The document discusses trends in enterprise IT and end user services, including:
- The move to browser-based applications and thin clients delivered through the browser.
- The role of technologies like iBeacons, WebRTC, and wireless communication standards in improving the end user experience.
- Trends in call center software like increased integration, workforce management tools, and browser-based solutions.
- How Microsoft's changing licensing and products will impact migrations and end user delivery.
The presentation provides an overview of emerging technologies and strategies for IT departments to improve delivery of services to end users.
Opticon 2015-Technology Trends, the “We Economy” and Optie AwardsOptimizely
Featuring speakers from Accenture
Mary Hamilton, Managing Director, Digital Experiences R&D Lead, Accenture
This keynote address will dive into the transformational power of new “digital ecosystems”, exploring major trends in technology, data, and connectivity poised to completely transform the experiences we deliver to customers each and every day. Find out how today’s most successful businesses use “digital ecosystems” to shift their thinking from “me” to “we”, and learn how you can too. Because, as Mary puts it: It’s not just about you, or me, or anyone else in particular. It’s about all of us – the “We Economy”.
Also join us in celebrating our 2nd annual Optie Award winners! The Opties are comprised of nine categories that best highlight our customers’ cutting edge optimization programs.
AIOps is in full swing across enterprises of all sizes, with more than 90% of organizations in active deployment. Although the discipline is still relatively new to IT (more than 60% of the implementations are less than two years in), there are big wins to be had—both quantifiable and qualitative. In fact, AIOps has a very high success rate (95%) and almost universally pays for itself.
These slides—based on the research webinar from leading IT research firm Enterprise Management Associates (EMA)--examine the characteristics that are common to the 21% who rate the impact of AIOps on the IT/business relationship as “transformational.”
How Do You Become Agile?
Agile has been a buzz word for a while now. But what is the magic of Agile? Can you
benefit from it and how? We will lead you through the woods of myths and come up with recommendations and practical examples, including the way Agile is affecting the testing
profession.
Speakers:
Cees Bos,
Insights & Data, Capgemini
Joakim Lindbom,
CTO, Capgemini
Opticon 2015-Technology Trends, the “We Economy” and Optie AwardsOptimizely
Featuring speakers from Accenture
Mary Hamilton, Managing Director, Digital Experiences R&D Lead, Accenture
This keynote address will dive into the transformational power of new “digital ecosystems”, exploring major trends in technology, data, and connectivity poised to completely transform the experiences we deliver to customers each and every day. Find out how today’s most successful businesses use “digital ecosystems” to shift their thinking from “me” to “we”, and learn how you can too. Because, as Mary puts it: It’s not just about you, or me, or anyone else in particular. It’s about all of us – the “We Economy”.
Also join us in celebrating our 2nd annual Optie Award winners! The Opties are comprised of nine categories that best highlight our customers’ cutting edge optimization programs.
AIOps is in full swing across enterprises of all sizes, with more than 90% of organizations in active deployment. Although the discipline is still relatively new to IT (more than 60% of the implementations are less than two years in), there are big wins to be had—both quantifiable and qualitative. In fact, AIOps has a very high success rate (95%) and almost universally pays for itself.
These slides—based on the research webinar from leading IT research firm Enterprise Management Associates (EMA)--examine the characteristics that are common to the 21% who rate the impact of AIOps on the IT/business relationship as “transformational.”
How Do You Become Agile?
Agile has been a buzz word for a while now. But what is the magic of Agile? Can you
benefit from it and how? We will lead you through the woods of myths and come up with recommendations and practical examples, including the way Agile is affecting the testing
profession.
Speakers:
Cees Bos,
Insights & Data, Capgemini
Joakim Lindbom,
CTO, Capgemini
DevOps began as a way to deliver availability and survive agile methodologies. Along the way to CI/CD, it has become an overwhelming set of tools cobbled together to deploy code. Simultaneously, applications moved to mobile and IoT devices and from simple application servers to front end, backend, cloud, and microservices. The monitor stage of DevOps has exceeded the human capability for comprehension.
We are missing things and that leads to outages. We need to augment ourselves with ML & automation.
During this session, I want you to think about your last war-room incident and consider whether you are reactive or proactive. By augmenting ourselves through AIOps, we move towards the nirvana of being preemptive.
SPEAKER BIO:
Marco Coulter, Technical Evangelist | AppDynamics
As the Technical Evangelist for AIOps at AppDynamics, Marco Coulter is passionate about the experience humans have when interacting with technology. A former startup CTO, Marco has progressed from operator to leadership roles at CSC, CA Technologies, and more recently 451 Research, where he led the data science team. He earned the nickname "the tech-whisperer" for his skills in translating business drivers for a technical audience and technical concepts for business leaders. When taking the rare break from technology, Marco can be found harvesting fresh vegetables from his NYC garden.
Artificial Intelligence for IT Operations (AIOps) is the concept of using big data analytics, machine learning, and other advanced technologies to enhance IT operations.
Research from leading IT analyst firm EMA has found that enterprises are applying AIOps solutions to network infrastructure today to enhance service assurance and automation.
These slides from the webinar featuring EMA Research and VeloCloud, now part of VMware, explore how research enterprises are driving toward self-healing networks with AIOps solutions and transforming network operations.
The 21st Century Enterprise: The Future of Enterprise ITCA Technologies
Discover the opportunity for you to drive the transformation and lead the Business through the 21st Century Enterprise.
For more information, please visit http://cainc.to/Nv2VOe
Based on global research from leading IT research firm EMA, these slides—based on the webinar—provide a uniquely comprehensive look at IT automation technologies in terms of what is deployed, what is most valuable, and what is lacking in today’s solutions.
This presentation is about the survey conducted by TechTarget,For the IT leaders and investors.This trend has seen the emergence a new IT departments, that are able to re-allocate their IT budgets in an agile way to take advantage of emerging technologies.
Since 2012, leading IT research firm EMA has conducted more than five separate AIOps research projects, including reviews of more than 70 AIOps-related customer deployments. Deep insights into this topic continue with these slides—based on the research webinar--that provide the latest insights into how to best succeed in AIOps deployments and unify IT in the process.
Refactoring the Factory: Building a Cloud-Native App Transformation FactoryVMware Tanzu
How is managing a massive cloud-native transformation effort different than the "application modernization factories" that have been around for years? Transforming or modernizing a portfolio consisting of hundreds of existing (aka, “brownfield”) applications is an enormous undertaking that requires a highly talented, cross-functional team.
Attend this webinar with Pivotal, CGI, and 451 Research’s Carl Brooks to learn about the nuts and bolts of managing cloud-native application transformation at scale. After an overview from 451 Research, we’ll dive deep on the roles, tools, and processes required to create a well-run, cloud-native application transformation.
Join us to hear how to replicate this success in your own organization!
Presenters : Mark Carlson, CGI, Carl Brooks, 451 Research & Jeff Kelly, Pivotal
In May of 2015, leading IT analyst firm Enterprise Management Associates (EMA) conducted survey-driven research to assess the key challenges and benefits surrounding API-delivered services. The data is now in, and the information gathered from API providers and consumers can help answer a host of API-specific questions being asked by many IT professionals. These slides cover some of the findings.
EMA/Apica October 2016 Event: User Environment Management For Digital Transfo...Apica
Both User Environment Management (UEM) and Digital Transformation (DT) are current industry buzzwords. However, the two are more interrelated than most recognize. During an October 2016 event Julie Craig, research director from analyst firm Enterprise Management Associates, addressed these two trends and discussed ways in which UEM– and specifically synthetics solutions such as Apica– supports and facilitates DT initiatives.
For most organizations, new technologies are coming to market faster than we can keep up with. This wave of innovation brings with it new opportunities for cutting-edge applications and services that create industry differentiation. At the same time, the complexity of melding new technologies into existing production systems makes it difficult to chart a course through the flood of possibilities these technologies have to offer. As a result, many companies deploy new applications first, then figure out how to manage performance and availability.
In other words, performance optimization is too often an afterthought.
The rapid growth in mobile, big data, and cloud technologies has profoundly changed market dynamics in every industry, including financial services, driving the convergence of the digital and physical worlds, and changing customer behavior.
Amidst an industry cloud of confusion about what “AIOps” is and what it can do, these slides--based on the webinar from EMA research--delineates a clear path to victory for business and IT stakeholders seeking to use machine learning to optimize the performance of critical business services.
Study Pemenuhan Kebutuhan Air Bersih PDAM Kota Surabaya Tahun Proyeksi (2015) ikhsan setiawan
Sistem penyediaan air bersih di kota Surabaya telah mensuplai air kepada lebih
dari 1,6 juta penduduk yang merupakan 64% dari seluruh total penduduk
yang ada di kota Surabaya. Kota Surabaya menerima sekitar 95% air bakunya
dari Kali Surabaya dan mengambil sisanya 5% dari mata air Pandaan dan
Umbulan. Kapasitas produksi yang dimiliki oleh PDAM Kota Surabaya adalah
sebesar 8,4 m/det yang terdiri dari Instalasi Ngagel dengan kapasitas 4,4
m/det, dari Instalasi Karang Pilang sebesar 3,7 m/det serta dai sumber mata
air sebesar 0,3 m/det. Adapun sistem Transmisi dan Distribusinya meliputi ±
3680 km perpipaan, yang mana diameter yang terpasang bervariasi antara 50
-1500 mm. dari keseluruhan total pipa distribusi yang terpasang, sekitar 20%
pipa tersebut berusia lebih dari 20 tahun dan 9% usianya melebihi 30 tahun.
Proyeksi kebutuhan air untuk kota Surabaya dari tahun ke tahun
menunjukkan tingkat kenaikan yang cukup besar seiring dengan
bertambahnya jumlah penduduk di kota Surabaya. Dengan adanya tingkat
kenaikan tersebut maka dapatlah dibuat suatu skenario terhadap alternatif
proyeksi pemenuhan kebutuhan air untuk penduduk kota Surabaya hingga
tahun 2015 dengan melakukan evaluasi terhadap kapasitas produksi,
kapasitas konsumsi, pengembangan sistem penyediaan air bersih yang
diharapkan pada tahun proyeksi 2015 diharapkan masih dapat terpenuhi
namun apabila hal ini tidak rencanakan mulai sekarang maka kondisi
kebutuhan air bersih pada tanun 2015 akan menjadi sangat kritis untuk itu
perlu adanya pemikiran untuk pemenuhan kebutuhan air bersih pada tahun
mendatang sehingga dapat diambil langkah langkah yang diperlukan sesuai
dengan perkembangan sosial ekonomi masyarakat kota yang
perkembangannya sangat pesat dimana kebutuhan air bersih adalah salah satu
kebutuhan yang sangat mutlak bagi kebutuhan masyarakat kota Surabaya.
Kata Kunci : Instalasi, Distribusi, Proyeksi
DevOps began as a way to deliver availability and survive agile methodologies. Along the way to CI/CD, it has become an overwhelming set of tools cobbled together to deploy code. Simultaneously, applications moved to mobile and IoT devices and from simple application servers to front end, backend, cloud, and microservices. The monitor stage of DevOps has exceeded the human capability for comprehension.
We are missing things and that leads to outages. We need to augment ourselves with ML & automation.
During this session, I want you to think about your last war-room incident and consider whether you are reactive or proactive. By augmenting ourselves through AIOps, we move towards the nirvana of being preemptive.
SPEAKER BIO:
Marco Coulter, Technical Evangelist | AppDynamics
As the Technical Evangelist for AIOps at AppDynamics, Marco Coulter is passionate about the experience humans have when interacting with technology. A former startup CTO, Marco has progressed from operator to leadership roles at CSC, CA Technologies, and more recently 451 Research, where he led the data science team. He earned the nickname "the tech-whisperer" for his skills in translating business drivers for a technical audience and technical concepts for business leaders. When taking the rare break from technology, Marco can be found harvesting fresh vegetables from his NYC garden.
Artificial Intelligence for IT Operations (AIOps) is the concept of using big data analytics, machine learning, and other advanced technologies to enhance IT operations.
Research from leading IT analyst firm EMA has found that enterprises are applying AIOps solutions to network infrastructure today to enhance service assurance and automation.
These slides from the webinar featuring EMA Research and VeloCloud, now part of VMware, explore how research enterprises are driving toward self-healing networks with AIOps solutions and transforming network operations.
The 21st Century Enterprise: The Future of Enterprise ITCA Technologies
Discover the opportunity for you to drive the transformation and lead the Business through the 21st Century Enterprise.
For more information, please visit http://cainc.to/Nv2VOe
Based on global research from leading IT research firm EMA, these slides—based on the webinar—provide a uniquely comprehensive look at IT automation technologies in terms of what is deployed, what is most valuable, and what is lacking in today’s solutions.
This presentation is about the survey conducted by TechTarget,For the IT leaders and investors.This trend has seen the emergence a new IT departments, that are able to re-allocate their IT budgets in an agile way to take advantage of emerging technologies.
Since 2012, leading IT research firm EMA has conducted more than five separate AIOps research projects, including reviews of more than 70 AIOps-related customer deployments. Deep insights into this topic continue with these slides—based on the research webinar--that provide the latest insights into how to best succeed in AIOps deployments and unify IT in the process.
Refactoring the Factory: Building a Cloud-Native App Transformation FactoryVMware Tanzu
How is managing a massive cloud-native transformation effort different than the "application modernization factories" that have been around for years? Transforming or modernizing a portfolio consisting of hundreds of existing (aka, “brownfield”) applications is an enormous undertaking that requires a highly talented, cross-functional team.
Attend this webinar with Pivotal, CGI, and 451 Research’s Carl Brooks to learn about the nuts and bolts of managing cloud-native application transformation at scale. After an overview from 451 Research, we’ll dive deep on the roles, tools, and processes required to create a well-run, cloud-native application transformation.
Join us to hear how to replicate this success in your own organization!
Presenters : Mark Carlson, CGI, Carl Brooks, 451 Research & Jeff Kelly, Pivotal
In May of 2015, leading IT analyst firm Enterprise Management Associates (EMA) conducted survey-driven research to assess the key challenges and benefits surrounding API-delivered services. The data is now in, and the information gathered from API providers and consumers can help answer a host of API-specific questions being asked by many IT professionals. These slides cover some of the findings.
EMA/Apica October 2016 Event: User Environment Management For Digital Transfo...Apica
Both User Environment Management (UEM) and Digital Transformation (DT) are current industry buzzwords. However, the two are more interrelated than most recognize. During an October 2016 event Julie Craig, research director from analyst firm Enterprise Management Associates, addressed these two trends and discussed ways in which UEM– and specifically synthetics solutions such as Apica– supports and facilitates DT initiatives.
For most organizations, new technologies are coming to market faster than we can keep up with. This wave of innovation brings with it new opportunities for cutting-edge applications and services that create industry differentiation. At the same time, the complexity of melding new technologies into existing production systems makes it difficult to chart a course through the flood of possibilities these technologies have to offer. As a result, many companies deploy new applications first, then figure out how to manage performance and availability.
In other words, performance optimization is too often an afterthought.
The rapid growth in mobile, big data, and cloud technologies has profoundly changed market dynamics in every industry, including financial services, driving the convergence of the digital and physical worlds, and changing customer behavior.
Amidst an industry cloud of confusion about what “AIOps” is and what it can do, these slides--based on the webinar from EMA research--delineates a clear path to victory for business and IT stakeholders seeking to use machine learning to optimize the performance of critical business services.
Study Pemenuhan Kebutuhan Air Bersih PDAM Kota Surabaya Tahun Proyeksi (2015) ikhsan setiawan
Sistem penyediaan air bersih di kota Surabaya telah mensuplai air kepada lebih
dari 1,6 juta penduduk yang merupakan 64% dari seluruh total penduduk
yang ada di kota Surabaya. Kota Surabaya menerima sekitar 95% air bakunya
dari Kali Surabaya dan mengambil sisanya 5% dari mata air Pandaan dan
Umbulan. Kapasitas produksi yang dimiliki oleh PDAM Kota Surabaya adalah
sebesar 8,4 m/det yang terdiri dari Instalasi Ngagel dengan kapasitas 4,4
m/det, dari Instalasi Karang Pilang sebesar 3,7 m/det serta dai sumber mata
air sebesar 0,3 m/det. Adapun sistem Transmisi dan Distribusinya meliputi ±
3680 km perpipaan, yang mana diameter yang terpasang bervariasi antara 50
-1500 mm. dari keseluruhan total pipa distribusi yang terpasang, sekitar 20%
pipa tersebut berusia lebih dari 20 tahun dan 9% usianya melebihi 30 tahun.
Proyeksi kebutuhan air untuk kota Surabaya dari tahun ke tahun
menunjukkan tingkat kenaikan yang cukup besar seiring dengan
bertambahnya jumlah penduduk di kota Surabaya. Dengan adanya tingkat
kenaikan tersebut maka dapatlah dibuat suatu skenario terhadap alternatif
proyeksi pemenuhan kebutuhan air untuk penduduk kota Surabaya hingga
tahun 2015 dengan melakukan evaluasi terhadap kapasitas produksi,
kapasitas konsumsi, pengembangan sistem penyediaan air bersih yang
diharapkan pada tahun proyeksi 2015 diharapkan masih dapat terpenuhi
namun apabila hal ini tidak rencanakan mulai sekarang maka kondisi
kebutuhan air bersih pada tanun 2015 akan menjadi sangat kritis untuk itu
perlu adanya pemikiran untuk pemenuhan kebutuhan air bersih pada tahun
mendatang sehingga dapat diambil langkah langkah yang diperlukan sesuai
dengan perkembangan sosial ekonomi masyarakat kota yang
perkembangannya sangat pesat dimana kebutuhan air bersih adalah salah satu
kebutuhan yang sangat mutlak bagi kebutuhan masyarakat kota Surabaya.
Kata Kunci : Instalasi, Distribusi, Proyeksi
Oral Manifestations of Endocrinal Disorders / dental crown & bridge coursesIndian dental academy
The Indian Dental Academy is the Leader in continuing dental education , training dentists in all aspects of dentistry and
offering a wide range of dental certified courses in different formats.for more details please visit
www.indiandentalacademy.com
STKI Summit 2014 - How does CIO deliver?Pini Cohen
Trends and recommendations in Infrastructure, Operations and Development trends including modular DC, Storage, Networks, Servers, Desktops, Thin Clients, Security, Software Development, IT organization, IT Procurement and more.
How does the cio contrinute to other CxOs?Einat Shimoni
This presentations descrobes how the CIO contributes to other CxOs in application areas such as "Systems of engagement" versus "Systems of records". Web, mobile, omni-channel, digital, social, CRM, and also - ERP, CRM, HR and talent management, Knowledge management and analytics.
GraphRAG is All You need? LLM & Knowledge GraphGuy Korland
Guy Korland, CEO and Co-founder of FalkorDB, will review two articles on the integration of language models with knowledge graphs.
1. Unifying Large Language Models and Knowledge Graphs: A Roadmap.
https://arxiv.org/abs/2306.08302
2. Microsoft Research's GraphRAG paper and a review paper on various uses of knowledge graphs:
https://www.microsoft.com/en-us/research/blog/graphrag-unlocking-llm-discovery-on-narrative-private-data/
State of ICS and IoT Cyber Threat Landscape Report 2024 previewPrayukth K V
The IoT and OT threat landscape report has been prepared by the Threat Research Team at Sectrio using data from Sectrio, cyber threat intelligence farming facilities spread across over 85 cities around the world. In addition, Sectrio also runs AI-based advanced threat and payload engagement facilities that serve as sinks to attract and engage sophisticated threat actors, and newer malware including new variants and latent threats that are at an earlier stage of development.
The latest edition of the OT/ICS and IoT security Threat Landscape Report 2024 also covers:
State of global ICS asset and network exposure
Sectoral targets and attacks as well as the cost of ransom
Global APT activity, AI usage, actor and tactic profiles, and implications
Rise in volumes of AI-powered cyberattacks
Major cyber events in 2024
Malware and malicious payload trends
Cyberattack types and targets
Vulnerability exploit attempts on CVEs
Attacks on counties – USA
Expansion of bot farms – how, where, and why
In-depth analysis of the cyber threat landscape across North America, South America, Europe, APAC, and the Middle East
Why are attacks on smart factories rising?
Cyber risk predictions
Axis of attacks – Europe
Systemic attacks in the Middle East
Download the full report from here:
https://sectrio.com/resources/ot-threat-landscape-reports/sectrio-releases-ot-ics-and-iot-security-threat-landscape-report-2024/
Elevating Tactical DDD Patterns Through Object CalisthenicsDorra BARTAGUIZ
After immersing yourself in the blue book and its red counterpart, attending DDD-focused conferences, and applying tactical patterns, you're left with a crucial question: How do I ensure my design is effective? Tactical patterns within Domain-Driven Design (DDD) serve as guiding principles for creating clear and manageable domain models. However, achieving success with these patterns requires additional guidance. Interestingly, we've observed that a set of constraints initially designed for training purposes remarkably aligns with effective pattern implementation, offering a more ‘mechanical’ approach. Let's explore together how Object Calisthenics can elevate the design of your tactical DDD patterns, offering concrete help for those venturing into DDD for the first time!
Generating a custom Ruby SDK for your web service or Rails API using Smithyg2nightmarescribd
Have you ever wanted a Ruby client API to communicate with your web service? Smithy is a protocol-agnostic language for defining services and SDKs. Smithy Ruby is an implementation of Smithy that generates a Ruby SDK using a Smithy model. In this talk, we will explore Smithy and Smithy Ruby to learn how to generate custom feature-rich SDKs that can communicate with any web service, such as a Rails JSON API.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
Slack (or Teams) Automation for Bonterra Impact Management (fka Social Soluti...Jeffrey Haguewood
Sidekick Solutions uses Bonterra Impact Management (fka Social Solutions Apricot) and automation solutions to integrate data for business workflows.
We believe integration and automation are essential to user experience and the promise of efficient work through technology. Automation is the critical ingredient to realizing that full vision. We develop integration products and services for Bonterra Case Management software to support the deployment of automations for a variety of use cases.
This video focuses on the notifications, alerts, and approval requests using Slack for Bonterra Impact Management. The solutions covered in this webinar can also be deployed for Microsoft Teams.
Interested in deploying notification automations for Bonterra Impact Management? Contact us at sales@sidekicksolutionsllc.com to discuss next steps.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Neuro-symbolic is not enough, we need neuro-*semantic*Frank van Harmelen
Neuro-symbolic (NeSy) AI is on the rise. However, simply machine learning on just any symbolic structure is not sufficient to really harvest the gains of NeSy. These will only be gained when the symbolic structures have an actual semantics. I give an operational definition of semantics as “predictable inference”.
All of this illustrated with link prediction over knowledge graphs, but the argument is general.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Securing your Kubernetes cluster_ a step-by-step guide to success !KatiaHIMEUR1
Today, after several years of existence, an extremely active community and an ultra-dynamic ecosystem, Kubernetes has established itself as the de facto standard in container orchestration. Thanks to a wide range of managed services, it has never been so easy to set up a ready-to-use Kubernetes cluster.
However, this ease of use means that the subject of security in Kubernetes is often left for later, or even neglected. This exposes companies to significant risks.
In this talk, I'll show you step-by-step how to secure your Kubernetes cluster for greater peace of mind and reliability.
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
The Art of the Pitch: WordPress Relationships and Sales
infra 2015 delivery
1. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
STKI is here to serve you………
2. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
From systems of operations
to emotion-based systems
How to win the delivery game?
P
3. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
The delivery department perspective
3P
4. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
What is the “Ideal” delivery department?
I am cool
and I am
happy
4P
5. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
In many aspects: Internet companies
Source: http://highscalability.com/blog/2012/5/7/startups-are-creating-a-new-system-of-the-world-for-it.html STKI modifications
I am cool
and I am
happy
5P
6. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
Downtime, bugs are
un-acceptable
Downtime, bugs are bad
Many legacy technologies
Many business processes
New company-new technologies
Few business processes
Internet Companies
Eventually Consistant
Enterprise IT
Consistant (ACID)
However, internet companies are not enterprise IT
Conclusion – not
all new
technologies are
relevant to
Enterprise IT today
Still – try to get to
“there” are much
as possible
6P
7. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
How will the “new IT” look like?
Source: ids.snu.ac.kr/w/images/1/18/2011SS-03.ppt
Traditional IT Ideas from Internet companies
New IT?
7P
8. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
Don’t allow history to repeat itself – don’t say ‘No No No’
8P
9. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
Delivering service to end users
9P
10. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
Moving to browser based
applications
Social communication
& collaboration
WebRTC
Next generation ITSM
Steps for improve your End User service
Cloud networking
ibeacons
Mixed communication (VOIP,DATA,VIDEO)
ADC, Optimization
& automation
Browser-based Call
Center Software
10P
11. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
The Early Adopter “End User Environment” CIO:
IT
All PC applications
are html5 based
Chrome books or thin
clients running browser
can deliver all
applications
No software distribution
issues to end users. No
PC OS update issues
Some applications can
work off line
Input with natural
language and gestures
4K display
Some applications can
work off line
Top
Security
11P
12. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
The road to advanced end user delivery
End user delivery
VDI (and TS) is a viable option (not cheap, no promise for ROI)
Mid term era will have application delivered via web but some via VDITS
Users should develop all their new application via web technologies
Focus on central management, standardization
12P
13. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
Microsoft’s changing products, licensing and lifecycle policy
13P
14. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
Microsoft’s changing products, licensing and lifecycle policy
"Spartan" does not support legacy
technologies such as ActiveX and
Browser Helper Objects
Explorer will be offered side by side to
Spartan
Migration might be challenging
Office 365 is certainly delivering in
general with better end user
experience
Can (should) users resist strategic
moves by strategic (and sticky)
suppliers?
14P
15. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
IT Service Management
Traditional
ITSM
• Incident status
• SLA tracking
• Basic workflow
Advanced
ITSM
• Complex
workflows
• Knowledge base
• Email and voice
integration, chat
• Incident to
problem
automation
• Self service
(example
password reset)
Complete IT
Solution
• Change and asset
management
• IT portfolio
• CMDB
• IT service catalogue
• IT resource
management
• IT project
management and
SDLC
Enterprise
Service
management
(not just IT)
• Order repair at office
• Order supplies (pencils,
etc.)
• Automation employee
roll in and roll changes
15P
16. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
Types of Call Center Software
On-premise
call center
software
• maintenance
• Integration
• investments
Hosted call
center
software
• More cheaper
• limited options for
integration &
customization
Cloud-
based call
center
software
• Updating
application
• share resources
• quicker to deploy
• Minimal
investment
Browser-
based call
center
software
• Relies on
browser
• reliable internet
connection
• Connect
anywhere
• cost-effective
• one-click
integrations
Source:http://blog.talkdesk.com/9-top-call-center-software-trends-for-2015
16S
17. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
Quick and easy to implement,
flexible, scalable and can be
used anywhere there is
internet.
One-click integrations with
business tools like Salesforce,
Zendesk, LiveChat, Shopify
and others.
Cost-effective solutions due to:
1) multi-tenancy
2) they are managed by the service provider
3) they require no upfront investment
4) many browser-based call center software solutions
offer pay-as-you-go options.
Browser-based Call Center Software
Source: http://blog.talkdesk.com/9-top-call-center-software-trends-for-2015
17S
18. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
18S
19. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
STKI survey 2014
19S
20. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
20S
21. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
Call Center Software Trends for 2015
Business
Tools
Integrations
E-commerce
platforms, helpdesk
solutions, CRMs, Live
Chat etc.
Consolidation
and
Centralization
Data Real-time and
historical metrics
Workforce
Management
Video
Automated
tasks and multi
channel
Forecasting call
volume, scheduling
agents accordingly
Personalized
and quicker
customer
service
experience
Biometric
voice
identification
Mobile
21S
22. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
“sensors inside buildings”: iBeacon
iBeacon (A brand name marketed by Apple):
Phone is able to pick the transmissions (Bluetooth Low Energy)
work a GPS in indoor locations (high degree of accuracy)
triggering (in the phone) more than a simple ‘You are here’ signal,
it can be pretty much anything at all.
22S
23. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
Bluetooth 4.0 (BLE) Same
tech, lower power
consumption Supported
by most recent mobile
phones Designed for
health, fitness, wearables
no need for
battery -
beacons charge
using
fluctuations of
electromagnetic
field
23S
24. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
Why do we need beacons?
Big brands using beacons: Macy’s, American Eagle, Apple, Best Buy,
JCPenney, NFL, Old Navy, Target etc.
They do not upload anything to Internet
They do not download anything from Internet
They do not communicate with each other
…but they give interactions a local context.
Interaction with users is conveyed through a mobile device
(smartphone, tablet)
Beacons are mounted by default in everyday items like coffee
machines or traffic lights
Source: http://www.slideshare.net/elcukro/10-industries-that-will-be-disrupted-by-ibeacons-in-2015
Beacons cost
$1 or less
and become
further
miniaturized
24S
25. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
Wireless Trends
Carriers lose 85% of mobile data traffic to Wi-Fi by 2018
Next-generation Wi-Fi Calling
Voice-over-Wi-Fi
better user experience
Source: http://www.pipelinepub.com/2014_Telecom_Trends/WiFi_wireless/2
Voice-over-LTE continues to take off
25S
26. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
26S
27. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
All 12 stadiums together will have a little
more than of 3,700 cell stations for voice and
data.
75,000 fans in the stands to make up to
515,000 voice calls and 48,000 Internet
connections simultaneously within any hour
period.
27S
28. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
28S
29. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
Which CIO type are you? Your winning hand for End User service is…
Conservative CIO
Mixed
communication
(VOIP,DATA,VIDEO)
IPV6 and ADC
Output management
systems
RFID- biometric
Advanced ITSM (KM,
Chat, ..)
VDI and TS
Modern CIO
Cloud based call
center
Unified
communication as
a service
Ibeacons
webRTC
Most apps in WEB
Early adopter CIO
Social networks with
wireless
Browser-based Call
Center Software
Social communication
& collaboration
Cloud networking
All delivery via Web
and new devices
(ChromePC)
29P
30. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
Devops
Chargeback
New sourcing models
Steps for Cloud
Hybrid cloud
Join the System, Network
DC and Storage forces
Infrastructure as Code
Public cloud for
specific projects
30P
31. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
Cloud Ready Architecture
There is not ‘private
cloud’ just
‘cloud ready architecture’
Cloud Ready example (in production):
• Automate environment construction including server, storage, network, dbms, middleware
• Self service portal for building environments.
• Moving environments from dev to test to prod automatically
Next near steps:
• Elasticity (at the environment level)
• Automatic procedure (restart environment each day at 24:00 because of memory leak)
• Devops = application deployment
• Next advanced steps: Hybrid clouds (private to public)
• APaaS is part of cloud initiative
Achieving:
• Standard environments. No human errors.
• Faster delivery cycle (from days to minutes)
• Chargebackshow back option
• Better capacity planning
31P
32. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
Cloud ready architecture solutions
• As Vmware dominates the IT enterprise vRealize automation will be a dominate cloud ready
architecture choice
• Legacy cloudautomation tools are also valid tactical option
• Openstack based solution has strategic advantage. Openstack API’s are already de facto standard.
32P
33. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
Public cloud for Modern CIO
• Building and maintaining private DC is not relevant anymore
• The co-location services market is booming : Bynet, Bezeqint, Veola, IBM, HP,
Med1, CCC, MalamTeam, Adgar and more are expanding and investing and
partnering for various cloud capabilities
• Hosted clients with burst out at their co-location provider
• Later, on premise clients will burst out to local cloud providers
Cloud
Architecture
local court jurisdiction
33P
34. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
Cloud migration principals
Cloud
migration
Elasticity is the main
factor not cost
“killing app”
technology not
available on premise
Look for brand new
projects
Encryption in public
cloud has many
options but requires
application
modification
Migrate existing project
only if it failed (not
delivering or delivering
with much too high
cost)
34P
35. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
Tools & Technologies to secure cloud services
• Encryption gateways
• Governance and compliance
• Identity gateway
SaaS
• Database monitoring and
encryption
• Dynamic and static analysis tools
PaaS
• Governance & compliance
• Encryption
• Multi cloud management
IaaS
Source:MosheFerber,CloudSecurityAllianceIsrael
34
AWS architecture options for key management:
• Server side encryption
• Key management service - KMS
• CloudHSM
• Server side encryption with Client Keys
P
36. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
Your DMZ is perfect for
public cloud
Extend your current
ESBETL for cloud
integration
DRaaS and
secondthird
copy of backup
Use service virtualization
CALisa, IBMGreenhat Public cloud
Try to utilize PaaS or MBaaS
Public cloud migration use cases and tips (order is not so important)
Testing, Development, Training
36P
37. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
Public cloud for the early adaptor CIO
Large percentage of
delivery is done via
“locked free” public
clouds
Regulation “can handle”
global clouds
Top cloud functionality
AWS Lambda – run your code in
response to events
Google Firebase – store and sync
data across multiple clients
Bare metal provisioned servers
Efficiency and portability in
Linux (cloud & on premise)
37P
38. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
Cloud service broker
•New (update) resource is needed (VM, Storage,
complete application provisioning)
•Many options around:
•Cloud service broker selects the option according to:
• Policy (ex. Production services for system of records with
sensitive data will be deployed internally)
• Price
• Availability of service and possible scale out needs
• Technical (latency, etc.)
• Relation to other services status
• Etc.
Cloud
architecture
environment 1
Cloud
architecture
environment 2
38P
39. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
Public cloud
•Wait!!
•Public cloud is not just ‘neat technology’ it’s a Sourcing
model
Source: http://www.robinhasanidea.com/2013/03/interpreting-fiction-step-1.html
39P
40. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
Sourcing models evolution
Traditional
Outsourcing
• Same people
different employer
Hosting
• Data Center
Collocation
• Managed and
Unmanaged
Hosting
IaaS/ PaaS
• People,
infrastructure,
development
platform
SaaS
• People,
infrastructure
development
platform,
application
BPaaS
• People,
infrastructure,
development
platform,
application,
process,
service -
everything
40G
Collocate
Build
Consume
Integrate
People
41. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
Cloud is a New Form of Outsourcing
•In many cases, the failure of traditional outsourcing was inflexibility and stagnation
•Long term fixed contract are simply not fit well to the 21st century needs
•Cloud is, for many intents and purposes, virtual outsourcing
•Many outsourcing providers (TCS, IBM, HP, etc.) now offer strong cloud offerings
IT factory
Computing
capacity
utility model
Traditional
outsourcing model
41G
42. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
Cloud Computing models evolvement: 3 types of CIOs
Business
customers
Conservative
IT
Cloud ready
architecture
Modern
IT
Early adaptor
IT
Moving into
Public Cloud
XaaS
• Elasticity
• Automatic procedures
• Devops = application
deployment
• IT Chargeback
• Automated, standard environment.
• Self service portal
• Faster delivery cycle (days to min)
• IT service catalog
• Better capacity planning
• In/ external service catalog
• Fully automated service
delivery. Utility model
• Cloud Platform Services - Plan,
Optimization
Hybrid IT
Usage of cloud brokerage
42G
43. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
Need to embrace different models of workforce
Business
customers
Conservative
IT
Cloud ready
architecture
Modern
IT
Early adaptor
IT
Moving into
Public Cloud
XaaS
Hybrid IT
Private to public
• Mostly internal workforce
• Prof. services
• High percent of
permatemps
Workforce models mix:
• Talent core workforce
• Temporary workers
• Managed services –
better adjustment to
cloud-based delivery
Moving into different
sourcing models:
• X-shore / X-site
• Managed services
• Prof. services
43 G
44. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
Which CIO type are you? Your winning hand for Cloud adoption…
Conservative CIO
Cloud Ready
architecture
Scale out to local
public providers
Migrate DMZ apps to
public cloud
(preferably to PaaS)
Modern CIO
Utilize new sourcing
models ‘cloud like’
Build new
applications in
cloud
Early adopter CIO
Hybrid cloud
Multi cloud
Utilize modern
cloud functionality
44P
45. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
Join the System, Network DC
and Storage forces
Utilize Modular DC
Software
defined storage
and networks
DC based on commodity HW
New DC
technology
SSD as general storage
The road to new Data Center technology
Converged Infrastructure
45P
46. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
Modular DC
• Many modular DC options (ISO vs, none-ISO, movable, etc.
• Time to market and better PUE main perceived advantages
• Example – 40 feet long modular DC (about 15 square meters) for 15 racks delivered in 6 months for
about 500K$
• First projects in Israel
46P
47. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
Lets talk about HW
Electronic manufacturing services (EMS) design, test, manufacture, distribute, and
provide return/repair services. EMS typically avoid ownership of IP (Intellectual Property).
Original design manufacturer (ODM) designs and manufactures a product as specified
and eventually rebranded by another firm for sale. ODM often retain some degree of IP
ownership of the products they design
Source:Wikipedia,https://www.ventureoutsource.com/contract-manufacturing/question/whats-the-difference-between-ems-and-odm/STKImodifications
Source: https://www.ventureoutsource.com/contract-manufacturing/top-10-ems-odm-reviews-ratings/
47P
48. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
•94% of global laptop computers are assembled by Taiwanese vendors, mostly
ODMs instead of OEMs.
•Majority of vendors just define the product positioning, rather than design.
•ODMs assume not only design and production but component procurement.
Source:http://www.prnewswire.com/news-releases/global-and-china-laptop-and-tablet-pc-industry-report-2011-2012-152524185.html
Laptops computers as example of HW market
48P
49. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
The big HW buyers: cloud providers
•In the big public clouds (Google, Amazon, Microsoft, etc.) HW is :
• Cheap because of scale
• Cheap because its “No name” or specific manufactured
• Cheap because SW automatically fail-over in case of HW failure. HW reliability is less
important issue.
• No need to repair HW (replace instead of fix)
• So – buying the HW with no warrantyservice
•This makes HW even cheaper!!
•As IT implements cloud ready and microservices architecture (auto. failover) and
ODM ecosystem matures (service for ‘no name HW’) White Boxes HW will become
the standard HW.
49P
50. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
Emerging option: converged infrastructure:
50P
51. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
About converged infrastructure
With ODM’s the traditional HW manufactures are forced
into converged infrastructure
The ‘traditional converged’ (sometime called ‘monolithic) vs.
‘hyper-converged debate
Converged infrastructure already provide value to customers for
specific projects (ex. VDI) especially time to market
One size does not fit all (example: if you want to grow only in storage) so clients
do not consider currently converged infrastructure as general DC environment
In long run converged infrastructure will grow until it will be
merged with SDDC (software based on standard HW)
51P
52. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
S
53. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
Packet-Forwarding
Hardware
Openflow Firmware
Packet-Forwarding
Hardware
Openflow Firmware
Packet-Forwarding
Hardware
Openflow Firmware
Packet-Forwarding
Hardware
Openflow Firmware
Network Operating System –SDN Controller
Open Interface
to Hardware
Open API
Software-Defined Network- The new paradigm
Microsoft ERP SAP CRM
“If header = x, send to port 4”
53S
54. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
ACI vs. NSX
SDN
solution
NFV
solution
In the battle between Cisco and VMware Inc., user support will be divided
between two SDN camps -- networking and systems engineers.
54S
55. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
Software-Defined Networking Will Take Off in 2015
Grow from $960 million in 2014 to more than $8 billion by 2018, globally.
CIOs require a network that reliably
delivers, video communications, as
well as productivity and sales
applications to any device
Computing tasks can be switched
automatically to working routers or
virtual machines when others fail.
Analytics. CIOs will use analytics to
create operational efficiencies,
identify new revenue streams and
augment product development
Internet of Things comes into
sharper focus. CIOs have moved
slowly to work with IoT their comfort
level with it will increase as standards
coalesce.
Source:http://blogs.wsj.com/cio/2014/11/18/software-defined-
networking-will-take-off-in-2015-verizon-enterprise-cio/
55S
56. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
SDN can IMPROVE your network security
56Source: http://demo.ipspace.net/get/OpenFlow%20Functions.pdf; https://indico.cern.ch/event/294923/contribution/0/material/slides/0.pdf
Increased business
continuity and
constant
availability of data,
with a variety of
industry standards
(HIPPA, PCI - DSS).
Monitor &
update networks,
applications, and
devices from
once convenient
location.
SDN brings agility
and automation to
the network and
enables you to be
proactive in
responding to your
network threats
DDOS
SDN provides
and maintains
the equipment
to police cyber
traffic and guard
access to a
client’s
information.
S
57. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
DELL Open networking switches Now run Big Switch’s SDN fabric software
•Enabled an ecosystem of software solutions to run on open network hardware.
•Big Switch led SDN-powered fabric software development on an ecosystem of open
networking hardware.
•Open Network Installation Environment (ONIE) standard for automatic booting via
the network,
versatility
Agility
lowering the
cost
best of breed
Innovation
Source: http://www.bigswitch.com/blog/2014/11/12/dell-open-networking-switches-now-run-big-switchs-sdn-fabric-software
57S
58. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
Dell Expands Open Networking Initiative
58S
59. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
How can I strategically select between Cisco’s ACI vs. VMware's NSX?
When considering ACI and NSX always remember Openflow the open source SDN leader.
When (if) Openflow matures and spread both ACI and NSX will follow.
When your strategic supplier offers you his next generation technology, is it a strategic
decision?
No! You will do it anyway (as long as you stay with your strategic supplier and as long as the
supplier looks at this technology strategically)
This means:
If you will stay with VMWARE you will have NSX
If you will stay with CISCO you will have ACI
Recommendation:
• If you have specific need – test it. SDN
are not mature for all scenarios.
• Otherwise –wait for the market to
decide
• Defence, High-tech, Finance should
experiment Openflow
• Internal politics is key issue 59P
60. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
Storage evolution
Traditional
• Using SSD’s and
all flash array as
standard storage
• Buying SLA and
not storage
components
Conservative
• Considering
active-active
solutions and
storage
virtualization HW
• Using converged
or hyper-
converged
solutions
Modern
• Using SW storage
appliances on
dedicated HW
providing
replications, snaps,
backup etc.
• Considering all
data copies (prod,
drp, snaps, test,
dev, backup,
archive) as a whole
Early Adaptor
• No central storage! No
dedicated storage HW
• Just servers with SSD
• With SW storage part of
cloud architecture (no
dedicated HW for
storage)
• Using cloud storage for
backup and primary
• In general object storage
is preferred
60P
61. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
Opensource in delivery
• Open source (mainly community but also commercial) is de
facto standard in Internet companies and maturing fast in
enterprise IT as well:
• RDBMS
• NoSQL
• ESB
• WCM
• ETL
• ESM (enterprise system management)
• Microsoft has opensourced parts of .NET
61P
62. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
How to deal with HW - Infrastructure as code
It’s Code but not as we know it!
IT is another perspective to look at DevOps!!
Srouce:http://www.slideshare.net/jedi4ever/code-but-not-as-we-know-it-infrastructure-as-code
62P
63. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
Be the automator – not the automated
› Automation architect
› Business relationship mgr
› Service engineer
› Workflow/process experts
› Customer advocates
› Focus on services
Sustainers Innovators
› Systems administrator
› Network administrator
› Storage administrator
› Database administrator
› ITIL & tech zealots
› Focus on silo technologies
Source: Glenn O'donnell , Forrester 64P
64. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
SRAM
DRAM
• Flash
• Hard disk
On-chip
cache
Main
memory
Mass
storage
Speed
Costperbit
Universal memory obsoletes this hierarchy
Capacity
Emerging new radical HW technology - The Machine - HP
64P
65. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
Summary of Memristor attributes
• Memristor memory chip
• Nearly as fast as DRAM
• Lower power
• MUCH higher density
• Significantly cheaper/bit
• Nonvolatile
65P
66. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
HP the Machine
Memory = RAM DISKCPU Memory = MemistorCPU
The Machine requires new OS, new compilers etc.
66P
67. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
Which CIO type are you? Your winning hand for HW is…
Conservative CIO
Converged
infrastructure for
specific projects (ex.
VDI)
Use SDN for specific
need – vendor based
SSD for standard
storage
Active Active storage
solution if needed
Modern CIO
Converged for
mainstream DC
usage
SDN for broader
usage possibly with
Openflow
Openstack broader
usage
DevOps =
infrastructure as
code
Early adopter CIO
Just ‘no name hw’ for
all purposes =SDDC =
all automated
Mainly servers with SSD
Replace when break
Complete SW stack for
OS virtualization
network storage based
on Openstack
67P
68. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
Final word – join the System Storage and Network DC forces
Source: http://www.jta.org/2011/11/20/news-opinion/united-states/twinning-project-brings-muslims-and-jews-together
68P
69. Sigal Russin's, Galit Fein's & Pini Cohen's work Copyright@2015
Do not remove source or attribution from any slide, graph or portion of graph
69
Sigal Russin
Sigalr@stki.info
Galit Fein
Galit@stki.info
Pini Cohen
Pini@stki.info