What Size Is The Box We Carry Big Data In?

What Size Is The Box We Carry Big Data In?

In the world of Off Road Driving we can tell how a driver achieves his goal by looking at the size of his vehicle. A rig based on the military HMMV (Hummer) or a Ford F-350 pick-up will be huge, and will carry its driver over the course, no matter the obstacles, using sheer power. If an old flat-fender jeep is the base vehicle it will be much smaller and lighter, what it lacks in raw horse power and speed it makes up in finesse and nimbleness.

Many still consider IBM’s model 5150 from 1981 to be the architectural standard for all desktop computers. Like the TARDIS space ship on BBC’s Dr. Who, “IBM Compatible” desktops have gotten “Bigger on the Inside” while remaining more or less same sized box.

The Big and The Small

This is simply an expression Moore’s Law that computer capabilities essentially double every two years. Moore’s Law was really brought home when I saw a picture comparing an old Kaypro II computer to the latest Samsung smartphone handset. The Kaypro weighed 100 times as much as the cell phone, and occupied 500 times the space. The 80’s computer had a screen that was not much bigger than the phone. With its quad core processor and expandable memory, the phone has competitive spec with a modern laptop.

The computer industry shifting focus from the PC scale computer to large, Internet based computing. This has given rise to the Warehouse Sized Computer (WSC). The modern Internet is based on the connectivity of servers around the world. The enormous amount of data that this entails has led to the growth of huge, climate controlled server farms or Enterprise Data Centers.

One Data Center To Rule Them All…

The accepted model for an EDC is that the storage space is leased to individual companies and clients, such as Web-hosting services, who further market their space to website owners and cloud-computing clients. With the growth of Big Data it is conceivable that an individual company could find itself in need of an entire data center to store and process their information.

This is somewhat reminiscent of the old science fiction stories about the scientist who built a huge computer to answer the meaning of life, and the result was the computer designing an even bigger computer. As individuals, it is hard to comprehend the need for that much computing power, but it is easy to see how quickly our own collection of videos, eBooks, music and photos can clog the hard drive on our personal computers.

By Peter Knight

Sorry, comments are closed for this post.

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Three Challenges of Network Deployment in Hyperconverged Infrastructure for Private Cloud

Hyperconverged Infrastructure In this article, we’ll explore three challenges that are associated with network deployment in a hyperconverged private cloud environment, and then we’ll consider several methods to overcome those challenges. The Main Challenge: Bring Your Own (Physical) Network Some of the main challenges of deploying a hyperconverged infrastructure software solution in a data center are the diverse physical…

The Fully Aware, Hybrid-Cloud Approach

The Fully Aware, Hybrid-Cloud Approach

Hybrid-Cloud Approach For over 20 years, organizations have been attempting to secure their networks and protect their data. However, have any of their efforts really improved security? Today we hear journalists and industry experts talk about the erosion of the perimeter. Some say it’s squishy, others say it’s spongy, and yet another claims it crunchy.…

5 Things To Consider About Your Next Enterprise Sharing Solution

5 Things To Consider About Your Next Enterprise Sharing Solution

Enterprise File Sharing Solution Businesses have varying file sharing needs. Large, multi-regional businesses need to synchronize folders across a large number of sites, whereas small businesses may only need to support a handful of users in a single site. Construction or advertising firms require sharing and collaboration with very large (several Gigabytes) files. Financial services…

Cloud-Based or On-Premise ERP Deployment? Find Out

Cloud-Based or On-Premise ERP Deployment? Find Out

ERP Deployment You know how ERP deployment can improve processes within your supply chain, and the things to keep in mind when implementing an ERP system. But do you know if cloud-based or on-premise ERP deployment is better for your company or industry? While cloud computing is becoming more and more popular, it is worth…

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Picking Up – Legacy Security Losing Ground

Cloud Native Trends Once upon a time, only a select few companies like Google and Salesforce possessed the knowledge and expertise to operate efficient cloud infrastructure and applications. Organizations patronizing those companies benefitted with apps that offered new benefits in flexibility, scalability and cost effectiveness. These days, the sharp division between cloud and on-premises infrastructure…

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

The Cloud Is Not Enough! Why Businesses Need Hybrid Solutions

Why Businesses Need Hybrid Solutions Running a cloud server is no longer the novel trend it once was. Now, the cloud is a necessary data tier that allows employees to access vital company data and maintain productivity from anywhere in the world. But it isn’t a perfect system — security and performance issues can quickly…

Protecting Devices From Data Breach: Identity of Things (IDoT)

Protecting Devices From Data Breach: Identity of Things (IDoT)

How to Identify and Authenticate in the Expanding IoT Ecosystem It is a necessity to protect IoT devices and their associated data. As the IoT ecosystem continues to expand, the need to create an identity to newly-connected things is becoming increasingly crucial. These ‘things’ can include anything from basic sensors and gateways to industrial controls…

How To Overcome Data Insecurity In The Cloud

How To Overcome Data Insecurity In The Cloud

Data Insecurity In The Cloud Today’s escalating attacks, vulnerabilities, breaches, and losses have cut deeply across organizations and captured the attention of, regulators, investors and most importantly customers. In many cases such incidents have completely eroded customer trust in a company, its services and its employees. The challenge of ensuring data security is far more…