In this presentation we have gathered the most important technology trends related to infrastructure and operations including end user devices revolution (BYOD, etc.), new HW advances (GPGPU, ARM servers), Open Source, Cyber security and cloud.
Powerful Google developer tools for immediate impact! (2023-24 C)
Stki summit2013 infra_pini sigal_mega_v10 final
1. Changing STKI
Data Center Summit
2013
Pini Cohen
Sigal Russin
IT at the crossroads:
Lead, follow or get out of the way
2. Pini Cohen and Sigal Russin’s work/
Copyright@2013
Do not remove source or attribution from any
slide, graph or portion of graph
2
3. Agenda
Technology
Mega Trends Domain Trends
Pini Cohen and Sigal Russin's
work Copyright@2013
Do not remove source or
3
attribution from any slide, graph
or portion of graph 3
4. The New ITOperations-different thinking
• 18 Million Visitors, 10x Growth,12 Employees, 410 TB of Data Pinterest
• An organization with 2 backend engineers can now scale a Instagram
system to 30+ million users.
• ~1000 hardware nodes in production and ~20 engineers Tumblr
• Continuous deployment happens 25 times a day because it’s so Etsy
easy.
• No architects, engineers work across the entire stack. You own TripAdvisor
your project end to end, and are responsible for design, coding,
testing, monitoring. Most projects have 1-2 engineers.
Amazon
• You build it, you run it
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 4
5. Domains of change
• Focus on generating business value through agility and flexibility
• Move to distributed architectures
• Move away from ownership as a core competency
• Separation of concerns along services boundaries
• Decentralization and reorganization of processes around services
• Push of responsibility to as close to the developer as possible
Source: http://highscalability.com/blog/2012/5/7/startups-are-creating-a-new-system-of-the-world-for-it.html STKI modifications
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 5
6. Old Datacenter New Cloud Datacenter
Licensed and Installed Applications SaaS (Workday, Pagerduty, EMR)
Central SQL Database Distributed Key/Value NoSQL
Source: http://highscalability.com/blog/2012/5/7/startups-are-creating-a-new-system-of-the-world-for-it.html STKI modifications
Sticky In-Memory Session Shared Memory Cache Session
Tangled Service Interfaces Layered Service Interfaces
Instrumented Code Instrumented Service Patterns
Fat Complex Objects Lightweight Serialized Objects
Components as Jar Files Components as Services
Chatty Protocols Latency Tolerant Protocols
Manual and Static Tools Automated and Scalable Tools
Pini Cohen and Sigal Russin’s work/
Copyright@2013
Do not remove source or attribution from any
slide, graph or portion of graph
6
7. Old Datacenter New Cloud Datacenter
SA/Database/Storage/Networking Admins NoOps/OpsDoneMaturelyButStillOps
Source: http://highscalability.com/blog/2012/5/7/startups-are-creating-a-new-system-of-the-world-for-it.html STKI modifications
Monolithic Software Development Teams Organized around Services
Monolithic Applications Building Your Own PaaS
Static and Slow Growing Capacity Incremental and Fast Growing Capacity
Heavy Process/Meetings/Tickets/Waiting Better Business Agility
Single Location Massive Geographical Distribution
Vendor Supply Chains Direct to Developer
Focus on How Much it Costs Focus on How Much Value it Brings
Ownership/CapEx Leasing/OpEx/Spot/Reserved/On Demand
Pini Cohen and Sigal Russin’s work/
Copyright@2013
Do not remove source or attribution from any
slide, graph or portion of graph
7
8. You need to change!
Source: http://www.forbes.com/pictures/eghe45eefgi/16-things-to-think-about-when-youre-considering-a-career-change/
Pini Cohen and Sigal Russin's
work Copyright@2013
Do not remove source or
attribution from any slide, graph
or portion of graph 8
9. Traditional IT is changing
LOB LOB LOB Enterprise
CIO Procurement
OCIO IT Procurement
Software Development IT Infrastructure
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 9
10. The next IT Organization
Line of Businesses Pay per Software House
Use
Enterprise Procurement IT Delivery Services
Managed
Services
Pini Cohen and Sigal Russin's
work Copyright@2013
Do not remove source or
attribution from any slide, graph
or portion of graph 10
11. The new CIO/VPTech has to become:
An internal strategic consultant more like (the model) HR, legal, financial
VPs.
That will help the business move from enterprise IT productivity to business
productivity
Develops the Enterprise Digital Strategy that builds value through
innovation:
Technology solutions for the LOBs and manages the business change needed
(new business processes)
Leadership in tablet efforts because business-driven tablet programs will
uncover transformative opportunities
Defines and implements technology (used by the clients of the enterprise)
in order to increase revenues
Dr. Jimmy Schwarzkopf’s work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 11
12. IT Delivery Services Department
IT Delivery Services move:
from an infrastructure-component focused IT that is expensive to
sustain and maintain
to one focused on end-to-end service management, user
experience and “fair” chargeback policies
Datacenter transformation, consolidations, vendor
management, cloud, and application rationalization mandate:
Formal governance structures for operational risks.
Automation of management and control functionalities
Secure access of users based on location and function
Charges for “real” metered service delivery
Validates, audits, protects, backups data
Validates cloud provider service levels (SLAs)
Dr. Jimmy Schwarzkopf’s work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 12
13. The new InfrastructureDelivery manager has to deliver:
• Enable consumerization (BYOEverything)
• Business enablement with best of class technologies. Examples:
• Follow Software Defined X
• Take advantage of new HW technologies (in memory, GPU, ARM servers)
• Big Data
• Manages operational risk, security and cyber for all technologies the enterprise uses
• Infrastructure investment model – continues cost reduction
• Manages the IT Department as an IT vendor with new InfraOps delivery model:
• Private Cloud, automation, self service and chargeback tools
• Embrace infrastructure as code
• Deploy public cloud when possible
Pini Cohen and Sigal Russin’s work/
Copyright@2013
Do not remove source or attribution from any
slide, graph or portion of graph
13
14. Agenda
BYOEverything Security
Business
Consumerization &
enabling
Cyber
technologies
Infrastructure The new
investment infraops
model-cost delivery model
reduction
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 14
15. Consumerization of IT (CoIT)
• This mega trend is more than a decade old.
• People are resourceful. They’ll find what they need to be
successful. They’ll bring what they need to drive the
business forward.
• Whether it’s the proliferation of mobile devices or on-
demand software, business people are driving IT.
• Most companies allow for it. Few can effectively deliver
applications or governance to support it.
BYOE
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 15
16. Implications of the changing endpoint paradigm
• The new endpoint experience
• BYOD
• What will happen to the suppliers
Changing business model
• New Application development technology and functionality
SW distribution – APP stores
BYOE
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 16
17. Source: cisco survey BYOD 2012
BYOE
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 17
18. BYOE
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 18
19. BYOE
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 19
20. BYOE
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 20
21. BYOE
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 21
22. KSP is selling tablets and smartphones
BYOE
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 22
23. Bring Your Own Device
• It is happening?
• Does your organization support BYOD devices (smartphones)?
Source: http://blogs-images.forbes.com/johnherrema/files/2012/03/BYOD-support.jpg
BYOE
Source: GOOD technologies survey 2012
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 23
24. BYOD Usage and Policies
Do employees access Does your organization have a
business information BYOD policy to access business
using personal devices? information?
BYOE
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 24
25. BYOD Risk Classification
Information security
Employee privacy
Software Licensing - Is software acquired by the
business be installed on BYOD device?
Damage to the BYOD device by business IT – who is responsible?
Technological risk –the more connections you have the lower
performance (applications, SSL VPN, WI-FI)
Is there any increase in human Resources with BYOD?
Increase the use of identity access management tools BYOE
Pini Cohen and Sigal Russin's
work Copyright@2013
Do not remove source or
attribution from any slide, graph
or portion of graph 25
26. BYOD
Bring Your Own Device
Saving in Where to
outlay on IT A policy Start?
items document
on BYOD Supported Devices
Access Permission
Productivity Using VPN
Security Set passcodes BYOE
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 26
27. BYOE
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 27
28. BYOD
Bring Your Own Device Policy
What types of devices (version of the operating system) can
access to business resources
Which Access level your different groups of users require
What applications are required for a user.
A VPN is required for personnel likely to be using public Wi-
Fi networks.
Educate users about the importance of setting passwords
and passcodes BYOE
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 28
29. Access business information using BYOD
האם בארגונכם מאפשרים סנכרוןחיבור מכשירים חכמים
? )טלפון פרטיים למאגרי מידע בארגון (אימייל, אפליקציה
31%
לא
Source: current Analysis inc. BYOD survey
69%
כן Source: STKI RT MDM BYOD Survey FEB 2013
BYOE
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 29
30. MAC
MAC האם בארגונכם מאפשרים סנכרוןחיבור
?)פרטיים למאגרי מידע בארגון (אימייל, אפליקציה
75%
לא
25%
כן
Source: STKI RT MDM BYOD Survey FEB 2013
BYOE
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 30
31. BYOD Policy
האם בארגונך קיימת מדיניות ברורה בנושא של
?- יישומים מותר להתחבר ולאיזה אסורBYOD
25%
בתהליך
44%
לא
31%
כן
Source: STKI RT MDM BYOD Survey FEB 2013
BYOE
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 31
32. BYOD importance
Source: STKI RT MDM BYOD Survey FEB 2013
BYOE
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 32
33. MDM process
האם ארגונכם הטמיע/נמצא בתהליך הטמעת מוצר
או פתרוןMDM ( אבטחת מידע/ניהול למובייל
?)דומה
Source: STKI RT MDM BYOD Survey FEB 2013 BYOE
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 33
34. Privacy employee concern
האם קיים בארגונך חשש מפגיעה בפרטיות
?MDM העובד בעת שימוש בכלי מסוג
Source: STKI RT MDM BYOD Survey FEB 2013
BYOE
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 34
35. 1102 Important issues when choosing MDM solution
תמיכה במגוון מערכות הפעלה 3
אכיפת מדיניות ארגונית על המכשיר 1
אבטחת מידע על המכשיר (ססמאות, )AV ,FW 2
הפרדת המידע הארגוני מהמידע הפרטי על המכשיר 4
ניהול מצאי, קונפיגורציה ו Imageשל המכשיר 6
יכולות הפצת תוכנה ואפליקציות למכשיר 8
ניהול מרכזי ואינטגרציה למערכות ארגוניות 5
יכולות תמיכה ותפעול מרחוק של המכשיר (למשל לצרכי )HelpDesk 6
יכולות דיווח וניהול הוצאות כספיות הקשורות למכשיר (למשל: התראות על נדידת רשתות בחו"ל) 01
ארכיטקטורת הפיתרון ( ,SAASשרת באתר, מודל התימחור וכו') 9
3102 Source: STKI RT MDM BYOD Survey FEB BYOE
Pini Cohen and Sigal Russin's work
3102@Copyright
Do not remove source or attribution
from any slide, graph or portion of
graph 53
36. 3102 Important issues when choosing MDM solution
3102
תמיכה במגוון מערכות הפעלה 2
אכיפת מדיניות ארגונית על המכשיר 1
אבטחת מידע על המכשיר (ססמאות, )AV ,FW 4
הפרדת המידע הארגוני מהמידע הפרטי על המכשיר 3
ניהול מצאי, קונפיגורציה ו Imageשל המכשיר 6
יכולות הפצת תוכנה ואפליקציות למכשיר 5
ניהול מרכזי ואינטגרציה למערכות ארגוניות 7
יכולות דיווח וניהול הוצאות כספיות הקשורות למכשיר (למשל: התראות על נדידת רשתות בחו"ל) 9
ארכיטקטורת הפיתרון ( ,SAASשרת באתר, מודל התימחור וכו') 8
BYOE
3102 Source: STKI RT MDM BYOD Survey FEB
Pini Cohen and Sigal Russin's work
3102@Copyright
Do not remove source or attribution
from any slide, graph or portion of
graph 63
37. Management Requirements for Mobile
A. Configuration and protection of lost or compromised devices- password
enforcement, encryption enforcement, remote lock and wipe, remote
email configuration, certificates for identity, remote connectivity (Wi-Fi,
VPN) and detection of compromised OS (jailbreak, rooted etc).
B. Data loss prevention (DLP)- privacy control (GIS), cloud usage control
(iCloud, dropbox, GoogleDocs) and email DLP controls (protect
attachments).
C. Provisioning and data security in apps- Google Play market is full of
malware. Microsoft and blackberry copied Apple approach. Control your
business apps with group policies and content- managements controls. BYOE
Source: Mobile Security, Galen M. Gruman, infoworld
Pini Cohen and Sigal Russin’s work/
Copyright@2013
Do not remove source or attribution from any
slide, graph or portion of graph
37
38. Mobile Device Security
• Beware of Wi-Fi- in public places such as hotels, restaurants, cinema etc.
1
• Turn off Bluetooth- it can be used to listen in on private conversations. Also on
2 laptops.
• Connect to your corporate VPN -if you have to use an untrusted network. It enable
3 you to connect in “full tunnel” mode.
• Keep a close eye on your equipment – never leave any device alone.
4
• Don’t share files with strangers using USB keys- it can delete your sensitive data or
5 install a malware.
Source: information week
Pini Cohen and Sigal Russin’s work/
Copyright@2013
Do not remove source or attribution from any
slide, graph or portion of graph
38
39. Secure Sandbox vs. Secure container -MAM
Mobile Device Management (MDM)- control
the user owned device from an Enterprise
standpoint. Data meaningful and valuable for
the company should not be lost or end up in
the wrong hands.
Mobile Application Management (MAM) –the
ability of the Enterprise to keep control on
rolling over or calling back applications
deployed in an end-user device without
having impact on the user privacy.
Source:http://www.webtorials.com/discussions/2012/09/thank-you-mam-new-ways-to-plug-
mobile-data-leaks.html
BYOE
Pini Cohen and Sigal Russin's
work Copyright@2013
Do not remove source or
attribution from any slide, graph
or portion of graph 39
40. Mobile Device Management -Israeli Market Positioning 1Q13
Mobile Iron
AirWatch Player
Local Support
Worldwide
FancyFone Leader
Symantec Fiberlink
Citrix( Zenprise)
BoxTone
Matrix
McAfee
Market Presence/Perception BYOE
Pini Cohen and Sigal Russin’s work/
Copyright@2013
Do not remove source or attribution from any
slide, graph or portion of graph
40
41. Mobile Container Management -Israeli Market Positioning 1Q13
Player
Good
Local Support
Technologies Worldwide
Leader
Excitor
Sybase
Market Presence/Perception
Pini Cohen and Sigal Russin’s work/
Copyright@2013
Do not remove source or attribution from any
slide, graph or portion of graph
41
42. Case Study - IBM Policy
IBM still gives BlackBerrys to about 40,000 of its 400,000 employees, 80,000
other workers now reach internal IBM networks using other smart phones
and tablets they purchased themselves.
• Disables public file-transfer programs like Apple’s iCloud, dropbox etc.
• Turns off Siri- they worried that the spoken queries, which are uploaded to
Apple servers, could ultimately reveal sensitive information.
• Each employee’s device is treated differently, depending on what model it is
and what the person’s job responsibilities are (Email, calender, IBM apps …)
• Developing strategies to reduce the risk of data leakage (Wi-Fi hotspot)
Source: “Mobile Computing in Question” business impact, MIT 2012 BYOE
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 42
43. BYOD challenges (Case study IBM internal work)
• Providing modern and secure network access that supports:
• Personally owned devices
Source: IBM
http://www.google.co.il/url?sa=t&rct=j&q=&esrc=s&source=web&
cd=1&cad=rja&ved=0CCsQFjAA&url=http%3A%2F%2Fwww.esl.dk
%2Fmedia%2F35735%2FFredag%2520Carsten%2520B%2520Ander
sen%2520Personally-
• Partitioning technologies
owned%2520devices%2520at%2520IBM%2520(ISACA).ppt&ei=9TI
wUevYLseRswbS94G4Bw&usg=AFQjCNFnISWnbM8bhmQSsBLhtrvt
-XHGmg&bvm=bv.43148975,d.Yms
• Mobile device management
• Multiple device types / multiple OS versions
• Defining a mobile application portfolio
• Providing an easy-to-use “app store” for distribution of applications
• Standardization and comprehensive tooling
• Supporting a variety of devices, platforms, carriers and countries
• Securing access to corporate data and developing strategies to reduce the risk of data
leakage (Wi-Fi hotspot)
• Addressing unexpected legal or compliance demands
BYOE
• Managing expenses and determining the right balance of reimbursement
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 43
44. Addressing the challenges with a four-pronged approach
Technology: Policy:
Sunset legacy devices (Symbian, Win Security (ITCS300)
Mobile) Client Standard
Cross link Traveler accounts with IBM 1. Technology Connection tools and service
Endpoint Manager registration expense eligibility (CIO 128)
Digital Certification for all mobile All mobile devices must be
devices (1st step authentication) registered in IBM Endpoint
Cross link digital certs to IEM and 4. Support 2. Policy Manager
network access
WiFI protection via enforced
registration
Containerization solutions Education:
Remote wipe capability
Enable and deploy high
3. Education Provide education and
certification to enable
value applications employees to be “security
aware”
Support: Annual Business Conduct
Self-support model, Source: IBM
http://www.google.co.il/url?sa=t&rct=j&q=&esrc=s&source=web&
cd=1&cad=rja&ved=0CCsQFjAA&url=http%3A%2F%2Fwww.esl.dk
Guidelines certification
powered by IBM’s social %2Fmedia%2F35735%2FFredag%2520Carsten%2520B%2520Ander
sen%2520Personally-
owned%2520devices%2520at%2520IBM%2520(ISACA).ppt&ei=9TI
“Ask the experts”
software IBM Connections wUevYLseRswbS94G4Bw&usg=AFQjCNFnISWnbM8bhmQSsBLhtrvt
-XHGmg&bvm=bv.43148975,d.Yms
Pini Cohen and Sigal Russin's work
44
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 44
45. Develop a strong usage policy
o Use of personal devices for business purposes is voluntary.
o Eligible employees (all except privileged users) can use personal
devices as long as they agree to the IBM terms and conditions.
o Employees must adhere to security policies and installation of security
agent to ensure their device is secure.
o IBM or client information and data (property) maintained or stored on a
device is owned by IBM.
BYOE
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 45
46. Develop a strong usage policy
o Employee agrees to allow IBM to inspect or take possession of the device
upon request.
o IBM can revoke the ability to use the device.
o IBM can do a remote wipe of the device at any time, if the device is lost or
stolen.
o User will remove all IBM property when they stop using the device.
o IBM may, but is not obligated to provide any 3rd party software. User must
obtain valid licenses for any 3rd party software they choose to use for IBM
business or purchase it . BYOE
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 46
47. Summary - BYOD
I. Have sensible, but not restrictive, policies.
Emphasize user education about the threats such as lost,
stolen, and infected mobile devices. Enforce reasonable
policies such as requiring a PIN code.
II. MDM -Implement remote lock, wipe, and locate features on
company- and employee owned devices.
III. Install anti-malware protection or a MAM – security
container for business apps.
IV. Use VPNs for everything when connecting to company assets
from mobile devices, especially when connecting over public
Wi-Fi.
V. Focus on authentication and identity.
Multifactor authentication or federated identity should be
used to access high-value services on the company network. 47
48. PC sales are down
Suppliers
Change
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 48
49. These changes influence Nasdaq
Microsoft
Apple
Suppliers
Change
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 49
50. Suppliers
Change
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 50
51. Windows 8 for “regular” PC’s
Suppliers
Change
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 51
52. Microsoft: from SW (license) to Services
• Computerworld has confirmed that Office 2013 is
permanently locked to the original machine it was
installed on…. you will be unable to move it to a new
machine should the need arise
• Microsoft has made it fairly clear that it is now far
more interested in getting consumers to sign up for
its Office 365 product that works off of a subscription
plan. Since this can be accessed from just about
anywhere it would eliminate the need for re-
installing a copy of Office that involves a license.
Suppliers
Change
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 52
53. Microsoft is looking for new way to do business
• Windows Blue confirmed in new Microsoft job listings: “Windows Blue
promises to build and improve upon these aspects of the OS, enhancing ease
of use and the overall user experience on devices and PCs worldwide.”
• Rumors about Windows Blue:
• The first of a number of annual operating system updates to Windows 8.
• There also is a Windows Phone Blue in the works that is expected to
have the same core code as Windows Blue.
• It's not clear to me when and whether Microsoft will roll out something
known as Windows 9, given the new plan to deliver Windows operating
system updates annually, rather than once every three years
Suppliers
Sources: http://www.zdnet.com/microsofts-windows-blue-may-have-just-hit-milestone-1-7000011514/ and http://www.neowin.net/news/windows-blue-confirmed-in-microsoft-job-listing
Change
Pini Cohen and Sigal Russin’s work/
Copyright@2013
Do not remove source or attribution from any
slide, graph or portion of graph
53
54. However
• Service = Subscription = Rental
• The “Cloud way” - you pay for what you need – can grow or
reduce seats
• There is no asset for the organization
• Negotiation is tricky
Suppliers
Change
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 54
55. Mobile will cause new development paradigm
Source: http://www.kendoui.com/surveys/global-developer-survey-2013.aspx
Pini Cohen and Sigal Russin's
work Copyright@2013
Do not remove source or
attribution from any slide, graph
or portion of graph 55
56. Enterprise App Store
Source: http://velositor.com/2012/03/15/almost-3-in-5-enterprises-said-they-were-looking-to-implement-a-corporate-app-store/
Source: http://www.ebizq.net/blogs/mashups/2011/07/is-your-it-organization-ready-for-the-attack-of-the-angry-birds.php
Pini Cohen and Sigal Russin’s work/
Copyright@2013
Do not remove source or attribution from any
slide, graph or portion of graph
56
57. A new era
Source: http://www.socialtechpop.com/2010/10/old-vs-new-trends-in-social-media/
Pini Cohen and Sigal Russin’s work/
Copyright@2013
Do not remove source or attribution from any
slide, graph or portion of graph
57
58. Agenda
BYOEverything Security
Business
Consumerization &
enabling
Cyber
technologies
Infrastructure The new
investment infraops
model-cost delivery model
reduction
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 58
59. Open Networking Foundation on SDN
… In the SDN architecture, the control and data
planes are decoupled, network intelligence and state
are logically centralized and the underlying network
infrastructure is abstracted from the applications … Enabling
technologies
Source: opennetworking.org
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 59
60. Enabling
technologies
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 60
61. SDN Vendors
o Cisco: Open Networking Environment (ONE), EEM (Tcl),
Python scripting
o Juniper: Junos XML API and SLAX (human-readable XSLT)
o Arista EOS: XMPP, Linux scripting (including Python and
Perl)
o Dell Force10: Open Automation Framework (Perl, Python,
NetBSD shell)
o F5: iRules (Tcl-based scripts)
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 61
62. Case Study
Enabling
technologies
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 62
63. Enabling
technologies
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 63
64. Key aspects of SDN
I. Separation of data and control planes
II. A uniform vendor-agnostic interface such as OpenFlow
between control and data planes
III. Logically centralized control plane, realized using a
network OS, that constructs and presents a logical map of
the entire network to services or network control
applications on top
IV. Slicing and virtualization of the underlying network
Enabling
Source : http://yuba.stanford.edu/openflow/documents/openflow_deployment_journal_paper_aug2012.pdf technologies
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 64
65. Today Networking Devices
B
A 1 C
IP
Routing
Table
2
1-> B5
3-> A1
3
1 2 1 2 4 5 1 2 3
3 Enabling
technologies
Pini Cohen and Sigal Russin’s work/
Copyright@2013
Do not remove source or attribution from any
slide, graph or portion of graph
65
66. Current Networking Systems
Enabling
Microsoft ERP SAP CRM technologies
1
2
3
CPU
RP
SuperVisor
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 66
67. The “Software-Defined Network”
Microsoft ERP SAP CRM
Open API
Network Operating System –SDN Controller
Open Interface
to Hardware
“If header = x, send to port 4”
Openflow Firmware
Openflow Firmware
Packet-Forwarding
Packet-Forwarding Hardware
Hardware
Openflow Firmware Openflow Firmware
Enabling
Packet-Forwarding Packet-Forwarding technologies
Hardware Hardware Pini Cohen and Sigal Russin's
work Copyright@2013
Do not remove source or
attribution from any slide, graph
or portion of graph 67
68. Current technology Future technology
ERP SAP CRM ERP SAP CRM
Windows
Windows Windows
Windows Windows
Windows Windows
Network
Windows Windows
NOX-
Windows Windows
Beacon-SDN
Windows
Windows Linux FreeBSD OS Nicira controller
Virtualization Virtualization
x86
Openflow
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 68
69. “S” for Software
Enabling
Policy/Control SW 1. Static Checking technologies
(“compile time”)
“Is my configuration
Configuration correct?”
2. Dynamic checking
(“run time”)
Data Plane “Is my data plane
behaving correctly?”
Source : Formal checking in networks, ONCR Research , James Hongyi Zeng
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 69
70. SDN Benefits
SDN allows companies to:
Manage Change Remove the complexity
Reduce the cost of network
reconfiguration
Integrate Cloud Services Turn the network into a truly
dynamic and flexible asset.
Network Investments
Enabling
technologies
Source: http://www.accenture.com/us-en/Pages/insight-software-defined-networking-video.aspx
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 70
71. Open Flow
Today, your Routing Protocols / STP determine the Forwarding Table in
your network.
OpenFlow is another method for configuring the Forwarding table in the
Network Switch.
OpenFlow will replace existing routing protocols !
“If header = x, send to port 4”
“If header = y, overwrite header with z, send to ports 5,6”
“If header = ?, send to me”
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 71
72. Enabling
technologies
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 72
73. Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 73
74. Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 74
75. Summary - SDN
A. You should have clear vision about how SDN technology will
benefit your business.
B. It is very early days for SDN -- the market, standards and
technology will evolve.
C. Think about SDN implementation challenges: human resource.
Vendor support, organization impact.
D. Think about the potential impact of SDN on your operational
costs.
E. Improved network security is a critical potential benefit of
SDN.
F. Identify a specific initial use case for SDN. For example,
reducing the time to provision network security to new (or
migrating) VMs.
75
76. application(s) Server
file-system ScaleIO Server ECS
vol. manager
ScaleIO ECS eliminates the
block dev. dependency on SAN hardware
ScaleIO Client
drivers ScaleIO ECS software components:
Space
DAS
ScaleIO • ScaleIO Data Client (SDC)
allocated protocol
to ScaleIO
• ScaleIO Data Server (SDS)
HBA NIC/IB
External
switch switch
Fabric Storage
switch HBA Subsystem
Enabling
technologies
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 76
77. Other vendors are following this trend
Enabling
technologies
Pini Cohen and Sigal Russin’s work/
Copyright@2013
Do not remove source or attribution from any
slide, graph or portion of graph
77
78. • Does :
Enabling
Software Defined Network technologies
+
Software Defined Storage
+
Software Defined X (more similar technologies)
=
Software Defined Datacenter?
Pini Cohen and Sigal Russin’s work/
Copyright@2013
Do not remove source or attribution from any
slide, graph or portion of graph
78
79. Software Defined Datacenter
• Forrester: An SDDC is an integrated abstraction layer that defines
a complete data center by means of a layer of software that
presents the resources of the data center as pools of virtual and
physical resources, and allows them to be composed into
arbitrary user-defined services.
Enabling
Source: http://www.vmware.com/files/include/microsite/sddc/the_software-defined_datacenter.pdf technologies
Pini Cohen and Sigal Russin’s work/
Copyright@2013
Do not remove source or attribution from any
slide, graph or portion of graph
79
80. STKI on Software Defined Datacenter
• Two main vectors in Software Defined X:
Enabling
• Central control of all related components
technologies
• Use more simple HW – up to “standard servers” for
everything
• Will enable application to “ask” specific things from the HWinfra
layer
• Promising concept and a “game changer” but it will take time
Pini Cohen and Sigal Russin’s work/
Copyright@2013
Do not remove source or attribution from any
slide, graph or portion of graph
80
82. Enabling
technologies
Source: http://atea.lt/wp-content/uploads/2012/11/5-3-Datacenter-of-the-future-Atea-Action-2012.pdf
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 82
83. Facebook changed the DC industry : Open Compute Project
• Open Compute Project: internet/cloud companies working collaboratively to come
up with a better motherboard design, a better power supply based on Intel or ARM
chips.
• Facebook donated hardware designs to the Open Compute Project , showing how it
had significantly cut costs with a new breed of slim-down gear purchased directly
from manufacturers in Asia.
• Rackspace : (second only to Amazon in the cloud computing game) donateddesigns
to the Open Compute Project.
• Rackspace’s hardware accommodates a different power system than
Facebook’s gear.
• The server includes an extra network connection and some extra management
tools. And it’s designed to handle a much larger number of connecting cables
• Google and Amazon have also bypassed big-name server makers going directly to
more nimble manufacturers, but they’ve not donated their designs
Pini Cohen and Sigal Russin’s work/
Copyright@2013
Do not remove source or attribution from any
slide, graph or portion of graph
83
84. Enabling
technologies Source: SAP
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 84
85. SAP HANA
• From Disk to RAM
• From Row to Column
• From Text to Binary
• Compression of data
• New data manipulation algorithms – build for the Intel Core level
Enabling
technologies
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 85
86. Enabling
technologies
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 86
87. GPGPU
• General-purpose computing on graphics processing units
(General-purpose graphics processing unit, GPGPU, GPGP or
less often GP²U) is the utilization of a graphics processing
unit (GPU), which typically handles computation only for
computer graphics, to perform computation in applications
traditionally handled by the central processing unit (CPU).
Source: wiki
Enabling
technologies
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 87
88. The GPU-Force!
Enabling
technologies
Source: http://www.nvidia.com/object/personal-supercomputing.html
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 88
89. Amax GPGPU Cluster
Enabling
technologies
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 89
90. Intel’s Xeon PHI
Enabling
technologies
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 90
91. The SQream Product Topology
Enabling
technologies
Data Data Users
Sources
Storage ~ 90% crunching
100TB of original data Performance – x25 ++
25%-50% raw data x10, x25, x40, X100 faster
Pini Cohen and Sigal Russin's
x5-x10 compression than leading DBMSs Do not Copyright@2013
work
remove source or
5TB-15TB on SQream’s Server attribution from any slide, graph
or portion of graph 91
92. Technology
Enabling
• Data Crunching: technologies
• Faster compression time X20
• Faster decompression time X50-X70
• Higher compression ratio X5-X15
• Compute:
• Faster MPP in a node X20
• Higher scalability X1 node X3000 cores
• Lower hardware cost 7,000,000$ > 15K
Pini Cohen and Sigal Russin's
work Copyright@2013
Do not remove source or
attribution from any slide, graph
or portion of graph 92
93. The internet of things
• “Devices are smart” and have You have fever
Take a pill right
sophisticated software installed now!
• What about the software license
I don’t like
in the device?! this tie
I need to be
changed!
Pini Cohen and Sigal Russin’s work/
Copyright@2013
Do not remove source or attribution from any
slide, graph or portion of graph
93
94. Internet of things (sensor/computer to computer)
• "Always On" world around us
• Cheap, smart, small, image recognition,
augmented reality
• Near Field Communication and location
aware sensors
• Everything gets connected
• Not only “personal” devices but “business”
devices flourish
Source: http://www.ibmbigdatahub.com/blog/next-best-action-internet-things
• Real-time decision support for customers
and employees Enabling
technologies
Pini Cohen and Sigal Russin’s work/
Copyright@2013
Do not remove source or attribution from any
slide, graph or portion of graph
94
95. 95
Do not remove source or attribution
technologies
from any slide, graph or portion of
Pini Cohen and Sigal Russin's work
Enabling
Copyright@2013
graph
Srouce: http://www.xbitlabs.com/news/other/display/20120620221606_Calxeda_s_ARM_Based_Web_Server_Fifteen_Times_More_Energy_Efficient_than_Intel_Powered_Company.html
ARM servers
96. Agenda
BYOEverything Security
Business
Consumerization &
enabling
Cyber
technologies
Infrastructure The new
investment infraops
model-cost delivery model
reduction
Pini Cohen and Sigal Russin's work
Copyright@2013
Do not remove source or attribution
from any slide, graph or portion of
graph 96
97. Cyber and Security
• The Dangers:
Blackhole- Hacking as a Service
APT1
• Solutions/ Tools:
Categorization of solutions
Cyber Intelligence
HoneyPot
• Recommendations
Pini Cohen and Sigal Russin's
work Copyright@2013
Do not remove source or
attribution from any slide, graph
or portion of graph 97