen growth in data. As former Google CEO Eric Schmidt explained, from the dawn of human history until the year 2003, humans created about 5 exabytes of information: 0.5% of a zettabyte. Within ten years of that date, 5 exabytes of data were being created every two days, and the rate of increase continues to grow.

According to the World Economic Forum, the digital landscape will reach 44 zettabytes before the end of 2020. The difficulty -- or impossibility -- of dealing with the exponential growth of digital data is sometimes referred to as the zettabyte apocalypse. 

Watch Mohammad Shokoohi's presentation on how big data and IoT are driving the Zettabyte Era.

This was last updated in January 2020

Next Steps

Managing Data Growth in the Zettabyte Era

Continue Reading About Zettabyte Era

SearchCompliance

  • information governance

    Information governance is a holistic approach to managing corporate information by implementing processes, roles, controls and ...

  • enterprise document management (EDM)

    Enterprise document management (EDM) is a strategy for overseeing an organization's paper and electronic documents so they can be...

  • risk assessment

    Risk assessment is the identification of hazards that could negatively impact an organization's ability to conduct business.

SearchSecurity

  • spam trap

    A spam trap is an email address that is used to identify and monitor spam email.

  • honeypot (computing)

    A honeypot is a network-attached system set up as a decoy to lure cyber attackers and detect, deflect and study hacking attempts ...

  • cracker

    A cracker is someone who breaks into someone else's computer system, often on a network; bypasses passwords or licenses in ...

SearchHealthIT

SearchDisasterRecovery

  • risk mitigation

    Risk mitigation is a strategy to prepare for and lessen the effects of threats faced by a business.

  • call tree

    A call tree is a layered hierarchical communication model that is used to notify specific individuals of an event and coordinate ...

  • Disaster Recovery as a Service (DRaaS)

    Disaster recovery as a service (DRaaS) is the replication and hosting of physical or virtual servers by a third party to provide ...

SearchStorage

  • cloud storage

    Cloud storage is a service model in which data is transmitted and stored on remote storage systems, where it is maintained, ...

  • cloud testing

    Cloud testing is the process of using the cloud computing resources of a third-party service provider to test software ...

  • storage virtualization

    Storage virtualization is the pooling of physical storage from multiple storage devices into what appears to be a single storage ...

Close