SlideShare a Scribd company logo
1 of 30
What
Customers
Want the
Cloud to be.
Jason Waxman
General Manager,
Cloud Infrastructure Group
May 30, 2012
Users Demand
 Compelling
 Experiences
Listening to Cloud Providers & Users




      Range of Cloud Service Providers




With Broadest Array of OEM and ISV Collaborators
Accelerating Adoption of Cloud




                                                                         Private
                 Private                                                 Cloud                              Public
                 Cloud                                                                       Public         Cloud
                                                                                             Cloud

               Today: 14%                                              Hybrid Cloud (Public +           Today: 7%
               2014: 42%                                                      Private)                  2014: 23%
           >40% of IT operations1                                         35% by 20152                >40% of IT operations1




1. ODCA global member survey, Oct 2011, N=63
2. Gartner, Dec 2010, N=55 The Road Map From Virtualization to Cloud Computing (G00210845)
Cloud Challenges

Security     Device        Big       Cost
Threats    Proliferation   Data   Efficiency
Security
Customer Security Concerns

                                                                                                                      Public & Private
       Traditional Data Center
                                                                                                                     Cloud Data Center


                                                                   Reduced physical control
                                                                   Increased multi-tenancy
                                                                   Reduced effectiveness of
                                                                   existing security tools




           IT Pro survey of key concerns:

                           61%                                                             55%                              57%
              Lack of visibility inhibiting                               Lack of control over data key           Avoid putting workloads with
                private cloud adoption1                                  concern for public cloud adoption1       compliance mandates in cloud1



1 source: McCann “what’s holding the cloud back?” cloud security global IT survey, sponsored by Intel, May 2012
The Need for End-to-End Security Solutions

      Secure           Secure              Secure
    Datacenters      Connections           Devices




         Interoperable, Open Industry Standards
Securing the Datacenter

          Need for Greater                      Drives New
        Controls & Auditability            HW and SW Capabilities
                                             Endpoint Aware Integrity

                                                Real-time Integrity
Location                      Compliance
 Control                       Reporting      Security Stack Integrity

                                                   VM Integrity

                                             Location & Asset Control

Real-Time                      Malware             Host Integrity
Monitoring                    Hardening
                                                External Assessment
                                                   and Reputation
                                                 Digital Certificates
Optimized Client Security for Cloud Users




                          Malware
Identity Verification                 Data Protection
                        Containment
Example of Collaborative Security
                                       for a Virtual Cloud World
            Virtualized and Private                                                                                      Public Cloud Data
              Cloud Data Center                                                         Extended Security Policy               Center

                                                                                  Isolate, Protect, Control Vms
                                                                                                                                 Company
                                                                                                  Provide Visibility &              A
                    Mfg
                                      HR          Sales                                               Reporting
                                                                                                                            Company   Company
                                                                                                                               B         C
                    VMM                                                                  Apply Security Policy At
                                                                                         Multiple Control Points
                                                                                      Monitor Workloads Across
                                                                                        Cloud Infrastructures

                                                                                                        McAfee ePO1



                                                                                                                         Intel Trusted Execution
                 Intel Trusted Execution
                                                                                                                            Technology is run:
                Technology is run: Server
                                                                                                                            “Do not migrate to
                       “known good”
                                                                                                                             unknown server”



1 Integrating McAfee ePolicy Orchestrator (ePO) with Intel TXT requires custom integration work
*McAfee MOVE AV = McAfee Management of Optimized Virtualized Environments Anti-Virus
Devices &
Big Data
MANUFACTURING
                                HEALTHCARE                                                                      TRANSPORTATION




                 ENERGY                                                                                                      RETAIL
                                                    Cloud 2015: 15 Billion
                                                    Connected Devices1

                                                          PC, CE, PHONES                       COMMUNICATIONS




1 “Worldwide Device Estimates Year 2020 - Intel One Smart Network Work” forecast
Device Proliferation Challenges

                                                                                                   The Perimeter is now
                                                                                                    the User and Data
                                                                                                    Customers Want
                                                                                                 Seamless Interoperability:

                                                                                                   Increasing Security &
                                                                                                       Liability Risks


                                                                                                      Services Span
                                                                                                     Range of Devices
          May 2010              May 2011




IDC information worker custom survey, sponsored by Unisys, May 2011 and May 2010 Q1 (2011); Q4
Client Aware Cloud

  Compute                                             HD or SD




                 CAPABILITIES
  Graphics




                                           CONTENT
                                                      Flash or HTML5
     Media                                            Compressed or
Connectivity                                          uncompressed
   Security                                           Secure Content
   Location                                           & Commerce

        Personalized
       CLOUD                    Balanced             Optimized
          Services              Compute               Content
Intelligent Connected Systems




Analytics and Big Data Beyond Client Devices
What is Big Data?

                Traditional Data               Big Data

Volume     Gigabytes to Terabytes           Petabytes and beyond



Velocity   Occasional Batch Processing   Real-Time Data Analytics



Variety
           Centralized, Structured       Distributed, Unstructured
           i.e. Database                               multi-format



                        Untapped Information
Why is Big Data Important?




                 US Healthcare                 Europe Public Sector
          $300 Billion in value/year           250 Billion Euros value/year
     ~ 0.7% annual productivity growth       ~ 0.5 annual productivity growth




 Global Personal Location Data                      Manufacturing
$150 Billion+ value for service providers    Up to 50 percent decrease in
  Up to $700 Billion value to end users      product development, assembly
                                                          costs



Source: McKinsey Global Institute Analysis
Big Data Solutions: Volume

Traditional Storage          Distributed Storage
                                 Architecture
                                          Application Servers

                                              application




                                              storage client




                              Metadata                          Storage
                              Servers                           Servers


         SAN                                                    storage
     (Storage Area             metadata
                               services                         services
       Network)
Big Data Solutions: Velocity

                                  In Memory Analytics             Network Edge Analytics




                                                            Stream Processing Analysis & Decision Support Applications




                        Search and Analysis of 53 Million       Analyze data as its
                              Customer Records:
                         From 2-3 Hours to 2-3                collected to make near
                              Seconds!1                        real-time decisions


1: Hilti Corporation case study
Big Data Solutions: Variety

 Unstructured                    Distributed File
Multi-format Data                System & Map
                                 Reduce Tools
                    110100101010100
                    101010010101010             10101001                Data
                    010101010                          1            Analytics Tools
                                                       0
                                                       1
                                                       0
                                                       1
                                                       0
                                                              110100101010
                                                          0
Structured Data                     Database              1
                                                          0
                                                          1
                110100101010100                           0
                101010010101010                     1101001
                010101010
Intel’s Big Data Strategy


                      • Contribute code, promote development
 Enable the Apps        and new research

                      • Develop benchmarks; software
 Make it efficient      optimization libraries

  Develop data        • Continued compute, network and
center architecture     storage innovation

 Make it easier to    • Publish reference architectures
     deploy
    Grow the          • Education, common usage models,
   community            open source standards bodies
Reducing
 Total Cost
of Ownership
Cloud 2015 Vision




  FEDERATED                                                   AUTOMATED
Share data securely across                                     IT can focus more on
 public and private clouds                                    innovation and less on
                                                                   management


                                CLIENT AWARE
                               Optimizing services based on
                                     device capability
Goal of Datacenter Optimization
                             Cost of Typical Major Internet
                                       Datacenter
                                  Facilities    Other IT

      Address             Networking
                             6%
                                     5%           3%




      ~75% of                           Labor

     Ownership                           13%               Servers
                                                            50%



      Costs…
                                               Power
                                                23%




                      Source: Intel internal analysis, 2008 of 3 yr TCO




    …via optimized platforms & technologies
Optimized    Optimized                     Scalable                       Optimized   Datacenter
 Silicon    Technologies                   Software                       Systems     Optimization
Energy Challenges

               Age Distribution                 Energy Consumption              Performance Capability
                 of Servers                          of Servers                       of Servers

                                                                                            >4 Years Old


                                                  <4 Years Old
                                                                                                  4%
                               >4 Years Old

              <4 Years Old       32%                35%                            <4 Years Old

                 68%                                                                 96%
                                                                 >4 Years Old

                                                                   65%




Source: Intel analysis, 2012
Value of Time-to-Market for Cloud
                                               Difference in early deployment


                                                                                Previous TTM
          Cost per Web Transaction




                                                                                Accelerated TTM




                                                  Savings




                                      ~$750,000,000 Estimated Savings by
                                     Accelerating Latest Generation Servers
Source: Intel analysis, 2012
Enabling Open, Interoperable Solutions

            Standards                                                Technology   Partner Solutions




                       Learn More at www.livestream.com/cloudslam
                               & www.intel.com/datacenter

* Other names and brands may be claimed as the property of others.
Legal Disclaimers
Software and workloads used in performance tests may have been optimized for performance only on Intel
microprocessors. Performance tests, such as SYSmark and MobileMark, are measured using specific computer systems,
components, software, operations and functions. Any change to any of those factors may cause the results to vary. You should
consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the
performance of that product when combined with other products.
Intel does not control or audit the design or implementation of third party benchmarks or Web sites referenced in this document.
Intel encourages all of its customers to visit the referenced Web sites or others where similar performance benchmarks are
reported and confirm whether the referenced benchmarks are accurate and reflect performance of systems available for purchase.
Relative performance is calculated by assigning a baseline value of 1.0 to one benchmark result, and then dividing the actual
benchmark result for the baseline platform into each of the specific benchmark results of each of the other platforms, and
assigning them a relative performance number that correlates with the performance improvements reported.
SPEC, SPECint, SPECfp, SPECrate. SPECpower, SPECjAppServer, SPECjbb, SPECjvm, SPECWeb, SPECompM, SPECompL,
SPEC MPI, SPECjEnterprise* are trademarks of the Standard Performance Evaluation Corporation. See http://www.spec.org for
more information. TPC-C, TPC-H, TPC-E are trademarks of the Transaction Processing Council. See http://www.tpc.org for more
information.
Intel® Virtualization Technology requires a computer system with an enabled Intel® processor, BIOS, virtual machine monitor
(VMM) and, for some uses, certain platform software enabled for it. Functionality, performance or other benefits will vary
depending on hardware and software configurations and may require a BIOS update. Software applications may not be
compatible with all operating systems. Please check with your application vendor.
No computer system can provide absolute security under all conditions. Intel® Trusted Execution Technology (Intel® TXT)
requires a computer system with Intel® Virtualization Technology, an Intel TXT-enabled processor, chipset, BIOS, Authenticated
Code Modules and an Intel TXT-compatible measured launched environment (MLE). Intel TXT also requires the system to
contain a TPM v1.s. For more information, visit http://www.intel.com/technology/security. In addition, Intel TXT requires that the
original equipment manufacturer provides TPM functionality, which requires a TPM-supported BIOS. TPM functionality must be
initialized and may not be available in all countries.
Intel ® AES-NI requires a computer system with an AES-NI enabled processor, as well as non-Intel software to execute the
instructions in the correct sequence. AES-NI is available on Intel® Core™ i5-600 Desktop Processor Series, Intel® Core™ i7-600
Mobile Processor Series, and Intel® Core™ i5-500 Mobile Processor Series. For availability, consult your reseller or system
manufacturer. For more information, see http://software.intel.com/en-us/articles/intel-advanced-encryption-standard-instructions-
aes-ni/
Intel processor numbers are not a measure of performance. Processor numbers differentiate features within each processor
series, not across different processor sequences. See http://www.intel.com/products/processor_number for details. Intel products
are not intended for use in medical, life saving, life sustaining, critical control or safety systems, or in nuclear facility applications.
All dates and products specified are for planning purposes only and are subject to change without notice
Copyright © 2012 Intel Corporation. All rights reserved. Intel, the Intel logo, Xeon and Intel Core are trademarks or registered
trademarks of Intel Corporation or its subsidiaries in the United States and other countries. All dates and products specified are for
planning purposes only and are subject to change without notice

More Related Content

What's hot

Connecting Legacy Data Sources to the Data Lifecycle
 Connecting Legacy Data Sources to the Data Lifecycle Connecting Legacy Data Sources to the Data Lifecycle
Connecting Legacy Data Sources to the Data LifecyclePrecisely
 
Meet up roadmap cloudera 2020 - janeiro
Meet up   roadmap cloudera 2020 - janeiroMeet up   roadmap cloudera 2020 - janeiro
Meet up roadmap cloudera 2020 - janeiroThiago Santiago
 
Logicalis IoT & Smart Cities (Use Case)
Logicalis IoT & Smart Cities (Use Case)Logicalis IoT & Smart Cities (Use Case)
Logicalis IoT & Smart Cities (Use Case)Cloudera, Inc.
 
Powering the Internet of Things with Apache Hadoop
Powering the Internet of Things with Apache HadoopPowering the Internet of Things with Apache Hadoop
Powering the Internet of Things with Apache HadoopCloudera, Inc.
 
Top 5 IoT Use Cases
Top 5 IoT Use CasesTop 5 IoT Use Cases
Top 5 IoT Use CasesCloudera, Inc.
 
IBM Rational Software Conference 2009 Day 2 Keynote: Steve Mills
IBM Rational Software Conference 2009 Day 2 Keynote: Steve MillsIBM Rational Software Conference 2009 Day 2 Keynote: Steve Mills
IBM Rational Software Conference 2009 Day 2 Keynote: Steve MillsKathy (Kat) Mandelstein
 
Cloudera - Enabling the IoT Revolution Driving Insights in a Connected World
Cloudera - Enabling the IoT Revolution Driving Insights in a Connected WorldCloudera - Enabling the IoT Revolution Driving Insights in a Connected World
Cloudera - Enabling the IoT Revolution Driving Insights in a Connected Worldandreas kuncoro
 
GDPR: 20 Million Reasons to Get Ready - Part 2: Living Compliance
GDPR: 20 Million Reasons to Get Ready - Part 2: Living ComplianceGDPR: 20 Million Reasons to Get Ready - Part 2: Living Compliance
GDPR: 20 Million Reasons to Get Ready - Part 2: Living ComplianceCloudera, Inc.
 
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?360mnbsu
 
Next Generation Infrastructure for Internet of Things
Next Generation Infrastructure for Internet of ThingsNext Generation Infrastructure for Internet of Things
Next Generation Infrastructure for Internet of ThingsPT Datacomm Diangraha
 
SP Network Automation: Automated Operations Overview
SP Network Automation: Automated Operations Overview SP Network Automation: Automated Operations Overview
SP Network Automation: Automated Operations Overview Cisco Service Provider
 
The IoT-CSX Transformation
The IoT-CSX TransformationThe IoT-CSX Transformation
The IoT-CSX TransformationCapgemini
 
CyberVille® DHC System - May 12th, 2015
CyberVille® DHC System - May 12th, 2015CyberVille® DHC System - May 12th, 2015
CyberVille® DHC System - May 12th, 2015Ville Mickelsson
 
Hyperconverged Systems for Digital Transformation
Hyperconverged Systems for Digital TransformationHyperconverged Systems for Digital Transformation
Hyperconverged Systems for Digital TransformationHitachi Vantara
 
CL2015 - Datacenter and Cloud Strategy and Planning
CL2015 - Datacenter and Cloud Strategy and PlanningCL2015 - Datacenter and Cloud Strategy and Planning
CL2015 - Datacenter and Cloud Strategy and PlanningCisco
 
Architect Your IoT Platform for Success
Architect Your IoT Platform for SuccessArchitect Your IoT Platform for Success
Architect Your IoT Platform for SuccessSolace
 
HP Iot platform and solution plans
HP Iot platform and solution plansHP Iot platform and solution plans
HP Iot platform and solution plansJeff Edlund
 
Case studies of the internet of things 062017
Case studies of the internet of things 062017Case studies of the internet of things 062017
Case studies of the internet of things 062017Economic Strategy Institute
 

What's hot (20)

Connecting Legacy Data Sources to the Data Lifecycle
 Connecting Legacy Data Sources to the Data Lifecycle Connecting Legacy Data Sources to the Data Lifecycle
Connecting Legacy Data Sources to the Data Lifecycle
 
Meet up roadmap cloudera 2020 - janeiro
Meet up   roadmap cloudera 2020 - janeiroMeet up   roadmap cloudera 2020 - janeiro
Meet up roadmap cloudera 2020 - janeiro
 
Logicalis IoT & Smart Cities (Use Case)
Logicalis IoT & Smart Cities (Use Case)Logicalis IoT & Smart Cities (Use Case)
Logicalis IoT & Smart Cities (Use Case)
 
Powering the Internet of Things with Apache Hadoop
Powering the Internet of Things with Apache HadoopPowering the Internet of Things with Apache Hadoop
Powering the Internet of Things with Apache Hadoop
 
Top 5 IoT Use Cases
Top 5 IoT Use CasesTop 5 IoT Use Cases
Top 5 IoT Use Cases
 
IBM Rational Software Conference 2009 Day 2 Keynote: Steve Mills
IBM Rational Software Conference 2009 Day 2 Keynote: Steve MillsIBM Rational Software Conference 2009 Day 2 Keynote: Steve Mills
IBM Rational Software Conference 2009 Day 2 Keynote: Steve Mills
 
Cloudera - Enabling the IoT Revolution Driving Insights in a Connected World
Cloudera - Enabling the IoT Revolution Driving Insights in a Connected WorldCloudera - Enabling the IoT Revolution Driving Insights in a Connected World
Cloudera - Enabling the IoT Revolution Driving Insights in a Connected World
 
GDPR: 20 Million Reasons to Get Ready - Part 2: Living Compliance
GDPR: 20 Million Reasons to Get Ready - Part 2: Living ComplianceGDPR: 20 Million Reasons to Get Ready - Part 2: Living Compliance
GDPR: 20 Million Reasons to Get Ready - Part 2: Living Compliance
 
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
Brian Isle: The Internet of Things: Manufacturing Panacea - or - Hacker's Dream?
 
Infrastructure as a Service (IaaS)
Infrastructure as a Service (IaaS)Infrastructure as a Service (IaaS)
Infrastructure as a Service (IaaS)
 
Next Generation Infrastructure for Internet of Things
Next Generation Infrastructure for Internet of ThingsNext Generation Infrastructure for Internet of Things
Next Generation Infrastructure for Internet of Things
 
IoT Data as Service with Hadoop
IoT Data as Service with HadoopIoT Data as Service with Hadoop
IoT Data as Service with Hadoop
 
SP Network Automation: Automated Operations Overview
SP Network Automation: Automated Operations Overview SP Network Automation: Automated Operations Overview
SP Network Automation: Automated Operations Overview
 
The IoT-CSX Transformation
The IoT-CSX TransformationThe IoT-CSX Transformation
The IoT-CSX Transformation
 
CyberVille® DHC System - May 12th, 2015
CyberVille® DHC System - May 12th, 2015CyberVille® DHC System - May 12th, 2015
CyberVille® DHC System - May 12th, 2015
 
Hyperconverged Systems for Digital Transformation
Hyperconverged Systems for Digital TransformationHyperconverged Systems for Digital Transformation
Hyperconverged Systems for Digital Transformation
 
CL2015 - Datacenter and Cloud Strategy and Planning
CL2015 - Datacenter and Cloud Strategy and PlanningCL2015 - Datacenter and Cloud Strategy and Planning
CL2015 - Datacenter and Cloud Strategy and Planning
 
Architect Your IoT Platform for Success
Architect Your IoT Platform for SuccessArchitect Your IoT Platform for Success
Architect Your IoT Platform for Success
 
HP Iot platform and solution plans
HP Iot platform and solution plansHP Iot platform and solution plans
HP Iot platform and solution plans
 
Case studies of the internet of things 062017
Case studies of the internet of things 062017Case studies of the internet of things 062017
Case studies of the internet of things 062017
 

Viewers also liked

Intel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntelAPAC
 
Inter cloud global cloud_january 2017
Inter cloud global cloud_january 2017Inter cloud global cloud_january 2017
Inter cloud global cloud_january 2017Theintercloud
 
Intel Cloud Summit: Liam Keating Keynote
Intel Cloud Summit: Liam Keating  KeynoteIntel Cloud Summit: Liam Keating  Keynote
Intel Cloud Summit: Liam Keating KeynoteIntelAPAC
 
Cloud computing presentation
Cloud computing   presentationCloud computing   presentation
Cloud computing presentationWilliam Mann
 
Introduction ciot workshop premeetup
Introduction ciot workshop premeetupIntroduction ciot workshop premeetup
Introduction ciot workshop premeetupBeMyApp
 
I'm Cloud Confused!
I'm Cloud Confused!I'm Cloud Confused!
I'm Cloud Confused!Andy Harjanto
 
2013 State of Cloud Survey SMB Results
2013 State of Cloud Survey SMB Results2013 State of Cloud Survey SMB Results
2013 State of Cloud Survey SMB ResultsSymantec
 
Breaking through the Clouds
Breaking through the CloudsBreaking through the Clouds
Breaking through the CloudsAndy Piper
 
2013 Future of Cloud Computing - 3rd Annual Survey Results
2013 Future of Cloud Computing - 3rd Annual Survey Results2013 Future of Cloud Computing - 3rd Annual Survey Results
2013 Future of Cloud Computing - 3rd Annual Survey ResultsMichael Skok
 
Intro to cloud computing — MegaCOMM 2013, Jerusalem
Intro to cloud computing — MegaCOMM 2013, JerusalemIntro to cloud computing — MegaCOMM 2013, Jerusalem
Intro to cloud computing — MegaCOMM 2013, JerusalemReuven Lerner
 
Can we hack open source #cloud platforms to help reduce emissions?
Can we hack open source #cloud platforms to help reduce emissions?Can we hack open source #cloud platforms to help reduce emissions?
Can we hack open source #cloud platforms to help reduce emissions?Tom Raftery
 
Summer School Scale Cloud Across the Enterprise
Summer School   Scale Cloud Across the EnterpriseSummer School   Scale Cloud Across the Enterprise
Summer School Scale Cloud Across the EnterpriseWSO2
 
Simplifying The Cloud Top 10 Questions By SMBs
Simplifying The Cloud Top 10 Questions By SMBsSimplifying The Cloud Top 10 Questions By SMBs
Simplifying The Cloud Top 10 Questions By SMBsSun Digital, Inc.
 
Penetrating the Cloud: Opportunities & Challenges for Businesses
Penetrating the Cloud: Opportunities & Challenges for BusinessesPenetrating the Cloud: Opportunities & Challenges for Businesses
Penetrating the Cloud: Opportunities & Challenges for BusinessesCompTIA
 
The Inevitable Cloud Outage
The Inevitable Cloud OutageThe Inevitable Cloud Outage
The Inevitable Cloud OutageNewvewm
 
Avoiding Cloud Outage
Avoiding Cloud OutageAvoiding Cloud Outage
Avoiding Cloud OutageNati Shalom
 
LinuxFest NW 2013: Hitchhiker's Guide to Open Source Cloud Computing
LinuxFest NW 2013: Hitchhiker's Guide to Open Source Cloud ComputingLinuxFest NW 2013: Hitchhiker's Guide to Open Source Cloud Computing
LinuxFest NW 2013: Hitchhiker's Guide to Open Source Cloud ComputingMark Hinkle
 
Delivering IaaS with Open Source Software
Delivering IaaS with Open Source SoftwareDelivering IaaS with Open Source Software
Delivering IaaS with Open Source SoftwareMark Hinkle
 
Linthicum what is-the-true-future-of-cloud-computing
Linthicum what is-the-true-future-of-cloud-computingLinthicum what is-the-true-future-of-cloud-computing
Linthicum what is-the-true-future-of-cloud-computingDavid Linthicum
 

Viewers also liked (20)

Intel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfeeIntel Cloud Summit: Greg Brown McAfee
Intel Cloud Summit: Greg Brown McAfee
 
Inter cloud global cloud_january 2017
Inter cloud global cloud_january 2017Inter cloud global cloud_january 2017
Inter cloud global cloud_january 2017
 
Intel Cloud Summit: Liam Keating Keynote
Intel Cloud Summit: Liam Keating  KeynoteIntel Cloud Summit: Liam Keating  Keynote
Intel Cloud Summit: Liam Keating Keynote
 
Cloud computing presentation
Cloud computing   presentationCloud computing   presentation
Cloud computing presentation
 
Introduction ciot workshop premeetup
Introduction ciot workshop premeetupIntroduction ciot workshop premeetup
Introduction ciot workshop premeetup
 
Google Cloud Platform
Google Cloud Platform Google Cloud Platform
Google Cloud Platform
 
I'm Cloud Confused!
I'm Cloud Confused!I'm Cloud Confused!
I'm Cloud Confused!
 
2013 State of Cloud Survey SMB Results
2013 State of Cloud Survey SMB Results2013 State of Cloud Survey SMB Results
2013 State of Cloud Survey SMB Results
 
Breaking through the Clouds
Breaking through the CloudsBreaking through the Clouds
Breaking through the Clouds
 
2013 Future of Cloud Computing - 3rd Annual Survey Results
2013 Future of Cloud Computing - 3rd Annual Survey Results2013 Future of Cloud Computing - 3rd Annual Survey Results
2013 Future of Cloud Computing - 3rd Annual Survey Results
 
Intro to cloud computing — MegaCOMM 2013, Jerusalem
Intro to cloud computing — MegaCOMM 2013, JerusalemIntro to cloud computing — MegaCOMM 2013, Jerusalem
Intro to cloud computing — MegaCOMM 2013, Jerusalem
 
Can we hack open source #cloud platforms to help reduce emissions?
Can we hack open source #cloud platforms to help reduce emissions?Can we hack open source #cloud platforms to help reduce emissions?
Can we hack open source #cloud platforms to help reduce emissions?
 
Summer School Scale Cloud Across the Enterprise
Summer School   Scale Cloud Across the EnterpriseSummer School   Scale Cloud Across the Enterprise
Summer School Scale Cloud Across the Enterprise
 
Simplifying The Cloud Top 10 Questions By SMBs
Simplifying The Cloud Top 10 Questions By SMBsSimplifying The Cloud Top 10 Questions By SMBs
Simplifying The Cloud Top 10 Questions By SMBs
 
Penetrating the Cloud: Opportunities & Challenges for Businesses
Penetrating the Cloud: Opportunities & Challenges for BusinessesPenetrating the Cloud: Opportunities & Challenges for Businesses
Penetrating the Cloud: Opportunities & Challenges for Businesses
 
The Inevitable Cloud Outage
The Inevitable Cloud OutageThe Inevitable Cloud Outage
The Inevitable Cloud Outage
 
Avoiding Cloud Outage
Avoiding Cloud OutageAvoiding Cloud Outage
Avoiding Cloud Outage
 
LinuxFest NW 2013: Hitchhiker's Guide to Open Source Cloud Computing
LinuxFest NW 2013: Hitchhiker's Guide to Open Source Cloud ComputingLinuxFest NW 2013: Hitchhiker's Guide to Open Source Cloud Computing
LinuxFest NW 2013: Hitchhiker's Guide to Open Source Cloud Computing
 
Delivering IaaS with Open Source Software
Delivering IaaS with Open Source SoftwareDelivering IaaS with Open Source Software
Delivering IaaS with Open Source Software
 
Linthicum what is-the-true-future-of-cloud-computing
Linthicum what is-the-true-future-of-cloud-computingLinthicum what is-the-true-future-of-cloud-computing
Linthicum what is-the-true-future-of-cloud-computing
 

Similar to What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 2012 Headline Keynote

Data Center Security Now and into the Future
Data Center Security Now and into the FutureData Center Security Now and into the Future
Data Center Security Now and into the FutureCisco Security
 
The Cloud according to VMware
The Cloud according to VMwareThe Cloud according to VMware
The Cloud according to VMwareOpSource
 
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceDeepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceUNIT4 IT Solutions
 
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Acrodex
 
Trend micro v2
Trend micro v2Trend micro v2
Trend micro v2JD Sherry
 
HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure HyTrust
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAmazon Web Services
 
2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity RoadmapRaleigh ISSA
 
Cloud securityperspectives cmg
Cloud securityperspectives cmgCloud securityperspectives cmg
Cloud securityperspectives cmgNeha Dhawan
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...Amazon Web Services
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...HyTrust
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architectureVladimir Jirasek
 
Building a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementBuilding a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementOracleIDM
 
IBM Software Day 2013. Unleash business innovation with the next generation o...
IBM Software Day 2013. Unleash business innovation with the next generation o...IBM Software Day 2013. Unleash business innovation with the next generation o...
IBM Software Day 2013. Unleash business innovation with the next generation o...IBM (Middle East and Africa)
 
Cloud Security: Perception VS Reality
Cloud Security: Perception VS RealityCloud Security: Perception VS Reality
Cloud Security: Perception VS RealityKVH Co. Ltd.
 
Smart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraSmart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraTrend Micro (EMEA) Limited
 
Becloud hybrid cloud
Becloud hybrid cloudBecloud hybrid cloud
Becloud hybrid cloudBecloud
 
VMware vCloud Director 1.5 - What's New
VMware vCloud Director 1.5  - What's NewVMware vCloud Director 1.5  - What's New
VMware vCloud Director 1.5 - What's New1CloudRoad.com
 

Similar to What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 2012 Headline Keynote (20)

null Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Securitynull Bangalore meet - Cloud Computing and Security
null Bangalore meet - Cloud Computing and Security
 
Data Center Security Now and into the Future
Data Center Security Now and into the FutureData Center Security Now and into the Future
Data Center Security Now and into the Future
 
The Cloud according to VMware
The Cloud according to VMwareThe Cloud according to VMware
The Cloud according to VMware
 
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performanceDeepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
Deepsecurity & VDI beveiliging, maximale beveiliging en optimale performance
 
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
Secure Your Virtualized Environment. Protection from Advanced Persistent Thre...
 
Trend micro v2
Trend micro v2Trend micro v2
Trend micro v2
 
HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure HyTrust and VMware-Providing a Secure Virtual Infrastructure
HyTrust and VMware-Providing a Secure Virtual Infrastructure
 
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNetAWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
AWS Summit 2011: Cloud Compliance 101: No PhD required - SafeNet
 
2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap2012-01 How to Secure a Cloud Identity Roadmap
2012-01 How to Secure a Cloud Identity Roadmap
 
Cloud securityperspectives cmg
Cloud securityperspectives cmgCloud securityperspectives cmg
Cloud securityperspectives cmg
 
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
AWS Partner Presentation - TrendMicro - Securing your Journey to the Cloud, A...
 
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
Virtualize More in 2012 with HyTrust-Boost Data Center Efficiency and Consoli...
 
Cloud security and security architecture
Cloud security and security architectureCloud security and security architecture
Cloud security and security architecture
 
Stream 3 - Cloud Computing
Stream 3 - Cloud ComputingStream 3 - Cloud Computing
Stream 3 - Cloud Computing
 
Building a Secure Cloud with Identity Management
Building a Secure Cloud with Identity ManagementBuilding a Secure Cloud with Identity Management
Building a Secure Cloud with Identity Management
 
IBM Software Day 2013. Unleash business innovation with the next generation o...
IBM Software Day 2013. Unleash business innovation with the next generation o...IBM Software Day 2013. Unleash business innovation with the next generation o...
IBM Software Day 2013. Unleash business innovation with the next generation o...
 
Cloud Security: Perception VS Reality
Cloud Security: Perception VS RealityCloud Security: Perception VS Reality
Cloud Security: Perception VS Reality
 
Smart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC EraSmart, Data-Centric Security for the Post-PC Era
Smart, Data-Centric Security for the Post-PC Era
 
Becloud hybrid cloud
Becloud hybrid cloudBecloud hybrid cloud
Becloud hybrid cloud
 
VMware vCloud Director 1.5 - What's New
VMware vCloud Director 1.5  - What's NewVMware vCloud Director 1.5  - What's New
VMware vCloud Director 1.5 - What's New
 

More from Khazret Sapenov

V mware evolutionary cloud 12 2012
V mware evolutionary cloud 12 2012V mware evolutionary cloud 12 2012
V mware evolutionary cloud 12 2012Khazret Sapenov
 
Virtual sharp cloud aware bc dr up 2012 cloud
Virtual sharp cloud aware bc dr up 2012 cloudVirtual sharp cloud aware bc dr up 2012 cloud
Virtual sharp cloud aware bc dr up 2012 cloudKhazret Sapenov
 
Up2012edit daniel chalef
Up2012edit daniel chalefUp2012edit daniel chalef
Up2012edit daniel chalefKhazret Sapenov
 
Up2012 scaling my sql in the cloud by moshe shadmon, founder, cto scaledb
Up2012  scaling my sql in the cloud by moshe shadmon, founder, cto scaledbUp2012  scaling my sql in the cloud by moshe shadmon, founder, cto scaledb
Up2012 scaling my sql in the cloud by moshe shadmon, founder, cto scaledbKhazret Sapenov
 
Up 2012 smart cloud presentation_final
Up 2012   smart cloud presentation_finalUp 2012   smart cloud presentation_final
Up 2012 smart cloud presentation_finalKhazret Sapenov
 
Up 2012 wally mac dermid - final
Up 2012   wally mac dermid - finalUp 2012   wally mac dermid - final
Up 2012 wally mac dermid - finalKhazret Sapenov
 
Up 2012 dave jilk - multi-tenancy in paa s (distribution version)
Up 2012   dave jilk - multi-tenancy in paa s (distribution version)Up 2012   dave jilk - multi-tenancy in paa s (distribution version)
Up 2012 dave jilk - multi-tenancy in paa s (distribution version)Khazret Sapenov
 
Transverse up cloud 2012 - final
Transverse   up cloud 2012 - finalTransverse   up cloud 2012 - final
Transverse up cloud 2012 - finalKhazret Sapenov
 
Transforming cloud infrastructure to support big data storage and workflows b...
Transforming cloud infrastructure to support big data storage and workflows b...Transforming cloud infrastructure to support big data storage and workflows b...
Transforming cloud infrastructure to support big data storage and workflows b...Khazret Sapenov
 
The elephantintheroom bigdataanalyticsinthecloud
The elephantintheroom bigdataanalyticsinthecloudThe elephantintheroom bigdataanalyticsinthecloud
The elephantintheroom bigdataanalyticsinthecloudKhazret Sapenov
 
Taking control of bring your own device byod with desktops as a service (daa ...
Taking control of bring your own device byod with desktops as a service (daa ...Taking control of bring your own device byod with desktops as a service (daa ...
Taking control of bring your own device byod with desktops as a service (daa ...Khazret Sapenov
 
Rethink cloud security to get ahead of the risk curve by kurt johnson, vice p...
Rethink cloud security to get ahead of the risk curve by kurt johnson, vice p...Rethink cloud security to get ahead of the risk curve by kurt johnson, vice p...
Rethink cloud security to get ahead of the risk curve by kurt johnson, vice p...Khazret Sapenov
 
Regulatory compliant cloud computing rethinking web application architectures...
Regulatory compliant cloud computing rethinking web application architectures...Regulatory compliant cloud computing rethinking web application architectures...
Regulatory compliant cloud computing rethinking web application architectures...Khazret Sapenov
 
Memsql product overview_2013
Memsql product overview_2013Memsql product overview_2013
Memsql product overview_2013Khazret Sapenov
 
Managing application performance for cloud apps bmc
Managing application performance for cloud apps bmcManaging application performance for cloud apps bmc
Managing application performance for cloud apps bmcKhazret Sapenov
 
Green qloud up-con
Green qloud up-conGreen qloud up-con
Green qloud up-conKhazret Sapenov
 
Glenn solomon up presso d 3.pptx
Glenn solomon up presso d 3.pptxGlenn solomon up presso d 3.pptx
Glenn solomon up presso d 3.pptxKhazret Sapenov
 
Future of cloud up presentation m_dawson
Future of cloud up presentation m_dawsonFuture of cloud up presentation m_dawson
Future of cloud up presentation m_dawsonKhazret Sapenov
 
Efrat ip up con 2012 presentation
Efrat ip up con 2012 presentationEfrat ip up con 2012 presentation
Efrat ip up con 2012 presentationKhazret Sapenov
 

More from Khazret Sapenov (20)

V mware evolutionary cloud 12 2012
V mware evolutionary cloud 12 2012V mware evolutionary cloud 12 2012
V mware evolutionary cloud 12 2012
 
Virtual sharp cloud aware bc dr up 2012 cloud
Virtual sharp cloud aware bc dr up 2012 cloudVirtual sharp cloud aware bc dr up 2012 cloud
Virtual sharp cloud aware bc dr up 2012 cloud
 
Up2012edit daniel chalef
Up2012edit daniel chalefUp2012edit daniel chalef
Up2012edit daniel chalef
 
Up2012 scaling my sql in the cloud by moshe shadmon, founder, cto scaledb
Up2012  scaling my sql in the cloud by moshe shadmon, founder, cto scaledbUp2012  scaling my sql in the cloud by moshe shadmon, founder, cto scaledb
Up2012 scaling my sql in the cloud by moshe shadmon, founder, cto scaledb
 
Up 2012 smart cloud presentation_final
Up 2012   smart cloud presentation_finalUp 2012   smart cloud presentation_final
Up 2012 smart cloud presentation_final
 
Up 2012 wally mac dermid - final
Up 2012   wally mac dermid - finalUp 2012   wally mac dermid - final
Up 2012 wally mac dermid - final
 
Up 2012 dave jilk - multi-tenancy in paa s (distribution version)
Up 2012   dave jilk - multi-tenancy in paa s (distribution version)Up 2012   dave jilk - multi-tenancy in paa s (distribution version)
Up 2012 dave jilk - multi-tenancy in paa s (distribution version)
 
Transverse up cloud 2012 - final
Transverse   up cloud 2012 - finalTransverse   up cloud 2012 - final
Transverse up cloud 2012 - final
 
Transforming cloud infrastructure to support big data storage and workflows b...
Transforming cloud infrastructure to support big data storage and workflows b...Transforming cloud infrastructure to support big data storage and workflows b...
Transforming cloud infrastructure to support big data storage and workflows b...
 
The elephantintheroom bigdataanalyticsinthecloud
The elephantintheroom bigdataanalyticsinthecloudThe elephantintheroom bigdataanalyticsinthecloud
The elephantintheroom bigdataanalyticsinthecloud
 
Taking control of bring your own device byod with desktops as a service (daa ...
Taking control of bring your own device byod with desktops as a service (daa ...Taking control of bring your own device byod with desktops as a service (daa ...
Taking control of bring your own device byod with desktops as a service (daa ...
 
Rethink cloud security to get ahead of the risk curve by kurt johnson, vice p...
Rethink cloud security to get ahead of the risk curve by kurt johnson, vice p...Rethink cloud security to get ahead of the risk curve by kurt johnson, vice p...
Rethink cloud security to get ahead of the risk curve by kurt johnson, vice p...
 
Regulatory compliant cloud computing rethinking web application architectures...
Regulatory compliant cloud computing rethinking web application architectures...Regulatory compliant cloud computing rethinking web application architectures...
Regulatory compliant cloud computing rethinking web application architectures...
 
Memsql product overview_2013
Memsql product overview_2013Memsql product overview_2013
Memsql product overview_2013
 
Managing application performance for cloud apps bmc
Managing application performance for cloud apps bmcManaging application performance for cloud apps bmc
Managing application performance for cloud apps bmc
 
Making case up
Making case upMaking case up
Making case up
 
Green qloud up-con
Green qloud up-conGreen qloud up-con
Green qloud up-con
 
Glenn solomon up presso d 3.pptx
Glenn solomon up presso d 3.pptxGlenn solomon up presso d 3.pptx
Glenn solomon up presso d 3.pptx
 
Future of cloud up presentation m_dawson
Future of cloud up presentation m_dawsonFuture of cloud up presentation m_dawson
Future of cloud up presentation m_dawson
 
Efrat ip up con 2012 presentation
Efrat ip up con 2012 presentationEfrat ip up con 2012 presentation
Efrat ip up con 2012 presentation
 

Recently uploaded

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):comworks
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Mattias Andersson
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Mark Simos
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticscarlostorres15106
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubKalema Edgar
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfAlex Barbosa Coqueiro
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfjimielynbastida
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024The Digital Insurer
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsMemoori
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentationphoebematthew05
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Patryk Bandurski
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Enterprise Knowledge
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brandgvaughan
 

Recently uploaded (20)

CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):CloudStudio User manual (basic edition):
CloudStudio User manual (basic edition):
 
Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?Are Multi-Cloud and Serverless Good or Bad?
Are Multi-Cloud and Serverless Good or Bad?
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
Tampa BSides - Chef's Tour of Microsoft Security Adoption Framework (SAF)
 
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmaticsKotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
Kotlin Multiplatform & Compose Multiplatform - Starter kit for pragmatics
 
Unleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding ClubUnleash Your Potential - Namagunga Girls Coding Club
Unleash Your Potential - Namagunga Girls Coding Club
 
Pigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping ElbowsPigging Solutions Piggable Sweeping Elbows
Pigging Solutions Piggable Sweeping Elbows
 
Unraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdfUnraveling Multimodality with Large Language Models.pdf
Unraveling Multimodality with Large Language Models.pdf
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Science&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdfScience&tech:THE INFORMATION AGE STS.pdf
Science&tech:THE INFORMATION AGE STS.pdf
 
My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024My INSURER PTE LTD - Insurtech Innovation Award 2024
My INSURER PTE LTD - Insurtech Innovation Award 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort ServiceHot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
Hot Sexy call girls in Panjabi Bagh 🔝 9953056974 🔝 Delhi escort Service
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
AI as an Interface for Commercial Buildings
AI as an Interface for Commercial BuildingsAI as an Interface for Commercial Buildings
AI as an Interface for Commercial Buildings
 
costume and set research powerpoint presentation
costume and set research powerpoint presentationcostume and set research powerpoint presentation
costume and set research powerpoint presentation
 
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptxVulnerability_Management_GRC_by Sohang Sengupta.pptx
Vulnerability_Management_GRC_by Sohang Sengupta.pptx
 
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
Integration and Automation in Practice: CI/CD in Mule Integration and Automat...
 
Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024Designing IA for AI - Information Architecture Conference 2024
Designing IA for AI - Information Architecture Conference 2024
 
WordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your BrandWordPress Websites for Engineers: Elevate Your Brand
WordPress Websites for Engineers: Elevate Your Brand
 

What customers want the cloud to be - Jason Waxman GM at Intel, Cloud Slam 2012 Headline Keynote

  • 1. What Customers Want the Cloud to be. Jason Waxman General Manager, Cloud Infrastructure Group May 30, 2012
  • 3. Listening to Cloud Providers & Users Range of Cloud Service Providers With Broadest Array of OEM and ISV Collaborators
  • 4. Accelerating Adoption of Cloud Private Private Cloud Public Cloud Public Cloud Cloud Today: 14% Hybrid Cloud (Public + Today: 7% 2014: 42% Private) 2014: 23% >40% of IT operations1 35% by 20152 >40% of IT operations1 1. ODCA global member survey, Oct 2011, N=63 2. Gartner, Dec 2010, N=55 The Road Map From Virtualization to Cloud Computing (G00210845)
  • 5. Cloud Challenges Security Device Big Cost Threats Proliferation Data Efficiency
  • 7. Customer Security Concerns Public & Private Traditional Data Center Cloud Data Center Reduced physical control Increased multi-tenancy Reduced effectiveness of existing security tools IT Pro survey of key concerns: 61% 55% 57% Lack of visibility inhibiting Lack of control over data key Avoid putting workloads with private cloud adoption1 concern for public cloud adoption1 compliance mandates in cloud1 1 source: McCann “what’s holding the cloud back?” cloud security global IT survey, sponsored by Intel, May 2012
  • 8. The Need for End-to-End Security Solutions Secure Secure Secure Datacenters Connections Devices Interoperable, Open Industry Standards
  • 9. Securing the Datacenter Need for Greater Drives New Controls & Auditability HW and SW Capabilities Endpoint Aware Integrity Real-time Integrity Location Compliance Control Reporting Security Stack Integrity VM Integrity Location & Asset Control Real-Time Malware Host Integrity Monitoring Hardening External Assessment and Reputation Digital Certificates
  • 10. Optimized Client Security for Cloud Users Malware Identity Verification Data Protection Containment
  • 11. Example of Collaborative Security for a Virtual Cloud World Virtualized and Private Public Cloud Data Cloud Data Center Extended Security Policy Center Isolate, Protect, Control Vms Company Provide Visibility & A Mfg HR Sales Reporting Company Company B C VMM Apply Security Policy At Multiple Control Points Monitor Workloads Across Cloud Infrastructures McAfee ePO1 Intel Trusted Execution Intel Trusted Execution Technology is run: Technology is run: Server “Do not migrate to “known good” unknown server” 1 Integrating McAfee ePolicy Orchestrator (ePO) with Intel TXT requires custom integration work *McAfee MOVE AV = McAfee Management of Optimized Virtualized Environments Anti-Virus
  • 13. MANUFACTURING HEALTHCARE TRANSPORTATION ENERGY RETAIL Cloud 2015: 15 Billion Connected Devices1 PC, CE, PHONES COMMUNICATIONS 1 “Worldwide Device Estimates Year 2020 - Intel One Smart Network Work” forecast
  • 14. Device Proliferation Challenges The Perimeter is now the User and Data Customers Want Seamless Interoperability: Increasing Security & Liability Risks Services Span Range of Devices May 2010 May 2011 IDC information worker custom survey, sponsored by Unisys, May 2011 and May 2010 Q1 (2011); Q4
  • 15. Client Aware Cloud Compute HD or SD CAPABILITIES Graphics CONTENT Flash or HTML5 Media Compressed or Connectivity uncompressed Security Secure Content Location & Commerce Personalized CLOUD Balanced Optimized Services Compute Content
  • 16. Intelligent Connected Systems Analytics and Big Data Beyond Client Devices
  • 17. What is Big Data? Traditional Data Big Data Volume Gigabytes to Terabytes Petabytes and beyond Velocity Occasional Batch Processing Real-Time Data Analytics Variety Centralized, Structured Distributed, Unstructured i.e. Database multi-format Untapped Information
  • 18. Why is Big Data Important? US Healthcare Europe Public Sector $300 Billion in value/year 250 Billion Euros value/year ~ 0.7% annual productivity growth ~ 0.5 annual productivity growth Global Personal Location Data Manufacturing $150 Billion+ value for service providers Up to 50 percent decrease in Up to $700 Billion value to end users product development, assembly costs Source: McKinsey Global Institute Analysis
  • 19. Big Data Solutions: Volume Traditional Storage Distributed Storage Architecture Application Servers application storage client Metadata Storage Servers Servers SAN storage (Storage Area metadata services services Network)
  • 20. Big Data Solutions: Velocity In Memory Analytics Network Edge Analytics Stream Processing Analysis & Decision Support Applications Search and Analysis of 53 Million Analyze data as its Customer Records: From 2-3 Hours to 2-3 collected to make near Seconds!1 real-time decisions 1: Hilti Corporation case study
  • 21. Big Data Solutions: Variety Unstructured Distributed File Multi-format Data System & Map Reduce Tools 110100101010100 101010010101010 10101001 Data 010101010 1 Analytics Tools 0 1 0 1 0 110100101010 0 Structured Data Database 1 0 1 110100101010100 0 101010010101010 1101001 010101010
  • 22. Intel’s Big Data Strategy • Contribute code, promote development Enable the Apps and new research • Develop benchmarks; software Make it efficient optimization libraries Develop data • Continued compute, network and center architecture storage innovation Make it easier to • Publish reference architectures deploy Grow the • Education, common usage models, community open source standards bodies
  • 24. Cloud 2015 Vision FEDERATED AUTOMATED Share data securely across IT can focus more on public and private clouds innovation and less on management CLIENT AWARE Optimizing services based on device capability
  • 25. Goal of Datacenter Optimization Cost of Typical Major Internet Datacenter Facilities Other IT Address Networking 6% 5% 3% ~75% of Labor Ownership 13% Servers 50% Costs… Power 23% Source: Intel internal analysis, 2008 of 3 yr TCO …via optimized platforms & technologies Optimized Optimized Scalable Optimized Datacenter Silicon Technologies Software Systems Optimization
  • 26. Energy Challenges Age Distribution Energy Consumption Performance Capability of Servers of Servers of Servers >4 Years Old <4 Years Old 4% >4 Years Old <4 Years Old 32% 35% <4 Years Old 68% 96% >4 Years Old 65% Source: Intel analysis, 2012
  • 27. Value of Time-to-Market for Cloud Difference in early deployment Previous TTM Cost per Web Transaction Accelerated TTM Savings ~$750,000,000 Estimated Savings by Accelerating Latest Generation Servers Source: Intel analysis, 2012
  • 28. Enabling Open, Interoperable Solutions Standards Technology Partner Solutions Learn More at www.livestream.com/cloudslam & www.intel.com/datacenter * Other names and brands may be claimed as the property of others.
  • 29.
  • 30. Legal Disclaimers Software and workloads used in performance tests may have been optimized for performance only on Intel microprocessors. Performance tests, such as SYSmark and MobileMark, are measured using specific computer systems, components, software, operations and functions. Any change to any of those factors may cause the results to vary. You should consult other information and performance tests to assist you in fully evaluating your contemplated purchases, including the performance of that product when combined with other products. Intel does not control or audit the design or implementation of third party benchmarks or Web sites referenced in this document. Intel encourages all of its customers to visit the referenced Web sites or others where similar performance benchmarks are reported and confirm whether the referenced benchmarks are accurate and reflect performance of systems available for purchase. Relative performance is calculated by assigning a baseline value of 1.0 to one benchmark result, and then dividing the actual benchmark result for the baseline platform into each of the specific benchmark results of each of the other platforms, and assigning them a relative performance number that correlates with the performance improvements reported. SPEC, SPECint, SPECfp, SPECrate. SPECpower, SPECjAppServer, SPECjbb, SPECjvm, SPECWeb, SPECompM, SPECompL, SPEC MPI, SPECjEnterprise* are trademarks of the Standard Performance Evaluation Corporation. See http://www.spec.org for more information. TPC-C, TPC-H, TPC-E are trademarks of the Transaction Processing Council. See http://www.tpc.org for more information. Intel® Virtualization Technology requires a computer system with an enabled Intel® processor, BIOS, virtual machine monitor (VMM) and, for some uses, certain platform software enabled for it. Functionality, performance or other benefits will vary depending on hardware and software configurations and may require a BIOS update. Software applications may not be compatible with all operating systems. Please check with your application vendor. No computer system can provide absolute security under all conditions. Intel® Trusted Execution Technology (Intel® TXT) requires a computer system with Intel® Virtualization Technology, an Intel TXT-enabled processor, chipset, BIOS, Authenticated Code Modules and an Intel TXT-compatible measured launched environment (MLE). Intel TXT also requires the system to contain a TPM v1.s. For more information, visit http://www.intel.com/technology/security. In addition, Intel TXT requires that the original equipment manufacturer provides TPM functionality, which requires a TPM-supported BIOS. TPM functionality must be initialized and may not be available in all countries. Intel ® AES-NI requires a computer system with an AES-NI enabled processor, as well as non-Intel software to execute the instructions in the correct sequence. AES-NI is available on Intel® Core™ i5-600 Desktop Processor Series, Intel® Core™ i7-600 Mobile Processor Series, and Intel® Core™ i5-500 Mobile Processor Series. For availability, consult your reseller or system manufacturer. For more information, see http://software.intel.com/en-us/articles/intel-advanced-encryption-standard-instructions- aes-ni/ Intel processor numbers are not a measure of performance. Processor numbers differentiate features within each processor series, not across different processor sequences. See http://www.intel.com/products/processor_number for details. Intel products are not intended for use in medical, life saving, life sustaining, critical control or safety systems, or in nuclear facility applications. All dates and products specified are for planning purposes only and are subject to change without notice Copyright © 2012 Intel Corporation. All rights reserved. Intel, the Intel logo, Xeon and Intel Core are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. All dates and products specified are for planning purposes only and are subject to change without notice

Editor's Notes

  1. Presenter: Jason Waxman, GM, Cloud Infrastructure GroupTitle: The Future of Cloud SecurityAbstract:Security is the #1 cited customer concern preventing the broad adoption of Cloud Computing. Intel is changing the game with hardware enhanced security, combined with ecosystem software and services. Come hear Intel’s Cloud Infrastructure Group GM speak about Intel’s vision for the future of Federated, Automated, &amp; Client Aware Cloud Computing environments, better secured via hardware enhanced security. Jason will also provide a rare view into what we hear customers asking for in the Cloud Security space, and the broader industry trends that will shape Cloud Security moving forward. Immediately following this keynote, make sure to attend a customer panel discussion led by Intel.
  2. Key message: Amazing things are happening today thanks advanced Intel technologyGlobal IT Leaders are offering innovative new services that help consumers optimize and personalize their experience This helps consumers navigate a growing array of choices to makes businesses easier to do business with than ever before. Evolving usage models mean that instead of having a bank in every town, we have ATMs in every grocery store and now thanks to smart devices and the cloud we can have a bank in our pocket, right next to our own music store, library and movie theater. We’ve gone from having a wrinkled out of date map of one city stuffed into our glove box, to having an in dash navigation system that not only covers the world, but gives us real time traffic updates and helps us avoid construction. Beyond the sheer usefulness of these new services, this also gives business the ability to form deeper relationships with consumers to drive revenue and margin growth. Business must offer amazing experiences not just to consumers, but to their employees. Researchers, product developers, doctors and content creators all can benefit from the new era of the cloud. Businesses must increase the productivity of their workforces and unlock creativity with powerful workstations that offer near real-time rendering of complex images, and high performance cluster to mine the explosion of data to draw new insights into their customers to offer personalized services. The cloud and increased analytical capabilities available today help them achieve this. Beyond this business can offer more automation to speed application deployments and offer automated provisioning of services and line of business chargebacks based on usage to improve the impact and efficiency of their infrastructure. In total these experiences offer exciting new opportunities for businesses, for IT departments and for telecommunications service providers.
  3. Intel has the broadest base of cloud providers, OEM and ISV partners who we listen to , so that we can understand what the challenges IT is facing today which we then build into our product design plans and research goals.
  4. One of the big things we are hearing from customers and analyst is the continued excitement around the agility and efficiency that a cloud architecture can provide which is driving rapid adoption in the cloud, as well as increasing experimentation in a hybrid model to link public and private clouds.
  5. But to achieve this rapid growth we as an industry need to focus on addressing several challenges. First one of the top priorities in IT today is security concerns, and this is often viewed as a key hurdle to moving to a hybrid cloud model. Another key challenge is the explosive increase in the number of devices connecting to the cloud, and sheer amount of data being generated today. Finally IT shops of all sizes continue to be under tight budget pressure. Intel is focused on addressing these challenges and I’d like to spend some time today explaining our view on these major trends.
  6. Let’s start with secuirty…
  7. Key Message: Cloud security remains one of the top barriers to the adoption of cloud computing and drives a need for new and broader security measures that go beyond traditional enterprise IT security tools and practices. In traditional IT environments, IT infrastructure sits behind the organization’s firewall and equipment that maybe virtualized, or partitioned to handle multiple applications on a single servers, are typically dedicated to a specific line of business. IT professionals can choose from an arsenal of mature security tools that give them a high degree of control over the security environment and the organization’s compliance with regulatory mandates.  With cloud infrastructure, in contrast, servers are typically virtualized and shared across multiple lines of business or even among multiple organizations rather than dedicated to specific lines of business. When IT wants to link multiple cloud data centers together to gain efficiencies—linking a public cloud data center based in Singapore, for example, with their private cloud based in the UK—the tools to secure this far-flung infrastructure are still evolving. The result is that IT loses a degree of control and visibility into workloads and data. This makes it difficult for IT professionals to determine whether the organization is meeting specific compliance requirements, which, in turn, lessens their confidence in security across cloud environments. And it’s not just about the challenges in managing cloud datacenter security, but IT also has other concerns: are the right people accessing the right data, are the devices accessing cloud services protected against new types of malware, is my email and web traffic safe when, for example, I send sensitive email or publish documents onto a public cloud storage service.
  8. Key message: Data must be protected not only in the data center, but in transit over the network, and while on end user devices. Also need the interoperability of open industry standardsThere are 4 areas we are focused on in delivering better security for cloud environments – securing cloud datacenters, securing the network connections, and securing the devices that connect to cloud services. The 4th area is focused on accelerating the development of unified standards for cloud security and enabling a broad range of open, interoperable security solutions via industry collaboration. We are focused on delivering hardware-enhanced security that combines with software and services to deliver stronger, more tamper proof security for cloud environments. I’ll give some examples today and we will be adding more over time. 1. In terms of securing cloud datacenters, our focus is on improving the integrity of the infrastructure while focusing on protecting data, and delivering capabilities to make it easier to audit cloud environments to meet compliance requirements.2. Securing the connections is about protecting data, email and web traffic and applications in flight being transferred between devices and datacenters.3. Securing the devices focuses on ensuring the right people are accessing the right information. It also means knows if the devices are secure and free of new forms of malware when accessing cloud services and it’s about protecting data that resides on the device. 4. Finally, Accelerating the development of consistent security standards that will make it easier for businesses to deploy cloud computing and compare cloud service security levels, along with our collaboration with the broad ecosystem of systems and software providers to enable open, interoperable solutions for cloud security.
  9. Key Message: In terms of securing cloud datacenters, our focus is on improving the integrity of the infrastructure while focusing on protecting data, and delivering capabilities to make it easier to audit cloud environments to meet compliance requirements.IT managers need their datacenter infrastructure to be protected from malicious attacks, and be able to meet all regulatory and audit compliance requirements, which often mean identifying where data is residing and to keep track of all this real time. To the right you can see some of the specific technologies to help meet this challenge. The bottom 2 items are somewhat common today—digital certificates &amp; you if have a tool like McAfee SiteAdvisor that can tell you if a site has been examined for malicious activity. Today, this is essentially all the information you can have when making a connectivity decision. Over time, we will be looking for capabilities to use silicon enhancements to provide stronger, more efficient tools for enforcing controls and allowing more visibility into the protection profiles of cloud-based devices.Feature reference:Server Host integrity – the ability to determine if the cloud-based server was launched into a “known good” state. Intel can provide this today with hardware-based surety via Intel TXTLocation and Asset Control – ability to create location or other physically descriptive boundaries based on system characteristics. Useful for boundary control compliance requirements. Intel can provide this today with hardware-based surety via Intel TXTVM Integrity – The ability to verify that a VM has not been compromised by comparing it to “known good” instances at launch time. McAfee can provide a software whitelisting capability that supports this today and there is potential future benefit for having hardware capabilities to enhance measurement and reporting of the VM imagesSecurity Stack integrity – the ability to assure that the critical security systems protecting infrastructure, workloads and data is operational and up-to-dateReal time integrity – provides continuous monitoring of the critical software in the run time environment. Meets needs for continuous monitoring capabilities specified in a number of environments, such as FedRAMP government recommendationsEndpoint aware integrity - establishes a mechanism for mutual verification of trust and integrity between client and cloud to allow for bi-directional control of access to cloud resources
  10. Key Message: Securing the devices focuses on ensuring the right people are accessing the right information. It also means knows if the devices are secure and free of new forms of malware when accessing cloud services and it’s about protecting data that resides on the device.
  11. Key Message: Intel &amp; McAfee are partnering to provide more points of visibility and control -- across hardware, software and cloud – to enable good security decisions and establish confidence in the cloud as infrastructure.Ideally, IT and security managers can have common capabilities that allow them to have common security capabilities that can span their IT infrastructure types and give them the required controls to manage it all with a uniform security policy framework. Some of the new and extended capabilities they need to put into security management capabilities to address new virtualized or cloud-based multi-tenant models include technologies such as Intel Trusted Execution Technology (TXT) and Intel Virtualization Technology (VT) that can provide hypervisor and virtual machine protection and control points. Intel TXT can also be used to expose platform trust status for reporting dashboards and audit tools to increase visibility into the virtual/cloud infrastructure. Similarly, McAfee has optimized Antivirus via the Management of Optimized Virtualized Environments Anti-Virus, or MOVE AV, solution to enhance the efficiency of anti-malware for the unique needs of virtualized environments. We find traditional AV is often in use in these environments because conventional IT policies state anti-malware solutions as a requirement. The problem is that it results in unpredictable spikes in CPU utilization and high memory utilization. MOVE AV provides optimum protection from malware and advanced threats without the overhead of traditional based anti-malware solutions, helping organizations to better maximize server density and cloud efficiency gains. McAfee ePolicy Orchestrator (ePO) provides a control point for evaluating and enforcing security rules and policy in server and client platforms.These ingredients come together to highlight the complementary nature of the Intel and McAfee portfolio. Today Intel &amp; McAfee will demonstrate a cloud-to-client security solution that shows how Intel hardware security and McAfee technologies can be used to implement security policy based on platform integrity. In this demonstration, a cloud security integrator called Trapezoid Digital Security Services used commercially available platforms to build a solution that controlled access to sensitive resources based on either client or cloud host integrity.
  12. Non traditional devices are becoming connected and delivering real time data and solutions across many key segments. “if it consumes power,  it will compute,  if it computes, it will be connected.” 
  13. It’s not just about “a” platform anymore. It’s about the overall experience and services the user wants.Consumption is key. If you make it too painful or cumbersome, your consumerization efforts will fail.Key Point: IT consumerization isn’t going away … it will continue to grow and will continue to be a challenge for IT. Cloud provides a platform to provide access to corporate data and applications from anywhere at anytime to meet the challenges of IT consumerization. (1) Devices are changing; (2) Software on these devices are changing. IT consumerization will continue to be a challenge for IT. Computing is moving beyond the PC into a wide range of “smart” devices, driven by the Internet and the need and desire to be “always connected.” New device categories are emerging at a rapid pace to bring computing experiences into every aspect of our lives. Employees ultimately want to have consistency and interoperability across all of their devices, from phone to PC to tablet to TV to gadget, making computing a seamless experience regardless of where you are, what you are doing or what your needs at the time may be. To support IT consumerization, IT is shifting focus to deliver services to any device. By taking advantage of a combination of technologies and trends—such as ubiquitous internet connectivity, virtualization, and cloud computing—we have an opportunity to redefine the way we provide services to meet changing user requirements.
  14. A key element of Intel’s cloud 2015 vision is that cloud services will be client aware. Client aware means that cloud services will be able to both recognize and where appropriate, capitalize on the combined capabilities of the cloud data center and the client device to optimize the deliver of cloud services. Intel’s is delivering client aware technology that will enable web developers and cloud service providers to optimize their services by detecting the compute, graphics as well as network connectivity and remaining battery life for a given users device. This new breed of Client Aware cloud is based on Intel software and hardware on the device, across the network, and in the cloud. By taking advantage of these capabilities, cloud developers can enable services that capitalize on the on compute, context and capabilities making the cloud services secure and smart. Benefits can be measured in an enhanced end user experience, increased efficiency of enterprise resources and stronger security for cloud based services. Examples applications can benefit from taking advantage of client performance include. Personalized Services – 4x (Java Script) -15x (web GL) compared to current browser performance) Faster achieved with multi-core enhanced web delivery to overcome traditional sequential processing as demonstrated at IDF 2011http://software.intel.com/en-us/videos/faster-web-apps-with-data-parallel-java-script-reasearchintel-days-2011/Balanced Compute - Cloud Builders RES - 5xFaster HTML Rendering (local rendering verses cloud) some apps make more sense to run locally (graphical web pages). redir. http://www.intelcloudbuilders.com/docs/Intel%20Cloud%20Builders_RES_July2011.pdfOptimized Content - 2x (compared to prior generation Core) faster media transcoding Intel® Quick Sync as demonstrated @ CES 2011http://www.youtube.com/watch?v=TfANycNU7h8
  15. “Big Data” is a term that captures three differences from traditional data:Volume – the sheer scale of datasets is now measured in Petabytes vs the more traditional Gigabyte sizedVelocity – The pace of business is accelerating so IT needs to provide analytics in near real time vs being able to do batch runs overnight Variety – A lot of interesting data about customers is in social media or other non traditional formats that are not easily captured in transactional database
  16. This is important as it will create opportunities in every industry and will become a key differentiator between competitors.Other ideas – A/B testing analytics increase Obama campaign donors 30% http://www.wired.com/epicenter/2012/04/ff_abtesting/all/1
  17. Intel data: Data Compression 80% Reduction w/ new Intel based storage solutionsAmplidata:Policy-Driven Storage Durability• “Ten 9’s” of Durability (99.99999999%) and beyond through policies• Eliminates the reliability exposures of RAID on high-density disk drives• Eliminates data corruption or loss due to bit errors• • 50-70% reduction in TCO• Storage footprint (Capex), power, data center space &amp; management costsLustre source: Terascala marketing material provided by Greg Scott1000s of Nodes &amp; &gt;200GB’s/sec performance
  18. In Memory Analytics – SAP HANA example of putting an entire database into a large memory systemNetwork edge – Guavus example of pushing data analytics to the edge devices to allow for more rapid responses
  19. Two paths for data today – traditional transaction data moves into standard relational databases for analysis, but now unstructured data from a variety of sensors and sources can be sorted/reduced in a distributed file system to also feed modern analytics engines.
  20.  Keep it open: contribute opens source and ity and enable development and research on the hadoop distribution and uses (like machine learning / mahout)Make it efficient: develop benchmarks and work to improve the scalability and tuning of the code – take advanteage of Xeon, platform featuresDevelop datacenter architecture for hadoop: Big vs small core, fabric integration, flash in platform, etcMake it easier to deploy: development of reference architecturesGrow the community: education, usages model development and integration with traditional data connectorsMake it easy to deploy: Develop reference architectures and POCsMake it efficienct: Drive industry benchmarking suites (such as Hi-Bench for Hadoop)Create usage models to help define requirements; Security, manageability and interoperabilityGrow the community: Address skill set and implementation challenges in enterprise IT environments
  21. Key Message: Intel continues to execute to our cloud vision 2015 To help IT achieve the scale they need to meet the challenges of today, Intel is focused on our vision of the next generation data center. Intel’s cloud vision 2015 is grounded on three key concepts:Federated: allows you to share data securely, spanning public and private clouds. Automated: Dynamically allocate resources, including automation of provisioning, resource monitoring Client aware: optimize cloud services based on the combined capabilities of the cloud data center, communications infrastructure and the device accessing those services. To achieve this vision requires advancements in performance, security, energy efficiency and I/O capabilities. For example as we’ve discussed before every 600 new smartphones or 122 new tablets require 1 server be added to cloud to provide the compelling user experience that consumers demand.Intel believes a similar evolution to cloud will occur in the communications network with vendors moving away from proprietary architectures to more open platforms, that systems will utilize Intel&apos;s cloud technologies to consolidate applications on these platforms, and that new services and applications will be deployed to enhance the user experience and increase revenue to the service providers.
  22. Additional resources for high ROI, large scale deployments*Software tuning (SSG), Power mgmt (EPI), Datacenter design consulting (DCAT), HW customization (DCG - HDC)Criteria for add’l resources / supportSize of project &gt;1k servers and/or &gt;$2M Intel revenuesFuture growth opportunity – projected volumes/revenues in next 2-3 yearsIntel share of wallet opportunity – deep engagement with tipping point customerIntel ROIUse the request form at http://xyz.comContacts if want to submit request for additional resources:Hosters / Telco service providers – Adarsh SogalTop 5 internet companies – Sanjeev KhannaEmerging internet companies – Brad ShaferGeo contacts:ASMO: Eric Doyle; EMEA: Alan Priestley; APAC: Dave Chee; China: Evan Zhao; IJKK: Eiji Taguchi
  23. The energy challenges faced by datacenters worldwide are well known and well documented. But among the most advanced datacenters and IT experts in the world – there is significant room for improvement in addressing energy challenges. Here is just one datapoint from a recent energy audit Intel completed with a Fortune 100 company – which we believe to be fairly typical of even technically advanced datacenters. In this study – we found 32% of servers were over 4 years old. But these servers were consuming up to 65% of the total server energy. But even more significant – these older servers were only contributing 4% of the compute performance to the server infrastructure. It’s a great example of why energy efficiency is so important to every CIO – this translates directly into dollars and cents…Talking Points: Core Silicon: Relentless improvements in performance/watt &amp; low-power SKUs - 51% improvement in perf / watt in one generation1Software &amp; Firmware: System instrumentation &amp; value-added middleware to monitor &amp; manage node, rack &amp; row power - Increase rack density up to 40%2System Design &amp; Datacenter Operations: Products and system designs optimized for high-ambient temperature operations. Est. 4% cooling cost savings for every 10C increase in ambient temp31 Performance comparison using SPEC_Power results published as of March 6th, 2012. See back up for configuration details. For more information go to intel.com/performance2 Intel/Baidu Case Study3 Source:http://www.datacenterknowledge.com/archives/2008/10/14/google-raise-your-data-center-temperatureBackground on source of pie chart data:We had inventory details for 2009, 2010, and 2011 from the customer.   There was ~ 1200 servers/blades in their population.  The oldest servers dated back to 2000.  Using the identification names for each server, we were able to estimate the date that the servers were installed.  We were also able to look at the change in inventory from year to year to determine the installation dates. Using information from Spec.org and other web sources, we estimated the peak performance and peak power consumption for 2S servers/blades for each year.   Because we were interested in computing their capacity, so we used peak numbers for both power and performance.   At the same time, we had an electrician take measurements of every circuit break (~400) in all the PDU’s so we had actual power consumption data for each rack.  We did not use the actual readings because the racks were populated with more than 1 server and server type, so we couldn’t get a 1:1 correlation, but we could use the data to cross check our assumptions.   For example, there were 4 ALPHA systems of 2000 vintage installed in 2 racks.  The two racks measured 2500W each, so we knew the ALPHA systems were consuming about 1200W each and we could take a judgment for those systems.   I would expect this data set to be different than our own IT data- in the slice labeled “2007 and earlier”, of the 387 servers, 155 were 2000-2002 vintage which had poor relative performance and terrible power efficiency.  The “2008-2009” slice represents 50 servers of the 1200 in total, therefore the power and performance numbers look much smaller simply because of the qty.     This skews the pie slices, but at the same time, it reflects reality.  Corporate data centers have old HW that they can’t shutdown because of the nature of the app, and companies were cautious with investments in 2008 and 2009.     In contrast, Intel IT decommissions anything older than 6 or 7 yrs, they have a more uniform population yr to yr, and they have a more uniform mix of equipment than this corporate data center.  
  24. Intel recognizes the challenges and opportunities of cloud computing – but we approach these in unique way. Intel is often perceived as semiconductor company – but we recognize that it takes far more than products to address industry challenges such as cloud computing. Intel approaches these issues holistically across requirements, technology enabling, and solution level reference architectures with partners. Specific to the cloud – we are rallying the ecosystem to enable and deliver  open, interoperable cloud solutions. We start by driving deep engagements with IT and service providers to understand their requirements and often this means partnering to develop industry standards. Intel responds to these usage models and others that we identify through our end user engagements to deliver products and technologies that meet the requirements of the usage models. And to turn concept to reality – we collaborate with ecosystem leaders to bring solutions to market and define best practices for making these usage models deployable today and optimized for Intel Architecture..