The document discusses STKI's IT as a Service (ITaaS) initiative to deliver IT services at the speed of business needs through a focus on reliability, efficiency, security and responsiveness, highlighting goals of reducing costs, streamlining provisioning and management of services, and increasing control and scalability. It also covers implementing a DevSecOps approach, reorganizing teams, defining metrics, and transitioning operations like adopting container infrastructure to help modernize IT delivery and better support the business.
IDC: Selecting the Optimal Path to Private CloudEMC
This IDC white paper discusses the challenges and benefits of various cloud paths: prebuilt or integrated infrastructure systems such as VCE Vblock, reference architectures such as EMC VSPEX, and traditional or "build your own" systems.
Data Center, Private Cloud/IT transformationCisco Canada
The private cloud is one of today’s fastest growing data center solutions, and the significance of a secure architecture for business applications agnostic to the infrastructure is increasing. Cisco IT is building the foundation for business resiliency; however, resiliency, at every layer of the business environment requires a holistic approach to managing and orchestrating infrastructure, platform, and application resources within a data center and across multiple data centers.
2015 Modern Infrastructure Award Winners: Tools and services making a differe...Leigh Ryan
The Modern Infrastructure Impact Awards recognize the top cloud and data center products and technologies making a difference for IT shops.
The award-winning tools and services in essential areas of technology that Modern Infrastructure covers help run enterprise businesses with efficiency and insight -- whether used inside the data center or out.
Although many organizations have adopted the cloud and are reaping the
benefits of a cloud computing platform, there are still concerns with the
handling of sensitive information on a public cloud platform. For such
organizations an alternate option is available, and it means having their own
private cloud.
IDC: Selecting the Optimal Path to Private CloudEMC
This IDC white paper discusses the challenges and benefits of various cloud paths: prebuilt or integrated infrastructure systems such as VCE Vblock, reference architectures such as EMC VSPEX, and traditional or "build your own" systems.
Data Center, Private Cloud/IT transformationCisco Canada
The private cloud is one of today’s fastest growing data center solutions, and the significance of a secure architecture for business applications agnostic to the infrastructure is increasing. Cisco IT is building the foundation for business resiliency; however, resiliency, at every layer of the business environment requires a holistic approach to managing and orchestrating infrastructure, platform, and application resources within a data center and across multiple data centers.
2015 Modern Infrastructure Award Winners: Tools and services making a differe...Leigh Ryan
The Modern Infrastructure Impact Awards recognize the top cloud and data center products and technologies making a difference for IT shops.
The award-winning tools and services in essential areas of technology that Modern Infrastructure covers help run enterprise businesses with efficiency and insight -- whether used inside the data center or out.
Although many organizations have adopted the cloud and are reaping the
benefits of a cloud computing platform, there are still concerns with the
handling of sensitive information on a public cloud platform. For such
organizations an alternate option is available, and it means having their own
private cloud.
Time for Converged Infrastructure? Executives Discuss the Operational and Str...EMC
CIOs whose organizations have significant Converged Infrastructure implementations share how convergence is transforming the cost structure, performance profile, and business value of information technology infrastructure.
IT leaders are adopting hybrid cloud services at a rapid pace to increase business agility and cost containment. According to a February 2016 IDG study on Hybrid Cloud Computing, up to 83 percent of C-level respondents use or plan to use a hybrid cloud.27 Transforming IT service delivery to a hybrid cloud consumption model is the clear path for the vast majority of organizations. The bigger issue is how quickly an organization can change.
While building your own hybrid cloud solution may seem attractive, you should seriously evaluate the challenges such an option presents to already overextended IT staff resources. As detailed in this paper, organizations must be prepared for the likelihood of higher costs, longer deployments, and greater risks than they may initially expect. In addition, the IT community as a whole is rapidly moving away from integrating components and delivering services manually to a more strategic focus on providing high-value services to businesses.
The race to deliver cloud-native applications and services to the business demands that traditional IT services and applications either evolve to a hybrid cloud consumption model or risk placing the business at a competitive disadvantage. An engineered solution not only saves time, money, and resources but also allows your IT staff to focus on innovation and delivering IT services that increase business value and align with the evolving marketplace of IT services for enterprise-level organizations.
Organizations should seize the opportunity to achieve the transformational efficiencies the hybrid cloud can deliver. When planning your journey, consider buying rather than building your own solution to speed time to value, minimize expenditures, and reduce risk.
This Document contains the Case Study of SURE! Unified Communications. SURE! is a Magnaquest product. SURE! is an end-to-end Subscription Lifecycle Management Platform from Magnaquest. SURE! supports different domains like Cloud (IaaS, SaaS, Unified Communication) Broadband (FTTX, WiMAX, Wi-Fi, Cable, ADSL) , Dual Play, Triple Play Telecom, MVNO & M2M, Pay TV (Cable, DTH, DTT, Broadcaster, IPTV, OTT) and Home Utilities. SURE! has been redefining and catalyzing ROI of our clients, spread globally, in verticals like Media & Entertainment, Broadband and Cloud businesses, with a product suite spanning Billing and Revenue Management, CRM, Session Control, OSS and Campaign management.
Ctrls delineates how organizations are moving towards Virtualization and Cloud Computing to optimize their IT Infrastructure needs. Benefits such as cost effectiveness, scalability on demand, moving from a CAPEX to OPEX model and increased returns on investments have made virtualization a lucrative datacenter option.
This is an updated talk on Cloud Computing and the Citrix Cloud Center.
From time to time the Citrix CTO Office is asked to give presentations at these and other events. I'm interested in any/all feedback from the Citrix and Cloud communities.
The Data Center Is The Heartbeat of Today's IT Transformation (ENT215) | AWS ...Amazon Web Services
(Presented by CoreSite) The cloud-enabled data center sits at the center of IT transformation. It facilitates the interconnection and communities that come together, propelling growth for both buyers and sellers. Learn how CoreSite is bringing together best-of-breed partners through the Open Cloud Exchange, resulting in public, private, and hybrid IT interconnection and management as well as integration of AWS Direct Connect.
The Journey Toward the Software-Defined Data CenterCognizant
Computing's evolution toward a software-defined data center (SDDC) -- an extension of the cloud delivery model of infrastructure as a service (IaaS) -- is complex and multifaceted, involving multiple layers of virtualization: servers, storage, and networking. We provide a detailed adoption roadmap to guide your efforts.
Evolving Infrastructure and Management for Business Agility - Sukanta Biswas, Consulting Solution Architect, Infrastructure & Cloud Practice, Red Hat India
8 October 2015
Time for Converged Infrastructure? Executives Discuss the Operational and Str...EMC
CIOs whose organizations have significant Converged Infrastructure implementations share how convergence is transforming the cost structure, performance profile, and business value of information technology infrastructure.
IT leaders are adopting hybrid cloud services at a rapid pace to increase business agility and cost containment. According to a February 2016 IDG study on Hybrid Cloud Computing, up to 83 percent of C-level respondents use or plan to use a hybrid cloud.27 Transforming IT service delivery to a hybrid cloud consumption model is the clear path for the vast majority of organizations. The bigger issue is how quickly an organization can change.
While building your own hybrid cloud solution may seem attractive, you should seriously evaluate the challenges such an option presents to already overextended IT staff resources. As detailed in this paper, organizations must be prepared for the likelihood of higher costs, longer deployments, and greater risks than they may initially expect. In addition, the IT community as a whole is rapidly moving away from integrating components and delivering services manually to a more strategic focus on providing high-value services to businesses.
The race to deliver cloud-native applications and services to the business demands that traditional IT services and applications either evolve to a hybrid cloud consumption model or risk placing the business at a competitive disadvantage. An engineered solution not only saves time, money, and resources but also allows your IT staff to focus on innovation and delivering IT services that increase business value and align with the evolving marketplace of IT services for enterprise-level organizations.
Organizations should seize the opportunity to achieve the transformational efficiencies the hybrid cloud can deliver. When planning your journey, consider buying rather than building your own solution to speed time to value, minimize expenditures, and reduce risk.
This Document contains the Case Study of SURE! Unified Communications. SURE! is a Magnaquest product. SURE! is an end-to-end Subscription Lifecycle Management Platform from Magnaquest. SURE! supports different domains like Cloud (IaaS, SaaS, Unified Communication) Broadband (FTTX, WiMAX, Wi-Fi, Cable, ADSL) , Dual Play, Triple Play Telecom, MVNO & M2M, Pay TV (Cable, DTH, DTT, Broadcaster, IPTV, OTT) and Home Utilities. SURE! has been redefining and catalyzing ROI of our clients, spread globally, in verticals like Media & Entertainment, Broadband and Cloud businesses, with a product suite spanning Billing and Revenue Management, CRM, Session Control, OSS and Campaign management.
Ctrls delineates how organizations are moving towards Virtualization and Cloud Computing to optimize their IT Infrastructure needs. Benefits such as cost effectiveness, scalability on demand, moving from a CAPEX to OPEX model and increased returns on investments have made virtualization a lucrative datacenter option.
This is an updated talk on Cloud Computing and the Citrix Cloud Center.
From time to time the Citrix CTO Office is asked to give presentations at these and other events. I'm interested in any/all feedback from the Citrix and Cloud communities.
The Data Center Is The Heartbeat of Today's IT Transformation (ENT215) | AWS ...Amazon Web Services
(Presented by CoreSite) The cloud-enabled data center sits at the center of IT transformation. It facilitates the interconnection and communities that come together, propelling growth for both buyers and sellers. Learn how CoreSite is bringing together best-of-breed partners through the Open Cloud Exchange, resulting in public, private, and hybrid IT interconnection and management as well as integration of AWS Direct Connect.
The Journey Toward the Software-Defined Data CenterCognizant
Computing's evolution toward a software-defined data center (SDDC) -- an extension of the cloud delivery model of infrastructure as a service (IaaS) -- is complex and multifaceted, involving multiple layers of virtualization: servers, storage, and networking. We provide a detailed adoption roadmap to guide your efforts.
Evolving Infrastructure and Management for Business Agility - Sukanta Biswas, Consulting Solution Architect, Infrastructure & Cloud Practice, Red Hat India
8 October 2015
VMworld 2013: Architecting the Software-Defined Data Center VMworld
VMworld 2013
Aidan Dalgleish, VMware
David Hill, VMware
Kamau Wanguhu, VMware
Learn more about VMworld and register at http://www.vmworld.com/index.jspa?src=socmed-vmworld-slideshare
Data to Consumer : end to end middleware capabilitiesAsanka Abeysinghe
Consumer-driven and rapidly changing business requirements are creating the need to go beyond traditional middleware in enterprises today. Because the middleware layer has enough functional capabilities it empowers architects to convert their blueprints to solutions without changing the architecture to fit into the middleware limitations.
Asanka will first look at the evolution of middleware and how current and next-generation middleware looks like (Platform-3.0). Following this, he will analyze the middleware requirements from data (system of record) to consumer (system of engagement) by illustrating a layered architecture of modern enterprise middleware.
In a cloud computing architecture, cloud infrastructure refers to the back-end technology elements found within most enterprise data centers -- servers, persistent storage and networking equipment -- but on a much greater scale. Some large cloud providers, including hyperscale cloud companies, such as Microsoft and Amazon, form partnerships with vendors to design custom infrastructure components that are optimized for specific needs, such as power efficiency or workloads that include big data and AI.
Open Digital Architecture (ODA) is a blueprint for modular, cloud-based, open digital platforms that can be orchestrated using AI.
Designed to support our industry into the cloud native era, ODA sets the framework required
for CSPs to invest in IT, transforming business agility and operations by creating simpler IT and network solutions that are easier and cheaper to deploy, integrate and upgrade. Enabling growth, profitability and a cutting-edge customer experience.
Lecture on Virtualization and Cloud Computing
Fundamentals of Virtualization
Fundamentals of Cloud Computing
Primer on Virtualization
Technologies of Cloud Computing
PHP Frameworks: I want to break free (IPC Berlin 2024)Ralf Eggert
In this presentation, we examine the challenges and limitations of relying too heavily on PHP frameworks in web development. We discuss the history of PHP and its frameworks to understand how this dependence has evolved. The focus will be on providing concrete tips and strategies to reduce reliance on these frameworks, based on real-world examples and practical considerations. The goal is to equip developers with the skills and knowledge to create more flexible and future-proof web applications. We'll explore the importance of maintaining autonomy in a rapidly changing tech landscape and how to make informed decisions in PHP development.
This talk is aimed at encouraging a more independent approach to using PHP frameworks, moving towards a more flexible and future-proof approach to PHP development.
GDG Cloud Southlake #33: Boule & Rebala: Effective AppSec in SDLC using Deplo...James Anderson
Effective Application Security in Software Delivery lifecycle using Deployment Firewall and DBOM
The modern software delivery process (or the CI/CD process) includes many tools, distributed teams, open-source code, and cloud platforms. Constant focus on speed to release software to market, along with the traditional slow and manual security checks has caused gaps in continuous security as an important piece in the software supply chain. Today organizations feel more susceptible to external and internal cyber threats due to the vast attack surface in their applications supply chain and the lack of end-to-end governance and risk management.
The software team must secure its software delivery process to avoid vulnerability and security breaches. This needs to be achieved with existing tool chains and without extensive rework of the delivery processes. This talk will present strategies and techniques for providing visibility into the true risk of the existing vulnerabilities, preventing the introduction of security issues in the software, resolving vulnerabilities in production environments quickly, and capturing the deployment bill of materials (DBOM).
Speakers:
Bob Boule
Robert Boule is a technology enthusiast with PASSION for technology and making things work along with a knack for helping others understand how things work. He comes with around 20 years of solution engineering experience in application security, software continuous delivery, and SaaS platforms. He is known for his dynamic presentations in CI/CD and application security integrated in software delivery lifecycle.
Gopinath Rebala
Gopinath Rebala is the CTO of OpsMx, where he has overall responsibility for the machine learning and data processing architectures for Secure Software Delivery. Gopi also has a strong connection with our customers, leading design and architecture for strategic implementations. Gopi is a frequent speaker and well-known leader in continuous delivery and integrating security into software delivery.
Transcript: Selling digital books in 2024: Insights from industry leaders - T...BookNet Canada
The publishing industry has been selling digital audiobooks and ebooks for over a decade and has found its groove. What’s changed? What has stayed the same? Where do we go from here? Join a group of leading sales peers from across the industry for a conversation about the lessons learned since the popularization of digital books, best practices, digital book supply chain management, and more.
Link to video recording: https://bnctechforum.ca/sessions/selling-digital-books-in-2024-insights-from-industry-leaders/
Presented by BookNet Canada on May 28, 2024, with support from the Department of Canadian Heritage.
Builder.ai Founder Sachin Dev Duggal's Strategic Approach to Create an Innova...Ramesh Iyer
In today's fast-changing business world, Companies that adapt and embrace new ideas often need help to keep up with the competition. However, fostering a culture of innovation takes much work. It takes vision, leadership and willingness to take risks in the right proportion. Sachin Dev Duggal, co-founder of Builder.ai, has perfected the art of this balance, creating a company culture where creativity and growth are nurtured at each stage.
The Art of the Pitch: WordPress Relationships and SalesLaura Byrne
Clients don’t know what they don’t know. What web solutions are right for them? How does WordPress come into the picture? How do you make sure you understand scope and timeline? What do you do if sometime changes?
All these questions and more will be explored as we talk about matching clients’ needs with what your agency offers without pulling teeth or pulling your hair out. Practical tips, and strategies for successful relationship building that leads to closing the deal.
DevOps and Testing slides at DASA ConnectKari Kakkonen
My and Rik Marselis slides at 30.5.2024 DASA Connect conference. We discuss about what is testing, then what is agile testing and finally what is Testing in DevOps. Finally we had lovely workshop with the participants trying to find out different ways to think about quality and testing in different parts of the DevOps infinity loop.
Accelerate your Kubernetes clusters with Varnish CachingThijs Feryn
A presentation about the usage and availability of Varnish on Kubernetes. This talk explores the capabilities of Varnish caching and shows how to use the Varnish Helm chart to deploy it to Kubernetes.
This presentation was delivered at K8SUG Singapore. See https://feryn.eu/presentations/accelerate-your-kubernetes-clusters-with-varnish-caching-k8sug-singapore-28-2024 for more details.
UiPath Test Automation using UiPath Test Suite series, part 3DianaGray10
Welcome to UiPath Test Automation using UiPath Test Suite series part 3. In this session, we will cover desktop automation along with UI automation.
Topics covered:
UI automation Introduction,
UI automation Sample
Desktop automation flow
Pradeep Chinnala, Senior Consultant Automation Developer @WonderBotz and UiPath MVP
Deepak Rai, Automation Practice Lead, Boundaryless Group and UiPath MVP
LF Energy Webinar: Electrical Grid Modelling and Simulation Through PowSyBl -...DanBrown980551
Do you want to learn how to model and simulate an electrical network from scratch in under an hour?
Then welcome to this PowSyBl workshop, hosted by Rte, the French Transmission System Operator (TSO)!
During the webinar, you will discover the PowSyBl ecosystem as well as handle and study an electrical network through an interactive Python notebook.
PowSyBl is an open source project hosted by LF Energy, which offers a comprehensive set of features for electrical grid modelling and simulation. Among other advanced features, PowSyBl provides:
- A fully editable and extendable library for grid component modelling;
- Visualization tools to display your network;
- Grid simulation tools, such as power flows, security analyses (with or without remedial actions) and sensitivity analyses;
The framework is mostly written in Java, with a Python binding so that Python developers can access PowSyBl functionalities as well.
What you will learn during the webinar:
- For beginners: discover PowSyBl's functionalities through a quick general presentation and the notebook, without needing any expert coding skills;
- For advanced developers: master the skills to efficiently apply PowSyBl functionalities to your real-world scenarios.
Dev Dives: Train smarter, not harder – active learning and UiPath LLMs for do...UiPathCommunity
💥 Speed, accuracy, and scaling – discover the superpowers of GenAI in action with UiPath Document Understanding and Communications Mining™:
See how to accelerate model training and optimize model performance with active learning
Learn about the latest enhancements to out-of-the-box document processing – with little to no training required
Get an exclusive demo of the new family of UiPath LLMs – GenAI models specialized for processing different types of documents and messages
This is a hands-on session specifically designed for automation developers and AI enthusiasts seeking to enhance their knowledge in leveraging the latest intelligent document processing capabilities offered by UiPath.
Speakers:
👨🏫 Andras Palfi, Senior Product Manager, UiPath
👩🏫 Lenka Dulovicova, Product Program Manager, UiPath
Software Delivery At the Speed of AI: Inflectra Invests In AI-Powered QualityInflectra
In this insightful webinar, Inflectra explores how artificial intelligence (AI) is transforming software development and testing. Discover how AI-powered tools are revolutionizing every stage of the software development lifecycle (SDLC), from design and prototyping to testing, deployment, and monitoring.
Learn about:
• The Future of Testing: How AI is shifting testing towards verification, analysis, and higher-level skills, while reducing repetitive tasks.
• Test Automation: How AI-powered test case generation, optimization, and self-healing tests are making testing more efficient and effective.
• Visual Testing: Explore the emerging capabilities of AI in visual testing and how it's set to revolutionize UI verification.
• Inflectra's AI Solutions: See demonstrations of Inflectra's cutting-edge AI tools like the ChatGPT plugin and Azure Open AI platform, designed to streamline your testing process.
Whether you're a developer, tester, or QA professional, this webinar will give you valuable insights into how AI is shaping the future of software delivery.
Kubernetes & AI - Beauty and the Beast !?! @KCD Istanbul 2024Tobias Schneck
As AI technology is pushing into IT I was wondering myself, as an “infrastructure container kubernetes guy”, how get this fancy AI technology get managed from an infrastructure operational view? Is it possible to apply our lovely cloud native principals as well? What benefit’s both technologies could bring to each other?
Let me take this questions and provide you a short journey through existing deployment models and use cases for AI software. On practical examples, we discuss what cloud/on-premise strategy we may need for applying it to our own infrastructure to get it to work from an enterprise perspective. I want to give an overview about infrastructure requirements and technologies, what could be beneficial or limiting your AI use cases in an enterprise environment. An interactive Demo will give you some insides, what approaches I got already working for real.
Search and Society: Reimagining Information Access for Radical FuturesBhaskar Mitra
The field of Information retrieval (IR) is currently undergoing a transformative shift, at least partly due to the emerging applications of generative AI to information access. In this talk, we will deliberate on the sociotechnical implications of generative AI for information access. We will argue that there is both a critical necessity and an exciting opportunity for the IR community to re-center our research agendas on societal needs while dismantling the artificial separation between the work on fairness, accountability, transparency, and ethics in IR and the rest of IR research. Instead of adopting a reactionary strategy of trying to mitigate potential social harms from emerging technologies, the community should aim to proactively set the research agenda for the kinds of systems we should build inspired by diverse explicitly stated sociotechnical imaginaries. The sociotechnical imaginaries that underpin the design and development of information access technologies needs to be explicitly articulated, and we need to develop theories of change in context of these diverse perspectives. Our guiding future imaginaries must be informed by other academic fields, such as democratic theory and critical theory, and should be co-developed with social science scholars, legal scholars, civil rights and social justice activists, and artists, among others.
Search and Society: Reimagining Information Access for Radical Futures
Stkisummi18 i taa_s_cybergov_long_version_v1
1. 1
STKI’s IT as a Service
(ITaaS) initiative
For a while" is a
phrase whose
length can't be
measured.At least
by the person
who's waiting.
— Haruki Murakami
STKI’s IT as a Service
(ITaaS) initiative
2. 2
2What is IT as a Service?
IT delivery:
Infrastructure &
Operations as a Service
3. 3
3
IT as a Service Initiative destination
Gaining the adaptive
ability to deliver IT at
the speed of change
Current IT delivery is considered expensive, in-efficient,
rigid, old fashioned and holding back the business
Focused, reliable,
efficient, secure and
responsive IT
operations
ITaaS
4. 4
4
The core of ITaaS has not changed
• Reducing IT costs
• Improving cost transparency
• Streamlining how IT services are
provisioned, governed and managed
• Increasing visibility and control over IT
infrastructure
• Providing speed and scalability
• Increasing ability of strategic innovation
Source: IBM STKI modification
9. 9
How can ITaaS become focused?
By setting up goals and establish metrics!!
10. 10
10
Trek name:
Define ITaaS goals and metrics / measurements
Set availability
reliability metrics
Set IT support
metrics
Set business agility /
responsiveness metrics
Set cyber security
metrics
Set delivery
efficiency metrics
11. 11
11
Availability, service & efficiency metrics are common
Business responsiveness and cyber metrics are much less common
Don’t stay with a metric
too long
12. 12
12
Define role :"business technology availability"
One part of his role :“handle failures"
Measure availability objectively
with user experience tools
14. 14
14
Only "availability minded gatekeeper" can improve ITaaS reliability
The "business technology
availability" person is the "change
& maintenance manager"
16. 16
16
STKI’s DevSecOps measurement manifesto:
sec
ops
dev
Measure productivityquality along with cyber
Measure cyber
Measure ops along
with cyber
17. 17
17
STKI’s DevSecOps measurement manifesto:
sec
ops
dev
Measure productivityquality along with cyber
& ops
Measure cyber along
with ops & dev
productivity
Measure ops along
with cyber & dev
productivity
18. 18
18
Trek name:
Build new Data Center
Set Open API
Re-build integration platform
Set DC new
principles
Build container
infrastructure
Optimize the
foundation
21. 21
21
Hyperscale infrastructure
Based on basic standard HW components setting up specific SW (sometimes
opensource) configuration for large scale computing. Integrator & customer check if this
specific server will work with this specific network HW opensource network OS,
specific disks work with specific storage file system, etc.
22. 22
22
SD-WAN is an acronym for software-defined networking in a wide area network (WAN)
An SD-WAN simplifies the management and operation of aWAN by decoupling (separating) the
networking hardware from its control mechanism.
… allow companies to build higher-performanceWANs using lower-cost and commercially
available internet access, enabling businesses to partially or wholly replace more expensive private
WAN connection technologies such as MPLS
23. 23
23
Set DC new architecture principles:
o Build new technology lab preferably on cloud
o Software defined based (programmable) technology
o Maximize open source business value
o Strive towards immutable infrastructure (servers)
24. 24
24
In a traditional mutable server infrastructure, servers are continually updated and modified in place.
In immutable infrastructure servers are never modified after they're deployed.
If something needs to be updated, fixed, or modified in any way new servers built with the appropriate
changes are provisioned to replace the old ones.
Immutable infrastructure
Source: digitalocean
Pets vs. Cattle
25. 25
25
Internal integration
ESB
External (specific API)
API gateway
Cloud integration
IPaaSadvanced ESB
External partners
API management
developer portal
Standard content definition
Open API standards
Microservices connectivity
Service Mesh
The evolution of integration patterns
26. 26
26
Will API management replace ESB?
It shouldn't – no oorchestration, no transformation, no
adapters ( tech and content), no messaging, no guarantee
delivery, etc,
Still – green filed organizations (enterprises and startups) are
not using ESB at all
29. 29
29
Trek name:
ITaaS Operations, organization and processes
Implement Devops
and automation
Redefine sourcing
and finance
Re-organize
ITaaS
Reshape DC
operations
Retire technologies
and contain technical debt
30. 30
30
Redefine sourcing and finance
co-location, outsourcing, cloud
plan transition from capex to opex
non-perpetual procurement
embrace sourced services
Cloud communications platform for
building SMS, Voice & Messaging
applications on an API
31. 31
31
Re-organize ITaaS: new team for new technologydomain
• New dedicated team (for converged, cloud, devops, etc.) , with skills differentiated, into the same
department
System Network
DC
Storage Cloud
Network
Storage
System
Easy but BAD!!
33. 33
33Re-organize ITaaS: combine old teams for delivering new
technologydomain
System Network DC Storage
Production
faults
Sizing-
architecture
DR
Cloud
Challenging but GOOD!!
41. 41
41
The CI/CD (devops) team
Use the existing team that builds/refreshes
test environments as the foundation for
CICD team
Delivery Dev
Devops
Team
43. 43
43
Trek name:
Zero ticketing
Improve self
service
Introduce bots and
virtual agent
Auto-Detect + notification
to the user for action
needed
Auto-Detect + auto
resolution
Improve system
reliability & self healing
44. 44
44
Wow!!
Don’t need to
look for
specific
solution
Don’t need to
wait
Automation, Self Service and User happiness
☺
Support by 2nd & 3rd level
Support by 1st level
Self Service : ITSM/Portal/Search
Self Service : (Virtual Assistant -
Chatbot) or by other tools
Auto-Detect + notification to the
user + automated resolution
Auto-Detect &
Auto-Healing
ITSTKI
modifications
Too long, too
many people in
the process
Need to wait
for support
Do we have
support?
45. 45
45User uploads a screenshot
of an error (ocr…)
Known error is matched
with a solution
AyTee suggests a solution
IT
47. 47
47
Dynamic Automation integrates into existing ITSM tools to automate use
cases on platforms, database, middleware apps, network, and storage
47
Event
Management
System (e.g.
Netcool)
Incident Ticketing
System (e.g. ICD,
ServiceNow,
Remedy)
Integration
Services
IBM Dynamic
Automation
Jump host*
Unix
Intel
Client Devices
Managed
Server #2
Managed
Server #1
Dynamic Automation
“Virtual Engineer”
(System
Administrator)
Escalate to
Human EngineersYes No
Remediate
Diagnose
Virtual engineers behave
very much like a human
system administrator.
Escalate it to a
human system
administrator to
complete the
resolution.
48. 48
48
ITaaS
DC co-location
racks over blades
rack scale architecture
sw packages delivered on
containers
SD-WAN
GPU
Intent based
networking
immutable
infrastructure
(servers)
Open source
NVME storage
49. 49
Market presence / perception
Localsupport
EMC
IBM
Kaminario
NETAPP
HDS
All storage vendors have AFA
offerings
HPE
Vendors to watch:
E8storage (NVME)
Purestorage
All Flash Array (AFA)- Israeli market enterprise presence 1Q118
50. 50
Market presence / perception
Localsupport
50
Nutanix
VMWARE (vsan)
Vendors to watch:
HDS
Netapp
Fujitsu
The leading
brand in the
deal. Other
related brands
(servers,
hypervisor) are
not listed
HPE
DellEMC
CISCO
HCI hyper converged- Israeli market enterprise presence 1Q118
51. 51
Market presence / perception
Localsupport
51
Redhat
IBM
Pivotal
Application Platform as a Service (APaaS) on prem option-
Israeli market enterprise presence 1Q118
52. 52
Market presence / perception
Localsupport
52
Dell EMC
IBM
Veritas
HPE
Commvault
Actifio*
Vendors to watch:
Cloud backup alternatives
VEEAM*
Acrserve *
Rubrick*
* Not really apples to
apples
Enterprise Backup/data protection SW - Israeli
market enterprise presence 1Q117
53. 53
53
Pini’s model for technology selection/forecasting adoption:
2 new technologies
giving the same benefit and cost (effort) the same.
q: which technology should I choose?
a: the technology that has better chances to catch!!
so, how can I forecast technology adoption?
Internet companies-
startups
How many developers (company size) will benefit this now technology?
The smaller number wins!!
54. 54
54
54
Cloud technologies and
processes are part of ITaaS
practice enabling true hybrid
cloud
Focused, reliable, efficient, secure and responsive to business
needs
Zero ticketing
Supporting development
57. 57
57
It’s well known that so many
companies get hacked
Yet many executives believe it
will not affect them
Even the largest and most
prestigious ones
58. 58
Copyright@STKI_2018 Do not remove source or attribution from any slide or graph
5858
Cyber’s Problematic Reputation
“Cyber is holding us back from achieving all other initiatives”
59. 59
Copyright@STKI_2018 Do not remove source or attribution from any slide or graph
5959
Cyber governance initiative destination
Striking a balance between
the business needs and cyber,
risk & compliance needsCyber, governance & compliance are crucial for the survival of organizations
But they are also holding organizations back in many ways.
Executives don’t fully comprehend the importance of cyber security and their
personal responsibility.
61. 61
Copyright@STKI_2018 Do not remove source or attribution from any slide or graph
61
61
Demonstrate CEO
BOARD their cyber
responsibility
Determine business cyber
main principles
Allocate cyber budget,
head count & org.
structure
Trek name:
Zero trust security: Get top management on board
62. 62
Copyright@STKI_2018 Do not remove source or attribution from any slide or graph
6262
Source: STKI staffing report
Number of Employees/ Cyber personnel
Implement STKI’s market data &
best practices to receive
appropriate budgets and personnel!
63. 63
Copyright@STKI_2018 Do not remove source or attribution from any slide or graph
63
Build risk & cyber multi-
year program
Build cyber resilience
program
Trek name:
Design a Cyber Governance Plan
Design holistic cyber
measurement program
Use “Israel National Cyber
Directorate” guidance and tools
64. 64
Copyright@STKI_2018 Do not remove source or attribution from any slide or graph
6464
Israel National Cyber Directorate guidance
will boost cyber security in Israel!
Especially for non-regulated enterprises
Non-regulated CISO
I don’t have enough
budget and resources
I can’t explain this to the
CEOBoard
66. 66
Copyright@STKI_2018 Do not remove source or attribution from any slide or graph
66
66
Organizations that want to participate in the betta program can contact tora@pmo.gov.il
67. 67
Copyright@STKI_2018 Do not remove source or attribution from any slide or graph
67
Don’t forget to secure the ENTIRE supply chain!
68. 68
Copyright@STKI_2018 Do not remove source or attribution from any slide or graph
68
STKI expects new regulation based on Israel National
Cyber Directorate guidance in several industries
Take a deep breath.We’ve only just started.
69. 69
Copyright@STKI_2018 Do not remove source or attribution from any slide or graph
6969
Of boards are not trained to
deal with cyber security incidents!
Source: Einat Meyron cyber resilience consultant & The Cyber Security Source - 2017
70. 70
Copyright@STKI_2018 Do not remove source or attribution from any slide or graph
7070
CEO board member nightmare:
One Innocent phone call
73. 73
Copyright@STKI_2018 Do not remove source or attribution from any slide or graph
7373
Leverage the similarities between BCP & Cyber Resilience
BCP
(Business
Continuity Plan)
Cyber
Resilience
And make them work together in collaboration
74. 74
Copyright@STKI_2018 Do not remove source or attribution from any slide or graph
7474
Trek name:
Adopt to changing regulations
Keep up with existing
regulations
Look as GDPR
becomes standard
Implement Privacy
Protection Regulation
75. 75
Copyright@STKI_2018 Do not remove source or attribution from any slide or graph
7575
GDPR Hype
GDPR is searched more
than Cyber Security
GDPR
Cyber Security
77. 77
Copyright@STKI_2018 Do not remove source or attribution from any slide or graph
7777
What does GDPR mean to our business? A lot!
The right to data portability allows individuals to obtain and reuse their
personal data for their own purposes across different services.
It allows them to move, copy or transfer personal data easily from one IT
environment to another in a safe and secure way, without hindrance to usability
78. 78
Copyright@STKI_2018 Do not remove source or attribution from any slide or graph
78
It will also change many processes and interaction methods.
Example first engagement with client and his consent to continue with the process:
79. 79
Copyright@STKI_2018 Do not remove source or attribution from any slide or graph
7979
Consent Management
One of the new tools needed to maintain compliance
80. 80
Copyright@STKI_2018 Do not remove source or attribution from any slide or graph
8080
Some organizations will have to appoint a DPO under
GDPR law
https://ico.org.uk/for-organisations/guide-to-the-general-data-protection-regulation-gdpr/accountability-and-governance/data-protection-officers/
The first point of contact for supervisory
authorities and for individuals whose data is
processed
Informs and advises the organization and its employees
about their obligations to comply with GDPR and other
data protection laws
Monitors compliance with GDPR and other data
protection laws, including managing internal data
protection activities
Advises on data protection impact assessments
Trains staff and conducts internal audits.
81. 81
Copyright@STKI_2018 Do not remove source or attribution from any slide or graph
8181
source: konfidas
GDPR and Israeli privacy act are touching the same areas
82. 82
Copyright@STKI_2018 Do not remove source or attribution from any slide or graph
8282
Eventually, it will come… So be prepared
83. 83
Copyright@STKI_2018 Do not remove source or attribution from any slide or graph
8383
Trek name:
Cyber Security Operations
Enforce patches
Applying to new devices
(watches, pumps, cars, etc.)
Embrace new technologies and
prepare for new vulnerabilities
Re-adjust cyber security program
Embrace
DevSecOps
Automate Cyber
Operations and Use
AIML
85. 85
Copyright@STKI_2018 Do not remove source or attribution from any slide or graph
8585
DevSecOps tools - Embed SDLC (Secure Dev. life cycle) tools
into CICD:
• Static analysis tools
• Dynamic scanning (auto pen. tests)
• Embed operations data (logs, customer inputs) with security inputs
86. 86
Copyright@STKI_2018 Do not remove source or attribution from any slide or graph
86
Cyber governance
GDPR, Israel
privacy law:continue
GDPR, Israel
privacy law: start
Blockchain based
identity
DPO - data privacy
officer
Anonymization for cloud
Blockchain based
general tools
(DBMS, etc.)
Cloud security
tools
Cloud tokenization