2. Data, Lots of it
New Advanced Aircraft
10 TB every 30 minutes
Off Shore Rig
1.5TB every 2 weeks
Smart Grid
1.1 Billion data points every day
Billions of
data points
every day
Industrial Automation
3. “We are creating more information every ten minutes then
was created since the beginning of recorded history and the
year 2008.”
Dave Evans
Futurist,
March 2014
32. Data, Lots of it
New Advanced Aircraft
10 TB every 30 minutes
Off Shore Rig
1.5TB every 2 weeks
Smart Grid
1.1 Billion data points every day
Billions of
data points
every day
Industrial Automation
35. IOxIOxIOxIOx
Hardened Edge Platforms: Embedded Storage and ComputeHardened Edge Platforms: Embedded Storage and Compute
Application ManagementApplication Management Application StoreApplication Store
IOSIOSIOSIOS
LinuxLinuxLinuxLinux
Distributed Applications
IOx SDK
IOx Enables Applications At The Network Edge
36. Enabling Fog at the Edge
CGR 2010
819 ISR
CGR 1120
CGR 1240
IP Cameras
37. Fear of DerailmentFear of Derailment
Underutilized EquipmentUnderutilized Equipment
Poor Passenger AmenitiesPoor Passenger Amenities
and Servicesand Services
38. Immediate ResponseImmediate Response
to Equipment Failureto Equipment Failure
Real-time Health Status ofReal-time Health Status of
TrainsTrains
New Passenger AmenitiesNew Passenger Amenities
and Servicesand ServicesREPLACEREPLACE
BEARINGSBEARINGS
CAR 07
50. Delivering the right
information to the right
person (or machine) at the
right time
Process
Connecting people
in more relevant,
valuable ways
People
Turning data into more
useful information for
decision making
Data
Physical devices and objects
connected to the Internet and
each other for intelligent
decision making
Things
Internet of everything
Value
51. Internet of Everything Opportunity
Opportunity
Internet
of Everything
IoTCloudBig
Data
Social and
Collaboration
Mobile
Computing
$2.5T in better asset utilization
$4.3T in employee productivity
$2.7T in supply chain logistics
$3.7T in better customer experience
$3T in new innovations
$125B in increased public sector revenue
$19 trillion$19 trillion in value
Public sector $4.6T
Private sector 14.4T
By 2022, the Internet of
Everything will help enable
new productivity, profits and
cost savings with:
Time
53. TECHNICAL SERVICES
ADVANCED /PROFESSIONAL SERVICES
PLATFORM SERVICES
MANAGED SERVICES
It has to be easy
“The majority of a company’s IT budget is used to
maintain the status quo. Currently, 83% of IT budget is
used to simply maintain the current operating
environment. This is up from 75% five years ago.”
– ZK Research
Zeus Kerravaka
54. The IT Challenge – Operational Complexity
Applications/Services
Enterprise Infrastructure
Controllers Virtual Services Infra Security VM Managers Point Tools
Orchestration Security & Compliance Performance Visibility & Monitoring
Provisioning
People and Process ComplexityHundreds of Tools
55. Enabling Fast IT
Management
& Orchestration
Application Security,
Policy & Compliance
Open APIs
Network Intelligence
Automated
Infrastructure Provisioning
Integrated Element
Management
Policy-based
Infrastructure Security
Automated
Infrastructure Provisioning
Integrated Element
Management
Policy-based
Infrastructure Security
Physical & Virtual Infrastructure
Management
& Orchestration
Application Security,
Policy & Compliance
Open APIs
Network Intelligence
Applications/Services
Application Centric Infrastructure (ACI)
56. Single Network (Physical/Virtual)
Cisco Application Centric Infrastructure
(ACI)Built on a common Policy Model
Infrastructure Abstraction and Access to Network Intelligence Enable Business Innovation
Identity
Location
Device Type
Device Posture
SLA
QoS
Security
Load Balancing
APIC EM
Common Policy Model
Applications/Services
Application Centric Infrastructure (ACI)
Northbound
API’s
Southbound
API’s
57. Cisco ACI Common Policy Model
Consistent Policy Across DC, WAN and Access
DATA CENTER ACCESSWAN
Application Network Profile
SLA, Security, QoS, Load Balancing
User/Things Network Profile
QoS, Security, SLA, Device
APIC EMAPIC EM
APPLICATION
PROFILE
USER
ACCESS
58. What We’re Doing – Accelerating Cloud Services
Enterprise
Private
Clouds
Public
Clouds
Partner
Clouds
Intercloud Fabric
APIs
Portal
APIs
Enterprise
Workloads
Native Cloud
Applications
Big Data &
Analytics
Collaboration
& Video
HCS
IaaS
PaaS
Microsoft
Suite aaS
DRaaS
Meraki
Analytics
WebEx
Security
IOE aaS
HANA aaS
vDesktop aaS
Cloud Services
& Applications
APIs
So, why did we go down this path?
One of the things that has happened is that the IT work used to be very fragmented in it’s connectivity, you used to have:
Ethernet
token ring
FDDI
ATM
all of those different types of physical connection options.
Over the past two decades we have seen a great standardization and convergence towards Ethernet, wifi and IP
But when we look at the industrial side, you’ve got:
zigbee
z-wave
usb
LTE
wimax
all of these different types of physical or logical transports
And we know those are going to exist for a long time to come.
Because they are not all solving for the exact same problem
So people want a lot of diversity of interfaces to be able to connect these gateways.
They want to be able to talk to sensors over a wide range of options. So they show up with a module…an interface….
I’ve got a nice wihart this, or a zigbee that and the challenge that presents in terms of how do we backhaul that traffic is that ….now you have a dongle that you want to plug into my router.
I have to write a device driver in IOS…that is going to take us nine months. IOS is a monolithic operating system and we have to write it, test it, regression test it, integrate it into a release…which is not very agile or very nimble.
This means we are going to be at this for YEARS trying to connect all of these different devices.
IOX allows these companies to come with their dongle, they often already have a linux driver, they can simply recompile and test deliver that driver in the IOX environment in a number of hours.
Effectively what they have done is extended our routers which has A set of functionality with additional functionality.
This is not just for IO, given that we have a full linux environment there you could deploy any kind of linux application.
The IOX framework is essentially covering the fact that we are running IOS and linux running side by side and adding these two additional components
That allow you to choose the applications, efficiently deploy them to the router
Then once the applications are running you may want to start them, stop them, update them, etc. so there is management capabilities as well.
All of this is covered under this software framework we call IOX.
***********************************************************************
New application enabled environment enabled across our lines of IOT routers, switches, access points, servers, and cameras
Built with Industry standard operating systems support complimenting several decades of Cisco’s investment in the award winning Internetworking Operating System (IOS)
Allows customers and partners to bring their own application to the infrastructure level with a high degree of distribution
Allows for Cisco value adds to IOS built in a dynamic environment to address the rapidly evolving and diverse IOT interface requirements
IOx SDK provides applications with the ability to get deeper into data as it travels through the network
Complete architecture including compute and storage resources along with application hosting and management
Whether it’s a passenger train in a bustling city or a freight train slithering through the mountainside, news of derailment is a tragic story. You may have heard about the fatal train accident in New York City’s Bronx or the recent incident in Philadelphia where a train hauling crude oil was dangling over a river. The US federal government has seen more oil spilled in rail incidents in 2013 than was spilled in the nearly four decades since it began collecting data. The demand for preventative measures is greater than ever.
Train derailment is typically due to equipment failure, specifically in the ball bearings of a wheel. Today, train operators have routine schedules to swap out wheels and engines without fully knowing if the equipment is used beyond repair. Or in worse case scenarios, damaged equipment is not replaced in time to prevent failure and accidents.
In addition to performance, train operators face fierce competition from alternative transportation providers and must find ways to offer better amenities and services to retain and attract new passengers.
These are just a few of the concerns rail companies are hoping IoT and Cisco will address.
So if we go back to the examples we shared with you earlier, an 819 router sitting on a freight train can monitor the ball-bearings and monitor the utility of bearing to let you know if its overheating or has worn down to 35% of useful material. An alert can be sent to the train operator notifying him to pull over at the next available station or to stop and repair the wheel.
Finding the data is not difficult, but choosing the best data to use from among all the data available can be difficult. The challenge is how to manage and extract value from a constant stream of information and turn it into a competitive advantage.
With the right infrastructure, Data in Motion becomes faster and cheaper to use than Data at Rest because Data in Motion is easier to locate and does not need to be retrieved from its stored state and then pushed through the analytical engines.
To better understand this definition, we must first break down IoE’s individual components.
People: As the Internet evolves toward IoE, we will be connected in more relevant and valuable ways. Today, most people connect to the Internet through their use of devices (such as PCs, tablets, TVs, and smartphones) and social networks such as Facebook. In the future, people will be able to swallow a pill that senses and reports the health of their digestive tract to a doctor over a secure Internet connection. In addition, sensors placed on the skin or sewn into clothing will provide information about a person’s vital signs. According to Gartner, people themselves will become nodes on the Internet, with both static information and a constantly emitting activity system.
Process: Process plays an important role in how each of these entities — people, data, and things — works with the others to deliver value in the connected world of IoE. With the correct process, connections become relevant and add value because the right information is delivered to the right person at the right time in the appropriate way.
Data: With IoT, devices typically gather data and stream it over the Internet to a central source, where it is analyzed and processed. As the capabilities of things connected to the Internet continue to advance, they will become more intelligent by combining data into more useful information. Rather than just reporting raw data, connected things will soon send higher-level information back to machines, computers, and people for further evaluation and decision making. This transformation from data to information in IoE is important because it will allow us to make faster, more intelligent decisions, as well as control our environment more effectively.
Things: This group is made up of physical items such as sensors (e.g. pressure, radio activity, image, temperature, vibration), consumer devices, enterprise assets that are connected to both the Internet and one another, RFID (a simple tag that can used to identify an object) and "actuators.” An actuator is an object that makes an "action": for example, it could turn off an engine, a light, or start a process to control a more complex system. In IoE, these things will sense more data, become context-aware, and provide more experiential information to help people and machines make more relevant and valuable decisions. Examples of “things” in IoE include smart sensors built into structures like bridges, and disposable sensors that will be placed on everyday items such as milk cartons.
Organizations are starting to understand the potential value presented by the market transition to the Internet of Everything. The possibilities unleashed by connecting new things, unlocking new sources of data, combining those with people collaborating or undertaking new tasks, and innovating new or optimizing existing processes are immense. The potential value at stake across private industries alone is estimated to exceed $14.4 trillion by 2022.
This is our strategic framework that brings together our historical strengths to help our customers adapt their existing network investments to meet the changing demands of IT and develop the model for next generation IT
This is the strategy that will help us capitalize on the value at stake with the Internet of Everything and be the #1 IT Company
Technology and business transitions are changing the role and expectations of IT.
Over the past few years, a number of technology trends have been impacting companies, organizations and consumers. These can be summed up into five major technology transitions
Mobile: handling increased users, devices, high bandwidth content, and cloud
Cloud: shift to Cloud is creating new architectures, applications, control points, services and business models
New breed of applications: move from Client Server to Mobile Cloud
IoT: ubiquitous connectivity, computing & intelligence and machine-to-machine connections
Data & Analytics: shift from centralized databases & analytics with structured, static data distributed databases of unstructured & structured data with real-time info flows which leads to real-time decision making
These transitions and other macroeconomic trends are impacting businesses such that organizations care about
Growth & Productivity: capitalizing on growth opportunities (open new markets, increase penetration, etc.) and increasing innovation & productivity to address these opportunities more efficiently and in a more agile manner
New Business Models: having / developing more flexible consumption models; capex-based more opex-based models (e.g., adapting to mobile and cloud delivery / interaction, outcomes based, accelerating service creation)
Experience expectations: increasing employee and customer expectations with the proliferation of devices and Cloud services in the workplace (“anywhere, anytime” demand). In addition, organizations are looking for greater linkages to drive business processes and business outcomes
Globalization: global talent and a globally dispersed workforce, emerging market requirements and indigenous innovation
Security & Compliance: increasing expectations from users around the world with security, regulation and compliance requirements (e.g., from malicious to competitive; cyber security, geo-political)
In addition, IT budgets are shifting to the Line of Businesses. Together, this changing world results in a changing role of IT… to accommodate the technology transitions while dealing with the business implications we all face.
Management orchestration SW that enables application
Today’s Network is complex, not flexible. We need to create a layer between applications and the network to make the network more relevant
Today apps developer really don’t come to the NW level., they take the NW for granted. So we need to make it easier to tap in and leverage the potential to do what they have to do
The Infrastructure has to support apps, and in our current state the infrastructure is too complex. Need to create layer to abstract the NW to make it simpler for applications to deliver value to the customer.
We previewed our strategy earlier using the Unified Platform. However as we have continued our development we are continuing to refine it.
The Infrastructure Provisioning, Element Management and Infrastructure Security & Policy are part of the physical and virtual infrastructure; CISCO ONE; ONE is Open Network Environment. Service Management, Orchestration and APP Security Policy & Compliance becomes part of the Cloud Enablement Platform.
Even though we are calling it the Cloud Enablement platform, it really is the Application Enablement platform for all applications not just cloud ones.
Management orchestration SW that enables application
Today’s Network is complex, not flexible. We need to create a layer between applications and the network to make the network more relevant
Today apps developer really don’t come to the NW level., they take the NW for granted. So we need to make it easier to tap in and leverage the potential to do what they have to do
The Infrastructure has to support apps, and in our current state the infrastructure is too complex. Need to create layer to abstract the NW to make it simpler for applications to deliver value to the customer.
We previewed our strategy earlier using the Unified Platform. However as we have continued our development we are continuing to refine it.
The Infrastructure Provisioning, Element Management and Infrastructure Security & Policy are part of the physical and virtual infrastructure; CISCO ONE; ONE is Open Network Environment. Service Management, Orchestration and APP Security Policy & Compliance becomes part of the Cloud Enablement Platform.
Even though we are calling it the Cloud Enablement platform, it really is the Application Enablement platform for all applications not just cloud ones.
IN CLOSING, CISCO SECURITY NOW HAS THE INDUSTRY’S MOST COMPREHENSIVE ADVANCED THREAT PROTECTION COVERING THE ENTIRE ATTACK CONTINUUM
AND THE INDUSTRY’S BROADEST SET OF ENFORCEMENT AND REMEDIATION OPTIONS AT ATTACK VECTORS WHERE THREATS MANIFEST
THE CISCO SECURITY PORTFOLIO HAS SPECIFIC PLATFORM BASED SOLUTIONS TO SOLVE YOUR CURRENT PROBLEMS, BUT ALSO INTEGRATE INTO AN OVERALL SECURITY SYSTEM.
THEY WORK TOGETHER TO PROVIDE PROTECTION THROUGHOUT THE ATTACK CONTINUUM – BEFORE, DURING, AND AFTER AN ATTACK
IN CLOSING, CISCO SECURITY NOW HAS THE INDUSTRY’S MOST COMPREHENSIVE ADVANCED THREAT PROTECTION COVERING THE ENTIRE ATTACK CONTINUUM
AND THE INDUSTRY’S BROADEST SET OF ENFORCEMENT AND REMEDIATION OPTIONS AT ATTACK VECTORS WHERE THREATS MANIFEST
THE CISCO SECURITY PORTFOLIO HAS SPECIFIC PLATFORM BASED SOLUTIONS TO SOLVE YOUR CURRENT PROBLEMS, BUT ALSO INTEGRATE INTO AN OVERALL SECURITY SYSTEM.
THEY WORK TOGETHER TO PROVIDE PROTECTION THROUGHOUT THE ATTACK CONTINUUM – BEFORE, DURING, AND AFTER AN ATTACK
60/30/10 2012
10/30/60 2020 – Neil McDonnald