I D C            C O U N T R Y                          B R I E F

T H E D I G I T AL U N I V E R S E I N 2 0 2 0 : B i g D a t a ,
Bigger Digital Shadows, and Biggest Growth in
the Far East — China
February 2013
By John Gantz, David Reinsel, and Richard Lee
Sponsored by EMC Corporation

Content for this paper is adapted from IDC's Digital Universe Study, December 2012, sponsored by
EMC. Additional content for the study can be viewed at http://www.emc.com/leadership/digital-
universe/iview/index.htm

China Profile
Digital Universe in China to Grow 24-Fold Between 2012 and 2020

The digital universe in China, or the digital bits captured or created each year in the country, is
expected to grow from 364 exabytes to 8.6 zettabytes between 2012 and 2020, or nearly 50% a year,
which means it will more than double every two years (see Figure 1).

China’s share of the global digital universe will grow from 13% to 21% between 2012 and 2020. By
2020, its digital universe, if printed out as text, would make a stack of books reaching from Earth to
Pluto and back 30 times.
What’s driving this growth?

   Continued growth of Internet usage, social networks, and smartphones among consumers

   Falling costs of the technology devices that create, capture, manage, protect, and store
    information

   Migration from analog TV to digital TV

   Growth of machine-to-machine communication, including security images

   Growth of information about information

For instance, China now has roughly as many PCs as the United States, or 20% of the global
installed base, and twice as many Internet users. In 2012, it surpassed the United States in
smartphone shipments and installed base. In two years, the number of smartphones in China will be
higher than the number of people in the United States. China also has more TVs than the United
States, with 25% of households with TVs now using digital sets. And the country has also
aggressively launched initiatives to install security cameras for law enforcement, critical infrastructure,
and retail outlets.

In addition, because of China's population and far-flung infrastructure, China’s share of digital output
from embedded systems (excluding security cameras) will jump from 20% of world output in 2012 to
40% in 2020. According to IDC, from 2011 to 2015, State Grid’s overall investment in smart grids will
surpass 1.5 trillion RMB ($232 billion)(State Grid is China's largest grid operator).

It’s also worth noting that China’s digital universe is growing faster than available storage. This is a
function of an increasing amount of transient data — from phone call routing signals and digital TV
signals watched but not stored to signals coming from the Large Hadron Collider at CERN that are
discarded within microseconds. The issue with storage in the digital universe is less how to store all
the bits than about how to store what must be stored intelligently, economically, and securely.

The Consumer Influence
When we first started studying the digital universe, the origin of a majority of the bits within it was
mature markets: In 2005, the United States and Western Europe accounted for 49% of the digital
universe. But as Moore’s law has made digital technology — computers, smartphones, cameras,
TVs, movies, industrial equipment — cheaper, the technology has become affordable for more and
more people around the world. Over time, the distribution of the bits within the digital universe by
country of origin will more closely mirror the distribution of the population. By 2020, the United States
and Western Europe will generate only 30% of the bits in the digital universe.

However, in China, the contribution of individuals, as consumers or workers, creates a paradox.
Individuals accounted for 50% of the regional digital universe in 2012, and enterprises created 50%
(see Figure 2). Nevertheless, enterprises had responsibility or liability for 81%. As a byte travels from
one consumer camera phone to another, at some point in its life, it passes through an enterprise-
owned network that must keep it secure and protect the privacy of the sender and the receiver. The
same thing is true for almost all bytes in the digital universe.




                                                     2                                           ©2013 IDC
This responsibility for information security and privacy protection for so much of the digital universe is
one of the key challenges for the CIOs, data scientists and architects, governments, and enterprises
driving the development of the digital universe.

IDC analysis of the information in China’s portion of the digital universe by category of information
indicates that 55% of the data might need security at some level (much of the rest of the data is the
transient data mentioned previously). At the same time, we estimate that less than half of that data
needing protection actually is protected (see Figure 3).




                                                    3
Opportunity for Big Data
One of the ironies of the digital universe is that as soon as information is created or captured and
enters the digital cosmos, much of it is lost. If a lot of that information is not stored (refer back to
Figure 1), even more is not tracked or analyzed. Of course, not all of the information would be of
value if it were tracked, but certainly some of it would be.

IDC estimates that in 2012, 33% of the information in China’s digital universe would be valuable were
it tagged and analyzed. We also estimate that less than half a percent is analyzed. We expect the
percentage of information in the region’s digital universe that would be useful if tagged and analyzed
will be a little bigger (35%) by 2020 (see Figure 4).

That’s a 25-fold growth of useful information, which should be an inspiration for the adoption of Big
Data technologies and practices.




                                                      4                                            ©2013 IDC
Impact of Cloud Computing
The number of IT professionals in China is only growing in single digits each year, yet China’s digital
universe is growing more than 100% every two years and the complexity of managing, securing,
storing, and extracting value from it continues to increase considerably. Dealing with this complexity
implies a new economy of scale revolving around specialties — an incentive for cloud computing.

Although cloud computing is in its early days, it is already having an impact on the digital universe.
IDC estimates that in 2012, 21% of China's digital universe was in some way "touched" by the cloud
— stored, transmitted, or processed. By 2020, that percentage could be as high as 39% (see Figure
5).




                                                   5
Call to Action
In just five years, China’s share of the digital universe will be bigger than the entire digital universe in
2012. China's share of the digital universe will be many times more valuable than it is today — and
many times more volatile. An exponentially larger number of bytes will need information security,
many more systems will need real-time responses, and many more demands for reliability and
speedy access will be made of the IT managers, CIOs, data scientists, and chief security officers that
manage the actual digital universe.

Technology will evolve — algorithms for automatically creating metadata for unstructured data; Big
Data software that enables analysis of large, diverse data sets; optimization software for real-time
systems; and, of course, information management, data deduplication, and cybersecurity tools.
However, the right technology tools will be necessary but not sufficient for the taming of China’s
digital universe. It will take new management practices, user education, and savvy policies. This is
where technologists must rely on support from business units, government, and consumers, and it is
likely an area with bigger challenges than the technological realm.

No country, no region, no company can halt the expansion of the digital universe. One can only
prepare as best as possible.




                                                     6                                             ©2013 IDC
A B O U T    T H I S   P U B L I C A T I O N

This publication was produced by IDC Go-to-Market Services. The opinion, analysis, and research results presented herein
are drawn from more detailed research and analysis independently conducted and published by IDC, unless specific vendor
sponsorship is noted. IDC Go-to-Market Services makes IDC content available in a wide range of formats for distribution by
various companies. A license to distribute IDC content does not imply endorsement of or opinion about the licensee.

C O P Y R I G H T      A N D   R E S T R I C T I O N S

Any IDC information or reference to IDC that is to be used in advertising, press releases, or promotional materials requires
prior written approval from IDC. For permission requests contact the GMS information line at 508-988-7610 or gms@idc.com.
Translation and/or localization of this document requires an additional license from IDC.

For more information on IDC visit www.idc.com. For more information on IDC GMS visit www.idc.com/gms.

Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com




                                                              7

More Related Content

PDF
Why Passwords are not strong enough
 
PDF
RSA Monthly Online Fraud Report -- February 2014
 
PDF
Implementing security on android application
PDF
[Infographic] Data Loss Prevention
PDF
[Infographic] 7 Cyber attacks that shook the world
PDF
New Approaches to Security and Availability for Cloud Data
 
PDF
Taking Control of the Digital and Mobile User Authentication Challenge
 
PDF
Top 5 Cybersecurity Risks in Banking
Why Passwords are not strong enough
 
RSA Monthly Online Fraud Report -- February 2014
 
Implementing security on android application
[Infographic] Data Loss Prevention
[Infographic] 7 Cyber attacks that shook the world
New Approaches to Security and Availability for Cloud Data
 
Taking Control of the Digital and Mobile User Authentication Challenge
 
Top 5 Cybersecurity Risks in Banking

What's hot (19)

PDF
Cybersecurity in the Age of Mobility
PPTX
5 Cybersecurity threats in Public Sector
PDF
Dealing with Data Breaches Amidst Changes In Technology
PPTX
Data Protection & Privacy During the Coronavirus Pandemic
PPTX
Top 5 Cybersecurity Threats in Retail Industry
PDF
Cisco 2014 Midyear Security Report
PDF
Cybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
PPTX
Data security for healthcare industry
PPTX
How to protect privacy sensitive data that is collected to control the corona...
PPTX
Emerging application and data protection for cloud
PDF
Fundamentals of information systems security ( pdf drive ) chapter 1
PDF
ThreatMetrix Profile in March 2014 CIO Review
PDF
MIST Effective Masquerade Attack Detection in the Cloud
PDF
Securité : Le rapport 2Q de la X-Force
PDF
Five Network Security Threats And How To Protect Your Business Wp101112
PDF
Securing mobile devices_in_the_business_environment
PDF
The Essential Ingredient for Today's Enterprise
PDF
Evolutionand impactofhiddenmobilethreats wandera
PPT
Security in Web 2.0, Social Web and Cloud
Cybersecurity in the Age of Mobility
5 Cybersecurity threats in Public Sector
Dealing with Data Breaches Amidst Changes In Technology
Data Protection & Privacy During the Coronavirus Pandemic
Top 5 Cybersecurity Threats in Retail Industry
Cisco 2014 Midyear Security Report
Cybersecurity Challenges in Retail 2020: How to Prevent Retail Theft
Data security for healthcare industry
How to protect privacy sensitive data that is collected to control the corona...
Emerging application and data protection for cloud
Fundamentals of information systems security ( pdf drive ) chapter 1
ThreatMetrix Profile in March 2014 CIO Review
MIST Effective Masquerade Attack Detection in the Cloud
Securité : Le rapport 2Q de la X-Force
Five Network Security Threats And How To Protect Your Business Wp101112
Securing mobile devices_in_the_business_environment
The Essential Ingredient for Today's Enterprise
Evolutionand impactofhiddenmobilethreats wandera
Security in Web 2.0, Social Web and Cloud
Ad

Viewers also liked (20)

PDF
Ecological Agriculture Week 4 Presentation (Int'l Masters Program in Agriculture
PPTX
Practice pp fs and travistan
PPTX
ամանորյա քառյակներ
PDF
Weapons for peace
PPS
The human brain_1
PPTX
Fri greek contributions
PPTX
Tues silk road
PDF
Hotel1
PDF
Insaat kursu-gaziantep
DOC
บทที่ 4
PPTX
20120726 hakuhodo
PPS
The paradox of our times
PDF
Individual rights specification
DOC
Laurette-s-Resume-Sept-9-13--1-.doc
PDF
HRMAC_2015-05_Labor_Crystal_Ball
PDF
BWL studieren an der HAM in Erding und Berlin
PPTX
Integrante
PPT
Under what circumstances do motivated
PDF
Pivotal CF on Vblock Systems
 
Ecological Agriculture Week 4 Presentation (Int'l Masters Program in Agriculture
Practice pp fs and travistan
ամանորյա քառյակներ
Weapons for peace
The human brain_1
Fri greek contributions
Tues silk road
Hotel1
Insaat kursu-gaziantep
บทที่ 4
20120726 hakuhodo
The paradox of our times
Individual rights specification
Laurette-s-Resume-Sept-9-13--1-.doc
HRMAC_2015-05_Labor_Crystal_Ball
BWL studieren an der HAM in Erding und Berlin
Integrante
Under what circumstances do motivated
Pivotal CF on Vblock Systems
 
Ad

Similar to Analyst Report: The Digital Universe in 2020 - China (20)

PDF
The Digital Universe in 2020 - United States
 
PDF
The Digital Universe in 2020 - India
 
PDF
Digital universe 2020
PDF
Idc the digital universe in 2020
PDF
The Digital Universe in 2020
PDF
201404 White Paper Digital Universe 2014
PDF
Digital India: Use of Technology For Transforming Society
PDF
Predictions on Connected Devices by IDC
PDF
TOP 10 IDC Predictions 2012
PDF
IDC Report Extracting-Value-from-Chaos
PDF
IT Infrastructure on the Verge of Technological Singularity
PDF
Institute of Directors Future of Technology Report
PDF
Attaining IoT Value: How To Move from Connecting Things to Capturing Insights
PDF
Governança de TI em um mundo cada vez mais hiperconectado
PPTX
Digital Transformation & Cloud Profitability
PPTX
Software Market Trends 2012 2.0
DOCX
Top 6 New Technology Trends For 2022.docx
PDF
Open Data Economy.pdf
PDF
Process oriented architecture for digital transformation 2015
PDF
New Opportunities for Technology-Driven Business Transformation
The Digital Universe in 2020 - United States
 
The Digital Universe in 2020 - India
 
Digital universe 2020
Idc the digital universe in 2020
The Digital Universe in 2020
201404 White Paper Digital Universe 2014
Digital India: Use of Technology For Transforming Society
Predictions on Connected Devices by IDC
TOP 10 IDC Predictions 2012
IDC Report Extracting-Value-from-Chaos
IT Infrastructure on the Verge of Technological Singularity
Institute of Directors Future of Technology Report
Attaining IoT Value: How To Move from Connecting Things to Capturing Insights
Governança de TI em um mundo cada vez mais hiperconectado
Digital Transformation & Cloud Profitability
Software Market Trends 2012 2.0
Top 6 New Technology Trends For 2022.docx
Open Data Economy.pdf
Process oriented architecture for digital transformation 2015
New Opportunities for Technology-Driven Business Transformation

More from EMC (20)

PPTX
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
 
PDF
Cloud Foundry Summit Berlin Keynote
 
PPTX
EMC GLOBAL DATA PROTECTION INDEX
 
PDF
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
 
PDF
Citrix ready-webinar-xtremio
 
PDF
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
 
PPTX
EMC with Mirantis Openstack
 
PPTX
Modern infrastructure for business data lake
 
PDF
Force Cyber Criminals to Shop Elsewhere
 
PDF
Pivotal : Moments in Container History
 
PDF
Data Lake Protection - A Technical Review
 
PDF
Mobile E-commerce: Friend or Foe
 
PDF
Virtualization Myths Infographic
 
PDF
Intelligence-Driven GRC for Security
 
PDF
The Trust Paradox: Access Management and Trust in an Insecure Age
 
PDF
EMC Technology Day - SRM University 2015
 
PDF
EMC Academic Summit 2015
 
PDF
Data Science and Big Data Analytics Book from EMC Education Services
 
PDF
Using EMC Symmetrix Storage in VMware vSphere Environments
 
PDF
Using EMC VNX storage with VMware vSphereTechBook
 
INDUSTRY-LEADING TECHNOLOGY FOR LONG TERM RETENTION OF BACKUPS IN THE CLOUD
 
Cloud Foundry Summit Berlin Keynote
 
EMC GLOBAL DATA PROTECTION INDEX
 
Transforming Desktop Virtualization with Citrix XenDesktop and EMC XtremIO
 
Citrix ready-webinar-xtremio
 
EMC FORUM RESEARCH GLOBAL RESULTS - 10,451 RESPONSES ACROSS 33 COUNTRIES
 
EMC with Mirantis Openstack
 
Modern infrastructure for business data lake
 
Force Cyber Criminals to Shop Elsewhere
 
Pivotal : Moments in Container History
 
Data Lake Protection - A Technical Review
 
Mobile E-commerce: Friend or Foe
 
Virtualization Myths Infographic
 
Intelligence-Driven GRC for Security
 
The Trust Paradox: Access Management and Trust in an Insecure Age
 
EMC Technology Day - SRM University 2015
 
EMC Academic Summit 2015
 
Data Science and Big Data Analytics Book from EMC Education Services
 
Using EMC Symmetrix Storage in VMware vSphere Environments
 
Using EMC VNX storage with VMware vSphereTechBook
 

Recently uploaded (20)

PDF
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
PDF
IT-ITes Industry bjjbnkmkhkhknbmhkhmjhjkhj
DOCX
Basics of Cloud Computing - Cloud Ecosystem
PDF
Electrocardiogram sequences data analytics and classification using unsupervi...
PDF
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
PPTX
Microsoft User Copilot Training Slide Deck
PDF
Lung cancer patients survival prediction using outlier detection and optimize...
PDF
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
PDF
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
PDF
NewMind AI Weekly Chronicles – August ’25 Week IV
PDF
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
PDF
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
PDF
giants, standing on the shoulders of - by Daniel Stenberg
PDF
Introduction to MCP and A2A Protocols: Enabling Agent Communication
PDF
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
PDF
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
PDF
Data Virtualization in Action: Scaling APIs and Apps with FME
PPTX
MuleSoft-Compete-Deck for midddleware integrations
PDF
Enhancing plagiarism detection using data pre-processing and machine learning...
PDF
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf
Transform-Quality-Engineering-with-AI-A-60-Day-Blueprint-for-Digital-Success.pdf
IT-ITes Industry bjjbnkmkhkhknbmhkhmjhjkhj
Basics of Cloud Computing - Cloud Ecosystem
Electrocardiogram sequences data analytics and classification using unsupervi...
MENA-ECEONOMIC-CONTEXT-VC MENA-ECEONOMIC
Microsoft User Copilot Training Slide Deck
Lung cancer patients survival prediction using outlier detection and optimize...
5-Ways-AI-is-Revolutionizing-Telecom-Quality-Engineering.pdf
The-Future-of-Automotive-Quality-is-Here-AI-Driven-Engineering.pdf
NewMind AI Weekly Chronicles – August ’25 Week IV
The-2025-Engineering-Revolution-AI-Quality-and-DevOps-Convergence.pdf
Transform-Your-Streaming-Platform-with-AI-Driven-Quality-Engineering.pdf
giants, standing on the shoulders of - by Daniel Stenberg
Introduction to MCP and A2A Protocols: Enabling Agent Communication
INTERSPEECH 2025 「Recent Advances and Future Directions in Voice Conversion」
AI.gov: A Trojan Horse in the Age of Artificial Intelligence
Data Virtualization in Action: Scaling APIs and Apps with FME
MuleSoft-Compete-Deck for midddleware integrations
Enhancing plagiarism detection using data pre-processing and machine learning...
Transform-Your-Supply-Chain-with-AI-Driven-Quality-Engineering.pdf

Analyst Report: The Digital Universe in 2020 - China

  • 1. I D C C O U N T R Y B R I E F T H E D I G I T AL U N I V E R S E I N 2 0 2 0 : B i g D a t a , Bigger Digital Shadows, and Biggest Growth in the Far East — China February 2013 By John Gantz, David Reinsel, and Richard Lee Sponsored by EMC Corporation Content for this paper is adapted from IDC's Digital Universe Study, December 2012, sponsored by EMC. Additional content for the study can be viewed at http://www.emc.com/leadership/digital- universe/iview/index.htm China Profile Digital Universe in China to Grow 24-Fold Between 2012 and 2020 The digital universe in China, or the digital bits captured or created each year in the country, is expected to grow from 364 exabytes to 8.6 zettabytes between 2012 and 2020, or nearly 50% a year, which means it will more than double every two years (see Figure 1). China’s share of the global digital universe will grow from 13% to 21% between 2012 and 2020. By 2020, its digital universe, if printed out as text, would make a stack of books reaching from Earth to Pluto and back 30 times.
  • 2. What’s driving this growth?  Continued growth of Internet usage, social networks, and smartphones among consumers  Falling costs of the technology devices that create, capture, manage, protect, and store information  Migration from analog TV to digital TV  Growth of machine-to-machine communication, including security images  Growth of information about information For instance, China now has roughly as many PCs as the United States, or 20% of the global installed base, and twice as many Internet users. In 2012, it surpassed the United States in smartphone shipments and installed base. In two years, the number of smartphones in China will be higher than the number of people in the United States. China also has more TVs than the United States, with 25% of households with TVs now using digital sets. And the country has also aggressively launched initiatives to install security cameras for law enforcement, critical infrastructure, and retail outlets. In addition, because of China's population and far-flung infrastructure, China’s share of digital output from embedded systems (excluding security cameras) will jump from 20% of world output in 2012 to 40% in 2020. According to IDC, from 2011 to 2015, State Grid’s overall investment in smart grids will surpass 1.5 trillion RMB ($232 billion)(State Grid is China's largest grid operator). It’s also worth noting that China’s digital universe is growing faster than available storage. This is a function of an increasing amount of transient data — from phone call routing signals and digital TV signals watched but not stored to signals coming from the Large Hadron Collider at CERN that are discarded within microseconds. The issue with storage in the digital universe is less how to store all the bits than about how to store what must be stored intelligently, economically, and securely. The Consumer Influence When we first started studying the digital universe, the origin of a majority of the bits within it was mature markets: In 2005, the United States and Western Europe accounted for 49% of the digital universe. But as Moore’s law has made digital technology — computers, smartphones, cameras, TVs, movies, industrial equipment — cheaper, the technology has become affordable for more and more people around the world. Over time, the distribution of the bits within the digital universe by country of origin will more closely mirror the distribution of the population. By 2020, the United States and Western Europe will generate only 30% of the bits in the digital universe. However, in China, the contribution of individuals, as consumers or workers, creates a paradox. Individuals accounted for 50% of the regional digital universe in 2012, and enterprises created 50% (see Figure 2). Nevertheless, enterprises had responsibility or liability for 81%. As a byte travels from one consumer camera phone to another, at some point in its life, it passes through an enterprise- owned network that must keep it secure and protect the privacy of the sender and the receiver. The same thing is true for almost all bytes in the digital universe. 2 ©2013 IDC
  • 3. This responsibility for information security and privacy protection for so much of the digital universe is one of the key challenges for the CIOs, data scientists and architects, governments, and enterprises driving the development of the digital universe. IDC analysis of the information in China’s portion of the digital universe by category of information indicates that 55% of the data might need security at some level (much of the rest of the data is the transient data mentioned previously). At the same time, we estimate that less than half of that data needing protection actually is protected (see Figure 3). 3
  • 4. Opportunity for Big Data One of the ironies of the digital universe is that as soon as information is created or captured and enters the digital cosmos, much of it is lost. If a lot of that information is not stored (refer back to Figure 1), even more is not tracked or analyzed. Of course, not all of the information would be of value if it were tracked, but certainly some of it would be. IDC estimates that in 2012, 33% of the information in China’s digital universe would be valuable were it tagged and analyzed. We also estimate that less than half a percent is analyzed. We expect the percentage of information in the region’s digital universe that would be useful if tagged and analyzed will be a little bigger (35%) by 2020 (see Figure 4). That’s a 25-fold growth of useful information, which should be an inspiration for the adoption of Big Data technologies and practices. 4 ©2013 IDC
  • 5. Impact of Cloud Computing The number of IT professionals in China is only growing in single digits each year, yet China’s digital universe is growing more than 100% every two years and the complexity of managing, securing, storing, and extracting value from it continues to increase considerably. Dealing with this complexity implies a new economy of scale revolving around specialties — an incentive for cloud computing. Although cloud computing is in its early days, it is already having an impact on the digital universe. IDC estimates that in 2012, 21% of China's digital universe was in some way "touched" by the cloud — stored, transmitted, or processed. By 2020, that percentage could be as high as 39% (see Figure 5). 5
  • 6. Call to Action In just five years, China’s share of the digital universe will be bigger than the entire digital universe in 2012. China's share of the digital universe will be many times more valuable than it is today — and many times more volatile. An exponentially larger number of bytes will need information security, many more systems will need real-time responses, and many more demands for reliability and speedy access will be made of the IT managers, CIOs, data scientists, and chief security officers that manage the actual digital universe. Technology will evolve — algorithms for automatically creating metadata for unstructured data; Big Data software that enables analysis of large, diverse data sets; optimization software for real-time systems; and, of course, information management, data deduplication, and cybersecurity tools. However, the right technology tools will be necessary but not sufficient for the taming of China’s digital universe. It will take new management practices, user education, and savvy policies. This is where technologists must rely on support from business units, government, and consumers, and it is likely an area with bigger challenges than the technological realm. No country, no region, no company can halt the expansion of the digital universe. One can only prepare as best as possible. 6 ©2013 IDC
  • 7. A B O U T T H I S P U B L I C A T I O N This publication was produced by IDC Go-to-Market Services. The opinion, analysis, and research results presented herein are drawn from more detailed research and analysis independently conducted and published by IDC, unless specific vendor sponsorship is noted. IDC Go-to-Market Services makes IDC content available in a wide range of formats for distribution by various companies. A license to distribute IDC content does not imply endorsement of or opinion about the licensee. C O P Y R I G H T A N D R E S T R I C T I O N S Any IDC information or reference to IDC that is to be used in advertising, press releases, or promotional materials requires prior written approval from IDC. For permission requests contact the GMS information line at 508-988-7610 or [email protected]. Translation and/or localization of this document requires an additional license from IDC. For more information on IDC visit www.idc.com. For more information on IDC GMS visit www.idc.com/gms. Global Headquarters: 5 Speen Street Framingham, MA 01701 USA P.508.872.8200 F.508.935.4015 www.idc.com 7