Cloud Frontiers: A Deep Dive into Serverless Spatial Data and FME
STKI Summit 2010 Infra Pini
1. STKI Summit 2010
Architecture and Infrastructure
Pini Cohen
Architecture and Infrastructure
EVP & Senior Analyst
pinicohenstki.blogspot.com
2. Your Text here Your Text here
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 2
3. Agenda
Major Trends and Issues
• What and why
• The solutions
• How was 2009-2010?
• Miscellaneous
Development and SOA
Your Text here Your Text here
ESM BSM CMDB
DBMS and DATA
Platforms – Servers
Clients
Source: http://astonguild.org.uk/files/NEW_MENU_FRONT_RGB%5B1%5D.jpg
Storage
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 3
4. Where are we? The never ending story:
Cost
Risk and
Your Text here Transformation Your Text here
Speed Quality
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 4
5. Pressure on Infrastructure– How
low can you get?!
Your Text here Your Text here
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 5
6. A Few Examples:
Someone changed configuration of secondary load balancer – and forgot to
test it. This ―sleeping bomb‖ was discovered 6 months later…
New patch of Windows server is now stopping port X – production
application is down
Intermittent error in HBA – ERP is down once in a while. It took 2 weeks to
find the cause!
In UPS test the servers are shut down automatically but 15 minutes after
the power is uphere servers are running the UPS halts and all servers are
Your Text
and Your Text here
crashed
Installing new version of VPN product :
• No 64 support
• No internal DNS support – can not connect to Exchange
• Every several hours the appliance is stuck. Patch in 3 months..
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 6
7. The Harsh Reality of Today’s IT Operations
Sunday Monday Wednesday 2 weeks later
01:55 AM 08:25 AM 04:05 PM 06:15 AM
•Performance overhead
•Turn off DEBUG logging
SysAdmin
restarts here
Your Text Your Text here
server •Application team analyzes log files
•Not enough failure detail
•Turn on DEBUG logging
Server down interrupts business
No data available to find & fix
Oracle proprietary and confidential
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 7
8. The result –2009 was a year with
record downtime
Your Text here Your Text here
http://www.cartoonstock.com/newscartoons/cartoonists/ato/lowres/aton942l.jpg
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 8
9. Last year we predicted IT failures
Your Text here Your Text here
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 9
10. The current status – IT Complexity
―What is ultimately driving cloud computing is a crisis of
complexity, driven by the distributed computing model,‖
says Erich Clementi, general manager of Enterprise Initiatives
at IBM.
The result is a huge focus on break/fix expediencies and much
higher costs.
Your Text here Your Text here
Source: http://www.alexanderprado.com/images/complexity%2026.JPG
Source: PWC technology forecast downloaded from http://www.pwc.com/us/en/technology-forecast/summer2009/cloud-computing-evergreen-bechtel.jhtml
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 10
11. The current status – IT Complexity
Loosely coupled teams are actively evolving the IT assets
within their domain
The infrastructure however, remains interdependent, and
the impact of changes across domains is often poorly
understood Source: Elastra
Your Text here Your Text here
Source: http://www.thewe.cc/thewe_/_/_/kdr/hand.gif
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 11
12. What drives complexity?
The total number of
entities (complex)
Their degree of
heterogeneity (more
complex)
Their degree of
Your Text here Your Text here
interconnectedness
(too complex!)
Source: PWC technology forecast downloaded from http://www.pwc.com/us/en/technology-forecast/summer2009/cloud-computing-evergreen-bechtel.jhtml STKI modifications
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 12
13. The solution is (mini agenda):
A man’s got to do what a man’s got to do…
Industry in a Box
Automation
Cloud Eureka!
What else? here
Your Text Your Text here
Source:
http://he.wikipedia.org/wiki/%D7%A7%D7%95%D7%91%D7%A5:Comic_History_of_Rome_p_186_Archimedes_taking_a_Warm_Bath
.jpg
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 13
14. A man’s got to do what a man’s got to do…
Limit time of investigation and
implementation of conclusions
Everyone should follow the change
management processes
Capacity planning for critical resources
All important system must have ―end user‖ here
Your Text here Your Text
monitoring
All related network resources should be
100% reliable
All metrics should be changed once in a
while
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 14
15. Identifying Infrastructure Unification Options
Co-location: Reduction in place
• Reduction in things focused on underlying data center
components (raised floors, etc.)
• Reduction in some asset maintenance contracts
Rationalization: Reduction in kind
Your Text here Your Text here
• Reduce the variety or different types of things
• May reduce the quantity of things, but might not
Consolidation: Reduction in number
• Reduce the quantity of things (installations, instances)
• Could be the same or different things
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 15
16. What more can help?
CMDB with Automatic discovery + dependencies
ITIL / other methodology for better IT processes
Server Virtualization helps in day to day operations and
with availabilityDRP but adds to monitoring complexity
Your Text here Your Text here
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 16
17. Reduce error by InfraOpsApp
cooperation :
The "silo" nature of IT is not enabling to solve issues
effectively and fast. The saying "It is not in my domain"
is heard too much.
Integration between the Infrastructure domains
themselves and between the infrastructure domains to
the application developers who know best how the
Your Text here Your Text here
application works is a must:
• When error happens
• In day to day operations
General CTO Architect that understands both
infrastructure and application will emerge
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 17
18. Bank Of Israel regulation
Your Text here Your Text here
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 18
19. The solution is:
A man’s got to do what a man’s go to do…
Industry in a Box
Automation
Cloud
What else? here
Your Text Your Text here
Source:
http://he.wikipedia.org/wiki/%D7%A7%D7%95%D7%91%D7%A5:Comic_History_of_Rome_p_186_Archimedes_taking_a_Warm_Bath
.jpg
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 19
20. FC over Ethernet (FCoE)
FCoE Benefits
Mapping of FC Frames over • Fewer Cables
Ethernet Both block I/O & Ethernet
Enables FC to Run traffic co-exist on same
on a Lossless cable
Ethernet Network • Fewer adapters needed
Your Text here • Overall less power
Your Text here
• Interoperates with existing
Ethernet SAN’s
• No Gateway - Stateless
Fibre
Channel
Traffic
Source : GlassHouse
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 20
21. The Converged Datacenter
Cisco UCS
HP BladeSystem Matrix
Data
ERP CRM Warehouse
Database
Mail and Messaging
File, Print, Infrastruct
ure
Your Text here Your Text here
Resource
Pool
IBM CloudBurst
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 21
22. Look at the small print
Your Text here Your Text here
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 22
23. The Change Is Coming Fast
Private clouds will transform how we think about IT
• As a service
The impact to businesses will be considerable
• Exploit new economics with confidence
Clear and logical pathway
• Preserve existing investment in applications
and information
• Each step Text here immediate value, and
Your delivers Your Text here
builds for the next
Mission:
turn IT infrastructure into a
low-cost, high-performance and flexible
service
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 23
24. Your Text here Your Text here
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 24
25. The solution is:
A man’s got to do what a man’s got to do…
Industry in a Box
Automation
Cloud
What else? here
Your Text Your Text here
Source:
http://he.wikipedia.org/wiki/%D7%A7%D7%95%D7%91%D7%A5:Comic_History_of_Rome_p_186_Archimedes_taking_a_Warm_Bath
.jpg
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 25
26. The next big thing- Automation
Business-ready infrastructure in action
Service Portal
Service Catalog
Service Service
Requester Compliance
Your Text here Your Text here
Supply Portal
Service Templates
Service
Inventory
Supplier
Source; HP
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 26
27. AppLogic Example: A Virtual Data Centre
AppLogic is a grid operating system which enables utility computing for running and scaling web
applications.
AppLogic captures and operates on the logical structure of the application.
This makes it very easy to assemble, deploy, monitor, control applications visually in a browser.
Your Text here Your Text here
27 Pini Cohen’s work Copyright 2010 @STKI
http://www.3tera.com/AppLogic/
Do not remove source or attribution from any graphic or portion of graphic 27
28. Server virtualization is here. The next
big thing is Automation
What is automation good for?
• Assemble virtual resources (storage, firewall, load
balancer, network, DBMS, etc.) into working application!
• Reuse templates for components, applications
• Reuse procedures for DRP, Backup, SW updates
• Build in (basic) monitoring
Your Text here Your Text here
• Build in configuration and asset management
• Build in CMDB and operational workflow
• Build in Capacity planning
• Part of the resources will be internal part external!
Are we in heaven?!
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 28
29. Automate virtualize what?
Server virtualization
Storage virtualization
Network virtualization
Desktop virtualization
Your Text virtualization
Applicationhere Your Text here
I/O and memory virtualization—Emerging types of
virtualization include I/O and memory virtualization,
both of which break down physically separate sets of
computing resources into more flexible logical groupings
Source: PWC technology forecast downloaded from http://www.pwc.com/us/en/technology-forecast/summer2009/cloud-computing-evergreen-bechtel.jhtml
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 29
30. What will we get from automation?
General Application (Data warehouses, business intelligence,
decision support, etc.) will have non-interrupted access to nearly
unlimited compute, storage, and network resources.
Application workloads declare their infrastructure requirements
programmatically and receive support.
At the infrastructure level, IT manages compute, storage, and
networking capacity as a procurement flow defined by generic
Your Text here Your Text here
capacity requirements.
Reusable and interchangeable components supplement newer, more
advanced components on refresh cycles defined by genuine
technological improvements and budgetary considerations.
Source: PWC technology forecast downloaded from http://www.pwc.com/us/en/technology-forecast/summer2009/cloud-computing-evergreen-bechtel.jhtml
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 30
31. What will we get from automation? (cont.)
New applications are provisioned from a pool of shared
resources whether the scope is for one business unit or the
entire enterprise. This shift moves IT away from provisioning
applications as standalone solutions, avoiding the creation of
legacy technology.
The goal is to be legacy free, which means the only reason
to swap out here
Your Text
a component is because it is broken or less
Your Text here
cost efficient than an alternative.
The only reason to keep a component is because it
efficiently delivers commodity compute, storage, or network
capacity.
Source: PWC technology forecast downloaded from http://www.pwc.com/us/en/technology-forecast/summer2009/cloud-computing-evergreen-bechtel.jhtml
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 31
32. Automation is complicated - Elastra’s ECML
ECML provides an extensible multi-viewpoint
language for modeling an application plane.
Source: http://www.elastra.com/technology/languages/edml
Your Text here Your Text here
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 32
33. Automation is complicated - Elastra’s EDML
EDML – The Elastic Deployment Modeling Language, a
collection of elements for describing the capabilities of
IT software and hardware infrastructure
Source: http://www.elastra.com/technology/languages/edml
Your Text here Your Text here
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 33
34. Automation is complicated - Elastra’s EMLL
EMML – The Elastic
Source: http://www.elastra.com/technology/languages/edml
Management Modeling
Language, a model of
configuration items and
annotations. EMML
describes the context,
state, and dependencies
among items, such as
Your Text here Your Text here
whether an ECML-
described design is
currently deployed, the
state of that
deployment’s EDML-
described resource, or the
version history of either.
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 34
35. The solution is:
A man’s got to do what a man’s got to do…
Industry in a Box
Automation
Cloud Computing
What else? here
Your Text Your Text here
Source: http://he.wikipedia.org/wiki/%D7%A7%D7%95%D7%91%D7%A5:Comic_History_of_Rome_p_186_Archimedes_taking_a_Warm_Bath.jpg
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 35
36. Automation is key requirement for
Cloud solution
Multitenant. A cloud service must support multiple, organizationally distant
customers.
Elasticity. Tenants should be able to negotiate and receive resources/QoS on-
demand.
Resource Sharing. Ideally, spare cloud resources should be transparently applied
when a tenant’s negotiated QoS is insufficient, e.g., due to spikes.
Horizontal scaling. It should be possible to add cloud capacity in small increments;
this should be transparent to the tenants of the service. Your Text here
Your Text here
Metering. A cloud service must support accounting that reasonably ascribes
operational and capital expenditures to each of the tenants of the service.
Security. A cloud service should be secure in that tenants are not made vulnerable
because of loopholes in the cloud.
Availability. A cloud service should be highly available.
Operability. A cloud service should be easy to operate, with few operators.
Operating costs should scale linearly or better with the capacity of the service.
http://209.85.129.132/search?q=cache:IRrnbGDGMLsJ:www.cse.iitb.ac.in/comad/2008/uploads/K_Raghu_CloudComputing.ppt+Multiten
ancy+Elasticity+filetype:ppt&hl=iw&ct=clnk&cd=2&gl=il&client=firefox-a
http://www.cse.iitb.ac.in/comad/2008/uploads/K_Raghu_CloudComputing.ppt
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 36
37. Enterprise Benefits from Cloud
Computing
Capability From To
Server/Storage
10-20% Cloud accelerates 70-90%
Utilization
business value
Self service None across a wide Unlimited
variety of
Test domains.
Weeks Minutes
Provisioning
Change Text here
Your Your Text here
Months Days/Hours
Management
Release
Weeks Minutes
Management
Fixed cost
Metering/Billing Granular
model
Standardization Complex Self-Service
Payback period
Years Months
for new services
Source: IBM Legacy environments Cloud enabled enterprise
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 37
38. Today there are three primary delivery models that companies
are implementing for cloud
Enterprise
Traditional Public Clouds
Enterprise Private Cloud
IT
Hybrid Cloud
Your Text here Your Text here
Private Cloud Hybrid Cloud Public Cloud
IT activities/functions are provided “as Internal and external IT activities/functions are provided
a service,” over an intranet, within the service delivery “as a service,” over the Internet
enterprise and behind the firewall methods are integrated, • Key features:
• Key features include: with activities/functions – Scalability
– Scalability allocated to based on
security requirements, – Automatic/rapid provisioning
– Automatic/rapid provisioning criticality, architecture – Standardized offerings
– Chargeback ability and other established – Consumption-based pricing.
– Widespread virtualization policies. – Multi-tenancy
Source: IBM Market Insights, Cloud Computing Research, July 2009.
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 38
39. The public cloud layers
Your Text here Your Text here
Source: GS http://blogs.zdnet.com/BTL/?p=28476
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 39
40. Cloud adoption
Your Text here Your Text here
Source: http://blogs.idc.com/ie/wp-content/uploads/2010/01/Likely_Cloud_Adoption.jpg
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 40
41. Cloud
Your Text here Your Text here
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 41
42. Startup that enables the Cloud Storage
concept
Your Text here Your Text here
Source: http://www.baraka.ca/Image-NASsa/Nassa_scheme.jpg STKI modifications
Source: http://www.baraka.ca/Image-NASsa/Nassa_scheme.jpg STKI modifications
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 42
43. A Look Inside Azure
Your Applications
Your Text here Your Text here
Service …
Workflow Database Analytics Identity Contacts
Bus
Access
… Reporting … Devices …
Control
Compute Storage Manage …
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 43
44. Private Cloud and “Industry in a Box”
―Industry in a box‖ is the building block of Private Cloud
From the VBLOCK advertisement:
Private clouds will transform how we think about IT
• As a service
The impact to businesses will be considerable
• Exploit new economics with confidence
Your Text here Your Text here
Clear and logical pathway
• Preserve existing investment in applications
and information
• Each step delivers immediate value, and
builds for the next
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 44
45. The solution is:
A man’s got to do what a man’s got to do…
Industry in a Box
Automation
Cloud
What else? here
Your Text Your Text here
Source:
http://he.wikipedia.org/wiki/%D7%A7%D7%95%D7%91%D7%A5:Comic_History_of_Rome_p_186_Archimedes_taking_a_Warm_Bath
.jpg
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 45
46. What else is needed?
Prerequisite for automationcloudreduce complexity is
standardization and SOI (Service Oriented Infrastructure)
Your Text here Your Text here
source:: http://rlv.zcache.com/im_an_artist_torture_is_a_prerequisite_tshirt-p235209830127787742yafb_400.jpg
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 46
47. SOI ServicePattern Oriented Infrastructure
– example Storage Services
Disk Tape
Online
Automated
Tier Enterprise Midrange Capacity/Arc Manual
Capacity
hival
Design Monolithic Modular Modular ATL Rack
SCSI/FC Drives
Drive Interface SCSI/FC ATA/SATA FC People
Drive/Media Your Text here Your Text here
Reliability MTBF 1.2 Million+ 1.2 Million+ 400K+ 1 Million+ 1 Million+
(Hour)
Performance:
rpm 10K-15K 10K-15K 7.2K
Seek Time <6ms <15ms <1 sec. <1 min. days
Fixed
Key Environments Mission Business Critical BU, Archival, WO
Content, WORM, A Archival, BU
Critical, OLTP RM
rchival
Provisioning SLA Once a week Once a month Once a month
Pini Cohen’s work Copyright 2010 @STKI
Source: OLD STKI research
Do not remove source or attribution from any graphic or portion of graphic 47
48. SOI – Service Oriented Infrastructure:
Example of Service Definition
Name: Identity infrastructure service • Examples
Owner: Bob Smith, architect MSFT Active Directory (NOS file and print)
Description MSFT Passport online service
• Providing user identity information • Principles
(attributes), including authentication Simple authentication is usually enough
credentials and related SSO services; also Replication to scale (mostly read-only)
offers Web URL permissions
• Component and service manifest
Use case API: LDAP, Web server exits, proprietary
• Direct use by application (LDAP)
Your Text here Presentation: NA Text here
Your
• Indirect use via Web server (with attribute
Application server: NA (see Web SSO)
passing in headers)
Integration: Metadirectory utilities
• Direct use by application (security APIs)
Database: iPlanet Directory Server
Service-level matches
Server HW/OS: Sun Solaris on SPARC …
• + Scalability (over 500 users, etc.)
Storage: EMC SAN
• + Scale incrementally using replicas
Network: NA
• – Direct application support
Security: Netegrity SiteMinder Web SSO
Pricing Management: Delegated admin, …
• ―Included‖ in e-business costs
• Maturity
Installed since 2001 with all customer names
Used by X, Y, Z apps now
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 48
49. What Are the Benefits of Infrastructure
Services ?
Technology reuse
• Pattern blueprints: Architecture, technology, product, configuration
• Technical services:
Actual implementations
Process
IT Process reuse
• Pattern matching
• Service support
Technology People
• Predictive costing
Your Text here P2 Your Text here
• Experience gained: Good and bad practices P7 P
P8 P1
1
P3 P3
People reuse P5 P4
P6 P8
P7
• Fewer technology skills specific to the pattern
• More common roles focused in fewer service areas T2
J1
T1
J1
J3 J2
T7 T8 J6 T2
T1 J4
T4 J4 J7 T3
T3 J2 J6
T6 T5 J8 J5
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 49
50. Standardization is the key for automation.
PWC case study at Bechtel
Your Text here Your Text here
Source: PWC technology forecast downloaded from http://www.pwc.com/us/en/technology-forecast/summer2009/cloud-computing-evergreen-bechtel.jhtml
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 50
51. Mergers and Acquisitions
Virtualization vendors vs. Automation vendors?
Automation specific vs. general ESMoperations ?
Except more M&A’s:
• IBM is shopping for middleware (think Tibco, Red Hat), datacenter automation
(BMC), virtualization (Citrix) and project lifecycle management (Parametric).
• Cisco is shopping for datacenter automation and virtualization.
• HP wants to buy middleware, security, storage management and virtualization
companies. here
Your Text Your Text here
• Oracle is shopping for applications, middleware and data center automation
companies.
• EMC and Symantec are also eyeing data center automation companies.
What does this mean to you?
Source: GS http://blogs.zdnet.com/BTL/?p=28476
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 51
52. What else: Back to the Future
Industry in a Box:
Your Text here Your Text here
Public Cloud: Service Bureau (―
―)
Concurrent licensing (Microsoft
DynamnicsAX
Source; http://www.vintageadbrowser.com/computers-and-software-ads-1970s/3#adjdqd5tnb8bv4yr
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 52
53. What else: Infrastructure Department:
Before
Infra.
Manager
Your Text here Your Text here
Networking PC System DBA Storage
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 53
54. Infrastructure Department: After
Infra. Manager
Your Text here Your Text here
PC System/Storage/Networking DBA
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 54
55. You may not believe it but:
Major Israel integrator sends his network presale
personnel to VMWARE course!
Your Text here Your Text here
Source: http://www.eglobe1.com/index.php/2006/09/02/unbelievable-pictures/
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 55
56. Conclusion:
• Virtualization
• Standardization Rationalization
• Infrastructure Services
• Automation
• Consolidation
• Process improvements
Your Text here Your Text here
• PrivatePublic cloud Source: http://languagearts.pppst.com/synonyms.html
Are all ―synonyms‖ in the infrastructure world!
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 56
57. Agenda
Major Trends and Issues
• What and why
• The solutions
• How was 2009-2010?
• Miscellaneous
Development and SOA
Your Text here Your Text here
ESM BSM CMDB
DBMS and DATA Source: http://astonguild.org.uk/files/NEW_MENU_FRONT_RGB%5B1%5D.jpg
Platforms – Servers
Clients
Storage
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 57
58. Was this a different year ?!
The high Shekel rate during the beginning –
mid of 2009 caused the infrastructure
departments to have "less" money than
expected
Budget was very late (government) part of the
units did not pass budget. Procurement only at
the end of year
Your Text here Your Text here
In many organizations, about 30% to 50% there
was no cut off!
Most of the cut off was from January to
September. Afterwards there was a catch –up.
Although organizations reported cut offs
purchasing some storage and some servers was
common
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 58
59. This year in Israel – cut off
Salary reduction for "temps", outsourcing and for the general
IT employees
From single to dual vendor in every area
Moved equipment from insurancemaintenance of 7*24 to 5*5
to "per-call"
Changed suppliers – example from CISO to 3COM in smaller
Your Text here Your Text here
switches, from DMXHDS-USPDS8000 to XIV
Printing consolidation projects
No color printing
"Green IT" projects – shutting down the PC at night
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 59
60. This year in Israel – cut off
Moving to bigger servers more cores per server for discount in SW (some
SW is still per Server or per Socket)
Projects are late 3 months or more in delivery
Delaying projects like – ESB, Security projects (that are not mandatory by
regulation)
Delaying HW refresh cycles
Dedup and VTL technology are sometime considered as a mean for cutting
costs Your Text here Your Text here
Tools that save money: example Appsense for improving server rations in
Citrix environment. Server virtualization was considered as a mean for
saving money as well !
Moving from Unix to Linux is also considered as "saving money" activity
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 60
61. This year in Israel - Technology
Server virtualization is the king! Clients reached very quickly
70% and 80% and more from total Windows production systems
in virtualized environment.
Users report mainly:
• Easier operations
• Faster time to market
• Better availability
Your Text here Your Text here
However, running to standard-virtualized platforms might not
be suitable for all kinds of applications (DBMS, ESB). The
virtualization technology is not 100% mature and storage is
huge issue in virtualization (performance, backup, etc.)
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 61
62. This year in Israel - technology
Sometimes applications had to be ―specially tuned" so
they can work safely in Virtualized environment.
Clients are using VTL and DEDUP more and more.
First Cloud projectsbids – better service for the
customers via the cloud
Your Text here Your Text here
Some clients went massively to virtualization for
"environmental mandatory circumstances" – "NO
ELECTRICITY AT ALL" !
"Crazy" storage growth !
More SBC (terminal servers, VDI , thin clients) for security
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 62
63. Agenda
Major Trends and Issues
• What and why
• The solutions
• How was 2009-2010?
• Miscellaneous
Development and SOA
Your Text here Your Text here
ESM BSM CMDB
DBMS and DATA
Platforms – Servers
Clients
Storage
Source: http://astonguild.org.uk/files/NEW_MENU_FRONT_RGB%5B1%5D.jpg
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 63
64. IT as a hero not as a showstopper
Explore new technologies (IT usually does it!)
Enable Personal devices (iPhone, Win Mobile, Nokia…) that were
not enabled before.
(Try to) Enable Apple Mac! Enable larger variety of laptops.
Self service for developers
Help the business in outsourcing deals
Enable Your resources for clients (example test environment for
IT Text here Your Text here
clients).
Give clients what IT has developed for users (shut down PC’s at
night)
Consider to enable the developer to use his ―own‖
developmentALM tools
Information Technologies or Business Technologies ?
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 64
65. New Technology –
the good the bad and the evil…
Good Bad
Do things better (faster, • Not working many bugs
more efficient, more
reliable, cheaper) • Not mature – 3rd party not
Why go to old technology supported, etc.
(that will eventually not be • Not enough knowledge in
supported)? here
Your Text Israel or abroad
Your Text here
Business advantage • Too much effort –
Human Capital management “bleeding edge”
– people love new stuff !
• “Dead End” technology
Why are you moving to new technology?
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 65
66. Good Infrastructure manager:
Goes the ―safe (expensive) way‖ or the ―bold way‖ ?
Your Text here Your Text here
Source: http://www.indofamily.net/men/images/stories/articleimages/man%20sleep.jpg Source: http://i.telegraph.co.uk/telegraph/multimedia/archive/01356/man_awake_1356713c.jpg
At STKI Round Table: ―I am paid for not sleeping well at night‖
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 66
67. What clients hate:
Project is delayed because immaturity
Lock-In and have to pay more
Your Text here Your Text here
Something that causes rewrite
Source: http://bkmacdaddy.com/blog/wp-content/uploads/2009/12/angry.jpg
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 67
68. New Generation of Knowledge
Workers
Live in virtual worlds
Expect immediate results
Many open threads
Deliver quickly, in small increments
Expect personalization
Your Text here Your Text here
Intolerant of disruption
In short: very agile!
http://www.solutionsiq.com/resources/SIQ-
AgileDevelopmentPlatform-Rudd-Young-
Agile2008.ppt
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 68
69. IT infrastructure turn around
IntelAMD servers 3-5 years
PC 3-4 years
Screen 3-6 years
Laptops 2-3 years
Thin clients 5-10 years
Storage 3-5 years
Your Text here Your Text here
Network Backbone Switches 7-9 years
Network Edge Switches 3-5 years
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 69
70. We will present data on products and
General
vendors:
1. Israeli vendors rating – state of the current market focused on the
enterprise market (not SMB)
X – Market penetration (sales + installed base+ clients
perspective)
Y – is X plus localization, support, development center, number
and kind of integrators, etc.
Worldwide leaders marked, based on global positioning
Your Text here Your Text here
Vendors to watch: Are only just entering Israeli market or
making a big change so can’t be positioned but should be
watched
Represents the current Israeli market and not necessarily what we
recommend to our clients
2. Products and selected resellers / implementers
The location within the list is random
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 70
71. We will present data on products and General
vendors (cont.)
3. Selected installations of products – projects in different stages
, production,implementation, after decision…
4. Service providers that are used by users . I asked users – ―which SI
do youYour Text here category‖ and counted the result. here
use in this Your Text
5. Analysis by international and Israeli analysts
This complete information (1 to 5) should be used
together, combined with the specific circumstances of each
case when making a decision
This subjective chart is the result of our
objective research
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 71
72. General
Your Text here Your Text here
Pini Cohen’s work Copyright 2010 @STKI 72
Do not remove source or attribution from any graphic or portion of graphic 72
73. Ratio Analysis:
Sorted Metric Metric
25% percentile 36 57
43 36
50% percentile = median 50 117
50 438
75% percentile 57 60
60 175
60 150
68.6 25% percentile 71 143
100 120
100 50
109 250
117 125
Your Text here Your Text here
117 280
120 60
120.0 50% percentile = Median 120 200
125 117
125 100
143 164
150 125
164 600
175 192
178.1 75% percentile 188 71
192 120
200 50
250 188
280 43
438 109
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 600 100
73
74. Upcoming Round Tables
TITLE DATE
IT procurement managers - going out of the economic down turn
DBA - technologies, methodologies, tools and organization
Your Text here
Infrastructure and Operation managers - change management here
Your Text
in production environment - tools and methodologies
Storage managers - current technologies (VTL's, DEDUP, Thin
Provisioning) and future technologies (FCOE)
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 74
75. Agenda
Major Trends and Issues
• What and why
• The solutions
• How was 2009-2010?
• Miscellaneous
Development and SOA
Your Text here Your Text here
ESM BSM CMDB
DBMS and DATA
Platforms – Servers
Clients
Storage Source: http://astonguild.org.uk/files/NEW_MENU_FRONT_RGB%5B1%5D.jpg
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 75
76. Technologies Maturity Model DEV
2010 – Middleware and Development Trends
Business Value
Investment Semantic
AGILE
to make money Full SOA –
BPM Organization
Cut costs, Increase GUI
change
integration TDD IT Project
productivity
ESB Open Source Pure
Business
WPF ALM tools Project
EAI PaaS
Commodity IT SOA
Services ETL Governance
tools
Investment
for regulations
Using Implementing Looking
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 76
77. Best Practices in APP Dev
Front end applications are changing fast, better GUI, easier to
develop.
Backend applications put emphasis on RAS (reliability
availability scalability) , integration, security. Less frequent
changes.
No more one MF with one CobolCICS environment:
Organizations will have to deal with many programming
Your Text here Your Text here
languages, tools, run time environments, etc.
Orchestrations and integration is the name of the game
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 77
78. Agile Project Management - Overview DEV
Trends
12
9
Implement
Analysis
Analysis
Code
Code
Test
Test
6
Your Text here Your Text here
3
3 6 9 12
Pini Cohen’s work Copyright 2010 @STKI Source: Cutter
Do not remove source or attribution from any graphic or portion of graphic 78 78
79. Agile Software Development
Agile Software Development is catching up in Israeli ISV organizations
(mainly with AgileSparks).
Clients see the benefits of Agile in small-medium projects
Large Agile projects (50 people) are more challengeable mainly when
there is high interdependencies between the SW modules
Agile is demanding more from the developers
Israeli ISV’s Text here that sometimes their clients demand Agile!
Your report Your Text here
Many Israeli IntegratorsDevelopers organizations run from Agile like
hell!
,הכנס יתקיים ביום חמישי ב- 92 באפריל במלון דייויד אינטרקונטיננטל
08:30-15:30 בין השעות
.הכנס יספק ידע עדכני ומעשי לעוסקים בתחום או למתעניינים חדשים
וכמובן ידברו עלLean - והAgile -מומחים יציגו את הנושא הקריטי של ניהול המוצר בעולם ה
. Scrum -נושאים מתקדמים ב
.כמו כן, בכנס יוצגו סיפורי לקוח ע"י נציגי החברות הישראליות שהטמיעו בהצלחה את השיטה
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 79
80. The SW developer manager goals are:
Keep all this in the right balance:
• SOW – Scope of Work
• Budget
• Time
• Quality
Your Text here Your Text here
Source: http://www.bisconsulting.ca/img/seminars/large/goal_setting.jpg
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 80
81. SW development insights
Bugs are the most easy metric to measure and track
Sometimes too much effort is spent on bugs (example:
minor memory leak) while important functionality is
delayed
Do not give unrealistic metrics – developers will not
reportYour Textreal situation
the here Your Text here
How much effort should developer put in ―non-dev‖
missions (like detailed progress report)?
Should maintenance be part of the general development
team or should maintenance have a special ―team‖?
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 81
82. SW and Development metrics
Bugs
• How many bugs (including severity)
• When the bug was open, when it was closed
• Number of bugs correspondingly to closing date of the version
• When was the bug found(dev, functional test, regression, prod = escaping bugs)
Test coverage (what part of SW was tested)
Percentage of automatic tests (from the complete project = automatic +
manual)Your Text here Your Text here
Progress of project compared to plan
How many (and percentage of) passed builds
Personal metrics (loyalty to the firm)
Development of new functionality vs. effort to correct bugs from (prod and
from tests)
STKI recommends: change your metrics once in a while
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 82
83. TIOBE Programming Community
Index for Feb 2010
Your Text here Your Text here
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 83
85. Google’s Go programming language
The syntax of Go is close to that of C except for the type
declarations
Also missing parentheses around for and if expressions
It is designed for exceptionally fast compilation times,
even on modest hardware.
Your Text here Your Text here
Go was not considered to be ready for adoption in
production environments (at time of launching)
Source: http://en.wikipedia.org/wiki/Go_%28programming_language%29
Source: http://www.raakesh.com/images/go.png
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 85
86. Objective-C vs C#
Obj-C C#
[[object method] method]; obj.method().method();
Memory Pools Garbage Collection
Your Text here Your Text here
+/- static/instance
nil null
(void)methodWithArg:(int)value {} void method(int value) {}
YES NO true false
@protocol interface
Source :http://www.fekke.com/iPhoneDevelopment.ppt
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 86
87. Meanwhile… in the Holly Land
Source: STKI
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 87
88. JAVA vs. .NET revisited
Converting .Net (mainly C#)
programmers to Java is not
trivial
Java has more options than
.Net. This means that Java
organizations have to invest
more in standards, guidance,
Your Text here Your Text here
architecture, and software
infrastructure.
A well-known pain point of
.Net, and Microsoft solutions in
general, is backward
compatibility.
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 88
90. The Microsoft Platform - AZURE
S O F T WA R E SERVICES
Applications “BPOS”
Developer Tools
Your Text here Model
Programming Your Text here
Application Services
Relational Database
Operating System
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 90
91. Windows Azure Data Centers
2010
Northern
North Europe
Central USA
2010
2010
Eastern
Western Asia
Europe
South
Your Text here Your
2010 Text here
Central
USA Southeast
Asia
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 91
92. Your Text here Your Text here
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 92
93. Microsoft Azure : Project Sydney
Technology that enables customers to connect securely to
their on-premises and cloud servers.
Some of the underlying technologies that are enabling it
include
• IPSec
• IPV6 Text here
Your Your Text here
• Microsoft’s Geneva federated-identity capability
It could be used for a variety of applications
• Fail over cloud apps to on-premises servers or to
• Run an app that is structured to run on both on-premises
and cloud servers
Source: http://blogs.zdnet.com/microsoft/?p=4582&tag=col1;post-4582 stki modificstion
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 93
94. Microsoft Azure - Dallas
Remove friction for building applications leveraging 3rd party
data:
• Service allowing developers and information workers to easily discover,
purchase, and manage premium data subscriptions in the Windows
Azure platform
• Dallas is an information marketplace that brings data, imagery, and
real-time web services from leading commercial dataText here
Your Text here Your providers and
authoritative public data sources together into a single location, under
a unified provisioning and billing framework.
• Dallas APIs allow developers and information workers to consume this
premium content with virtually any platform, application or business
workflow.
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 94
95. Planning a Night Out
Show times
Predicative parking
Restaurant reviews
Real-time weather
… Your Text here Your Text here
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 95
96. Magic as integral part of Microsoft Visual Studio
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 96
97. Unified Desktop
Integrating systems ―on the glass‖ at the GUI level
Best results for
• Read only
• Business workflow that updates several systems independently
Not applicable for business scenario that updates several systems in
―related‖ manner (deeper level of integration is needed – ESB with
application change)
Better faster business agility - changing the businessYour Text here without
Your Text here workflow
changing the underlying applications!
However :
• Who is responsible for the workflow? The ―application team‖ (example
CRM) or the middleware team?!
• If the business applicationcontext is changed does it reflect in the GUI
integration layer?
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 97
98. BPM Client testimony:
Are we mature enough for BPM?
Setup effort for BPM is huge
Ideal situation for BPM –
diversity:
• Manual and automate process
flow
Your Text here Your Text here
• Long term and short term
process flow
• Lots of systems to integrate
• Lots of changes in process flow
• When agility is needed in
business processes Source: http://blog.oregonlive.com/clackamascounty_impact/2009/07/large_Worthington-Testifies.JPG
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 98
99. BPM Client Testimony
Tried before to implement BPM in small system but failed. The
setup cost was too high.
Very helpful in integrating processes in diverse system,
technologies, types of access
Data entry is done in the BPM
Business logic is not in the BPM only the flow itself (although
Your Text here Your Text here
very tempting):
• Instead of ―if amount is about 1000 activate X‖ they will have
―ask the application – what to do if amount is Y‖
• In ―notifications system‖ they will put together SMS , email,
fax, etc. but not put the rules when to access each channel
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 99
100. SOA Adoption
What are the 3 most important factors for SOA success:
Organization, Organization and Organization !
SOAIntegration might become (very easily) the bottle
neck of SW development !
SOA is easier to implement in smaller IT shops especially
when all Text here
Your
development is done in centralized place
Your Text here
Should SOA take care of business logic?
SOA is now working fine! But we had to rewrite 3 time…
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 100
101. SOA Maturity Level
The “middle man”
8. ESB team Architect enablesexecuting business services
7. ESB team Architect mandates business services
Your ESB team
6. Text here Architect suggests business services
Your Text here
5. ESB team mandates interface services
4. ESB team with SOAG tools
3. ESB team that suggests interface services
Developer Developer
Designer
2. ESB with team that “do what you are told” Designer
might use BPMSOA
tools independently
1. Integration team – no tools might use BPMSOA
tools independently
0. No Integration Layer
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 101
102. Intel Software is represented by SRL
Your Text here Your Text here
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 102
103. Oracle acquires Amberpoint
Your Text here Your Text here
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 103
104. Business Rule Management System (BRMS)
Anatomy of a BRMS
Create rules in a business language
Execute rules (rules engine)
Edit and change rules
Procedural Business Rule
Approach Approach
Your Text here Your Text here
Business Rules
Application Code Application Code
Source:: http://www.wowgao.com/2006ef/2005ef/PDFfiles/Joe_Boissy_efinancial_ILOG.ppt STKI modifications
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 104
105. BRMS Client testimony - Finance
They have 2 BRMS developed in their legacy system
The more developed BRMS is used in less projects
(although it as 14K rules!)
Who is putting the rules:
• TheYour Text here – more responsibility on theYour Text here –more
business business
skills, more knowledge – business prefers not to take this
responsibility
• The IT – so why not to code it (more control, better
performance)?
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 105
106. What is lean?
Japanese automotive Industry developed Lean manufacturing
with a lead from Toyota and utilising the Toyota Production
System (TPS) factory.
Lean philosophy is to maximize customer value by eliminating
waste and optimizing the existing processes in all aspects of a
firm’s production activities: human relations, vendor
Your Text here Your Text here
relations, technology, and the management of materials and
inventory.
Lean means doing more with less effort. Lean Organization
understands customer value and focuses their key processes in
meeting customer needs with all muscles without any fat /
waste.
Source: http://www.hydspin.org/files/conf09/g_appa_rao.ppt STKI modifications
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 106
107. What is Lean?
R&D
R&D
Design
Design
T
I Production Setup
C M
Y
Production Setup E
Manufacturing
C
L
DISTR.
E YourManufacturing
Text here Optimized thru LEAN Your Text here
Acceptance & release
T
I DISTR.
M
E
Acceptance
and release
Source: http://www.hydspin.org/files/conf09/g_appa_rao.ppt STKI modifications
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 107
108. Lean Benefits
Cycle Time
Wait Time
(non value
add) Before
Work Time
(value add) After
Same work
completed in
Productivity
less time
Cost Customer satisfaction Cost/Chaos
Defects Text here
Your Profit Your Text here
Lead time Customer responsiveness
Inventory Capacity
Space Quality
Waste! Cash flow
Cycle time
On time delivery
Source: http://www.hydspin.org/files/conf09/g_appa_rao.ppt STKI modifications
Relentlessly focus on reducing non-value adding activities
Source: http://www.hydspin.org/files/conf09/g_appa_rao.ppt STKI modifications
Pini Cohen’s work Copyright 2010 @STKI
Do not remove source or attribution from any graphic or portion of graphic 108
Notas del editor
Comfortable participating in virtual worlds Expect immediate results and feedback Have many open threads and parallel tasks Deliver quickly and in tiny increments Expect personalization and customization Intolerant of workstream disruption In short: very agile!
Columnar isn’t columnar isn’t columnar; each product is different. The same goes for row-based. Still, this categorization is the point from which to start.
Oracle (pre-Exadata) and SQL Server (until Madison ships) are single products meant to serve both OLTP and analytics. Any of the main versions of DB2 is something like that too. Sybase, however, separated its OLTP and analytic product lines in the mid-1990s.
If you need to manage mucho over 10 terabytes of user data, most of your attractive alternatives are in this category.
Sybase IQ is the granddaddy, but it’s not MPP.SAND is another old one, but it’s focused more on archiving now.Vertica is a quite successful recent start-up, with >10X the known customers of ParAccel (published or NDA).InfoBright and Kickfire are MySQL storage engines. Kickfire is also an appliance.Exasol is very memory-centric. So is ParAccel’s TPC-H submission. So is SAP BI Accelerator, but unlike the others it’s not really a DBMS.MonetDB is open source.
Bullet1: vMotion moves VMs across physical ports—the network policy must followFrom a network perspective, one would like to have a security policy that is attached to the virtual machine as it moves. Unfortunately, today’s tools only allow for network policy to be attached to the physical server. In fact, VMware has a tool called DRS, or Dynamic Resource Scheduler, that automatically migrates the VM depending on CPU and memory loads. Regardless of the time of day, network administrators need to know what the VMs are doing. What they really need is mobile security policy attached to the VM Bullet2: Impossible to view or apply network policy to locally switched trafficThe second issue with server virtualization is the virtual switch inside the hypervisor that switches packets between virtual machines. It is actually fairly difficult to see which VM is actually talking to other VMs inside the server. Customers are demanding troubleshooting and debugging capabilities inside the server. Bullet3: Need collaboration between network and server adminThere is muddled ownership of the virtual switch. Nowadays, server admins manage the virtual switch, and they need constant communication with their nework administrator to configure the virtual switch. On one hand, Server admins want their network team to configure the virtual network. On the other hand, network admins are demanding network tools to configure the virtual switch and they want visibility down to the virtual machine.Nexus 1000V overcomes these three server virtualization issues, and accelerates datacenter virtualization.
Answer: When I talk about SBC – its 100% execution on the ServerI do not understand the other remarks ==========Send flex cast delivery PPTSBC (= hosted application or/and hosted desktop)Terminal services – shared desktopVirtual desktop = hosted desktop
Answer: Server hosed VDI – running on the server ==========VDI or offline VDI /client virtual desktop with XenCleint?
Answer – the PROS are for VDI vs. Terminal servers so I do not think that VDI is more secure than Terminal Servers (“traditional Citrix”)PRO: non standards = software not running in multiuser environementMore control/SecuritySolves “secure browsing “regulation OS Central management, fast and secure deliveryCan leverage existing client devises User experience = similar to local desktop experienceCONS:Distribution SW can be solved is you associate/integrate Virtual desktop with Application virtualisation technologyStorage: not needed if use latest provisioning PVS technology. In general more infra (Server and storage mainly)
Answer: - sunray hpchippcSUNRAY?Cons: WinCE not preferred choice for VDI with thin client (WES windows XPe) or Linux)
Answer - not a promo. Some clients forgot to put this in their calculations… Promo ?
The other big investment we are making to Enhance Security and Control is around Application Control.The longer a computer has been deployed, the more the software on it drifts away from its desired configuration. These inconsistencies are greatly accelerated by installation and execution of non-standard software within the desktop environment. Users today bring software into the environment by bringing in software from home, Internet downloads (intended and not intended!), and through email. The result is a higher incidence of malware infections, more help desk calls, and difficulty in ensuring that your PCs are running only approved, licensed software. Coupled with compliance requirements in the enterprise through OCI, SOX, HIPPA and other regulations, enterprises are renewing efforts to lock down their desktops as a means to: Reduce total cost of ownership (TCO)Increase security to safeguard against data loss/threat of IT theft and to protect privacy Support compliance solutions by validating which users can run specific applicationsWith Windows XP and Windows Vista, we gave IT administrators Software Restriction Policies to enable the definition of application lockdown policies. However, SRP was difficult to implement because the rules were based on application hashes, which meant that they had to be re-created anytime the application was updated. Windows 7 reenergizes application lockdown policies with a totally revamped set of capabilities. AppLocker provides a flexible mechanism that allows administrators to specify exactly what is allowed to run on their systems and gives users the ability to run applications, installation programs, and scripts that administrators have explicitly granted permission to execute. As a result, IT can enforce application standardization within their organization with minimal TCO implications.For example, a rule could be written that says “allow all versions greater than 8.1 of the program Photoshop to run if it is signed by the software publisher Adobe.” Such a rule can be associated with existing security groups within an organization, providing controls that allow an organization to support compliance requirements by validating and enforcing which users can run specific applications.