Voyage Tech Blogs

Voyage Technology has been serving the Beaver Dam area since 1999, providing IT Support such as technical helpdesk support, computer support, and consulting to small and medium-sized businesses.

How Cool is Data? Part I

How Cool is Data? Part I

Technology is a modern marvel, that much is certain, but it wasn’t that long ago that we were remarkably far behind where we are today. Let’s take a look at data and examine how something so small can be something so incredibly important to the modern business world.

What is Data, Exactly?

Back before there were modern computers and smartphones, the best data storage method was the book. A novel generally holds anywhere between 60,000 to 110,000 words, with large epics being exceptions to the rule. To break down just how much data this is, examine the typical text message. A text message holds a maximum of 160 characters, and you can squeeze about 1-3 sentences into that on average. Characters in the English language are 7 bits apiece, each represented by a 1 or a 0. “A” translates to 01000001, and “B” is 01000010.

What does this have to do with data? We’ll get there; don’t worry.

The total amount of data a message can hold is 1120 bits, or 1120 ones and zeroes, and there are 8 bits in a byte, meaning that a text message is 140 bytes. There are 1,000,000 bytes in 1 Megabyte, and with the average word being about five characters, a novel could range anywhere from 300,000 to 555,000 characters. Multiplying this by 7 for the number of bits in a character, then dividing this by 8 for the number of bits in a byte, leaves us with 481,250 bytes, or 0.48125 Megabytes.

A large book could hold around half a Megabyte’s worth of information, then when you add in the other hidden data like metadata, the cover, and other information, your typical ebook should be about 1 Megabyte in size. You can imagine this is higher if there are illustrations or images involved, too.

How Much Data Fits in a Library

With some books being much, much larger than your typical novel—namely textbooks, encyclopedias, dictionaries, reference books, and so on, you can imagine that these files would be larger, too. For the purposes of this article, let’s round up to assume, on average, that a book would be about 1 Megabyte.

Now, your typical library holds between 5,000 and 500,000 books, with some of the world’s largest libraries housing millions. The US Library of Congress, for example, holds more than 51 million books, 25 million manuscripts, and millions of other items. For simplicity’s sake, we’ll say that the 51 million books are all text-based, then calculate how much data that would be.

51 million Megabytes is 51 thousand Gigabytes, which is 51 Terabytes. 1-2 Terabyte drives are common for everyday PC use, so you would expect to hold the entire Library of Congress’ book collection on 25 home computers. Pretty wild stuff.

Mobile devices with these capabilities are still a way’s off, but we bet that the near future will show just what they are capable of.

Of course, we are just assuming text is being stored here. If you wanted to scan each individual image, you’re looking at close to 8 Megabytes per book, and a total of 408 Terabytes to store in the Library of Congress. You’d need more than a room full of workstations for that kind of storage.

How Much Data Your Organization is Responsible For

Next time, we’ll talk about how much data the average human being produces, as well as the amount of data your business stores every day. Be sure to subscribe or bookmark this site so you can come back and learn more about the wonders of data storage.

 

Comments

No comments made yet. Be the first to submit a comment
Already Registered? Login Here
Guest
Tuesday, 09 December 2025

Captcha Image

Sign Up For Our Newsletter!

Mobile? Grab this Article!

Qr Code

Tag Cloud

Security Technology Tip of the Week Best Practices Data Business Computing Business Productivity Software Innovation Cloud Hackers Hardware Network Security Efficiency User Tips Internet Malware IT Support Privacy Google Email Workplace Tips Computer Phishing IT Services Collaboration Hosted Solutions Users Workplace Strategy Ransomware Mobile Device Microsoft Small Business Backup Passwords Quick Tips Productivity Saving Money Communication Cybersecurity Managed Service Smartphone Data Backup Android Upgrade AI Data Recovery VoIP Business Management Smartphones Disaster Recovery Mobile Devices communications Windows Browser Social Media Microsoft Office Managed IT Services Current Events Network Tech Term Remote Internet of Things Automation Information Artificial Intelligence Facebook Miscellaneous Covid-19 Gadgets Cloud Computing Holiday Training Server Managed Service Provider Remote Work Outsourced IT Compliance IT Support Employee/Employer Relationship Encryption Spam Windows 10 Office Business Continuity Data Management Government Business Technology Bandwidth Windows 10 Virtualization Wi-Fi Blockchain Mobile Office Vendor Data Security Apps Two-factor Authentication Tip of the week Chrome Mobile Device Management Budget Gmail Apple Networking App Managed Services Voice over Internet Protocol Employer-Employee Relationship BYOD Avoiding Downtime Office 365 Marketing HIPAA Applications How To WiFi BDR Conferencing Computing Information Technology Hacker Access Control Office Tips Analytics Website Router Augmented Reality Retail Storage Password Bring Your Own Device 2FA Help Desk Managed IT Services Big Data Healthcare Operating System Virtual Private Network Risk Management Computers Health Solutions Document Management Firewall Scam Windows 11 Data loss Monitoring The Internet of Things Excel Going Green Patch Management Social Save Money Remote Workers Remote Monitoring Vulnerability End of Support Telephone Vendor Management Cybercrime Physical Security Customer Service Cooperation Free Resource Project Management Display Printer Windows 7 Paperless Office Microsoft 365 Infrastructure Outlook Machine Learning Money Employees Word Humor Integration Modem User Tip Processor Mobile Security Maintenance Antivirus Sports Holidays Mouse Safety Data Storage Smart Technology Supply Chain Administration Video Conferencing Managed Services Provider Saving Time Virtual Machines Professional Services Robot Managed IT Service Settings Printing Downloads Wireless Content Filtering iPhone IT Management Customer Relationship Management Licensing VPN YouTube Meetings Entertainment Vulnerabilities Cryptocurrency Data Privacy Hacking Computer Repair Images 101 Presentation Multi-Factor Authentication Mobility Virtual Desktop Telephone System Cost Management Data storage LiFi Wireless Technology Windows 8 IP Address Laptop Websites Content Remote Working Wearable Technology Memory Vendors Motherboard Data Breach Drones Comparison Google Play Be Proactive Health IT Electronic Medical Records Directions Videos Assessment Electronic Health Records SharePoint Permissions Workforce Halloween Recovery Wasting Time Threats Trend Micro Lenovo Specifications Security Cameras Workplace Strategies Hard Drives Writing Virtual Reality Microchip Internet Exlporer Software as a Service Fraud Meta Domains Hacks Server Management Scary Stories Private Cloud Username Managing Costs Amazon eCommerce Superfish Black Friday SSID Identity Theft Refrigeration Fun Public Speaking Twitter Database Surveillance Virtual Assistant Outsource IT Deep Learning Media Lithium-ion battery Error IT Technicians Virtual Machine Environment Entrepreneur Proxy Server Reviews Cookies Cyber Monday Medical IT Education Social Engineering Remote Computing Tactics Development Hotspot Transportation Small Businesses Mirgation Hypervisor Displays Mobile Computing Shopping Nanotechnology Optimization PowerPoint Tablet Undo Search Alert Addiction Language Employer/Employee Relationships Outsourcing Best Practice Chatbots Managed IT Navigation Buisness File Sharing Dark Data Management PCI DSS Gig Economy Screen Reader Legal Distributed Denial of Service Workplace IT solutions How To Business Growth Notifications Service Level Agreement Internet Service Provider Computing Infrastructure Teamwork Hiring/Firing Identity Evernote Paperless Travel Application Regulations Compliance Cortana Bookmark Smart Tech Memes Techology Co-managed IT Google Maps Alt Codes IBM Download Net Neutrality Alerts SQL Server Technology Care History Business Communications Downtime Unified Threat Management Financial Data Browsers Smartwatch Connectivity IT Unified Threat Management Break Fix Scams Hosted Solution Typing Upload Procurement Azure Hybrid Work Cyber security Multi-Factor Security Tech Human Resources Network Congestion Social Network Telework Knowledge CES IoT Communitications Google Drive User Error Dark Web Cables Competition Trends Supply Chain Management Regulations Google Calendar Term Google Apps Point of Sale 5G Customer Resource management FinTech Experience Data Analysis Star Wars IT Assessment Google Docs Microsoft Excel IT Maintenance Unified Communications Bitcoin Network Management Running Cable Tech Support User Gamification Flexibility Staff Value Business Intelligence Social Networking Google Wallet Legislation Shortcuts Monitors Organization Fileless Malware Digital Security Cameras Smart Devices Ransmoware

Blog Archive