Summit 2011 infra_pini_v6

3,559
-1

Published on

STKI Summit 2011 - The Gap!
Complete presentation covering general infrastructure trends, development and SOA, System Management, DBMS and data, Servers and Platforms, Clients, Storage

0 Comments
1 Like
Statistics
Notes
  • Be the first to comment

No Downloads
Views
Total Views
3,559
On Slideshare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
0
Comments
0
Likes
1
Embeds 0
No embeds

No notes for slide

Summit 2011 infra_pini_v6

  1. 1. ;The Gap! Complete presentation Pini Cohen EVP pini@stki.info Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  2. 2. STKI isSchwarzkopfTheKnowledgeIntegrators Pini Cohen’s work Copyright 2011 @STKI 2 Do not remove source or attribution from any graphic or portion of graphic
  3. 3. My Challenge – how to Sew it all together http://www.istockphoto.com/file_thumbview_approve/132499/2/istockphoto_132499-vintage-sewing-and-mending-kit.jpg Pini Cohen’s work Copyright 2011 @STKI 3 Do not remove source or attribution from any graphic or portion of graphic
  4. 4. What is new?• STKI’s first IT development survey• NOC Operator metrics• New DBA metrics• Ratios of production from all serversstorage New Pini Cohen’s work Copyright 2011 @STKI 4 Do not remove source or attribution from any graphic or portion of graphic
  5. 5. Agenda• Major Trends and Issues• Development and SOA• ESM BSM CMDB• DBMS and DATA• Platforms – Servers• Clients• Storage Source: http://astonguild.org.uk/files/NEW_MENU_FRONT_RGB%5B1%5D.jpg Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  6. 6. General Trends• The current infrastructure perspective in IT shops• The Gap• What are the big vendors doing?• Public Cloud• Private Cloud - Appliances• Manage Scattered IT• Pervasive Ubiquitous Computing• Near Field Communications and Video• Lean IT• Recommendations Source: http://www.google.co.il/imgres?imgurl=http://f arm5.static.flickr.com/4044/4215428802_8d8 72c6ccd.jpg&imgrefurl=http://flickr.com/photo s/efrenefren/4215428802/&usg=__Ca3quraL K4CKcTuemqbIelfUoQs=&h=500&w=365&sz =143&hl=iw&start=0&zoom=1&tbnid=yfgFXR Yu1l4N1M:&tbnh=146&tbnw=107&ei=asF_T dfJMInGgAezh6WaCA&prev=/images%3Fq% 3Dappetizer%2Bmenu%26um%3D1%26hl% 3Diw%26client%3Dfirefox- a%26sa%3DX%26rls%3Dorg.mozilla:en- US:official%26biw%3D1280%26bih%3D625 %26tbs%3Disch:1,isz:m&um=1&itbs=1&iact= rc&dur=365&oei=asF_TdfJMInGgAezh6WaC A&page=1&ndsp=27&ved=1t:429,r:20,s:0&tx Pini Cohen’s work Copyright 2011 @STKI 6 =74&ty=54 Do not remove source or attribution from any graphic or portion of graphic
  7. 7. Important trendsissues raised by some clients• WinXP will be without support soon• Storage growth• Lack of IT professionals• Datacenter unifications (storage, compute, networks)• CMDB• Green• Unified communications Pini Cohen’s work Copyright 2011 @STKI 7 Do not remove source or attribution from any graphic or portion of graphic
  8. 8. Major trendsissues raised clients Pini Cohen’s work Copyright 2011 @STKI Source: STKI 8 Do not remove source or attribution from any graphic or portion of graphic
  9. 9. Is something missing here?! Source: http://www.egd-media.co.uk/Home_files/droppedImage_1.jpg Pini Cohen’s work Copyright 2011 @STKI 9 Do not remove source or attribution from any graphic or portion of graphic
  10. 10. Who are None IT Technology Users (NITU)?• Students• Startups• SOHO (Small Office Home Office)• Young people• Home users• SMB’s Source: http://www.aixiaofei.com/upload/article/2009-08/1249625696.652387mS35fe.jpg Pini Cohen’s work Copyright 2011 @STKI 10 Do not remove source or attribution from any graphic or portion of graphic
  11. 11. IT vs. None IT Technology Users (NITU)IT None IT Technology usersUsing PC Using Macs or Tablets or PCIT buys the PC Using the device from home both PC (BYOPC) and phoneCommunicating via Email Communicating via Email, Social networks, etc.Social networks are just starting to be Social networks are part of the businesspart of Organization strategy – mainlywithin the marketing departmentsOnline and Batch applications Online applicationsUsing traditional voice and just little Using VOIP extensively (Viber, Skype, etc.)VOIPEither at Work or at Home Always at Work and at Home Pini Cohen’s work Copyright 2011 @STKI 11 Do not remove source or attribution from any graphic or portion of graphic
  12. 12. IT vs. NITU (cont.)IT None IT Technology usersParanoia regarding public cloud but Have more control of access to data byvulnerable to internal threats internal employeesNot using Saas Just using SaasUsing virtual servers that are in installed Using Iaason premisesNot using Mac servers Using Mac serversHigh Capex High Opex – that can be changed Lots of emphasis on none-core issues – Time and effort spent on core business ispatch distribution, performance issues, higher while the provider takes care ofetc. none-core issuesNot using freeopen source SW (Redhat Using freeopen source SWis not considered open source in thiscategorization) Pini Cohen’s work Copyright 2011 @STKI 12 Do not remove source or attribution from any graphic or portion of graphic
  13. 13. IT vs. NITU (cont.)IT None IT Technology usersApplications are generally not location Applications are natively location awareawareApplication are not QR ready Applications are QR readyTraditional business activity- product – Using crowdsourcing for marketing andmarketing – then selling product development (much leaner)Traditional organization structure Using crowdsourcing internally – “the guy at the warehouse” can influence on what the product will look like. Much more creativeNeed to perform some activities to Always connectedconnect (if possible)Not all technology domains are located in All technology is unitedone place – mobile projects, web sites,telephony, CCTV, other sensors Pini Cohen’s work Copyright 2011 @STKI 13 Do not remove source or attribution from any graphic or portion of graphic
  14. 14. STKI’s Point:Mind the increasing GAP ! Source: http://tednellen.blogspot.com/2009/12/last-sunday-of-09.html Pini Cohen’s work Copyright 2011 @STKI 14 Do not remove source or attribution from any graphic or portion of graphic
  15. 15. Will corporate IT be the Last Dinosaur?! Source: http://t1.gstatic.com/images?q=tbn:ANd9GcTCsfFbHIQWy7ikFKkSoVhBNEHZhpd1d3-dXaiLIF3kqwq5fTYj Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  16. 16. The strategy of some big vendors• Showing that big vendors are trying to do things differently – Google- approaching the enterprise – Microsoft- approaching the NITU (None IT Technology Users) that many years ago was Microsoft’s origin Pini Cohen’s work Copyright 2011 @STKI 16 Do not remove source or attribution from any graphic or portion of graphic
  17. 17. Google’s Vision• “In a 100% web world, business applications are delivered over the Internet and accessed in a web browser.” Dave Girouard, President, Google Enterprise Pini Cohen’s work Copyright 2011 @STKI 17 Do not remove source or attribution from any graphic or portion of graphic
  18. 18. Google Strategy for the Enterprises – step by step1. Private cloud with Search and Geoseptical appliances.2. SAAS for security (Postini), Exchange synchronization tools for Exchange DRP and archiving3. Gmail mail server. Users can still work with Microsoft Outlook or will Gmail GUI(with offline capabilities)4. Google Collaboration- web sites, portals, etc.5. Google Docs (competition to MS Office)6. Google App Engine (PAAS). Competition to Azure and others.7. Google App market place8. In the (near?) future – Google IAAS – competition to Amazon EC29. Chrome OS laptops Pini Cohen’s work Copyright 2011 @STKI 18 Do not remove source or attribution from any graphic or portion of graphic
  19. 19. Deploy powerful integrated solutions on premise and online DevicesOn Premise Applications Google Apps Your Apps 3rd Party Apps SearchGeospatial Google‟s Global Platform
  20. 20. Integrate your existing architecture to start your journey On Premise Device Management Devices ERP Device Mgmt. Applications Google Apps Your Apps 3rd Party Apps Cloud Connect User Mgmt. CRM Google‟s Global Platform Secure Data Search Connector Geospatial
  21. 21. Enjoy seamless communication and collaboration Gmail Google Docs web-based communication real-time collaboration tools hub Priority Inbox Rich Formatting overcome information overload images, tables, drawings with automatically prioritized and bullets emailContextual Gadgets Version historyapprove POs or update Voice & Video Chat maintained throughout theforecasts without leaving multiple communication editing process so you can Real-Time CollaborationGmail easily review multiple multiple users edit documents choices within a single versions simultaneously interface
  22. 22. Build, buy and manage applications your way App Engine Apps Marketplace platform as a service integrated 3rd party apps Easy to scale add capacity as usage of an application grows RatingsEasy to deploy Comprehensive list ratings from other customers tohost your applications on Easy to Manage Applications including project help you find the best AppsGoogle‟s infrastructure and easily deploy multiple management, accounting,provide them to your versions of applications to CRM and moreemployees via the web test new functionality
  23. 23. Add-ons to Google Chrome Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  24. 24. Add-ons to Google Chrome Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  25. 25. Googles Chrome Web Store +clock application Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  26. 26. The next stage ChromeOS Pini Cohen’s work Copyright 2011 @STKI 26 Do not remove source or attribution from any graphic or portion of graphic
  27. 27. Google is not immune to mistakes“…Google Wave is no longer being actively developed” Pini Cohen’s work Copyright 2011 @STKI 27 Do not remove source or attribution from any graphic or portion of graphic
  28. 28. Microsoft• Is putting most of its R&D budget on Cloud and NITU (None IT Technology Users)• But does not want to harm the relationship with traditional IT shops Pini Cohen’s work Copyright 2011 @STKI 28 Do not remove source or attribution from any graphic or portion of graphic
  29. 29. Windows AzureConnect
  30. 30. First Azure Project in Israel !  Guest Entry Project in The Government Complex (Cloud Guest MGMT)  Invitation forms and processes  Daily visitors reports  Serves 4 Ministries:  Ministry Of Culture And Sports  Ministry Of Science  Ministry Of Public Security  Ministry of Housing and developing  Why Azure:  Guardian & Microsoft service and support  Reduce operating costs and improve business agility  Scalable, Secure and Highly Available 34
  31. 31. Guest Entry Solution DEMO Daily Visitors Invite Form Report entrance Government Complex 35
  32. 32. Solution Architecture Security Interface E-Government invite Security Azure 36
  33. 33. On Premises / Hosters Azure Service in your datacenter Windows Azure & SQL Azure Physical Control - Geographic Proximity Regulatory Compliance - Data Sovereignty
  34. 34. Example of Microsoft cloud offering –Windows Intune for PC management Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  35. 35. 39
  36. 36. 41
  37. 37. What about Facebook and the enterprises?! Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  38. 38. Enterprise Benefits from Cloud Computing Capability From ToServer/Storage 10-20% Cloud accelerates 70-90% Utilization business value Self service None across a wide Unlimited variety of Test Provisioning Weeks domains. Minutes Change Months Days/Hours Management Release Weeks Minutes Management Fixed costMetering/Billing Granular modelStandardization Complex Self-Service Payback period Years Monthsfor new services Source: IBM Legacy environments Cloud enabled enterprise Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  39. 39. Today there are three primary delivery models that companiesare implementing for cloudEnterprise Traditional Public Clouds Enterprise Private Cloud IT Hybrid CloudPrivate Cloud Hybrid Cloud Public CloudIT activities/functions are provided “as Internal and external IT activities/functions are provideda service,” over an intranet, within the service delivery “as a service,” over the Internetenterprise and behind the firewall methods are integrated, • Key features:• Key features include: with activities/functions – Scalability – Scalability allocated to based on security requirements, – Automatic/rapid provisioning – Automatic/rapid provisioning criticality, architecture – Standardized offerings – Chargeback ability and other established – Consumption-based pricing. – Widespread virtualization policies. – Multi-tenancy Source: IBM Market Insights, Cloud Computing Research, July 2009. Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  40. 40. Delivery models for cloudEnterprise Traditional Public Clouds Enterprise Private Cloud IT Hybrid CloudPrivate Cloud Public CloudGood old consolidationvirtualization SAASIndustry in a box PAASAutomation IAASOther Source: IBM Market Insights, Cloud Computing Research, July 2009. STKI modifications Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  41. 41. Public Cloud• With Public Cloud “2 people business” can have: – ERP – CRM 196,802 soho ( up to 9 – Manufacturing Software companies employees) – VOIP• Soon they will have applications that corporate IT does not have! Example: Video Application Pini Cohen’s work Copyright 2011 @STKI 46 Do not remove source or attribution from any graphic or portion of graphic
  42. 42. Where do clouds come from?!• STKI client “we got questions about cloud implementation at our organization from our board of directors”! Source: http://www.clipartguide.com/_pages/0060-0808-2813-3928.html Pini Cohen’s work Copyright 2011 @STKI 47 Do not remove source or attribution from any graphic or portion of graphic
  43. 43. Public cloud issues as raised by clients• We will be prisoners of the public cloud provider. But aren’t we prisoners of our core business ERP CRM vendors?!• Public cloud providers will raise prices and we will not be able to do anything! And our current vendors never raise prices….• Public cloud is like SW rental vs. owning the license There are many tradition SW vendors that only rent SW• We will loose agility in public cloud. Anything that is hard to do – the cloud provider will refuse to do. The current vendors respond to all our needs…• STKI: All of these concerns are real and users should consider carefully before using public cloud offerings. Still public cloud offering should be used by IT. Pini Cohen’s work Copyright 2011 @STKI 48 Do not remove source or attribution from any graphic or portion of graphic
  44. 44. Cloud usage Source: http://www.jackofallclouds.com/Pini Cohen’s work Copyright 2011 @STKI 49Do not remove source or attribution from any graphic or portion of graphic
  45. 45. Cloud usage Source: http://www.jackofallclouds.com/Pini Cohen’s work Copyright 2011 @STKIDo not remove source or attribution from any graphic or portion of graphic
  46. 46. Amazon EC2 AMI (Amazon Machine Images) - IBM Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  47. 47. The players Source: http://www.jackofallclouds.com/ methodology: I use QuantCast‟s top 1M site list as a reference. taking the top half of the list (500k sites in total). Each site is queried to determine whether it is hosted on a cloud provider, and if so on whichPini Cohen’s work Copyright 2011 @STKIDo not remove source or attribution from any graphic or portion of graphic
  48. 48. Things are happening up there in the cloud: Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  49. 49. Things are happening up there in the cloud: Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  50. 50. Things are happening up there in the cloud: Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  51. 51. Things are happening up there in the cloud: Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  52. 52. Things are happening up there in the cloud: Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  53. 53. DBMS market new frontiers: Native Cloud Service Hadoop Cassandra Database.com Xeround Redis Voldemort Amazon Simple DB FathomDB VoltDB MySQL, Memcached Cluster Ed Amazon RDS NoSQL Cloud Enabled SQL MySQL, PostGress, Microsoft SQL Azure XMLDB Gemstone Current Object DB Clustrix IT Microsoft Oracle SQL Server DB2 Traditional Pini Cohen’s work Copyright 2011 @STKI Source: http://xeround.com/58 Do not remove source or attribution from any graphic or portion of graphic
  54. 54. Summery of Public Cloud sections• Things are certainly happening in the public cloud arena Source; http://www.silicon.com/technology/networks/2011/02/04/cloud-computing-to-boom-in-2011-39746924/ Pini Cohen’s work Copyright 2011 @STKI 59 Do not remove source or attribution from any graphic or portion of graphic
  55. 55. Private Cloud• Appliances• Automation including workflow and self service Source: http://gigaom.com/2010/05/12/why-private-clouds-are-a-catch-22-for-buyers/ Pini Cohen’s work Copyright 2011 @STKI 60 Do not remove source or attribution from any graphic or portion of graphic
  56. 56. Private cloud by users• Will enable flexible, elastic infrastructure on which a variety of applications can be easily provisioned and efficiently operated.• But requires huge investment• Like automatic gear – we all like it but it requires 10% more fuel Source: http://forums.juniper.net/t5/Architecting-the-Network/Fabric-Computing-Gartner-s-view-for-the-future-of-the-datacenter/bc-p/75834 Pini Cohen’s work Copyright 2011 @STKI 61 Do not remove source or attribution from any graphic or portion of graphic
  57. 57. The new soon to be ITPini Cohen’s work Copyright 2011 @STKI Source: http://www.accenture.com/SiteCollectionDocuments/PDF/Accenture_Infrastructure_Consulting_Next_Generation_Data_Center.pdfDo not remove source or attribution from any graphic or portion of graphic
  58. 58. Building the next-generation data center and enabling cloud computing (Accenture)Phase 1 - Continued focus on data center virtualization(across all areas of server, storage and network),consolidation and standardizationPhase 2 - Automating IT processes, integrating servicemanagement tools, optimizing resources and leveragingprovisioning toolsPhase 3- Service approach to IT rather thana component view. At this stage, companies typically beginto see the value of cloud computing. Source: http://www.accenture.com/SiteCollectionDocuments/PDF/Accenture_Infrastructure_Consulting_Next_Generation_Data_Center.pdf STKI modifications Pini Cohen’s work Copyright 2011 @STKI 63 Do not remove source or attribution from any graphic or portion of graphic
  59. 59. AppliancesWe are seeing more and more Appliances offerings NetBackup 5000 Appliance Oracle Exadata Teradata EMC GreenplunTurnkey Deduplication Solution from Symantec Exalogic VBLOCK Pini Cohen’s work Copyright 2011 @STKI Google FlexPod for Vmware Do not remove source or attribution from any graphic or portion of graphic SAP HANA
  60. 60. Why do we need appliance?• All components are tuned to work together• Improved performance• Automatic provisioning that works! (prepared to do the needed task)• Self service that works! (prepared to do the needed task)• Patches that are tested for specific situations• Lower time to market• Operations are easier Pini Cohen’s work Copyright 2011 @STKI 65 Do not remove source or attribution from any graphic or portion of graphic
  61. 61. Example: adding another server- not that easy…• Example: adding Websphere server to cluster:  Use a text editor to open the wpconfig.properties file.  Windows and UNIX location: portal_server_root/config/wpconfig.properties  Ensure that the following properties are uncommented and specify appropriate values:  ClusterName property: Specify the name of the cluster to which you are adding the node.  ServerName property: Specify the cluster member name you want to use when adding this node to the cluster. Important: The cluster member name you specify for this property must be unique within the cell and cannot have the same value as the ServerName property on the primary node or other secondary nodes.  PrimaryNode property: Verify that the value for this node is false.  Add the node to the cluster.  Windows and UNIX: Run the following command from the portal_server_root/config directory: – Windows: WPSconfig.bat cluster-setup -DWasPassword=password – UNIX: ./WPSconfig.sh cluster-setup -DWasPassword=password  Click the application server name for the secondary node.  Click Ports under the Communications settings, and verify the port number listed for the WC_defaulthost port.  Click Servers > Cluster Topology to view the updated cluster topology.  Regenerate the Web server plug-in.  Regenerate the Web server plug-in using the deployment manager administrative console.  If you are using a remote Web server, copy the updated plug-in configuration file (plugin-cfg.xml) to the Web servers plug-in configuration directory.  Stop and start the Web server.  Restart all cluster members, where each cluster member is a single application server in the cluster. Source: http://publib.boulder.ibm.com/infocenter/wpdoc/v6r0/index.jsp?topic=/com.ibm.wp.ent.doc/wpf/clus_install_addmember_horiz.html Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  62. 62. IBM CloudBurst and WebSphere CloudBurst provide cloud management capabilities with different scopes WebSphere CloudBurst Appliance IBM CloudBurst Bladecenter + set of pre-configured provisioning Offering type Physical appliance and management software + configuration services General purpose cloud provisioning/ Applicable Scope Application middleware environments management Bring your own (leverage underutilized assets in Included in the offering (bladecenter w/ 3 blades Hardware for cloud your datacenter) in it) User-built images (whichever productsItems managed in cloud GA virtual images from IBM for select products customer chooses to build) 67
  63. 63. Lead Time: To get a new application environment….Today, this list of serial processes is executed for each new application environment:Approvals Procurement HW Install OS Install MW Install App Install/Config 2-4 month lead time! Factor out repetitive tasks to reduce lead time! Approvals Procurement HW Install Done once at cloud creation/expansion time OS Install MW Install App Install/Config Done once at image/pattern creation/customization time Click “Deploy” and wait Done for each environment request Hours or Minutes lead time! 68
  64. 64. Consistency/Less Errors: “HyperVisor Edition” Images IBM Middleware shipped as an .OVF virtual image, ready to run on a hypervisor The following products offered in HV form as of 8/2010: WAS V6.1 HV  WebSphere Application Server v6.1 WAS V7 HV  WebSphere Application Server v7  WebSphere Process Server v7 WebSphere  WebSphere Portal Server v6.1.5 Application Server  DB2 Operating System Products support various combinations of:  VMware ESX, z/VM and/or PowerVM hypervisors  Red Hat Enterprise Linux, SUSE Linux, AIX Maintenance, support, and fixes through IBM for both WAS and Operating System  New images include most recent GA components of IBM middleware, as well as OS patches 69
  65. 65. Enable a self-optimizing private cloud w/Intelligent Management Pack! Use the pattern editor to select the policy-based1 management options to include in your environment 2 WebSphere CloudBurst activates IMP in the dispensed pattern 3 Policy-based management self- optimizes your running private cloud environment until you stop it! 70
  66. 66. TCO Analysis Available!Quantifies WS CloudBurst Benefits Without WS With WS Enabled by Virtualization CloudBurst CloudBurst Optimization New100% Development Rapid provisioning Strategic New Benefits Software Costs Change Development Capacity Reduced Capital Expenditures Reduced Operating Expenditures Power Costs Additional Benefits DeploymentCurrent Reduced risk, less idle time, more IT (1-time) efficient use of energy, acceleration Spend of innovative projects, enhanced Software Costs Labor Costs (reduced xx%) customer service (Operations & Maintenance) Power Costs Reduced (reduced xx%) Business Case Results annual Labor Costs cost of Annual Savings: $MM (xx%) (reduced xx%) operation Hardware Costs by xx% Breakeven: xx days (annualized) Hardware Costs Net Present Value (NPV): $MM (reduced xx%) Internal Rate of Return (IRR): xx% Return on Investment (ROI): xx% 71
  67. 67. Appliances – what can you touch? Oracle’s Exadata point of view:“We discourage installing additional software on the database servers butwe dont prohibit it.Our guidance is to keep extra software to a minimum e..g just backup,management, and security agents.In some cases where there is a serious and measured advantage to runningon the DB servers (e.g. some ETL software) then it might make sense toinstall those.We very heavily discourage or disallow modifications to the OperatingSystem other than installing packages or fixes officially provided byOracle. For example installing third-party device drivers is heavilydiscouraged or disallowed.So, on Exadata you should only install Oracle databases and software relatedto it - like third party backup tools, management tools and security tools.For applications we have Exalogic ..” Pini Cohen’s work Copyright 2011 @STKI 72 Do not remove source or attribution from any graphic or portion of graphic
  68. 68. STKI’s take on Appliances• The danger of loosing flexibility and lock in situation should be balanced by the performance and ease of operations benefits• It’s just the beginning of the trends and the industry is not sure where Appliances will be a long term viable solution• Not all appliance are the same: Backup Appliance is not “Core business” Appliance in the perspective of benefits or risks. Pini Cohen’s work Copyright 2011 @STKI 73 Do not remove source or attribution from any graphic or portion of graphic
  69. 69. STKI’s take on Cloud• Do something with the cloud (private, public) – TODAY!• Automation Automation Automation (which also means standardization and workflow and self service) Pini Cohen’s work Copyright 2011 @STKI 74 Do not remove source or attribution from any graphic or portion of graphic
  70. 70. STKI’s theme: Manage Scattered IT• There are ComputerTechnology domains that are not handled by IT. Examples: – Telephony – Web Sites – CCTV and Security – Social Networking – Computers in manufacturing sites – Tablet PC’s• This has to STOP! Pini Cohen’s work Copyright 2011 @STKI 75 Do not remove source or attribution from any graphic or portion of graphic
  71. 71. Using technology to drive growth & profits Pini Cohen’s work Copyright 2011 @STKI 76 Do not remove source or attribution from any graphic or portion of graphic
  72. 72. Ubiquitous Pervasive computing• Computingsensors everywhere! From your refrigerator to your shoes to your neighbor’s dog…• Implications are enormous especially for: – More storage growth – Capturing this information and processing it (CEP)• Should be part of IT Pini Cohen’s work Copyright 2011 @STKI 77 Do not remove source or attribution from any graphic or portion of graphic
  73. 73. Ubiquitous computing pervasive computing External TCP/IP InternetSource: http://www.elec.qmul.ac.uk/people/stefan/ubicom/slides/ubicom-ch02-slides.ppt ICT Network External Energy Grid External Phone Network Ubiquitous computing: smart devices, environments and interac External Video External Audio Broadcast Broadcast Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  74. 74. MEMS Source: http://bcctae.files.wordpress.com/2010/10/adaptive-experiences-ubiquitous-computing.ppt Micro fabrication and integration of low-cost sensors, actuators and computer controllers, MEMS (Micro Electro- Mechanical Systems) Ubiquitous computing: smart devices,Photo: courtesy of Brett Warneke environments and interaction 79 Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  75. 75. DUST Source: http://bcctae.files.wordpress.com/2010/10/adaptive-experiences-ubiquitous-computing.ppt Dust: miniaturized devices can be without visual output displays, e.g., Micro Electro- Mechanical Systems (MEMS), ranging from nanometers through micrometers to millimeters. Smart Dust project , Pister, UC,Berkely hypothesized that dust could be spread around environment to receive and report changesPini Cohen’s work Copyright 2011 @STKIDo not remove source or attribution from any graphic or portion of graphic
  76. 76. SKINS Source: http://bcctae.files.wordpress.com/2010/10/adaptive-experiences-ubiquitous-computing.ppt Skin: fabrics based upon light emitting and conductive polymers, organic computer devices, can be formed into more flexible non-planar display surfaces and products such as clothes and curtains „SmartSecondSkin‟ is an artefact designed by Jenny Tillotson to illustrate a responsive fabric inspired by neurobiological delivery mechanisms found under skin.Pini Cohen’s work Copyright 2011 @STKIDo not remove source or attribution from any graphic or portion of graphic
  77. 77. CLAY Source: http://bcctae.files.wordpress.com/2010/10/adaptive-experiences-ubiquitous-computing.ppt Clay: ensembles of MEMS can be formed into arbitrary three dimensional shapes as artifacts resembling many different kinds of physical object „MIT‟s Tangible Media Group is an actuated tabletop display, which is able to render and animate three- dimensional shapes with a malleable surface. It allows users to experience and form digital models like geograpil terrain in an intuitive manner.Pini Cohen’s work Copyright 2011 @STKIDo not remove source or attribution from any graphic or portion of graphic
  78. 78. Ubiquitous computing pervasive computing Audio-Video Cluster Computer as Hub of cluster Local Network User Interaction Internal Comms.Source: http://www.elec.qmul.ac.uk/people/stefan/ubicom/slides/ubicom-ch02-slides.ppt Processing: edit, annotate, compose Management: Resources & Content Storage Email Web Ubiquitous computing: smart devices, environments and inte Wide network Chat VoD Audio-Video Stream VoIP Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  79. 79. Sensor Feeds will influence storage dramatically• Sensor Feeds: The tighter linkages between info sharing environment and the operational DCGS/ISR capability providers is making the technology of sensors critical to plan for our future. Increases in sensor feeds are directly fueling our future needs for communications, processing and storage capabilities. 1024 Yottabytes Source: http://ctovision.typepad.com/InfoSharingTechnologyFutures.ppt STKI modifications 1021 Theater Data Stream (2006): Zettabytes ~270 TB of NTM data / year Example: One 1018 Theater’s 250 TB Exabytes Large Data JCTD 12 TB Storage Capacity: 2006 2010 Capability Gap 1015 Petabytes UUVs FIRESCOUT VTUAV DATA 1012 Terabytes GIG Data Capacity (Services, Transport & Storage) 2000 Today 2010 2015 & Beyond Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  80. 80. NFC: Near Field Communication Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  81. 81. NFC: Near Field Communication Pini Cohen’s work Copyright 2011 @STKI http://weblog.cenriqueortiz.com/touch-nfc/ Do not remove source or attribution from any graphic or portion of graphic
  82. 82. Payment can be Enhanced for the User with Mobile NFC Mobile NFC can be used for payment at kiosks, ticketing, internet, or person-to-person• Additional uses that enhance payments include: – Tickets can be purchased, stored, and redeemed. – Prepaid cards can be bought, stored, and accessed in the phone. – Coupons can be transferred to a friend, recommending products. – Product history and medical warnings can be read in the store. – Shopping lists can be collected from tags. – Electronic devices can be activated after purchase and warranties sent in. – And many more! http://www.nfc-forum.org/resources/presentations/Tagawa_Barcelona_2010.pdf Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  83. 83. NFC Is More Than Payment and Mobile Phones• NFC mobile phones are for more than payments: – Secure access to buildings and PCs – Inventory control with tags and readers – Security patrols – Patient monitoring – Information gathering with educational tags http://www.nfc-forum.org/resources/presentations/Tagawa_Barcelona_2010.pdf Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  84. 84. NFC: Near Field Communication • “NFC mobile payments to exceed $30 billion by 2012” • “1 in 6 users worldwide will have an NFC-enabled phone by 2014” –Juniper Research(M) Pini Cohen’s work Copyright 2011 @STKI http://juniperresearch.com/shop/products/report/pdf/brochure/3267MPM%20NFC%20report%20brochure.pdf Do not remove source or attribution from any graphic or portion of graphic
  85. 85. Video Video is a SCATTERED IT TECHNOLOGYPini Cohen’s work Copyright 2011 @STKIDo not remove source or attribution from any graphic or portion of graphic
  86. 86. Age of Internet Video Pini Cohen’s work Copyright 2011 @STKI Source: Cisco VNI Usage, 2010 Do not remove source or attribution from any graphic or portion of graphic
  87. 87. Lean IT• Lean IT - Lean IT is the extension of lean manufacturing and lean services principles. Its central concern, applied in the context of IT, is the elimination of waste, where waste is work that adds no value to a product or service.• Lean is a complete process. Part of it is problem-solving procedures (Kaizen) where MUDA (waste) is to be found Pini Cohen’s work Copyright 2011 @STKI 92 Do not remove source or attribution from any graphic or portion of graphic
  88. 88. Lean IT• We are doing all we can. Why do we need Kaizen procedures?!• Example of Kaizen procedures in Service Desk scenario in leading IT organization: – Reduce support time for incident by 50% (same staff)! – Answering the phone according to SLA – from 76% to 96% ! Pini Cohen’s work Copyright 2011 @STKI 93 Do not remove source or attribution from any graphic or portion of graphic
  89. 89. Muda: The Seven Deadly Types of Waste (classical Lean)• Defects• Overproduction• Source: http://www.systems2win.com/lk/lean/7wastes.htm Over-processing• Transport and handling• Waiting• Confusion – missing information• Unsafe• Underutilized human potential Pini Cohen’s work Copyright 2011 @STKI 94 Do not remove source or attribution from any graphic or portion of graphic
  90. 90. From Lean to Agile via Kanban• A Kanban is a physical card used in Toyota Production System (TPS). It has spread to the manufacturing industry all over the Source: http://www.infoq.com/articles/hiranabe-lean-agile-kanban STKI modifications world as a tool of Lean Manufacturing. Now in Agile software development the visualization of projects, such as posting task cards on a wall, is a commonly seen practice, which is sometimes called "Software Kanban", or "Task Kanban". Pini Cohen’s work Copyright 2011 @STKI 95 Do not remove source or attribution from any graphic or portion of graphic
  91. 91. STKI’s take on the GapDeal with the GAP! Pini Cohen’s work Copyright 2011 @STKI 96 Do not remove source or attribution from any graphic or portion of graphic
  92. 92. STKI’s take on the Gap• Spend some effort (time and money) on new technologies. Example: communicate on social networks, harness your organization with crowdsourcing, do some IAAS, SAAS, PAAS etc.• When experimenting be aware that not everything will be “piece of cake”.• (repeating because its important) Automation Automation Automation (including workflow and self service)!• Automation also means standardization• In each quarter automate several key processes• In each quarter dispose several unneeded technologies• IT personal should understand the business more Pini Cohen’s work Copyright 2011 @STKI 97 Do not remove source or attribution from any graphic or portion of graphic
  93. 93. Agenda• Major Trends and Issues• Development and SOA• ESM BSM CMDB• DBMS and DATA• Platforms – Servers• Clients• Storage Source: http://astonguild.org.uk/files/NEW_MENU_FRONT_RGB%5B1%5D.jpg Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  94. 94. Mini Agenda• IT Development Survey• “Code intelligence”• BRMS CEP• Data Quality• HTML5• Keyword Driven Testing• SOA maturity• Selected projects SOA• SOAESB staffing ratios• Ratings for SOAESB and ETL tools Pini Cohen’s work Copyright 2011 @STKI 99 Do not remove source or attribution from any graphic or portion of graphic
  95. 95. Technologies Maturity Model 2011– Middleware and Development Regular use of Data Quality tools not onlyBusiness Value for migration SemanticInvestment AGILE Full SOA –to make money BPM Organization GUI change TDDCut costs, integration Lean IT ProjectIncrease Open Source KDT Pure HTML5 Businessproductivity ESB ALM tools Project WPF PaaSCommodity IT SOAServices ETL Governance toolsInvestmentfor regulations Using Implementing Looking Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  96. 96. STKI IT Development Survey• The first IT development survey in Israel!• Covering: – Development vs. Maintenance budget – Level of effort in development (requirements, design, code, testing, etc.) – Level of effort in maintenance (bugs, new enhancements, infra. upgrades) – Development internally, outsourced and package modification – Regulation vs. planned vs. unplanned – Development metrics – QA organization, etc. – Methodologies used in development process Pini Cohen’s work Copyright 2011 @STKI 101 Do not remove source or attribution from any graphic or portion of graphic
  97. 97. STKI IT Development survey• How should you use this data: – Look at the fine print – not all graphs are the same – including or excluding specific data according to the industry – If you do not have all data as stated look at the ratios Pini Cohen’s work Copyright 2011 @STKI 102 Do not remove source or attribution from any graphic or portion of graphic
  98. 98. New Initiatives (“development”) vs. Running (“maintenance) Systems New RunningIsraeli IT Average Initiatives Systems Finance - 73% 27% Banking Maint. Telecom 71% 29% 43% Finance - 53% 47% Dev. Insurance & 57% Credit Cards Health 48% 52% Government 32% 68% Source: STKI Survey The actual question was: Which part from your development budget is directed to “development vs. maintenance” Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  99. 99. About Development vs. Maintenance• Different companies has different takes. Example: – “Development – 7 days or more with features that contribute to company profitability (not regulation)” – “Everything is development except bugs correction or training support. Updating tables is development” – Up to two months works is considered maintenance. Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  100. 100. Development vs. Maintenance definition Pini Cohen’s work Copyright 2011 @STKI Source: STKI Survey Do not remove source or attribution from any graphic or portion of graphic
  101. 101. Spending from IT budget on developing new SW projectsAll DataPackagecustomizationnot included Pini Cohen’s work Copyright 2011 @STKI 106 Do not remove source or attribution from any graphic or portion of graphic Source: STKI Survey
  102. 102. STKI IT Development Survey Requirements,• Spending from IT Budget 8%• Testing including acceptance testing (effort by IT)• Development - means Testing, 21% developers effort and not necessarily just Design, 19% development (might include unit testing and other testing) Development, 52% Source: STKI Survey Pini Cohen’s work Copyright 2011 @STKI 107 Do not remove source or attribution from any graphic or portion of graphic
  103. 103. Per sector Requirements Design Development Testing 16% 13% 25% 23% 21% 30% 53% 50% 59% 49% 46% 56% 24% 21% 24% 15% 17% 6% 12% 6% 7% 7% 7% 5%Defence Health Telecom Finance (no Banking PublicGov. Source: STKI Survey Banks) Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  104. 104. STKI IT Development Report• Public Government – Spending more on the requirement stage – Testing looks is much less mature. – Therefore developers are dealing with testing – Several organization are on the building stage of their testing unitsprocedures• Health: more effort on design. Less effort on Testing• Telecom: heavy investment in testing without specific budget to User Acceptance testing• Finance (not banking): Heavy Management cost. Lots of investment in Design Pini Cohen’s work Copyright 2011 @STKI 109 Do not remove source or attribution from any graphic or portion of graphic
  105. 105. Requirement Mgmt. Attention Public 12% Telecom 7% Health 7%Finance (Insurance & Credit Cards) 7% Defense 6% Banking 5% Source: STKI Survey Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  106. 106. Testing Focus Factors Influencing QA: Telecom 30%• Internal SW development• SW is an integral part of Defense 25% the org. services to customers Finance 23% (Insurance & Credit Cards)• Regulation• Established Banking 21% methodologies (CMMI, ISO) Health 16% Public 13% Source: STKI Survey Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  107. 107. What “contributes” to Software maintenance:• Not all “minor improvements” are the same:• One company might put all improvement in “development budget” while the other will put all “new development that is less than two weeks”• “Infra” is SW adjustment to infrastructure changes – Win7, Oracle 11G, etc. Source: STKI Survey Pini Cohen’s work Copyright 2011 @STKI 112 Do not remove source or attribution from any graphic or portion of graphic
  108. 108. Who and what is developed?All including PublicHealth PublicHealth Source: STKI Survey Pini Cohen’s work Copyright 2011 @STKI 113 Do not remove source or attribution from any graphic or portion of graphic
  109. 109. Development Budget Distribution Sector Regulation Planned Unplanned Regulation Finance 30% 47% 23% 15% Banking 18% 60% 22% PlannedUnplanned Projects Telecom 18% 56% 26% Requests 60% 25% Public 15% 60% 25% Health 6% 75% 19% Defense 5% 60% 35% Pini Cohen’s work Copyright 2011 @STKI Source: STKI Survey Do not remove source or attribution from any graphic or portion of graphic
  110. 110. Metrics used Project Bugs Faults Depth of Development Other Management Testing Operations maturity Source: STKI SurveyEach respondent could add several metrics Pini Cohen’s work Copyright 2011 @STKI 115 Do not remove source or attribution from any graphic or portion of graphic
  111. 111. Metrics used – what is missing? Project Bugs Faults Depth of Development Other Management Testing Operations maturityDeployment Hatmaa metrics are missing! Pini Cohen’s work Copyright 2011 @STKI 116 Do not remove source or attribution from any graphic or portion of graphic
  112. 112. Selected Project Management metrics• Resource, Time, Features. And keeping track of it.• LOC – line of code• Number of mission accomplished in a monthperiod (normalized on mission size)• Plan vs. actual in total effort spent per customer, project• Net resources vs. overhead (courses, safety, illness- out of work) Pini Cohen’s work Copyright 2011 @STKI 117 Do not remove source or attribution from any graphic or portion of graphic
  113. 113. Selected Quality (bugfault related) metrics. All per severity level• # of bugs in testing and per man year, per K LOC• # of escaping bugs (limited time in production) and per man year, per K LOC• # of escaping bugs per # of bugs found in testing• First time quality – in testing and in production Pini Cohen’s work Copyright 2011 @STKI 118 Do not remove source or attribution from any graphic or portion of graphic
  114. 114. Selected Quality (bugfault related) metrics. All per severity level• # of critical bugs per total bugs found in testing and in production• # of requiring bugs (bugs that were not fixed at after first time)• # of false positive bugs – bugs that were reported but actually did not exist Pini Cohen’s work Copyright 2011 @STKI 119 Do not remove source or attribution from any graphic or portion of graphic
  115. 115. Selected testing breath metrics• Percent of code tested• Percent of code with automatic tests Pini Cohen’s work Copyright 2011 @STKI 120 Do not remove source or attribution from any graphic or portion of graphic
  116. 116. Selected dev.production process metrics• How many changes were introduced to a project while being developed (not relevant to Agile)• Did the project followed all procedures• How many times the project was put to production (if more than once- something went wrong…)• # of LOC developed per specific feature (comparing two developing environmentsupporting tools) Pini Cohen’s work Copyright 2011 @STKI 121 Do not remove source or attribution from any graphic or portion of graphic
  117. 117. Other development metrics• ISO metrics• Maturity of reporting systems –how well people report to the activitybug system (is reporting accurate, how often the reporting takes place, what is the delay between activity and the reporting). Pini Cohen’s work Copyright 2011 @STKI 122 Do not remove source or attribution from any graphic or portion of graphic
  118. 118. Organization Position of QA Office of the CIO 11% QA Development Department Department 50% 39% Source: STKI Survey Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  119. 119. Show me the QA money! • When QA is part of development the testing budget is lower – 38% difference! (at average)Source: STKI Survey Pini Cohen’s work Copyright 2011 @STKI 124 Do not remove source or attribution from any graphic or portion of graphic
  120. 120. Profile of your testing personnel Rising interest in Israeli Nearshore due to their subsidization by the Gov. Nearshore 19% Internal Staff Professional 57% Services 24% Source: STKI Survey Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  121. 121. Which Methodology is used• Counted even if used in few projects or experimenting (for example “using iterative only in Internet projects” or “experimenting agile in small projects”• CMMI is more common in Banking• ISO certifications used are ISO9001:2008 and 9002. Pini Cohen’s work Copyright 2011 @STKI 126 Do not remove source or attribution from any graphic or portion of graphic
  122. 122. Methodologies in usePini Cohen’s work Copyright 2011 @STKIDo not remove source or attribution from any graphic or portion of graphic Source: STKI Survey
  123. 123. The vendors are certainly listening Pini Cohen’s work Copyright 2011 @STKI 128 Do not remove source or attribution from any graphic or portion of graphic
  124. 124. The magic of code intelligence Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  125. 125. The magic of code intelligence Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  126. 126. The magic of code intelligence - SAP Transaction Flow Pini Cohen’s work Copyright 2011 @STKI 132 Do not remove source or attribution from any graphic or portion of graphic
  127. 127. CEP vs. BRMS• CEP – is something happening? Identify an event.• BRMS – what to do with the event.• Also (sort of..) BRMS that can handle time related input and with lots of capacity is CEP• CEP and BRMS should come (or relate) to BAM Pini Cohen’s work Copyright 2011 @STKI 133 Do not remove source or attribution from any graphic or portion of graphic
  128. 128.  continuous ingestion infrastructure provides services  continuous analysis for scheduling analytics across h/w nodes, for establishing streaming connectivity Filter / Sample … Transform Annotate Correlate Classify where appropriate, elements can be “fused” together achieve scale removing communication latencies by partitioning applications into s/w components by distributing across stream-connected h/w nodes134 © 2011 IBM Corporation
  129. 129. CQL Query Plan and Real Time monitoring135 Copyright © 2006, Oracle. All rights reserved.
  130. 130. Data Quality (business perspective ) Pini is Pinhas Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  131. 131. ‫‪Data Quality and Regulation‬‬‫לצורך יישום הוראות סעיף זה על גוף מוסדי להתייחס לכל הפחות לנקודות‬ ‫ו.‬ ‫•‬ ‫הבאות:‬ ‫1) שלמות הדיווחים – יש להתייחס לשלמות הן מבחינת מלאי (כל הדיווחים‬ ‫•‬ ‫הוכנו) והן מבחינת דיווח (כל הדיווחים נשלחו).‬ ‫2) תהליך הפקת הדיווחים.‬ ‫•‬ ‫3) סבירות הנתונים.‬ ‫•‬‫4) לענין הדוח לעמית או למבוטח יש להתייחס בנוסף, בהיבט מצרפי, לנכונות‬ ‫•‬‫שליפת המידע ממערכות המידע, לסך התנועות של ההפקדות והמשיכות במהלך‬‫השנה הרלוונטית ושיעור התשואה ושיעור דמי הניהול השנתיים בגין אותה שנה.‬ ‫יחד עם זאת, ובהתאם להוראות הממונה שיצאו בדבר טיוב נתונים, יש‬ ‫•‬ ‫לראות את הרחבת התהליך על יתר נתוני הדוח לעמית או למבוטח בהתאם‬ ‫ללוחות הזמנים שיקבעו בהוראות טיוב הנתונים‬ ‫‪Source: http://www.finance.gov.il/hon/2001/mosdiym/memos/tt2010-26b.doc‬‬ ‫‪Pini Cohen’s work Copyright 2011 @STKI‬‬ ‫731‬ ‫‪Do not remove source or attribution from any graphic or portion of graphic‬‬
  132. 132. For dealing with Data Quality• Define : – Data Owner (business) – high level management – Data Custodian (business) – need to actually keep track of data – Data Steward (IT) – help to apply the data owner and data custodian requests• Apply metrics for Data Quality• User Data Quality tools Pini Cohen’s work Copyright 2011 @STKI 138 Do not remove source or attribution from any graphic or portion of graphic
  133. 133. Regulation on data transfer Pini Cohen’s work Copyright 2011 @STKI 139 Do not remove source or attribution from any graphic or portion of graphic
  134. 134. HTML5 new features• Canvas element• Offline storage database• Document editing• Drag-and-drop• Cross-document messaging• Geolocation• Video GOTO: http://html5demos.com/ Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  135. 135. Pini Cohen’s work Copyright 2011 @STKIDo not remove source or attribution from any graphic or portion of graphic
  136. 136. Apple vs. Adobe• Today Adobe is launching an experimental Flash-to- HTML5 conversion tool called Wallaby. The tool takes content created with Adobes Flash Professional and converts it to HTML5, the latest revision of the Web markup language. HTML5 is supported in most Web browsers, but, most importantly, its supported on Apples iPhone, iPad and iPod Touch, where Flash is banned. Source: http://www.readwriteweb.com/archives/Adobe_Releases_Flash_to_HTML5_Conversion_Tool.php Source: http://www.google.co.il/imgres?imgurl=http://www.graphicmania.net/wp-content/uploads/10042010/adobevsapple.jpg&imgrefurl=http://www.graphicmania.net/apple-adobe-war-who-is-the-winner/&usg=__qEgJpLjP-6BI8NLK-6kSY7yVCsU=&h=2 Pini Cohen’s work Copyright 2011 @STKI 143 Do not remove source or attribution from any graphic or portion of graphic
  137. 137. Easier application development (the returning of 4GL?!) Pini Cohen’s work Copyright 2011 @STKI 144 Do not remove source or attribution from any graphic or portion of graphic
  138. 138. Keyword-driven testing• Software testing methodology for automated testing that separates the test creation process : a Planning Stage, and an Implementation Stage.• This enables automatic test written by testers and not programmers Source: wikipedia STKI modifications Pini Cohen’s work Copyright 2011 @STKI 145 Do not remove source or attribution from any graphic or portion of graphic
  139. 139. SOA Maturity Level The “middle man” 8. ESB team Architect enablesexecuting business services 7. ESB team Architect mandates business services 6. ESB team Architect suggests business services 5. ESB team mandates interface services 4. ESB team with SOAG tools 3. ESB team that suggests interface servicesDeveloper DeveloperDesigner 2. ESB with team that “do what you are told”Designermight use BPMSOAtools independently 1. Integration team – no tools might use BPMSOA tools independently 0. No Integration Layer Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic

×