Summit 2011 infra_general_trends

2,177 views

Published on

General Infrastructure trends and the GAP between IT and other technology users. Lean IT, Agile, Pervasive computing

0 Comments
0 Likes
Statistics
Notes
  • Be the first to comment

  • Be the first to like this

No Downloads
Views
Total views
2,177
On SlideShare
0
From Embeds
0
Number of Embeds
1
Actions
Shares
0
Downloads
0
Comments
0
Likes
0
Embeds 0
No embeds

No notes for slide

Summit 2011 infra_general_trends

  1. 1. ; The Gap! Pini Cohen EVP pini@stki.infoPini Cohen’s work Copyright 2011 @STKIDo not remove source or attribution from any graphic or portion of graphic
  2. 2. STKI isSchwarzkopfTheKnowledgeIntegrators Pini Cohen’s work Copyright 2011 @STKI 2 Do not remove source or attribution from any graphic or portion of graphic
  3. 3. My Challenge – how to Sew it all http://www.istockphoto.com/file_thumbview_approve/132499/2/istockphoto_132499-vintage-sewing-and-mending-kit.jpg Pini Cohen’s work Copyright 2011 @STKI 3 Do not remove source or attribution from any graphic or portion of graphic
  4. 4. What is new?• STKI’s first IT development survey• NOC Operator metrics• New DBA metrics• Ratios of production from all serversstorage New Pini Cohen’s work Copyright 2011 @STKI 4 Do not remove source or attribution from any graphic or portion of graphic
  5. 5. Agenda• Major Trends and Issues• Development and SOA• ESM BSM CMDB• DBMS and DATA• Platforms – Servers• Clients• Storage Source: http://astonguild.org.uk/files/NEW_MENU_FRONT_RGB%5B1%5D.jpg Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  6. 6. General Trends• The current infrastructure perspective in IT shops• The Gap• What are the big vendors doing?• Public Cloud• Private Cloud - Appliances• Manage Scattered IT• Pervasive Ubiquitous Computing• Near Field Communications and Video• Lean IT• Recommendations Source: http://www.google.co.il/imgres?imgurl=http://f arm5.static.flickr.com/4044/4215428802_8d8 72c6ccd.jpg&imgrefurl=http://flickr.com/photo s/efrenefren/4215428802/&usg=__Ca3quraL K4CKcTuemqbIelfUoQs=&h=500&w=365&sz =143&hl=iw&start=0&zoom=1&tbnid=yfgFXR Yu1l4N1M:&tbnh=146&tbnw=107&ei=asF_T dfJMInGgAezh6WaCA&prev=/images%3Fq% 3Dappetizer%2Bmenu%26um%3D1%26hl% 3Diw%26client%3Dfirefox- a%26sa%3DX%26rls%3Dorg.mozilla:en- US:official%26biw%3D1280%26bih%3D625 %26tbs%3Disch:1,isz:m&um=1&itbs=1&iact= rc&dur=365&oei=asF_TdfJMInGgAezh6WaC A&page=1&ndsp=27&ved=1t:429,r:20,s:0&tx Pini Cohen’s work Copyright 2011 @STKI 6 =74&ty=54 Do not remove source or attribution from any graphic or portion of graphic
  7. 7. Important trendsissues raised by some clients• WinXP will be without support soon• Storage growth• Lack of IT professionals• Datacenter unifications (storage, compute, networks)• CMDB• Green• Unified communications Pini Cohen’s work Copyright 2011 @STKI 7 Do not remove source or attribution from any graphic or portion of graphic
  8. 8. Major trendsissues raised clients Pini Cohen’s work Copyright 2011 @STKI Source: STKI 8 Do not remove source or attribution from any graphic or portion of graphic
  9. 9. Is something missing here?! Source: http://www.egd-media.co.uk/Home_files/droppedImage_1.jpg Pini Cohen’s work Copyright 2011 @STKI 9 Do not remove source or attribution from any graphic or portion of graphic
  10. 10. Who are None IT Technology Users (NITU)?• Students• Startups• SOHO (Small Office Home Office)• Young people• Home users• SMB’s Source: http://www.aixiaofei.com/upload/article/2009-08/1249625696.652387mS35fe.jpg Pini Cohen’s work Copyright 2011 @STKI 10 Do not remove source or attribution from any graphic or portion of graphic
  11. 11. IT vs. None IT Technology Users (NITU)IT None IT Technology usersUsing PC Using Macs or Tablets or PCIT buys the PC Using the device from home both PC (BYOPC) and phoneCommunicating via Email Communicating via Email, Social networks, etc.Social networks is just starting to be Social networks is part of the businesspart of Organization strategy – mainlywithin the marketing departmentsOnline and Batch applications Online applicationsUsing traditional voice and just little Using VOIP extensively (Viber, Skype, etc.)VOIPEither at Work or at Home Always at Work and at Home Pini Cohen’s work Copyright 2011 @STKI 11 Do not remove source or attribution from any graphic or portion of graphic
  12. 12. IT vs. NITU (cont.)IT None IT Technology usersParanoia regarding public cloud but Have more control of access to data byvulnerable to internal threats internal employeesNot using Saas Just using SaasUsing virtual servers that are in installed Using Iaason premiseNot using Mac servers Using Mac serversHigh Capex High Opex – that can be changed Lots of emphasis on none-core issues – Time and effort spent on core business ispatch distribution, performance issues, higher while the provider takes care ofetc. none-core issuesNot using freeopen source SW (Redhat Using freeopen source SWis not considered open source in thiscategorization) Pini Cohen’s work Copyright 2011 @STKI 12 Do not remove source or attribution from any graphic or portion of graphic
  13. 13. IT vs. NITU (cont.)IT None IT Technology usersApplication are generally not location Applications are natively location awareawareApplication are not QR ready Applications are QR readyTraditional business activity- product – Using crowdsourcing for marketing andmarketing – then selling product development (much leaner)Traditional organization structure Using crowdsourcing internally – “the guy at the warehouse” can influence on how the product will look like. Much more creativeNeed to perform some activities to Always connectedconnect (if possible)Not all technology domains are located in All technology is unitedone place – mobile projects, web sites,telephony, CCTV, other sensors Pini Cohen’s work Copyright 2011 @STKI 13 Do not remove source or attribution from any graphic or portion of graphic
  14. 14. STKI’s Point:Mind the increasing GAP ! Source: http://tednellen.blogspot.com/2009/12/last-sunday-of-09.html Pini Cohen’s work Copyright 2011 @STKI 14 Do not remove source or attribution from any graphic or portion of graphic
  15. 15. Will corporate IT be the Last Dinosaur?! Source: http://t1.gstatic.com/images?q=tbn:ANd9GcTCsfFbHIQWy7ikFKkSoVhBNEHZhpd1d3-dXaiLIF3kqwq5fTYj Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  16. 16. The strategy of some big vendors• Showing that big vendors are trying to do things differently – Google- approaching the enterprise – Microsoft- approaching the NITU (None IT Technology Users) that many years ago was Microsoft’s origin Pini Cohen’s work Copyright 2011 @STKI 16 Do not remove source or attribution from any graphic or portion of graphic
  17. 17. Google’s Vision• “In a 100% web world, business applications are delivered over the Internet and accessed in a web browser.” Dave Girouard, President, Google Enterprise Pini Cohen’s work Copyright 2011 @STKI 17 Do not remove source or attribution from any graphic or portion of graphic
  18. 18. Google Strategy for the Enterprises – step by step1. Private cloud with Search and Geoseptical appliances.2. SAAS for security (Postini), Exchange synchronization tools for Exchange DRP and archiving3. Gmail mail server. Users can still work with Microsoft Outlook or will Gmail GUI(with offline capabilities)4. Google Collaboration- web sites, portals, etc.5. Google Docs (competition to MS Office)6. Google App Engine (PAAS). Competition to Azure and other.7. Google App market place8. In the (near?) future – Google IAAS – competition to Amazon EC29. Chrome OS laptops Pini Cohen’s work Copyright 2011 @STKI 18 Do not remove source or attribution from any graphic or portion of graphic
  19. 19. Deploy powerful integrated solutions on premise and online DevicesOn Premise Applications Google Apps Your Apps 3rd Party Apps SearchGeospatial Google‟s Global Platform
  20. 20. Integrate your existing architecture to start your journey On Premise Device Management Devices ERP Device Mgmt. Applications Google Apps Your Apps 3rd Party Apps Cloud Connect User Mgmt. CRM Google‟s Global Platform Secure Data Search Connector Geospatial
  21. 21. Enjoy seamless communication and collaboration Gmail Google Docs web-based communication real-time collaboration tools hub Priority Inbox Rich Formatting overcome information overload images, tables, drawings with automatically prioritized and bullets emailContextual Gadgets Version historyapprove POs or update Voice & Video Chat maintained throughout theforecasts without leaving multiple communication editing process so you can Real-Time CollaborationGmail easily review multiple multiple users edit documents choices within a single versions simultaneously interface
  22. 22. Build, buy and manage applications your way App Engine Apps Marketplace platform as a service integrated 3rd party apps Easy to scale add capacity as usage of an application grows RatingsEasy to deploy Comprehensive list ratings from other customers tohost your applications on Easy to Manage Applications including project help you find the best AppsGoogle‟s infrastructure and easily deploy multiple management, accounting,provide them to your versions of applications to CRM and moreemployees via the web test new functionality
  23. 23. Add-ons to Google Chrome Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  24. 24. Add-ons to Google Chrome Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  25. 25. Googles Chrome Web Store +clock application Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  26. 26. The next stage ChromeOS Pini Cohen’s work Copyright 2011 @STKI 26 Do not remove source or attribution from any graphic or portion of graphic
  27. 27. Google is not immune from mistakes“…Google Wave is no longer being actively developed” Pini Cohen’s work Copyright 2011 @STKI 27 Do not remove source or attribution from any graphic or portion of graphic
  28. 28. Microsoft• Is putting most of its R&D budget on Cloud and NITU (None IT Technology Users)• But does not want to harm the relationship with traditional IT shops Pini Cohen’s work Copyright 2011 @STKI 28 Do not remove source or attribution from any graphic or portion of graphic
  29. 29. Windows AzureConnect
  30. 30. First Azure Project in Israel !  Guest Entry Project in The Government Complex (Cloud Guest MGMT)  Invitation forms and processes  Daily visitors reports  Serves 4 Ministries:  Ministry Of Culture And Sports  Ministry Of Science  Ministry Of Public Security  Ministry of Housing and developing  Why Azure:  Guardian & Microsoft service and support  Reduce operating costs and improve business agility  Scalable, Secure and Highly Available 34
  31. 31. Guest Entry Solution DEMO Daily Visitors Invite Form Report entrance Government Complex 35
  32. 32. Solution Architecture Security Interface E-Government invite Security Azure 36
  33. 33. On Premises / Hosters Azure Service in your datacenter Windows Azure & SQL Azure Physical Control - Geographic Proximity Regulatory Compliance - Data Sovereignty
  34. 34. Example of Microsoft cloud offering –Windows Intune for PC management Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  35. 35. 39
  36. 36. 41
  37. 37. What about Facebook and the enterprises?! Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  38. 38. Enterprise Benefits from Cloud Computing Capability From ToServer/Storage 10-20% Cloud accelerates 70-90% Utilization business value Self service None across a wide Unlimited variety of Test Provisioning Weeks domains. Minutes Change Months Days/Hours Management Release Weeks Minutes Management Fixed costMetering/Billing Granular modelStandardization Complex Self-Service Payback period Years Monthsfor new services Source: IBM Legacy environments Cloud enabled enterprise Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  39. 39. Today there are three primary delivery models that companiesare implementing for cloudEnterprise Traditional Public Clouds Enterprise Private Cloud IT Hybrid CloudPrivate Cloud Hybrid Cloud Public CloudIT activities/functions are provided “as Internal and external IT activities/functions are provideda service,” over an intranet, within the service delivery “as a service,” over the Internetenterprise and behind the firewall methods are integrated, • Key features:• Key features include: with activities/functions – Scalability – Scalability allocated to based on security requirements, – Automatic/rapid provisioning – Automatic/rapid provisioning criticality, architecture – Standardized offerings – Chargeback ability and other established – Consumption-based pricing. – Widespread virtualization policies. – Multi-tenancy Source: IBM Market Insights, Cloud Computing Research, July 2009. Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  40. 40. Delivery models for cloudEnterprise Traditional Public Clouds Enterprise Private Cloud IT Hybrid CloudPrivate Cloud Public CloudGood old consolidationvirtualization SAASIndustry in a box PAASAutomation IAASOther Source: IBM Market Insights, Cloud Computing Research, July 2009. STKI modifications Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  41. 41. Public Cloud• With Public Cloud “2 people business” can have: – ERP – CRM 196,802 soho ( up to 9 – Manufacturing Software companies employees) – VOIP• Soon they will have applications that corporate IT does not have! Example: Video Application Pini Cohen’s work Copyright 2011 @STKI 46 Do not remove source or attribution from any graphic or portion of graphic
  42. 42. Where does clouds come from?!• STKI client “we got questions about cloud implementation at our organization from our board of directors”! Source: http://www.clipartguide.com/_pages/0060-0808-2813-3928.html Pini Cohen’s work Copyright 2011 @STKI 47 Do not remove source or attribution from any graphic or portion of graphic
  43. 43. Public cloud issues as raised by clients• We will be prisoners of the public cloud provider. But aren’t we prisoners of our core business ERP CRM vendors?!• Public cloud providers will raise prices and we will not be able to do anything! And our current vendors never raise prices….• Public cloud is like SW rental vs. owning the license There are many tradition SW vendors that only rent SW• We will loose agility in public cloud. Anything that is hard to do – the cloud provider will refuse to do. The current vendors respond to all our needs…• STKI: All of these concern are real and users should consider carefully before using public cloud offerings. Still public cloud offering should be used by IT. Pini Cohen’s work Copyright 2011 @STKI 48 Do not remove source or attribution from any graphic or portion of graphic
  44. 44. Cloud usage Source: http://www.jackofallclouds.com/Pini Cohen’s work Copyright 2011 @STKI 49Do not remove source or attribution from any graphic or portion of graphic
  45. 45. Cloud usage Source: http://www.jackofallclouds.com/Pini Cohen’s work Copyright 2011 @STKIDo not remove source or attribution from any graphic or portion of graphic
  46. 46. Amazon EC2 AMI (Amazon Machine Images) - IBM Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  47. 47. The players Source: http://www.jackofallclouds.com/ methodology: I use QuantCast‟s top 1M site list as a reference. taking the top half of the list (500k sites in total). Each site is queried to determine whether it is hosted on a cloud provider, and if so on whichPini Cohen’s work Copyright 2011 @STKIDo not remove source or attribution from any graphic or portion of graphic
  48. 48. Things are happening up there in the cloud: Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  49. 49. Things are happening up there in the cloud: Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  50. 50. Things are happening up there in the cloud: Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  51. 51. Things are happening up there in the cloud: Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  52. 52. Things are happening up there in the cloud: Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  53. 53. DBMS market new frontiers: Native Cloud Service Hadoop Cassandra Database.com Xeround Redis Voldemort Amazon Simple DB FathomDB VoltDB MySQL, Memcached Cluster Ed Amazon RDS NoSQL Cloud Enabled SQL MySQL, PostGress, Microsoft SQL Azure XMLDB Gemstone Current Object DB Clustrix IT Microsoft Oracle SQL Server DB2 Traditional Pini Cohen’s work Copyright 2011 @STKI Source: http://xeround.com/58 Do not remove source or attribution from any graphic or portion of graphic
  54. 54. Summery of Public Cloud sections• Things are certainly happening in the public cloud arena Source; http://www.silicon.com/technology/networks/2011/02/04/cloud-computing-to-boom-in-2011-39746924/ Pini Cohen’s work Copyright 2011 @STKI 59 Do not remove source or attribution from any graphic or portion of graphic
  55. 55. Private Cloud• Appliances• Automation including workflow and self service Source: http://gigaom.com/2010/05/12/why-private-clouds-are-a-catch-22-for-buyers/ Pini Cohen’s work Copyright 2011 @STKI 60 Do not remove source or attribution from any graphic or portion of graphic
  56. 56. Private cloud by users• Will enable flexible, elastic infrastructure on which a variety of applications can be easily provisioned and efficiently operated.• But requires huge investment• Like automatic gear – we all like it but it requires 10% more fuel Source: http://forums.juniper.net/t5/Architecting-the-Network/Fabric-Computing-Gartner-s-view-for-the-future-of-the-datacenter/bc-p/75834 Pini Cohen’s work Copyright 2011 @STKI 61 Do not remove source or attribution from any graphic or portion of graphic
  57. 57. The new soon to be ITPini Cohen’s work Copyright 2011 @STKI Source: http://www.accenture.com/SiteCollectionDocuments/PDF/Accenture_Infrastructure_Consulting_Next_Generation_Data_Center.pdfDo not remove source or attribution from any graphic or portion of graphic
  58. 58. Building the next-generation data center and enabling cloud computing (Accenture)Phase 1 - Continued focus on data center virtualization(across all areas of server, storage and network),consolidation and standardizationPhase 2 - Automating IT processes, integrating servicemanagement tools, optimizing resources and leveragingprovisioning toolsPhase 3- Service approach to IT rather thana component view. At this stage, companies typically beginto see the value of cloud computing. Source: http://www.accenture.com/SiteCollectionDocuments/PDF/Accenture_Infrastructure_Consulting_Next_Generation_Data_Center.pdf STKI modifications Pini Cohen’s work Copyright 2011 @STKI 63 Do not remove source or attribution from any graphic or portion of graphic
  59. 59. AppliancesWe are seeing more and more Appliances offerings NetBackup 5000 Appliance Oracle Exadata Teradata EMC GreenplunTurnkey Deduplication Solution from Symantec Exalogic VBLOCK Pini Cohen’s work Copyright 2011 @STKI Google FlexPod for Vmware Do not remove source or attribution from any graphic or portion of graphic SAP HANA
  60. 60. Why do we need appliance?• All components are tuned to work together• Improved performance• Automatic provisioning that works! (prepared to do the needed task)• Self service that works! (prepared to do the needed task)• Patches that are tested for specific situation• Lower time to market Pini Cohen’s work Copyright 2011 @STKI 65 Do not remove source or attribution from any graphic or portion of graphic
  61. 61. Example: adding another server- not that easy…• Example: adding Websphere server to cluster:  Use a text editor to open the wpconfig.properties file.  Windows and UNIX location: portal_server_root/config/wpconfig.properties  Ensure that the following properties are uncommented and specify appropriate values:  ClusterName property: Specify the name of the cluster to which you are adding the node.  ServerName property: Specify the cluster member name you want to use when adding this node to the cluster. Important: The cluster member name you specify for this property must be unique within the cell and cannot have the same value as the ServerName property on the primary node or other secondary nodes.  PrimaryNode property: Verify that the value for this node is false.  Add the node to the cluster.  Windows and UNIX: Run the following command from the portal_server_root/config directory: – Windows: WPSconfig.bat cluster-setup -DWasPassword=password – UNIX: ./WPSconfig.sh cluster-setup -DWasPassword=password  Click the application server name for the secondary node.  Click Ports under the Communications settings, and verify the port number listed for the WC_defaulthost port.  Click Servers > Cluster Topology to view the updated cluster topology.  Regenerate the Web server plug-in.  Regenerate the Web server plug-in using the deployment manager administrative console.  If you are using a remote Web server, copy the updated plug-in configuration file (plugin-cfg.xml) to the Web servers plug-in configuration directory.  Stop and start the Web server.  Restart all cluster members, where each cluster member is a single application server in the cluster. Source: http://publib.boulder.ibm.com/infocenter/wpdoc/v6r0/index.jsp?topic=/com.ibm.wp.ent.doc/wpf/clus_install_addmember_horiz.html Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  62. 62. IBM CloudBurst and WebSphere CloudBurst provide cloud management capabilities with different scopes WebSphere CloudBurst Appliance IBM CloudBurst Bladecenter + set of pre-configured provisioning Offering type Physical appliance and management software + configuration services General purpose cloud provisioning/ Applicable Scope Application middleware environments management Bring your own (leverage underutilized assets in Included in the offering (bladecenter w/ 3 blades Hardware for cloud your datacenter) in it) User-built images (whichever productsItems managed in cloud GA virtual images from IBM for select products customer chooses to build) 67
  63. 63. Lead Time: To get a new application environment….Today, this list of serial processes is executed for each new application environment:Approvals Procurement HW Install OS Install MW Install App Install/Config 2-4 month lead time! Factor out repetitive tasks to reduce lead time! Approvals Procurement HW Install Done once at cloud creation/expansion time OS Install MW Install App Install/Config Done once at image/pattern creation/customization time Click “Deploy” and wait Done for each environment request Hours or Minutes lead time! 68
  64. 64. Consistency/Less Errors: “HyperVisor Edition” Images IBM Middleware shipped as an .OVF virtual image, ready to run on a hypervisor The following products offered in HV form as of 8/2010: WAS V6.1 HV  WebSphere Application Server v6.1 WAS V7 HV  WebSphere Application Server v7  WebSphere Process Server v7 WebSphere  WebSphere Portal Server v6.1.5 Application Server  DB2 Operating System Products support various combinations of:  VMware ESX, z/VM and/or PowerVM hypervisors  Red Hat Enterprise Linux, SUSE Linux, AIX Maintenance, support, and fixes through IBM for both WAS and Operating System  New images include most recent GA components of IBM middleware, as well as OS patches 69
  65. 65. Enable a self-optimizing private cloud w/Intelligent Management Pack! Use the pattern editor to select the policy-based1 management options to include in your environment 2 WebSphere CloudBurst activates IMP in the dispensed pattern 3 Policy-based management self- optimizes your running private cloud environment until you stop it! 70
  66. 66. TCO Analysis Available!Quantifies WS CloudBurst Benefits Without WS With WS Enabled by Virtualization CloudBurst CloudBurst Optimization New100% Development Rapid provisioning Strategic New Benefits Software Costs Change Development Capacity Reduced Capital Expenditures Reduced Operating Expenditures Power Costs Additional Benefits DeploymentCurrent Reduced risk, less idle time, more IT (1-time) efficient use of energy, acceleration Spend of innovative projects, enhanced Software Costs Labor Costs (reduced xx%) customer service (Operations & Maintenance) Power Costs Reduced (reduced xx%) Business Case Results annual Labor Costs cost of Annual Savings: $MM (xx%) (reduced xx%) operation Hardware Costs by xx% Breakeven: xx days (annualized) Hardware Costs Net Present Value (NPV): $MM (reduced xx%) Internal Rate of Return (IRR): xx% Return on Investment (ROI): xx% 71
  67. 67. Appliances – what can you touch? Oracle’s Exadata point of view:“We discourage installing additional software on the database servers butwe dont prohibit it.Our guidance is to keep extra software to a minimum e..g just backup,management, and security agents.In some cases where there is a serious and measured advantage to runningon the DB servers (e.g. some ETL software) then it might make sense toinstall those.We very heavily discourage or disallow modifications to the OperatingSystem other than installing packages or fixes officially provided byOracle. For example installing third-party device drivers is heavilydiscouraged or disallowed.So, on Exadata you should only install Oracle databases and software relatedto it - like third party backup tools, management tools and security tools.For applications we have Exalogic ..” Pini Cohen’s work Copyright 2011 @STKI 72 Do not remove source or attribution from any graphic or portion of graphic
  68. 68. STKI’s take on Appliances• The danger of loosing flexibility and lock in situation should be balanced to the performance and ease of operations benefits• Its just the beginning of the trends and the industry is not sure where Appliances will be a long term viable solution• Not all appliance are the same: Backup Appliance is not “Core business” Appliance in the perspective of benefits or risks. Pini Cohen’s work Copyright 2011 @STKI 73 Do not remove source or attribution from any graphic or portion of graphic
  69. 69. STKI’s take on Cloud• Do something with the cloud (private, public) – TODAY!• Automation Automation Automation (which also means standardization and workflow and self service) Pini Cohen’s work Copyright 2011 @STKI 74 Do not remove source or attribution from any graphic or portion of graphic
  70. 70. STKI’s theme: Manage Scattered IT• There are ComputerTechnology domains that are not handled by IT. Examples: – Telephony – Web Sites – CCTV and Security – Social Networking – Computers in manufacturing sites – Tablet PC’s• This has to STOP! Pini Cohen’s work Copyright 2011 @STKI 75 Do not remove source or attribution from any graphic or portion of graphic
  71. 71. Using technology to drive growth & profits Pini Cohen’s work Copyright 2011 @STKI 76 Do not remove source or attribution from any graphic or portion of graphic
  72. 72. Ubiquitous Pervasive computing• Computingsensors everywhere! From your refrigerator to your shoes to your neighbor’s dog…• Implications are enormous especially on: – More storage growth – Capturing this information and processing it (CEP)• Should be part of IT Pini Cohen’s work Copyright 2011 @STKI 77 Do not remove source or attribution from any graphic or portion of graphic
  73. 73. Ubiquitous computing pervasive computing External TCP/IP InternetSource: http://www.elec.qmul.ac.uk/people/stefan/ubicom/slides/ubicom-ch02-slides.ppt ICT Network External Energy Grid External Phone Network Ubiquitous computing: smart devices, environments and interac External Video External Audio Broadcast Broadcast Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  74. 74. MEMS Source: http://bcctae.files.wordpress.com/2010/10/adaptive-experiences-ubiquitous-computing.ppt Micro fabrication and integration of low-cost sensors, actuators and computer controllers, MEMS (Micro Electro- Mechanical Systems) Ubiquitous computing: smart devices,Photo: courtesy of Brett Warneke environments and interaction 79 Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  75. 75. DUST Source: http://bcctae.files.wordpress.com/2010/10/adaptive-experiences-ubiquitous-computing.ppt Dust: miniaturized devices can be without visual output displays, e.g., Micro Electro- Mechanical Systems (MEMS), ranging from nanometers through micrometers to millimeters. Smart Dust project , Pister, UC,Berkely hypothesized that dust could be spread around environment to receive and report changesPini Cohen’s work Copyright 2011 @STKIDo not remove source or attribution from any graphic or portion of graphic
  76. 76. SKINS Source: http://bcctae.files.wordpress.com/2010/10/adaptive-experiences-ubiquitous-computing.ppt Skin: fabrics based upon light emitting and conductive polymers, organic computer devices, can be formed into more flexible non-planar display surfaces and products such as clothes and curtains „SmartSecondSkin‟ is an artefact designed by Jenny Tillotson to illustrate a responsive fabric inspired by neurobiological delivery mechanisms found under skin.Pini Cohen’s work Copyright 2011 @STKIDo not remove source or attribution from any graphic or portion of graphic
  77. 77. CLAY Source: http://bcctae.files.wordpress.com/2010/10/adaptive-experiences-ubiquitous-computing.ppt Clay: ensembles of MEMS can be formed into arbitrary three dimensional shapes as artifacts resembling many different kinds of physical object „MIT‟s Tangible Media Group is an actuated tabletop display, which is able to render and animate three- dimensional shapes with a malleable surface. It allows users to experience and form digital models like geograpil terrain in an intuitive manner.Pini Cohen’s work Copyright 2011 @STKIDo not remove source or attribution from any graphic or portion of graphic
  78. 78. Ubiquitous computing pervasive computing Audio-Video Cluster Computer as Hub of cluster Local Network User Interaction Internal Comms.Source: http://www.elec.qmul.ac.uk/people/stefan/ubicom/slides/ubicom-ch02-slides.ppt Processing: edit, annotate, compose Management: Resources & Content Storage Email Web Ubiquitous computing: smart devices, environments and inte Wide network Chat VoD Audio-Video Stream VoIP Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  79. 79. Sensor Feeds will influence storage dramatically• Sensor Feeds: The tighter linkages between info sharing environment and the operational DCGS/ISR capability providers is making the technology of sensors critical to plan for our future. Increases in sensor feeds are directly fueling our future needs for communications, processing and storage capabilities. 1024 Yottabytes Source: http://ctovision.typepad.com/InfoSharingTechnologyFutures.ppt STKI modifications 1021 Theater Data Stream (2006): Zettabytes ~270 TB of NTM data / year Example: One 1018 Theater’s 250 TB Exabytes Large Data JCTD 12 TB Storage Capacity: 2006 2010 Capability Gap 1015 Petabytes UUVs FIRESCOUT VTUAV DATA 1012 Terabytes GIG Data Capacity (Services, Transport & Storage) 2000 Today 2010 2015 & Beyond Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  80. 80. NFC: Near Field Communication Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  81. 81. NFC: Near Field Communication Pini Cohen’s work Copyright 2011 @STKI http://weblog.cenriqueortiz.com/touch-nfc/ Do not remove source or attribution from any graphic or portion of graphic
  82. 82. Payment can be Enhanced for the User with Mobile NFC Mobile NFC can be used for payment at kiosks, ticketing, internet, or person-to-person• Additional uses that enhance payments include: – Tickets can be purchased, stored, and redeemed. – Prepaid cards can be bought, stored, and accessed in the phone. – Coupons can be transferred to a friend, recommending products. – Product history and medical warnings can be read in the store. – Shopping lists can be collected from tags. – Electronic devices can be activated after purchase and warranties sent in. – And many more! http://www.nfc-forum.org/resources/presentations/Tagawa_Barcelona_2010.pdf Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  83. 83. NFC Is More Than Payment and Mobile Phones• NFC mobile phones are for more than payments: – Secure access to buildings and PCs – Inventory control with tags and readers – Security patrols – Patient monitoring – Information gathering with educational tags http://www.nfc-forum.org/resources/presentations/Tagawa_Barcelona_2010.pdf Pini Cohen’s work Copyright 2011 @STKI Do not remove source or attribution from any graphic or portion of graphic
  84. 84. NFC: Near Field Communication • “NFC mobile payments to exceed $30 billion by 2012” • “1 in 6 users worldwide will have an NFC-enabled phone by 2014” –Juniper Research(M) Pini Cohen’s work Copyright 2011 @STKI http://juniperresearch.com/shop/products/report/pdf/brochure/3267MPM%20NFC%20report%20brochure.pdf Do not remove source or attribution from any graphic or portion of graphic
  85. 85. Video Video is a SCATTERED IT TECHNOLOGYPini Cohen’s work Copyright 2011 @STKIDo not remove source or attribution from any graphic or portion of graphic
  86. 86. Age of Internet Video Pini Cohen’s work Copyright 2011 @STKI Source: Cisco VNI Usage, 2010 Do not remove source or attribution from any graphic or portion of graphic
  87. 87. Lean IT• Lean IT - Lean IT is the extension of lean manufacturing and lean services principles. Its central concern, applied in the context of IT, is the elimination of waste, where waste is work that adds no value to a product or service.• Lean is a complete process. Part of it is problem-solving procedures (Kaizen) where MUDA (waist) is to be found Pini Cohen’s work Copyright 2011 @STKI 92 Do not remove source or attribution from any graphic or portion of graphic
  88. 88. Lean IT• We are doing all we can. Why do we need Kaizen procedures?!• Example of Kaizen procedures in Service Desk scenario in leading IT organization: – Reduce support time for incident by 50% (same staff)! – Answering the phone according to SLA – from 76% to 96% ! Pini Cohen’s work Copyright 2011 @STKI 93 Do not remove source or attribution from any graphic or portion of graphic
  89. 89. Muda: The Seven Deadly Types of Waste (classical Lean)• Defects• Overproduction• Source: http://www.systems2win.com/lk/lean/7wastes.htm Over-processing• Transport and handling• Waiting• Confusion – missing information• Unsafe• Underutilized human potential Pini Cohen’s work Copyright 2011 @STKI 94 Do not remove source or attribution from any graphic or portion of graphic
  90. 90. From Lean to Agile via Kanban• A Kanban is a physical card used in Toyota Production System (TPS). It has spread to the manufacturing industry all over the Source: http://www.infoq.com/articles/hiranabe-lean-agile-kanban STKI modifications world as a tool of Lean Manufacturing. Now in Agile software development the visualization of projects, such as posting task cards on a wall, is a commonly seen practice, which is sometimes called "Software Kanban", or "Task Kanban". Pini Cohen’s work Copyright 2011 @STKI 95 Do not remove source or attribution from any graphic or portion of graphic
  91. 91. STKI’s take on the GapDeal with the GAP! Pini Cohen’s work Copyright 2011 @STKI 96 Do not remove source or attribution from any graphic or portion of graphic
  92. 92. STKI’s take on the Gap• Spend some effort (time and money) on new technologies. Example: communicate on social networks, harness your organization with crowdsourcing, do some IAAS, SAAS, PAAS etc.• When experimenting be aware that not everything be “peace of cake”.• (repeating because its important) Automation Automation Automation (including workflow and self service)!• Automation also means standardization• In each quarter automate several key processes• In each quarter dispose several unneeded technologies• IT personal should understand the business more Pini Cohen’s work Copyright 2011 @STKI 97 Do not remove source or attribution from any graphic or portion of graphic
  93. 93. Thank you Pini Cohen Pini Cohen’s work Copyright 2011 @STKI 98 Do not remove source or attribution from any graphic or portion of graphic

×