Access and Feeds

Data Explosion: The Data Culprits Fueling the Growth

By Dick Weisinger

IDC’s annual report on the state of the data universe shows it growing phenomenally quickly into the hundreds and thousands of exabytes of data.  The numbers are interesting but hard to really get your head around.

The people at InfoWorld have dug in a bit more into it and have tried to classify the the five worst enterprise sources of sprawl in the digital universe.  The main culprits are logging and compliance, specifically Inforworld identified:

Security Log Files – Required for compliance.  It is the raw access data logs showing which users have accessed which data and when.

Network and System Event Logs – Again, these are raw log files that show just about every transaction and action that occurred on the network.

Multimedia – Anything from training videos, webcasts, podcasts, medical images, and technical images.

Transaction records – Transaction data available in a structured format and available for Business Intelligence analytics.

Emails, IM and Messages – Compliance regulations require companies to archive and make searchable communications.

Leave a Reply

Your email address will not be published. Required fields are marked *

*