Dark Reading is part of the Informa Tech Division of Informa PLC

This site is operated by a business or businesses owned by Informa PLC and all copyright resides with them.Informa PLC's registered office is 5 Howick Place, London SW1P 1WG. Registered in England and Wales. Number 8860726.

News

2/15/2008
09:30 PM
Terry Sweeney
Terry Sweeney
Commentary
Connect Directly
Facebook
Twitter
RSS
E-Mail
50%
50%

Safety In Numbers

There's a great movie I hope they still show in math and science classes called something like "Powers of 10." It begins with a shot of an earthbound human, then zooms out 100 feet, then 10,000 feet, racking up the exponents til we're out in Carl Sagan country. It then reverses itself into the subatomic realm. It blew my 10-year old mind, such that when the discussion turns to

There's a great movie I hope they still show in math and science classes called something like "Powers of 10." It begins with a shot of an earthbound human, then zooms out 100 feet, then 10,000 feet, racking up the exponents til we're out in Carl Sagan country. It then reverses itself into the subatomic realm. It blew my 10-year old mind, such that when the discussion turns to how much an exabyte is, I go right back there.Strip away the wonderment for a nanosecond (don't ask how long that is), and what you end up with is job security, at least according to this valentine from EMC issued yesterday.

In it, the vendor claims that the rate of information growth is "exploding," with a sixfold increase in data volume expected between 2006 and 2010, as we go from 161 exabytes a few years ago to more than 988 exabytes in 2010. From an IDC study, EMC then goes on to extrapolate that 1 million storage professionals will be needed by 2012.

So much for the power of automation.

There are some other interesting data points from the IDC study (which EMC underwrote, and which you'll probably see borrowed from liberally at SNW and other upcoming confabs):

  • That 161 billion (161, followed by 18 zeroes) gigabytes created, captured, and replicated in 2006 represents about 3 million times the information in all the books ever written.

  • Data center pros can expect their domain to begin embracing voice over IP (VOIP), supervisory control and data acquisition (SCADA), and RFID technologies.

  • Sometime last year, the amount of information created also surpassed the available storage capacity for first time.
  • EMC also used Valentine's Day to tout the growth of its academic alliance program, now counting more than 170 schools around the world, which will presumably help educate and train the legions of storage professionals that will be needed to shove all these bytes around. These sorts of higher education programs are great, if only to sensitize IT workers or MBA candidates, for example, to the subtleties and options available out there.

    Jared Beard, associate director of information technology labs at Indiana University's Kelley School of Business, says he teaches his MBA students about the ins and outs of virtualization. "I teach VMware in my classes because my students need to know it," he says.

    It's the sort of thinking that will be required in the age of exabytes -- and presumably the yottabytes and zettabytes that will inevitably follow to make disks (and my head) spin even faster.

    Comment  | 
    Email This  | 
    Print  | 
    RSS
    More Insights
    Comments
    Newest First  |  Oldest First  |  Threaded View
    Commentary
    Ransomware Is Not the Problem
    Adam Shostack, Consultant, Entrepreneur, Technologist, Game Designer,  6/9/2021
    Edge-DRsplash-11-edge-ask-the-experts
    How Can I Test the Security of My Home-Office Employees' Routers?
    John Bock, Senior Research Scientist,  6/7/2021
    News
    New Ransomware Group Claiming Connection to REvil Gang Surfaces
    Jai Vijayan, Contributing Writer,  6/10/2021
    Register for Dark Reading Newsletters
    White Papers
    Video
    All Videos
    Cartoon Contest
    Write a Caption, Win an Amazon Gift Card! Click Here
    Latest Comment: Google's new See No Evil policy......
    Cartoon Archive
    Current Issue
    The State of Cybersecurity Incident Response
    In this report learn how enterprises are building their incident response teams and processes, how they research potential compromises, how they respond to new breaches, and what tools and processes they use to remediate problems and improve their cyber defenses for the future.
    Back Issues | Must Reads
    Flash Poll
    Twitter Feed
    Dark Reading - Bug Report
    Bug Report
    Enterprise Vulnerabilities
    From DHS/US-CERT's National Vulnerability Database
    CVE-2021-31664
    PUBLISHED: 2021-06-18
    RIOT-OS 2021.01 before commit 44741ff99f7a71df45420635b238b9c22093647a contains a buffer overflow which could allow attackers to obtain sensitive information.
    CVE-2021-33185
    PUBLISHED: 2021-06-18
    SerenityOS contains a buffer overflow in the set_range test in TestBitmap which could allow attackers to obtain sensitive information.
    CVE-2021-33186
    PUBLISHED: 2021-06-18
    SerenityOS in test-crypto.cpp contains a stack buffer overflow which could allow attackers to obtain sensitive information.
    CVE-2021-31272
    PUBLISHED: 2021-06-18
    SerenityOS before commit 3844e8569689dd476064a0759d704bc64fb3ca2c contains a directory traversal vulnerability in tar/unzip that may lead to command execution or privilege escalation.
    CVE-2021-31660
    PUBLISHED: 2021-06-18
    RIOT-OS 2021.01 before commit 85da504d2dc30188b89f44c3276fc5a25b31251f contains a buffer overflow which could allow attackers to obtain sensitive information.