SlideShare a Scribd company logo
1 of 18
Download to read offline
Steve Mills
Senior Vice President and Group Executive
IBM Software and Systems
Smarter Planet Solutions Increasing Demands on IT
Business transactions / day
over the Internet by 2020
Wearable (wireless) health
monitors by 2014 from 12M in 2012
Worldwide sensor market
in 2011, forecasted to grow to
$240B in 2016
Wireless sensors over 10 km2
for Shell oil exploration project
E-mails sent daily from
a total of 3.4B e-mail accounts;
volume growing to in 2015
Internet users worldwide,
growing to in 2017
Social networking
accounts, projected to grow
to in 2015
Mobile phones worldwide
Increased Demands on IT
Data centers have their
energy use in the past five years
 increase in data center
energy costs projected
servers worldwide
 idle computer capacity
 of servers run 24/7 without
being actively used on a daily basis
Between 2000 and 2010
 servers grew
 storage grew
Virtual machines growing
Internet connected devices
to 1 Trillion devices by 2017
An Explosion of Data
Google processes
>
of data in a single day
Hadron Collider at CERN
generates
of usable data / day
Facebook processes
of data daily
Twitter processes
of data daily
AT&T transfers about
of data
through its network daily
For every session, NY Stock
Exchange captures
of trade information
By 2016, annual Internet traffic
will reach
global size of
“Big Data” in Healthcare, growing
between 1.2 and 2.4 EX / year
Volume
Variety
Velocity
Data Overload… but Lacking Insight
2009
2020
as much Data and Content
Over Coming Decade
2012
Business leaders make
decisions based on information
they don’t trust, or don’t have
say they feel overwhelmed
by the amount of data their
company manages
say they need to do a better job
capturing and understanding
information rapidly
cited “BI & Analytics” as part
of their visionary plans to
enhance competitiveness
IT Operating Costs
Source: IDC, 2012
Power and cooling costs
63%
8%
29%
1996
43%
11%
46%
2001
33%
16%
51%
2006
21%
12%
67%
2012
New Server spending
Worldwide Spending on Servers, Power, Cooling & Management Administration
Server management and admin costs
Sprawl Drives Cost
IT Must Break through Budget and Resource Barriers
Getting Up and Running
 2-3 months to specify and procure
 2-3 months to integrate, configure
and deploy
Development Operations
 3-6 months to go from
development to production
Ongoing Effort
 1-3 months to troubleshoot and tune
 Ongoing effort and downtime to
maintain, scale and upgrade
IT Reality
Business Goals
 Driving business innovation
 Make new markets
 Respond to competitive threats
 Enhance the customer
experience
Grow top and bottom
line by
Typical Results
 23% of new IT projects (worldwide) deploy late
 55% experience application downtime for major
infrastructure upgrades once deployed
Source: A commissioned study conducted by Forrester Consulting on behalf of IBM
Clients Struggle to Overcome Barriers of Time, Cost & Risk
Top Causes of Project Delays
Hardware
Troubleshooting and tuning
production environment
Integration, configuration and
testing of the infrastructure
Installation, cabling and network
access for the environment
Software
Integration, configuration and
testing of applications
Integration, configuration and
testing of middleware
Configuration, build and
deployment of applications
Phase Time (days) Budget
Specify/design 73 - 96 14% - 16%
Procure 57 - 112 19% - 21%
Implement 74 – 93 12%
Configure/test 74 – 80 10% - 11%
Cluster & HA 66 – 104 11% - 12%
Backup 44 – 108 10%
Tune 89 – 98 9% - 10%
Management 67 – 110 9 – 10%
Typical IT Project Time and Budget
Source: A commissioned study conducted by Forrester Consulting on behalf of IBM
of new IT projects (US) deploy late
Only 1 in 5 Can Allocate More than Half Their IT Budget to Innovation
Maintaining
existing
infrastructure
New
projects
Maintaining
existing
infrastructure
New
projects
Most Efficient IT Organizations
More effective use of technology
first and fast technology adoption
move virtual machines to meet desired outcomes
use storage virtualization
use a storage service catalog (tiered storage)
Less effective use of technology
first and fast technology adoption
move virtual machines to meet desired outcomes
use storage virtualization
use a storage service catalog (tiered storage)
Less Efficient IT Organizations
IT Security Is Critical
average cost per data
breach in 2011
security incidents in 2011,
compromising records
consumer cybercrime victims
in 2011, or 18 adults became
a victim every second
cost of losing customer loyalty
(lost business) following a
data breach
| Hearthland Payment Systems
134M credit cards compromised
| TJX Companies
94M credit cards exposed
| Epsilon
Millions of names and e-mails exposed
| RSA Security
40M employee records stolen
| Stuxnet
Template for real-world intrusion disruptions
| US Department of Veterans Affairs
27M names and Social Security numbers stolen
| Sony’s PlayStation Network
77M PlayStation accounts hacked
| ESTsoft
Personal info of 35M South Koreans exposed
| Gawker Media
1.3M e-mail addresses & passwords exposed
| Google/other Silicon Valley companies
Stolen intellectual property
of victims were targets of opportunity
of attacks were not highly difficult
of data compromised involved servers
of breaches took weeks+ to discover
utilized some form of hacking
incorporated malware
involved physical attacks
employed social tactics
resulted from privilege misuse
What We Know about Security Breaches
stemmed from external agents
implicated internal employees
committed by business partner
of all data theft tied to activist group
of incidents discovered by 3rd party
of breaches were avoidable through
simple or intermediate controls
of victims subject to PCI DSS had
not achieved compliance
2011 | “The Year of the Targeted Attack”
Marketing
Services
Online
Gaming
Online
Gaming
Online
Gaming
Online
Gaming
Central
Government
Gaming
Gaming
Internet
Services
Online
Gaming
Online
Gaming
Online
Services
Online
Gaming
IT
Security
Banking
IT
Security
Government
Consulting
IT
Security
Telecom-
munications
Entertain-
ment
Consumer
Electronics
Apparel
Insurance
Consulting
Consumer
Electronics
Internet
Services
Central
Govt
Central
Govt
Central
Govt
Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec
Entertainment
Defense
Defense
Defense
Consumer
Electronics
Central
Government
Central
Government
Central
Government
Central
Government
Central
Government
Central
Government
Central
Government
Consumer
Electronics
National
Police
National
Police
State
Police
State
Police
Police
Gaming
Financial
Market
Online
Services
Defense
Heavy
Industry
Entertainment
Banking
2011 Sampling of Security Incidents by Attack Type, Time and Impact
Attack Type
SQL Injection
URL Tampering
Spear Phishing
3rd Party Software
DDoS
SecureID
Trojan Software
Unknown
Consulting
Size of circle estimates relative impact of
breach in terms of cost to business
Agriculture
Strategies to Transform
IT to Deliver Breakthrough
Economics and Value
Leading clients are
already addressing this IT
conundrum through
Meeting These Challenges
Key Investment Areas
Design Matters in the
New Era of Computing
Transforming
Computing
Making & Leading
New Markets
Expert Integrated
Systems
Optimized Workloads Smarter Analytics
Growth Markets Big Data Analytics Smarter Commerce
Cloud Cloud Smarter Cities
Analytics Security Intelligence Social Business
Cognitive Computing Mobile Enterprise Watson Solutions
Turning Opportunities into Outcomes
| Enabling Growth with Enterprise Systems
| Transforming IT with Smarter Storage
| Reinvent IT with Cloud Computing
| Changing the Economics of IT with IBM PureSystems
| Defending Against Cyber-Threats with Security Intelligence
| Transforming Critical Business Processes
| Unlocking Opportunities with Smarter Analytics and Big Data
| Creating Exceptional Experiences with Social Business and Commerce
| Extending Reach Securely with Mobile Enterprise
| Gaining Competitive Advantage Through Software Innovation
Steve Mills Senior Vice President and Group Executive IBM Software and Systems

More Related Content

What's hot

Enterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapEnterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing Gap
BlackBerry
 
Knowledge Management and Predictive Analytics in IT Project Risks
Knowledge Management and Predictive Analytics in IT Project RisksKnowledge Management and Predictive Analytics in IT Project Risks
Knowledge Management and Predictive Analytics in IT Project Risks
ijtsrd
 

What's hot (20)

7 Steps to Better Cybersecurity Hygiene
7 Steps to Better Cybersecurity Hygiene  7 Steps to Better Cybersecurity Hygiene
7 Steps to Better Cybersecurity Hygiene
 
ANALYZING AND IDENTIFYING FAKE NEWS USING ARTIFICIAL INTELLIGENCE
ANALYZING AND IDENTIFYING FAKE NEWS USING ARTIFICIAL INTELLIGENCEANALYZING AND IDENTIFYING FAKE NEWS USING ARTIFICIAL INTELLIGENCE
ANALYZING AND IDENTIFYING FAKE NEWS USING ARTIFICIAL INTELLIGENCE
 
Maintain data privacy during software development
Maintain data privacy during software developmentMaintain data privacy during software development
Maintain data privacy during software development
 
2015 Global Threat Intelligence Report
2015 Global Threat Intelligence Report2015 Global Threat Intelligence Report
2015 Global Threat Intelligence Report
 
IBM Security Services
IBM Security ServicesIBM Security Services
IBM Security Services
 
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...
A History of IIoT Cyber-Attacks & Checklist for Implementing Security [Infogr...
 
Enterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing GapEnterprise Mobility Applications: Addressing a Growing Gap
Enterprise Mobility Applications: Addressing a Growing Gap
 
Cybersecurity Improvement eBook
Cybersecurity Improvement eBookCybersecurity Improvement eBook
Cybersecurity Improvement eBook
 
Knowledge Management and Predictive Analytics in IT Project Risks
Knowledge Management and Predictive Analytics in IT Project RisksKnowledge Management and Predictive Analytics in IT Project Risks
Knowledge Management and Predictive Analytics in IT Project Risks
 
The Internet of Things: An Overview
The Internet of Things: An OverviewThe Internet of Things: An Overview
The Internet of Things: An Overview
 
Intelligent Maintenance: Mapping the #IIoT Process
Intelligent Maintenance: Mapping the #IIoT ProcessIntelligent Maintenance: Mapping the #IIoT Process
Intelligent Maintenance: Mapping the #IIoT Process
 
Is Your Organization in Crisis?
Is Your Organization in Crisis?Is Your Organization in Crisis?
Is Your Organization in Crisis?
 
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest MindsWhitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
Whitepaper: IP Risk Assessment & Loss Prevention - Happiest Minds
 
Interset-advanced threat detection wp
Interset-advanced threat detection wpInterset-advanced threat detection wp
Interset-advanced threat detection wp
 
[Webinar] Supercharging Security with Behavioral Analytics
[Webinar] Supercharging Security with Behavioral Analytics[Webinar] Supercharging Security with Behavioral Analytics
[Webinar] Supercharging Security with Behavioral Analytics
 
White Paper Servicios Frost & Sullivan English
White Paper Servicios Frost & Sullivan EnglishWhite Paper Servicios Frost & Sullivan English
White Paper Servicios Frost & Sullivan English
 
Managing Mobile Menaces
Managing Mobile MenacesManaging Mobile Menaces
Managing Mobile Menaces
 
F&S Presentation Whitepaper Cisco Services
F&S Presentation Whitepaper Cisco ServicesF&S Presentation Whitepaper Cisco Services
F&S Presentation Whitepaper Cisco Services
 
Wireless survey-report-saa-2016
Wireless survey-report-saa-2016Wireless survey-report-saa-2016
Wireless survey-report-saa-2016
 
Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...Cyber security and critical information infrastructure protection from a sout...
Cyber security and critical information infrastructure protection from a sout...
 

Viewers also liked

Adobe Formulare für SAP Business ByDesign
Adobe Formulare für SAP Business ByDesignAdobe Formulare für SAP Business ByDesign
Adobe Formulare für SAP Business ByDesign
anthesis GmbH
 
Grundlagen des Berichtswesens und Arbeiten mit Berichten in SAP Business ByDe...
Grundlagen des Berichtswesens und Arbeiten mit Berichten in SAP Business ByDe...Grundlagen des Berichtswesens und Arbeiten mit Berichten in SAP Business ByDe...
Grundlagen des Berichtswesens und Arbeiten mit Berichten in SAP Business ByDe...
anthesis GmbH
 
5 arrows diverging concept process chart software power point templates
5 arrows diverging concept process chart software power point templates5 arrows diverging concept process chart software power point templates
5 arrows diverging concept process chart software power point templates
SlideTeam.net
 

Viewers also liked (10)

IBM i for Enterprise Businesses Quantifying the Value of Resilience
IBM i for Enterprise Businesses Quantifying the Value of ResilienceIBM i for Enterprise Businesses Quantifying the Value of Resilience
IBM i for Enterprise Businesses Quantifying the Value of Resilience
 
Fostering Best Financial Strategies and Practices for Enterprise IT
Fostering Best Financial Strategies and Practices for Enterprise ITFostering Best Financial Strategies and Practices for Enterprise IT
Fostering Best Financial Strategies and Practices for Enterprise IT
 
Adobe Formulare für SAP Business ByDesign
Adobe Formulare für SAP Business ByDesignAdobe Formulare für SAP Business ByDesign
Adobe Formulare für SAP Business ByDesign
 
Grundlagen des Berichtswesens und Arbeiten mit Berichten in SAP Business ByDe...
Grundlagen des Berichtswesens und Arbeiten mit Berichten in SAP Business ByDe...Grundlagen des Berichtswesens und Arbeiten mit Berichten in SAP Business ByDe...
Grundlagen des Berichtswesens und Arbeiten mit Berichten in SAP Business ByDe...
 
Obesidade final
Obesidade finalObesidade final
Obesidade final
 
IBM System Storage TS7650G ProtecTIER Deduplication Gateway
IBM System Storage TS7650G ProtecTIER Deduplication GatewayIBM System Storage TS7650G ProtecTIER Deduplication Gateway
IBM System Storage TS7650G ProtecTIER Deduplication Gateway
 
Alcoolismo a bea
Alcoolismo a beaAlcoolismo a bea
Alcoolismo a bea
 
5 arrows diverging concept process chart software power point templates
5 arrows diverging concept process chart software power point templates5 arrows diverging concept process chart software power point templates
5 arrows diverging concept process chart software power point templates
 
IBM Storwize V7000 and Storwize V7000 Unified Disk Systems
IBM Storwize V7000 and Storwize V7000 Unified Disk SystemsIBM Storwize V7000 and Storwize V7000 Unified Disk Systems
IBM Storwize V7000 and Storwize V7000 Unified Disk Systems
 
IBM System Storage TS3310 Tape Library
IBM System Storage TS3310 Tape LibraryIBM System Storage TS3310 Tape Library
IBM System Storage TS3310 Tape Library
 

Similar to Steve Mills Senior Vice President and Group Executive IBM Software and Systems

Key Trends and Opportunities in Business Mobility and Enterprise Communications
Key Trends and Opportunities in Business Mobility and Enterprise CommunicationsKey Trends and Opportunities in Business Mobility and Enterprise Communications
Key Trends and Opportunities in Business Mobility and Enterprise Communications
Raúl Castañón Martínez
 
ppt IT industry
ppt IT industryppt IT industry
ppt IT industry
Yash Joshi
 
Technology Trends 2012
Technology Trends 2012Technology Trends 2012
Technology Trends 2012
NECIndia
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
PECB
 
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
IJECEIAES
 

Similar to Steve Mills Senior Vice President and Group Executive IBM Software and Systems (20)

Predictive Enterprise Strategic Overview
Predictive Enterprise Strategic OverviewPredictive Enterprise Strategic Overview
Predictive Enterprise Strategic Overview
 
Cybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas CompanyCybersecurity in Oil & Gas Company
Cybersecurity in Oil & Gas Company
 
Digital Transformation How Digital Disruption is redefining the industries an...
Digital Transformation How Digital Disruption is redefining the industries an...Digital Transformation How Digital Disruption is redefining the industries an...
Digital Transformation How Digital Disruption is redefining the industries an...
 
Attaining IoT Value: How To Move from Connecting Things to Capturing Insights
Attaining IoT Value: How To Move from Connecting Things to Capturing InsightsAttaining IoT Value: How To Move from Connecting Things to Capturing Insights
Attaining IoT Value: How To Move from Connecting Things to Capturing Insights
 
Key Trends and Opportunities in Business Mobility and Enterprise Communications
Key Trends and Opportunities in Business Mobility and Enterprise CommunicationsKey Trends and Opportunities in Business Mobility and Enterprise Communications
Key Trends and Opportunities in Business Mobility and Enterprise Communications
 
Global Cybersecurity Market (2017 - 2022)
Global Cybersecurity Market (2017 -  2022) Global Cybersecurity Market (2017 -  2022)
Global Cybersecurity Market (2017 - 2022)
 
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY IndiaGet Ahead of Cyber Security by Tiffy Issac, Partner EY India
Get Ahead of Cyber Security by Tiffy Issac, Partner EY India
 
Business Values for IoT Solutions
Business Values for IoT SolutionsBusiness Values for IoT Solutions
Business Values for IoT Solutions
 
Rebooting IT Infrastructure for the Digital Age
Rebooting IT Infrastructure for the Digital AgeRebooting IT Infrastructure for the Digital Age
Rebooting IT Infrastructure for the Digital Age
 
2019 Intelligent Technology Index
2019 Intelligent Technology Index 2019 Intelligent Technology Index
2019 Intelligent Technology Index
 
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformationCisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
Cisco Connect 2018 Malaysia - Cisco services-guiding your digital transformation
 
IT Infrastructure on the Verge of Technological Singularity
IT Infrastructure on the Verge of Technological SingularityIT Infrastructure on the Verge of Technological Singularity
IT Infrastructure on the Verge of Technological Singularity
 
ppt IT industry
ppt IT industryppt IT industry
ppt IT industry
 
Technology Trends 2012
Technology Trends 2012Technology Trends 2012
Technology Trends 2012
 
Defining the IoT Stack
Defining the IoT StackDefining the IoT Stack
Defining the IoT Stack
 
Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028Digital Forensics Market, Size, Global Forecast 2023-2028
Digital Forensics Market, Size, Global Forecast 2023-2028
 
Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research Global Cyber Security Overview | TechSci Research
Global Cyber Security Overview | TechSci Research
 
What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?What trends will 2018 bring for Business Continuity Professionals?
What trends will 2018 bring for Business Continuity Professionals?
 
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...Proposed T-Model to cover 4S quality metrics based on empirical study of root...
Proposed T-Model to cover 4S quality metrics based on empirical study of root...
 
Industrial internet big data usa market study
Industrial internet big data usa market studyIndustrial internet big data usa market study
Industrial internet big data usa market study
 

More from IBM India Smarter Computing

More from IBM India Smarter Computing (20)

Using the IBM XIV Storage System in OpenStack Cloud Environments
Using the IBM XIV Storage System in OpenStack Cloud Environments Using the IBM XIV Storage System in OpenStack Cloud Environments
Using the IBM XIV Storage System in OpenStack Cloud Environments
 
All-flash Needs End to End Storage Efficiency
All-flash Needs End to End Storage EfficiencyAll-flash Needs End to End Storage Efficiency
All-flash Needs End to End Storage Efficiency
 
TSL03104USEN Exploring VMware vSphere Storage API for Array Integration on th...
TSL03104USEN Exploring VMware vSphere Storage API for Array Integration on th...TSL03104USEN Exploring VMware vSphere Storage API for Array Integration on th...
TSL03104USEN Exploring VMware vSphere Storage API for Array Integration on th...
 
IBM FlashSystem 840 Product Guide
IBM FlashSystem 840 Product GuideIBM FlashSystem 840 Product Guide
IBM FlashSystem 840 Product Guide
 
IBM System x3250 M5
IBM System x3250 M5IBM System x3250 M5
IBM System x3250 M5
 
IBM NeXtScale nx360 M4
IBM NeXtScale nx360 M4IBM NeXtScale nx360 M4
IBM NeXtScale nx360 M4
 
IBM System x3650 M4 HD
IBM System x3650 M4 HDIBM System x3650 M4 HD
IBM System x3650 M4 HD
 
IBM System x3300 M4
IBM System x3300 M4IBM System x3300 M4
IBM System x3300 M4
 
IBM System x iDataPlex dx360 M4
IBM System x iDataPlex dx360 M4IBM System x iDataPlex dx360 M4
IBM System x iDataPlex dx360 M4
 
IBM System x3500 M4
IBM System x3500 M4IBM System x3500 M4
IBM System x3500 M4
 
IBM System x3550 M4
IBM System x3550 M4IBM System x3550 M4
IBM System x3550 M4
 
IBM System x3650 M4
IBM System x3650 M4IBM System x3650 M4
IBM System x3650 M4
 
IBM System x3500 M3
IBM System x3500 M3IBM System x3500 M3
IBM System x3500 M3
 
IBM System x3400 M3
IBM System x3400 M3IBM System x3400 M3
IBM System x3400 M3
 
IBM System x3250 M3
IBM System x3250 M3IBM System x3250 M3
IBM System x3250 M3
 
IBM System x3200 M3
IBM System x3200 M3IBM System x3200 M3
IBM System x3200 M3
 
IBM PowerVC Introduction and Configuration
IBM PowerVC Introduction and ConfigurationIBM PowerVC Introduction and Configuration
IBM PowerVC Introduction and Configuration
 
A Comparison of PowerVM and Vmware Virtualization Performance
A Comparison of PowerVM and Vmware Virtualization PerformanceA Comparison of PowerVM and Vmware Virtualization Performance
A Comparison of PowerVM and Vmware Virtualization Performance
 
IBM pureflex system and vmware vcloud enterprise suite reference architecture
IBM pureflex system and vmware vcloud enterprise suite reference architectureIBM pureflex system and vmware vcloud enterprise suite reference architecture
IBM pureflex system and vmware vcloud enterprise suite reference architecture
 
X6: The sixth generation of EXA Technology
X6: The sixth generation of EXA TechnologyX6: The sixth generation of EXA Technology
X6: The sixth generation of EXA Technology
 

Steve Mills Senior Vice President and Group Executive IBM Software and Systems

  • 1. Steve Mills Senior Vice President and Group Executive IBM Software and Systems
  • 2.
  • 3. Smarter Planet Solutions Increasing Demands on IT Business transactions / day over the Internet by 2020 Wearable (wireless) health monitors by 2014 from 12M in 2012 Worldwide sensor market in 2011, forecasted to grow to $240B in 2016 Wireless sensors over 10 km2 for Shell oil exploration project E-mails sent daily from a total of 3.4B e-mail accounts; volume growing to in 2015 Internet users worldwide, growing to in 2017 Social networking accounts, projected to grow to in 2015 Mobile phones worldwide
  • 4. Increased Demands on IT Data centers have their energy use in the past five years  increase in data center energy costs projected servers worldwide  idle computer capacity  of servers run 24/7 without being actively used on a daily basis Between 2000 and 2010  servers grew  storage grew Virtual machines growing Internet connected devices to 1 Trillion devices by 2017
  • 5. An Explosion of Data Google processes > of data in a single day Hadron Collider at CERN generates of usable data / day Facebook processes of data daily Twitter processes of data daily AT&T transfers about of data through its network daily For every session, NY Stock Exchange captures of trade information By 2016, annual Internet traffic will reach global size of “Big Data” in Healthcare, growing between 1.2 and 2.4 EX / year
  • 6. Volume Variety Velocity Data Overload… but Lacking Insight 2009 2020 as much Data and Content Over Coming Decade 2012 Business leaders make decisions based on information they don’t trust, or don’t have say they feel overwhelmed by the amount of data their company manages say they need to do a better job capturing and understanding information rapidly cited “BI & Analytics” as part of their visionary plans to enhance competitiveness
  • 7. IT Operating Costs Source: IDC, 2012 Power and cooling costs 63% 8% 29% 1996 43% 11% 46% 2001 33% 16% 51% 2006 21% 12% 67% 2012 New Server spending Worldwide Spending on Servers, Power, Cooling & Management Administration Server management and admin costs
  • 9. IT Must Break through Budget and Resource Barriers Getting Up and Running  2-3 months to specify and procure  2-3 months to integrate, configure and deploy Development Operations  3-6 months to go from development to production Ongoing Effort  1-3 months to troubleshoot and tune  Ongoing effort and downtime to maintain, scale and upgrade IT Reality Business Goals  Driving business innovation  Make new markets  Respond to competitive threats  Enhance the customer experience Grow top and bottom line by Typical Results  23% of new IT projects (worldwide) deploy late  55% experience application downtime for major infrastructure upgrades once deployed Source: A commissioned study conducted by Forrester Consulting on behalf of IBM
  • 10. Clients Struggle to Overcome Barriers of Time, Cost & Risk Top Causes of Project Delays Hardware Troubleshooting and tuning production environment Integration, configuration and testing of the infrastructure Installation, cabling and network access for the environment Software Integration, configuration and testing of applications Integration, configuration and testing of middleware Configuration, build and deployment of applications Phase Time (days) Budget Specify/design 73 - 96 14% - 16% Procure 57 - 112 19% - 21% Implement 74 – 93 12% Configure/test 74 – 80 10% - 11% Cluster & HA 66 – 104 11% - 12% Backup 44 – 108 10% Tune 89 – 98 9% - 10% Management 67 – 110 9 – 10% Typical IT Project Time and Budget Source: A commissioned study conducted by Forrester Consulting on behalf of IBM of new IT projects (US) deploy late
  • 11. Only 1 in 5 Can Allocate More than Half Their IT Budget to Innovation Maintaining existing infrastructure New projects Maintaining existing infrastructure New projects Most Efficient IT Organizations More effective use of technology first and fast technology adoption move virtual machines to meet desired outcomes use storage virtualization use a storage service catalog (tiered storage) Less effective use of technology first and fast technology adoption move virtual machines to meet desired outcomes use storage virtualization use a storage service catalog (tiered storage) Less Efficient IT Organizations
  • 12. IT Security Is Critical average cost per data breach in 2011 security incidents in 2011, compromising records consumer cybercrime victims in 2011, or 18 adults became a victim every second cost of losing customer loyalty (lost business) following a data breach | Hearthland Payment Systems 134M credit cards compromised | TJX Companies 94M credit cards exposed | Epsilon Millions of names and e-mails exposed | RSA Security 40M employee records stolen | Stuxnet Template for real-world intrusion disruptions | US Department of Veterans Affairs 27M names and Social Security numbers stolen | Sony’s PlayStation Network 77M PlayStation accounts hacked | ESTsoft Personal info of 35M South Koreans exposed | Gawker Media 1.3M e-mail addresses & passwords exposed | Google/other Silicon Valley companies Stolen intellectual property
  • 13. of victims were targets of opportunity of attacks were not highly difficult of data compromised involved servers of breaches took weeks+ to discover utilized some form of hacking incorporated malware involved physical attacks employed social tactics resulted from privilege misuse What We Know about Security Breaches stemmed from external agents implicated internal employees committed by business partner of all data theft tied to activist group of incidents discovered by 3rd party of breaches were avoidable through simple or intermediate controls of victims subject to PCI DSS had not achieved compliance
  • 14. 2011 | “The Year of the Targeted Attack” Marketing Services Online Gaming Online Gaming Online Gaming Online Gaming Central Government Gaming Gaming Internet Services Online Gaming Online Gaming Online Services Online Gaming IT Security Banking IT Security Government Consulting IT Security Telecom- munications Entertain- ment Consumer Electronics Apparel Insurance Consulting Consumer Electronics Internet Services Central Govt Central Govt Central Govt Jan Feb Mar Apr May Jun Jul Aug Sep Oct Nov Dec Entertainment Defense Defense Defense Consumer Electronics Central Government Central Government Central Government Central Government Central Government Central Government Central Government Consumer Electronics National Police National Police State Police State Police Police Gaming Financial Market Online Services Defense Heavy Industry Entertainment Banking 2011 Sampling of Security Incidents by Attack Type, Time and Impact Attack Type SQL Injection URL Tampering Spear Phishing 3rd Party Software DDoS SecureID Trojan Software Unknown Consulting Size of circle estimates relative impact of breach in terms of cost to business Agriculture
  • 15. Strategies to Transform IT to Deliver Breakthrough Economics and Value Leading clients are already addressing this IT conundrum through Meeting These Challenges
  • 16. Key Investment Areas Design Matters in the New Era of Computing Transforming Computing Making & Leading New Markets Expert Integrated Systems Optimized Workloads Smarter Analytics Growth Markets Big Data Analytics Smarter Commerce Cloud Cloud Smarter Cities Analytics Security Intelligence Social Business Cognitive Computing Mobile Enterprise Watson Solutions
  • 17. Turning Opportunities into Outcomes | Enabling Growth with Enterprise Systems | Transforming IT with Smarter Storage | Reinvent IT with Cloud Computing | Changing the Economics of IT with IBM PureSystems | Defending Against Cyber-Threats with Security Intelligence | Transforming Critical Business Processes | Unlocking Opportunities with Smarter Analytics and Big Data | Creating Exceptional Experiences with Social Business and Commerce | Extending Reach Securely with Mobile Enterprise | Gaining Competitive Advantage Through Software Innovation