This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»
IT TransformationIT Transformation
Gianluca Magalotti
Business Developer Soluzioni Open Source
17 Febbraio 2015
@@AniaclugAniaclug
This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»
Il Gruppo
Il Gruppo Itway Spa
Con un fatturato complessivo di oltre 100 milioni di euro, il Gruppo 
Itway Spa è una realtà di riferimento in Italia e in Europa nella 
distribuzione di prodotti per l'e­business e la realizzazione di 
soluzioni attraverso una rete significativa di Business Technology 
Partners. 
Itway  Spa  è  un  Gruppo  di  aziende  con  un'offerta  completa  di 
soluzioni per l'e­business costituite dall'integrazione di applicazioni 
software,  hardware,  servizi  e  consulenza  che  consentono  di 
risolvere tutte le problematiche legate alle nuove tecnologie.
This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»
Agenda
●
La trasformazione IT
●
L'IT Bimodale: varie interpretazioni 
●
IaaS dall'hosting al cloud passando per la virtualizzazione
●
PaaS: Aesso guidano gli sviluppi
●
I Containers
●
Da architetture monolitiche a  microservizi
●
Governance e processi: DevOps, il ciclo di vita unificato
●
La proposizione Red Hat
This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»
La Trasformazione IT
This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»
La Trasformazione IT
Infrastructure As a Service
Platform As a Service
Database As a Service
Software As a Service
This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»
La Trasformazione IT
Digital Transformation
Mobile (IoT) Era
Infrastructure As a Service
Platform As a Service
Database As a Service
Software As a Service
Big Data
IT Bimodale
This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»
La Trasformazione IT
Software­Defined
Everything
Digital Transformation
Mobile (IoT) Era
Infrastructure As a Service
Platform As a Service
Database As a Service
Software As a Service
Big Data
IT Bimodale
This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»
IT Bimodale
Industrializzazione IT
MODO 1
Industrializzazione IT
MODO 1
Digitalizzazione
MODO 2
Digitalizzazione
MODO 2
AffidabilitàAffidabilità
Prezzo per PerformancePrezzo per Performance
Waterfall/IterativoWaterfall/Iterativo
Pianificato, per approvazionePianificato, per approvazione
Con Fornitori, Accordi quadroCon Fornitori, Accordi quadro
Processi consolidati, ProgettiProcessi consolidati, Progetti
IT CentricaIT Centrica
Lunghe (mesi)Lunghe (mesi)
AgilitàAgilità
Revenue, Brand,
Esperienza Cliente
Revenue, Brand,
Esperienza Cliente
AgileAgile
Empirico, ContinuoEmpirico, Continuo
Pochi fornitori, nuovi vendor 
e contratti brevi
Pochi fornitori, nuovi vendor 
e contratti brevi
Proni alle novità
e all'incertezza
Proni alle novità
e all'incertezza
B­Centrica, vicina al clienteB­Centrica, vicina al cliente
Brevi (giorni, settimane)Brevi (giorni, settimane)
Obiettivo
Valore
Approccio
Governo
Modello di produzione
Caratteristiche
Visione
Iterazioni
This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»
IT Bimodale ­ Dal Modo 1 al Modo 2
This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»
IT Bimodale ­ Dal Modo 1 al Modo 2
This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»
IT Bimodale ­ Dal Modo 1 al Modo 2
Rilasciato da Operatori
MODO 1
Pensato per l'efficienza
This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»
IT Bimodale ­ Dal Modo 1 al Modo 2
Rilasciato da Operatori
MODO 1
Pensato per l'efficienza
2­4 Rilasci 
per anno
This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»
IT Bimodale ­ Dal Modo 1 al Modo 2
Rilasciato da Operatori
MODO 1
Pensato per l'efficienza
Rilasciato da Sviluppatori
MODO 2
Pensato per essere agile
2­4 Rilasci 
per anno
This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»
IT Bimodale ­ Dal Modo 1 al Modo 2
Rilasciato da Operatori
MODO 1
Pensato per l'efficienza
Rilasciato da Sviluppatori
MODO 2
Pensato per essere agile
2­4 Rilasci 
per anno
3000 Rilasci 
per anno
This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»
IT Bimodale ­ Dal Modo 1 al Modo 2
Rilasciato da Operatori
MODO 1
Pensato per l'efficienza
Rilasciato da Sviluppatori
MODO 2
Pensato per essere agile
2­4 Rilasci 
per anno
3000 Rilasci 
per anno
HW Vincola
SD­Templates
Processo Vincola
Molto automatizzato
Il Ciclo Vincola
Elevata astrazione
Dev vincola
This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»
IaaS: Dalla virtualizzazione al Cloud
This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»
IaaS: Dalla virtualizzazione al Cloud
●
On­demand self­service
Un consumer può indipendentemente e unilateralmente attribuirsi capacità di calcolo, quali tempo di CPU, 
networking, storage, secondo i suoi bisogni, automaticamente senza interazione alcuna.
This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»
IaaS: Dalla virtualizzazione al Cloud
●
On­demand self­service
Un consumer può indipendentemente e unilateralmente attribuirsi capacità di calcolo, quali tempo di CPU, 
networking, storage, secondo i suoi bisogni, automaticamente senza interazione alcuna.
●
Ampio accesso alla rete
Le risorse sono disponibili in rete e accedute mediante meccanismi standard che promuovono l'utilizzo di 
piattaforme client eterogenee (leggere o pesanti).
This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»
IaaS: Dalla virtualizzazione al Cloud
●
On­demand self­service
Un consumer può indipendentemente e unilateralmente attribuirsi capacità di calcolo, quali tempo di CPU, 
networking, storage, secondo i suoi bisogni, automaticamente senza interazione alcuna.
●
Ampio accesso alla rete
Le risorse sono disponibili in rete e accedute mediante meccanismi standard che promuovono l'utilizzo di 
piattaforme client eterogenee (leggere o pesanti).
●
Resource pooling
Le risorse  sono gestite in pool per servire più consumer in un modello multi­tenant. Le risorse sia fisiche che virtuali 
sono assegnate dinamicamente e riassegnate secondo la richiesta dei consumer.
This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»
IaaS: Dalla virtualizzazione al Cloud
●
On­demand self­service
Un consumer può indipendentemente e unilateralmente attribuirsi capacità di calcolo, quali tempo di CPU, 
networking, storage, secondo i suoi bisogni, automaticamente senza interazione alcuna.
●
Ampio accesso alla rete
Le risorse sono disponibili in rete e accedute mediante meccanismi standard che promuovono l'utilizzo di 
piattaforme client eterogenee (leggere o pesanti).
●
Resource pooling
Le risorse  sono gestite in pool per servire più consumer in un modello multi­tenant. Le risorse sia fisiche che virtuali 
sono assegnate dinamicamente e riassegnate secondo la richiesta dei consumer.
●
Location Independence
il client, di solito, non ha controllo o conoscenza rispetto a dove è localizzata la risorsa, tra i parametri della 
richiesta ci potrebbe essere un concetto di location (ad un livello di astrazione più elevato). Es. storage, calcolo, 
memoria, banda, ecc...
This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»
IaaS: Dalla virtualizzazione al Cloud
●
On­demand self­service
Un consumer può indipendentemente e unilateralmente attribuirsi capacità di calcolo, quali tempo di CPU, 
networking, storage, secondo i suoi bisogni, automaticamente senza interazione alcuna.
●
Ampio accesso alla rete
Le risorse sono disponibili in rete e accedute mediante meccanismi standard che promuovono l'utilizzo di 
piattaforme client eterogenee (leggere o pesanti).
●
Resource pooling
Le risorse  sono gestite in pool per servire più consumer in un modello multi­tenant. Le risorse sia fisiche che virtuali 
sono assegnate dinamicamente e riassegnate secondo la richiesta dei consumer.
●
Location Independence
il client, di solito, non ha controllo o conoscenza rispetto a dove è localizzata la risorsa, tra i parametri della 
richiesta ci potrebbe essere un concetto di location (ad un livello di astrazione più elevato). Es. storage, calcolo, 
memoria, banda, ecc...
●
Elasticità
Le risorse possono essere fornite rapidamente e in modo elastico, automaticamente per un rapido scale­out e 
scale­in quando non servono più. Le risorse appaiono illimitate e acquistabili in qualsiasi quantità in ogni 
momento.
This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»
IaaS: Dalla virtualizzazione al Cloud
●
On­demand self­service
Un consumer può indipendentemente e unilateralmente attribuirsi capacità di calcolo, quali tempo di CPU, 
networking, storage, secondo i suoi bisogni, automaticamente senza interazione alcuna.
●
Ampio accesso alla rete
Le risorse sono disponibili in rete e accedute mediante meccanismi standard che promuovono l'utilizzo di 
piattaforme client eterogenee (leggere o pesanti).
●
Resource pooling
Le risorse  sono gestite in pool per servire più consumer in un modello multi­tenant. Le risorse sia fisiche che virtuali 
sono assegnate dinamicamente e riassegnate secondo la richiesta dei consumer.
●
Location Independence
il client, di solito, non ha controllo o conoscenza rispetto a dove è localizzata la risorsa, tra i parametri della 
richiesta ci potrebbe essere un concetto di location (ad un livello di astrazione più elevato). Es. storage, calcolo, 
memoria, banda, ecc...
●
Elasticità
Le risorse possono essere fornite rapidamente e in modo elastico, automaticamente per un rapido scale­out e 
scale­in quando non servono più. Le risorse appaiono illimitate e acquistabili in qualsiasi quantità in ogni 
momento.
●
Metriche sui servizi
I Sistemi Cloud controllano ed ottimizzzano l'uso delle risorse tramite metriche appropriate per il tipo di servizio 
gestito (storage, calcolo, banda, numero utenti attivi, ecc...). L'utilizzo delle risorse può essere monitorato, 
controllato, e inserito in report.
This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»
PaaS: Adesso guidano gli sviluppi
●
Strumenti
Il Provider fornisce tutti i linguaggi di programmazione, gli strumenti di sviluppo, i database, i framework 
(Application server, BPM, orchestratori, ecc...)
●
Amministrazione e Ambienti
Il provider mette a disposizione I servizi di amministrazione e gli ambienti di deploy
●
Cicli di vita, Continuous Integration
Il Provider fornisce anche strumenti di gestione del ciclo di vita e di autorizzazione, in alcuni casi offre 
piattaforme di continuous integration
●
Infrastruttura
Il Provider gestisce e controlla l'infrastruttura, compresa la rete, la banda, i server i sistemi operativi e lo 
storage
●
Controllo applicativo, architetture, configurazione
L'utilizzatore ha completo controllo nei confronti dei rilasci degli applicativi, delle architetture e la 
configurazione applicativa e dell'ambiente di hosting
●
Scaling e gestione risorse
La piattaforma offre anche servizi di scale­out e scale­up a livello di infrastruttura applicativa e di prossimità 
delle risorse, in analogia a quanto descritto per la IaaS.
●
Awareness
Gli applicativi (e chi li sviluppa) sono consci di utilizzare una tale piattaforma, soprattutto nella gestione degli 
accessi (richieste) alle risorse
This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»
I Containers
●
Virtuozzo/LXC
Un container è un virtual server, con il proprio init e glibc, e uno stack completo di applicativi. Cgroups sono 
utilizzati per limitare l'uso di risorse critiche quali cpu e memoria. Questo tipo di containers hanno un basso 
overhead confrontati al classico Hypervisor+VM, pur rimanendo consistente.
●
Docker
In docker, un container è un applicativo (o un gruppo di). Tramite un approccio a layers intelligente per i 
filesystem, è in grado di raggiungere elevate densità quando vengono eseguite copie multiple del singolo 
applicativo, se confrontate con quanto accade ai container di tipo VZ/LXC. Semplice da mantenere e 
securizzare.
●
LVE
Lightweight Virtual Environments, è usat per ottenere l'isolamento delle rsorse in contesti multi­tenant. Utilizza 
sempre cgroups a livello di kernel, ma “containerizzando” la singola applicazione che viene eseguita sul server 
(MySql, Apache, ecc...). Viene utilizzato negli ambienti hosting condivisi con migliaia di utenti su singolo server. 
Ciascuno con il proprio WS e DB (ma in realtà offerti da singole istanze dei servizi sul server).
This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»
I Containers
HOST OS
SERVER
Container
LIBS
APP
I Containers rappresentano un modo di pacchettizzare il software in cui, oltre 
all'applicazione, sono inserite tutte le sue dipendenze di runtime 
Punti di forza:
●
Facilità di deploy e di portabilità
●
Elevato isolamento
●
Footprint contenuto e rapidità di avvio
In Linux, questo avviene tramite l'uso di:
●
Control Groups (process­grouping)
●
kernel namespaces (isolamento/Partizionamento)
●
SELinux, sVirt (Sicurezza)
●
Docker (movimentazione e versioning)
This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»
Da architetture monolitiche a microservizi
This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»
Kubernetes
This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»
Kubernetes
This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»
Kubernetes
This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»
Kubernetes
This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»
Kubernetes
This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»
Kubernetes
This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»
Kubernetes
This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»
Kubernetes
This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»
Ricapitoliamo
This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»
Ricapitoliamo
●
Un IT Bimodale (Componenti Industrializzate vs Componenti Effimere)
This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»
Ricapitoliamo
●
Un IT Bimodale (Componenti Industrializzate vs Componenti Effimere)
●
Una infrastruttura Ibrida (In parte sui propri DC, in parte sul Cloud)
This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»
Ricapitoliamo
●
Un IT Bimodale (Componenti Industrializzate vs Componenti Effimere)
●
Una infrastruttura Ibrida (In parte sui propri DC, in parte sul Cloud)
●
Infrastrutture e Piattaforme  a “capacità infinita” e multi­tenant
This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»
Ricapitoliamo
●
Un IT Bimodale (Componenti Industrializzate vs Componenti Effimere)
●
Una infrastruttura Ibrida (In parte sui propri DC, in parte sul Cloud)
●
Infrastrutture e Piattaforme  a “capacità infinita” e multi­tenant
●
Riduzione dell'impronta di ciascun servizio e aumento della cardinalità
This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»
Ricapitoliamo
●
Un IT Bimodale (Componenti Industrializzate vs Componenti Effimere)
●
Una infrastruttura Ibrida (In parte sui propri DC, in parte sul Cloud)
●
Infrastrutture e Piattaforme  a “capacità infinita” e multi­tenant
●
Riduzione dell'impronta di ciascun servizio e aumento della cardinalità
This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»
Ricapitoliamo
●
Un IT Bimodale (Componenti Industrializzate vs Componenti Effimere)
●
Una infrastruttura Ibrida (In parte sui propri DC, in parte sul Cloud)
●
Infrastrutture e Piattaforme  a “capacità infinita” e multi­tenant
●
Riduzione dell'impronta di ciascun servizio e aumento della cardinalità
●
Numerosità di (micro­)servizi, con ordini di grandezza di migliaia di istanze
●
Necessità di una gestione agile e con vita breve (Sviluppo)
●
Necessità di standardizzazione e governo (Operations)
●
Aumento del numero di nodi gestiti per singolo operatore
This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»
DevOps – Ciclo di vita integrato 
IDEA
PRODUCT
FEATURE
SELF
PROVISIONING
ENVIRONMENT
STANDARDIZATION
AUTO
SCALING
CENTERALIZED
OPS MANAGEMENT
DEV QA UAT PROD
IDE
CONFIGURATION
MANAGEMENT
CONTINUOUS
INTEGRATION
MONITORING
Tempo di ciclo
PRODUCT
MANAGER
DEVELOPERS TEST
ENGINEERS
OPERATIONS
PERSONNEL
CONTINUOUS DELIVERY
DEV QA UAT
This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»
DevOps – Ciclo di vita integrato 
This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»
La Proposizione Red Hat
This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»
Dove andiamo
This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»
Dove andiamo
Da Hardware fisico a virtuale
Da Rete fisica a rete virtuale
Da Storage Fisico a software
IaaS/PaaS
This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»
Dove andiamo
Da Hardware fisico a virtuale
Da Rete fisica a rete virtuale
Da Storage Fisico a software
IaaS/PaaS
 Software Defined Host/Storage
 Software Defined Network
Software Defined Storage
Software defined 
platform/Infrastructure
This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»
Dove andiamo
Da Hardware fisico a virtuale
Da Rete fisica a rete virtuale
Da Storage Fisico a software
IaaS/PaaS
 Software Defined Host/Storage
 Software Defined Network
Software Defined Storage
Software defined 
platform/Infrastructure
Software­Defined Everything
This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»
Dove andiamo
Da Hardware fisico a virtuale
Da Rete fisica a rete virtuale
Da Storage Fisico a software
IaaS/PaaS
 Software Defined Host/Storage
 Software Defined Network
Software Defined Storage
Software defined 
platform/Infrastructure
Software­Defined Everything
Quindi...
This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»
Dove Andiamo
Da System Manager a Developer?
This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»
Dove Andiamo
Da System Manager a Developer?Da System Manager a Developer?
This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»
Dove Andiamo
Da System Manager a Developer?
Oppure...
Da System Manager a Developer?
This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»
Dove Andiamo
Da System Manager a Developer?
Grazie!
gianluca.magalotti@business­e.it
Grazie!
gianluca.magalotti@business­e.it
Oppure...
Da System Manager a Developer?
This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»
An Itway Group Company
Italy - France - Spain - Portugal - Greece – Turkey - UAE
Ravenna, Milano, Roma, Massa, Bari, Napoli, Trento
Paris, Barcelona, Madrid, Lisboa, Athina, Istanbul, Ankara
Associate Company: Libanica SA (Lebanon, Quatar, UAE)
Beirut, Doha, Dubai
Via L.Braille, 15 - 48010 Ravenna - Italy
Tel. +39 0544.288711 - Fax +39 0544.463481
info@business-e.it
www.business-e.it

IT Transformation

  • 1.
    This document isproperty of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential» IT TransformationIT Transformation Gianluca Magalotti Business Developer Soluzioni Open Source 17 Febbraio 2015 @@AniaclugAniaclug
  • 2.
    This document isproperty of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential» Il Gruppo Il Gruppo Itway Spa Con un fatturato complessivo di oltre 100 milioni di euro, il Gruppo  Itway Spa è una realtà di riferimento in Italia e in Europa nella  distribuzione di prodotti per l'e­business e la realizzazione di  soluzioni attraverso una rete significativa di Business Technology  Partners.  Itway  Spa  è  un  Gruppo  di  aziende  con  un'offerta  completa  di  soluzioni per l'e­business costituite dall'integrazione di applicazioni  software,  hardware,  servizi  e  consulenza  che  consentono  di  risolvere tutte le problematiche legate alle nuove tecnologie.
  • 3.
    This document isproperty of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential» Agenda ● La trasformazione IT ● L'IT Bimodale: varie interpretazioni  ● IaaS dall'hosting al cloud passando per la virtualizzazione ● PaaS: Aesso guidano gli sviluppi ● I Containers ● Da architetture monolitiche a  microservizi ● Governance e processi: DevOps, il ciclo di vita unificato ● La proposizione Red Hat
  • 4.
    This document isproperty of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential» La Trasformazione IT
  • 5.
    This document isproperty of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential» La Trasformazione IT Infrastructure As a Service Platform As a Service Database As a Service Software As a Service
  • 6.
    This document isproperty of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential» La Trasformazione IT Digital Transformation Mobile (IoT) Era Infrastructure As a Service Platform As a Service Database As a Service Software As a Service Big Data IT Bimodale
  • 7.
    This document isproperty of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential» La Trasformazione IT Software­Defined Everything Digital Transformation Mobile (IoT) Era Infrastructure As a Service Platform As a Service Database As a Service Software As a Service Big Data IT Bimodale
  • 8.
    This document isproperty of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential» IT Bimodale Industrializzazione IT MODO 1 Industrializzazione IT MODO 1 Digitalizzazione MODO 2 Digitalizzazione MODO 2 AffidabilitàAffidabilità Prezzo per PerformancePrezzo per Performance Waterfall/IterativoWaterfall/Iterativo Pianificato, per approvazionePianificato, per approvazione Con Fornitori, Accordi quadroCon Fornitori, Accordi quadro Processi consolidati, ProgettiProcessi consolidati, Progetti IT CentricaIT Centrica Lunghe (mesi)Lunghe (mesi) AgilitàAgilità Revenue, Brand, Esperienza Cliente Revenue, Brand, Esperienza Cliente AgileAgile Empirico, ContinuoEmpirico, Continuo Pochi fornitori, nuovi vendor  e contratti brevi Pochi fornitori, nuovi vendor  e contratti brevi Proni alle novità e all'incertezza Proni alle novità e all'incertezza B­Centrica, vicina al clienteB­Centrica, vicina al cliente Brevi (giorni, settimane)Brevi (giorni, settimane) Obiettivo Valore Approccio Governo Modello di produzione Caratteristiche Visione Iterazioni
  • 9.
    This document isproperty of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential» IT Bimodale ­ Dal Modo 1 al Modo 2
  • 10.
    This document isproperty of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential» IT Bimodale ­ Dal Modo 1 al Modo 2
  • 11.
    This document isproperty of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential» IT Bimodale ­ Dal Modo 1 al Modo 2 Rilasciato da Operatori MODO 1 Pensato per l'efficienza
  • 12.
    This document isproperty of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential» IT Bimodale ­ Dal Modo 1 al Modo 2 Rilasciato da Operatori MODO 1 Pensato per l'efficienza 2­4 Rilasci  per anno
  • 13.
    This document isproperty of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential» IT Bimodale ­ Dal Modo 1 al Modo 2 Rilasciato da Operatori MODO 1 Pensato per l'efficienza Rilasciato da Sviluppatori MODO 2 Pensato per essere agile 2­4 Rilasci  per anno
  • 14.
    This document isproperty of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential» IT Bimodale ­ Dal Modo 1 al Modo 2 Rilasciato da Operatori MODO 1 Pensato per l'efficienza Rilasciato da Sviluppatori MODO 2 Pensato per essere agile 2­4 Rilasci  per anno 3000 Rilasci  per anno
  • 15.
    This document isproperty of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential» IT Bimodale ­ Dal Modo 1 al Modo 2 Rilasciato da Operatori MODO 1 Pensato per l'efficienza Rilasciato da Sviluppatori MODO 2 Pensato per essere agile 2­4 Rilasci  per anno 3000 Rilasci  per anno HW Vincola SD­Templates Processo Vincola Molto automatizzato Il Ciclo Vincola Elevata astrazione Dev vincola
  • 16.
    This document isproperty of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential» IaaS: Dalla virtualizzazione al Cloud
  • 17.
    This document isproperty of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential» IaaS: Dalla virtualizzazione al Cloud ● On­demand self­service Un consumer può indipendentemente e unilateralmente attribuirsi capacità di calcolo, quali tempo di CPU,  networking, storage, secondo i suoi bisogni, automaticamente senza interazione alcuna.
  • 18.
    This document isproperty of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential» IaaS: Dalla virtualizzazione al Cloud ● On­demand self­service Un consumer può indipendentemente e unilateralmente attribuirsi capacità di calcolo, quali tempo di CPU,  networking, storage, secondo i suoi bisogni, automaticamente senza interazione alcuna. ● Ampio accesso alla rete Le risorse sono disponibili in rete e accedute mediante meccanismi standard che promuovono l'utilizzo di  piattaforme client eterogenee (leggere o pesanti).
  • 19.
    This document isproperty of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential» IaaS: Dalla virtualizzazione al Cloud ● On­demand self­service Un consumer può indipendentemente e unilateralmente attribuirsi capacità di calcolo, quali tempo di CPU,  networking, storage, secondo i suoi bisogni, automaticamente senza interazione alcuna. ● Ampio accesso alla rete Le risorse sono disponibili in rete e accedute mediante meccanismi standard che promuovono l'utilizzo di  piattaforme client eterogenee (leggere o pesanti). ● Resource pooling Le risorse  sono gestite in pool per servire più consumer in un modello multi­tenant. Le risorse sia fisiche che virtuali  sono assegnate dinamicamente e riassegnate secondo la richiesta dei consumer.
  • 20.
    This document isproperty of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential» IaaS: Dalla virtualizzazione al Cloud ● On­demand self­service Un consumer può indipendentemente e unilateralmente attribuirsi capacità di calcolo, quali tempo di CPU,  networking, storage, secondo i suoi bisogni, automaticamente senza interazione alcuna. ● Ampio accesso alla rete Le risorse sono disponibili in rete e accedute mediante meccanismi standard che promuovono l'utilizzo di  piattaforme client eterogenee (leggere o pesanti). ● Resource pooling Le risorse  sono gestite in pool per servire più consumer in un modello multi­tenant. Le risorse sia fisiche che virtuali  sono assegnate dinamicamente e riassegnate secondo la richiesta dei consumer. ● Location Independence il client, di solito, non ha controllo o conoscenza rispetto a dove è localizzata la risorsa, tra i parametri della  richiesta ci potrebbe essere un concetto di location (ad un livello di astrazione più elevato). Es. storage, calcolo,  memoria, banda, ecc...
  • 21.
    This document isproperty of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential» IaaS: Dalla virtualizzazione al Cloud ● On­demand self­service Un consumer può indipendentemente e unilateralmente attribuirsi capacità di calcolo, quali tempo di CPU,  networking, storage, secondo i suoi bisogni, automaticamente senza interazione alcuna. ● Ampio accesso alla rete Le risorse sono disponibili in rete e accedute mediante meccanismi standard che promuovono l'utilizzo di  piattaforme client eterogenee (leggere o pesanti). ● Resource pooling Le risorse  sono gestite in pool per servire più consumer in un modello multi­tenant. Le risorse sia fisiche che virtuali  sono assegnate dinamicamente e riassegnate secondo la richiesta dei consumer. ● Location Independence il client, di solito, non ha controllo o conoscenza rispetto a dove è localizzata la risorsa, tra i parametri della  richiesta ci potrebbe essere un concetto di location (ad un livello di astrazione più elevato). Es. storage, calcolo,  memoria, banda, ecc... ● Elasticità Le risorse possono essere fornite rapidamente e in modo elastico, automaticamente per un rapido scale­out e  scale­in quando non servono più. Le risorse appaiono illimitate e acquistabili in qualsiasi quantità in ogni  momento.
  • 22.
    This document isproperty of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential» IaaS: Dalla virtualizzazione al Cloud ● On­demand self­service Un consumer può indipendentemente e unilateralmente attribuirsi capacità di calcolo, quali tempo di CPU,  networking, storage, secondo i suoi bisogni, automaticamente senza interazione alcuna. ● Ampio accesso alla rete Le risorse sono disponibili in rete e accedute mediante meccanismi standard che promuovono l'utilizzo di  piattaforme client eterogenee (leggere o pesanti). ● Resource pooling Le risorse  sono gestite in pool per servire più consumer in un modello multi­tenant. Le risorse sia fisiche che virtuali  sono assegnate dinamicamente e riassegnate secondo la richiesta dei consumer. ● Location Independence il client, di solito, non ha controllo o conoscenza rispetto a dove è localizzata la risorsa, tra i parametri della  richiesta ci potrebbe essere un concetto di location (ad un livello di astrazione più elevato). Es. storage, calcolo,  memoria, banda, ecc... ● Elasticità Le risorse possono essere fornite rapidamente e in modo elastico, automaticamente per un rapido scale­out e  scale­in quando non servono più. Le risorse appaiono illimitate e acquistabili in qualsiasi quantità in ogni  momento. ● Metriche sui servizi I Sistemi Cloud controllano ed ottimizzzano l'uso delle risorse tramite metriche appropriate per il tipo di servizio  gestito (storage, calcolo, banda, numero utenti attivi, ecc...). L'utilizzo delle risorse può essere monitorato,  controllato, e inserito in report.
  • 23.
    This document isproperty of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential» PaaS: Adesso guidano gli sviluppi ● Strumenti Il Provider fornisce tutti i linguaggi di programmazione, gli strumenti di sviluppo, i database, i framework  (Application server, BPM, orchestratori, ecc...) ● Amministrazione e Ambienti Il provider mette a disposizione I servizi di amministrazione e gli ambienti di deploy ● Cicli di vita, Continuous Integration Il Provider fornisce anche strumenti di gestione del ciclo di vita e di autorizzazione, in alcuni casi offre  piattaforme di continuous integration ● Infrastruttura Il Provider gestisce e controlla l'infrastruttura, compresa la rete, la banda, i server i sistemi operativi e lo  storage ● Controllo applicativo, architetture, configurazione L'utilizzatore ha completo controllo nei confronti dei rilasci degli applicativi, delle architetture e la  configurazione applicativa e dell'ambiente di hosting ● Scaling e gestione risorse La piattaforma offre anche servizi di scale­out e scale­up a livello di infrastruttura applicativa e di prossimità  delle risorse, in analogia a quanto descritto per la IaaS. ● Awareness Gli applicativi (e chi li sviluppa) sono consci di utilizzare una tale piattaforma, soprattutto nella gestione degli  accessi (richieste) alle risorse
  • 24.
    This document isproperty of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential» I Containers ● Virtuozzo/LXC Un container è un virtual server, con il proprio init e glibc, e uno stack completo di applicativi. Cgroups sono  utilizzati per limitare l'uso di risorse critiche quali cpu e memoria. Questo tipo di containers hanno un basso  overhead confrontati al classico Hypervisor+VM, pur rimanendo consistente. ● Docker In docker, un container è un applicativo (o un gruppo di). Tramite un approccio a layers intelligente per i  filesystem, è in grado di raggiungere elevate densità quando vengono eseguite copie multiple del singolo  applicativo, se confrontate con quanto accade ai container di tipo VZ/LXC. Semplice da mantenere e  securizzare. ● LVE Lightweight Virtual Environments, è usat per ottenere l'isolamento delle rsorse in contesti multi­tenant. Utilizza  sempre cgroups a livello di kernel, ma “containerizzando” la singola applicazione che viene eseguita sul server  (MySql, Apache, ecc...). Viene utilizzato negli ambienti hosting condivisi con migliaia di utenti su singolo server.  Ciascuno con il proprio WS e DB (ma in realtà offerti da singole istanze dei servizi sul server).
  • 25.
    This document isproperty of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential» I Containers HOST OS SERVER Container LIBS APP I Containers rappresentano un modo di pacchettizzare il software in cui, oltre  all'applicazione, sono inserite tutte le sue dipendenze di runtime  Punti di forza: ● Facilità di deploy e di portabilità ● Elevato isolamento ● Footprint contenuto e rapidità di avvio In Linux, questo avviene tramite l'uso di: ● Control Groups (process­grouping) ● kernel namespaces (isolamento/Partizionamento) ● SELinux, sVirt (Sicurezza) ● Docker (movimentazione e versioning)
  • 26.
    This document isproperty of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential» Da architetture monolitiche a microservizi
  • 27.
    This document isproperty of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential» Kubernetes
  • 28.
    This document isproperty of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential» Kubernetes
  • 29.
    This document isproperty of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential» Kubernetes
  • 30.
    This document isproperty of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential» Kubernetes
  • 31.
    This document isproperty of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential» Kubernetes
  • 32.
    This document isproperty of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential» Kubernetes
  • 33.
    This document isproperty of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential» Kubernetes
  • 34.
    This document isproperty of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential» Kubernetes
  • 35.
    This document isproperty of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential» Ricapitoliamo
  • 36.
    This document isproperty of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential» Ricapitoliamo ● Un IT Bimodale (Componenti Industrializzate vs Componenti Effimere)
  • 37.
    This document isproperty of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential» Ricapitoliamo ● Un IT Bimodale (Componenti Industrializzate vs Componenti Effimere) ● Una infrastruttura Ibrida (In parte sui propri DC, in parte sul Cloud)
  • 38.
    This document isproperty of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential» Ricapitoliamo ● Un IT Bimodale (Componenti Industrializzate vs Componenti Effimere) ● Una infrastruttura Ibrida (In parte sui propri DC, in parte sul Cloud) ● Infrastrutture e Piattaforme  a “capacità infinita” e multi­tenant
  • 39.
    This document isproperty of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential» Ricapitoliamo ● Un IT Bimodale (Componenti Industrializzate vs Componenti Effimere) ● Una infrastruttura Ibrida (In parte sui propri DC, in parte sul Cloud) ● Infrastrutture e Piattaforme  a “capacità infinita” e multi­tenant ● Riduzione dell'impronta di ciascun servizio e aumento della cardinalità
  • 40.
    This document isproperty of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential» Ricapitoliamo ● Un IT Bimodale (Componenti Industrializzate vs Componenti Effimere) ● Una infrastruttura Ibrida (In parte sui propri DC, in parte sul Cloud) ● Infrastrutture e Piattaforme  a “capacità infinita” e multi­tenant ● Riduzione dell'impronta di ciascun servizio e aumento della cardinalità
  • 41.
    This document isproperty of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential» Ricapitoliamo ● Un IT Bimodale (Componenti Industrializzate vs Componenti Effimere) ● Una infrastruttura Ibrida (In parte sui propri DC, in parte sul Cloud) ● Infrastrutture e Piattaforme  a “capacità infinita” e multi­tenant ● Riduzione dell'impronta di ciascun servizio e aumento della cardinalità ● Numerosità di (micro­)servizi, con ordini di grandezza di migliaia di istanze ● Necessità di una gestione agile e con vita breve (Sviluppo) ● Necessità di standardizzazione e governo (Operations) ● Aumento del numero di nodi gestiti per singolo operatore
  • 42.
    This document isproperty of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential» DevOps – Ciclo di vita integrato  IDEA PRODUCT FEATURE SELF PROVISIONING ENVIRONMENT STANDARDIZATION AUTO SCALING CENTERALIZED OPS MANAGEMENT DEV QA UAT PROD IDE CONFIGURATION MANAGEMENT CONTINUOUS INTEGRATION MONITORING Tempo di ciclo PRODUCT MANAGER DEVELOPERS TEST ENGINEERS OPERATIONS PERSONNEL CONTINUOUS DELIVERY DEV QA UAT
  • 43.
    This document isproperty of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential» DevOps – Ciclo di vita integrato 
  • 44.
    This document isproperty of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential» La Proposizione Red Hat
  • 45.
    This document isproperty of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential» Dove andiamo
  • 46.
    This document isproperty of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential» Dove andiamo Da Hardware fisico a virtuale Da Rete fisica a rete virtuale Da Storage Fisico a software IaaS/PaaS
  • 47.
    This document isproperty of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential» Dove andiamo Da Hardware fisico a virtuale Da Rete fisica a rete virtuale Da Storage Fisico a software IaaS/PaaS  Software Defined Host/Storage  Software Defined Network Software Defined Storage Software defined  platform/Infrastructure
  • 48.
    This document isproperty of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential» Dove andiamo Da Hardware fisico a virtuale Da Rete fisica a rete virtuale Da Storage Fisico a software IaaS/PaaS  Software Defined Host/Storage  Software Defined Network Software Defined Storage Software defined  platform/Infrastructure Software­Defined Everything
  • 49.
    This document isproperty of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential» Dove andiamo Da Hardware fisico a virtuale Da Rete fisica a rete virtuale Da Storage Fisico a software IaaS/PaaS  Software Defined Host/Storage  Software Defined Network Software Defined Storage Software defined  platform/Infrastructure Software­Defined Everything Quindi...
  • 50.
    This document isproperty of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential» Dove Andiamo Da System Manager a Developer?
  • 51.
    This document isproperty of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential» Dove Andiamo Da System Manager a Developer?Da System Manager a Developer?
  • 52.
    This document isproperty of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential» Dove Andiamo Da System Manager a Developer? Oppure... Da System Manager a Developer?
  • 53.
    This document isproperty of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential» Dove Andiamo Da System Manager a Developer? Grazie! gianluca.magalotti@business­e.it Grazie! gianluca.magalotti@business­e.it Oppure... Da System Manager a Developer?
  • 54.
    This document isproperty of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential»This document is property of, and is proprietary to Business-e Company, and is identified as «Confidential» An Itway Group Company Italy - France - Spain - Portugal - Greece – Turkey - UAE Ravenna, Milano, Roma, Massa, Bari, Napoli, Trento Paris, Barcelona, Madrid, Lisboa, Athina, Istanbul, Ankara Associate Company: Libanica SA (Lebanon, Quatar, UAE) Beirut, Doha, Dubai Via L.Braille, 15 - 48010 Ravenna - Italy Tel. +39 0544.288711 - Fax +39 0544.463481 info@business-e.it www.business-e.it