What Size Is The Box We Carry Big Data In?

What Size Is The Box We Carry Big Data In?

In the world of Off Road Driving we can tell how a driver achieves his goal by looking at the size of his vehicle. A rig based on the military HMMV (Hummer) or a Ford F-350 pick-up will be huge, and will carry its driver over the course, no matter the obstacles, using sheer power. If an old flat-fender jeep is the base vehicle it will be much smaller and lighter, what it lacks in raw horse power and speed it makes up in finesse and nimbleness.

Many still consider IBM’s model 5150 from 1981 to be the architectural standard for all desktop computers. Like the TARDIS space ship on BBC’s Dr. Who, “IBM Compatible” desktops have gotten “Bigger on the Inside” while remaining more or less same sized box.

The Big and The Small

This is simply an expression Moore’s Law that computer capabilities essentially double every two years. Moore’s Law was really brought home when I saw a picture comparing an old Kaypro II computer to the latest Samsung smartphone handset. The Kaypro weighed 100 times as much as the cell phone, and occupied 500 times the space. The 80’s computer had a screen that was not much bigger than the phone. With its quad core processor and expandable memory, the phone has competitive spec with a modern laptop.

The computer industry shifting focus from the PC scale computer to large, Internet based computing. This has given rise to the Warehouse Sized Computer (WSC). The modern Internet is based on the connectivity of servers around the world. The enormous amount of data that this entails has led to the growth of huge, climate controlled server farms or Enterprise Data Centers.

One Data Center To Rule Them All…

The accepted model for an EDC is that the storage space is leased to individual companies and clients, such as Web-hosting services, who further market their space to website owners and cloud-computing clients. With the growth of Big Data it is conceivable that an individual company could find itself in need of an entire data center to store and process their information.

This is somewhat reminiscent of the old science fiction stories about the scientist who built a huge computer to answer the meaning of life, and the result was the computer designing an even bigger computer. As individuals, it is hard to comprehend the need for that much computing power, but it is easy to see how quickly our own collection of videos, eBooks, music and photos can clog the hard drive on our personal computers.

By Peter Knight

Sorry, comments are closed for this post.

The Fundamentals of Predictive Analysis

The Fundamentals of Predictive Analysis

Predictive Analysis  Article sponsored by SAS Software and Big Data Forum Analytics is playing an increasingly important role in our lives thanks in large part to internet of things (IoT) developments and a greater appreciation of Big Data. With solutions that range across business productivity, health care, individual and national security, new insights are regularly…

Clouding Around With The Unicorns

Clouding Around With The Unicorns

The Social Unicorn Early investors and technology consumers alike love the poignantly named “Unicorn” companies, or private startups that reach the $1 billion valuation. The most recent unicorn spotting is social media game-changer Snapchat, which was recently valued at $16 billion. According to a recent infographic from Alexa discovered via Adweek, Snapchat also proves to…

Achieving Network Security In The IoT

Achieving Network Security In The IoT

Security In The IoT The network security market is experiencing a pressing and transformative change, especially around access control and orchestration. Although it has been mature for decades, the network security market had to transform rapidly with the advent of the BYOD trend and emergence of the cloud, which swept enterprises a few years ago.…

Increasing Efficiency and Reducing Cost with Managed Printing Services

Increasing Efficiency and Reducing Cost with Managed Printing Services

Managed Printing Services This is a sponsored post written on behalf of HP MPS.  Today’s business leaders recognize the value of shared services, significantly providing a wide range of enterprises with the sophisticated tools they need to compete with big business, while additionally driving costs down. But an area often overlooked in our tech-savvy world…

Curing Cancer With Big Data

Curing Cancer With Big Data

Cancer & Big Data The fight against cancer has been going on for centuries. Many leaders have tried and failed to bring about change to cancer treatment. Richard Nixon famously declared a War on Cancer with the National Cancer Act of 1971, and while the Nixon administration certainly increased research funding, they ultimately fell short…

Disaster Recovery And The Cloud

Disaster Recovery And The Cloud

Disaster Recovery And The Cloud One of the least considered benefits of cloud computing in the average small or mid-sized business manager’s mind is the aspect of disaster recovery. Part of the reason for this is that so few small and mid-size businesses have ever contemplated the impact of a major disaster on their IT…

Big Data and Financial Services – Security Threat or Massive Opportunity?

Big Data and Financial Services – Security Threat or Massive Opportunity?

Big Data and Financial Services Cloud Banking Insights Series focuses on big data in the financial services industry and whether it is a security threat or actually a massive opportunity. How does big data fit into an overall cloud strategy? Most FI’s have a positive mind-set towards cloud IT consumption as it not only enables…

4 Industries Being Transformed By The Internet of Things

4 Industries Being Transformed By The Internet of Things

Compelling IoT Industries Every year, more and more media organizations race to predict the trends that will come to shape the online landscape over the next twelve months. Many of these are wild and outlandish and should be consumed with a pinch of salt, yet others stand out for their sober and well-researched judgements. Online…

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

How Data Science And Machine Learning Is Enabling Cloud Threat Protection

Data Science and Machine Learning Security breaches have been consistently rising in the past few years. Just In 2015, companies detected 38 percent more security breaches than in the previous year, according to PwC’s Global State of Information Security Survey 2016. Those breaches are a major expense — an average of $3.79 million per company,…

Why Cloud Compliance Doesn’t Need To Be So Overly Complicated

Why Cloud Compliance Doesn’t Need To Be So Overly Complicated

Cloud Compliance  Regulatory compliance is an issue that has not only weighed heavily on the minds of executives, security and audit teams, but also today, even end users. Public cloud adds more complexity when varying degrees of infrastructure (depending on the cloud model) and data fall out of the hands of the company and into…

6 Tech Predictions To Have A Major Impact In 2016

6 Tech Predictions To Have A Major Impact In 2016

6 Tech Predictions To Have A Major Impact The technology industry moves at a relentless pace, making it both exhilarating and unforgiving. For those at the forefront of innovation it is an incredibly exciting place to be, but what trends are we likely to see coming to the fore in 2016? Below are six predictions…

The Global Rise of Cloud Computing

The Global Rise of Cloud Computing

The Global Rise of Cloud Computing Despite the rapid growth of cloud computing, the cloud still commands a small portion of overall enterprise IT spending. Estimates I’ve seen put the percentage between 5% and 10% of the slightly more than $2 trillion (not including telco) spent worldwide in 2014 on enterprise IT. Yet growth projections…