STKI Summit 2010 Infra Pini

  • 5,460 views
Uploaded on

Architecture and Infrastructure presentation from STKI Summit 2010

Architecture and Infrastructure presentation from STKI Summit 2010

More in: Technology
  • Full Name Full Name Comment goes here.
    Are you sure you want to
    Your message goes here
    Be the first to comment
No Downloads

Views

Total Views
5,460
On Slideshare
0
From Embeds
0
Number of Embeds
3

Actions

Shares
Downloads
0
Comments
0
Likes
3

Embeds 0

No embeds

Report content

Flagged as inappropriate Flag as inappropriate
Flag as inappropriate

Select your reason for flagging this presentation as inappropriate.

Cancel
    No notes for slide
  • Comfortable participating in virtual worlds Expect immediate results and feedback Have many open threads and parallel tasks Deliver quickly and in tiny increments Expect personalization and customization Intolerant of workstream disruption In short: very agile!
  • Columnar isn’t columnar isn’t columnar; each product is different. The same goes for row-based. Still, this categorization is the point from which to start.
  • Oracle (pre-Exadata) and SQL Server (until Madison ships) are single products meant to serve both OLTP and analytics. Any of the main versions of DB2 is something like that too. Sybase, however, separated its OLTP and analytic product lines in the mid-1990s.
  • If you need to manage mucho over 10 terabytes of user data, most of your attractive alternatives are in this category.
  • Sybase IQ is the granddaddy, but it’s not MPP.SAND is another old one, but it’s focused more on archiving now.Vertica is a quite successful recent start-up, with >10X the known customers of ParAccel (published or NDA).InfoBright and Kickfire are MySQL storage engines. Kickfire is also an appliance.Exasol is very memory-centric. So is ParAccel’s TPC-H submission. So is SAP BI Accelerator, but unlike the others it’s not really a DBMS.MonetDB is open source.
  • Bullet1: vMotion moves VMs across physical ports—the network policy must followFrom a network perspective, one would like to have a security policy that is attached to the virtual machine as it moves.  Unfortunately, today’s tools only allow for network policy to be attached to the physical server.  In fact, VMware has a tool called DRS, or Dynamic Resource Scheduler, that automatically migrates the VM depending on CPU and memory loads. Regardless of the time of day, network administrators need to know what the VMs are doing.  What they really need is mobile security policy attached to the VM Bullet2: Impossible to view or apply network policy to locally switched trafficThe second issue with server virtualization is the virtual switch inside the hypervisor that switches packets between virtual machines.  It is actually fairly difficult to see which VM is actually talking to other VMs inside the server.  Customers are demanding troubleshooting and debugging capabilities inside the server. Bullet3: Need collaboration between network and server adminThere is muddled ownership of the virtual switch.  Nowadays, server admins manage the virtual switch, and they need constant communication with their nework administrator to configure the virtual switch. On one hand, Server admins want their network team to configure the virtual network. On the other hand, network admins are demanding network tools to configure the virtual switch and they want visibility down to the virtual machine.Nexus 1000V overcomes these three server virtualization issues, and accelerates datacenter virtualization.
  • Answer: When I talk about SBC – its 100% execution on the ServerI do not understand the other remarks ==========Send flex cast delivery PPTSBC (= hosted application or/and hosted desktop)Terminal services – shared desktopVirtual desktop = hosted desktop
  • Answer: Server hosed VDI – running on the server ==========VDI or offline VDI /client virtual desktop with XenCleint?
  • Answer – the PROS are for VDI vs. Terminal servers so I do not think that VDI is more secure than Terminal Servers (“traditional Citrix”)PRO: non standards = software not running in multiuser environementMore control/SecuritySolves “secure browsing “regulation OS Central management, fast and secure deliveryCan leverage existing client devises User experience = similar to local desktop experienceCONS:Distribution SW can be solved is you associate/integrate Virtual desktop with Application virtualisation technologyStorage: not needed if use latest provisioning PVS technology. In general more infra (Server and storage mainly)
  • Answer: - sunray hpchippcSUNRAY?Cons: WinCE not preferred choice for VDI with thin client (WES windows XPe) or Linux)
  • Answer - not a promo. Some clients forgot to put this in their calculations… Promo ?
  • The other big investment we are making to Enhance Security and Control is around Application Control.The longer a computer has been deployed, the more the software on it drifts away from its desired configuration. These inconsistencies are greatly accelerated by installation and execution of non-standard software within the desktop environment. Users today bring software into the environment by bringing in software from home, Internet downloads (intended and not intended!), and through email. The result is a higher incidence of malware infections, more help desk calls, and difficulty in ensuring that your PCs are running only approved, licensed software. Coupled with compliance requirements in the enterprise through OCI, SOX, HIPPA and other regulations, enterprises are renewing efforts to lock down their desktops as a means to: Reduce total cost of ownership (TCO)Increase security to safeguard against data loss/threat of IT theft and to protect privacy Support compliance solutions by validating which users can run specific applicationsWith Windows XP and Windows Vista, we gave IT administrators Software Restriction Policies to enable the definition of application lockdown policies. However, SRP was difficult to implement because the rules were based on application hashes, which meant that they had to be re-created anytime the application was updated. Windows 7 reenergizes application lockdown policies with a totally revamped set of capabilities. AppLocker provides a flexible mechanism that allows administrators to specify exactly what is allowed to run on their systems and gives users the ability to run applications, installation programs, and scripts that administrators have explicitly granted permission to execute. As a result, IT can enforce application standardization within their organization with minimal TCO implications.For example, a rule could be written that says “allow all versions greater than 8.1 of the program Photoshop to run if it is signed by the software publisher Adobe.” Such a rule can be associated with existing security groups within an organization, providing controls that allow an organization to support compliance requirements by validating and enforcing which users can run specific applications.

Transcript

  • 1. STKI Summit 2010 Architecture and Infrastructure Pini Cohen Architecture and Infrastructure EVP & Senior Analyst pinicohenstki.blogspot.com
  • 2. Your Text here Your Text here Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 2
  • 3. Agenda Major Trends and Issues • What and why • The solutions • How was 2009-2010? • Miscellaneous Development and SOA Your Text here Your Text here ESM BSM CMDB DBMS and DATA Platforms – Servers Clients Source: http://astonguild.org.uk/files/NEW_MENU_FRONT_RGB%5B1%5D.jpg Storage Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 3
  • 4. Where are we? The never ending story: Cost Risk and Your Text here Transformation Your Text here Speed Quality Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 4
  • 5. Pressure on Infrastructure– How low can you get?! Your Text here Your Text here Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 5
  • 6. A Few Examples:  Someone changed configuration of secondary load balancer – and forgot to test it. This ―sleeping bomb‖ was discovered 6 months later…  New patch of Windows server is now stopping port X – production application is down  Intermittent error in HBA – ERP is down once in a while. It took 2 weeks to find the cause!  In UPS test the servers are shut down automatically but 15 minutes after the power is uphere servers are running the UPS halts and all servers are Your Text and Your Text here crashed  Installing new version of VPN product : • No 64 support • No internal DNS support – can not connect to Exchange • Every several hours the appliance is stuck. Patch in 3 months.. Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 6
  • 7. The Harsh Reality of Today’s IT Operations Sunday Monday Wednesday 2 weeks later 01:55 AM 08:25 AM 04:05 PM 06:15 AM •Performance overhead •Turn off DEBUG logging SysAdmin restarts here Your Text Your Text here server •Application team analyzes log files •Not enough failure detail •Turn on DEBUG logging Server down interrupts business No data available to find & fix Oracle proprietary and confidential Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 7
  • 8. The result –2009 was a year with record downtime Your Text here Your Text here http://www.cartoonstock.com/newscartoons/cartoonists/ato/lowres/aton942l.jpg Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 8
  • 9. Last year we predicted IT failures Your Text here Your Text here Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 9
  • 10. The current status – IT Complexity  ―What is ultimately driving cloud computing is a crisis of complexity, driven by the distributed computing model,‖ says Erich Clementi, general manager of Enterprise Initiatives at IBM.  The result is a huge focus on break/fix expediencies and much higher costs. Your Text here Your Text here Source: http://www.alexanderprado.com/images/complexity%2026.JPG Source: PWC technology forecast downloaded from http://www.pwc.com/us/en/technology-forecast/summer2009/cloud-computing-evergreen-bechtel.jhtml Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 10
  • 11. The current status – IT Complexity Loosely coupled teams are actively evolving the IT assets within their domain  The infrastructure however, remains interdependent, and the impact of changes across domains is often poorly understood Source: Elastra Your Text here Your Text here Source: http://www.thewe.cc/thewe_/_/_/kdr/hand.gif Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 11
  • 12. What drives complexity? The total number of entities (complex) Their degree of heterogeneity (more complex) Their degree of Your Text here Your Text here interconnectedness (too complex!) Source: PWC technology forecast downloaded from http://www.pwc.com/us/en/technology-forecast/summer2009/cloud-computing-evergreen-bechtel.jhtml STKI modifications Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 12
  • 13. The solution is (mini agenda): A man’s got to do what a man’s got to do… Industry in a Box Automation Cloud Eureka! What else? here Your Text Your Text here Source: http://he.wikipedia.org/wiki/%D7%A7%D7%95%D7%91%D7%A5:Comic_History_of_Rome_p_186_Archimedes_taking_a_Warm_Bath .jpg Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 13
  • 14. A man’s got to do what a man’s got to do… Limit time of investigation and implementation of conclusions Everyone should follow the change management processes Capacity planning for critical resources All important system must have ―end user‖ here Your Text here Your Text monitoring All related network resources should be 100% reliable All metrics should be changed once in a while Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 14
  • 15. Identifying Infrastructure Unification Options Co-location: Reduction in place • Reduction in things focused on underlying data center components (raised floors, etc.) • Reduction in some asset maintenance contracts Rationalization: Reduction in kind Your Text here Your Text here • Reduce the variety or different types of things • May reduce the quantity of things, but might not Consolidation: Reduction in number • Reduce the quantity of things (installations, instances) • Could be the same or different things Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 15
  • 16. What more can help? CMDB with Automatic discovery + dependencies ITIL / other methodology for better IT processes Server Virtualization helps in day to day operations and with availabilityDRP but adds to monitoring complexity Your Text here Your Text here Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 16
  • 17. Reduce error by InfraOpsApp cooperation : The "silo" nature of IT is not enabling to solve issues effectively and fast. The saying "It is not in my domain" is heard too much. Integration between the Infrastructure domains themselves and between the infrastructure domains to the application developers who know best how the Your Text here Your Text here application works is a must: • When error happens • In day to day operations General CTO Architect that understands both infrastructure and application will emerge Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 17
  • 18. Bank Of Israel regulation Your Text here Your Text here Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 18
  • 19. The solution is: A man’s got to do what a man’s go to do… Industry in a Box Automation Cloud What else? here Your Text Your Text here Source: http://he.wikipedia.org/wiki/%D7%A7%D7%95%D7%91%D7%A5:Comic_History_of_Rome_p_186_Archimedes_taking_a_Warm_Bath .jpg Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 19
  • 20. FC over Ethernet (FCoE) FCoE Benefits  Mapping of FC Frames over • Fewer Cables Ethernet  Both block I/O & Ethernet  Enables FC to Run traffic co-exist on same on a Lossless cable Ethernet Network • Fewer adapters needed Your Text here • Overall less power Your Text here • Interoperates with existing Ethernet SAN’s • No Gateway - Stateless Fibre Channel Traffic Source : GlassHouse Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 20
  • 21. The Converged Datacenter Cisco UCS HP BladeSystem Matrix Data ERP CRM Warehouse Database Mail and Messaging File, Print, Infrastruct ure Your Text here Your Text here Resource Pool IBM CloudBurst Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 21
  • 22. Look at the small print Your Text here Your Text here Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 22
  • 23. The Change Is Coming Fast  Private clouds will transform how we think about IT • As a service  The impact to businesses will be considerable • Exploit new economics with confidence  Clear and logical pathway • Preserve existing investment in applications and information • Each step Text here immediate value, and Your delivers Your Text here builds for the next Mission: turn IT infrastructure into a low-cost, high-performance and flexible service Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 23
  • 24. Your Text here Your Text here Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 24
  • 25. The solution is: A man’s got to do what a man’s got to do… Industry in a Box Automation Cloud What else? here Your Text Your Text here Source: http://he.wikipedia.org/wiki/%D7%A7%D7%95%D7%91%D7%A5:Comic_History_of_Rome_p_186_Archimedes_taking_a_Warm_Bath .jpg Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 25
  • 26. The next big thing- Automation Business-ready infrastructure in action Service Portal Service Catalog Service Service Requester Compliance Your Text here Your Text here Supply Portal Service Templates Service Inventory Supplier Source; HP Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 26
  • 27. AppLogic Example: A Virtual Data Centre  AppLogic is a grid operating system which enables utility computing for running and scaling web applications.  AppLogic captures and operates on the logical structure of the application.  This makes it very easy to assemble, deploy, monitor, control applications visually in a browser. Your Text here Your Text here 27 Pini Cohen’s work Copyright 2010 @STKI http://www.3tera.com/AppLogic/ Do not remove source or attribution from any graphic or portion of graphic 27
  • 28. Server virtualization is here. The next big thing is Automation What is automation good for? • Assemble virtual resources (storage, firewall, load balancer, network, DBMS, etc.) into working application! • Reuse templates for components, applications • Reuse procedures for DRP, Backup, SW updates • Build in (basic) monitoring Your Text here Your Text here • Build in configuration and asset management • Build in CMDB and operational workflow • Build in Capacity planning • Part of the resources will be internal part external! Are we in heaven?! Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 28
  • 29. Automate virtualize what? Server virtualization Storage virtualization Network virtualization Desktop virtualization Your Text virtualization Applicationhere Your Text here  I/O and memory virtualization—Emerging types of virtualization include I/O and memory virtualization, both of which break down physically separate sets of computing resources into more flexible logical groupings Source: PWC technology forecast downloaded from http://www.pwc.com/us/en/technology-forecast/summer2009/cloud-computing-evergreen-bechtel.jhtml Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 29
  • 30. What will we get from automation?  General Application (Data warehouses, business intelligence, decision support, etc.) will have non-interrupted access to nearly unlimited compute, storage, and network resources.  Application workloads declare their infrastructure requirements programmatically and receive support.  At the infrastructure level, IT manages compute, storage, and networking capacity as a procurement flow defined by generic Your Text here Your Text here capacity requirements.  Reusable and interchangeable components supplement newer, more advanced components on refresh cycles defined by genuine technological improvements and budgetary considerations. Source: PWC technology forecast downloaded from http://www.pwc.com/us/en/technology-forecast/summer2009/cloud-computing-evergreen-bechtel.jhtml Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 30
  • 31. What will we get from automation? (cont.)  New applications are provisioned from a pool of shared resources whether the scope is for one business unit or the entire enterprise. This shift moves IT away from provisioning applications as standalone solutions, avoiding the creation of legacy technology.  The goal is to be legacy free, which means the only reason to swap out here Your Text a component is because it is broken or less Your Text here cost efficient than an alternative.  The only reason to keep a component is because it efficiently delivers commodity compute, storage, or network capacity. Source: PWC technology forecast downloaded from http://www.pwc.com/us/en/technology-forecast/summer2009/cloud-computing-evergreen-bechtel.jhtml Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 31
  • 32. Automation is complicated - Elastra’s ECML ECML provides an extensible multi-viewpoint language for modeling an application plane. Source: http://www.elastra.com/technology/languages/edml Your Text here Your Text here Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 32
  • 33. Automation is complicated - Elastra’s EDML EDML – The Elastic Deployment Modeling Language, a collection of elements for describing the capabilities of IT software and hardware infrastructure Source: http://www.elastra.com/technology/languages/edml Your Text here Your Text here Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 33
  • 34. Automation is complicated - Elastra’s EMLL  EMML – The Elastic Source: http://www.elastra.com/technology/languages/edml Management Modeling Language, a model of configuration items and annotations. EMML describes the context, state, and dependencies among items, such as Your Text here Your Text here whether an ECML- described design is currently deployed, the state of that deployment’s EDML- described resource, or the version history of either. Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 34
  • 35. The solution is: A man’s got to do what a man’s got to do… Industry in a Box Automation Cloud Computing What else? here Your Text Your Text here Source: http://he.wikipedia.org/wiki/%D7%A7%D7%95%D7%91%D7%A5:Comic_History_of_Rome_p_186_Archimedes_taking_a_Warm_Bath.jpg Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 35
  • 36. Automation is key requirement for Cloud solution  Multitenant. A cloud service must support multiple, organizationally distant customers.  Elasticity. Tenants should be able to negotiate and receive resources/QoS on- demand.  Resource Sharing. Ideally, spare cloud resources should be transparently applied when a tenant’s negotiated QoS is insufficient, e.g., due to spikes.  Horizontal scaling. It should be possible to add cloud capacity in small increments; this should be transparent to the tenants of the service. Your Text here Your Text here  Metering. A cloud service must support accounting that reasonably ascribes operational and capital expenditures to each of the tenants of the service.  Security. A cloud service should be secure in that tenants are not made vulnerable because of loopholes in the cloud.  Availability. A cloud service should be highly available.  Operability. A cloud service should be easy to operate, with few operators. Operating costs should scale linearly or better with the capacity of the service. http://209.85.129.132/search?q=cache:IRrnbGDGMLsJ:www.cse.iitb.ac.in/comad/2008/uploads/K_Raghu_CloudComputing.ppt+Multiten ancy+Elasticity+filetype:ppt&hl=iw&ct=clnk&cd=2&gl=il&client=firefox-a http://www.cse.iitb.ac.in/comad/2008/uploads/K_Raghu_CloudComputing.ppt Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 36
  • 37. Enterprise Benefits from Cloud Computing Capability From To Server/Storage 10-20% Cloud accelerates 70-90% Utilization business value Self service None across a wide Unlimited variety of Test domains. Weeks Minutes Provisioning Change Text here Your Your Text here Months Days/Hours Management Release Weeks Minutes Management Fixed cost Metering/Billing Granular model Standardization Complex Self-Service Payback period Years Months for new services Source: IBM Legacy environments Cloud enabled enterprise Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 37
  • 38. Today there are three primary delivery models that companies are implementing for cloud Enterprise Traditional Public Clouds Enterprise Private Cloud IT Hybrid Cloud Your Text here Your Text here Private Cloud Hybrid Cloud Public Cloud IT activities/functions are provided “as Internal and external IT activities/functions are provided a service,” over an intranet, within the service delivery “as a service,” over the Internet enterprise and behind the firewall methods are integrated, • Key features: • Key features include: with activities/functions – Scalability – Scalability allocated to based on security requirements, – Automatic/rapid provisioning – Automatic/rapid provisioning criticality, architecture – Standardized offerings – Chargeback ability and other established – Consumption-based pricing. – Widespread virtualization policies. – Multi-tenancy Source: IBM Market Insights, Cloud Computing Research, July 2009. Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 38
  • 39. The public cloud layers Your Text here Your Text here Source: GS http://blogs.zdnet.com/BTL/?p=28476 Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 39
  • 40. Cloud adoption Your Text here Your Text here Source: http://blogs.idc.com/ie/wp-content/uploads/2010/01/Likely_Cloud_Adoption.jpg Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 40
  • 41. Cloud Your Text here Your Text here Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 41
  • 42. Startup that enables the Cloud Storage concept Your Text here Your Text here Source: http://www.baraka.ca/Image-NASsa/Nassa_scheme.jpg STKI modifications Source: http://www.baraka.ca/Image-NASsa/Nassa_scheme.jpg STKI modifications Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 42
  • 43. A Look Inside Azure Your Applications Your Text here Your Text here Service … Workflow Database Analytics Identity Contacts Bus Access … Reporting … Devices … Control Compute Storage Manage … Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 43
  • 44. Private Cloud and “Industry in a Box” ―Industry in a box‖ is the building block of Private Cloud From the VBLOCK advertisement:  Private clouds will transform how we think about IT • As a service  The impact to businesses will be considerable • Exploit new economics with confidence Your Text here Your Text here  Clear and logical pathway • Preserve existing investment in applications and information • Each step delivers immediate value, and builds for the next Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 44
  • 45. The solution is: A man’s got to do what a man’s got to do… Industry in a Box Automation Cloud What else? here Your Text Your Text here Source: http://he.wikipedia.org/wiki/%D7%A7%D7%95%D7%91%D7%A5:Comic_History_of_Rome_p_186_Archimedes_taking_a_Warm_Bath .jpg Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 45
  • 46. What else is needed? Prerequisite for automationcloudreduce complexity is standardization and SOI (Service Oriented Infrastructure) Your Text here Your Text here source:: http://rlv.zcache.com/im_an_artist_torture_is_a_prerequisite_tshirt-p235209830127787742yafb_400.jpg Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 46
  • 47. SOI ServicePattern Oriented Infrastructure – example Storage Services Disk Tape Online Automated Tier Enterprise Midrange Capacity/Arc Manual Capacity hival Design Monolithic Modular Modular ATL Rack SCSI/FC Drives Drive Interface SCSI/FC ATA/SATA FC People Drive/Media Your Text here Your Text here Reliability MTBF 1.2 Million+ 1.2 Million+ 400K+ 1 Million+ 1 Million+ (Hour) Performance: rpm 10K-15K 10K-15K 7.2K Seek Time <6ms <15ms <1 sec. <1 min. days Fixed Key Environments Mission Business Critical BU, Archival, WO Content, WORM, A Archival, BU Critical, OLTP RM rchival Provisioning SLA Once a week Once a month Once a month Pini Cohen’s work Copyright 2010 @STKI Source: OLD STKI research Do not remove source or attribution from any graphic or portion of graphic 47
  • 48. SOI – Service Oriented Infrastructure: Example of Service Definition  Name: Identity infrastructure service • Examples  Owner: Bob Smith, architect  MSFT Active Directory (NOS file and print)  Description  MSFT Passport online service • Providing user identity information • Principles (attributes), including authentication  Simple authentication is usually enough credentials and related SSO services; also  Replication to scale (mostly read-only) offers Web URL permissions • Component and service manifest  Use case  API: LDAP, Web server exits, proprietary • Direct use by application (LDAP) Your Text here  Presentation: NA Text here Your • Indirect use via Web server (with attribute  Application server: NA (see Web SSO) passing in headers)  Integration: Metadirectory utilities • Direct use by application (security APIs)  Database: iPlanet Directory Server  Service-level matches  Server HW/OS: Sun Solaris on SPARC … • + Scalability (over 500 users, etc.)  Storage: EMC SAN • + Scale incrementally using replicas  Network: NA • – Direct application support  Security: Netegrity SiteMinder Web SSO  Pricing  Management: Delegated admin, … • ―Included‖ in e-business costs • Maturity  Installed since 2001 with all customer names  Used by X, Y, Z apps now Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 48
  • 49. What Are the Benefits of Infrastructure Services ?  Technology reuse • Pattern blueprints: Architecture, technology, product, configuration • Technical services: Actual implementations Process  IT Process reuse • Pattern matching • Service support Technology People • Predictive costing Your Text here P2 Your Text here • Experience gained: Good and bad practices P7 P P8 P1 1 P3 P3  People reuse P5 P4 P6 P8 P7 • Fewer technology skills specific to the pattern • More common roles focused in fewer service areas T2 J1 T1 J1 J3 J2 T7 T8 J6 T2 T1 J4 T4 J4 J7 T3 T3 J2 J6 T6 T5 J8 J5 Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 49
  • 50. Standardization is the key for automation. PWC case study at Bechtel Your Text here Your Text here Source: PWC technology forecast downloaded from http://www.pwc.com/us/en/technology-forecast/summer2009/cloud-computing-evergreen-bechtel.jhtml Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 50
  • 51. Mergers and Acquisitions  Virtualization vendors vs. Automation vendors?  Automation specific vs. general ESMoperations ?  Except more M&A’s: • IBM is shopping for middleware (think Tibco, Red Hat), datacenter automation (BMC), virtualization (Citrix) and project lifecycle management (Parametric). • Cisco is shopping for datacenter automation and virtualization. • HP wants to buy middleware, security, storage management and virtualization companies. here Your Text Your Text here • Oracle is shopping for applications, middleware and data center automation companies. • EMC and Symantec are also eyeing data center automation companies.  What does this mean to you? Source: GS http://blogs.zdnet.com/BTL/?p=28476 Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 51
  • 52. What else: Back to the Future  Industry in a Box: Your Text here Your Text here  Public Cloud: Service Bureau (― ―)  Concurrent licensing (Microsoft DynamnicsAX Source; http://www.vintageadbrowser.com/computers-and-software-ads-1970s/3#adjdqd5tnb8bv4yr Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 52
  • 53. What else: Infrastructure Department: Before Infra. Manager Your Text here Your Text here Networking PC System DBA Storage Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 53
  • 54. Infrastructure Department: After Infra. Manager Your Text here Your Text here PC System/Storage/Networking DBA Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 54
  • 55. You may not believe it but: Major Israel integrator sends his network presale personnel to VMWARE course! Your Text here Your Text here Source: http://www.eglobe1.com/index.php/2006/09/02/unbelievable-pictures/ Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 55
  • 56. Conclusion: • Virtualization • Standardization Rationalization • Infrastructure Services • Automation • Consolidation • Process improvements Your Text here Your Text here • PrivatePublic cloud Source: http://languagearts.pppst.com/synonyms.html Are all ―synonyms‖ in the infrastructure world! Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 56
  • 57. Agenda Major Trends and Issues • What and why • The solutions • How was 2009-2010? • Miscellaneous Development and SOA Your Text here Your Text here ESM BSM CMDB DBMS and DATA Source: http://astonguild.org.uk/files/NEW_MENU_FRONT_RGB%5B1%5D.jpg Platforms – Servers Clients Storage Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 57
  • 58. Was this a different year ?!  The high Shekel rate during the beginning – mid of 2009 caused the infrastructure departments to have "less" money than expected  Budget was very late (government) part of the units did not pass budget. Procurement only at the end of year Your Text here Your Text here  In many organizations, about 30% to 50% there was no cut off!  Most of the cut off was from January to September. Afterwards there was a catch –up.  Although organizations reported cut offs purchasing some storage and some servers was common Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 58
  • 59. This year in Israel – cut off  Salary reduction for "temps", outsourcing and for the general IT employees  From single to dual vendor in every area  Moved equipment from insurancemaintenance of 7*24 to 5*5 to "per-call"  Changed suppliers – example from CISO to 3COM in smaller Your Text here Your Text here switches, from DMXHDS-USPDS8000 to XIV  Printing consolidation projects  No color printing  "Green IT" projects – shutting down the PC at night Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 59
  • 60. This year in Israel – cut off  Moving to bigger servers more cores per server for discount in SW (some SW is still per Server or per Socket)  Projects are late 3 months or more in delivery  Delaying projects like – ESB, Security projects (that are not mandatory by regulation)  Delaying HW refresh cycles  Dedup and VTL technology are sometime considered as a mean for cutting costs Your Text here Your Text here  Tools that save money: example Appsense for improving server rations in Citrix environment. Server virtualization was considered as a mean for saving money as well !  Moving from Unix to Linux is also considered as "saving money" activity Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 60
  • 61. This year in Israel - Technology  Server virtualization is the king! Clients reached very quickly 70% and 80% and more from total Windows production systems in virtualized environment.  Users report mainly: • Easier operations • Faster time to market • Better availability Your Text here Your Text here  However, running to standard-virtualized platforms might not be suitable for all kinds of applications (DBMS, ESB). The virtualization technology is not 100% mature and storage is huge issue in virtualization (performance, backup, etc.) Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 61
  • 62. This year in Israel - technology Sometimes applications had to be ―specially tuned" so they can work safely in Virtualized environment. Clients are using VTL and DEDUP more and more. First Cloud projectsbids – better service for the customers via the cloud Your Text here Your Text here Some clients went massively to virtualization for "environmental mandatory circumstances" – "NO ELECTRICITY AT ALL" ! "Crazy" storage growth ! More SBC (terminal servers, VDI , thin clients) for security Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 62
  • 63. Agenda Major Trends and Issues • What and why • The solutions • How was 2009-2010? • Miscellaneous Development and SOA Your Text here Your Text here ESM BSM CMDB DBMS and DATA Platforms – Servers Clients Storage Source: http://astonguild.org.uk/files/NEW_MENU_FRONT_RGB%5B1%5D.jpg Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 63
  • 64. IT as a hero not as a showstopper  Explore new technologies (IT usually does it!)  Enable Personal devices (iPhone, Win Mobile, Nokia…) that were not enabled before.  (Try to) Enable Apple Mac! Enable larger variety of laptops.  Self service for developers  Help the business in outsourcing deals  Enable Your resources for clients (example test environment for IT Text here Your Text here clients).  Give clients what IT has developed for users (shut down PC’s at night)  Consider to enable the developer to use his ―own‖ developmentALM tools Information Technologies or Business Technologies ? Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 64
  • 65. New Technology – the good the bad and the evil… Good Bad  Do things better (faster, • Not working many bugs more efficient, more reliable, cheaper) • Not mature – 3rd party not  Why go to old technology supported, etc. (that will eventually not be • Not enough knowledge in supported)? here Your Text Israel or abroad Your Text here  Business advantage • Too much effort –  Human Capital management “bleeding edge” – people love new stuff ! • “Dead End” technology Why are you moving to new technology? Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 65
  • 66. Good Infrastructure manager: Goes the ―safe (expensive) way‖ or the ―bold way‖ ? Your Text here Your Text here Source: http://www.indofamily.net/men/images/stories/articleimages/man%20sleep.jpg Source: http://i.telegraph.co.uk/telegraph/multimedia/archive/01356/man_awake_1356713c.jpg At STKI Round Table: ―I am paid for not sleeping well at night‖ Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 66
  • 67. What clients hate: Project is delayed because immaturity Lock-In and have to pay more Your Text here Your Text here Something that causes rewrite Source: http://bkmacdaddy.com/blog/wp-content/uploads/2009/12/angry.jpg Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 67
  • 68. New Generation of Knowledge Workers Live in virtual worlds Expect immediate results Many open threads Deliver quickly, in small increments Expect personalization Your Text here Your Text here Intolerant of disruption In short: very agile! http://www.solutionsiq.com/resources/SIQ- AgileDevelopmentPlatform-Rudd-Young- Agile2008.ppt Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 68
  • 69. IT infrastructure turn around  IntelAMD servers 3-5 years  PC 3-4 years  Screen 3-6 years  Laptops 2-3 years  Thin clients 5-10 years  Storage 3-5 years Your Text here Your Text here  Network Backbone Switches 7-9 years  Network Edge Switches 3-5 years Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 69
  • 70. We will present data on products and General vendors: 1. Israeli vendors rating – state of the current market focused on the enterprise market (not SMB)  X – Market penetration (sales + installed base+ clients perspective)  Y – is X plus localization, support, development center, number and kind of integrators, etc.  Worldwide leaders marked, based on global positioning Your Text here Your Text here  Vendors to watch: Are only just entering Israeli market or making a big change so can’t be positioned but should be watched  Represents the current Israeli market and not necessarily what we recommend to our clients 2. Products and selected resellers / implementers  The location within the list is random Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 70
  • 71. We will present data on products and General vendors (cont.) 3. Selected installations of products – projects in different stages , production,implementation, after decision… 4. Service providers that are used by users . I asked users – ―which SI do youYour Text here category‖ and counted the result. here use in this Your Text 5. Analysis by international and Israeli analysts  This complete information (1 to 5) should be used together, combined with the specific circumstances of each case when making a decision This subjective chart is the result of our objective research Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 71
  • 72. General Your Text here Your Text here Pini Cohen’s work Copyright 2010 @STKI 72 Do not remove source or attribution from any graphic or portion of graphic 72
  • 73. Ratio Analysis: Sorted Metric Metric  25% percentile 36 57 43 36  50% percentile = median 50 117 50 438  75% percentile 57 60 60 175 60 150 68.6 25% percentile 71 143 100 120 100 50 109 250 117 125 Your Text here Your Text here 117 280 120 60 120.0 50% percentile = Median 120 200 125 117 125 100 143 164 150 125 164 600 175 192 178.1 75% percentile 188 71 192 120 200 50 250 188 280 43 438 109 Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 600 100 73
  • 74. Upcoming Round Tables TITLE DATE IT procurement managers - going out of the economic down turn DBA - technologies, methodologies, tools and organization Your Text here Infrastructure and Operation managers - change management here Your Text in production environment - tools and methodologies Storage managers - current technologies (VTL's, DEDUP, Thin Provisioning) and future technologies (FCOE) Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 74
  • 75. Agenda Major Trends and Issues • What and why • The solutions • How was 2009-2010? • Miscellaneous Development and SOA Your Text here Your Text here ESM BSM CMDB DBMS and DATA Platforms – Servers Clients Storage Source: http://astonguild.org.uk/files/NEW_MENU_FRONT_RGB%5B1%5D.jpg Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 75
  • 76. Technologies Maturity Model DEV 2010 – Middleware and Development Trends Business Value Investment Semantic AGILE to make money Full SOA – BPM Organization Cut costs, Increase GUI change integration TDD IT Project productivity ESB Open Source Pure Business WPF ALM tools Project EAI PaaS Commodity IT SOA Services ETL Governance tools Investment for regulations Using Implementing Looking Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 76
  • 77. Best Practices in APP Dev  Front end applications are changing fast, better GUI, easier to develop.  Backend applications put emphasis on RAS (reliability availability scalability) , integration, security. Less frequent changes.  No more one MF with one CobolCICS environment: Organizations will have to deal with many programming Your Text here Your Text here languages, tools, run time environments, etc.  Orchestrations and integration is the name of the game Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 77
  • 78. Agile Project Management - Overview DEV Trends 12 9 Implement Analysis Analysis Code Code Test Test 6 Your Text here Your Text here 3 3 6 9 12 Pini Cohen’s work Copyright 2010 @STKI Source: Cutter Do not remove source or attribution from any graphic or portion of graphic 78 78
  • 79. Agile Software Development  Agile Software Development is catching up in Israeli ISV organizations (mainly with AgileSparks).  Clients see the benefits of Agile in small-medium projects  Large Agile projects (50 people) are more challengeable mainly when there is high interdependencies between the SW modules  Agile is demanding more from the developers  Israeli ISV’s Text here that sometimes their clients demand Agile! Your report Your Text here  Many Israeli IntegratorsDevelopers organizations run from Agile like hell! ,‫הכנס יתקיים ביום חמישי ב- 92 באפריל במלון דייויד אינטרקונטיננטל‬ 08:30-15:30 ‫בין השעות‬ .‫הכנס יספק ידע עדכני ומעשי לעוסקים בתחום או למתעניינים חדשים‬ ‫ וכמובן ידברו על‬Lean -‫ וה‬Agile -‫מומחים יציגו את הנושא הקריטי של ניהול המוצר בעולם ה‬ . Scrum -‫נושאים מתקדמים ב‬ .‫כמו כן, בכנס יוצגו סיפורי לקוח ע"י נציגי החברות הישראליות שהטמיעו בהצלחה את השיטה‬ Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 79
  • 80. The SW developer manager goals are: Keep all this in the right balance: • SOW – Scope of Work • Budget • Time • Quality Your Text here Your Text here Source: http://www.bisconsulting.ca/img/seminars/large/goal_setting.jpg Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 80
  • 81. SW development insights Bugs are the most easy metric to measure and track Sometimes too much effort is spent on bugs (example: minor memory leak) while important functionality is delayed Do not give unrealistic metrics – developers will not reportYour Textreal situation the here Your Text here How much effort should developer put in ―non-dev‖ missions (like detailed progress report)? Should maintenance be part of the general development team or should maintenance have a special ―team‖? Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 81
  • 82. SW and Development metrics  Bugs • How many bugs (including severity) • When the bug was open, when it was closed • Number of bugs correspondingly to closing date of the version • When was the bug found(dev, functional test, regression, prod = escaping bugs)  Test coverage (what part of SW was tested)  Percentage of automatic tests (from the complete project = automatic + manual)Your Text here Your Text here  Progress of project compared to plan  How many (and percentage of) passed builds  Personal metrics (loyalty to the firm)  Development of new functionality vs. effort to correct bugs from (prod and from tests) STKI recommends: change your metrics once in a while Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 82
  • 83. TIOBE Programming Community Index for Feb 2010 Your Text here Your Text here Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 83
  • 84. Google GO Google’s new programming language Launched: November 11, 2009
  • 85. Google’s Go programming language The syntax of Go is close to that of C except for the type declarations Also missing parentheses around for and if expressions It is designed for exceptionally fast compilation times, even on modest hardware. Your Text here Your Text here Go was not considered to be ready for adoption in production environments (at time of launching) Source: http://en.wikipedia.org/wiki/Go_%28programming_language%29 Source: http://www.raakesh.com/images/go.png Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 85
  • 86. Objective-C vs C# Obj-C C# [[object method] method]; obj.method().method(); Memory Pools Garbage Collection Your Text here Your Text here +/- static/instance nil null (void)methodWithArg:(int)value {} void method(int value) {} YES NO true false @protocol interface Source :http://www.fekke.com/iPhoneDevelopment.ppt Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 86
  • 87. Meanwhile… in the Holly Land Source: STKI Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 87
  • 88. JAVA vs. .NET revisited  Converting .Net (mainly C#) programmers to Java is not trivial  Java has more options than .Net. This means that Java organizations have to invest more in standards, guidance, Your Text here Your Text here architecture, and software infrastructure.  A well-known pain point of .Net, and Microsoft solutions in general, is backward compatibility. Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 88
  • 89. JRockit VE: Removing the OS and Creating a More Efficient Software Stack  Customized to run single Java process  No shell access allowed  Headless VM with Standard Guest OS VM with JRockit VE Application Application JRockit JVM Your Text here Your Text here OS File JRockit VE Net ~1GB -> ~2 MB • Improved performance • Simplified configuration • Increased security • © 2009 Oracle Corporation Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 89 89
  • 90. The Microsoft Platform - AZURE S O F T WA R E SERVICES Applications “BPOS” Developer Tools Your Text here Model Programming Your Text here Application Services Relational Database Operating System Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 90
  • 91. Windows Azure Data Centers 2010 Northern North Europe Central USA 2010 2010 Eastern Western Asia Europe South Your Text here Your 2010 Text here Central USA Southeast Asia Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 91
  • 92. Your Text here Your Text here Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 92
  • 93. Microsoft Azure : Project Sydney Technology that enables customers to connect securely to their on-premises and cloud servers. Some of the underlying technologies that are enabling it include • IPSec • IPV6 Text here Your Your Text here • Microsoft’s Geneva federated-identity capability It could be used for a variety of applications • Fail over cloud apps to on-premises servers or to • Run an app that is structured to run on both on-premises and cloud servers Source: http://blogs.zdnet.com/microsoft/?p=4582&tag=col1;post-4582 stki modificstion Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 93
  • 94. Microsoft Azure - Dallas  Remove friction for building applications leveraging 3rd party data: • Service allowing developers and information workers to easily discover, purchase, and manage premium data subscriptions in the Windows Azure platform • Dallas is an information marketplace that brings data, imagery, and real-time web services from leading commercial dataText here Your Text here Your providers and authoritative public data sources together into a single location, under a unified provisioning and billing framework. • Dallas APIs allow developers and information workers to consume this premium content with virtually any platform, application or business workflow. Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 94
  • 95. Planning a Night Out Show times Predicative parking Restaurant reviews Real-time weather … Your Text here Your Text here Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 95
  • 96. Magic as integral part of Microsoft Visual Studio Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 96
  • 97. Unified Desktop  Integrating systems ―on the glass‖ at the GUI level  Best results for • Read only • Business workflow that updates several systems independently  Not applicable for business scenario that updates several systems in ―related‖ manner (deeper level of integration is needed – ESB with application change)  Better faster business agility - changing the businessYour Text here without Your Text here workflow changing the underlying applications!  However : • Who is responsible for the workflow? The ―application team‖ (example CRM) or the middleware team?! • If the business applicationcontext is changed does it reflect in the GUI integration layer? Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 97
  • 98. BPM Client testimony: Are we mature enough for BPM? Setup effort for BPM is huge Ideal situation for BPM – diversity: • Manual and automate process flow Your Text here Your Text here • Long term and short term process flow • Lots of systems to integrate • Lots of changes in process flow • When agility is needed in business processes Source: http://blog.oregonlive.com/clackamascounty_impact/2009/07/large_Worthington-Testifies.JPG Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 98
  • 99. BPM Client Testimony  Tried before to implement BPM in small system but failed. The setup cost was too high.  Very helpful in integrating processes in diverse system, technologies, types of access  Data entry is done in the BPM  Business logic is not in the BPM only the flow itself (although Your Text here Your Text here very tempting): • Instead of ―if amount is about 1000 activate X‖ they will have ―ask the application – what to do if amount is Y‖ • In ―notifications system‖ they will put together SMS , email, fax, etc. but not put the rules when to access each channel Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 99
  • 100. SOA Adoption What are the 3 most important factors for SOA success: Organization, Organization and Organization ! SOAIntegration might become (very easily) the bottle neck of SW development ! SOA is easier to implement in smaller IT shops especially when all Text here Your development is done in centralized place Your Text here Should SOA take care of business logic? SOA is now working fine! But we had to rewrite 3 time… Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 100
  • 101. SOA Maturity Level The “middle man” 8. ESB team Architect enablesexecuting business services 7. ESB team Architect mandates business services Your ESB team 6. Text here Architect suggests business services Your Text here 5. ESB team mandates interface services 4. ESB team with SOAG tools 3. ESB team that suggests interface services Developer Developer Designer 2. ESB with team that “do what you are told” Designer might use BPMSOA tools independently 1. Integration team – no tools might use BPMSOA tools independently 0. No Integration Layer Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 101
  • 102. Intel Software is represented by SRL Your Text here Your Text here Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 102
  • 103. Oracle acquires Amberpoint Your Text here Your Text here Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 103
  • 104. Business Rule Management System (BRMS) Anatomy of a BRMS  Create rules in a business language  Execute rules (rules engine)  Edit and change rules Procedural Business Rule Approach Approach Your Text here Your Text here Business Rules Application Code Application Code Source:: http://www.wowgao.com/2006ef/2005ef/PDFfiles/Joe_Boissy_efinancial_ILOG.ppt STKI modifications Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 104
  • 105. BRMS Client testimony - Finance They have 2 BRMS developed in their legacy system The more developed BRMS is used in less projects (although it as 14K rules!) Who is putting the rules: • TheYour Text here – more responsibility on theYour Text here –more business business skills, more knowledge – business prefers not to take this responsibility • The IT – so why not to code it (more control, better performance)? Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 105
  • 106. What is lean?  Japanese automotive Industry developed Lean manufacturing with a lead from Toyota and utilising the Toyota Production System (TPS) factory.  Lean philosophy is to maximize customer value by eliminating waste and optimizing the existing processes in all aspects of a firm’s production activities: human relations, vendor Your Text here Your Text here relations, technology, and the management of materials and inventory.  Lean means doing more with less effort. Lean Organization understands customer value and focuses their key processes in meeting customer needs with all muscles without any fat / waste. Source: http://www.hydspin.org/files/conf09/g_appa_rao.ppt STKI modifications Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 106
  • 107. What is Lean? R&D R&D Design Design T I Production Setup C M Y Production Setup E Manufacturing C L DISTR. E YourManufacturing Text here Optimized thru LEAN Your Text here Acceptance & release T I DISTR. M E Acceptance and release Source: http://www.hydspin.org/files/conf09/g_appa_rao.ppt STKI modifications Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 107
  • 108. Lean Benefits Cycle Time Wait Time (non value add) Before Work Time (value add) After Same work completed in Productivity less time Cost Customer satisfaction Cost/Chaos Defects Text here Your Profit Your Text here Lead time Customer responsiveness Inventory Capacity Space Quality Waste! Cash flow Cycle time On time delivery Source: http://www.hydspin.org/files/conf09/g_appa_rao.ppt STKI modifications Relentlessly focus on reducing non-value adding activities Source: http://www.hydspin.org/files/conf09/g_appa_rao.ppt STKI modifications Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 108
  • 109. CMMI , Lean & Agile CMMI LEAN Agile CMMI is a Model that contain the • Root is from manufacturing • Set of methodologies evolved for essential elements of processes for industry software development effective systems/software development Set of generic principles • Adopts some of the lean principles A model for assessing organizational like in-station quality, visual controls, capability, aiding continuous standardization, employee improvement and benchmarking Has broader focus on the empowerment product life cycle across the • More suitable for software Provides generic guidelines based on enterprise. development industry best practices thatherebe easily Your Text can Your Text here adopted All the processes are evaluated towards creating “Value” to the • Highly suitable where requirements Customer at the shortest are evolving possible cycle yet maintaining cost and quality • Small working teams who are co- located No generic guidelines for the structure of the desired solution. companies to decide what may • set of structured methodologies be best for their organization. Source: http://www.hydspin.org/files/conf09/g_appa_rao.ppt STKI modifications Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 109
  • 110. 6σ and Lean 6σ Lean Focus On improving Value Added Process On entire value stream and creating flow Among value added operation Problem Span Largely Single process Entire Value Stream; Connection among (CFPM adaptation exists) processes Approach Sequential Problem Solving; Defects Removal, Looks at Entitlement; Maximize Potential Variance Reduction (flow & pull); reduce cycle time; improve throughput (productivity) Orientation Your TextElitist Approach, BB led, here Your Text here Grass-rooted approach, traditional functional Mentoring Concept boundaries are ignored; results are ingrained. Analysis Tool set Data driven, Statistical Toolset Focus on management principles, brings in TPM, TVA and 5S toolset – simple techniques for problem solving and continuous improvement Solution Design Not very strong Flow, Pull principles help in solution design Output Quick Results, Small Team Long-haul, iterative and widespread Source: http://www.hydspin.org/files/conf09/g_appa_rao.ppt STKI modifications Simple principles – Yet tough to implement Pini Cohen’s work Copyright 2010 @STKI as there Do not remove source or attribution from any graphic or portion of graphic is no standard framework 110
  • 111. Theory of Constraints (TOC) A management philosophy developed by Dr. Eliyahu Goldratt that can be viewed as four separate but interrelated areas: • Logistics, here buffer Your Text e.g., Your Text here management • Performance measurement, e.g., throughput • The five focusing steps • Thinking process Srouce: http://www.clt.astate.edu/asyamil/arnold/ppt/TOC_handout.ppt Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 111
  • 112. EAISOA Support Ratios EAI SOA variations are very big: • From static (old) messaging interface (MQ) to new and changing ―SOA‖ service • How ―thick‖ is the interface: 20 times a day to 20,000 a minute • How involved are the applications developers? • Example of service : ―update flight details to web site‖, ―credit scoring‖ , etc. • How Yourcount?! Example: there is one big service ―Retrieve document‖ to Text here Your Text here but this services is accessing 10 applications and 3 document management environments. It also has several variationsaccess methods. So what should be the count?! Source: STKI Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 112
  • 113. EAISOA Support Ratios Number of Services/Interfaces supported by Integration/ESB/SOA team FTE Per FTE # of Services 25 percentile 37 Your Text here Median 100 Your Text here 75 percentile 125 Source: STKI Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 113
  • 114. Israel Market Positioning Integration Brokers SOA infrastructure Vendors to Watch: Magic ezBlox Tibco IBM Oracle Local Support Your Text here Your Text here Worldwide Microsoft Leader SoftwareAG This analysis should be used with its supporting documents Israeli Market Presence Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 114
  • 115. Israel Market Positioning - ETL Informatica IBM Local Support Your Text here Oracle Your Text here (OWB + ODI ) Microsoft This analysis should be used with its supporting documents Israeli Market Presence Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 115
  • 116. Selected EAISOA infrastructure projects  MAGIC iBolt A.C. Yesumim ; Actelis Networks ; aeroscout ; Agan Chemical ; Agriculture Office ; Akum ; Arodion ;Ashdod Port; Asuta; Avgol ; Bank Igud ; Bank Leumi ; Bank Marcantil Discound ; Beit Shemesh Engines ; Binuy ve Shikun Office; Calmobil ; Central Court – Fines system ; Clalit Health ; Daka 90; Delta ; Dor Energy ; DTH ; Edded Tiur ; ELDAN ; Electra ;Excellence Nesua; Eurocom ; Finance Office ; Harel Insuracne ; Hashikon Office ;Hebrew University; IDF Police ; Iscor ; Keter Plastic ; Leimit Health ; Leumi Your Text here Gemel ; Lodan ; Macabi Health ; Menora Mivtahim ; here Your Text Rabinical Couts ; Rashi Found ; Rmat Gan Municipality ; Scoupus ; Skyvision ; Stemizky ; Superfarm ; SUPER DERIVATIVES ; Tadiran Telecom ; Tami 4 ; Tel Hashimer Hospital ; Tel-Aviv Municipality ;Tufin; Valor; Visa Cal ; Yad Hanadiv  RED = New or Major Upgrade Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 116
  • 117. Selected EAISOA infrastructure projects  IBM (WMB) - Amdocs ; Bank Discount ; Bank Leumi ; Bank Poalim ; IDF ; IEC ; Isracard ; Mataf (FIBI); Midgal ; Samelet (Fiat) ; Uniliver  Oracle Amcor; Aqualogic ; AudioCodes ; Automazia ; Bank Israel ; Barak (number portability) ; BARAN ; DAN ; Delek ; Discount Mashkantaot ; DSP - BPEL, B2B ; ECI ; Evogene BPM ; FTS ; Fundtech ; Gadot ; Golden Pages ; Haaretz ; HOT ; IDF ; IDF - ODI (ETL), Oracle Service Bus, Your Text here Your Text here BAM, BPM ; IDF (the SOA RFI) - Oracle Service Bus, BAM ; IEC ; Mirs (number portability) ; MODU ; NICE ; Prime Minister ; Prime Minister - ESB, ODSI (EII product) ; Prime Minister BAM ; Redware ; TAMA ; TEVA ; Tnuva (Oracle BAM) ; Verint ; VISA CAL ; Yehiot Aharonot ; YES ; Yes Oracle BPM ESB ; Object (ESB), Kodak (ESB) Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 117
  • 118. Selected EAISOA infrastructure projects • Tibco Amdocs ; Applied Materials ; Better Place; Bezeq (number portability + soa) ; Bezeq International ; GoldenLines (number portability + soa) ; EL-AL ; Hadassah ; Hot ; IDF ; Intel (global) ; itouch ; Minister's Office(SOA) ; Partner(number portability+ SOA) ; Pelephone (number portability + soa) ; Rafael ; TEVA; Tower Semiconductors • Tibco BPM– iprocess – orange; Prime Minister; TEVA , Haifa Municipality • Microsoft Biztalk - Kitan, Israel Government (several), IDF (several), IAI, Your Text here Your Text here Clalit Health, Bank Leumi, Agan Chemicals, Visa Cal, Airport Authority, Cellcom, Netvision 013, Migdal, Bank Igud, Isracard, Elbit (with BPM), Comverse, Amdocs (with BPM), Motorola, Port Authority, Postal Authority, Tabu, TAMAT Office , Phoenix, SuperSal, Israeli Police, ECI, Leumi Card, Israeli Prison Authority, MDS, Inbal, Municipality of Tel Aviv. Postil; Macabi, Ayalon, El-AL, NICE , Numonic, Super Derivatives, FIBI (Beinleumi Bank). • WebMethods–Bituach Leumi, Clal Insurance Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 118
  • 119. Agenda Major Trends and Issues • What and why • The solutions • How was 2009-2010? • Miscellaneous Development and SOA Your Text here Your Text here ESM BSM CMDB DBMS and DATA Platforms – Servers Clients Storage Source: http://astonguild.org.uk/files/NEW_MENU_FRONT_RGB%5B1%5D.jpg Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 119
  • 120. Technologies Maturity Model 2010– Enterprises System Management CMDB Business Value Investment to make money Cut costs, Increase productivity End User IT Project Application Experience RBA Pure Monitoring Business Project Commodity IT BSM CMDB with System closed loop Services Management CMDB – change Basic – management Automatic Investment discovery for regulations Using Implementing Looking Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 120
  • 121. Bank Of Israel regulation Your Text here Your Text here Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 121
  • 122. The different layers of ESM (Enterprise System Management)  Traditional system management – agent that reports to the center • Physical map • Logical map  End User Experience tools • Real • Synthetic  CorrelationTransaction management tools (sophisticated sniffing correlated to applicationstools) Your Text here Your Text here  Specific tools /APM (Application Performance Management). Examples: for SAP, for DBMS, for .Net, for JAVA, for networks , etc.  Central Console – Manager of Managers  CMDB – auto discovery (with relations) and repository Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 122
  • 123. Near neighbors for ESM (tools and users-usage)  Service Desk  OperationsNOC and RBA  SLA management  Compliance and regulations  Infrastructure teams – Configuration management tools, capacity planning tools Your Text here Your Text here  Asset Management + meteringusage tools  SOC – Security Center  Application managers and application developers (using the specific tools) Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 123
  • 124. CMDB – ITIL Your Text here Your Text here Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 124
  • 125. ESM current status: the big ESM players  Clients are happy with their ESM installations but others are not: • "Our concept about ESM has failed! No ROI. Too much time and effort for getting just a little more than basic System Management tools" • "Cost of ESM is huge. We are considering using cheapopen source solution for some of the functionality. Going back to "Best of Breed". • "The basic monitoring will be done by cheapopen source while the BSM Your Text here Your Text here by the big vendors"  I heard more complaints this year  However, Regulation, ITIL implementation, change management etc. is very near to ESM and this helps the big ESM vendors. Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 125
  • 126. What influences the ESM perspective? Who is the ESM ―owner‖ ? Different approaches: ―High Touch‖ ESM team: • The different system teams (Win, Unix, Network, PC) install the agents but with strict instructions from the ESM team • Single console maintained by the ESM team Text here Your Text here Your The ESM team is in the ―background‖ • The different teams have their own management consoles (example – Win- MOM, Unix- BMC, Network – NMM, PC – Aternity) • Maneger of managers console is updated by the ESM team Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 126
  • 127. What clients currently get from CMDB (auto- discovery) project? Before stopping serverresource checking if it is not used by "unknown" application When error happens checking at the CMDB level "what has changed from yesterday" Updating the logical ESM maps automatically from the Your Text here Your Text here CMDB. If I add new server to the SAP Application Server – it will be shown automatically in the corresponding ESM logical map of "SAP system" Getting the asset and configuration from the list and comparingupdating it so other lists. Helping compliancerenewing contracts Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 127
  • 128. What clients currently get from CMDB (auto- discovery) project ? (cont.)  New! Defining ―preferred configuration" and checking if this policy do apply. Example – "Web Server should have Antivirus, MQ, IIS version 8, MSSQL service pack x, port 80 and 81 opened in the FW" then checking that all web servers are configured this way.  New! Integration between the CMDB CI's and the Service Desk. This enables here correlate each incidentproblem to specific Your Text to Your Text here CI's.  Basic workflow – Example when CMDB discovers new server it executes several automatic tasks (adding it to the "to-do list" of ESM team, installing agents, etc.) This is major improvement from last year situation! Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 128
  • 129. What clients currently do not get from CMDB (auto-discovery) project ? Sophisticated workflowautomation. BTW, who is the leader: ESMOperation team or SystemInfra team? From incident management to problem management using CMDB functionality (automatic correlations) Capacity planning Your Text here Your Text here Closed look change management • Don't forget in closed loop change management incidentsproblems update the development team and should be tracked seamlessly ("the bug you have open was is now at testing stage and is scheduled to go to production in 3 day") Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 129
  • 130. Users are considering tools not from the Big 4 Partial list: • Microsoft • Avalon • Oracle • Centerity Your Text here Your Text here • Trigger Plus • Nagios • Server alive Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 130
  • 131. ESM (Enterprise System Management) Ratios ESM Ratios are very different from companies implementing ESM solutions since the level of implementation, internal processes , tools and automation is very different. The KPI itself –‖ per Servers ―– is not ideal as well since it doe not here indication to Routers, Storage devices, Your Text give Your Text here ―check readers‖, etc. Data point in the STKI survey 1 FTE per 1000 server. STKI comment ―close the project!‖ Source: STKI Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 131
  • 132. ESM (Enterprise System Management) support ratio Numbers of servers in Open (Win, Linux, Unix) covered by ESM team (including BSM, CMDB, etc. – if implemented) FTE member: Per FTE # of Servers 25 percentile 179 Your Text here Your Text here Median 362 75 percentile 608 This is an increase of 20% from last years data Source: STKI Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 132
  • 133. Israel Market Positioning – Management Frameworks Vendors to Watch: CA HP Microsoft as central BMC Local Support console IBM Oracle as Your Text here central Your Text here console This analysis should be used with its supporting documents Israeli Market Presence Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 133
  • 134. Market Status and Recommendations Users are using these integrators (support, maintenance) in ESM – Enterprise System Management BSM CMDB: HP Malam-Team Matrix CA Your Text here Your Text here Aman Yana (Maraton) IBM Ness Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 134 134
  • 135. Selected ESM products and integrators Selected products and Integrators Team Matrix / Malam Yana IGS Tangram Ness Netcom AMAN CCC Bynet Techmind (Maraton) HeadON WE Ticomsoft Ludan SecureTeam In2it CA x x x x Tivoli x x x x (netcool) x x x x Your Text here Your Text here HP x x x BMC x x Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 135
  • 136. Agenda Major Trends and Issues • What and why • The solutions • How was 2009-2010? • Miscellaneous Development and SOA Your Text here Your Text here ESM BSM CMDB DBMS and DATA Platforms – Servers Clients Source: http://astonguild.org.uk/files/NEW_MENU_FRONT_RGB%5B1%5D.jpg Storage Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 136
  • 137. The balance is changing Your Text here Your Text here Infra is better Need for more Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 137
  • 138. Major analytic DBMS product groupings Architecture is a hot subject Traditional OLTP Row-based MPP Columnar here Your Text Your Text here (Not covered here) MOLAP/array-based Source: http://www.monash.com/uploads/How-to-buy-data-warehouse-DBMS-February-2009.ppt STKI modifications Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 138
  • 139. DBMS architecture Conventional Database  Data is stored horizontally c c c c c c c c c … 1 2 3 4 5 6 7 8 9  Querying without indexes and views is extremely r1 I/O intensive r2  Building indexes and views is a huge time and r3 resource drain r4  Database footprint must be dramatically expanded r5 Your Text here to make the environment efficient for querying Your Text here SYBASE IQ  Data is stored vertically – Each column is stored c c c c c c c c c … separately 1 2 3 4 5 6 7 8 9 r1  The data is the index r2  Retrieve only columns used in the query – Reduce r3 System I/O dramatically r4 r5  Allocate a thread for each column individually – Process the query in parallel Source: http://www.acs.org.au/nsw/sigs/bi/IQ_presentation_lee_marshall.ppt STKI modifications Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 139
  • 140. Column-Based Architecture Dramatically Reduced I/O = Faster Query Results Q: How many MALES are NOT INSURED in NSW? Row-based RDBMS 800 Bytes x 10M Gender State Insured 16K Page = 500,000 I/Os M VIC Y M NSW Y F QLD N M NSW Y  Process large amounts of unused data M VIC N -  Often requires full table scan Your Text here Your Text here 800 Bytes/Row Column-based Sybase IQ 10M Bits x 3 column/8 Bits = 234 I/Os Gender Insured State 16K Page M Y NSW 1 0 1 10M M N NSW 10M 1 1 1 ROWS F Y VIC Bits 0 + 0 + 0 = 2 M N NSW 1 1 1 Pini Cohen’s work Copyright 2010 @STKI Source: http://www.acs.org.au/nsw/sigs/bi/IQ_presentation_lee_marshall.ppt STKI modifications Do not remove source or attribution from any graphic or portion of graphic 140
  • 141. Traditional OLTP examples Oracle (especially pre-Exadata) IBM DB2 (especially mainframe) Microsoft SQL Server (pre-Madison) Your Text here Your Text here Source: http://www.monash.com/uploads/How-to-buy-data-warehouse-DBMS-February-2009.ppt Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 141
  • 142. Row-based MPP examples Teradata DB2 (open systems version) Netezza Oracle Exadata (sort of) DATAllegro/Microsoft Madison Your Text here Your Text here Greenplum Aster Data Kognitio HP Neoview Source: http://www.monash.com/uploads/How-to-buy-data-warehouse-DBMS-February-2009.ppt Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 142
  • 143. Columnar DBMS examples Sybase IQ SAND Vertica ParAccel InfoBright here Your Text Your Text here Kickfire Exasol MonetDB SAP BI Accelerator (sort of) Source: http://www.monash.com/uploads/How-to-buy-data-warehouse-DBMS-February-2009.ppt Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 143
  • 144. Sun Oracle Database Machine • Grid is the architecture of the future • Highest performance, lowest cost, redundant, incrementally scalable • Sun Oracle Database Machine delivers the first and only complete grid architecture for all data management needs RAC Database Server Grid Your Text here • 8 High-performance low-cost Your Text here Exadata Storage Server Grid compute servers • 14 High-performance low-cost storage • 2 Intel quad-core Xeons each servers • 100 TB raw SAS disk storage InfiniBand Network or • 40 Gb/sec fault-tolerant unified 336 TB raw SATA disk storage server and storage network • 5TB+ flash storage! Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 144
  • 145. Exadata is Smart Storage Compute Intensive • Database Server Processing • Compute and memory intensive data processing executes in database servers • Fully-parallelized joins and aggregations • Exadata Storage Server Bandwidth Intensive Your Text here Searches • IO-bandwidth intensive searches Your Text here executes in storage servers • Exadata Smart Scans and Exadata Storage Indexes filter out data that is not relevant to a query • Database Servers and Exadata storage work in conjunction to execute SQL • Exadata cell is smart storage, not a complete database node Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 145
  • 146. Exadata Smart Scans Database Processing in Storage • Exadata storage servers implement data intensive processing in storage • Row filtering based on “where” predicate • Column filtering • Join filtering • Incremental backup filtering • Scans on Hybrid Columnar Compressed data (new) • Scans on encrypted data (new) • Data Mining model scoring (new) Your Text here Your Text here • 10x reduction in data sent to DB servers is common • No application changes needed • Processing is automatic and transparent • Even if cell or disk fails during a query Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 146
  • 147. Exadata Flash Extreme Performance • Sun Oracle Database Machine has 5 TB of flash storage – 4 high-performance flash cards in every Exadata Storage Server • Smart Flash Cache caches hot data • Not just simple LRU Your Text here Your Text here • Flash more than doubles scan throughput - 50 GB/s • With Exadata Hybrid Columnar Compression - up to 500GB/s Oracle is the First • Up to 1,000,000 IOPS Flash Optimized Database Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 147
  • 148. In Memory DBMS – Oracle TimesTen Lightweight - Real-Time - Embeddable Oracle TimesTen runs as Applications Applications part of the application, accessing a relational databaseText here always in Your that’s Your Text here memory, using a fraction of the CPU, as compared to a fully cached RDBMS Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 148
  • 149. Oracle TimesTen: Complementary Database Strengths Database Oracle Database Oracle TimesTen Characteristic 10g In-Memory Database Data Model Relational - SQL Relational - SQL Target Applications All OLTP, some DSS Optimization Disk-centric Memory-centric Typical deployment Your Text here Database tier Application tier Your Text here Architecture Client/server Direct data access Response Times Milliseconds Microseconds Data Capacity Tens of terabytes Tens of gigabytes Scalability Unlimited SMP/Cluster Good SMP Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 149
  • 150. Attunity CDC Suite for SSIS an Operational Data Replication solution Complete solution for real-time and efficient heterogeneous data replication and integration, integrated with SQL Server. 1. Low impact on data server using log-based CDC technology 2. Efficiency and reduced resources, processing only incremental changes 3. Fully integrated with SSIS (2000, 2005) for ease of use 4. Monitoring and control console to manage replication processes 5. Capitalize on existing investments in SQL Server licenses 1. SQL Server 2. Oracle 3. DB2/400 4. DB2 on z/OS 5. NonStop SQL/MP
  • 151. Semantic Technology Semantic technology as a software technology allows the meaning of information to be known and processed at execution time. For a semantic technologyhere Your Text there must be a knowledge model of Your Text here some part of the world that is used by one or more applications at execution time Source: Vagan Terziyan Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 151
  • 152. SPARQL Query: Access Multiple Sources PREFIX dc: <http://purl.org/dc/elements/1.1/> PREFIX ldap: <http://ldap.hp.com/people#> PREFIX foaf: SELECT ?name ?name2 { ?doc dc:title ?title . FILTER regex(?title, “SPARQL”) . ?doc dc:creator ?reseacher . ?researcher ldap:email ?email . ?researcher Your Text hereldap:name ?name Your Text here } • “Find the name and email addresses of authors of a paper” • Query tech reports first, then go to LDAP for more information. • Other examples: •Copy schedule of conference to Outlook calendar. •Copy list of people to Outlook contacts Source: HP STKI modification Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 152
  • 153. DBPedia . Extracting Structured Information from Wikipedia Your Text here Your Text here http://ids.snu.ac.kr/w/images/3/3c/SC14.ppt dbpedia STKI modifications Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 153
  • 154. SPARQL Query PREFIX skos: <http://www.w3.org/2004/02/skos/core#> SELECT ?presName WHERE { ?presName skos:subject <http://dbpedia.org/resource/Category:Presidents_of_the_United_States>. } Your Text here Your Text here From http://dbpedia.org/sparql Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 154
  • 155. Users perspective on Data issues  When business process mature the need for Data Governance grows (―how many bonuses did client X got‖? But each application defines ―bonus‖ differently…)  100% Data Management is impossible since it means ―rewrite‖….  What is Data Management, MDM, ODS? User asked several integrators and got different answers. This is an example of the ―low level of maturity‖ in this field.  Some organizations suffer less from ―data hell‖ sinceYour Text here Your Text here they decided that one system (MF..) will get data from all other applications  We start to see ―Data Governance‖ projects: Data Governor and Data Custodian (need to check and correct data regularly) from the LOB and Data Steward from the IT Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 155
  • 156. ODS If already have DW – why do I need ODS (Operational Data Store)? • ODS is more updated • ODS has faster response time • ODS is more robust (cluster, DRP, 7*24 etc.) • ODS is Text here (no need for old data or calculated fields) Your lighter Your Text here ODS vs. DW conflicts – who calculate important data example ―Strategic Client‖? ODS or DW ? Sometimes ODS is staging area for DW ODS vs. Operational DW (DW that updates the operational systems)?! Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 156
  • 157. MDM Maturity model MDM Your Text here Your Text here Most orgs in Israel Are between level 1 - 2 Einat Shimoni’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 157 Source: baseline consulting, TDWI
  • 158. MDM – Master Data Management Typical workflow MDM “ready” workflow Search of customer exist – in Search of customer– in MDM the current application domain Enter details of new customer in MDM Enter details of new customer Your Text here Your Text here Enter details of transaction sometimes based on insights taken from MDM Enter details of transaction Sometimes if online checking is not possible - add new phase to process – “end of day” data corrections End END Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 158
  • 159. DBMS Support Ratios DBMS support ratios metrics are not trivial: • Per DBMS but sometimes there are several DBMS single application or one DBMS for several applications • Huge variety. In the same organization: 20 application per FTE for MSSQL (small applications) 1.5 applications per FTE for Oracle (core business) Your Text here Your Text here • Applications DBMS vs. Infrastructure DBMS • Sometimes part of the job is done internally and some by the vendor (application producer) Source: STKI Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 159
  • 160. DBMS Support Ratios Number of applications (in the Open) supported by DBA FTE Per FTE # of Applications 25 percentile 75 Your Text here Median 120 Your Text here 75 percentile 163 Source: STKI Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 160
  • 161. Israel Market Positioning – DBMS Open – General Usage Oracle Microsoft Local Support Your Text here Your Text here IBM This analysis should be used with its supporting documents Israeli Market Presence Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 161
  • 162. Market Status and Recommendations  Users are using these integrators (support, maintenance) in DBMS open area: Oracle  Veracity  Glasshouse  Priority Text here Your Many smallgood integrators Yourthis here in Text area  ACS  Matrix  Microsoft  IBM  Malam-Team many other exist Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 162
  • 163. Agenda Major Trends and Issues • What and why • The solutions • How was 2009-2010? • Miscellaneous Development and SOA Your Text here Your Text here ESM BSM CMDB DBMS and DATA Platforms – Servers Clients Storage Source: http://astonguild.org.uk/files/NEW_MENU_FRONT_RGB%5B1%5D.jpg Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 163
  • 164. Technologies Maturity Model 2010- Servers Business Value Investment to make money IT Project Pure Cut costs, Increase Cloud Business Server Project productivity Servers Virtualization for Prod Multi domain Automation Commodity IT Linux Server UnixMF Legacy Quantum Services Servers consolidation Computer Specific domain Investment for regulations Automation Using Implementing Looking Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 164
  • 165. Virtualization is the King Your Text here Your Text here Source: http://www.phoenixmasonry.org/images/King_Solomon.jpg Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 165
  • 166. Server Virtualization Issues 1. vMotion moves VMs across physical ports—the network Source: https://www.myciscocommunity.com/servlet/JiveServlet/previewBody/8454-102-10-20827/N1K-EBC-Short.ppt;jsessionid=71E78DF43EBDAA54695C2434735A3A33.node0 policy must follow 2. Impossible to view or apply network policy to locally Your Text here Your Text here switched traffic VLAN 101 3. Need collaboration between network and server admin vCenter Cisco CLI (NX-OS) Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 166
  • 167. HP Virtual Connect: Wire once – change ready connectivity for servers and virtual machines Simplified wire-once connection to LANs & SANs Then move workloads or add, move, or replace servers transparently to LANs & SANs in minutes, not days Converged with needing 75% fewer NICs and switches, costing 66% less and consuming 50% less power than managed blade switches Your Text here Your Text here Integrated by working with any Ethernet or Fibre Channel network – ProCurve, Brocade, and Cisco Catalyst/MDS/Nexus Reduced complexity with cutting up to 94% of cables and expensive uplink switch ports without adding blade switches to separately manage Pini Cohen’s work Copyright 2010 @STKI Source: HP Do not remove source or attribution from any graphic or portion of graphic 167
  • 168. Switch and Virtual Connect What is the difference? Switch Virtual Connect  Part of LAN or SAN • Part of server system network • Managed with servers  Managed from network • Layer between servers and network,  Server directly connected, so network so any server change doesn’t see server changes impacts network • Allows flexibility and control of Your Text here Your Text here system resources Server LAN • Ideal for virtualization environments Server Server Server Virtual Connect SAN LAN Server Server Server SAN Server Pini Cohen’s work Copyright 2010 @STKI Source: HP Do not remove source or attribution from any graphic or portion of graphic 168
  • 169. vNetwork Distributed Switch Aggregated datacenter level virtual networking APP APP APP APP APP APP APP APP APP OS OS OS OS OS OS OS OS OS Simplified setup and change vSwitch vSwitch vSwitch Easy troubleshooting, Your CiscoDistributed Switch vNetwork Nexus 1000V Text here monitoringYour Text here and debugging VMware vSphere™ Enables transparent third party management of virtual environments Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 169
  • 170. The Unbearable Lightness of Virtualization  Before- when needing a server you’ve need to: plan (space, electricity , cooling), negotiate, order, wait for shipment, install, ….  Now – 8 minutes and you’ve got up and running server!  So now if you have some kind of problem or something is stuck you might try to add more servers. Maybe this will solve the issue.  This means developmentarchitecture has to work less in certain architectureText here Your scenarios (performance, scalability, availability) Your Text here  But what about: • Good SW development – finding what's wrong and not just adding more servers • Licensing • Monitoring • Storage, Backups • Complexity! Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 170
  • 171. The next big thing- Automation Business-ready infrastructure in action Service Portal Service Catalog Service Service Requester Compliance Your Text here Your Text here Supply Portal Service Templates Service Inventory Supplier Source; HP Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 171
  • 172. Using Templates! Weblogic on 3 VM’s with Windows. Your Text here Your Text here Source; HP Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 172
  • 173. Memory Virtualization Your Text here Your Text here Source http://www.rnanetworks.com/cache-architecture Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 173
  • 174. Where processors are going? IBM POWER7 systems Manage millions of transactions in real time Analyze data from billions of smarter planet devices Gain industry-leading price performance Your Text here Your Text here ✓4, 6 or 8 cores per socket ✓3.0 to 4.14 GHz ✓Up to 4 threads per core ✓Integrated eDRAM L3 Cache ✓Dynamic Energy Optimization Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 174
  • 175. What’s next? Quantum computer  A classical computer has a memory made up of bits, where each bit represents either a one or a zero.  A quantum computer maintains a sequence of qubits.  A single qubit can represent a one, a zero, or, crucially, any quantum superposition of these  A quantum computer operates by manipulating those qubits Your Text here Your Text here with a fixed sequence of quantum logic gates. The sequence of gates to be applied is called a quantum algorithm.  Integer factorization is believed to be computationally infeasible … by comparison, a quantum computer could efficiently solve this problem! Source: http://en.wikipedia.org/wiki/Quantum_computer stki modifications Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 175
  • 176. Annoying issue: Mailbox Size Currently mailbox size is (financial organizations): • Standard is 150M-250M • Managers get 400M-500M (about 30% of population) • VIP’s get more Largest message supported : 5MB Your Text here Your Text here Exchange 2010 can help! Source: http://www.classicaddresssigns.com/sitebuildercontent/sitebuilderpictures/MailboxSizeComparison.JPG Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 176
  • 177. Exchange 2010: Deployment Flexibility Greater Range of Storage Options Through Performance Enhancements Storage Area Direct Attached Direct Attached JBOD SATA Network (SAN) w/ SAS Disks w/ SATA Disks (RAID-less) Your Text here Your Text here  70% reduction in IOPS  Smoother IO patterns  Resilience against corruption Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 177
  • 178. Exchange 2010 Deployment Flexibility Deploy Exchange in a Fashion That Best Fits Business Needs with Choice of Delivery On-Premises Hosted Service Your Text here Co-Existence Your Text here Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 178
  • 179. Exchange 2010 : Continuous Availability Simplified Mailbox High Availability and Disaster Recovery with New Unified Platform San Jose New York Mailbox Mailbox Mailbox Server Server Server DB1 DB1 DB1 Replicate databases Recover quickly Your Text here DB2 DB2 Your Text hereto remote datacenter DB2 from disk and DB3 DB3 DB3 database failures DB4 DB4 DB4 DB5 DB5 DB5  Evolution of Continuous Replication technology  Easier than traditional clustering to deploy and manage  Allows each database to have 16 replicated copies  Provides full redundancy of Exchange roles on as few as two servers  Capabilities of CCR and SCR combined into one platform Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 179
  • 180. Exchange 2010 : Continuous Availability Limit User Disruption During Mailbox Moves and Maintenance E-Mail Client Users remain online while their mailboxes are moved between servers Your Text here  Sending messages Your Text here  Receiving messages Client Access Server  Accessing entire mailbox Administrators can perform migration and maintenance during regular hours Mailbox Server 1 Mailbox Server 2 Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 180
  • 181. Open Source in Israel  The majority of enterprise clients will evaluate open source solution in the same way they evaluate other solutions (price, maturity, local experience, etc.)  They will not put into consideration ―open source‖ special capabilities: • Ability to modify code • Ability to look into code • Install solution with ―internet‖ support  Application Text here Your programmers might copy code from internetText here managers Your but the are not aware of this  Currently most Israeli solution providers integrators will not include in their solution open source solution. This stops wide adoption of OSS.  Areas where Open Source is more mature is Linux , WCM , Apache, Wikis, Jboss, and JAVA ALM tools. It is becoming more mature in BI. Open Source in client environment (Open Office, Desktop Linux) is still not catching up Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 181
  • 182. Israel and the MF  MF is the most mature platform  MF usage and capacity has changes dramatically in the last 10 years  There is large variety between the organizations: • ―MF is expensive but worth it‖ vs. ―We will do everything to lower MF expenses‖ • ―Shortage in personal is critical‖ vs. ―We train people ourselves‖ Your Text here Your Text here • ―New core systems will be build outside‖ vs. ―MF will continue to hold the most critical applications‖  Users use more IFL as Linux consolidation platform. Is it part of the Open or MF teams? Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 182
  • 183. Israel and the MF / cont. Most of the MF development in Israel is done on the MF but there are new alternatives emerging – developing on the desktop with higher productivity tools Users spend time (and money) by the application teams to reduce MIPS consumption MF monitoring and performance tools are highly used – Your Text here Your Text here some clients claim that ―over used‖ since the tools consume MIPS and do not provide meaningful recommendations Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 183
  • 184. MF – lots of action is out there: zCost AutoSoftCapping work? With AutoSoftCapping  the LPAR’s DCs are dynamically modified CPC Mod Cap Σ SCRT  by taking into account the needs of all LPARs DCs  while the sum of the LPAR's DCs remains constant Z9- 2094 843 665 664 714 LPARs DCs (with ASC) Billing (with ASC) SCRT=6 Your Text here Your 64 Text here 665 RESULTS • The bill will be based on an SCRT of 664 MSUs Example • 766 – 664 = 102 MSUs saved Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 184
  • 185. Israel and the MF / cont Your Text here Your Text here Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 185
  • 186. Server Ratios - Windows  Number of Windows Servers (logical ) per System member Per FTE Windows Servers 25 percentile 69 servers Median 120 Servers 75 percentile 178 Servers Your Text here Your Text here • Change from last year – about 20% increase • Server is either physical or virtual • This includes SBC (CitrixWTSJetro) support  For development environment’s ratios can grow up to Servers per FTE  Organizations with 100% identical servers in branches can get ratios of 1:500 servers per FTE Source: STKI Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 186
  • 187. Server Ratios - Windows Windows Server growth is huge Many clients claimed they are understaffed – not able to perform the patches on time, capacity planning, consolidation project is too slow, keeping track of all changes,Text here Your etc. Your Text here STKI observation – Virtualization has potential of savings but must start with adequate resources (staff). Source: STKI Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 187
  • 188. Server Ratios –Unix Linux  Number of Unix (OS) and Linux servers per System member: Per FTE Unix Linux Servers 25 percentile 10servers Median 20 Servers 75 Your Text here percentile 53 Servers Text here Your  Roughly same ratios as last year’s data  Good metric for Unix is hard to find: • Per CPU (but there are machines with many virtual OS on each CPU) • Per OS (but there are sometimes huge machines with 1 OS) • Per physical server Source: STKI Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 188
  • 189. Server Ratios –Unix Linux Unix is rather declining . Many clients are migrating to Linux with the same staff. In many cases Windows load is increasing over LinuxUnix Your Text here Your Text here Source: STKI Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 189
  • 190. Market Status and Recommendations Users are using these integrators (support, maintenance) in Servers-Platform Open area: HP TEAMMalam EMET IBM Your Text here Your Text here WE Harel Bynet PenguinIT CCC Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 190
  • 191. Israel Market Positioning -Unix HP IBM Many clients ask themselves about the future of SUN Oracle/ Local Support SUN Your Text here Your Text here This analysis should be used with its supporting documents Israeli Market Presence Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 191
  • 192. Israel Market Positioning – Industry Standard Processors X86 including blades (Intel AMD) Vendors to Watch: HP Cisco IBM Local Support Your Text here Your Text here DELL Oracle/ SUN This analysis should be used with its supporting documents Israeli Market Presence Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 192
  • 193. Agenda Major Trends and Issues • What and why • The solutions • How was 2009-2010? • Miscellaneous Development and SOA Your Text here Your Text here ESM BSM CMDB DBMS and DATA Platforms – Servers Clients Storage Source: http://astonguild.org.uk/files/NEW_MENU_FRONT_RGB%5B1%5D.jpg Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 193
  • 194. Technologies Maturity Model 2010– End Point Devices Business Value Investment Mobile Desktop as to make money a Service Devices MAC for the Cut costs, Increase Business Microsoft Traditional IT Project productivity BPOS SBC for niche VDI Pure Business environment Application Project virtualization Commodity IT Office Windows 7 Services 2007 Software Appliances Investment for regulations Using Implementing Looking Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 194
  • 195. PC Deployment Options (and mix of these options) PC Deployment Server OS Application Traditional Blade PC Based streaming Streaming Deployment Computing (diskless) Your Text here Client Server Your Text here SW Virtual OS Technology Technology Sandbox Standard Old PC Terminal Virtual Thin Client PC WinXP-E Servers Desktop Standard Application SW Streaming distribution Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 195
  • 196. The ClearCube Solution – PC Blades Your Text here Your Text here Source: http://www.ehcca.com/presentations/HIPAA9/3_06.ppt Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 196
  • 197. Operation System/Disk Streaming Centralized Storage No Physical Disk is required in the End User Device. All Data is read/write to Server / NAS / SAN the remote disk. The OS and user specific setting is streamed from the remote disk. End User Device Your Text here Your Text here Network Source: IBM Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 197
  • 198. Other means of application streaming Ceedo Personal works like a portable operating system by allowing users to carry applications on portable media such as USB flash drives Your Textpocket hard and here Your Text here drives, running them inside a virtual environment Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 198
  • 199. Application Virtualization – running in a sandbox (Microsoft APP-V Softgrid) Your Text here Your Text here Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 199
  • 200. Application Virtualization – Based on PC virtualization Microsoft MED-V Architecture (Kidaro) Your Text here Your Text here Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 200
  • 201. What Makes Up A Desktop Cloud?  VDI (a lot of interaction – like local) •Multiple Operating System instances are run on a Server governed by a Hypervisor. • Appearance of a dedicated desktop to the End User.  Shared Virtual Desktop (the old “Terminal Servers” “Citrix” “Jetro” ) • Good enough for task workers • Better scalability  Application Virtualization • Hosted application running on the server or Streamed to the PC and running on the PC (in “bubble” mode with or without additional OS) Your Text here Your Text here • Allows for the separation of the Application Layer from the OS Layer.  Connection Broker • Used to access the virtual environment. • Multiple images could be available based on access privileges.  Storage Optimization • Optimization technologies are used to reduce the disk space required by desktop images. • Not a mandatory part of a virtual environment, however it provides savings in storage costs. Source: IBM STKI modifications Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 201
  • 202. Client Virtualization Technologies Technology Type Major Players (Products) Desktop Virtualization Terminal Services / Citrix XenApp (Presentation Servre / Metaframe) Published Desktop / MS 2003/2008 Terminal Service Presentation Virtualization Virtual Desktop / VDI VMware View (VMware ESX Infrastructure based solution) Citrix XenDesktop (Citrix XenServer Based solution) Blade Workstation IBM Blade Workstation HP Consolidated Client Infrastructure (CCI) Application Virtualization Client Side Microsoft Application Virtualization (App-V / SoftGrid) / Isolation Your Text here or without Streaming) (with VMWare ThinApp Your Text here Citrix XenApp Wyse Streaming Manager Server Side Citrix XenApp MS 2003/2008 Terminal Service OS Streaming / Disk Citrix Provisioning Server/PVS (Ardence) Streaming Wyse Streaming Manager HP neoware Image Manager Lenovo Secured Managed Client Storage Optimization IBM Virtual Storage Cloud (Deduplication) VMware View Composer (Linked Clone) NetApp (FlexClone) 202 Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic Source: IBM 202
  • 203. Desktop Cloud Architecture Options Traditional terminal server Public Desktop Cloud Service keyboard, mouse, display, network Thin Client / Repurposed PC User User User User Your Text here Your Text here Rack-based Virtual Client Servers Virtual Machines Options for VM sizing Shared Management Infrastructure VM only no image Pini Cohen’s work Copyright 2010 @STKI Source: IBM Do not remove source or attribution from any graphic or portion of graphic 203
  • 204. VDI status – what is happening in Israel Clients are interested in this technology There are some nice niche projects in this field: • Eliminating second PC for developers • Enabling second ―corporate‖ PC for enhanced security • Enabling off-site developers Your Text here Your Text here Remote control for Hosted Virtual Desktop is an issue Clients ask themselves if traditional ―Terminal Server‖ technology is enough? Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 204
  • 205. VDI vs. Terminal Services  Pro: • Enables installation of non-standard SW • Enables SW not running in multiuser environment • All applications are ―Virtual Desktop ready‖ no need to consume time of the internalexternal developers • Enable (more..) local user experience  Cons: Your Text here Your Text here • Application delivery should still needs to be addressed • More infrastructure is required • Lots of Storage needed (but storage snap technologies are maturing) • VECD license • Persistence vs. None-Persistence mode Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 205
  • 206. Thin clients  Clients report easier maintenance – some has reduced second level support!  Thin clients vs. ―Dum PC‖  Pro. • User is able to replacemove the device • Better MTBF • No need for SW distributionupdated (winCELinux version) Your Text here Your Text here • Greener (electricity, heat) • More secure (stateless) • Cheaper (winCE version)  Cons. • In winCE version – when there is none-standard deviceusb you are stuck! Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 206
  • 207. What is Teradici?  Developer of PCoIP® (PC-over-IP Protocol) • Delivers a True Host PC Experience over IP networks • Founded in 2004, based in Vancouver, Canada  World Class Algorithm/Software/Silicon Team • IBM, Dell, Intel, Broadcom, NVIDIA, PMC-Sierra • 37 US Patents filed Your Text here Your Text here  Widespread OEM Adoption • IBM, Dell, Samsung, DevonIT, Verari, Amulet, Clearcube, Fujitsu etc. • Thousands of end-user deployments  Next Generation Development • Fully virtualized host and client devices • Strategic co-development with VMware Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 207
  • 208. VMware View PCoIP Software Implementation Software client/host flexibility with exceptional user experience Soft PCoIP Client ( View Client) Soft PCoIP Host ( View Agent ) • Client flexibility – support for  Virtual Machine Optimized PCs, notebooks, thin clients,  VMware View Manager other X86 clients & hardware Integrated PCoIP Hosts  No hardware acceleration Your Text here • Exceptional user experience required Text here Your • Mobility via notebook and  Optional hardware Teradici future PDA portal interoperability • Optional hardware host interoperability Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 208
  • 209. Highly Efficient Encoding for PC Display Use the right CODEC for specific display content – Deliver the best experience Icons Motion Video Text Text here Your Your Text here Photos Graphics Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 209
  • 210. Virtual Desktop licensing- VECD VECD is a device-based subscription license and is available two ways:  1.VECD for Software Assurance (SA), which is priced at $23/year  2.VECD, which is priced at $110/device/year Your Text here Your Text here Note: It is important to know that VECD is mandatory for any virtual desktop infrastructure (Virtual Desktop) deployment that uses virtual copies of Windows, regardless of the underlying infrastructure provider. Source: http://www.microsoft.com/windows/enterprise/solutions/virtualization/licensing.aspx Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 210
  • 211. Relevant Trend: Consumerization • New technology to the consumer market ahead of business markets. • Resulting in a switch of technology research from the work place to the home. • Home based IT is more capable than that provided in their workplace ? 211
  • 212. Brain waves do what? Intel Predicts Brain waves will replace keyboard and mouse, dial phones and change TV channels by 2020 By the year 2020, you won't need a keyboard and mouse to control your computer, say Intel Corp. researchers. Instead, users will open documents and surf the Web using nothing more than their brain waves. Text here Sander Your Text here Your (H/T Olson) Source: http://graphics8.nytimes.com/images/2007/08/01/health/adam/8730.jpg Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 212
  • 213. Laptop vs. What? What are netbooks? Netbooks are a rapidly evolving category of small, light and inexpensive laptopText here Your computers Your Text here Good for general computing and web-based http://en.wikipedia.org/wiki/Netbook applications Source: http://blog.eun.org/eminent/upload/RiinaBertrandMallahEMINENT09WorkshopB2.ppt STKI modifications Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 213
  • 214. What is an OLED? OLED - Organic Light Emitting Diode An OLED is any light emitting diode (LED) which emissive electroluminescent layer is composed of a film of organic compounds. OLED isYour Text here which is actually LED backlit TVs here panel not LED Your Text , the itself being standard LCD Source: STKI modifications http://www.cosc.brocku.ca/Offerings/3P92/seminars/OLED_Organic.ppt Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 214
  • 215. Advantages of OLEDs OLED Displays Vs. LCD and Plasma • Much faster response time • Consume significantly less energy • Able to display "True Black" picture • Wider viewing angles • Thinner display • Better contrast ratio • Safer for the environment Your Text here Your Text here • Has potential to be mass produced inexpensively • OLEDs refresh almost 1,000 times faster then LCDs Source: http://www.cosc.brocku.ca/Offerings/3P92/seminars/OLED_Organic.ppt OLED Lighting Vs. Incandescent and Fluorescent • Cheaper way to create flexible lighting • Requires less power • Better quality of light (ie. no "Cold Light") • New design concepts for interior lighting Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 215
  • 216. Disadvantages of OLEDs OLED Displays Vs. LCD and Plasma • Cost to manufacture is high • Overall luminance degradation • Constraints with lifespan • Easily damaged by water • Limited market availability Your Text here Your Text here OLED Lighting Vs. Incandescent and Fluorescent • Not as easy as changing a light bulb Source: http://www.cosc.brocku.ca/Offerings/3P92/seminars/OLED_Organic.ppt STKI modifications Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 216
  • 217. Windows MultiPoint Server 2010 Education Positioning – Launching in Nov 2009 POSITIONING For: K-12 schools with limited or no IT skilled staff STATEMENT [to customer] Who: Want to provide a personalized learning experience through technology for more students and teachers What: Windows MultiPoint Server is a Windows offering That: enables up to 10 students to simultaneously share a single computer in a cost effective way. Each student has their own monitor, keyboard and mouse directly connected to the shared computer, giving them each their own Windows desktop experience. Your Text here Differentiation: Your Text here •Against like-solutions: based on the latest Windows technology, fully supported by Microsoft and partners, simple. •Against a PC: lower TCO [upfront and ongoing costs] Increase Student Access at Familiar, Supported, Latest Windows Simple Technology, Working For You PILLARS Lower Total Cost POSITIONING Window 7 Client: STATEMENT •Windows MultiPoint Server enables a shared computing environment. [vs. Windows 7 Client and •Provides lower TCO, but is less flexible. Windows Server 2008 R2] Windows Server 2008 R2: •Windows MultiPoint Server is designed for non-technical education staff HP Confidential 217 Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 217
  • 218. Computing Access Options Host PC Today’s here Your Text Why not more PCs? SharingTextcomputer Your a here Challenge  Acquisition Cost across many Sharing a computer by many Independent user sessions  Maintenance & accessed simultaneously from a Independent user sessions (one-at-a-time) Support single PC via PC Sharing aka Shared Resource computing OR A group watches a single  Network Access user’s session  Electrical Capacity  Noise & Heat Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 218
  • 219. Windows 7 The general feedback is very good Decision points: • 32bit vs. 64bit • Wait for Office 2010? 64BIT computing is the future Your Text here Your Text here 32bit vs. 64bit will cause minor adjustment , test and waiting for 3rd party SW new version but it is not causing changes in the user environment – training is not needed. This means 64bit migrations may be delayed Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 219
  • 220. Desktop Migration Process Desktop Migration process: • Initial testing phase • Image preparation SW compatibility and development Tests Image preparation and distribution mechanism here Your Text here Your Text • Training Prepare materials Schedule training Delivery the training and the day after the employee start working with the new version with one day assistance Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 220
  • 221. Wait for Office 2010? The main decision criteria point is training. Another criteria is developmentadjustments for applications Training is expensive and long process. Organizations that need to train their employees might consider to wait for Office 2010. huge developmentadjustments is Your Text hereor if 3rd When Your Text here needed party software is not available, organizations might consider not to wait for Office 2010 Organizations should test Office 2010 beta for initial impression Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 221
  • 222. Windows 7 Application Control Situation Today Windows 7 Solution AppLocker™ Your Text here Your Text here Users can install and run unapproved applications Eliminate unwanted/unknown applications in your network Even standard users can install some types of software Enforce application standardization within your organization Unauthorized applications may: Introduce malware Easily create and manage flexible rules using Group Policy Increase helpdesk calls Reduce user productivity Undermine compliance efforts Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 222
  • 223. Secure Browsing with Microsoft MED-V Instead of ―traditional‖ secure browsing based on terminal server solution the client is using Microsoft’s MED-V (formally Kidaro) for enabling secure browsing which is running on the same PC with no backend servers Different VLAN tag Your Text here Your Text here Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 223
  • 224. PC Support Ratios Support per PC is not equal to Support per Employee since there might be organizations with more PC and Employees (some employees has more than one PC) or vice versa (one PC is used for several employees working in shifts). The difference is small. Service desk ratios variation is related a lot to the ―application support‖ and even ―business support‖. Your Text here Your Text here Applicationbusiness related support might be up to 30% of service desk effort Source: STKI Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 224
  • 225. PC Support Ratios and TCO 2nd level support is dependent on geographical locations and related devices (―check readers‖) PC Second Level support Ratios variation is very big since in some organizations the field technicians are part of new system implementation, some are responsible for HW (and some not…) Your Text here Your Text here Thin client reduces the need for 2 nd level support but increases the need for infrasystem support Is the SBC system part of System or PC ?! Source: STKI Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 225
  • 226. PC Support Ratios  Support Per PC for FTE Per FTE Service Second Third – Total Desk Level Image Support per PC 25 percentile 210 275 1368 100 Median 385 400 2000 160 Your Text here75 percentile 458 635 Your Text here 3635 222 Source: STKI  Support per Employee for FTE Per FTE Service Second Third – Total Desk Level Image Support per Empl. 25 percentile 200 250 1330 91 Median 300 404 1940 162 75 percentile 458 533 3467 185 Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 226
  • 227. Market Status and Recommendations Users are using these integrators (support, maintenance) in Clients area: One1 Malam-Team Taldor Calanit excellence in migration projects) Text here Your Text here Your Dorcom Omnitech HP Matrix Hayun Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 227
  • 228. The IBM legend Unbelievable brand ―IBM Laptop‖ Your Text here Your Text here Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 228
  • 229. Israel Market Positioning Desktops Vendors to Watch: HP Apple Local Support Not rarely I hear – Lenovo its all the same! Your Text here DELL Your Text here Acer This analysis should be White used with its supporting boxes documents Israeli Market Presence Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 229
  • 230. Israel Market Positioning Laptops Vendors to Watch: Lenovo HP LG Toshiba DELL Local Support Sony Apple here Your Text Your Text here Worldwide Leader This analysis should be used with its supporting documents Israeli Market Presence Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 230
  • 231. Agenda Major Trends and Issues • What and why • The solutions • How was 2009-2010? • Miscellaneous Development and SOA Your Text here Your Text here ESM BSM CMDB DBMS and DATA Platforms – Servers Clients Source: http://astonguild.org.uk/files/NEW_MENU_FRONT_RGB%5B1%5D.jpg Storage Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 231
  • 232. Technologies Maturity Model 2010- Storage Business Value Investment to make money Sophisticated CDP snaps for creating environments Cut costs, Increase Dedup Green productivity for Storage Backup Storage Thin Virtualization Provisioning Commodity IT NAS and FCOE Services SAN Flash Drives Cloud Investment Email Storage for regulations Archiving Using Implementing Looking Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 232
  • 233. FCOE Your Text here Your Text here Source: http://www.e-storm.org/200710EMULEX.pdf Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 233
  • 234. Technologies Your Text here Your Text here Source: http:// _.html www.infostor.com/index/articles/display/3417089901/articles/infostor/volume-13/Issue_8/Features/Is_FCoE_the_future_of_data_center_networks Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 234
  • 235. FCOE products: OneConnect™ Overview  Universal Converged Network Adapter (UCNA)  Three high-performance 10Gb Ethernet options • Network Adapter • iSCSI Adapter • Fibre Channel over Ethernet (FCoE) CNA Your Text here  Convergenomics™ Data Text here Savings Your Center • One infrastructure for networking and storage  vEngine™ Technology – Scalability and Performance for Virtualization • Multi-protocol CPU offloads for optimum efficiency  OneCommand™ Manager application Source: http://www.emulex-channel.com/files/channel/elx_ppt_cha_oneconnect.ppt stki modifications Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 235
  • 236. FCOE maturity  The INCITS T11 standards body has approved a draft (making it a de facto standard) and released it for public review Your Text here Your Text here Source: http://searchstorage.techtarget.com.au/tips/36499-Fibre-Channel-over-Ethernet-FCoE-implementation-guide Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 236
  • 237. FAS Deduplication in Action presentation.ppt presentation.ppt 20 x 4K blocks Identical file 20 x 4K blocks = Identical blocks Data Written to Disk: Your Text here Your Text here With FAS dedupe: 38 blocks No FAS Dedupe: 75 blocks presentation.ppt job-cv.doc http://www.netappusergroup.com/Presentations/2008November/Dedupe%20on%20Filers.ppt Edited, 25 x 4K blocks Different file 10 x 4K blocks Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 237
  • 238. Thin Provisioning Example Production Example: Create 1TB ―thin‖ volume • No real space allocated • Snapshot at volume creation • Initial ―snap‖ allocation of 32 GB • Mount ―thin‖ volume • File system sees 1TB; 32 GB allocated Your Text here Your Text here • Grow on demand 000000000000 • ―Reads‖ from non-data areas return ―0s‖ Source: http://www.dnsarrow.co.uk/dns_CMS/uploadedFiles/DNS/Storage_Solutions/HP/17th%20November%20 Overview%20-%20Simon%20Brassington.ppt Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 238
  • 239. GS: Price gap is closing. We expect 80GB-100GB SSDs to be within $100 of a HDD in the next 24 months. Your Text here Your Text here Source: GS http://bg.panlv.net/file/2010/01/10/087c22dd5c96e25f.pdf Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 239
  • 240. SSDs continue to gain traction Your Text here Your Text here Source: GS http://bg.panlv.net/file/2010/01/10/087c22dd5c96e25f.pdf Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 240
  • 241. The bid of the year: DataDomain Your Text here Your Text here Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 241
  • 242. New Storage Technologies  Storage-Intensive Supercomputing (SISC) at LLNL • System architectures for applications with massive datasets • New technologies: processing elements, networks, and storage  NAND-Flash storage in high-performance computing • Flash chips have great potential: 100x access times, 10x bandwidth • However, few commercial products have delivered performance Your Text here Your Text here  Exception: Fusion-io’s ioDrive • PCIe x4 card with 80-320 GB of flash • Theoretical read speed of 700 MB/s • Hardware allows many IOPs to be in-flight concurrently Source: http://www.ll.mit.edu/HPEC/agendas/proc08/Day2/B11-Ulmer-Precis.ppt Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 242
  • 243. Reduce Latency with Performance Acceleration Modules (NETAPP PAMs) Your Text here Your Text here 243 NetApp Confidential - Limited Use Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 243
  • 244. Kaminario K2 Data Appliance 10x to 100x performance boost  Ultra high performance • Over 1 million IOPS • Over 10 GB/s throughput • Under 200 micro sec latency • Equal for both random and sequential workloads  Enterprise grade Your Text here Your Text here • All data stored in DRAM, mirrored to HDD Fast IT – Faster business • UPS protected  Any application, no process change - Standard FC connectivity  Off-the-shelf blade hardware  Easy deployment & management Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 244
  • 245. Amanda - Open Source Backup ―Amanda is the world's most popular Open Source Backup and Archiving software‖ Your Text here Your Text here Source: http://wiki.zmanda.com/index.php/Main_Page Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 245
  • 246. The Israel storage market will be highly influenced by MOD Storage bid Your Text here Your Text here Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 246
  • 247. Client testimonies Client still complain about the enormous storage growth (30% to 100% and more each year). That means large clients has in each point in time some environments in migration. Either capacity or performance is bottleneck. Staffing is too low in many organizationsYour Text here Your Text here  Clients are interested in thin provisioning but still consider it as immature (what will happened if storage usage will grow fast?!) Source: http://blog.oregonlive.com/clackamascounty_impact/2009/07/large _Worthington-Testifies.JPG Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 247
  • 248. VTL and Dedup Users start to use VTL and Dedup technologies – large adoption mainly in the end of 2009 – start of 2010 VTL should eliminate the need for ―Tender processing‖ Users see very differently the reliability of tapes. Some consider taped inherently un-reliable. Some are very happy Your Text restores from tapes. with here Your Text here VTL’s should be faster than traditional tapesrobots but it is not always the case What is the electricity cost in VTL project?! Source: http://blog.oregonlive.com/clackamascounty_impact/2009/07/large _Worthington-Testifies.JPG Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 248
  • 249. VTL and Dedup Dedup where? • Backup Server (DiligentIBM, DatadomainEMC, Falconstor, etc.)? • Backed up Server – the client level (SymantecPuredisk, EMCAvamar)? • From the Deduped production storage? (like Text here offers) Your Text here Your NETAPP VTLDedup is still maturing but users already fill confident and get real value from this technology Source: http://blog.oregonlive.com/clackamascounty_impact/2009/07/large _Worthington-Testifies.JPG Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 249
  • 250. FC switches market will change From purchasing the switch from the storage manufacture to purchasing the switch from the integrator or network manufacture Who will compete with Cisco ?! Will Brocade have any chance? Text here Your Your Text here Source: http://www.gocomsys.com/assets/images/storage-switches.jpg Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 250
  • 251. Dimensions of Data Protection solution  # of copies  Cost – HW, SW, Operations  Distance between copies  Time Granularity (once a day,  Single Point of Failure (HW, each hour, continuous) SW, Human). How bad is each  Data content granularity failure. (Volume, File, Message)  "Technology distance" between  Bandwidth needed the copies (same machine,  Application awareness / other same technology) what Your Text here tools compatibilityhere Your Text (VMWARE) happens if one copy is  What is the testing mechanism destroyed. Does it reflect the for the solution? other copies?  Resuming from error mode to  RTO – Return Time Objective normal mode  RPO – Return Time objective  Maturity  Backup window – how does it reflect normal operations Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 251
  • 252. New Service by HMS - BACKUP & RECOVERY SITE AT AN ATTRACTIVE COSTS ABROAD The nature of the "New Risks" : Thousands of rockets at "Gush Dan" per a day and Earthquake. Now it turns out that the variety of solutions that exist are not suitable. BREAKTHROUGH: Med Nautilus and HMS Halperin consultants have reached an agreement that allows the establishment abroad with a backup site becomes financially attractive and efficient solution. Your Text here Your Text here • Description of solution: combining underwater cable which is the primary communication channel of Israel with the world with Data Center at the cable landing site in Italy. • Communication: at all volume required (Ring configuration) • Thousands of square meters in an existing Data Center are built according to international standards. • The solution includes a closed ring with no option to go abroad (out of the building) • Attractive price,Pini Cohen’s work Copyright 2010 @STKI total cost) - with competing sites in Israel. competitor (In terms of Do not remove source or attribution from any graphic or portion of graphic 252
  • 253. DBMS replications – log shipping In some cased users move from Storage Replication to DBMS replication (log-shipping) This solution is more application aware And enables faster recovery in large DBMS Your Text here Your Text here Source: http://motherjones.com/files/legacy/blue_marble_blog/tinley_ship-lrg.jpg Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 253
  • 254. Storage Size and Growth in Selected Industries Industry 2010 1Q Size Planned RAW Growth per year Defense 500TB-4P 50%- 100% Finance 400TB-1P 40% - 75% Health 140TB-350TB 30%-50% Your Text here Your Text here Manufacturing – 40TB-200TB 20%-50% Retail Telco 900TB-2.5 PETA 30%-50% Governmental 10TB-30TB 25%-100% High Tech 40TB-150TB 20%-30% Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 254
  • 255. Storage Ratios  Number of Raw TB and Usable TB per Storage Staff Member FTE (including backup and DRP of storage): Per FTE RAW Storage Usable Storage 25 percentile 75 TB 36 TB Your Median Text here 200 TB 92 Your Text here TB 75 percentile 333 TB 221 TB  About (unbelievable!) 100% increase from last years data (Median Raw Storage capacity per FTE) Source: STKI Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 255
  • 256. Storage Ratios  Many issues in storage ratios: • What is Usable storage? • Answer: after Raids and Storage needed for internal usage • But it is not usable storage for applications – DRP, ―cold copies‖) • Raid 1 vs. Raid 0 vs. Raid 5 (and other Raid types) • VTL storagehere Your Text (more storage but helps operations!) Your Text here • Backup operation is handled by several teams • On January I had 100TB. On February I purchased another 100TB. What does that mean about my ratios? Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 256
  • 257. Storage Ratios  Storage is the area where many clients complained they are understaffed – not able to control the allocations, proactive maintenance , new technologies  Want to have better ratios? allocate each application highend storage x4 of what was asked…. Your Text here Your Text here  STKI predicts – IT failures caused by Storage Source: STKI Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 257
  • 258. Market Status and Trends Survey has shown that these integrators are used: (providers – from service point of view) in Storage area: EMC Netapp Text here Your Your Text here HDS IBM Malam-Team Ankor Glasshouse HP WE Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 258
  • 259. Market Status and Trends Survey has shown that these integrators are used: (providers – from service point of view) in backup area: GlassHouse IBM HP Your Text here Your Text here Emet Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 259
  • 260. High End Storage vs. Midrange Storage  The majority of IT organizations differentiate High End and Midrange Storage solutions. What differentiate according to users: • Performance (example: ―500 to 900 MB per second is HIGHEND‖) • Availability – Reliability • Higher risk • Upgrade Text here without downtime Your firmware Your Text here • Functionality (number of copies, failback, etc.) • Price Source: • More difficult to manage http://blog.oregonlive.com/clackamascounty_impact/2009/07/large _Worthington-Testifies.JPG  Big storage shops tend to differentiate  Higher level managers tend not to differentiate  If vendor X gets ―High End functionality‖ in January does it mean it has become High End player from January?! Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 260
  • 261. High End Storage vs. Midrange Storage – Survey result Users listed in the High End Storage Category • EMC • HDS • IBM (DS8000) • HP (XP) Many clients consider XIV as High End or Your Text here High Your Text here ―almost‖ End solution Many Netapp clients and some ―non Netapp‖ clients consider it as High End storage solution Source: http://blog.oregonlive.com/clackamascounty_impact/2009/07/large _Worthington-Testifies.JPG Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 261
  • 262. NAS vs. SAN vs. Unified Storage We have also asked if storage solutions should be considered as NAS and SAN or as Unified Storage (NAS and SAN together) Answers are rather similar to the High End vs. Midrange dilemma: • Most users separate solutions Your Text here Your Text here • Many Netapp clients look at storage as unified solution • Higher Managers tend or want to have unified solution Source: http://blog.oregonlive.com/clackamascounty_impact/2009/07/large _Worthington-Testifies.JPG Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 262
  • 263. STKI take  The storage world is moving towards Unified storage model where all storage needs are being served in unified way. Top management favors this. The ―mega trend‖ of ―Industry in a box‖ ―Internal Cloud‖ also.  However, this takes time and currently there is a difference between High End and Midrange Storage.  STKI believes here product brochure is not theYour Textway to Your Text that only here measure if product is suitable. If you want to be confident you need to look at the product company ―mileage‖.  Still, increasingly, many storage needs could be addressed by Midrange solutions than before. Many users do not have ―accurate‖ knowledge concept about Midrange Storage.  Even in ―perfect unified storage world‖ there would be still place for niche high-end markets (both SAN and NAS) Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 263
  • 264. IBM XIV  XIV is a rising start in the storage arena.  XIV users are very happy with XIV’s • Performance • Easy of Management • Functionality  Several XIV users mentioned it help improve their staffing ratios dramatically  Still it isYour Text here not considered full blown ―High End‖ storage by some users: Your Text here • Platform support • Application Support • Management reporting tools • Performance in some cases • ―More mileage is needed‖  XIV has addressed some of these issues  STKI believes that replicated XIV solution is particularly suitable for demanding storage environments Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 264
  • 265. Israel Market Positioning High-end Storage (total including MF) EMC Local Support IBM HDS Your Text here Your Text here HP This analysis should be used with its supporting documents Israeli Market Presence Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 265
  • 266. Israel Market Positioning Midrange Storage SCSI EMC Vendors to Watch: NETAPP IBM XIV N DS DataDirect Local Support Networks Your Text here HP Your Text here Midrange storage share is rising on the expenses of HDS highend storage This analysis should be used with its supporting documents Israeli Market Presence Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 266
  • 267. Israel Market Positioning General Storage Solution – starting point for general use Leaders EMC NETAPP HP Local Support Your Text here IBM XIV N DS Your Text here HDS This analysis should be used with its supporting documents Israeli Market Presence Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 267
  • 268. Israel Market Positioning Storage NAS Vendors to Watch: NETAPP HDS Local Support HP Your Text here Your Text here EMC Isilon Systems This analysis should be used with its supporting documents Israeli Market Presence Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 268
  • 269. Israel Market Positioning (Enterprise Backup SW) Backup to Symantec Cloud is an option Local Support EMC Your Text here IBM Your Text here HP This analysis should be used with its supporting documents Israeli Market Presence Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 269
  • 270. Storage Selected Vendors and SI’s in Israel T EAM / Malam/ Bezeq omnitech/ Glass Int. ANKOR netcom WE House CCC Matrix Bynet EMET ONE1 T aldor Benefit Harel ELAD EMC x x x x x x x X x IBM x x x x x x x x x HP x Your Text here x xYour Text here x NETAPP x x x x x x x x HDS x x x Fujistu x Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 270
  • 271. Selected Vendors and SI’s in Israel – Enterprise B/R SW Glass Team Real Vendor EMET House Malam CCC Matrix Y ael Network ANKOR New Age Dorcom WE HP DP x x x x EMC Legato x Symantec (NB) Text here Your x x x x x Your Textx x here IBM TSM X x x Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 271
  • 272. Storage EMC selected clients Local Trends  Agam Mehalev ; Agrexco ; Allot ; Amal Chain Schole ; Amdocs (VMAX) ; Amsalem Tours ; Applied Materials ; Arkia ; Asaf Harofe Hospital ; ATView ; Bank Discount ; Bank Mizrahi ; Bank of Israel ; Barak ; B-Contuor ; BDI ; Bedek ; Beer-Sheva U ; Beit Berl ; Bezeq ; Biosense ; BluePhonix ; BMC ; Bnei-Zion ; Brinks ; Broadcom ; Bursa (TASE) ; Bursok ; CA ; Cargo ; Castro ; Cellcom (VMAX) ; Cemipal ; CheckPoint ; cividia ; Clalbit ; Clalit (DMX) ; Commextech ; Comverse ; Co-op ; Corrigent ; CPC ; Delek ; Delta3 ; DHL ; Diplomat ; Dor Alon ; E4X ; ECTEL ; Elacam Medical ; ELAL ; Elbit ; Electra ; Eliahu ; Eliashar ; Emblaze ; Equinix ; Evolusion ; Exlibris ; Expirios ; Eye Blaster ; EZchip ; Fandtech ; Finotec ; FolloWAP ; Forescout ; Fritz- UPS ; GE Your Text here Your Text here Medical ; Gigia ; Golden Pages ; Haargaz ; Hadasa ; Haemek ; Haifa University ; Halman-Aldubi ; Hanson ; Harel Insurance, Hebrew Univrsity ; Hevrat-Hashmal ; Highway 6 ; Hillel-Yafe ; HIT ; IAI - Elta ; Ichilov ; IDIT ; IEC (VMAX) ; imperia ; Imvent ; Integra ; Intel ; Intercomp ; Interfax ; Internet Zahav ; IPP ; Iscar ; Isis ; Isralift ; Jerusalem Bank ; John Bryce ; KAKAL ; Kaplan ; Karnit ; Kavei-Zahav ; Keren Kayemet LeIsrael ; Kesselman ; Kontera ; Korpel Tal ; Kul El Arab ; Laniado ; Law Office ; Leadcom ; Leiman-Schlussel ; RED = new name major upgrade Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 272
  • 273. Storage EMC selected clients/cont. Local Trends  LLD Dimonds ; Loreal ; Maariv ; Mabat ; Maccabi Health (with Flash drives) ; Madanes ; Mafiel ; Magen-David ; Maman ; Mango ; Marvell ; Maveker ; Me Eden ; Medinol ; Mei-Eden ; Meir Cars ; Melanox ; Menora (VMAX) ; Metro Motor ; Metropolin ; Microsoft (Flash drives) ; Mind ; Mirs ; Mishan ; Mobile Access ; MobileTornado ; MOD ; Montilio ; Mor Inst. ; Motorola ; Multilock ; Naharia ; NDS ; Netafim ; Netvision ; Netwise ; Newpan ; Nur ; Oblicore ; Office-Depot ; Ofot ; Olista ; OPAL ; optier ; Orian ; Ormat ; Osem ; Partner ; Payton ; Paz ; PazGaz ; Pelephone ; perigo ; Persay ; Philips ; PlayCast ; Playtech ; Poria ; Port Authority ; Pregonex ; PWC here Your Text ; Quest ; R&D ; RADVision ; RADWARE ; Rambam ; Random Logic Your Text here ; Reshet TV ; Rosh Aiean Municipality ; Roshe ; Sakal ; Samsung ; SAP Labs ; Sarel ; Scopus ; Seabridge ; Seambi ; Shastowitz ; Shila ; Smarts Shoppers ; Soda Club ; Soroka ; StarCore ; Stemazki ; Store Alliance ; Storwiz ; SuperGas ; Super- Pharm ; Supersol ; Taas ; Tadiran Batteire ; Technion ; Tel Aviv College ; Telcar ; Telrad ; Tempo ; TEVA (DMX) ; Tnuva ; Tower ; Trans Atlantic ; TTI ; Unique Software ; Verisign ; Visa CAL (VMAX) ; Zfat Academy ; Zif Haft ; RED = new name major upgrade Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 273
  • 274. Storage NETAPP selected clients Local Trends  Actelis ; AdgarInvestment ; AganChemicals ; AIG ; AlbarLeasing ; Alcatel; Ambar; AmiadFiltering Systems ; Ariforce ; Army ; Assuta Medical Centers ; AudioCodes ; Avaya ; Bank Hapoalim ; Bank Leumi Lmashkantaot ; Bank Mercantile ; Bank Otsar Hachayal ; Bar-Ilan University ; Bateman Engineering ; Bay Yam Municipality ; Beit Rivka Collage ; Ben-Gurion University ; Bezeqint ; BMC ; Cadence ; Cellcom ; CevaDSP ; Check point ; Cisco ; Clal Insurance ; Coca Cola ; College MofetInstitute ; Compugen ; Dan Buses ; Deloitte & Touche ; Delta Galil ; DenyaCibus ;Text here Your DerechEretz ; Dexxon ; DiesenhauseGroup ;Your Text Insurance ; Direct here Discount ; DSPG ; Education TV; Elbit ; EpixPharmaceuticals ; ERN ; Eurocom ; FolloWap(Neustar) ; Freescale ; Gadot ; GE Medical (General Electric) ; Genazim ; Geter; Gilat ; Givataim Municipality ; Globes ; Golden Pages ; Golf ; Group ; Haaretz; HachevraLemeshekVekalkala ; Hachsharat Hayishuv Insurance ; Hadassah Medical Center ; Hebrew University Jerusalem ; Hertz ; Herzeliya Municipality ; Highways ; HirshbergBrothers ; HOT (Vseries); HSBC Bank; IAF ; IAI Bedek ; IAI -Elta ; Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 274
  • 275. NETAPP selected client / cont.  IDF & MOD ; IEC ; Igal Arnon Layers; Ikea ; Intel ; Inteligence ; Interwize ; Iscar ; Isralift ; Jafora; JCS; Kamag ; KeterPlastic ; KiriatOno Academic ; Kodak ; KPMG ; Lahav ; LehavimBTL ; LeumiCard ; LevinskyCollege ; LR ; Maabarot(Materna) ; Maatz ; Mabat ; Maccabi Health Services ; Machteshim Agan (OpenVMS); Marvell ; Mentor Graphics ; Minhal Mekerkei Israel ; MisradRosh Hamemshala ; MivtachSimon ; Mobileye ; Mor Institute; MoreshetYaacovCollege ; Motorola Comm ; Navy ; Netvision-Barak ; NICE ; NRG ; O12 Smile ; Orex ; ORT Schools ; Partner ; Pelephone ; Pemi Primium ; Phoenix ; Plasson ; Prigat here Your Text here Your Text ; PrismaFinance ; Qoalcomm ; Rafael ; Ramta ; Sachnin Collage ; Saifun ; Sandisk ; SAP ; Shafir ; Shape ; Sheba Medical Center ; ShenkarCollege ; Shlomo SixtGroup (New Kopel) ; Smile communication(internet gold ; Sonol ; Soroka Medical Center ; StarHome; Tashan ; Tashtiot Neft; Tavura; TechnionHaifa ; Tel-Aviv University ; TEVA ; Tower Semi ; Ultra ; UPS ; VISA CAL ; Visonic ; Weitzman Institute ; YES; Zoran; ; Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 275
  • 276. Selected clients - IBM  IBM - Aashtrom ; Actus imego ; Afcon ; Airport Authority ; Akerstein ; Aliance ; Amdocs ; Applied ; Ashdod bunded ; Automazia ; Bank Discont ; Bank Hapoalim ; Bank Jerusalem ; Bank Leumi ; Bank of Israel ; Bank Poalim ; Barak ; BetterPlace ; Bezeq ; Canduit ; Celebros ; Check-Point ; Click sw ; Colmobil ; Comex ; Compugen ; Comverse ; ContactStream ; DB motion ; DBQ ; Direct Finance ; e-drivetech (E D T) ; Eglue Eriat Bat-Yam ; etternity ; Eurocom ; Exanet ; Excellence ; ; Federation lab ; Finexo ; Fishman ; FlashNetwork ; Fritz ; Haburssa ; Hamishmar ; Hillan-Tech ; Holmes Place ; IAI (division) ; ICQ ; IDF ; Imagine ; Inbal ; Intergraph ; Isracard ; Kafrit ; LeumiCard ; Leumit Health ; M.O. Transportation ; Maccabi ; ManPower ; Mataf (FIBI) ; Maxbill ; Mekorot ; Meuchedet Your Text here Your Text here ; Michal Nagarin ; Michlelet Achva ; Ministry Of Transportation ; MOD ; MSN ; NDS ; Ness ; Netvision ; Nice ; Nikov ; Nirlat ; O12Smile ; Ofir optronics ; Out smart ; Oversese ; Palsan Saasa ; Partner ; Pelephone ; Phoenix ; Postil ; Precise ; Psagot Ofek ; Randon ; Rashut N/E ; Red Band ; Sapieans ; Sayfan ; SCD ; SemiConductor ; Shapir Eng‘ ; Sigma ; Siverge ; Smile 012 ; Snowball ; SodaClub ; Solel Boneh ; Storwize ; Sufersal ; Sungard ; Superdrivative ; Supersol ; Tama ; Tambur ; Tami4 ; TEHILA ; Texas Ins. ; Tikshuvim ; Trio ; Unisfair ; Waizman Institute ; Walla-Teletel ; Webcollage ; Weizman ; Yad Sara ; Yafora ; Yashir Insurance ; Yes ; Zoglobek ; Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 276
  • 277. Selected clients - Storage  HDS Amdocs ; Audomazia (LADPC) Bank Leumi ; Bank of Israel ; Bar-Ilan University ; BAZAN ; Bezeq (ing.); BezeqInt. ; BluePhonix ; Bursa ; Cisco; Clalit (PACS); Ectel ; Education Office ; Excnet ; FIBI ; Hilan Tech ; HOT ; IAF ; IDF ; IEC ; Igud Bank ; Isracard ; LivePerson; Malam ; Mekorot ; Meuhedet Health ; Migdal ; Ministry of Labor ; Misrad Habitachon ; Misrad Your Text here ; Mizrahi ; Open University Your Text here ; Police ; Hashikun ; Poalim Rafael ; Shaam ; Shva ; Social Security ; Supercom Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 277
  • 278. Selected clients - Storage DDN (Direct Network) selected clients: Weizmann, Technion, Tel-Aviv – CERN ;Weizmann - Astro-Physics Keshet – Big Brother Show ; Applied Material – OEM Selected IBM XIV clients (some where mentioned before) Bank Your Text hereBezeq International, Isracard, Walla, Leumi, Your Text here Smile 012, Symantec, Nana, Netvision, PMO, IAI – Maman, DBS / Yes, HOT, Metacafe, Leumicard, Supersol, Phoenix, Bank Poalim, Migdal, Kupat-Holim Leumit, Pontis Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 278
  • 279. Enterprise Backup selected clients  EMC Legato :AIR FORCE; AMDOCS; ANOBIT; AROMOR; ATTUNITY; Audiocodes; BANK OF JERUSALEM LTD.; BDO; BEIT BERL; BEZEQ; BEZEQ International; BROM; BVR; CASTRO; CHECK POINT; ; COCA COLA; COMVERSE; DAN COOPERATIVE; DSP; ELF; EMI; EXCELLENCE NASSUAH; EXENT TECHNOLOGIES LTD.; FTS; Golden Lines; HAARETZ; HEBREW UNIVERSITY; IAI ELTA; IAI-Mabat; IAI-MALAM; IDC; IMPERVA; INSIGHT BIOPHARMACEUTICAL LTD.; JAJAH; KAVEI ZAHAV; KODAK; LEUMI CARD; MACABI HEALTH SERVICES; MFA; MOD 2470; MOD MLN; MOD Yachlam; MOD YACHTAL; MODU LTD; Netanya College; OMRIX BIOPHARMACALS LTD; OPEN UNIVERSITY; ORCA INTERACTIVE; PELEPHONEYour TextPHOENIX; PLAY TECH; PMO; ROKONET; SAPIENS; Your Text here SILICON; TEAM; here SIANO MOBILE TADIRAN APPLIANCES LTD.; TAPUZ; TECHNION; TEL AVIV UNIVERSITY; TELCAR; VERINT SYSTEMS LTD; VISA CAL; YEDIOT AHRONOT LTD.; YES; Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 279
  • 280. Selected Clients Symantec NB  ; 012 GOLDEN LINES; ADSMARKET G.M LTD.; AIG ISRAEL; ALLOT COMMUNICATIONS; ALVARION LTD; AMDOCS ISRAEL LTD; ANALYST; APHCON INDUSTRIES LTD.; ASSUTA MEDICAL CENTERS; ATTUNITY; AUDIOCODES; AVIS; AYALON INSURANCE; BANK HADOAR; BANK LEUMI; BARAN; BDO; BEIT ICHILOV; BETTER PLACE; BIKUR ROFE; BSR; BSR PROJECTS LTD; BUILDING; CARMEL OLEFINS; CARMEL OLEFINS LTD; CELLCOM ISRAEL LTD; CENTRAL BUREAU OF STATISTICA; CESARSTONE; CEVA; CHECK POINT LTD; CMS COMPUCENTER LTD.; COMPUGEN; COMPUGEN SYSTEMS INC; COMVERSE; COMVERSE NETWORK SYSTEMS; COMVERSE SYSTEMS LTD; CYOTA ISRAEL; DAN; DELATA GALIL; DIRECT INSURANCE; DOR ALON; Text here EAGLE Your Text here Your DUBEK; GLOBAL LOGISTICS; ECI TELECOM LTD; EDEN SPRINGS; EFG EUROBANK; ELBIT; ELISRA; ELISRA ELECTRONIC SYSTEMS; ELISRA ELECTRONIC SYSTEMS LTD; ELIYAHU INSURANCE; EVERGREEN VENTURE PARTNERS; EXCELLENCE NESSUAH SERVICES LTD.; FIMBANK PLC; FIRST INTERNATIONAL BANK OF ISRAEL; FTS; GILAT STATELLITE NETWORKS LTD.; GOVERNMENT OF ISRAEL; GOVERNMENT OF ISRAEL MINISTRY OF DEFENSE; GOVERNMENT OF ISRAEL MOD WKS; H3G Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 280
  • 281. Selected Clients Symantec NB (cont.)  PROCUREMENT SERVICES S.A.R.L.; HAARETZ GROUP; HA'ARETZ GROUP; HACHSHARAT HAYSHUV; HAIFA CHEMICALS LTD; HAREL HAMISHMAR; HAREL INSURANCE COMPANY LTD; HAZERA; HERZOG FOX NEEMAN (HFN); HERZOG, FOX & NEEMAN; HEWLETT PACKARD ISRAEL; HILLEL YAFFE HOSPITAL; HOLON ACADEMIC INSTITUTE; HOT TELECOM; HP O M S ISRAEL LTD; HSBC BANK; IAI MAMAN DATA SYSTEMS CENTER; IDB; ING; INSTALLFREE; INTERNET ZAHAV; ISRACARD; ISRACARD LTD; ISRAEL AIRCRAFT AUTHORITY; ISRAEL AIRCRAFT INDUSTRIES; ISRAEL BANK; ISRAEL BROADCASTING AUTHORITY; ISRAEL CHEMICALS LTD; ISRAEL CORPORATION; ISRAEL POLICE; ISRAEL PORTS; ISRAEL PRISON SERVICES; ISRAEL RAILWAYS; ISRAELI POLICE; ISRAPORTS; JDC; JERUSALEM MUNICIPALITY; JEWISH AGENCY; JOINT ISRAEL; KESHET BROADCASTING; KETER PLASTIC; KODAK ISRAEL LTD; LEUMI CARD; LUZ 2; MACCABI HEALTH SERVICES; MACHTESHIM AGAN GROUP; MALAM SYSTEMS; MCCANN ERICKSON; MEITAR, LIQUORNIK, GEVA & LESHEM, BRANDWEIN, LAW O; MEKOROT; MGS; MIFAL HAPAIS; MINISTRY OF EDUCATION; MINISTRY OF SCIENCE & TECHNOLOGY; MINISTRY OF SCIENCE SPORT AND CULTURE; MINISTRY OF TRANSPORTATION; MIVTACH SAYMON; NEUSTAR R&D (ISRAEL) LTD; NICE SYSTEMS LTD; NOGACOM; NOVA; OFER SHIP HOLDING LTD; OPAL; ORCKIT COMMUNICATIONS; ORIAN; ORMAT; ORMAT SYSTEMS; ORMAT TECHNOLOGIEShere PALSAN; Your Text here Your Text INC; PARADIGM GEOPHYSICAL; PASSAVE (PMC-SIERRA); PETROLEUM & ENERGY INFRASTRUCTURES LTD; PLASSON; PLAYTECH; PORIA HOSPITAL; POWER DSINE; PRIME MINISTER OFFICE; PRISMA INVERSTMENT HOUSE; QBI; RAMAT HASHARON MUNICIPALITY; RAMPAL RCS; RANDOM LOGIC LIMITED; RAVON ELECTONICS LTD.; RDT MANAGEMENT SERVICES LTD.; REINHOLD COHN & PARTNERS; RRSAT; S.SCHESTOWITZ LTD; SAFE CHARGE ISRAEL LTD.; SAN DISK; SANDISK; SANDISK CORP; SAPIR COLLEGE; SARIN TECHNOLOGIES LTD.; SCOPE; SCOPE METALS GROUP LTD.; SHIKUN AND BINUI; SHLOMO INSURANCE; SHUNRA; SUPERPHARM; SYNERON MEDICAL LTD.; TAAVURA HOLDING LTD; TAHAL WATER MANAGEMENT FOR ISRAEL LTD; TAMA PLASTIC INDUSTRY; TEL AVIV MUNICIPALITY; TELRAD NETWORKS; TEMPO DRINKS LTD.; TEMPO DRINKS LTD.ORAN; THE BARZILAI MEDICAL CENTER ASHKELON; THE CENTRAL HEALTH AGENCY; THE COLLEGE OF JUDEA AND SAMARIA; THE COLLEGE OF MANAGEMENT ACADEM; TRIALOG - CLINICAL; TRIMA; UNION BANK LTD.; UNIVERSITY OF JERUSALEM; US EMBASSY; VISONIC; YAEL SOFTWARE SYSTEMS; Z GOVERNMENT OF ISRAEL; ZIM INTERGRATED SHIPPING SERVICES; ZIM LTD; ZORAN; ZORAN MICROELECTRONICS LTD; ; Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 281
  • 282. Enterprise Backup selected clients IBM TSM : Automazia (LADPC); Bank Leumi ; Bar-Ilan University ; Clallit ;Egged ; Excellence Nesua ; Nisko; Leumit; Maccabi Health; IDF ; IEC ; Isracard ; Migdal ;Sufersal; Retalix; TEVA ; Veolia; Waitzman Institute Your Text here Your Text here Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 282
  • 283. Thank you! Pini Cohen Blog: http://pinicohenstki.blogspot.com/ Twitter: pinicohen Pini Cohen’s work Copyright 2010 @STKI Do not remove source or attribution from any graphic or portion of graphic 283