Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Cool is Data? Part I

How Cool is Data? Part I

Technology is a modern marvel, that much is certain, but it wasn’t that long ago that we were remarkably far behind where we are today. Let’s take a look at data and examine how something so small can be something so incredibly important to the modern business world.

What is Data, Exactly?

Back before there were modern computers and smartphones, the best data storage method was the book. A novel generally holds anywhere between 60,000 to 110,000 words, with large epics being exceptions to the rule. To break down just how much data this is, examine the typical text message. A text message holds a maximum of 160 characters, and you can squeeze about 1-3 sentences into that on average. Characters in the English language are 7 bits apiece, each represented by a 1 or a 0. “A” translates to 01000001, and “B” is 01000010.

What does this have to do with data? We’ll get there; don’t worry.

The total amount of data a message can hold is 1120 bits, or 1120 ones and zeroes, and there are 8 bits in a byte, meaning that a text message is 140 bytes. There are 1,000,000 bytes in 1 Megabyte, and with the average word being about five characters, a novel could range anywhere from 300,000 to 555,000 characters. Multiplying this by 7 for the number of bits in a character, then dividing this by 8 for the number of bits in a byte, leaves us with 481,250 bytes, or 0.48125 Megabytes.

A large book could hold around half a Megabyte’s worth of information, then when you add in the other hidden data like metadata, the cover, and other information, your typical ebook should be about 1 Megabyte in size. You can imagine this is higher if there are illustrations or images involved, too.

How Much Data Fits in a Library

With some books being much, much larger than your typical novel—namely textbooks, encyclopedias, dictionaries, reference books, and so on, you can imagine that these files would be larger, too. For the purposes of this article, let’s round up to assume, on average, that a book would be about 1 Megabyte.

Now, your typical library holds between 5,000 and 500,000 books, with some of the world’s largest libraries housing millions. The US Library of Congress, for example, holds more than 51 million books, 25 million manuscripts, and millions of other items. For simplicity’s sake, we’ll say that the 51 million books are all text-based, then calculate how much data that would be.

51 million Megabytes is 51 thousand Gigabytes, which is 51 Terabytes. 1-2 Terabyte drives are common for everyday PC use, so you would expect to hold the entire Library of Congress’ book collection on 25 home computers. Pretty wild stuff.

Mobile devices with these capabilities are still a way’s off, but we bet that the near future will show just what they are capable of.

Of course, we are just assuming text is being stored here. If you wanted to scan each individual image, you’re looking at close to 8 Megabytes per book, and a total of 408 Terabytes to store in the Library of Congress. You’d need more than a room full of workstations for that kind of storage.

How Much Data Your Organization is Responsible For

Next time, we’ll talk about how much data the average human being produces, as well as the amount of data your business stores every day. Be sure to subscribe or bookmark this site so you can come back and learn more about the wonders of data storage.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Friday, 25 April 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Business Computing Data Productivity Business Software Innovation Hackers Cloud Network Security User Tips Hardware Internet Efficiency IT Support Malware Privacy Google Email Workplace Tips Phishing Computer IT Services Collaboration Hosted Solutions Users Mobile Device Ransomware Quick Tips Workplace Strategy Small Business Cybersecurity Microsoft Passwords Communication Data Backup Smartphone Backup Saving Money Business Management Smartphones VoIP Android Upgrade Managed Service Mobile Devices communications Disaster Recovery Data Recovery Browser Social Media Managed IT Services Microsoft Office Windows Tech Term Network Remote Internet of Things Current Events Artificial Intelligence Facebook Productivity Automation Gadgets Cloud Computing Covid-19 Miscellaneous AI Server Remote Work Managed Service Provider Outsourced IT Holiday Information Employee/Employer Relationship Spam Encryption Compliance Office Windows 10 Data Management Business Continuity Government Training Windows 10 Bandwidth Virtualization Blockchain Business Technology Wi-Fi Two-factor Authentication Data Security Apps Mobile Office Mobile Device Management Gmail Networking Chrome Budget Managed Services Voice over Internet Protocol Apple BYOD Employer-Employee Relationship App Vendor Office 365 IT Support How To BDR WiFi Conferencing Access Control Hacker Computing Avoiding Downtime Tip of the week Marketing Information Technology Applications Office Tips Analytics Managed IT Services Help Desk Augmented Reality Storage Password Big Data Bring Your Own Device Healthcare Virtual Private Network Computers Health Operating System HIPAA Website Router Risk Management Retail Firewall Scam Data loss Monitoring The Internet of Things Patch Management Save Money Remote Workers Social Remote Monitoring End of Support Telephone Vulnerability Vendor Management Physical Security Cooperation Free Resource Display Project Management Printer Windows 7 Going Green Customer Service Paperless Office Microsoft 365 Infrastructure Cybercrime Windows 11 Solutions 2FA Document Management Excel Mobile Security Maintenance Virtual Desktop Processor Data storage Antivirus LiFi Holidays Data Storage Outlook Smart Technology Video Conferencing Money Safety Managed Services Provider Humor Professional Services Saving Time Virtual Machines Robot Data Privacy Managed IT Service Sports Mouse Downloads iPhone Licensing IT Management Administration Meetings VPN Vulnerabilities Customer Relationship Management Entertainment Computer Repair Images 101 Hacking Mobility Settings Presentation Telephone System Multi-Factor Authentication Cost Management Printing Wireless Content Filtering Wireless Technology YouTube Machine Learning Cryptocurrency Employees Supply Chain Integration User Tip Word Modem Database Surveillance Workplace Virtual Assistant Google Wallet Twitter Refrigeration Hiring/Firing IT Technicians Virtual Machine Error Paperless Cyber Monday Medical IT Windows 8 Laptop Public Speaking Social Engineering Proxy Server Reviews Cookies Tactics Development Co-managed IT Hotspot Transportation Drones Lithium-ion battery Remote Computing Entrepreneur Technology Care Mirgation Hypervisor Business Communications PowerPoint Tablet Halloween Shopping Nanotechnology Optimization Addiction Scams Language Employer/Employee Relationships Alert File Sharing Undo Dark Data Management PCI DSS Hybrid Work Chatbots Managed IT Navigation Human Resources Distributed Denial of Service Hacks Scary Stories How To Gig Economy Screen Reader Service Level Agreement Internet Service Provider Cables Computing Infrastructure Teamwork Notifications Fun Deep Learning Travel Regulations Compliance Identity Evernote Techology Google Apps Google Maps Bookmark Smart Tech Memes Application Download Net Neutrality IT Maintenance Alerts SQL Server Education Unified Threat Management Financial Data Business Intelligence History Unified Threat Management Shortcuts Break Fix Mobile Computing IBM Browsers Smartwatch Connectivity IT Search Upload Procurement Ransmoware Azure Best Practice Network Congestion Social Network Telework Vendors Cyber security Multi-Factor Security Tech User Error Be Proactive Dark Web Buisness CES IoT Communitications Trends Supply Chain Management Workforce Legal IT solutions Business Growth Point of Sale Competition Customer Resource management FinTech Threats Regulations Google Calendar Term Star Wars IT Assessment Workplace Strategies Microsoft Excel Data Analysis Cortana Gamification Flexibility Meta Staff Value Network Management Tech Support Legislation Alt Codes Monitors Organization Amazon Social Networking Smart Devices Downtime Fileless Malware Digital Security Cameras User Content Remote Working Outsource IT Wearable Technology Memory Hosted Solution Websites Media Comparison Google Play Typing Health IT Environment Motherboard Data Breach Assessment Electronic Health Records SharePoint Permissions IP Address Electronic Medical Records Directions Videos Knowledge Small Businesses Wasting Time Google Drive Specifications Security Cameras Writing Displays Trend Micro Lenovo Internet Exlporer Software as a Service Fraud Virtual Reality Microchip 5G Recovery Experience Hard Drives Username Outsourcing Managing Costs Google Docs Server Management Unified Communications Private Cloud Black Friday SSID Bitcoin Identity Theft Running Cable Domains eCommerce Superfish

Blog Archive