1 / 28

The Data Centre of the Future

The Data Centre of the Future. Gareth Fraser-King Head of Enterprise Marketing Development, EMEA. In the last 20 years…. The Data Centre has gone through a massive number of changes In 1986…. Intel microprocessor speed was 8 MHz; today we have 3.4 GHz machines at home = a 400x increase

ernestol
Download Presentation

The Data Centre of the Future

An Image/Link below is provided (as is) to download presentation Download Policy: Content on the Website is provided to you AS IS for your information and personal use and may not be sold / licensed / shared on other websites without getting consent from its author. Content is provided to you AS IS for your information and personal use only. Download presentation by click this link. While downloading, if for some reason you are not able to download a presentation, the publisher may have deleted the file from their server. During download, if you can't get a presentation, the file might be deleted by the publisher.

E N D

Presentation Transcript


  1. The Data Centreof the Future Gareth Fraser-King Head of Enterprise Marketing Development, EMEA

  2. In the last 20 years… • The Data Centre has gone through a massive numberof changes • In 1986…. • Intel microprocessor speed was 8 MHz; today we have 3.4 GHz machines at home = a 400x increase • LANs were running Ethernet at 10 Mb/s; today 10 Gb/s is not uncommon = 1000x increase • PC data storage has grown from having 10 - 20 MB drives to 500 GB today = 25,000x increase • …none of which we could have foreseenall those years ago IBM Portable PC 5155 Model: Model 68 Introduced: February 1984 Price: US $4225 Weight: 30 pounds CPU: Intel 8088 @ 4.77MHz RAM: 256K, 640K max Display: 9-inch amber display - CGA graphics, 80 X 25 text Storage: Two 360KB 5.25-inch disk drives Ports: 1 parallel, 1 serial, CGA video OS: IBM PC-DOS Version 2.10 (disk)

  3. 1986 - 2006 We ran: • Proprietary operating systems – single suppliers/vendors • Proprietary computing platforms • Bespoke programmes • High levels of utilisation • Viruses and similar security concerns were virtually unknown • Data management was not an issue • Storage was something that concerned Pickfords Removals Ltd.

  4. 1986 - 2006 From 1996-2006 we created: • Large configurations of hardware – multiple suppliers/vendors • Running UNIX and Windows (and now Linux) • Terrible utilisation levels • With increasing amounts of support complexity just to keep the whole system running • Struggling to maintain the status quo • Updating and patching software • Business process mapping • Detecting and preventing security breeches

  5. Changing Role of IT Operations • Today IT infrastructures orients itself around components (Servers, Disks, Switches, Databases, Applications and the devices they sit on - desktops/laptops, PDAs and mobiles • And the protection thereof • Increasing move towards business-aligned end-to-end IT Services • Significant disconnect between Business-Unit service orientation, and ITs component oriented, segregated structure • Loads of “stuff” all which needs to be available and protected from bad ”things” • IT is on a threshold of a fundamental architectural change….

  6. Complexity in the IT Department DATA CENTERS THAT HAVE NO RISK MANAGEMENT PLAN PLAY A DANGEROUS GAME Business technology managers are facing tough challenges as data centers grow larger and more complex. More than 75% of all companies have experienced a business disruption in the past five years, including 20% who say the disruption had a serious impact on the business, according to a recent survey of data center managers.Darrell Dunn, InformationWeek SRM SPELLS 'CHALLENGE What IT manager today wouldn't welcome better control over the storage infrastructure? Sadly, few are able to make their wish a reality, according to Byte and Switch Insider.Mary Jander, Site Editor, Byte and Switch MAJOR COMPANIES RALLY BEHIND STORAGE MANAGEMENT STANDARD A group including some storage heavyweights launched on Wednesday a coordinated effort to advance a software standard for managing storage devices from different vendors. Antone Gonsalves, TechWeb News VIRTUALISATION TECHNOLOGY ON THE RISE Three out of four business worldwide have or intent to deploy server virtualisation system over the next 12 months regardless of data centre size or complexity. James Brown, Computing SOA READY FOR PRIME TIME Creates a more agile infrastructure, say IT chiefs... Businesses are gearing up to adopt service-oriented architecture (SOA), citing tangible benefits resulting from a more agile and responsive IT infrastructure. Andy McCue

  7. Effects of M&A Activity on Complexity MERGERS REACH ALL-TIME HIGH More European technology mergers and acquisitions (M&As) took place in the second quarter of this year than in any other equivalent period, according to research published today. Dave Friedlos , Computing M&A MAIN DRIVER OF ITIL/ITSM ADOPTION Global enterprise adoption of IT infrastructure library, or ITIL, initiatives, reveal that mergers and acquisitions are a principal catalyst driving enterprise ITIL-based implementations forward. ITSM Watch Staff, June 2, 2006 WHEN COMPANIES MERGE, WHO WINS? Over the last six months with acquisitions by Brocade Communications Systems Inc. and IBM, among others, what previously had been a dozen storage companies has melted down to six. Beth Pariseau, SearchStorage.com

  8. Management in the Data Centre CIOS WORRY ABOUT SPEED AND AGILITY Is our tech team too slow? Are we holding the company back? Those are the latest additions to the worry list keeping CIOs up at night.Marianne Kolbasuk McGee, InformationWeek FOR USERS, IT'S ALL ABOUT INFRASTRUCTURE Users don't care about storage and data -- they only care about their own applications, so it's essential to deliver IT as a transparent service. I have seen the end … and it's all about infrastructure -- and business users couldn't care less. Steve Duplessie, SearchStorage.com A NEW STORAGE ECOSYSTEM TO ADDRESS PERSISTENT DATA CHALLENGES COPAN Systems … has joined with other storage industry leaders, including Sun Microsystems, Symantec, FalconStor, and Seagate Technology, to provide enterprise customers with a better solution for managing persistent data.SNS Europe VIRTUALLY SPEAKING: MANAGEMENT IS THE KEY Virtualizing an IT infrastructure is no easy feat.Amy Newman, ServerWatch DEDUPLICATION: STOP REPEATING YOURSELF New techniques can save disk space and speed backups. Data deduplication, data reduction, commonality factoring, capacity optimized storage – whatever you call it …Deni Connor, Network World

  9. The History of the World Jeremy Deller, Turner Prize Winner 2004

  10. Product Development IT V Business Data Competitive Analysis Storage Availability Marketing Email Network Corporate Apps Service Delivery Sales Servers Applications Security Internet Access Finance OS Performance Compliance Infrastructure Support Customer Satisfaction The History of the World IT

  11. The Changing Threat Landscape:Phishing Attacks, Losing Data, IT Errors, Infected Laptops SCHNEIER SAYS WE ARE LOSING THE SECURITY WAR!! Companies are losing the battle to secure their IT systems from attacks by hackers and other threats.Bruce Schneier, IDG News Service 0 DAY EXPLOIT ON EXPLORER Microsoft confirmed on Tuesday that online attackers have seeded a group of Web sites with an exploit that uses a previously unknown flaw in Internet Explorer to compromise visitors' fully patched systems. www.securityfocus.com DATA ON 2.6 MILLION CREDIT CARD HOLDERS BINNED Chase owns up to rubbish blunder... Personal information on 2.6 million past and current Circuit City credit card holders was mistakenly thrown out as trash, a division of JP Morgan Chase has said. Reuters LAPTOPS' DATA COSTLY TO PROTECT Thieves after hardware inflicting a pricey penalty. After Matrix Capital Bank had portable computers stolen, it spent over $50,000 to monitor security and reassure customers. www.denverpost.com CORPORATE LEAKS GO UNNOTICED UK businesses are failing to deal with high levels of sensitive data inadvertently leaking out of their organisations, according to research published this week. vnunet.com

  12. The Changing Threat Landscape:Phishing Attacks, Losing Data, IT Errors, Infected Laptops EXPERTS WARN OF AOL BOTNET THREAT Security analysts have identified a new worm known as Win32.Pipeline that is propagating over AOL Instant Messenger. www.vnunet.com CORPORATE ID THEFT TO COST UK £700M A YEAR The cost to UK firms of corporate identity (ID) theft, whereby fraudsters assume a company's identity in order to exploit its credit lines, empty its bank accounts or order assets in its name, is set to soar to £700 million a year by 2020 - a fourteen-fold increase on 2005 levels. James Murray, IT Week EMAIL DIRECTORY HARVEST ATTACKS RISE 30 PER CENT Attacks designed to steal a company's entire email directory rose by 30 per cent in August compared with the figures for July. vnunet.com NO LET UP IN BARCLAYS PHISHING ATTACKS The phishing threat against customers of Barclays Bank shows no sign of easing following the sighting of eight new variants of the spoof emails. vnunet.com BANK OF IRELAND REFUNDS VICTIMS The Bank of Ireland has backtracked on an earlier decision and has agreed to refund victims of a phishing scam in which customers lost a total of €113,000 (£76,770).ZDNet UK News

  13. The Changing Threat Landscape:Phishing Attacks, Losing Data, IT Errors, Infected Laptops BANK DETAILS STOLEN FROM INDIAN CALL CENTERS - REPORT According to a new investigation, details of thousands of UK credit card and bank accounts, that could be used to steal money, are being sold in India. www.banking-business-review.com ID THEFT: WHICH BANKS DO BEST? Top three US financial institutions named... A report into which US financial institutions best protect their customers against identity theft has named Bank of America, JP Morgan Chase and Washington Mutual as the top three. CNET News.com SOCIAL NETWORKS ATTRACT HACKERS A new study has revealed that a staggering 83% of adults who visit social networking sites expose themselves to malicious hackers and identity thieves. pcWorld.com DATA THEFT IS COMMONPLACE IN THE UK Britain is a nation of thieves when it comes to the workplace, especially where data is concerned, according to a recent report. Yahoo News ATTACKS AND BOT NETWORKS The Internet attack threat landscape has definitely changed. Long gone are the days when it was easy for bot network owners and script kiddies to run their favorite publicly available exploit for the vulnerability of the week. Symantec Security Response Weblog USERS HIT BY ZERO DAY POWERPOINT ATTACKS Microsoft is considering issuing a security patch to fix a vulnerability in its PowerPoint presentation software. The flaw allows remote attackers to run arbitrary code on the affected user’s machine. It is spread by malicious e-mails containing a rogue PowerPoint attachment. Antony Savvas

  14. Confidence is Affected at a Consumerand Corporate Level INCREASED ATTACK ONHOME USERS VANCOUVER (CP) - In the cyber underworld's never-ending quest for weak spots, home computers are coming under increased attack as businesses tighten their defences, according to the latest Symantec Internet security threat report.Symantec Internet Security Threat INTERNET CRIME TO HIT HOMES HARD Home computer users are now the favourite targets of hi-tech criminals, reveals research. It saw an 81% rise in phishing messages which attempt to trick people into handing over personal details. Criminals typically use bogus or booby-trapped e-mail messages to lure people into handing over banking details.BBC News BBB, DELL, MICROSOFT, OTHERS PARTNER AGAINST IDENTITY THEFT The American National Standards Institute, the Better Business Bureau and a half-dozen companies that include Dell and Microsoft have joined in creating a resource where organizations can get standards and guidelines for preventing and responding to identity theft and fraud, the group said Wednesday.Antone Gonsalves, TechWeb Technology News THE NET COMES UP SHORT IN BUILDING CONFIDENCE Security-software execs say it will take years to curb consumer fears. It may take several more years before consumers are making financial transactions over the Internet with minimal fear of fraud, the chief executives of two security-software firms said Thursday.John Shinal, MarketWatch EU TO INVESTIGATE ALERTS SYSTEM FOR INTERNET SECURITY BREACHES The European Commission has revealed plans to investigate sending alerts for Internet security breaches as part of its attempt to fight cybercrime and hackers. According to the commission, people using the Internet and other forms of electronic communication are not spending enough money on protecting systems against virus attacks, spam, identity theft and other malicious actions.Internet Business News

  15. Will the Next 5-10-15-20 years be as turbulent? • With IT staff running themselves ragged • Working silly hours • Constantly fire fighting • Hoping that someone will invent the 9-day week • With manual systems, • Data Centre Management is fraught with error • inevitably costly • labour intensive • The amount of “stuff” the IT Manager is trying to manage is growing exponentially - with apparently no help on the horizon • How does the CIO keep the whole process of data centre management under control? • Storage management has become a costly and unwieldy process, which has left other areas of a business vulnerable simply because of the lack of resources available • So what is the answer?

  16. KEY RESOURCES • Servers • Blades • Servers • Virtual servers • Applications • Networks • Switches • Routers • Loadbalancers • Firewalls • Storage • DAS • Arrays • NAS • SAN • Control • Discover • Track • Report • Access • Provision • InstallDeployRecover • Re-purpose KEY OPERATIONS • Update • Applications • Configurations • BIOS/RAID Complexity KEY METRICS Better Utilization Greater Efficiency Faster Operations Maximum Availability

  17. KEY RESOURCES • Servers • Blades • Servers • Virtual servers • Applications • Networks • Switches • Routers • Loadbalancers • Firewalls • Storage • DAS • Arrays • NAS • SAN • Control • Discover • Track • Report • Access KEY METRICS Better Utilization • Provision • InstallDeployRecover • Re-purpose Greater Efficiency KEY OPERATIONS Faster Operations Maximum Availability • Update • Applications • Configurations • BIOS/RAID Complexity “Complexity stemsfrom heterogeneity” How to makea heterogeneous realitywork like a homogeneousutility?

  18. The Data Centre is on a Journey … but • The same questions keep coming up: • How do I analyse my data centre to ensure accurate budgeting and decision-making and maximum business value? • How do I reduce infrastructure costs while maintaining service level agreements (SLAs) with my business units? • How do I seamlessly integrate and deploy new technologies as business groups demand them? • Some common business considerations could include: • What is the overall financial benefit to my business? • Will a new environment deliver the economic and performance benefits we want? • How will migration improve system performance and reduce manageability costs? • How can my business migrate from its current platform to next-generation hardware and software?

  19. EMPLOYEES REMOTE OFFICES SUPPLIERS PARTNERS CUSTOMERS EMPLOYEES REMOTE OFFICES SUPPLIERS PARTNERS CUSTOMERS EMPLOYEES REMOTE OFFICES SUPPLIERS PARTNERS CUSTOMERS EMPLOYEES REMOTE OFFICES SUPPLIERS PARTNERS CUSTOMERS SECURE SECURE SECURE AVAILABLE AVAILABLE AVAILABLE HIGH PERFORMANCE HIGH PERFORMANCE COMPLIANT COMPLIANT COMPLIANT A Data Centreis secure A Data Centreis secure A Data Centre is secure A Data Centreis secure A Data Centreis available A Data Centreis available A Data Centreis available A Data Centreis high performance A Data Centreis high performance A Data Centreis compliant EMPLOYEES REMOTE OFFICES SUPPLIERS PARTNERS CUSTOMERS SECURE AVAILABLE COMPLIANT INTERACTIONS INTERACTIONS INTERACTIONS INTERACTIONS INTERACTIONS You recognize who youinteract with and thatyou can trust them. You recognize who youinteract with and thatyou can trust them. You recognize who youinteract with and thatyou can trust them. You recognize who youinteract with and thatyou can trust them. You can interact whenever,wherever and howeveryou want. You can interact whenever,wherever and howeveryou want. You can interact whenever,wherever and howeveryou want. Your interactions areeasy, efficient and fast. Your interactions areeasy, efficient and fast. Your interactions arecompliant and policies alignwith business requirements. INFORMATION INFORMATION INFORMATION INFORMATION INFORMATION You trust the informationyou create, use and share. You trust the informationyou create, use and share. You trust the informationyou create, use and share. You trust the informationyou create, use and share. The information you wantis there for you when you need it. The information you wantis there for you when you need it. The information you wantis there for you when you need it. Your information flowsfreely without interruptionor loss. Your information flowsfreely without interruptionor loss. Your informationmanagement is compliant and information can be discovered. INFRASTRUCTURE INFRASTRUCTURE INFRASTRUCTURE INFRASTRUCTURE INFRASTRUCTURE You are confident thatthe IT infrastructure isprotected and safe. You are confident thatthe IT infrastructure isprotected and safe. You are confident thatthe IT infrastructure isprotected and safe. You are confident thatthe IT infrastructure isprotected and safe. Your IT infrastructure is highly available andresilient. Your IT infrastructure is highly available andresilient. Your IT infrastructure is highly available andresilient. Your IT infrastructure isscalable, flexible, efficient—IT investments optimized. Your IT infrastructure isscalable, flexible, efficient—IT investments optimized. Your infrastructure is compliant with IT policies and external regulations. IT SKILLS AND PROCESSES IT SKILLS AND PROCESSES IT SKILLS AND PROCESSES IT SKILLS AND PROCESSES IT SKILLS AND PROCESSES Your IT staff has the skills and processes to manage today’s complex security landscape. Your IT staff has the skills and processes to manage today’s complex security landscape. Your IT staff has the skills and processes to manage today’s complex security landscape Your IT staff has the skills and processes to manage today’s complex security landscape. Your IT staff has the skills to maintain high availability in a changing environment. Your IT staff has the skills to maintain high availability in a changing environment. Your IT staff has the skills to maintain high availability in a changing environment. Your IT staff can optimize a changing environment for cost and performance Your IT staff can optimize a changing environment for cost and performance Your IT staff has the skills to automate IT policy compliance. The Data Centre of the Future Requires

  20. Integration, Integration, Integration • … ‘Twas always thus … • We are in the midst of a shift from: • Assembling standard systems • In a custom data centre out of physical components • Based on standard designs • Isolated pockets of computing resources • To • Assembling a "standard" data centre • Out of virtual components • Based on designs using modelling techniques • mission-critical components of businesses • Utilising technology: • Standardisation • Service management • Data Centre Resource Management …the data centre is converting to: a valuable, critical, virtual pool of business resources

  21. Standardisation DATA SHARING CLIMBS GOVERNMENT AGENDA Public sector organisations should not use data protection laws as justification for unnecessary barriers to sharing information, according to a government statement published last week. Sarah Arnott, Computing HOW AUTOMATION CAN IMPROVE BUSINESS SERVICE MANAGEMENT IT departments have put significant resources toward ensuring that IT services continually support business objectives. But with staffing becoming more virtualized and remote, IT is struggling to maintain constant vigilance. How can automating business service management (BSM) enable IT to “keep the lights on”? Scott Broder A GOVERNANCE FRAMEWORK 2006 will go down as a milestone year for the harmonisation of global best practices. For many years organisations have adopted one or more practices. Vernon Poole, IT Advisor MEASURING AND OPTIMIZING THE COST OF IT: ITIL HELPS TO CONTROL COSTS According to results from a survey of over 230 US corporate executives and IT managers released yesterday by Managed Objects, top corporate executives believe their company is spending too little in 2006 on technology. From IT Service Blog

  22. Standardisation GROUP LAUNCHES CMDB STANDARDS EFFORT Four vendors in the emerging market for enterprise-wide configuration management databases joined togetherto launch an effort to create a common specification for sharing configuration information across a federation of data sources. The four—BMC Software, IBM/Tivoli, Hewlett Packard and Fujitsu—announced April 11 their effort to create the specification and submit it to an appropriate standards body foreventual standardization. Paula Musich, eWeek CIOS SAY STORAGE VENDORS ARE GOUGING CIOs and other IT managers vented their disdain for inflated storage costs and bad storage management software pricing models during a panel discussion yesterday at Storage Networking World here. Lucas Mearian, Computerworld HARNESS, STORE AND SHARE YOUR MOST PRECIOUS COMMODITY Today’s organisations depend on enterprise-wide applications used by everyone from employees and customers to suppliers and partners. Numerous applications support key business processes such as e-commerce and business intelligence, but they also create a mountain of information that must be successfully harnessed, securely stored and continually accessible. Gareth Fraser-King, Symantec Corporation

  23. Automation and Standardisation “Standardisation is the ability for organisations to leverage a single layer of infrastructure software across their entire data centre that reduces IT complexity, protects information and applications, improves manageability and control of cross-platform storage and server assets, and drives down operational costs”. • Data centre automation products have evolved : • From basic provisioning and software distribution tools • Into: powerful platforms that govern many aspects of data centre operations • Products share a common foundation in: • Configuration management • Asset management • Compliance auditing • Policy-based automation • End-point compliance and management • Turning the data centre from a change inhibitor to a business driver • Re-asserting control and interrupting data centre inertia; • controlling costs for reinvestment in innovation; • enabling the development of the right outsourcing strategy, contracts and metrics; • evaluating services against goals and budgets; • implementing IT governance; • making infrastructures more agile

  24. IT is Becoming Central to Large Corporates’ Strategy and Planning IT MUST PROVIDE A STRATEGIC EDGE By the beginning of this decade, corporate spending on IT consumed almost 50% of capital expenditures. And even with the subsequent seesaw of IT spending since then, the corporate world still bleeds cash for IT: more than $2 trillion dollars a year plowed into IT spending. Lionel Carrasco, CIO Update IT 'FAILING TO DELIVER BUSINESS BENEFITS' And nothing's changed in the past decade... Companies are failing to reap financial rewards from IT projects, research from the Cranfield School of Management has revealed. Of the more than 1,000 IT and business managers surveyed, 57 per cent are not satisfied IT investments are adding value to the business and nearly a third can't say whether IT investments are benefiting the business or not. By Gemma Simpson, Silicon.com BUSINESS SKILLS KEY TO SUCCESS IN IT Business skills are essential for today's IT workers, according to exclusive new research from Sylvia Carr, silicon.com ITIL IMPROVES NHS TRUST SERVICES St George's NHS trust is using an IT services plan based on an ITIL assessment to manage its system better. James Brown, Computing IT STILL NOT BUSINESS-FOCUSED ENOUGH? Some new research from IT Service Management firm Axios Systems once again highlights the gaping void between IT and the business, this time also shining a spotlight on the fact that there is a significant lack of adoption of Best Practice and ITIL-based standards. Jason Stamper, Computer Business Review

  25. Increase productivity of data centre operations Enable operators to safely do more Model and manage multi-tier apps, servers and storage Virtual models eliminates islands of knowledge Drive up utilisation of servers and storage Reduce “time to recover” at lower cost Perform server consolidation without increasing risk and complexity Deliver prioritised data centre wide high availability / disaster recovery Wouldn’t it be great if we could ….

  26. The Data Centre Environment of the Future • Data centres now have the ability to use tools that enable real-time, automated assembly of modelled configurations based upon performance parameters • Simplifying the management process • Improving ability to predict and respond • Bringing processing capability online • Proactively managing resources before they break or cause disruption • These capabilities are available now: • Enables a versatile and powerful data centre that organisations can tap into and have what they need when they need it • with a much better capability to utilise the resources at their disposal • The new data centre will be: • Sleeker – Meaner – Faster - Cooler … Delivering new services for the business

  27. Thank you Gareth_fraser-king@symantec.com

More Related