Changing                                           STKIData Center                                        Summit          ...
Pini Cohen and Sigal Russin’s work/         Copyright@2013Do not remove source or attribution from any       slide, graph ...
Agenda                        TechnologyMega Trends            Domain Trends                                     Pini Cohe...
The New ITOperations-different thinking• 18 Million Visitors, 10x Growth,12 Employees, 410 TB of Data         Pinterest• A...
Domains of change•   Focus on generating business value through agility and flexibility•   Move to distributed architectur...
Old Datacenter                    New Cloud DatacenterLicensed and Installed Applications   SaaS (Workday, Pagerduty, EMR)...
Old Datacenter                         New Cloud DatacenterSA/Database/Storage/Networking Admins    NoOps/OpsDoneMaturelyB...
You need to change! Source: http://www.forbes.com/pictures/eghe45eefgi/16-things-to-think-about-when-youre-considering-a-c...
Traditional IT is changingLOB       LOB          LOB                                                     Enterprise       ...
The next IT OrganizationLine of Businesses       Pay per                         Software House                           ...
The new CIO/VPTech has to become:An internal strategic consultant more like (the model) HR, legal, financial VPs.    Tha...
IT Delivery Services DepartmentIT Delivery Services move:     from an infrastructure-component focused IT that is expens...
The new InfrastructureDelivery manager has to deliver:•   Enable consumerization (BYOEverything)•   Business enablement wi...
AgendaBYOEverything         Security                                    BusinessConsumerization          &                ...
Consumerization of IT (CoIT)• This mega trend is more than a decade old.• People are resourceful. They’ll find what they n...
Implications of the changing endpoint paradigm• The new endpoint experience• BYOD• What will happen to the suppliers    C...
Source: cisco survey BYOD 2012                                                   BYOE                                  Pin...
BYOE Pini Cohen and Sigal Russins work          Copyright@2013Do not remove source or attributionfrom any slide, graph or ...
BYOE Pini Cohen and Sigal Russins work          Copyright@2013Do not remove source or attributionfrom any slide, graph or ...
BYOE Pini Cohen and Sigal Russins work          Copyright@2013Do not remove source or attributionfrom any slide, graph or ...
BYOE Pini Cohen and Sigal Russins work          Copyright@2013Do not remove source or attributionfrom any slide, graph or ...
KSP is selling tablets and smartphones                                                           BYOE                     ...
Bring Your Own Device• It is happening?• Does your organization support BYOD devices (smartphones)?                       ...
BYOD Usage and Policies Do employees access          Does your organization have a business information         BYOD polic...
BYOD Risk Classification Information security Employee privacy Software Licensing - Is software acquired by the   busin...
BYOD                Bring Your Own Device Saving in                            Where tooutlay on IT         A policy      ...
BYOE Pini Cohen and Sigal Russins work          Copyright@2013Do not remove source or attributionfrom any slide, graph or ...
BYOD      Bring Your Own Device PolicyWhat types of devices (version of the operating system) canaccess to business resour...
Access business information using BYOD            ‫האם בארגונכם מאפשרים סנכרוןחיבור מכשירים חכמים‬            ? )‫טלפון פר...
MAC       MAC ‫האם בארגונכם מאפשרים סנכרוןחיבור‬     ?)‫פרטיים למאגרי מידע בארגון (אימייל, אפליקציה‬   75%     ‫לא‬       ...
BYOD Policy           ‫האם בארגונך קיימת מדיניות ברורה בנושא של‬           ?‫- יישומים מותר להתחבר ולאיזה אסור‬BYOD       ...
BYOD importanceSource: STKI RT MDM BYOD Survey FEB 2013                                                                   ...
MDM process     ‫האם ארגונכם הטמיע/נמצא בתהליך הטמעת מוצר‬       ‫ או פתרון‬MDM ( ‫אבטחת מידע/ניהול למובייל‬              ...
Privacy employee concern        ‫האם קיים בארגונך חשש מפגיעה בפרטיות‬          ?MDM ‫העובד בעת שימוש בכלי מסוג‬Source: STK...
‫1102 ‪Important issues when choosing MDM solution‬‬                                                                      ...
‫3102 ‪Important issues when choosing MDM solution‬‬                                                                 ‫3102...
Management Requirements for MobileA. Configuration and protection of lost or compromised devices- password    enforcement,...
Mobile Device Security    • Beware of Wi-Fi- in public places such as hotels, restaurants, cinema etc.1    • Turn off Blue...
Secure Sandbox vs. Secure container -MAM                                                                                  ...
Mobile Device Management -Israeli Market Positioning 1Q13                                                   Mobile Iron   ...
Mobile Container Management -Israeli Market Positioning 1Q13                                                              ...
Case Study - IBM PolicyIBM still gives BlackBerrys to about 40,000 of its 400,000 employees, 80,000other workers now reach...
BYOD challenges (Case study IBM internal work)• Providing modern and secure network access that supports:    • Personally ...
Addressing the challenges with a four-pronged approachTechnology:                                                         ...
Develop a strong usage policyo Use of personal devices for business purposes is voluntary.o Eligible employees (all except...
Develop a strong usage policyo Employee agrees to allow IBM to inspect or take possession of the device  upon request.o IB...
Summary - BYODI.      Have sensible, but not restrictive, policies.        Emphasize user education about the threats such...
PC sales are down                                    Suppliers                                     Change                 ...
These changes influence NasdaqMicrosoft      Apple                                                        Suppliers       ...
Suppliers                 Change Pini Cohen and Sigal Russins work          Copyright@2013Do not remove source or attribut...
Windows 8 for “regular” PC’s                                               Suppliers                                      ...
Microsoft: from SW (license) to Services• Computerworld has confirmed that Office 2013 is   permanently locked to the orig...
Microsoft is looking for new way to do business• Windows Blue confirmed in new Microsoft job listings: “Windows Blue  prom...
However• Service = Subscription = Rental• The “Cloud way” - you pay for what you need – can grow or  reduce seats• There i...
Mobile will cause new development paradigm                         Source: http://www.kendoui.com/surveys/global-developer...
Enterprise App Store                                                                                                      ...
A new eraSource: http://www.socialtechpop.com/2010/10/old-vs-new-trends-in-social-media/                                  ...
AgendaBYOEverything        Security                                   BusinessConsumerization         &                   ...
Open Networking Foundation on SDN   … In the SDN architecture, the control and dataplanes are decoupled, network intellige...
Enabling               technologies Pini Cohen and Sigal Russins work          Copyright@2013Do not remove source or attri...
SDN Vendorso Cisco: Open Networking Environment (ONE), EEM (Tcl),  Python scriptingo Juniper: Junos XML API and SLAX (huma...
Case Study                              Enabling                            technologies              Pini Cohen and Sigal...
Enabling               technologies Pini Cohen and Sigal Russins work          Copyright@2013Do not remove source or attri...
Key aspects of SDNI.   Separation of data and control planesII.  A uniform vendor-agnostic interface such as OpenFlow     ...
Today Networking Devices                   BA                                          1   C                              ...
Current Networking Systems                                                 Enabling  Microsoft   ERP   SAP   CRM          ...
The “Software-Defined Network”                     Microsoft     ERP      SAP      CRM                                    ...
Current technology                 Future technology   ERP          SAP           CRM        ERP          SAP             ...
“S” for Software                                                                                                          ...
SDN Benefits                                                                   SDN allows companies to:Manage Change      ...
Open Flow    Today, your Routing Protocols / STP determine the Forwarding Table in     your network.    OpenFlow is anot...
Enabling               technologies Pini Cohen and Sigal Russins work          Copyright@2013Do not remove source or attri...
Pini Cohen and Sigal Russins work          Copyright@2013Do not remove source or attributionfrom any slide, graph or porti...
Pini Cohen and Sigal Russins work          Copyright@2013Do not remove source or attributionfrom any slide, graph or porti...
Summary - SDNA. You should have clear vision about how SDN technology will   benefit your business.B. It is very early day...
application(s)                Server              file-system         ScaleIO Server                                      ...
Other vendors are following this trend                                                                Enabling            ...
• Does :                                                           EnablingSoftware Defined Network                       ...
Software Defined Datacenter• Forrester: An SDDC is an integrated abstraction layer that defines  a complete data center by...
STKI on Software Defined Datacenter• Two main vectors in Software Defined X:                                              ...
EnablingSource: http://atea.lt/wp-content/uploads/2012/11/5-3-Datacenter-of-the-future-Atea-Action-2012.pdf               ...
Enabling                                                                                                                  ...
Facebook changed the DC industry : Open Compute Project• Open Compute Project: internet/cloud companies working collaborat...
Enablingtechnologies      Source: SAP                Pini Cohen and Sigal Russins work                         Copyright@2...
SAP HANA•   From Disk to RAM•   From Row to Column•   From Text to Binary•   Compression of data•   New data manipulation ...
Enabling               technologies Pini Cohen and Sigal Russins work          Copyright@2013Do not remove source or attri...
GPGPU• General-purpose computing on graphics processing units  (General-purpose graphics processing unit, GPGPU, GPGP or  ...
The GPU-Force!                                                    Enabling                                                ...
Amax GPGPU Cluster                                      Enabling                                    technologies          ...
Intel’s Xeon PHI                                    Enabling                                  technologies                ...
The SQream Product Topology                                                                                         Enabli...
Technology                                                             Enabling• Data Crunching:                          ...
The internet of things• “Devices are smart” and have                                    You have fever                    ...
Internet of things (sensor/computer to computer)• "Always On" world around us   • Cheap, smart, small, image recognition, ...
95                                                                                                                        ...
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Stki summit2013 infra_pini sigal_mega_v10 final
Upcoming SlideShare
Loading in …5
×

Stki summit2013 infra_pini sigal_mega_v10 final

1,518 views

Published on

In this presentation we have gathered the most important technology trends related to infrastructure and operations including end user devices revolution (BYOD, etc.), new HW advances (GPGPU, ARM servers), Open Source, Cyber security and cloud.

Published in: Technology
0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
1,518
On SlideShare
0
From Embeds
0
Number of Embeds
338
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Stki summit2013 infra_pini sigal_mega_v10 final

  1. 1. Changing STKIData Center Summit 2013 Pini Cohen Sigal Russin IT at the crossroads: Lead, follow or get out of the way
  2. 2. Pini Cohen and Sigal Russin’s work/ Copyright@2013Do not remove source or attribution from any slide, graph or portion of graph 2
  3. 3. Agenda TechnologyMega Trends Domain Trends Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or 3 attribution from any slide, graph or portion of graph 3
  4. 4. The New ITOperations-different thinking• 18 Million Visitors, 10x Growth,12 Employees, 410 TB of Data Pinterest• An organization with 2 backend engineers can now scale a Instagram system to 30+ million users.• ~1000 hardware nodes in production and ~20 engineers Tumblr• Continuous deployment happens 25 times a day because it’s so Etsy easy.• No architects, engineers work across the entire stack. You own TripAdvisor your project end to end, and are responsible for design, coding, testing, monitoring. Most projects have 1-2 engineers. Amazon• You build it, you run it Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 4
  5. 5. Domains of change• Focus on generating business value through agility and flexibility• Move to distributed architectures• Move away from ownership as a core competency• Separation of concerns along services boundaries• Decentralization and reorganization of processes around services• Push of responsibility to as close to the developer as possible Source: http://highscalability.com/blog/2012/5/7/startups-are-creating-a-new-system-of-the-world-for-it.html STKI modifications Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 5
  6. 6. Old Datacenter New Cloud DatacenterLicensed and Installed Applications SaaS (Workday, Pagerduty, EMR)Central SQL Database Distributed Key/Value NoSQL Source: http://highscalability.com/blog/2012/5/7/startups-are-creating-a-new-system-of-the-world-for-it.html STKI modificationsSticky In-Memory Session Shared Memory Cache SessionTangled Service Interfaces Layered Service InterfacesInstrumented Code Instrumented Service PatternsFat Complex Objects Lightweight Serialized ObjectsComponents as Jar Files Components as ServicesChatty Protocols Latency Tolerant ProtocolsManual and Static Tools Automated and Scalable Tools Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 6
  7. 7. Old Datacenter New Cloud DatacenterSA/Database/Storage/Networking Admins NoOps/OpsDoneMaturelyButStillOps Source: http://highscalability.com/blog/2012/5/7/startups-are-creating-a-new-system-of-the-world-for-it.html STKI modificationsMonolithic Software Development Teams Organized around ServicesMonolithic Applications Building Your Own PaaSStatic and Slow Growing Capacity Incremental and Fast Growing CapacityHeavy Process/Meetings/Tickets/Waiting Better Business AgilitySingle Location Massive Geographical DistributionVendor Supply Chains Direct to DeveloperFocus on How Much it Costs Focus on How Much Value it BringsOwnership/CapEx Leasing/OpEx/Spot/Reserved/On Demand Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 7
  8. 8. You need to change! Source: http://www.forbes.com/pictures/eghe45eefgi/16-things-to-think-about-when-youre-considering-a-career-change/ Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 8
  9. 9. Traditional IT is changingLOB LOB LOB Enterprise CIO Procurement OCIO IT ProcurementSoftware Development IT Infrastructure Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 9
  10. 10. The next IT OrganizationLine of Businesses Pay per Software House UseEnterprise Procurement IT Delivery Services Managed Services Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 10
  11. 11. The new CIO/VPTech has to become:An internal strategic consultant more like (the model) HR, legal, financial VPs. That will help the business move from enterprise IT productivity to business productivityDevelops the Enterprise Digital Strategy that builds value through innovation: Technology solutions for the LOBs and manages the business change needed (new business processes) Leadership in tablet efforts because business-driven tablet programs will uncover transformative opportunities Defines and implements technology (used by the clients of the enterprise) in order to increase revenues Dr. Jimmy Schwarzkopf’s work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 11
  12. 12. IT Delivery Services DepartmentIT Delivery Services move:  from an infrastructure-component focused IT that is expensive to sustain and maintain to one focused on end-to-end service management, user experience and “fair” chargeback policiesDatacenter transformation, consolidations, vendor management, cloud, and application rationalization mandate: Formal governance structures for operational risks. Automation of management and control functionalities Secure access of users based on location and function Charges for “real” metered service delivery Validates, audits, protects, backups data Validates cloud provider service levels (SLAs) Dr. Jimmy Schwarzkopf’s work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 12
  13. 13. The new InfrastructureDelivery manager has to deliver:• Enable consumerization (BYOEverything)• Business enablement with best of class technologies. Examples: • Follow Software Defined X • Take advantage of new HW technologies (in memory, GPU, ARM servers) • Big Data• Manages operational risk, security and cyber for all technologies the enterprise uses• Infrastructure investment model – continues cost reduction• Manages the IT Department as an IT vendor with new InfraOps delivery model: • Private Cloud, automation, self service and chargeback tools • Embrace infrastructure as code • Deploy public cloud when possible Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 13
  14. 14. AgendaBYOEverything Security BusinessConsumerization & enabling Cyber technologies Infrastructure The new investment infraops model-cost delivery model reduction Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 14
  15. 15. Consumerization of IT (CoIT)• This mega trend is more than a decade old.• People are resourceful. They’ll find what they need to be successful. They’ll bring what they need to drive the business forward.• Whether it’s the proliferation of mobile devices or on- demand software, business people are driving IT.• Most companies allow for it. Few can effectively deliver applications or governance to support it. BYOE Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 15
  16. 16. Implications of the changing endpoint paradigm• The new endpoint experience• BYOD• What will happen to the suppliers  Changing business model• New Application development technology and functionality  SW distribution – APP stores BYOE Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 16
  17. 17. Source: cisco survey BYOD 2012 BYOE Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 17
  18. 18. BYOE Pini Cohen and Sigal Russins work Copyright@2013Do not remove source or attributionfrom any slide, graph or portion of graph 18
  19. 19. BYOE Pini Cohen and Sigal Russins work Copyright@2013Do not remove source or attributionfrom any slide, graph or portion of graph 19
  20. 20. BYOE Pini Cohen and Sigal Russins work Copyright@2013Do not remove source or attributionfrom any slide, graph or portion of graph 20
  21. 21. BYOE Pini Cohen and Sigal Russins work Copyright@2013Do not remove source or attributionfrom any slide, graph or portion of graph 21
  22. 22. KSP is selling tablets and smartphones BYOE Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 22
  23. 23. Bring Your Own Device• It is happening?• Does your organization support BYOD devices (smartphones)? Source: http://blogs-images.forbes.com/johnherrema/files/2012/03/BYOD-support.jpg BYOE Source: GOOD technologies survey 2012 Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 23
  24. 24. BYOD Usage and Policies Do employees access Does your organization have a business information BYOD policy to access businessusing personal devices? information? BYOE Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 24
  25. 25. BYOD Risk Classification Information security Employee privacy Software Licensing - Is software acquired by the business be installed on BYOD device? Damage to the BYOD device by business IT – who is responsible? Technological risk –the more connections you have the lower performance (applications, SSL VPN, WI-FI) Is there any increase in human Resources with BYOD? Increase the use of identity access management tools BYOE Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 25
  26. 26. BYOD Bring Your Own Device Saving in Where tooutlay on IT A policy Start? items document on BYOD  Supported Devices  Access Permission Productivity  Using VPN Security  Set passcodes BYOE Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 26
  27. 27. BYOE Pini Cohen and Sigal Russins work Copyright@2013Do not remove source or attributionfrom any slide, graph or portion of graph 27
  28. 28. BYOD Bring Your Own Device PolicyWhat types of devices (version of the operating system) canaccess to business resourcesWhich Access level your different groups of users requireWhat applications are required for a user.A VPN is required for personnel likely to be using public Wi-Fi networks.Educate users about the importance of setting passwordsand passcodes BYOE Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 28
  29. 29. Access business information using BYOD ‫האם בארגונכם מאפשרים סנכרוןחיבור מכשירים חכמים‬ ? )‫טלפון פרטיים למאגרי מידע בארגון (אימייל, אפליקציה‬ 31% ‫לא‬Source: current Analysis inc. BYOD survey 69% ‫כן‬ Source: STKI RT MDM BYOD Survey FEB 2013 BYOE Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 29
  30. 30. MAC MAC ‫האם בארגונכם מאפשרים סנכרוןחיבור‬ ?)‫פרטיים למאגרי מידע בארגון (אימייל, אפליקציה‬ 75% ‫לא‬ 25% ‫כן‬Source: STKI RT MDM BYOD Survey FEB 2013 BYOE Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 30
  31. 31. BYOD Policy ‫האם בארגונך קיימת מדיניות ברורה בנושא של‬ ?‫- יישומים מותר להתחבר ולאיזה אסור‬BYOD 25% ‫בתהליך‬ 44% ‫לא‬ 31% ‫כן‬Source: STKI RT MDM BYOD Survey FEB 2013 BYOE Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 31
  32. 32. BYOD importanceSource: STKI RT MDM BYOD Survey FEB 2013 BYOE Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 32
  33. 33. MDM process ‫האם ארגונכם הטמיע/נמצא בתהליך הטמעת מוצר‬ ‫ או פתרון‬MDM ( ‫אבטחת מידע/ניהול למובייל‬ ?)‫דומה‬Source: STKI RT MDM BYOD Survey FEB 2013 BYOE Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 33
  34. 34. Privacy employee concern ‫האם קיים בארגונך חשש מפגיעה בפרטיות‬ ?MDM ‫העובד בעת שימוש בכלי מסוג‬Source: STKI RT MDM BYOD Survey FEB 2013 BYOE Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 34
  35. 35. ‫1102 ‪Important issues when choosing MDM solution‬‬ ‫תמיכה במגוון מערכות הפעלה‬ ‫3‬ ‫אכיפת מדיניות ארגונית על המכשיר‬ ‫1‬ ‫אבטחת מידע על המכשיר (ססמאות, ‪)AV ,FW‬‬ ‫2‬ ‫הפרדת המידע הארגוני מהמידע הפרטי על המכשיר‬ ‫4‬ ‫ניהול מצאי, קונפיגורציה ו ‪ Image‬של המכשיר‬ ‫6‬ ‫יכולות הפצת תוכנה ואפליקציות למכשיר‬ ‫8‬ ‫ניהול מרכזי ואינטגרציה למערכות ארגוניות‬ ‫5‬ ‫יכולות תמיכה ותפעול מרחוק של המכשיר (למשל לצרכי ‪)HelpDesk‬‬ ‫6‬ ‫יכולות דיווח וניהול הוצאות כספיות הקשורות למכשיר (למשל: התראות על נדידת רשתות בחו"ל)‬ ‫01‬ ‫ארכיטקטורת הפיתרון (‪ ,SAAS‬שרת באתר, מודל התימחור וכו)‬ ‫9‬‫3102 ‪Source: STKI RT MDM BYOD Survey FEB‬‬ ‫‪BYOE‬‬ ‫‪Pini Cohen and Sigal Russins work‬‬ ‫3102@‪Copyright‬‬ ‫‪Do not remove source or attribution‬‬ ‫‪from any slide, graph or portion of‬‬ ‫‪graph‬‬ ‫53‬
  36. 36. ‫3102 ‪Important issues when choosing MDM solution‬‬ ‫3102‬ ‫תמיכה במגוון מערכות הפעלה‬ ‫2‬ ‫אכיפת מדיניות ארגונית על המכשיר‬ ‫1‬ ‫אבטחת מידע על המכשיר (ססמאות, ‪)AV ,FW‬‬ ‫4‬ ‫הפרדת המידע הארגוני מהמידע הפרטי על המכשיר‬ ‫3‬ ‫ניהול מצאי, קונפיגורציה ו ‪ Image‬של המכשיר‬ ‫6‬ ‫יכולות הפצת תוכנה ואפליקציות למכשיר‬ ‫5‬ ‫ניהול מרכזי ואינטגרציה למערכות ארגוניות‬ ‫7‬ ‫יכולות דיווח וניהול הוצאות כספיות הקשורות למכשיר (למשל: התראות על נדידת רשתות בחו"ל)‬ ‫9‬ ‫ארכיטקטורת הפיתרון (‪ ,SAAS‬שרת באתר, מודל התימחור וכו)‬ ‫8‬ ‫‪BYOE‬‬‫3102 ‪Source: STKI RT MDM BYOD Survey FEB‬‬ ‫‪Pini Cohen and Sigal Russins work‬‬ ‫3102@‪Copyright‬‬ ‫‪Do not remove source or attribution‬‬ ‫‪from any slide, graph or portion of‬‬ ‫‪graph‬‬ ‫63‬
  37. 37. Management Requirements for MobileA. Configuration and protection of lost or compromised devices- password enforcement, encryption enforcement, remote lock and wipe, remote email configuration, certificates for identity, remote connectivity (Wi-Fi, VPN) and detection of compromised OS (jailbreak, rooted etc).B. Data loss prevention (DLP)- privacy control (GIS), cloud usage control (iCloud, dropbox, GoogleDocs) and email DLP controls (protect attachments).C. Provisioning and data security in apps- Google Play market is full of malware. Microsoft and blackberry copied Apple approach. Control your business apps with group policies and content- managements controls. BYOE Source: Mobile Security, Galen M. Gruman, infoworld Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 37
  38. 38. Mobile Device Security • Beware of Wi-Fi- in public places such as hotels, restaurants, cinema etc.1 • Turn off Bluetooth- it can be used to listen in on private conversations. Also on2 laptops. • Connect to your corporate VPN -if you have to use an untrusted network. It enable3 you to connect in “full tunnel” mode. • Keep a close eye on your equipment – never leave any device alone.4 • Don’t share files with strangers using USB keys- it can delete your sensitive data or5 install a malware. Source: information week Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 38
  39. 39. Secure Sandbox vs. Secure container -MAM Mobile Device Management (MDM)- control the user owned device from an Enterprise standpoint. Data meaningful and valuable for the company should not be lost or end up in the wrong hands. Mobile Application Management (MAM) –the ability of the Enterprise to keep control on rolling over or calling back applications deployed in an end-user device without having impact on the user privacy.Source:http://www.webtorials.com/discussions/2012/09/thank-you-mam-new-ways-to-plug-mobile-data-leaks.html BYOE Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 39
  40. 40. Mobile Device Management -Israeli Market Positioning 1Q13 Mobile Iron AirWatch Player Local Support Worldwide FancyFone Leader Symantec Fiberlink Citrix( Zenprise) BoxTone Matrix McAfee Market Presence/Perception BYOE Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 40
  41. 41. Mobile Container Management -Israeli Market Positioning 1Q13 Player Good Local Support Technologies Worldwide Leader Excitor Sybase Market Presence/Perception Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 41
  42. 42. Case Study - IBM PolicyIBM still gives BlackBerrys to about 40,000 of its 400,000 employees, 80,000other workers now reach internal IBM networks using other smart phonesand tablets they purchased themselves.• Disables public file-transfer programs like Apple’s iCloud, dropbox etc.• Turns off Siri- they worried that the spoken queries, which are uploaded to Apple servers, could ultimately reveal sensitive information.• Each employee’s device is treated differently, depending on what model it is and what the person’s job responsibilities are (Email, calender, IBM apps …)• Developing strategies to reduce the risk of data leakage (Wi-Fi hotspot) Source: “Mobile Computing in Question” business impact, MIT 2012 BYOE Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 42
  43. 43. BYOD challenges (Case study IBM internal work)• Providing modern and secure network access that supports: • Personally owned devices Source: IBM http://www.google.co.il/url?sa=t&rct=j&q=&esrc=s&source=web& cd=1&cad=rja&ved=0CCsQFjAA&url=http%3A%2F%2Fwww.esl.dk %2Fmedia%2F35735%2FFredag%2520Carsten%2520B%2520Ander sen%2520Personally- • Partitioning technologies owned%2520devices%2520at%2520IBM%2520(ISACA).ppt&ei=9TI wUevYLseRswbS94G4Bw&usg=AFQjCNFnISWnbM8bhmQSsBLhtrvt -XHGmg&bvm=bv.43148975,d.Yms • Mobile device management • Multiple device types / multiple OS versions• Defining a mobile application portfolio• Providing an easy-to-use “app store” for distribution of applications• Standardization and comprehensive tooling• Supporting a variety of devices, platforms, carriers and countries• Securing access to corporate data and developing strategies to reduce the risk of data leakage (Wi-Fi hotspot)• Addressing unexpected legal or compliance demands BYOE• Managing expenses and determining the right balance of reimbursement Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 43
  44. 44. Addressing the challenges with a four-pronged approachTechnology: Policy: Sunset legacy devices (Symbian, Win  Security (ITCS300) Mobile)  Client Standard Cross link Traveler accounts with IBM 1. Technology  Connection tools and service Endpoint Manager registration expense eligibility (CIO 128) Digital Certification for all mobile  All mobile devices must be devices (1st step authentication) registered in IBM Endpoint Cross link digital certs to IEM and 4. Support 2. Policy Manager network access WiFI protection via enforced registration Containerization solutions Education: Remote wipe capability Enable and deploy high 3. Education  Provide education and certification to enable value applications employees to be “security aware” Support:  Annual Business Conduct  Self-support model, Source: IBM http://www.google.co.il/url?sa=t&rct=j&q=&esrc=s&source=web& cd=1&cad=rja&ved=0CCsQFjAA&url=http%3A%2F%2Fwww.esl.dk Guidelines certification powered by IBM’s social %2Fmedia%2F35735%2FFredag%2520Carsten%2520B%2520Ander sen%2520Personally- owned%2520devices%2520at%2520IBM%2520(ISACA).ppt&ei=9TI  “Ask the experts” software IBM Connections wUevYLseRswbS94G4Bw&usg=AFQjCNFnISWnbM8bhmQSsBLhtrvt -XHGmg&bvm=bv.43148975,d.Yms Pini Cohen and Sigal Russins work 44 Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 44
  45. 45. Develop a strong usage policyo Use of personal devices for business purposes is voluntary.o Eligible employees (all except privileged users) can use personal devices as long as they agree to the IBM terms and conditions.o Employees must adhere to security policies and installation of security agent to ensure their device is secure.o IBM or client information and data (property) maintained or stored on a device is owned by IBM. BYOE Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 45
  46. 46. Develop a strong usage policyo Employee agrees to allow IBM to inspect or take possession of the device upon request.o IBM can revoke the ability to use the device.o IBM can do a remote wipe of the device at any time, if the device is lost or stolen.o User will remove all IBM property when they stop using the device.o IBM may, but is not obligated to provide any 3rd party software. User must obtain valid licenses for any 3rd party software they choose to use for IBM business or purchase it . BYOE Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 46
  47. 47. Summary - BYODI. Have sensible, but not restrictive, policies. Emphasize user education about the threats such as lost, stolen, and infected mobile devices. Enforce reasonable policies such as requiring a PIN code.II. MDM -Implement remote lock, wipe, and locate features on company- and employee owned devices.III. Install anti-malware protection or a MAM – security container for business apps.IV. Use VPNs for everything when connecting to company assets from mobile devices, especially when connecting over public Wi-Fi.V. Focus on authentication and identity. Multifactor authentication or federated identity should be used to access high-value services on the company network. 47
  48. 48. PC sales are down Suppliers Change Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 48
  49. 49. These changes influence NasdaqMicrosoft Apple Suppliers Change Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 49
  50. 50. Suppliers Change Pini Cohen and Sigal Russins work Copyright@2013Do not remove source or attributionfrom any slide, graph or portion of graph 50
  51. 51. Windows 8 for “regular” PC’s Suppliers Change Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 51
  52. 52. Microsoft: from SW (license) to Services• Computerworld has confirmed that Office 2013 is permanently locked to the original machine it was installed on…. you will be unable to move it to a new machine should the need arise• Microsoft has made it fairly clear that it is now far more interested in getting consumers to sign up for its Office 365 product that works off of a subscription plan. Since this can be accessed from just about anywhere it would eliminate the need for re- installing a copy of Office that involves a license. Suppliers Change Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 52
  53. 53. Microsoft is looking for new way to do business• Windows Blue confirmed in new Microsoft job listings: “Windows Blue promises to build and improve upon these aspects of the OS, enhancing ease of use and the overall user experience on devices and PCs worldwide.”• Rumors about Windows Blue: • The first of a number of annual operating system updates to Windows 8. • There also is a Windows Phone Blue in the works that is expected to have the same core code as Windows Blue. • Its not clear to me when and whether Microsoft will roll out something known as Windows 9, given the new plan to deliver Windows operating system updates annually, rather than once every three years Suppliers Sources: http://www.zdnet.com/microsofts-windows-blue-may-have-just-hit-milestone-1-7000011514/ and http://www.neowin.net/news/windows-blue-confirmed-in-microsoft-job-listing Change Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 53
  54. 54. However• Service = Subscription = Rental• The “Cloud way” - you pay for what you need – can grow or reduce seats• There is no asset for the organization• Negotiation is tricky Suppliers Change Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 54
  55. 55. Mobile will cause new development paradigm Source: http://www.kendoui.com/surveys/global-developer-survey-2013.aspx Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 55
  56. 56. Enterprise App Store Source: http://velositor.com/2012/03/15/almost-3-in-5-enterprises-said-they-were-looking-to-implement-a-corporate-app-store/Source: http://www.ebizq.net/blogs/mashups/2011/07/is-your-it-organization-ready-for-the-attack-of-the-angry-birds.php Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 56
  57. 57. A new eraSource: http://www.socialtechpop.com/2010/10/old-vs-new-trends-in-social-media/ Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 57
  58. 58. AgendaBYOEverything Security BusinessConsumerization & enabling Cyber technologies Infrastructure The new investment infraops model-cost delivery model reduction Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 58
  59. 59. Open Networking Foundation on SDN … In the SDN architecture, the control and dataplanes are decoupled, network intelligence and stateare logically centralized and the underlying network infrastructure is abstracted from the applications … Enabling technologies Source: opennetworking.org Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 59
  60. 60. Enabling technologies Pini Cohen and Sigal Russins work Copyright@2013Do not remove source or attributionfrom any slide, graph or portion of graph 60
  61. 61. SDN Vendorso Cisco: Open Networking Environment (ONE), EEM (Tcl), Python scriptingo Juniper: Junos XML API and SLAX (human-readable XSLT)o Arista EOS: XMPP, Linux scripting (including Python and Perl)o Dell Force10: Open Automation Framework (Perl, Python, NetBSD shell)o F5: iRules (Tcl-based scripts) Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 61
  62. 62. Case Study Enabling technologies Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 62
  63. 63. Enabling technologies Pini Cohen and Sigal Russins work Copyright@2013Do not remove source or attributionfrom any slide, graph or portion of graph 63
  64. 64. Key aspects of SDNI. Separation of data and control planesII. A uniform vendor-agnostic interface such as OpenFlow between control and data planesIII. Logically centralized control plane, realized using a network OS, that constructs and presents a logical map of the entire network to services or network control applications on topIV. Slicing and virtualization of the underlying network Enabling Source : http://yuba.stanford.edu/openflow/documents/openflow_deployment_journal_paper_aug2012.pdf technologies Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 64
  65. 65. Today Networking Devices BA 1 C IP Routing Table 2 1-> B5 3-> A1 3 1 2 1 2 4 5 1 2 3 3 Enabling technologies Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 65
  66. 66. Current Networking Systems Enabling Microsoft ERP SAP CRM technologies 1 2 3 CPU RP SuperVisor Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 66
  67. 67. The “Software-Defined Network” Microsoft ERP SAP CRM Open API Network Operating System –SDN Controller Open Interface to Hardware “If header = x, send to port 4” Openflow Firmware Openflow Firmware Packet-Forwarding Packet-Forwarding Hardware HardwareOpenflow Firmware Openflow Firmware EnablingPacket-Forwarding Packet-Forwarding technologies Hardware Hardware Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 67
  68. 68. Current technology Future technology ERP SAP CRM ERP SAP CRM WindowsWindows Windows Windows Windows Windows Windows Network Windows Windows NOX- Windows Windows Beacon-SDN WindowsWindows Linux FreeBSD OS Nicira controller Virtualization Virtualization x86 Openflow Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 68
  69. 69. “S” for Software Enabling Policy/Control SW 1. Static Checking technologies (“compile time”) “Is my configuration Configuration correct?” 2. Dynamic checking (“run time”) Data Plane “Is my data plane behaving correctly?”Source : Formal checking in networks, ONCR Research , James Hongyi Zeng Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 69
  70. 70. SDN Benefits SDN allows companies to:Manage Change  Remove the complexity  Reduce the cost of network reconfigurationIntegrate Cloud Services  Turn the network into a truly dynamic and flexible asset.Network Investments Enabling technologies Source: http://www.accenture.com/us-en/Pages/insight-software-defined-networking-video.aspx Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 70
  71. 71. Open Flow  Today, your Routing Protocols / STP determine the Forwarding Table in your network.  OpenFlow is another method for configuring the Forwarding table in the Network Switch. OpenFlow will replace existing routing protocols !“If header = x, send to port 4”“If header = y, overwrite header with z, send to ports 5,6”“If header = ?, send to me” Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 71
  72. 72. Enabling technologies Pini Cohen and Sigal Russins work Copyright@2013Do not remove source or attributionfrom any slide, graph or portion of graph 72
  73. 73. Pini Cohen and Sigal Russins work Copyright@2013Do not remove source or attributionfrom any slide, graph or portion of graph 73
  74. 74. Pini Cohen and Sigal Russins work Copyright@2013Do not remove source or attributionfrom any slide, graph or portion of graph 74
  75. 75. Summary - SDNA. You should have clear vision about how SDN technology will benefit your business.B. It is very early days for SDN -- the market, standards and technology will evolve.C. Think about SDN implementation challenges: human resource. Vendor support, organization impact.D. Think about the potential impact of SDN on your operational costs.E. Improved network security is a critical potential benefit of SDN.F. Identify a specific initial use case for SDN. For example, reducing the time to provision network security to new (or migrating) VMs. 75
  76. 76. application(s) Server file-system ScaleIO Server ECS vol. manager ScaleIO ECS eliminates the block dev. dependency on SAN hardware ScaleIO Client drivers ScaleIO ECS software components: Space DAS ScaleIO • ScaleIO Data Client (SDC) allocated protocolto ScaleIO • ScaleIO Data Server (SDS) HBA NIC/IB External switch switch Fabric Storage switch HBA Subsystem Enabling technologies Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 76
  77. 77. Other vendors are following this trend Enabling technologies Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 77
  78. 78. • Does : EnablingSoftware Defined Network technologies +Software Defined Storage +Software Defined X (more similar technologies) =Software Defined Datacenter? Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 78
  79. 79. Software Defined Datacenter• Forrester: An SDDC is an integrated abstraction layer that defines a complete data center by means of a layer of software that presents the resources of the data center as pools of virtual and physical resources, and allows them to be composed into arbitrary user-defined services. Enabling Source: http://www.vmware.com/files/include/microsite/sddc/the_software-defined_datacenter.pdf technologies Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 79
  80. 80. STKI on Software Defined Datacenter• Two main vectors in Software Defined X: Enabling • Central control of all related components technologies • Use more simple HW – up to “standard servers” for everything• Will enable application to “ask” specific things from the HWinfra layer• Promising concept and a “game changer” but it will take time Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 80
  81. 81. EnablingSource: http://atea.lt/wp-content/uploads/2012/11/5-3-Datacenter-of-the-future-Atea-Action-2012.pdf technologies Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 81
  82. 82. Enabling technologiesSource: http://atea.lt/wp-content/uploads/2012/11/5-3-Datacenter-of-the-future-Atea-Action-2012.pdf Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 82
  83. 83. Facebook changed the DC industry : Open Compute Project• Open Compute Project: internet/cloud companies working collaboratively to come up with a better motherboard design, a better power supply based on Intel or ARM chips.• Facebook donated hardware designs to the Open Compute Project , showing how it had significantly cut costs with a new breed of slim-down gear purchased directly from manufacturers in Asia.• Rackspace : (second only to Amazon in the cloud computing game) donateddesigns to the Open Compute Project. • Rackspace’s hardware accommodates a different power system than Facebook’s gear. • The server includes an extra network connection and some extra management tools. And it’s designed to handle a much larger number of connecting cables• Google and Amazon have also bypassed big-name server makers going directly to more nimble manufacturers, but they’ve not donated their designs Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 83
  84. 84. Enablingtechnologies Source: SAP Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 84
  85. 85. SAP HANA• From Disk to RAM• From Row to Column• From Text to Binary• Compression of data• New data manipulation algorithms – build for the Intel Core level Enabling technologies Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 85
  86. 86. Enabling technologies Pini Cohen and Sigal Russins work Copyright@2013Do not remove source or attributionfrom any slide, graph or portion of graph 86
  87. 87. GPGPU• General-purpose computing on graphics processing units (General-purpose graphics processing unit, GPGPU, GPGP or less often GP²U) is the utilization of a graphics processing unit (GPU), which typically handles computation only for computer graphics, to perform computation in applications traditionally handled by the central processing unit (CPU). Source: wiki Enabling technologies Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 87
  88. 88. The GPU-Force! Enabling technologies Source: http://www.nvidia.com/object/personal-supercomputing.html Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 88
  89. 89. Amax GPGPU Cluster Enabling technologies Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 89
  90. 90. Intel’s Xeon PHI Enabling technologies Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 90
  91. 91. The SQream Product Topology Enabling technologies Data Data UsersSources Storage ~ 90% crunching 100TB of original data  Performance – x25 ++ 25%-50% raw data  x10, x25, x40, X100 faster Pini Cohen and Sigal Russins x5-x10 compression  than leading DBMSs Do not Copyright@2013 work remove source or 5TB-15TB on SQream’s Server attribution from any slide, graph or portion of graph 91
  92. 92. Technology Enabling• Data Crunching: technologies• Faster compression time X20• Faster decompression time X50-X70• Higher compression ratio X5-X15• Compute:• Faster MPP in a node X20• Higher scalability X1 node X3000 cores• Lower hardware cost 7,000,000$ > 15K Pini Cohen and Sigal Russins work Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 92
  93. 93. The internet of things• “Devices are smart” and have You have fever Take a pill right sophisticated software installed now!• What about the software license I don’t like in the device?! this tie I need to be changed! Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 93
  94. 94. Internet of things (sensor/computer to computer)• "Always On" world around us • Cheap, smart, small, image recognition, augmented reality • Near Field Communication and location aware sensors• Everything gets connected• Not only “personal” devices but “business” devices flourish Source: http://www.ibmbigdatahub.com/blog/next-best-action-internet-things • Real-time decision support for customers and employees Enabling technologies Pini Cohen and Sigal Russin’s work/ Copyright@2013 Do not remove source or attribution from any slide, graph or portion of graph 94
  95. 95. 95 Do not remove source or attribution technologies from any slide, graph or portion of Pini Cohen and Sigal Russins work Enabling Copyright@2013 graph Srouce: http://www.xbitlabs.com/news/other/display/20120620221606_Calxeda_s_ARM_Based_Web_Server_Fifteen_Times_More_Energy_Efficient_than_Intel_Powered_Company.htmlARM servers

×