3. Other names and brands may be claimed as the property of others
Sort 1TB of Data:
7 MINUTES
Sort 1TB of Data:
>4 Hours
The Power of Re-imagination
Data center Solutions: Big Data Example
Intel® Xeon®
E5-2690 processor
Intel® SSD
520
series
Intel® 10GbE
adapters
Intel® Distribution
for Apache
Hadoop*
4. But….Datacenter Operations Under Stress
Server
Average utilization <50% despite
virtualization4
Network
2-3 weeks to provision new services1
Storage
40% data growth CAGR, 90% unstructured3
1: Source: Intel IT internal estimate
2: Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2012–2017
3: IDC’s Digital Universe Study, sponsored by EMC, December 2012
4: IDC Server Virtualization and The Cloud 2012
5. Which has Seismic Effects on the CIO
CIO on the hook…
• 5x9’s Reliability & Availability
• New: Public Cloud Economics
• New: Extreme Flexibility and Agility
Business Expectations
• Consumer-like expectations
• Tech-savvy
• “outside” alternatives
6. Software Defined
Infrastructure
DYNAMIC. AUTOMATED. FEDERATED
Datacenter Today
Time to Provision New Service:
8+ Weeks1
Time to Provision New Service:
Days/Minutes1
1: Source: Intel IT internal estimate
Re-architect the Datacenter
RIGID. LABOR-INTENSIVE. SLOW
SERVICE
7. Re-Architecting for Software Defined Infrastructure
Composable Resources
Network Storage Server
Dynamic, automated Infrastructure
8. Networking:
Dynamic, standards based
Standards based, SW defined
Composable Resources
Storage:
Storage as a service
Server
Dynamic resource allocation
Memory ComputeI/O
App AppApp
Pooled
Compute
Pooled
Memory
Pooled
I/O
App
Manual to Automated
Static, Purpose built to Dynamic, Composable
Warm
Hot
Cold
server
server
server
server
server
HPC
OLTP
Offic
e
Prod.
Firewall Message
Router
PE Router
DPI
Firewall
Message
Router
Virtual fabric
9. Diversity of Datacenter Workloads
Break down silos
Automate Services and Infrastructure
Simplify deployment and maintenance
10. Breaking down silos
Intel Covering the Full Solution Space
Greater Efficiency through App Optimization & Arch Consistency
Efficient Performance
Dense Efficient
(Integer)
Dense Parallelism
(Vector)
Expandable Performance
11. Automate Services and Infrastructure
Independent Telemetry, Metrics & Sensors
Power
Delivery
Cooling &
Airflow
Utilizatio
n
Physically-oriented security:
Air gaps for security zones,
1:1 workload to system relationships, limited threats
Automated compliance to SLA
Automated audit
Automated Geo-fencing
Automated workload placement
Automated power/cooling
12. Automate Services and Infrastructure
Power Management
Intel® Xeon® processor-based
servers
with
Intel Node Manager firmware
Power management
consoles
with
Intel Data Center Manager software
40%
More rack density
15-17%
Reduction in
datacenter power
13. Visibility Control Compliance
IT manager
VM VM
IT manager
Policy: sensitive
FISMA VM
requires trusted
host, requires
US host
Automate Services and Infrastructure
Trust and compliance
HW based platform integrity
Store/report location
Trust status and asset descriptor
control virtual workloads
Trust status and asset descriptor
assert policy
Verify controls
14. The End Game
Agility Automation Efficiency
From silos to standards based software on high-volume servers
Ongoing security & operational telemetry assists automation
17. Client to Cloud Security Demo
Trust
Control
Configuration
and Event Data
to EPO
Policy to
Client
Trust Data
Placed in EPO
Trust Data
from vSphere Policy
Enforcement
Web
Apps
Web
Apps
Server-Side
Enforcement
Client-Side
Enforcement
Intel TXT Integrity
McAfee Deep
Defender
Integrity
McAfee ePO
Policy
Management
Non-Intel TXT
Migration to
Trusted
Server is OK
Migration to
Untrusted
Server is
Restricted
ePO Serves
as Policy
Enforcer
Trapezoid
extracts TXT
values and uses
them as trust
control triggers
Trusted Client is
allowed access
only to apps on
Trusted Servers
SEIM Logs
and Shows
events
Enforce policies:
1. Block access to
trusted host
workloads from low
integrity clients
2. Block access from
High integrity clients
to workloads on
untrusted host
• Uses McAfee ePO to enforce security policies across data centers & client devices
• Demonstrates use of Intel® TXT for enhanced server integrity1
• Highlights client policy enforcement & integrity using McAfee Deep Defender
• Video Demo: http://www.intel.com/content/www/us/en/enterprise-security/enterprise-security-txt-client-to-cloud-
video.html
1 Integrating McAfee ePolicy Orchestrator (ePO) with Intel TXT requires custom integration work
19. Apache Hadoop Performance Test Configuration
4 hours to 7 minutes
Cluster Configuration
1 Head Node (name node, job tracker)
10 Workers (data nodes, task trackers)
10-Gigabit Switch: Cisco Nexus 5020
Software Configuration
Intel Distribution for Apache Hadoop 2.1.1
Apache Hadoop 1.0.3
RHEL 6.3
Oracle Java 1.7.0_05
Head Node Hardware
1 x Dell r710 1U servers
Intel: 2x3.47GHz Intel® Xeon®
processor X5690
Memory: 48G RAM
Storage: 10K SAS HDD
Intel® Ethernet 10 Gigabit SFP+
Intel® Ethernet 1 Gigabit
Worker Node Hardware
10 x Dell r720 2U servers
Intel: 2 x 2.90Ghz Intel® Xeon® processor E5-2690
Memory: 128G RAM
Storage: 520 Series SSDs
Intel® Ethernet 10 Gigabit SFP+
Intel® Ethernet 1 Gigabit
Results have been estimated based on internal Intel analysis and are provided for
informational purposes only. Any difference in system hardware or software design or
configuration may affect actual performance. Software and workloads used in
performance tests may have been optimized for performance only on Intel
microprocessors. Performance tests, such as SYSmark and MobileMark, are
measured using specific computer systems, components, software, operations and
functions. Any change to any of those factors may cause the results to vary. You
should consult other information and performance tests to assist you in fully evaluating
your contemplated purchases, including the performance of that product when
combined with other products. www.intel.com/performance