A Journey Through Wikibon’s Top Technology Infographics of 2010

What a year 2010 has been. We’re proud to have been a part of a technology community that has collectively created over 500 articles, blog posts, and research notes this year. Those articles and posts have generated over half a million page views, and been read by hundreds of thousands of visitors.

We’re also thrilled to have participated in several of SiliconAngle’s Cube events including EMC World, SAP SAPPHIRE, VMworld, Oracle OpenWorld, Hitachi’s Information Forum, HP’s Converged Infrastructure Event, IBM’s Storwize V7000 launch and Hadoop World 2010. In total we generated more than 1.2 million views of our live and on demand TV content interviewing more than 200 guests from May through October.  

Our team also worked very hard to develop a series of infographics that helped fuel interest and explain some of the more challenging concepts in the enterprise technology space. Here is a look back at our top 9 infographics of 2010, in reverse order of popularity based on page views.  

9.) Facts About Spam: A Visual Journey

Facts About Spam: A Visual Journey

Click to View Full-Sized Image

The Wikibon community decided to take a graphical look at spam; addressing everything from its origination, the most popular networks and countries responsible for spam, popular spam topics, and the most often used celebrity names designed to get you to click that email. 

EMBED THE IMAGE ON YOUR SITE
  

8.) Today’s Cloud Computing Landscape

Click to View Full-Sized Image

Our graphical look at the cloud computing landscape. From private and enterprise cloud providers (such as IBM, HP/3Par, and VMware), to public cloud services (like Google and Microsoft Azure), to the Hybrid cloud (Verizon and the NRE Alliance of newScale, rPath and Eucalyptus as examples). 

EMBED THE IMAGE ON YOUR SITE
  

7.) Eight Levels of Information Technology Security

8 Levels of Information Technology Security

Click to View Full-Sized Image

A visual look at a data center provides us with the 8 levels of information technology security which work together to form a tight-knit and (hopefully) impenetrable web of safeness. 

EMBED THE IMAGE ON YOUR SITE
  

6.) Cloud Computing: Public vs Private

Cloud Computing: Public vs Private

Click to View Full-Sized Image

The business case for engaging in a public or private cloud strategy involves several factors, the most important being business revenue and/or budget. Here is a comparative, visual look at each strategy. 

EMBED THE IMAGE ON YOUR SITE
  

5.) The Components of a Successful Data Center

The Components of a Successful Data Center

Click to View Full-Sized Image

With so much sensitive digital information to manage and the various access points and parties involved, datacenters are locked down to every application and piece of equipment they house. Here is a visual walk-through of the components necessary for running a successful data center. 

EMBED THE IMAGE ON YOUR SITE
  

4.) Hackers: How They Get In, How They Got In

Hackers: How They Get In, How They Got In

Click to View Full-Sized Image

How do security breaches happen? Where and how does the hacker get in and against what threats will companies like Intel be protecting us? Here is a graphical representation of how hackers penetrate and access company computers and networks; and the damage that is created. 

EMBED THE IMAGE ON YOUR SITE
  

3.) Virtual Desktop Infrastructure (VDI)

Virtual Desktop Infrastructure

Click to View Full-Sized Image

Enter Virtual Desktop Infrastructure (VDI) – IT organizations can once again take control of management and security of the corporate desktop while also freeing the users by giving them a consistent experience across an expanded range of hardware. The future of the corporate desktop is a flexible end-user experience with a cost-effective centralized management. 

EMBED THE IMAGE ON YOUR SITE
  

2.) Stack Wars: What Is The Enterprise Stack?

Stack Wars: What Is The Enterprise Stack?

Click to View Full-Sized Image

The enterprise stack refers to the combination of hardware, software and services intellectual property (IP) that is owned by a specific competitor. The pending enterprise stack wars pit highly vertically integrated companies against a virtually integrated whole. 

EMBED THE IMAGE ON YOUR SITE
  

1.) Cloud Computing: What Is It & Why Should I Care?

Cloud Computing: What Is It & Why Should I Care?

Click to View Full-Sized Image

Cloud computing represents a shift from mainframe to client–server environments to a delivery model for IT services based on the Internet. Shared resources, software and information are provided to computers and other devices on-demand, providing businesses the benefits of anywhere, anytime access to data, improved reliability, and software that is up to date with less of a potential of malware (relative to laptop storage). 

EMBED THE IMAGE ON YOUR SITE
  

Share