STKI Summit 2011 - The Gap!
Complete presentation covering general infrastructure trends, development and SOA, System Management, DBMS and data, Servers and Platforms, Clients, Storage
Stki summit2013 infra_pini sigaltechnologies_v5 final
Summit 2011 infra_pini_v6
1. ;
The Gap! Complete presentation
Pini Cohen
EVP
pini@stki.info
Pini Cohen’s work Copyright 2011 @STKI
Do not remove source or attribution from any graphic or portion of graphic
3. My Challenge – how to Sew it all
together
http://www.istockphoto.com/file_thumbview_approve/132499/2/istockphoto_132499-vintage-sewing-and-mending-kit.jpg
Pini Cohen’s work Copyright 2011 @STKI 3
Do not remove source or attribution from any graphic or portion of graphic
4. What is new?
• STKI’s first IT development survey
• NOC Operator metrics
• New DBA metrics
• Ratios of production from all serversstorage
New
Pini Cohen’s work Copyright 2011 @STKI 4
Do not remove source or attribution from any graphic or portion of graphic
5. Agenda
• Major Trends and Issues
• Development and SOA
• ESM BSM CMDB
• DBMS and DATA
• Platforms – Servers
• Clients
• Storage
Source: http://astonguild.org.uk/files/NEW_MENU_FRONT_RGB%5B1%5D.jpg
Pini Cohen’s work Copyright 2011 @STKI
Do not remove source or attribution from any graphic or portion of graphic
6. General Trends
• The current infrastructure perspective in IT shops
• The Gap
• What are the big vendors doing?
• Public Cloud
• Private Cloud - Appliances
• Manage Scattered IT
• Pervasive Ubiquitous Computing
• Near Field Communications and Video
• Lean IT
• Recommendations Source:
http://www.google.co.il/imgres?imgurl=http://f
arm5.static.flickr.com/4044/4215428802_8d8
72c6ccd.jpg&imgrefurl=http://flickr.com/photo
s/efrenefren/4215428802/&usg=__Ca3quraL
K4CKcTuemqbIelfUoQs=&h=500&w=365&sz
=143&hl=iw&start=0&zoom=1&tbnid=yfgFXR
Yu1l4N1M:&tbnh=146&tbnw=107&ei=asF_T
dfJMInGgAezh6WaCA&prev=/images%3Fq%
3Dappetizer%2Bmenu%26um%3D1%26hl%
3Diw%26client%3Dfirefox-
a%26sa%3DX%26rls%3Dorg.mozilla:en-
US:official%26biw%3D1280%26bih%3D625
%26tbs%3Disch:1,isz:m&um=1&itbs=1&iact=
rc&dur=365&oei=asF_TdfJMInGgAezh6WaC
A&page=1&ndsp=27&ved=1t:429,r:20,s:0&tx
Pini Cohen’s work Copyright 2011 @STKI 6 =74&ty=54
Do not remove source or attribution from any graphic or portion of graphic
7. Important trendsissues raised by
some clients
• WinXP will be without support soon
• Storage growth
• Lack of IT professionals
• Datacenter unifications (storage, compute,
networks)
• CMDB
• Green
• Unified communications
Pini Cohen’s work Copyright 2011 @STKI 7
Do not remove source or attribution from any graphic or portion of graphic
8. Major trendsissues raised clients
Pini Cohen’s work Copyright 2011 @STKI Source: STKI 8
Do not remove source or attribution from any graphic or portion of graphic
9. Is something missing here?!
Source: http://www.egd-media.co.uk/Home_files/droppedImage_1.jpg
Pini Cohen’s work Copyright 2011 @STKI 9
Do not remove source or attribution from any graphic or portion of graphic
10. Who are None IT Technology Users
(NITU)?
• Students
• Startups
• SOHO (Small Office Home Office)
• Young people
• Home users
• SMB’s
Source: http://www.aixiaofei.com/upload/article/2009-08/1249625696.652387mS35fe.jpg
Pini Cohen’s work Copyright 2011 @STKI 10
Do not remove source or attribution from any graphic or portion of graphic
11. IT vs. None IT Technology Users
(NITU)
IT None IT Technology users
Using PC Using Macs or Tablets or PC
IT buys the PC Using the device from home both PC
(BYOPC) and phone
Communicating via Email Communicating via Email, Social networks,
etc.
Social networks are just starting to be Social networks are part of the business
part of Organization strategy – mainly
within the marketing departments
Online and Batch applications Online applications
Using traditional voice and just little Using VOIP extensively (Viber, Skype, etc.)
VOIP
Either at Work or at Home Always at Work and at Home
Pini Cohen’s work Copyright 2011 @STKI 11
Do not remove source or attribution from any graphic or portion of graphic
12. IT vs. NITU (cont.)
IT None IT Technology users
Paranoia regarding public cloud but Have more control of access to data by
vulnerable to internal threats internal employees
Not using Saas Just using Saas
Using virtual servers that are in installed Using Iaas
on premises
Not using Mac servers Using Mac servers
High Capex High Opex – that can be changed
Lots of emphasis on none-core issues – Time and effort spent on core business is
patch distribution, performance issues, higher while the provider takes care of
etc. none-core issues
Not using freeopen source SW (Redhat Using freeopen source SW
is not considered open source in this
categorization)
Pini Cohen’s work Copyright 2011 @STKI 12
Do not remove source or attribution from any graphic or portion of graphic
13. IT vs. NITU (cont.)
IT None IT Technology users
Applications are generally not location Applications are natively location aware
aware
Application are not QR ready Applications are QR ready
Traditional business activity- product – Using crowdsourcing for marketing and
marketing – then selling product development (much leaner)
Traditional organization structure Using crowdsourcing internally – “the guy
at the warehouse” can influence on what
the product will look like. Much more
creative
Need to perform some activities to Always connected
connect (if possible)
Not all technology domains are located in All technology is united
one place – mobile projects, web sites,
telephony, CCTV, other sensors
Pini Cohen’s work Copyright 2011 @STKI 13
Do not remove source or attribution from any graphic or portion of graphic
14. STKI’s Point:
Mind the increasing GAP !
Source: http://tednellen.blogspot.com/2009/12/last-sunday-of-09.html
Pini Cohen’s work Copyright 2011 @STKI 14
Do not remove source or attribution from any graphic or portion of graphic
15. Will corporate IT be the Last Dinosaur?!
Source: http://t1.gstatic.com/images?q=tbn:ANd9GcTCsfFbHIQWy7ikFKkSoVhBNEHZhpd1d3-dXaiLIF3kqwq5fTYj
Pini Cohen’s work Copyright 2011 @STKI
Do not remove source or attribution from any graphic or portion of graphic
16. The strategy of some big vendors
• Showing that big vendors are trying to do
things differently
– Google- approaching the enterprise
– Microsoft- approaching the NITU (None IT
Technology Users) that many years ago was
Microsoft’s origin
Pini Cohen’s work Copyright 2011 @STKI 16
Do not remove source or attribution from any graphic or portion of graphic
17. Google’s Vision
• “In a 100% web world, business applications
are delivered over the Internet and accessed
in a web browser.” Dave Girouard, President,
Google Enterprise
Pini Cohen’s work Copyright 2011 @STKI 17
Do not remove source or attribution from any graphic or portion of graphic
18. Google Strategy for the Enterprises
– step by step
1. Private cloud with Search and Geoseptical appliances.
2. SAAS for security (Postini), Exchange synchronization tools for Exchange
DRP and archiving
3. Gmail mail server. Users can still work with Microsoft Outlook or will
Gmail GUI(with offline capabilities)
4. Google Collaboration- web sites, portals, etc.
5. Google Docs (competition to MS Office)
6. Google App Engine (PAAS). Competition to Azure and others.
7. Google App market place
8. In the (near?) future – Google IAAS – competition to Amazon EC2
9. Chrome OS laptops
Pini Cohen’s work Copyright 2011 @STKI 18
Do not remove source or attribution from any graphic or portion of graphic
19. Deploy powerful integrated solutions on premise and online
Devices
On Premise Applications
Google Apps Your Apps 3rd Party Apps
Search
Geospatial
Google‟s Global Platform
20. Integrate your existing architecture to start your journey
On Premise
Device Management
Devices
ERP Device Mgmt.
Applications
Google Apps Your Apps 3rd Party Apps
Cloud
Connect
User Mgmt.
CRM
Google‟s Global Platform
Secure Data
Search Connector
Geospatial
21. Enjoy seamless communication and collaboration
Gmail Google Docs
web-based communication
real-time collaboration tools
hub
Priority Inbox Rich Formatting
overcome information overload
images, tables, drawings
with automatically prioritized
and bullets
email
Contextual Gadgets Version history
approve POs or update Voice & Video Chat maintained throughout the
forecasts without leaving
multiple communication
editing process so you can Real-Time Collaboration
Gmail easily review multiple multiple users edit documents
choices within a single
versions simultaneously
interface
22. Build, buy and manage applications your way
App Engine Apps Marketplace
platform as a service integrated 3rd party apps
Easy to scale
add capacity as usage of an
application grows
Ratings
Easy to deploy Comprehensive list ratings from other customers to
host your applications on Easy to Manage Applications including project help you find the best Apps
Google‟s infrastructure and easily deploy multiple management, accounting,
provide them to your versions of applications to CRM and more
employees via the web test new functionality
23. Add-ons to Google Chrome
Pini Cohen’s work Copyright 2011 @STKI
Do not remove source or attribution from any graphic or portion of graphic
24. Add-ons to Google Chrome
Pini Cohen’s work Copyright 2011 @STKI
Do not remove source or attribution from any graphic or portion of graphic
25. Google's Chrome Web Store
+clock application
Pini Cohen’s work Copyright 2011 @STKI
Do not remove source or attribution from any graphic or portion of graphic
26. The next stage ChromeOS
Pini Cohen’s work Copyright 2011 @STKI 26
Do not remove source or attribution from any graphic or portion of graphic
27. Google is not immune to mistakes
“…Google Wave is no longer being actively developed”
Pini Cohen’s work Copyright 2011 @STKI 27
Do not remove source or attribution from any graphic or portion of graphic
28. Microsoft
• Is putting most of its R&D budget on Cloud
and NITU (None IT Technology Users)
• But does not want to harm the relationship
with traditional IT shops
Pini Cohen’s work Copyright 2011 @STKI 28
Do not remove source or attribution from any graphic or portion of graphic
34. First Azure Project in Israel !
Guest Entry Project in The Government Complex (Cloud Guest MGMT)
Invitation forms and processes
Daily visitors reports
Serves 4 Ministries:
Ministry Of Culture And Sports
Ministry Of Science
Ministry Of Public Security
Ministry of Housing and developing
Why Azure:
Guardian & Microsoft service and support
Reduce operating costs and improve business agility
Scalable, Secure and Highly Available
34
35. Guest Entry Solution
DEMO
Daily Visitors Invite Form
Report
entrance Government Complex
35
37. On Premises / Hosters Azure Service in your datacenter
Windows Azure & SQL Azure
Physical Control - Geographic Proximity
Regulatory Compliance - Data Sovereignty
38. Example of Microsoft cloud offering –
Windows Intune for PC management
Pini Cohen’s work Copyright 2011 @STKI
Do not remove source or attribution from any graphic or portion of graphic
42. What about Facebook and the
enterprises?!
Pini Cohen’s work Copyright 2011 @STKI
Do not remove source or attribution from any graphic or portion of graphic
43. Enterprise Benefits from Cloud Computing
Capability From To
Server/Storage
10-20% Cloud accelerates 70-90%
Utilization
business value
Self service None across a wide Unlimited
variety of
Test
Provisioning
Weeks domains. Minutes
Change
Months Days/Hours
Management
Release
Weeks Minutes
Management
Fixed cost
Metering/Billing Granular
model
Standardization Complex Self-Service
Payback period
Years Months
for new services
Source: IBM Legacy environments Cloud enabled enterprise
Pini Cohen’s work Copyright 2011 @STKI
Do not remove source or attribution from any graphic or portion of graphic
44. Today there are three primary delivery models that companies
are implementing for cloud
Enterprise
Traditional Public Clouds
Enterprise Private Cloud
IT
Hybrid Cloud
Private Cloud Hybrid Cloud Public Cloud
IT activities/functions are provided “as Internal and external IT activities/functions are provided
a service,” over an intranet, within the service delivery “as a service,” over the Internet
enterprise and behind the firewall methods are integrated, • Key features:
• Key features include: with activities/functions – Scalability
– Scalability allocated to based on
security requirements, – Automatic/rapid provisioning
– Automatic/rapid provisioning criticality, architecture – Standardized offerings
– Chargeback ability and other established – Consumption-based pricing.
– Widespread virtualization policies. – Multi-tenancy
Source: IBM Market Insights, Cloud Computing Research, July 2009.
Pini Cohen’s work Copyright 2011 @STKI
Do not remove source or attribution from any graphic or portion of graphic
45. Delivery models for cloud
Enterprise
Traditional Public Clouds
Enterprise Private Cloud
IT
Hybrid Cloud
Private Cloud Public Cloud
Good old consolidationvirtualization SAAS
Industry in a box PAAS
Automation IAAS
Other
Source: IBM Market Insights, Cloud Computing Research, July 2009. STKI modifications
Pini Cohen’s work Copyright 2011 @STKI
Do not remove source or attribution from any graphic or portion of graphic
46. Public Cloud
• With Public Cloud “2 people business” can have:
– ERP
– CRM 196,802 soho ( up to 9
– Manufacturing Software
companies employees)
– VOIP
• Soon they will have applications that corporate IT
does not have! Example: Video Application
Pini Cohen’s work Copyright 2011 @STKI 46
Do not remove source or attribution from any graphic or portion of graphic
47. Where do clouds come from?!
• STKI client “we got questions about cloud
implementation at our organization from our
board of directors”!
Source: http://www.clipartguide.com/_pages/0060-0808-2813-3928.html
Pini Cohen’s work Copyright 2011 @STKI 47
Do not remove source or attribution from any graphic or portion of graphic
48. Public cloud issues as raised by
clients
• We will be prisoners of the public cloud provider. But aren’t we
prisoners of our core business ERP CRM vendors?!
• Public cloud providers will raise prices and we will not be able to do
anything! And our current vendors never raise prices….
• Public cloud is like SW rental vs. owning the license There are many
tradition SW vendors that only rent SW
• We will loose agility in public cloud. Anything that is hard to do – the
cloud provider will refuse to do. The current vendors respond to all
our needs…
• STKI: All of these concerns are real and users should consider
carefully before using public cloud offerings. Still public cloud
offering should be used by IT.
Pini Cohen’s work Copyright 2011 @STKI 48
Do not remove source or attribution from any graphic or portion of graphic
49. Cloud usage
Source: http://www.jackofallclouds.com/
Pini Cohen’s work Copyright 2011 @STKI 49
Do not remove source or attribution from any graphic or portion of graphic
50. Cloud usage
Source: http://www.jackofallclouds.com/
Pini Cohen’s work Copyright 2011 @STKI
Do not remove source or attribution from any graphic or portion of graphic
51. Amazon EC2 AMI (Amazon Machine Images) - IBM
Pini Cohen’s work Copyright 2011 @STKI
Do not remove source or attribution from any graphic or portion of graphic
52. The players
Source: http://www.jackofallclouds.com/ methodology: I use QuantCast‟s top 1M site list as a
reference. taking the top half of the list (500k sites in total). Each site is queried to determine whether
it is hosted on a cloud provider, and if so on which
Pini Cohen’s work Copyright 2011 @STKI
Do not remove source or attribution from any graphic or portion of graphic
53. Things are happening up there in
the cloud:
Pini Cohen’s work Copyright 2011 @STKI
Do not remove source or attribution from any graphic or portion of graphic
54. Things are happening up there in
the cloud:
Pini Cohen’s work Copyright 2011 @STKI
Do not remove source or attribution from any graphic or portion of graphic
55. Things are happening up there in
the cloud:
Pini Cohen’s work Copyright 2011 @STKI
Do not remove source or attribution from any graphic or portion of graphic
56. Things are happening up there in
the cloud:
Pini Cohen’s work Copyright 2011 @STKI
Do not remove source or attribution from any graphic or portion of graphic
57. Things are happening up there in
the cloud:
Pini Cohen’s work Copyright 2011 @STKI
Do not remove source or attribution from any graphic or portion of graphic
58. DBMS market new frontiers:
Native Cloud Service
Hadoop
Cassandra
Database.com Xeround
Redis
Voldemort Amazon
Simple DB FathomDB
VoltDB MySQL,
Memcached Cluster Ed
Amazon RDS
NoSQL Cloud Enabled SQL
MySQL,
PostGress, Microsoft
SQL Azure
XMLDB Gemstone
Current
Object DB Clustrix IT
Microsoft
Oracle
SQL Server
DB2
Traditional
Pini Cohen’s work Copyright 2011 @STKI
Source: http://xeround.com/
58
Do not remove source or attribution from any graphic or portion of graphic
59. Summery of Public Cloud sections
• Things are certainly happening in the public
cloud arena
Source; http://www.silicon.com/technology/networks/2011/02/04/cloud-computing-to-boom-in-2011-39746924/
Pini Cohen’s work Copyright 2011 @STKI 59
Do not remove source or attribution from any graphic or portion of graphic
60. Private Cloud
• Appliances
• Automation including workflow and self
service
Source: http://gigaom.com/2010/05/12/why-private-clouds-are-a-catch-22-for-buyers/
Pini Cohen’s work Copyright 2011 @STKI 60
Do not remove source or attribution from any graphic or portion of graphic
61. Private cloud by users
• Will enable flexible, elastic infrastructure on
which a variety of applications can be easily
provisioned and efficiently operated.
• But requires huge investment
• Like automatic gear – we all like it but it
requires 10% more fuel
Source: http://forums.juniper.net/t5/Architecting-the-Network/Fabric-Computing-Gartner-s-view-for-the-future-of-the-datacenter/bc-p/75834
Pini Cohen’s work Copyright 2011 @STKI 61
Do not remove source or attribution from any graphic or portion of graphic
62. The new soon to be IT
Pini Cohen’s work Copyright 2011 @STKI
Source: http://www.accenture.com/SiteCollectionDocuments/PDF/Accenture_Infrastructure_Consulting_Next_Generation_Data_Center.pdf
Do not remove source or attribution from any graphic or portion of graphic
63. Building the next-generation data center and
enabling cloud computing (Accenture)
Phase 1 - Continued focus on data center virtualization
(across all areas of server, storage and network),
consolidation and standardization
Phase 2 - Automating IT processes, integrating service
management tools, optimizing resources and leveraging
provisioning tools
Phase 3- Service approach to IT rather than
a component view. At this stage, companies typically begin
to see the value of cloud computing.
Source: http://www.accenture.com/SiteCollectionDocuments/PDF/Accenture_Infrastructure_Consulting_Next_Generation_Data_Center.pdf STKI modifications
Pini Cohen’s work Copyright 2011 @STKI 63
Do not remove source or attribution from any graphic or portion of graphic
64. Appliances
We are seeing more and more Appliances offerings
NetBackup 5000
Appliance Oracle Exadata
Teradata EMC Greenplun
Turnkey Deduplication Solution from
Symantec
Exalogic
VBLOCK
Pini Cohen’s work Copyright 2011 @STKI
Google FlexPod for Vmware
Do not remove source or attribution from any graphic or portion of graphic SAP HANA
65. Why do we need appliance?
• All components are tuned to work together
• Improved performance
• Automatic provisioning that works! (prepared to do
the needed task)
• Self service that works! (prepared to do the needed
task)
• Patches that are tested for specific situations
• Lower time to market
• Operations are easier
Pini Cohen’s work Copyright 2011 @STKI 65
Do not remove source or attribution from any graphic or portion of graphic
66. Example: adding another server- not
that easy…
• Example: adding Websphere server to cluster:
Use a text editor to open the wpconfig.properties file.
Windows and UNIX location: portal_server_root/config/wpconfig.properties
Ensure that the following properties are uncommented and specify appropriate values:
ClusterName property: Specify the name of the cluster to which you are adding the node.
ServerName property: Specify the cluster member name you want to use when adding this node to the cluster. Important: The
cluster member name you specify for this property must be unique within the cell and cannot have the same value as the
ServerName property on the primary node or other secondary nodes.
PrimaryNode property: Verify that the value for this node is false.
Add the node to the cluster.
Windows and UNIX: Run the following command from the portal_server_root/config directory:
– Windows: WPSconfig.bat cluster-setup -DWasPassword=password
– UNIX: ./WPSconfig.sh cluster-setup -DWasPassword=password
Click the application server name for the secondary node.
Click Ports under the Communications settings, and verify the port number listed for the WC_defaulthost port.
Click Servers > Cluster Topology to view the updated cluster topology.
Regenerate the Web server plug-in.
Regenerate the Web server plug-in using the deployment manager administrative console.
If you are using a remote Web server, copy the updated plug-in configuration file (plugin-cfg.xml) to the Web server's plug-in
configuration directory.
Stop and start the Web server.
Restart all cluster members, where each cluster member is a single application server in the cluster.
Source: http://publib.boulder.ibm.com/infocenter/wpdoc/v6r0/index.jsp?topic=/com.ibm.wp.ent.doc/wpf/clus_install_addmember_horiz.html
Pini Cohen’s work Copyright 2011 @STKI
Do not remove source or attribution from any graphic or portion of graphic
67. IBM CloudBurst and WebSphere CloudBurst
provide cloud management capabilities with different scopes
WebSphere CloudBurst Appliance IBM CloudBurst
Bladecenter + set of pre-configured provisioning
Offering type Physical appliance and management software + configuration
services
General purpose cloud provisioning/
Applicable Scope Application middleware environments
management
Bring your own (leverage underutilized assets in Included in the offering (bladecenter w/ 3 blades
Hardware for cloud
your datacenter) in it)
User-built images (whichever products
Items managed in cloud GA virtual images from IBM for select products
customer chooses to build)
67
68. Lead Time: To get a new application environment….
Today, this list of serial processes is executed for each new application environment:
Approvals Procurement HW Install OS Install MW Install App Install/Config
2-4 month lead time!
Factor out repetitive tasks to reduce lead time!
Approvals Procurement HW Install Done once at cloud creation/expansion
time
OS Install MW Install App Install/Config Done once at image/pattern
creation/customization time
Click “Deploy” and wait Done for each environment request
Hours or Minutes lead time!
68
69. Consistency/Less Errors: “HyperVisor Edition” Images
IBM Middleware shipped as an .OVF virtual image, ready
to run on a hypervisor
The following products offered in HV form as of 8/2010: WAS V6.1 HV
WebSphere Application Server v6.1 WAS V7 HV
WebSphere Application Server v7
WebSphere Process Server v7
WebSphere
WebSphere Portal Server v6.1.5 Application Server
DB2
Operating System
Products support various combinations of:
VMware ESX, z/VM and/or PowerVM hypervisors
Red Hat Enterprise Linux, SUSE Linux, AIX
Maintenance, support, and fixes through IBM for both
WAS and Operating System
New images include most recent GA components of
IBM middleware, as well as OS patches
69
70. Enable a self-optimizing private cloud w/
Intelligent Management Pack!
Use the pattern editor to select the policy-based
1 management options to include in your
environment
2
WebSphere CloudBurst
activates IMP in the
dispensed pattern
3
Policy-based management self-
optimizes your running private cloud
environment until you stop it!
70
71. TCO Analysis Available!
Quantifies WS CloudBurst Benefits
Without WS With WS Enabled by
Virtualization
CloudBurst CloudBurst
Optimization
New
100% Development Rapid provisioning
Strategic
New Benefits
Software Costs Change
Development
Capacity Reduced Capital Expenditures
Reduced Operating Expenditures
Power Costs Additional Benefits
Deployment
Current Reduced risk, less idle time, more
IT (1-time)
efficient use of energy, acceleration
Spend of innovative projects, enhanced
Software Costs
Labor Costs (reduced xx%) customer service
(Operations &
Maintenance) Power Costs
Reduced
(reduced xx%) Business Case Results
annual
Labor Costs cost of Annual Savings: $MM (xx%)
(reduced xx%) operation
Hardware Costs by xx% Breakeven: xx days
(annualized)
Hardware Costs Net Present Value (NPV): $MM
(reduced xx%) Internal Rate of Return (IRR): xx%
Return on Investment (ROI): xx%
71
72. Appliances – what can you touch?
Oracle’s Exadata point of view:
“We discourage installing additional software on the database servers but
we don't prohibit it.
Our guidance is to keep extra software to a minimum e..g just backup,
management, and security agents.
In some cases where there is a serious and measured advantage to running
on the DB servers (e.g. some ETL software) then it might make sense to
install those.
We very heavily discourage or disallow modifications to the Operating
System other than installing packages or fixes officially provided by
Oracle. For example installing third-party device drivers is heavily
discouraged or disallowed.
So, on Exadata you should only install Oracle databases and software related
to it - like third party backup tools, management tools and security tools.
For applications we have Exalogic ..”
Pini Cohen’s work Copyright 2011 @STKI 72
Do not remove source or attribution from any graphic or portion of graphic
73. STKI’s take on Appliances
• The danger of loosing flexibility and lock in situation
should be balanced by the performance and ease of
operations benefits
• It’s just the beginning of the trends and the industry
is not sure where Appliances will be a long term
viable solution
• Not all appliance are the same: Backup Appliance is
not “Core business” Appliance in the perspective of
benefits or risks.
Pini Cohen’s work Copyright 2011 @STKI 73
Do not remove source or attribution from any graphic or portion of graphic
74. STKI’s take on Cloud
• Do something with the cloud (private, public)
– TODAY!
• Automation Automation Automation (which
also means standardization and workflow and
self service)
Pini Cohen’s work Copyright 2011 @STKI 74
Do not remove source or attribution from any graphic or portion of graphic
75. STKI’s theme: Manage Scattered IT
• There are ComputerTechnology domains that
are not handled by IT. Examples:
– Telephony
– Web Sites
– CCTV and Security
– Social Networking
– Computers in manufacturing sites
– Tablet PC’s
• This has to STOP!
Pini Cohen’s work Copyright 2011 @STKI 75
Do not remove source or attribution from any graphic or portion of graphic
76. Using technology to drive growth & profits
Pini Cohen’s work Copyright 2011 @STKI 76
Do not remove source or attribution from any graphic or portion of graphic
77. Ubiquitous Pervasive computing
• Computingsensors everywhere! From your
refrigerator to your shoes to your neighbor’s
dog…
• Implications are enormous especially for:
– More storage growth
– Capturing this information and processing it (CEP)
• Should be part of IT
Pini Cohen’s work Copyright 2011 @STKI 77
Do not remove source or attribution from any graphic or portion of graphic
78. Ubiquitous computing
pervasive computing
External TCP/IP
Internet
Source: http://www.elec.qmul.ac.uk/people/stefan/ubicom/slides/ubicom-ch02-slides.ppt
ICT Network External
Energy Grid
External
Phone
Network
Ubiquitous computing: smart devices, environments and interac
External Video External Audio
Broadcast Broadcast
Pini Cohen’s work Copyright 2011 @STKI
Do not remove source or attribution from any graphic or portion of graphic
79. MEMS
Source: http://bcctae.files.wordpress.com/2010/10/adaptive-experiences-ubiquitous-computing.ppt
Micro fabrication and
integration of low-cost
sensors, actuators and
computer controllers,
MEMS (Micro Electro-
Mechanical Systems)
Ubiquitous computing:
smart devices,
Photo: courtesy of Brett Warneke environments and
interaction
79
Pini Cohen’s work Copyright 2011 @STKI
Do not remove source or attribution from any graphic or portion of graphic
80. DUST
Source: http://bcctae.files.wordpress.com/2010/10/adaptive-experiences-ubiquitous-computing.ppt
Dust: miniaturized devices
can be without visual output
displays, e.g., Micro Electro-
Mechanical Systems
(MEMS), ranging from
nanometers through
micrometers to millimeters.
Smart Dust project , Pister,
UC,Berkely hypothesized that
dust could be spread around
environment to receive and
report changes
Pini Cohen’s work Copyright 2011 @STKI
Do not remove source or attribution from any graphic or portion of graphic
81. SKINS
Source: http://bcctae.files.wordpress.com/2010/10/adaptive-experiences-ubiquitous-computing.ppt
Skin: fabrics based upon
light emitting and conductive
polymers, organic computer
devices, can be formed into
more flexible non-planar
display surfaces and
products such as clothes
and curtains
„SmartSecondSkin‟ is an artefact
designed by Jenny Tillotson to
illustrate a responsive fabric inspired
by neurobiological delivery
mechanisms found under skin.
Pini Cohen’s work Copyright 2011 @STKI
Do not remove source or attribution from any graphic or portion of graphic
82. CLAY
Source: http://bcctae.files.wordpress.com/2010/10/adaptive-experiences-ubiquitous-computing.ppt
Clay: ensembles of MEMS
can be formed into arbitrary
three dimensional shapes as
artifacts resembling many
different kinds of physical
object
„MIT‟s Tangible Media Group is an
actuated tabletop display, which is
able to render and animate three-
dimensional shapes with a malleable
surface. It allows users to experience
and form digital models like geograpil
terrain in an intuitive manner.
Pini Cohen’s work Copyright 2011 @STKI
Do not remove source or attribution from any graphic or portion of graphic
83. Ubiquitous computing
pervasive computing
Audio-Video Cluster Computer as Hub of cluster
Local Network
User Interaction
Internal Comms.
Source: http://www.elec.qmul.ac.uk/people/stefan/ubicom/slides/ubicom-ch02-slides.ppt
Processing:
edit, annotate, compose
Management:
Resources & Content
Storage
Email
Web
Ubiquitous computing: smart devices, environments and inte
Wide network Chat
VoD
Audio-Video Stream
VoIP
Pini Cohen’s work Copyright 2011 @STKI
Do not remove source or attribution from any graphic or portion of graphic
84. Sensor Feeds will influence
storage dramatically
• Sensor Feeds: The tighter linkages between info sharing environment and the operational DCGS/ISR capability providers is
making the technology of sensors critical to plan for our future. Increases in sensor feeds are directly fueling our future needs
for communications, processing and storage capabilities.
1024
Yottabytes
Source: http://ctovision.typepad.com/InfoSharingTechnologyFutures.ppt STKI modifications
1021
Theater Data Stream (2006): Zettabytes
~270 TB of NTM data / year
Example:
One 1018
Theater’s 250 TB Exabytes
Large Data JCTD
12 TB
Storage
Capacity: 2006 2010 Capability Gap
1015
Petabytes
UUVs
FIRESCOUT VTUAV DATA
1012
Terabytes
GIG Data Capacity (Services, Transport & Storage)
2000 Today 2010 2015 & Beyond
Pini Cohen’s work Copyright 2011 @STKI
Do not remove source or attribution from any graphic or portion of graphic
85. NFC: Near Field Communication
Pini Cohen’s work Copyright 2011 @STKI
Do not remove source or attribution from any graphic or portion of graphic
86. NFC: Near Field Communication
Pini Cohen’s work Copyright 2011 @STKI
http://weblog.cenriqueortiz.com/touch-nfc/
Do not remove source or attribution from any graphic or portion of graphic
87. Payment can be Enhanced for the
User with Mobile NFC
Mobile NFC can be used for payment at kiosks,
ticketing, internet, or person-to-person
• Additional uses that enhance payments include:
– Tickets can be purchased, stored, and redeemed.
– Prepaid cards can be bought, stored, and accessed in the phone.
– Coupons can be transferred to a friend, recommending
products.
– Product history and medical warnings can be read in the store.
– Shopping lists can be collected from tags.
– Electronic devices can be activated after purchase and
warranties sent in.
– And many more!
http://www.nfc-forum.org/resources/presentations/Tagawa_Barcelona_2010.pdf
Pini Cohen’s work Copyright 2011 @STKI
Do not remove source or attribution from any graphic or portion of graphic
88. NFC Is More Than Payment and
Mobile Phones
• NFC mobile phones are for more than
payments:
– Secure access to buildings and PCs
– Inventory control with tags and readers
– Security patrols
– Patient monitoring
– Information gathering with educational tags
http://www.nfc-forum.org/resources/presentations/Tagawa_Barcelona_2010.pdf
Pini Cohen’s work Copyright 2011 @STKI
Do not remove source or attribution from any graphic or portion of graphic
89. NFC: Near Field Communication
• “NFC mobile payments to exceed $30 billion by 2012”
• “1 in 6 users worldwide will have an NFC-enabled phone
by 2014”
–Juniper Research
(M)
Pini Cohen’s work Copyright 2011 @STKI
http://juniperresearch.com/shop/products/report/pdf/brochure/3267MPM%20NFC%20report%20brochure.pdf
Do not remove source or attribution from any graphic or portion of graphic
90. Video
Video is a
SCATTERED IT
TECHNOLOGY
Pini Cohen’s work Copyright 2011 @STKI
Do not remove source or attribution from any graphic or portion of graphic
91. Age of Internet Video
Pini Cohen’s work Copyright 2011 @STKI
Source: Cisco VNI Usage, 2010
Do not remove source or attribution from any graphic or portion of graphic
92. Lean IT
• Lean IT - Lean IT is the extension of lean
manufacturing and lean services principles. Its
central concern, applied in the context of IT, is
the elimination of waste, where waste is work
that adds no value to a product or service.
• Lean is a complete process. Part of it is
problem-solving procedures (Kaizen) where
MUDA (waste) is to be found
Pini Cohen’s work Copyright 2011 @STKI 92
Do not remove source or attribution from any graphic or portion of graphic
93. Lean IT
• We are doing all we can. Why do we need
Kaizen procedures?!
• Example of Kaizen procedures in Service Desk
scenario in leading IT organization:
– Reduce support time for incident by 50% (same
staff)!
– Answering the phone according to SLA – from 76%
to 96% !
Pini Cohen’s work Copyright 2011 @STKI 93
Do not remove source or attribution from any graphic or portion of graphic
94. Muda: The Seven Deadly Types of
Waste (classical Lean)
• Defects
• Overproduction
•
Source: http://www.systems2win.com/lk/lean/7wastes.htm
Over-processing
• Transport and handling
• Waiting
• Confusion – missing information
• Unsafe
• Underutilized human potential
Pini Cohen’s work Copyright 2011 @STKI 94
Do not remove source or attribution from any graphic or portion of graphic
95. From Lean to Agile via Kanban
• A Kanban is a physical card used in Toyota Production System
(TPS). It has spread to the manufacturing industry all over the
Source: http://www.infoq.com/articles/hiranabe-lean-agile-kanban STKI modifications
world as a tool of Lean Manufacturing. Now in Agile software
development the visualization of projects, such as posting task
cards on a wall, is a commonly seen practice, which is
sometimes called "Software Kanban", or "Task Kanban".
Pini Cohen’s work Copyright 2011 @STKI 95
Do not remove source or attribution from any graphic or portion of graphic
96. STKI’s take on the Gap
Deal with the GAP!
Pini Cohen’s work Copyright 2011 @STKI 96
Do not remove source or attribution from any graphic or portion of graphic
97. STKI’s take on the Gap
• Spend some effort (time and money) on new technologies. Example:
communicate on social networks, harness your organization with
crowdsourcing, do some IAAS, SAAS, PAAS etc.
• When experimenting be aware that not everything will be “piece of
cake”.
• (repeating because its important) Automation Automation
Automation (including workflow and self service)!
• Automation also means standardization
• In each quarter automate several key processes
• In each quarter dispose several unneeded technologies
• IT personal should understand the business more
Pini Cohen’s work Copyright 2011 @STKI 97
Do not remove source or attribution from any graphic or portion of graphic
98. Agenda
• Major Trends and Issues
• Development and SOA
• ESM BSM CMDB
• DBMS and DATA
• Platforms – Servers
• Clients
• Storage Source: http://astonguild.org.uk/files/NEW_MENU_FRONT_RGB%5B1%5D.jpg
Pini Cohen’s work Copyright 2011 @STKI
Do not remove source or attribution from any graphic or portion of graphic
99. Mini Agenda
• IT Development Survey
• “Code intelligence”
• BRMS CEP
• Data Quality
• HTML5
• Keyword Driven Testing
• SOA maturity
• Selected projects SOA
• SOAESB staffing ratios
• Ratings for SOAESB and ETL tools
Pini Cohen’s work Copyright 2011 @STKI 99
Do not remove source or attribution from any graphic or portion of graphic
100. Technologies Maturity Model
2011– Middleware and Development
Regular use of
Data Quality
tools not only
Business Value for migration
Semantic
Investment AGILE
Full SOA –
to make money BPM Organization
GUI
change
TDD
Cut costs, integration
Lean IT Project
Increase Open Source KDT Pure
HTML5 Business
productivity ESB ALM tools Project
WPF
PaaS
Commodity IT SOA
Services ETL Governance
tools
Investment
for regulations
Using Implementing Looking
Pini Cohen’s work Copyright 2011 @STKI
Do not remove source or attribution from any graphic or portion of graphic
101. STKI IT Development Survey
• The first IT development survey in Israel!
• Covering:
– Development vs. Maintenance budget
– Level of effort in development (requirements, design, code, testing,
etc.)
– Level of effort in maintenance (bugs, new enhancements, infra.
upgrades)
– Development internally, outsourced and package modification
– Regulation vs. planned vs. unplanned
– Development metrics
– QA organization, etc.
– Methodologies used in development process
Pini Cohen’s work Copyright 2011 @STKI 101
Do not remove source or attribution from any graphic or portion of graphic
102. STKI IT Development survey
• How should you use this data:
– Look at the fine print – not all graphs are the same
– including or excluding specific data according to
the industry
– If you do not have all data as stated look at the
ratios
Pini Cohen’s work Copyright 2011 @STKI 102
Do not remove source or attribution from any graphic or portion of graphic
103. New Initiatives (“development”) vs.
Running (“maintenance) Systems
New Running
Israeli IT Average Initiatives Systems
Finance - 73% 27%
Banking
Maint. Telecom 71% 29%
43% Finance - 53% 47%
Dev.
Insurance &
57%
Credit Cards
Health 48% 52%
Government 32% 68%
Source: STKI Survey
The actual question was: Which part from
your development budget is directed to
“development vs. maintenance”
Pini Cohen’s work Copyright 2011 @STKI
Do not remove source or attribution from any graphic or portion of graphic
104. About Development vs.
Maintenance
• Different companies has different takes.
Example:
– “Development – 7 days or more with features that
contribute to company profitability (not
regulation)”
– “Everything is development except bugs
correction or training support. Updating tables is
development”
– Up to two months works is considered
maintenance.
Pini Cohen’s work Copyright 2011 @STKI
Do not remove source or attribution from any graphic or portion of graphic
105. Development vs. Maintenance
definition
Pini Cohen’s work Copyright 2011 @STKI Source: STKI Survey
Do not remove source or attribution from any graphic or portion of graphic
106. Spending from IT budget on
developing new SW projects
All Data
Package
customization
not included
Pini Cohen’s work Copyright 2011 @STKI 106
Do not remove source or attribution from any graphic or portion of graphic Source: STKI Survey
107. STKI IT Development Survey
Requirements,
• Spending from IT Budget 8%
• Testing including
acceptance testing (effort
by IT)
• Development - means Testing, 21%
developers effort and not
necessarily just Design, 19%
development (might
include unit testing and
other testing)
Development,
52%
Source: STKI Survey
Pini Cohen’s work Copyright 2011 @STKI 107
Do not remove source or attribution from any graphic or portion of graphic
108. Per sector
Requirements Design Development Testing
16% 13%
25% 23% 21%
30%
53% 50% 59%
49%
46%
56%
24% 21% 24% 15%
17%
6% 12%
6% 7% 7% 7% 5%
Defence Health Telecom Finance (no Banking PublicGov.
Source: STKI Survey
Banks)
Pini Cohen’s work Copyright 2011 @STKI
Do not remove source or attribution from any graphic or portion of graphic
109. STKI IT Development Report
• Public Government
– Spending more on the requirement stage
– Testing looks is much less mature.
– Therefore developers are dealing with testing
– Several organization are on the building stage of their testing
unitsprocedures
• Health: more effort on design. Less effort on Testing
• Telecom: heavy investment in testing without specific budget to
User Acceptance testing
• Finance (not banking): Heavy Management cost. Lots of
investment in Design
Pini Cohen’s work Copyright 2011 @STKI 109
Do not remove source or attribution from any graphic or portion of graphic
110. Requirement Mgmt. Attention
Public 12%
Telecom 7%
Health 7%
Finance (Insurance & Credit Cards) 7%
Defense 6%
Banking 5%
Source: STKI Survey
Pini Cohen’s work Copyright 2011 @STKI
Do not remove source or attribution from any graphic or portion of graphic
111. Testing Focus
Factors Influencing QA: Telecom 30%
• Internal SW development
• SW is an integral part of Defense 25%
the org. services to
customers Finance 23%
(Insurance & Credit Cards)
• Regulation
• Established Banking 21%
methodologies (CMMI,
ISO) Health 16%
Public 13%
Source: STKI Survey
Pini Cohen’s work Copyright 2011 @STKI
Do not remove source or attribution from any graphic or portion of graphic
112. What “contributes” to Software
maintenance:
• Not all “minor improvements” are the same:
• One company might put all improvement in “development budget” while the other
will put all “new development that is less than two weeks”
• “Infra” is SW adjustment to infrastructure changes – Win7, Oracle 11G, etc.
Source: STKI Survey
Pini Cohen’s work Copyright 2011 @STKI 112
Do not remove source or attribution from any graphic or portion of graphic
113. Who and what is developed?
All including PublicHealth PublicHealth
Source: STKI Survey
Pini Cohen’s work Copyright 2011 @STKI 113
Do not remove source or attribution from any graphic or portion of graphic
114. Development Budget Distribution
Sector Regulation Planned Unplanned
Regulation Finance 30% 47% 23%
15%
Banking 18% 60% 22%
Planned
Unplanned Projects Telecom 18% 56% 26%
Requests 60%
25% Public 15% 60% 25%
Health 6% 75% 19%
Defense 5% 60% 35%
Pini Cohen’s work Copyright 2011 @STKI
Source: STKI Survey
Do not remove source or attribution from any graphic or portion of graphic
115. Metrics used
Project Bugs Faults Depth of Development Other
Management Testing Operations
maturity
Source: STKI Survey
Each respondent could add several metrics
Pini Cohen’s work Copyright 2011 @STKI 115
Do not remove source or attribution from any graphic or portion of graphic
116. Metrics used – what is missing?
Project Bugs Faults Depth of Development Other
Management Testing Operations
maturity
Deployment Hatmaa metrics are missing!
Pini Cohen’s work Copyright 2011 @STKI 116
Do not remove source or attribution from any graphic or portion of graphic
117. Selected Project Management
metrics
• Resource, Time, Features. And keeping track of it.
• LOC – line of code
• Number of mission accomplished in a monthperiod
(normalized on mission size)
• Plan vs. actual in total effort spent per customer,
project
• Net resources vs. overhead (courses, safety, illness-
out of work)
Pini Cohen’s work Copyright 2011 @STKI 117
Do not remove source or attribution from any graphic or portion of graphic
118. Selected Quality (bugfault related)
metrics. All per severity level
• # of bugs in testing and per man year, per K
LOC
• # of escaping bugs (limited time in production)
and per man year, per K LOC
• # of escaping bugs per # of bugs found in
testing
• First time quality – in testing and in
production
Pini Cohen’s work Copyright 2011 @STKI 118
Do not remove source or attribution from any graphic or portion of graphic
119. Selected Quality (bugfault related)
metrics. All per severity level
• # of critical bugs per total bugs found in
testing and in production
• # of requiring bugs (bugs that were not fixed
at after first time)
• # of false positive bugs – bugs that were
reported but actually did not exist
Pini Cohen’s work Copyright 2011 @STKI 119
Do not remove source or attribution from any graphic or portion of graphic
120. Selected testing breath metrics
• Percent of code tested
• Percent of code with automatic tests
Pini Cohen’s work Copyright 2011 @STKI 120
Do not remove source or attribution from any graphic or portion of graphic
121. Selected dev.production process
metrics
• How many changes were introduced to a project
while being developed (not relevant to Agile)
• Did the project followed all procedures
• How many times the project was put to
production (if more than once- something went
wrong…)
• # of LOC developed per specific feature
(comparing two developing
environmentsupporting tools)
Pini Cohen’s work Copyright 2011 @STKI 121
Do not remove source or attribution from any graphic or portion of graphic
122. Other development metrics
• ISO metrics
• Maturity of reporting systems –how well
people report to the activitybug system (is
reporting accurate, how often the reporting
takes place, what is the delay between activity
and the reporting).
Pini Cohen’s work Copyright 2011 @STKI 122
Do not remove source or attribution from any graphic or portion of graphic
123. Organization Position of QA
Office of the
CIO
11%
QA
Development Department
Department 50%
39%
Source: STKI Survey
Pini Cohen’s work Copyright 2011 @STKI
Do not remove source or attribution from any graphic or portion of graphic
124. Show me the QA money!
• When QA is part of development the testing
budget is lower – 38% difference! (at average)
Source: STKI Survey
Pini Cohen’s work Copyright 2011 @STKI 124
Do not remove source or attribution from any graphic or portion of graphic
125. Profile of your testing personnel
Rising interest in Israeli Nearshore due to their subsidization by the Gov.
Nearshore
19%
Internal
Staff
Professional 57%
Services
24%
Source: STKI Survey
Pini Cohen’s work Copyright 2011 @STKI
Do not remove source or attribution from any graphic or portion of graphic
126. Which Methodology is used
• Counted even if used in few projects or
experimenting (for example “using iterative
only in Internet projects” or “experimenting
agile in small projects”
• CMMI is more common in Banking
• ISO certifications used are ISO9001:2008 and
9002.
Pini Cohen’s work Copyright 2011 @STKI 126
Do not remove source or attribution from any graphic or portion of graphic
127. Methodologies in use
Pini Cohen’s work Copyright 2011 @STKI
Do not remove source or attribution from any graphic or portion of graphic
Source: STKI Survey
128. The vendors are certainly listening
Pini Cohen’s work Copyright 2011 @STKI 128
Do not remove source or attribution from any graphic or portion of graphic
129.
130. The magic of code intelligence
Pini Cohen’s work Copyright 2011 @STKI
Do not remove source or attribution from any graphic or portion of graphic
131. The magic of code intelligence
Pini Cohen’s work Copyright 2011 @STKI
Do not remove source or attribution from any graphic or portion of graphic
132. The magic of code intelligence -
SAP Transaction Flow
Pini Cohen’s work Copyright 2011 @STKI 132
Do not remove source or attribution from any graphic or portion of graphic
133. CEP vs. BRMS
• CEP – is something happening? Identify an
event.
• BRMS – what to do with the event.
• Also (sort of..) BRMS that can handle time
related input and with lots of capacity is CEP
• CEP and BRMS should come (or relate) to BAM
Pini Cohen’s work Copyright 2011 @STKI 133
Do not remove source or attribution from any graphic or portion of graphic
136. Data Quality (business perspective )
Pini is Pinhas
Pini Cohen’s work Copyright 2011 @STKI
Do not remove source or attribution from any graphic or portion of graphic
137. Data Quality and Regulation
לצורך יישום הוראות סעיף זה על גוף מוסדי להתייחס לכל הפחות לנקודות ו. •
הבאות:
1) שלמות הדיווחים – יש להתייחס לשלמות הן מבחינת מלאי (כל הדיווחים •
הוכנו) והן מבחינת דיווח (כל הדיווחים נשלחו).
2) תהליך הפקת הדיווחים. •
3) סבירות הנתונים. •
4) לענין הדוח לעמית או למבוטח יש להתייחס בנוסף, בהיבט מצרפי, לנכונות •
שליפת המידע ממערכות המידע, לסך התנועות של ההפקדות והמשיכות במהלך
השנה הרלוונטית ושיעור התשואה ושיעור דמי הניהול השנתיים בגין אותה שנה.
יחד עם זאת, ובהתאם להוראות הממונה שיצאו בדבר טיוב נתונים, יש •
לראות את הרחבת התהליך על יתר נתוני הדוח לעמית או למבוטח בהתאם
ללוחות הזמנים שיקבעו בהוראות טיוב הנתונים
Source: http://www.finance.gov.il/hon/2001/mosdiym/memos/tt2010-26b.doc
Pini Cohen’s work Copyright 2011 @STKI 731
Do not remove source or attribution from any graphic or portion of graphic
138. For dealing with Data Quality
• Define :
– Data Owner (business) – high level management
– Data Custodian (business) – need to actually keep
track of data
– Data Steward (IT) – help to apply the data owner
and data custodian requests
• Apply metrics for Data Quality
• User Data Quality tools
Pini Cohen’s work Copyright 2011 @STKI 138
Do not remove source or attribution from any graphic or portion of graphic
139. Regulation on data transfer
Pini Cohen’s work Copyright 2011 @STKI 139
Do not remove source or attribution from any graphic or portion of graphic
140. HTML5 new features
• Canvas element
• Offline storage database
• Document editing
• Drag-and-drop
• Cross-document messaging
• Geolocation
• Video
GOTO: http://html5demos.com/
Pini Cohen’s work Copyright 2011 @STKI
Do not remove source or attribution from any graphic or portion of graphic
141.
142. Pini Cohen’s work Copyright 2011 @STKI
Do not remove source or attribution from any graphic or portion of graphic
143. Apple vs. Adobe
• Today Adobe is launching an experimental Flash-to-
HTML5 conversion tool called Wallaby. The tool takes
content created with Adobe's Flash Professional and
converts it to HTML5, the latest revision of the Web
markup language. HTML5 is supported in most Web
browsers, but, most importantly, it's supported on
Apple's iPhone, iPad and iPod Touch, where Flash is
banned. Source: http://www.readwriteweb.com/archives/Adobe_Releases_Flash_to_HTML5_Conversion_Tool.php
Source: http://www.google.co.il/imgres?imgurl=http://www.graphicmania.net/wp-content/uploads/10042010/adobevsapple.jpg&imgrefurl=http://www.graphicmania.net/apple-adobe-war-who-is-the-winner/&usg=__qEgJpLjP-6BI8NLK-6kSY7yVCsU=&h=2
Pini Cohen’s work Copyright 2011 @STKI 143
Do not remove source or attribution from any graphic or portion of graphic
144. Easier application development
(the returning of 4GL?!)
Pini Cohen’s work Copyright 2011 @STKI 144
Do not remove source or attribution from any graphic or portion of graphic
145. Keyword-driven testing
• Software testing methodology for automated
testing that separates the test creation
process : a Planning Stage, and an
Implementation Stage.
• This enables automatic test written by testers
and not programmers
Source: wikipedia STKI modifications
Pini Cohen’s work Copyright 2011 @STKI 145
Do not remove source or attribution from any graphic or portion of graphic
146. SOA Maturity Level
The “middle man”
8. ESB team Architect enablesexecuting business services
7. ESB team Architect mandates business services
6. ESB team Architect suggests business services
5. ESB team mandates interface services
4. ESB team with SOAG tools
3. ESB team that suggests interface services
Developer Developer
Designer
2. ESB with team that “do what you are told”Designer
might use BPMSOA
tools independently 1. Integration team – no tools might use BPMSOA
tools independently
0. No Integration Layer
Pini Cohen’s work Copyright 2011 @STKI
Do not remove source or attribution from any graphic or portion of graphic
147. What will help SOA adoption?
• The SOAESB team will not be a bottle neck:
Strict SLA (run time and development process)
Development within the SOA will be done by the developers and not the
SOAESB team
• Run time SOA governance (monitoring, etc.)
• Design time SOA governance (repositories, etc.)
• Shared system analysts for supporting the design of application
• Working together with the project managers.
• The project manager has the final word
• The relationship between the project managers and the shared
system analyst is the key for SOA adoption (reuse, agility, etc.)
Pini Cohen’s work Copyright 2011 @STKI
Do not remove source or attribution from any graphic or portion of graphic
148. Selected Installations 2010-1Q11
Partial List of selected wins –SOAESB
• IBM Websphere SOAESB – FIBI, Bank Leumi, Poalim
(upgrade), IEC (updrage), Amdocs (Upgrade) , IDF
(upgrade)
• IBM Data Power: Teva, Random Logic 888, Isracard
(upgrade), Tehila (upgrade), Menura (upgrade), IDF
(upgrade)
• Tibco (upgrade), Amadeus, Better Place (upgrade), ELAL
(upgrade), Partner (upgrade)
Pini Cohen’s work Copyright 2011 @STKI 148
Do not remove source or attribution from any graphic or portion of graphic