SlideShare a Scribd company logo
1 of 7
I D C            C O U N T R Y                          B R I E F

T H E D I G I T AL U N I V E R S E I N 2 0 2 0 : B i g D a t a ,
Bigger Digital Shadows, and Biggest Growth in
the Far East — China
February 2013
By John Gantz, David Reinsel, and Richard Lee
Sponsored by EMC Corporation

Content for this paper is adapted from IDC's Digital Universe Study, December 2012, sponsored by
EMC. Additional content for the study can be viewed at http://www.emc.com/leadership/digital-
universe/iview/index.htm

China Profile
Digital Universe in China to Grow 24-Fold Between 2012 and 2020

The digital universe in China, or the digital bits captured or created each year in the country, is
expected to grow from 364 exabytes to 8.6 zettabytes between 2012 and 2020, or nearly 50% a year,
which means it will more than double every two years (see Figure 1).

China’s share of the global digital universe will grow from 13% to 21% between 2012 and 2020. By
2020, its digital universe, if printed out as text, would make a stack of books reaching from Earth to
Pluto and back 30 times.
What’s driving this growth?

   Continued growth of Internet usage, social networks, and smartphones among consumers

   Falling costs of the technology devices that create, capture, manage, protect, and store
    information

   Migration from analog TV to digital TV

   Growth of machine-to-machine communication, including security images

   Growth of information about information

For instance, China now has roughly as many PCs as the United States, or 20% of the global
installed base, and twice as many Internet users. In 2012, it surpassed the United States in
smartphone shipments and installed base. In two years, the number of smartphones in China will be
higher than the number of people in the United States. China also has more TVs than the United
States, with 25% of households with TVs now using digital sets. And the country has also
aggressively launched initiatives to install security cameras for law enforcement, critical infrastructure,
and retail outlets.

In addition, because of China's population and far-flung infrastructure, China’s share of digital output
from embedded systems (excluding security cameras) will jump from 20% of world output in 2012 to
40% in 2020. According to IDC, from 2011 to 2015, State Grid’s overall investment in smart grids will
surpass 1.5 trillion RMB ($232 billion)(State Grid is China's largest grid operator).

It’s also worth noting that China’s digital universe is growing faster than available storage. This is a
function of an increasing amount of transient data — from phone call routing signals and digital TV
signals watched but not stored to signals coming from the Large Hadron Collider at CERN that are
discarded within microseconds. The issue with storage in the digital universe is less how to store all
the bits than about how to store what must be stored intelligently, economically, and securely.

The Consumer Influence
When we first started studying the digital universe, the origin of a majority of the bits within it was
mature markets: In 2005, the United States and Western Europe accounted for 49% of the digital
universe. But as Moore’s law has made digital technology — computers, smartphones, cameras,
TVs, movies, industrial equipment — cheaper, the technology has become affordable for more and
more people around the world. Over time, the distribution of the bits within the digital universe by
country of origin will more closely mirror the distribution of the population. By 2020, the United States
and Western Europe will generate only 30% of the bits in the digital universe.

However, in China, the contribution of individuals, as consumers or workers, creates a paradox.
Individuals accounted for 50% of the regional digital universe in 2012, and enterprises created 50%
(see Figure 2). Nevertheless, enterprises had responsibility or liability for 81%. As a byte travels from
one consumer camera phone to another, at some point in its life, it passes through an enterprise-
owned network that must keep it secure and protect the privacy of the sender and the receiver. The
same thing is true for almost all bytes in the digital universe.




                                                     2                                           ©2013 IDC
This responsibility for information security and privacy protection for so much of the digital universe is
one of the key challenges for the CIOs, data scientists and architects, governments, and enterprises
driving the development of the digital universe.

IDC analysis of the information in China’s portion of the digital universe by category of information
indicates that 55% of the data might need security at some level (much of the rest of the data is the
transient data mentioned previously). At the same time, we estimate that less than half of that data
needing protection actually is protected (see Figure 3).




                                                    3
Opportunity for Big Data
One of the ironies of the digital universe is that as soon as information is created or captured and
enters the digital cosmos, much of it is lost. If a lot of that information is not stored (refer back to
Figure 1), even more is not tracked or analyzed. Of course, not all of the information would be of
value if it were tracked, but certainly some of it would be.

IDC estimates that in 2012, 33% of the information in China’s digital universe would be valuable were
it tagged and analyzed. We also estimate that less than half a percent is analyzed. We expect the
percentage of information in the region’s digital universe that would be useful if tagged and analyzed
will be a little bigger (35%) by 2020 (see Figure 4).

That’s a 25-fold growth of useful information, which should be an inspiration for the adoption of Big
Data technologies and practices.




                                                      4                                            ©2013 IDC
Impact of Cloud Computing
The number of IT professionals in China is only growing in single digits each year, yet China’s digital
universe is growing more than 100% every two years and the complexity of managing, securing,
storing, and extracting value from it continues to increase considerably. Dealing with this complexity
implies a new economy of scale revolving around specialties — an incentive for cloud computing.

Although cloud computing is in its early days, it is already having an impact on the digital universe.
IDC estimates that in 2012, 21% of China's digital universe was in some way "touched" by the cloud
— stored, transmitted, or processed. By 2020, that percentage could be as high as 39% (see Figure
5).




                                                   5
Call to Action
In just five years, China’s share of the digital universe will be bigger than the entire digital universe in
2012. China's share of the digital universe will be many times more valuable than it is today — and
many times more volatile. An exponentially larger number of bytes will need information security,
many more systems will need real-time responses, and many more demands for reliability and
speedy access will be made of the IT managers, CIOs, data scientists, and chief security officers that
manage the actual digital universe.

Technology will evolve — algorithms for automatically creating metadata for unstructured data; Big
Data software that enables analysis of large, diverse data sets; optimization software for real-time
systems; and, of course, information management, data deduplication, and cybersecurity tools.
However, the right technology tools will be necessary but not sufficient for the taming of China’s
digital universe. It will take new management practices, user education, and savvy policies. This is
where technologists must rely on support from business units, government, and consumers, and it is
likely an area with bigger challenges than the technological realm.

No country, no region, no company can halt the expansion of the digital universe. One can only
prepare as best as possible.




                                                     6                                             ©2013 IDC
A B O U T    T H I S   P U B L I C A T I O N

This publication was produced by IDC Go-to-Market Services. The opinion, analysis, and research results presented herein
are drawn from more detailed research and analysis independently conducted and published by IDC, unless specific vendor
sponsorship is noted. IDC Go-to-Market Services makes IDC content available in a wide range of formats for distribution by
various companies. A license to distribute IDC content does not imply endorsement of or opinion about the licensee.

C O P Y R I G H T      A N D   R E S T R I C T I O N S

Any IDC information or reference to IDC that is to be used in advertising, press releases, or promotional materials requires
prior written approval from IDC. For permission requests contact the GMS information line at 508-988-7610 or gms@idc.com.
Translation and/or localization of this document requires an additional license from IDC.

For more information on IDC visit www.idc.com. For more information on IDC GMS visit www.idc.com/gms.

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com




                                                              7

More Related Content

What's hot

Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityBooz Allen Hamilton
 
5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public SectorSeqrite
 
Dealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyDealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyCSCJournals
 
Data Protection & Privacy During the Coronavirus Pandemic
Data Protection & Privacy During the Coronavirus PandemicData Protection & Privacy During the Coronavirus Pandemic
Data Protection & Privacy During the Coronavirus PandemicUlf Mattsson
 
Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustrySeqrite
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco Security
 
Cybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
Cybersecurity Challenges in Retail 2020: How to Prevent Retail TheftCybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
Cybersecurity Challenges in Retail 2020: How to Prevent Retail TheftIntellias
 
Data security for healthcare industry
Data security for healthcare industryData security for healthcare industry
Data security for healthcare industrySeqrite
 
How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...Ulf Mattsson
 
Emerging application and data protection for cloud
Emerging application and data protection for cloudEmerging application and data protection for cloud
Emerging application and data protection for cloudUlf Mattsson
 
Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1newbie2019
 
ThreatMetrix Profile in March 2014 CIO Review
ThreatMetrix Profile in March 2014 CIO ReviewThreatMetrix Profile in March 2014 CIO Review
ThreatMetrix Profile in March 2014 CIO ReviewThreatMetrix
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudKumar Goud
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForcePatrick Bouillaud
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Erik Ginalick
 
Securing mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentSecuring mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentK Singh
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseReadWrite
 
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaEvolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaAnjoum .
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudITDogadjaji.com
 

What's hot (19)

Cybersecurity in the Age of Mobility
Cybersecurity in the Age of MobilityCybersecurity in the Age of Mobility
Cybersecurity in the Age of Mobility
 
5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector5 Cybersecurity threats in Public Sector
5 Cybersecurity threats in Public Sector
 
Dealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In TechnologyDealing with Data Breaches Amidst Changes In Technology
Dealing with Data Breaches Amidst Changes In Technology
 
Data Protection & Privacy During the Coronavirus Pandemic
Data Protection & Privacy During the Coronavirus PandemicData Protection & Privacy During the Coronavirus Pandemic
Data Protection & Privacy During the Coronavirus Pandemic
 
Top 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail IndustryTop 5 Cybersecurity Threats in Retail Industry
Top 5 Cybersecurity Threats in Retail Industry
 
Cisco 2014 Midyear Security Report
Cisco 2014 Midyear Security ReportCisco 2014 Midyear Security Report
Cisco 2014 Midyear Security Report
 
Cybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
Cybersecurity Challenges in Retail 2020: How to Prevent Retail TheftCybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
Cybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
 
Data security for healthcare industry
Data security for healthcare industryData security for healthcare industry
Data security for healthcare industry
 
How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...How to protect privacy sensitive data that is collected to control the corona...
How to protect privacy sensitive data that is collected to control the corona...
 
Emerging application and data protection for cloud
Emerging application and data protection for cloudEmerging application and data protection for cloud
Emerging application and data protection for cloud
 
Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1Fundamentals of information systems security ( pdf drive ) chapter 1
Fundamentals of information systems security ( pdf drive ) chapter 1
 
ThreatMetrix Profile in March 2014 CIO Review
ThreatMetrix Profile in March 2014 CIO ReviewThreatMetrix Profile in March 2014 CIO Review
ThreatMetrix Profile in March 2014 CIO Review
 
MIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the CloudMIST Effective Masquerade Attack Detection in the Cloud
MIST Effective Masquerade Attack Detection in the Cloud
 
Securité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-ForceSecurité : Le rapport 2Q de la X-Force
Securité : Le rapport 2Q de la X-Force
 
Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112Five Network Security Threats And How To Protect Your Business Wp101112
Five Network Security Threats And How To Protect Your Business Wp101112
 
Securing mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environmentSecuring mobile devices_in_the_business_environment
Securing mobile devices_in_the_business_environment
 
The Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's EnterpriseThe Essential Ingredient for Today's Enterprise
The Essential Ingredient for Today's Enterprise
 
Evolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wanderaEvolutionand impactofhiddenmobilethreats wandera
Evolutionand impactofhiddenmobilethreats wandera
 
Security in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and CloudSecurity in Web 2.0, Social Web and Cloud
Security in Web 2.0, Social Web and Cloud
 

Viewers also liked

Ecological Agriculture Week 4 Presentation (Int'l Masters Program in Agriculture
Ecological Agriculture Week 4 Presentation (Int'l Masters Program in AgricultureEcological Agriculture Week 4 Presentation (Int'l Masters Program in Agriculture
Ecological Agriculture Week 4 Presentation (Int'l Masters Program in AgricultureAndaya Hampastuan
 
Practice pp fs and travistan
Practice pp fs and travistanPractice pp fs and travistan
Practice pp fs and travistanTravis Klein
 
ամանորյա քառյակներ
ամանորյա քառյակներամանորյա քառյակներ
ամանորյա քառյակներtatevabrahamyan
 
Weapons for peace
Weapons for peaceWeapons for peace
Weapons for peacevicolombia
 
Fri greek contributions
Fri greek contributionsFri greek contributions
Fri greek contributionsTravis Klein
 
Insaat kursu-gaziantep
Insaat kursu-gaziantepInsaat kursu-gaziantep
Insaat kursu-gaziantepsersld54
 
บทที่ 4
บทที่ 4บทที่ 4
บทที่ 4einscream
 
The paradox of our times
The paradox of our timesThe paradox of our times
The paradox of our timesChandan Dubey
 
Individual rights specification
Individual rights specificationIndividual rights specification
Individual rights specificationbutcher665
 
HRMAC_2015-05_Labor_Crystal_Ball
HRMAC_2015-05_Labor_Crystal_BallHRMAC_2015-05_Labor_Crystal_Ball
HRMAC_2015-05_Labor_Crystal_BallEric Sanders
 
BWL studieren an der HAM in Erding und Berlin
BWL studieren an der HAM in Erding und BerlinBWL studieren an der HAM in Erding und Berlin
BWL studieren an der HAM in Erding und Berlinbwl-studieren
 
Under what circumstances do motivated
Under what circumstances do motivatedUnder what circumstances do motivated
Under what circumstances do motivatedDaleCarnegieIndia1
 
Pivotal CF on Vblock Systems
Pivotal CF on Vblock  Systems Pivotal CF on Vblock  Systems
Pivotal CF on Vblock Systems EMC
 

Viewers also liked (20)

Ecological Agriculture Week 4 Presentation (Int'l Masters Program in Agriculture
Ecological Agriculture Week 4 Presentation (Int'l Masters Program in AgricultureEcological Agriculture Week 4 Presentation (Int'l Masters Program in Agriculture
Ecological Agriculture Week 4 Presentation (Int'l Masters Program in Agriculture
 
Practice pp fs and travistan
Practice pp fs and travistanPractice pp fs and travistan
Practice pp fs and travistan
 
TOshiba Tec
TOshiba TecTOshiba Tec
TOshiba Tec
 
ամանորյա քառյակներ
ամանորյա քառյակներամանորյա քառյակներ
ամանորյա քառյակներ
 
Weapons for peace
Weapons for peaceWeapons for peace
Weapons for peace
 
The human brain_1
The human brain_1The human brain_1
The human brain_1
 
Fri greek contributions
Fri greek contributionsFri greek contributions
Fri greek contributions
 
Tues silk road
Tues silk roadTues silk road
Tues silk road
 
Hotel1
Hotel1Hotel1
Hotel1
 
Insaat kursu-gaziantep
Insaat kursu-gaziantepInsaat kursu-gaziantep
Insaat kursu-gaziantep
 
บทที่ 4
บทที่ 4บทที่ 4
บทที่ 4
 
20120726 hakuhodo
20120726 hakuhodo20120726 hakuhodo
20120726 hakuhodo
 
The paradox of our times
The paradox of our timesThe paradox of our times
The paradox of our times
 
Individual rights specification
Individual rights specificationIndividual rights specification
Individual rights specification
 
Laurette-s-Resume-Sept-9-13--1-.doc
Laurette-s-Resume-Sept-9-13--1-.docLaurette-s-Resume-Sept-9-13--1-.doc
Laurette-s-Resume-Sept-9-13--1-.doc
 
HRMAC_2015-05_Labor_Crystal_Ball
HRMAC_2015-05_Labor_Crystal_BallHRMAC_2015-05_Labor_Crystal_Ball
HRMAC_2015-05_Labor_Crystal_Ball
 
BWL studieren an der HAM in Erding und Berlin
BWL studieren an der HAM in Erding und BerlinBWL studieren an der HAM in Erding und Berlin
BWL studieren an der HAM in Erding und Berlin
 
Integrante
IntegranteIntegrante
Integrante
 
Under what circumstances do motivated
Under what circumstances do motivatedUnder what circumstances do motivated
Under what circumstances do motivated
 
Pivotal CF on Vblock Systems
Pivotal CF on Vblock  Systems Pivotal CF on Vblock  Systems
Pivotal CF on Vblock Systems
 

Similar to Analyst Report: The Digital Universe in 2020 - China

The Digital Universe in 2020 - United States
The Digital Universe in 2020 - United StatesThe Digital Universe in 2020 - United States
The Digital Universe in 2020 - United StatesEMC
 
The Digital Universe in 2020 - India
The Digital Universe in 2020 - IndiaThe Digital Universe in 2020 - India
The Digital Universe in 2020 - IndiaEMC
 
Digital universe 2020
Digital universe 2020Digital universe 2020
Digital universe 2020Accenture
 
Idc the digital universe in 2020
Idc the digital universe in 2020Idc the digital universe in 2020
Idc the digital universe in 2020Jyrki Määttä
 
The Digital Universe in 2020
The Digital Universe in 2020The Digital Universe in 2020
The Digital Universe in 2020arms8586
 
201404 White Paper Digital Universe 2014
201404 White Paper Digital Universe 2014201404 White Paper Digital Universe 2014
201404 White Paper Digital Universe 2014Francisco Calzado
 
Digital India: Use of Technology For Transforming Society
Digital India: Use of Technology For Transforming SocietyDigital India: Use of Technology For Transforming Society
Digital India: Use of Technology For Transforming SocietyDr. Sunil Kr. Pandey
 
Predictions on Connected Devices by IDC
Predictions on Connected Devices by IDCPredictions on Connected Devices by IDC
Predictions on Connected Devices by IDCSumit Roy
 
IDC Report Extracting-Value-from-Chaos
IDC Report Extracting-Value-from-ChaosIDC Report Extracting-Value-from-Chaos
IDC Report Extracting-Value-from-ChaosLarry Levine
 
IT Infrastructure on the Verge of Technological Singularity
IT Infrastructure on the Verge of Technological SingularityIT Infrastructure on the Verge of Technological Singularity
IT Infrastructure on the Verge of Technological SingularityMiraworks.io
 
Institute of Directors Future of Technology Report
Institute of Directors Future of Technology ReportInstitute of Directors Future of Technology Report
Institute of Directors Future of Technology ReportEd Dodds
 
Attaining IoT Value: How To Move from Connecting Things to Capturing Insights
Attaining IoT Value: How To Move from Connecting Things to Capturing InsightsAttaining IoT Value: How To Move from Connecting Things to Capturing Insights
Attaining IoT Value: How To Move from Connecting Things to Capturing InsightsSustainable Brands
 
Governança de TI em um mundo cada vez mais hiperconectado
Governança de TI em um mundo cada vez mais hiperconectadoGovernança de TI em um mundo cada vez mais hiperconectado
Governança de TI em um mundo cada vez mais hiperconectadoCezar Taurion
 
Digital Transformation & Cloud Profitability
Digital Transformation & Cloud ProfitabilityDigital Transformation & Cloud Profitability
Digital Transformation & Cloud ProfitabilityGui Carvalhal
 
Software Market Trends 2012 2.0
Software Market Trends 2012 2.0Software Market Trends 2012 2.0
Software Market Trends 2012 2.0allaboutsyed
 
Top 6 New Technology Trends For 2022.docx
Top 6 New Technology Trends For 2022.docxTop 6 New Technology Trends For 2022.docx
Top 6 New Technology Trends For 2022.docxSameerShaik43
 
Open Data Economy.pdf
Open Data Economy.pdfOpen Data Economy.pdf
Open Data Economy.pdfODE Infinity
 
Process oriented architecture for digital transformation 2015
Process oriented architecture for digital transformation   2015Process oriented architecture for digital transformation   2015
Process oriented architecture for digital transformation 2015Vinay Mummigatti
 
New Opportunities for Technology-Driven Business Transformation
New Opportunities for Technology-Driven Business TransformationNew Opportunities for Technology-Driven Business Transformation
New Opportunities for Technology-Driven Business TransformationJoseph M Bradley
 

Similar to Analyst Report: The Digital Universe in 2020 - China (20)

The Digital Universe in 2020 - United States
The Digital Universe in 2020 - United StatesThe Digital Universe in 2020 - United States
The Digital Universe in 2020 - United States
 
The Digital Universe in 2020 - India
The Digital Universe in 2020 - IndiaThe Digital Universe in 2020 - India
The Digital Universe in 2020 - India
 
Digital universe 2020
Digital universe 2020Digital universe 2020
Digital universe 2020
 
Idc the digital universe in 2020
Idc the digital universe in 2020Idc the digital universe in 2020
Idc the digital universe in 2020
 
The Digital Universe in 2020
The Digital Universe in 2020The Digital Universe in 2020
The Digital Universe in 2020
 
201404 White Paper Digital Universe 2014
201404 White Paper Digital Universe 2014201404 White Paper Digital Universe 2014
201404 White Paper Digital Universe 2014
 
Digital India: Use of Technology For Transforming Society
Digital India: Use of Technology For Transforming SocietyDigital India: Use of Technology For Transforming Society
Digital India: Use of Technology For Transforming Society
 
Predictions on Connected Devices by IDC
Predictions on Connected Devices by IDCPredictions on Connected Devices by IDC
Predictions on Connected Devices by IDC
 
TOP 10 IDC Predictions 2012
TOP 10 IDC Predictions 2012TOP 10 IDC Predictions 2012
TOP 10 IDC Predictions 2012
 
IDC Report Extracting-Value-from-Chaos
IDC Report Extracting-Value-from-ChaosIDC Report Extracting-Value-from-Chaos
IDC Report Extracting-Value-from-Chaos
 
IT Infrastructure on the Verge of Technological Singularity
IT Infrastructure on the Verge of Technological SingularityIT Infrastructure on the Verge of Technological Singularity
IT Infrastructure on the Verge of Technological Singularity
 
Institute of Directors Future of Technology Report
Institute of Directors Future of Technology ReportInstitute of Directors Future of Technology Report
Institute of Directors Future of Technology Report
 
Attaining IoT Value: How To Move from Connecting Things to Capturing Insights
Attaining IoT Value: How To Move from Connecting Things to Capturing InsightsAttaining IoT Value: How To Move from Connecting Things to Capturing Insights
Attaining IoT Value: How To Move from Connecting Things to Capturing Insights
 
Governança de TI em um mundo cada vez mais hiperconectado
Governança de TI em um mundo cada vez mais hiperconectadoGovernança de TI em um mundo cada vez mais hiperconectado
Governança de TI em um mundo cada vez mais hiperconectado
 
Digital Transformation & Cloud Profitability
Digital Transformation & Cloud ProfitabilityDigital Transformation & Cloud Profitability
Digital Transformation & Cloud Profitability
 
Software Market Trends 2012 2.0
Software Market Trends 2012 2.0Software Market Trends 2012 2.0
Software Market Trends 2012 2.0
 
Top 6 New Technology Trends For 2022.docx
Top 6 New Technology Trends For 2022.docxTop 6 New Technology Trends For 2022.docx
Top 6 New Technology Trends For 2022.docx
 
Open Data Economy.pdf
Open Data Economy.pdfOpen Data Economy.pdf
Open Data Economy.pdf
 
Process oriented architecture for digital transformation 2015
Process oriented architecture for digital transformation   2015Process oriented architecture for digital transformation   2015
Process oriented architecture for digital transformation 2015
 
New Opportunities for Technology-Driven Business Transformation
New Opportunities for Technology-Driven Business TransformationNew Opportunities for Technology-Driven Business Transformation
New Opportunities for Technology-Driven Business Transformation
 

More from EMC

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDEMC
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote EMC
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOEMC
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremioEMC
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lakeEMC
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereEMC
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History EMC
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewEMC
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeEMC
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic EMC
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityEMC
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeEMC
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015EMC
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesEMC
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsEMC
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookEMC
 

More from EMC (20)

INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUDINDUSTRY-LEADING  TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
 
Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote Cloud Foundry Summit Berlin Keynote
Cloud Foundry Summit Berlin Keynote
 
EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX EMC GLOBAL DATA PROTECTION INDEX
EMC GLOBAL DATA PROTECTION INDEX
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIOTransforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
 
Citrix ready-webinar-xtremio
Citrix ready-webinar-xtremioCitrix ready-webinar-xtremio
Citrix ready-webinar-xtremio
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
 
EMC with Mirantis Openstack
EMC with Mirantis OpenstackEMC with Mirantis Openstack
EMC with Mirantis Openstack
 
Modern infrastructure for business data lake
Modern infrastructure for business data lakeModern infrastructure for business data lake
Modern infrastructure for business data lake
 
Force Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop ElsewhereForce Cyber Criminals to Shop Elsewhere
Force Cyber Criminals to Shop Elsewhere
 
Pivotal : Moments in Container History
Pivotal : Moments in Container History Pivotal : Moments in Container History
Pivotal : Moments in Container History
 
Data Lake Protection - A Technical Review
Data Lake Protection - A Technical ReviewData Lake Protection - A Technical Review
Data Lake Protection - A Technical Review
 
Mobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or FoeMobile E-commerce: Friend or Foe
Mobile E-commerce: Friend or Foe
 
Virtualization Myths Infographic
Virtualization Myths Infographic Virtualization Myths Infographic
Virtualization Myths Infographic
 
Intelligence-Driven GRC for Security
Intelligence-Driven GRC for SecurityIntelligence-Driven GRC for Security
Intelligence-Driven GRC for Security
 
The Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure AgeThe Trust Paradox: Access Management and Trust in an Insecure Age
The Trust Paradox: Access Management and Trust in an Insecure Age
 
EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015EMC Technology Day - SRM University 2015
EMC Technology Day - SRM University 2015
 
EMC Academic Summit 2015
EMC Academic Summit 2015EMC Academic Summit 2015
EMC Academic Summit 2015
 
Data Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education ServicesData Science and Big Data Analytics Book from EMC Education Services
Data Science and Big Data Analytics Book from EMC Education Services
 
Using EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere EnvironmentsUsing EMC Symmetrix Storage in VMware vSphere Environments
Using EMC Symmetrix Storage in VMware vSphere Environments
 
Using EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBookUsing EMC VNX storage with VMware vSphereTechBook
Using EMC VNX storage with VMware vSphereTechBook
 

Recently uploaded

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsJoaquim Jorge
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfsudhanshuwaghmare1
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FMESafe Software
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerThousandEyes
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century educationjfdjdjcjdnsjd
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businesspanagenda
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProduct Anonymous
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherRemote DBA Services
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodJuan lago vázquez
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘RTylerCroy
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...apidays
 

Recently uploaded (20)

Artificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and MythsArtificial Intelligence: Facts and Myths
Artificial Intelligence: Facts and Myths
 
Boost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdfBoost Fertility New Invention Ups Success Rates.pdf
Boost Fertility New Invention Ups Success Rates.pdf
 
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers:  A Deep Dive into Serverless Spatial Data and FMECloud Frontiers:  A Deep Dive into Serverless Spatial Data and FME
Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
 
How to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected WorkerHow to Troubleshoot Apps for the Modern Connected Worker
How to Troubleshoot Apps for the Modern Connected Worker
 
presentation ICT roal in 21st century education
presentation ICT roal in 21st century educationpresentation ICT roal in 21st century education
presentation ICT roal in 21st century education
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law DevelopmentsTrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
TrustArc Webinar - Stay Ahead of US State Data Privacy Law Developments
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Why Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire businessWhy Teams call analytics are critical to your entire business
Why Teams call analytics are critical to your entire business
 
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data DiscoveryTrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
TrustArc Webinar - Unlock the Power of AI-Driven Data Discovery
 
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemkeProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
ProductAnonymous-April2024-WinProductDiscovery-MelissaKlemke
 
Strategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a FresherStrategies for Landing an Oracle DBA Job as a Fresher
Strategies for Landing an Oracle DBA Job as a Fresher
 
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin WoodPolkadot JAM Slides - Token2049 - By Dr. Gavin Wood
Polkadot JAM Slides - Token2049 - By Dr. Gavin Wood
 
🐬 The future of MySQL is Postgres 🐘
🐬  The future of MySQL is Postgres   🐘🐬  The future of MySQL is Postgres   🐘
🐬 The future of MySQL is Postgres 🐘
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...Apidays New York 2024 - The value of a flexible API Management solution for O...
Apidays New York 2024 - The value of a flexible API Management solution for O...
 

Analyst Report: The Digital Universe in 2020 - China

  • 1. I D C C O U N T R Y B R I E F T H E D I G I T AL U N I V E R S E I N 2 0 2 0 : B i g D a t a , Bigger Digital Shadows, and Biggest Growth in the Far East — China February 2013 By John Gantz, David Reinsel, and Richard Lee Sponsored by EMC Corporation Content for this paper is adapted from IDC's Digital Universe Study, December 2012, sponsored by EMC. Additional content for the study can be viewed at http://www.emc.com/leadership/digital- universe/iview/index.htm China Profile Digital Universe in China to Grow 24-Fold Between 2012 and 2020 The digital universe in China, or the digital bits captured or created each year in the country, is expected to grow from 364 exabytes to 8.6 zettabytes between 2012 and 2020, or nearly 50% a year, which means it will more than double every two years (see Figure 1). China’s share of the global digital universe will grow from 13% to 21% between 2012 and 2020. By 2020, its digital universe, if printed out as text, would make a stack of books reaching from Earth to Pluto and back 30 times.
  • 2. What’s driving this growth?  Continued growth of Internet usage, social networks, and smartphones among consumers  Falling costs of the technology devices that create, capture, manage, protect, and store information  Migration from analog TV to digital TV  Growth of machine-to-machine communication, including security images  Growth of information about information For instance, China now has roughly as many PCs as the United States, or 20% of the global installed base, and twice as many Internet users. In 2012, it surpassed the United States in smartphone shipments and installed base. In two years, the number of smartphones in China will be higher than the number of people in the United States. China also has more TVs than the United States, with 25% of households with TVs now using digital sets. And the country has also aggressively launched initiatives to install security cameras for law enforcement, critical infrastructure, and retail outlets. In addition, because of China's population and far-flung infrastructure, China’s share of digital output from embedded systems (excluding security cameras) will jump from 20% of world output in 2012 to 40% in 2020. According to IDC, from 2011 to 2015, State Grid’s overall investment in smart grids will surpass 1.5 trillion RMB ($232 billion)(State Grid is China's largest grid operator). It’s also worth noting that China’s digital universe is growing faster than available storage. This is a function of an increasing amount of transient data — from phone call routing signals and digital TV signals watched but not stored to signals coming from the Large Hadron Collider at CERN that are discarded within microseconds. The issue with storage in the digital universe is less how to store all the bits than about how to store what must be stored intelligently, economically, and securely. The Consumer Influence When we first started studying the digital universe, the origin of a majority of the bits within it was mature markets: In 2005, the United States and Western Europe accounted for 49% of the digital universe. But as Moore’s law has made digital technology — computers, smartphones, cameras, TVs, movies, industrial equipment — cheaper, the technology has become affordable for more and more people around the world. Over time, the distribution of the bits within the digital universe by country of origin will more closely mirror the distribution of the population. By 2020, the United States and Western Europe will generate only 30% of the bits in the digital universe. However, in China, the contribution of individuals, as consumers or workers, creates a paradox. Individuals accounted for 50% of the regional digital universe in 2012, and enterprises created 50% (see Figure 2). Nevertheless, enterprises had responsibility or liability for 81%. As a byte travels from one consumer camera phone to another, at some point in its life, it passes through an enterprise- owned network that must keep it secure and protect the privacy of the sender and the receiver. The same thing is true for almost all bytes in the digital universe. 2 ©2013 IDC
  • 3. This responsibility for information security and privacy protection for so much of the digital universe is one of the key challenges for the CIOs, data scientists and architects, governments, and enterprises driving the development of the digital universe. IDC analysis of the information in China’s portion of the digital universe by category of information indicates that 55% of the data might need security at some level (much of the rest of the data is the transient data mentioned previously). At the same time, we estimate that less than half of that data needing protection actually is protected (see Figure 3). 3
  • 4. Opportunity for Big Data One of the ironies of the digital universe is that as soon as information is created or captured and enters the digital cosmos, much of it is lost. If a lot of that information is not stored (refer back to Figure 1), even more is not tracked or analyzed. Of course, not all of the information would be of value if it were tracked, but certainly some of it would be. IDC estimates that in 2012, 33% of the information in China’s digital universe would be valuable were it tagged and analyzed. We also estimate that less than half a percent is analyzed. We expect the percentage of information in the region’s digital universe that would be useful if tagged and analyzed will be a little bigger (35%) by 2020 (see Figure 4). That’s a 25-fold growth of useful information, which should be an inspiration for the adoption of Big Data technologies and practices. 4 ©2013 IDC
  • 5. Impact of Cloud Computing The number of IT professionals in China is only growing in single digits each year, yet China’s digital universe is growing more than 100% every two years and the complexity of managing, securing, storing, and extracting value from it continues to increase considerably. Dealing with this complexity implies a new economy of scale revolving around specialties — an incentive for cloud computing. Although cloud computing is in its early days, it is already having an impact on the digital universe. IDC estimates that in 2012, 21% of China's digital universe was in some way "touched" by the cloud — stored, transmitted, or processed. By 2020, that percentage could be as high as 39% (see Figure 5). 5
  • 6. Call to Action In just five years, China’s share of the digital universe will be bigger than the entire digital universe in 2012. China's share of the digital universe will be many times more valuable than it is today — and many times more volatile. An exponentially larger number of bytes will need information security, many more systems will need real-time responses, and many more demands for reliability and speedy access will be made of the IT managers, CIOs, data scientists, and chief security officers that manage the actual digital universe. Technology will evolve — algorithms for automatically creating metadata for unstructured data; Big Data software that enables analysis of large, diverse data sets; optimization software for real-time systems; and, of course, information management, data deduplication, and cybersecurity tools. However, the right technology tools will be necessary but not sufficient for the taming of China’s digital universe. It will take new management practices, user education, and savvy policies. This is where technologists must rely on support from business units, government, and consumers, and it is likely an area with bigger challenges than the technological realm. No country, no region, no company can halt the expansion of the digital universe. One can only prepare as best as possible. 6 ©2013 IDC
  • 7. A B O U T T H I S P U B L I C A T I O N This publication was produced by IDC Go-to-Market Services. The opinion, analysis, and research results presented herein are drawn from more detailed research and analysis independently conducted and published by IDC, unless specific vendor sponsorship is noted. IDC Go-to-Market Services makes IDC content available in a wide range of formats for distribution by various companies. A license to distribute IDC content does not imply endorsement of or opinion about the licensee. C O P Y R I G H T A N D R E S T R I C T I O N S Any IDC information or reference to IDC that is to be used in advertising, press releases, or promotional materials requires prior written approval from IDC. For permission requests contact the GMS information line at 508-988-7610 or gms@idc.com. Translation and/or localization of this document requires an additional license from IDC. For more information on IDC visit www.idc.com. For more information on IDC GMS visit www.idc.com/gms. Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com 7