SlideShare a Scribd company logo
1 of 54
Download to read offline
The Agile Enterprise
Connect, Collaborate, Innovate and Transform – Securely!

Den Sullivan
Head of Architecture & Enterprise
Emerging Markets




© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   1
Shaping The Business Environment

                           Business Volatility                             Rapid Globalisation                       Personalisation
                           •        Less predictable                       •    Connected economy - flows of         •    Consumerisation of IT
                                    environment                                 information, capital, goods,         •    Rising expectations
                           •        More resiliency (24/7)                      people




                                      Ecological Footprint                      Demographics                              Technology
                                      •        Safeguard vital resources        •    Small ageing v. large younger        •    More and faster disruption
                                               to remain competitive                 population                           •    Mobility, post PC era
                                                                                •    Gen Y workforce & customers          •    Network-centric organisations




© 2010 Cisco and/or its affiliates. All rights reserved.                                                                                                   Cisco Cisco Public
                                                                                                                                                                 Confidential   2
Mega Challenges
Opportunity for Transformation

                                                                 Business Volatility                     Rapid Globalisation                                    Personalisation
                                                                 Less predictable environment            Connected economy –                                    Consumerisation of IT
                                                                 More resiliency (24/7)                   flows of information,                                 Rising expectations
                                                                                                         capital, goods, people

                                                                 Ecological Footprint                    Demographics                                           Technology
                                                                 Safeguard vital resources               Small ageing v. large younger population               More and faster disruption
                                                                 for competitiveness                     Gen Y workforce & customers                            Mobility, post PC era
                                                                                                                                                                Network-centric organisations




                                                                Improve innovation to                         Improve productivity                   Socioeconomic development supported
                                                     provide your company with differentiation and    through cross-functional collaboration          by ICT, driving job growth, prosperity
                                                     a competitive edge in the eyes of customers      and creating a productivty borderless            and competitiveness of Emerging
                                                                                                                  organisation                                       countries




                                                                     Increase Revenue                   Reduce Operating Expenses                       Build National Infrastructure

                                                                                                                                        Smart
                                                                           Faster          More                       Faster
                                                            New                                        Cost                              Use          Skills          Safety          Broadband
                                                                          Product        Recurring                   Decision
                                                           Revenue                                   Reduction                           Vital      Education       Healthcare          Rollout
                                                                         to Market       Revenue                     Making
                                                                                                                                      Resources

© 2010 Cisco and/or its affiliates. All rights reserved.                                                                                                                          Cisco Confidential   3
4
 Source: Buckminster Fuller’s Law
© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential
During the 21st Century …
                 we may experience 20,000 years of progress



© 2010 Cisco and/or its affiliates. All rights reserved.      Cisco Confidential   5
‘I Cannot Imagine A Life Without…’
                              My Mobile Phone              The Internet   A Car   My Current Partner




                   14 - 29 year old population
© 2010 Cisco and/or its affiliates. All rights reserved.                                          Cisco Confidential   6
© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   7
Slide to Change Channel




© 2010 Cisco and/or its affiliates. All rights reserved.                             Cisco Confidential   9
Information Explosion
                                   billion email messages per day                                                     apps downloaded
                                                                                                                         every second

                                               of video
                                  uploaded every minute                                        By 2015,                              video minutes
                                    1/4 million full-length Hollywood                          (equivalent of 674 days) will traverse the Internet every second
                              releases every week (3 billion views per day)


                                                                                             Last year’s mobile data traffic was
                                                           We store                          3x the size of the entire global
                                                           of this new information
                                                                                             internet in 2000

                                                    Home to                         photos
                                                                                                                of the world’s mobile data
Sources: Cisco IBSG, 2006–2011; Cisco VNI, June 2011; Technorati; Radicati Group; IDC; The
                                                                                                            traffic will be video by 2015
Economist; Apple; InformationWeek


© 2010 Cisco and/or its affiliates. All rights reserved.                                                                                              Cisco Confidential   10
One zettabyte
        =
       stack of books from
          Earth to Pluto
                                                           Increase of 540,000
             20 times
         (72 billion miles)                                    times from 2003;
                                                             more than 90% from
                                                                     video


                                        If an 11 oz.
                                    cup of coffee equals
                                     1 gigabyte - then
                                        1 zettabyte
                                      would have the
                                    same volume of the
                                    Great Wall of China


Source: Cisco Visual Networking Index (VNI), June 2011
© 2010 Cisco and/or its affiliates. All rights reserved.                          Cisco Cisco Public
                                                                                        Confidential   11
More data was created during any 48 hour period
last year than by ALL of humanity during the past
                                    30,000 years
OPPORTUNITY TO REDEFINE RELATIONSHIPS
  Between Citizens and Governments, Consumers and Enterprises …
OPPORTUNITY TO LEAD CHANGE
         the Global Landscape and Hyperconnectivity …
LET’S THRIVE NOT JUST SURVIVE
                                                            in an Environment of Change




                                      Building Out World Class Infrastructures
© 2010 Cisco and/or its affiliates. All rights reserved.                             Cisco Confidential   15
100 addresses for       4.8 trillion addresses for
                           52,000 trillion trillion
                                                                    every atom          every star in the known
                          addresses per person
                                                               on the earth’s surface              universe




       IPv4 addresses: 4,294,967,296
       IPv6 addresses: 340,282,366,920,938,463,463,374,607,431,768,211,456
Sources: Cisco IBSG, 2006–2011; Steve Leibson, Computer History Museum; CNN

© 2010 Cisco and/or its affiliates. All rights reserved.                                                      Cisco Cisco Public
                                                                                                                    Confidential   16
© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Cisco Public
                                                                 Confidential   17
This tree has 3,000                    Cow transmits
                                                           followers…do you?                     200 MB per year   Connected shoe




                                                                          cross referenced                                   transmit data from your
                                                                          with environmental /                               stomach
                                                                          weather data




Sources: Cisco IBSG, 2011; Sparked, 2010; Nike, 2010; David Van Sickle, 2011; Proteus, 2011

© 2010 Cisco and/or its affiliates. All rights reserved.                                                                                    Cisco Cisco Public
                                                                                                                                                  Confidential   18
“The best way to
                                                           predict the future
                                                            is to create it”
                                                             Peter Drucker




© 2010 Cisco and/or its affiliates. All rights reserved.                        Cisco Confidential   19
Changing People:
                      Changing the Way They Work




© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   22
ANYWHERE                                  ANY DEVICE                ANY CONTENT




                      Richest
                                                                                                                                                           Secure Intra- & Inter-
                      Experience
                                                                                                                                                           Company
                      in Any Location                       Video handled as                                                     Flexible Access           Communications
                                                            Easily as Voice, Data               COLLABORATION                    from All Clients


                           Consistent Access                                                                                                                       Future-Proofed
                           Policy Across                                                                                                       Energy              for Regulatory
                                                                    Secure, Reliable &                                 Optimised
                           Network                                  Seamless Access for           BORDERLESS           Application
                                                                                                                                               Control whilst      Requirements
                                                                                                                                               Energy
                                                                    Mobile Devices                 NETWORKS            Delivery Anytime,
                                                                                                                       Anywhere
                                                                                                                                               Efficient
                         Any Service,                                                                                                                            Comprehensive
                                                           One System for
                         Any Form                                                                                                      Optimised for             Orchestration
                                                           Computing,
                         Factor, Any
                                                           Networking &
                                                                                                DATA CENTRE                            Virtualization &          of Automated
                         Platform                                                                                                      Cloud – Reduced           Provisioning
                                                           Storage                             VIRTUALIZATION                          Capex/Opex
                        Converged
                        Infrastructure to                                                                                                                   Multiple Technologies
                                                                                       Consistent                                                           for Optimal Flexibility
                        Deliver New & Future                                                                        Ability to Change SP
                                                                Video, Mobile, Cloud   Reliability &
                        Services                                                                                    Business Models
                                                                Services Anywhere,     Availability     IP NGN                             All IP Mobile
                                                                                                                                           Network
                                                                Anytime, Any Device
© 2010 Cisco and/or its affiliates. All rights reserved.                                                                                                                       Cisco Confidential   23
Any-to-Any                    Visual
                                                           Collaboration                Networking
On-Premise                                                                                                    Cloud

                         Seamless                                                                       Agile
                          Mobility                                                                 Infrastructure
                                                                           End-to-End
                                                                            Security


© 2011 Cisco and/or its affiliates. All rights reserved.
                                                                 Interoperable Open Architecture              Cisco Confidential   24
NETWORK    Data
                               Desktop                               Center




© 2011 Cisco and/or its affiliates. All rights reserved.                      Cisco Confidential   25
Mobility
                          Bring Your
                                                           NETWORK    Data
                           Desktop
                         Own Devices                                 Center




© 2011 Cisco and/or its affiliates. All rights reserved.                      Cisco Confidential   26
Mobility                                   Cloud/

                          Bring Your
                                                           NETWORK   Virtualization
                                                                         Data
                                                                     SaaS | DC / V
                         Own Devices                                    Center




© 2011 Cisco and/or its affiliates. All rights reserved.                        Cisco Confidential   27
Immersive
                                                             Collaboration
                                                             Pervasive Video




                              Mobility                                             Cloud/

                          Bring Your
                                                           NETWORK             Virtualization
                                                                               SaaS | DC / V
                         Own Devices

                                                           SECURITY

                                                           IT PRODUCTIVITY

                                                           ENERGY EFFICIENCY
© 2011 Cisco and/or its affiliates. All rights reserved.                                  Cisco Confidential   28
Immersive
                                                               Collaboration
                                                               Pervasive Video



                                                                                     Cloud/
                              Mobility                     A “BORDERLESS”
                                                               NETWORK           Virtualization
                          Bring Your                                             SaaS | DC / V
                         Own Devices

                                                             SECURITY

                                                             IT PRODUCTIVITY

                                                             ENERGY EFFICIENCY
© 2011 Cisco and/or its affiliates. All rights reserved.                                    Cisco Confidential   29
© 2010 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   30
2008 b.c
© 2012 Cisco and/or its affiliates. All rights reserved.   Cisco Confidential   31
Your Data Center Strategy Enabled You To:


                 Drive Business Objectives                                         AND         Innovate with Operational Excellence




              Reduced                                      Need to reduce costs          Server virtualization:   Applications   Drive for green—
            business risk                                   and increase profits         higher performance       experience      power, cooling,
                                                                                                                                    and space




IT as enabling partner of                                    New services                 LAN and storage          VM-Level         Workload
      the business                                            to market                    convergence            awareness        provisioning



© 2010 Cisco and/or its affiliates. All rights reserved.                                                                            Cisco Confidential   32
?
                    How Long Does it Take to Provision a Server in Your Organisation?




© 2010 Cisco and/or its affiliates. All rights reserved.                          Cisco Confidential   33
Trusted
                                                                                                                                    WiFi




                                                                                                         Authenticate User
                                                                                                         Fingerprint Device
                                                                                                         Apply Corporate Config
                                                                                                         Enterprise Apps
                                                                                                         Automatic Policies




 © 2011 Cisco and/or its affiliates. All rights reserved.                                                                                    Cisco Confidential   34
Presentation_ID                 © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential                                                              34
Uncompromised
                                                                                                                                         Experience
                                                                                                                       Trusted
                                                                                                                        WiFi




                                                                                                                                      Unified Policy
                                                                                                Apply defined policy              
                                                                                                                                  
                                                                                                                                      Self provisioning
                                                                                                                                      MDM integration
                                                                                                profiles based on:
                                                                                                     Device Type
                                                                                                     User
                                                                                                     Location
                                                                                                     Application

                                                                                                                                           Simplified
                                                                                                                                           Operations
 © 2011 Cisco and/or its affiliates. All rights reserved.                                                                        Cisco Confidential   35
Presentation_ID                 © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential                                                  35
© 2011 Cisco and/or its affiliates. All rights reserved.                                              Cisco Confidential   36
Presentation_ID                 © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential                        36
Trusted
                                                                                         WiFi




                                                  Access: FULL
                          No          Yes
                                                   Customer Database
                                                   Mobile TelePresence
                                                   Email
                                                   Instant Messenger



 © 2011 Cisco and/or its affiliates. All rights reserved.                                              Cisco Confidential   37
Presentation_ID                 © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential                        37
Unified Policy
                                                                                                                       Identity based
                                                                                             Trusted                    access control
                                                                                               WiFi




                                                                                                                      Uncompromised
                                                                                                                          Experience
                                                                                                                 Interference protection
                                                                                                                 Client acceleration
                                                                                                                 802.11u, 11r
                                                      Are the clients here yet?                                  Jabber, WebEx


                                                      Not yet but i will let you know
                                                      the moment they arrive.




                                                                                                                           Simplified
                                                                                                                           Operations
 © 2011 Cisco and/or its affiliates. All rights reserved.                                                                  Cisco Confidential   38
Presentation_ID                 © 2008 Cisco Systems, Inc. All rights reserved.         Cisco Confidential                                      38
© 2011 Cisco and/or its affiliates. All rights reserved.                                              Cisco Confidential   39
Presentation_ID                 © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential                        39
Untrusted WiFi


                                  Access: Limited
                                        Customer Database

                                        Mobile TelePresence

                                        Email

                                        Instant Messenger




 © 2011 Cisco and/or its affiliates. All rights reserved.                                              Cisco Confidential   40
Presentation_ID                 © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential                        40
Unified Policy
                                                                                                                Identity based access
                                                                                                                 control
                                                                                                                VPN client
                                                                                                                Email scanning




                                                                                                                 Uncompromised
                                                                                                                     Experience
                                                                                                            Interference protection
                                                                                                            Client acceleration
                                                                                                            802.11u,
                                                                                                            Jabber, WebEx




                                                                                                                      Simplified
                                                                                                                      Operations
 © 2011 Cisco and/or its affiliates. All rights reserved.                                                             Cisco Confidential   41
Presentation_ID                 © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential                                       41
© 2011 Cisco and/or its affiliates. All rights reserved.                                              Cisco Confidential   42
Presentation_ID                 © 2008 Cisco Systems, Inc. All rights reserved.   Cisco Confidential                        42
Application Development                                 IT Infrastructure/Ops       IT Management
                                                           Call or Email IT              One-Off              No Standard Process
                                                            Operations                Custom Server
                                   “Why does it take weeks to get a                      Builds

                                   server?”
                                   “Why does it cost so much?”
                                                            Architecture                Incomplete              No Visibility into
                                                              Reviews                  Requirements             Future Demand




                                                              Approval                 Add Security,            Are SLA’s Being
                                                              Process                  Back-up, etc.                 Met?
                                                                                    “Every application hosting request has
                                                                                    their own unique requirements”
                                                                                    “We can’t enforce standards”
                                                            Track Down                  Exception               No Data to Track
                                                               Status
                                                                                    “Not enough resource to meet demand”
                                                                                       Management                    Cost




© 2012 Cisco and/or its affiliates. All rights reserved.                                                                     Cisco Confidential   43
End User                                   Self-Service Governance                      Service Orchestration
                                                                                Compare                                                            Element Managers

                                                                               Service Tiers
                                                                               and Options                                                        UCS Manager

                                                                                   Guided
                                                                                 Shopping                            Enterprise Orchestration

                                                                                  ‘Wizard’
                                                            Service                                                                             VMWare vCenter
                                                           Catalogue           Policy-Based                              Global
                                                                                 Controls                             Orchestration
                                                                                                 Service Requests



                                                                              Rich Interactive
                                                                                  Forms                                                           EMC/ NetApp
                                                                                                                                                    Storage
                                                                                                                                                  Provisioning
                                                                               Ordering and
                                                                                Approvals
                                                                                                                                                Server Provisioner

                                                                              Status Updates




© 2012 Cisco and/or its affiliates. All rights reserved.                                                                                                   Cisco Confidential   44
10 Mins
                    How Long Does it Take to Provision a Server in Your Organisation?




© 2012 Cisco and/or its affiliates. All rights reserved.                          Cisco Confidential   45
Progressing the Private Cloud
Compute TCO ($/Qtr/OS instance)




                                  $4,000
                                  $3,500
                                  $3,000                                                                                                                             TCO for Physical
                                                                                                            Average TCO
                                  $2,500                                                                          -14%
                                  $2,000                                                                                                                 -25%
                                  $1,500                                                                                                                                         -18%
                                  $1,000
                                   $500                                                                                                                                         TCO for
                                      $0                                                                                                                                         Virtual
                                              Legacy, all physical                     Legacy, medium                            Current state                UCS/Cloud, medium            UCS/Cloud, high
                                                                                     virtualization (60%)                                                     virtualization (65%)        virtualization (80%)

                                                              ‘Medium Aggressive’                                      Unified Computing                                ‘Highly Aggressive’
                                                                 Virtualization                                         and Automation                                     Virtualization

       Delivery                                     6 -8 weeks                                 2 -3 weeks                              15 mins VM                      15 minutes                    15 minutes
        Time                                         (on demand )                                  (manual )                           2 - 9 days E2E                   (self -service)               (self -service)
            © 2012 Cisco and/or its affiliates. All rights reserved.                                                                                                                                    Cisco Confidential   46
                                     Presentation_ID Cisco IT NDCS, RCDN9 build-out cost tracking (state-of-art Tier-III DC facility), Dec 2009
                                             Source:                  © 2009 Cisco Systems, Inc. All rights reserved.                    Cisco Confidential                                                                  46
“YOU CAN POSTPONE A ROCKET LAUNCH BUT
  WE HAVE NEVER POSTPONED AN OLYMPICS,
  BECAUSE THE I.T. IS NOT WORKING”




                                                           Jean-Benoit Gauthier, Director of Technology,
                                                                       International Olympic Committee



© 2011 Cisco and/or its affiliates. All rights reserved.                                         Cisco Confidential   47
1,000 access points     94
   205 Olympic Committees
    National
                                                             wireless
                                                                                    locations
                                                                                                16,500
                                                                                                   telephones
                                                            10.8Mto spectators
                                                             tickets               27,000
   5,000 family members                                                               media
     Olympic
                                          4B
                                                                                    70,000
                                                                                       volunteers
                                           broadcast audience
                                                                                 6,000 employees
   2,220
     switches                                              21,800 & team officials
                                                              athletes
                                                                                   LOCOG

                                  80,000
                                                     pc connections     14,000              19 sites
                                                                                             live
10M connecting to www.mylondon2012.com
 people
                                                                           cable TV sockets

© 2011 Cisco and/or its affiliates. All rights reserved.                                            Cisco Confidential   48
Business Imperatives
                                                                                             Change
           Raise Customer                                                                    Interactions
               Satisfaction
                                                                                         New Network
                        Scale your                                                       Use Cases
                         Services

                                                                                  Work
                        Increase                                                  Anyplace
                     Productivity

                                                                     Reduce
                     Operational
                                                                                                                    Benefit
                                                                     TCO
                      Efficiency
                                                                                                  ology In novation
                                                                                         Te c h n

                                                                                                            Technology Innovation
                                                           Compute   Switching Collaboration Wireless           Security      Virtualization
© 2011 Cisco and/or its affiliates. All rights reserved.
                                                                      Routing
                                                                       CISCO CONFIDENTIAL INTERNAL USE ONLY                              49
Architectural
                                                           Framework Benefits




                      Drive Business                                   Enable IT                        Empower the User
                      Transformation                       Total Cost of ownership, Risk
                                                                                                     User Experience, Innovation,
      Scale Business processes,                               Mitigation, Investment
                                                                                                        Productivity, Efficiency
     Service creation & optimisation                                 Protection

© 2011 Cisco and/or its affiliates. All rights reserved.      CISCO CONFIDENTIAL INTERNAL USE ONLY                                  50
What Else Happened in 60 Minutes…
                         Nearly   9 Billion Emails Sent
   Over 8 Million Tweets
             Almost 6 Million Facebook Status Updates

  Almost 8,000 Professionals Joined LinkedIn


                 2880 Hours of Video Uploaded on YouTube
       720,000 apps downloaded
Thank you for your 60 mins




                                                           twitter.com/@densullivan

© 2011 Cisco and/or its affiliates. All rights reserved.                              Cisco Confidential   54

More Related Content

What's hot

Fujitsu ASEAN roadshow - How to leverage information, innovation and insight
Fujitsu ASEAN roadshow - How to leverage information, innovation and insightFujitsu ASEAN roadshow - How to leverage information, innovation and insight
Fujitsu ASEAN roadshow - How to leverage information, innovation and insightFujitsu Global
 
Special Report Albertas Ict Powerhouse
Special Report Albertas Ict PowerhouseSpecial Report Albertas Ict Powerhouse
Special Report Albertas Ict PowerhouseTroy Media
 
Fujitsu keynote at Oracle OpenWorld 2012
Fujitsu keynote at Oracle OpenWorld 2012 Fujitsu keynote at Oracle OpenWorld 2012
Fujitsu keynote at Oracle OpenWorld 2012 Fujitsu Global
 
Trends in technology in South Africa (for ICT RDI Roadmap team)
Trends in technology in South Africa (for ICT RDI Roadmap team)Trends in technology in South Africa (for ICT RDI Roadmap team)
Trends in technology in South Africa (for ICT RDI Roadmap team)Derek Keats
 
MISA Cloud Workshop _Reimagining Services delivery in the cloud
MISA Cloud Workshop _Reimagining Services delivery in the cloudMISA Cloud Workshop _Reimagining Services delivery in the cloud
MISA Cloud Workshop _Reimagining Services delivery in the cloudMISA Ontario Cloud SIG
 
It aac defense-it-cloud2013
It aac defense-it-cloud2013It aac defense-it-cloud2013
It aac defense-it-cloud2013John Weiler
 
Bull Open Source Feedback OW2con11, Nov 24-25, Paris
Bull Open Source Feedback OW2con11, Nov 24-25, ParisBull Open Source Feedback OW2con11, Nov 24-25, Paris
Bull Open Source Feedback OW2con11, Nov 24-25, ParisOW2
 
Smarter Storage in the Smarter Computing Era - A New Approach to Storage - Ak...
Smarter Storage in the Smarter Computing Era - A New Approach to Storage - Ak...Smarter Storage in the Smarter Computing Era - A New Approach to Storage - Ak...
Smarter Storage in the Smarter Computing Era - A New Approach to Storage - Ak...Jyothi Satyanathan
 
CISCO Flexible Work / Telework Presentation for RDASI
CISCO Flexible Work / Telework Presentation for RDASICISCO Flexible Work / Telework Presentation for RDASI
CISCO Flexible Work / Telework Presentation for RDASIRichard Everson
 
Big Data Is Here - Now What?
Big Data Is Here - Now What?Big Data Is Here - Now What?
Big Data Is Here - Now What?Chris Selland
 
Cloud on PureSystems, Botond Kiss
Cloud on PureSystems, Botond KissCloud on PureSystems, Botond Kiss
Cloud on PureSystems, Botond KissIBMSERBIA
 
Technology Challenges in the Networked Society
Technology Challenges in the Networked SocietyTechnology Challenges in the Networked Society
Technology Challenges in the Networked SocietyEricsson Labs
 
The Future of Security
The Future of SecurityThe Future of Security
The Future of SecurityInnoTech
 
The Zen and Art of IT Management (VM World Keynote 2012)
The Zen and Art of IT Management (VM World Keynote 2012)The Zen and Art of IT Management (VM World Keynote 2012)
The Zen and Art of IT Management (VM World Keynote 2012)CA Technologies
 
2011 special edition - converged infrastructure
2011   special edition - converged infrastructure2011   special edition - converged infrastructure
2011 special edition - converged infrastructureclansmandresin
 

What's hot (19)

Fujitsu ASEAN roadshow - How to leverage information, innovation and insight
Fujitsu ASEAN roadshow - How to leverage information, innovation and insightFujitsu ASEAN roadshow - How to leverage information, innovation and insight
Fujitsu ASEAN roadshow - How to leverage information, innovation and insight
 
Curated Computing
Curated Computing Curated Computing
Curated Computing
 
Special Report Albertas Ict Powerhouse
Special Report Albertas Ict PowerhouseSpecial Report Albertas Ict Powerhouse
Special Report Albertas Ict Powerhouse
 
Fujitsu keynote at Oracle OpenWorld 2012
Fujitsu keynote at Oracle OpenWorld 2012 Fujitsu keynote at Oracle OpenWorld 2012
Fujitsu keynote at Oracle OpenWorld 2012
 
Trends in technology in South Africa (for ICT RDI Roadmap team)
Trends in technology in South Africa (for ICT RDI Roadmap team)Trends in technology in South Africa (for ICT RDI Roadmap team)
Trends in technology in South Africa (for ICT RDI Roadmap team)
 
MISA Cloud Workshop _Reimagining Services delivery in the cloud
MISA Cloud Workshop _Reimagining Services delivery in the cloudMISA Cloud Workshop _Reimagining Services delivery in the cloud
MISA Cloud Workshop _Reimagining Services delivery in the cloud
 
It aac defense-it-cloud2013
It aac defense-it-cloud2013It aac defense-it-cloud2013
It aac defense-it-cloud2013
 
Bull Open Source Feedback OW2con11, Nov 24-25, Paris
Bull Open Source Feedback OW2con11, Nov 24-25, ParisBull Open Source Feedback OW2con11, Nov 24-25, Paris
Bull Open Source Feedback OW2con11, Nov 24-25, Paris
 
Smarter Storage in the Smarter Computing Era - A New Approach to Storage - Ak...
Smarter Storage in the Smarter Computing Era - A New Approach to Storage - Ak...Smarter Storage in the Smarter Computing Era - A New Approach to Storage - Ak...
Smarter Storage in the Smarter Computing Era - A New Approach to Storage - Ak...
 
CISCO Flexible Work / Telework Presentation for RDASI
CISCO Flexible Work / Telework Presentation for RDASICISCO Flexible Work / Telework Presentation for RDASI
CISCO Flexible Work / Telework Presentation for RDASI
 
The Times Efficient It Supplement
The Times   Efficient It SupplementThe Times   Efficient It Supplement
The Times Efficient It Supplement
 
Cisco Smart Work Center
Cisco Smart Work CenterCisco Smart Work Center
Cisco Smart Work Center
 
Big Data Is Here - Now What?
Big Data Is Here - Now What?Big Data Is Here - Now What?
Big Data Is Here - Now What?
 
Cloud on PureSystems, Botond Kiss
Cloud on PureSystems, Botond KissCloud on PureSystems, Botond Kiss
Cloud on PureSystems, Botond Kiss
 
Technology Challenges in the Networked Society
Technology Challenges in the Networked SocietyTechnology Challenges in the Networked Society
Technology Challenges in the Networked Society
 
Exploring Big Data
Exploring Big DataExploring Big Data
Exploring Big Data
 
The Future of Security
The Future of SecurityThe Future of Security
The Future of Security
 
The Zen and Art of IT Management (VM World Keynote 2012)
The Zen and Art of IT Management (VM World Keynote 2012)The Zen and Art of IT Management (VM World Keynote 2012)
The Zen and Art of IT Management (VM World Keynote 2012)
 
2011 special edition - converged infrastructure
2011   special edition - converged infrastructure2011   special edition - converged infrastructure
2011 special edition - converged infrastructure
 

Viewers also liked

String of Paerls Infographic
String of Paerls InfographicString of Paerls Infographic
String of Paerls InfographicCisco Security
 
Empower your Cisco Contact center with 2Ring
Empower your Cisco Contact center with 2RingEmpower your Cisco Contact center with 2Ring
Empower your Cisco Contact center with 2RingCisco Russia
 
Отмена перехода на летнее время и оборудование Cisco
Отмена перехода на летнее время и оборудование CiscoОтмена перехода на летнее время и оборудование Cisco
Отмена перехода на летнее время и оборудование CiscoCisco Russia
 
Рекомендации по работе с Cisco TAC
Рекомендации по работе с Cisco TACРекомендации по работе с Cisco TAC
Рекомендации по работе с Cisco TACCisco Russia
 
Краткий обзор Cisco Cyber Threat Defense
Краткий обзор Cisco Cyber Threat DefenseКраткий обзор Cisco Cyber Threat Defense
Краткий обзор Cisco Cyber Threat DefenseCisco Russia
 
Системы Cisco HyperFlex. Краткий обзор
Системы Cisco HyperFlex. Краткий обзорСистемы Cisco HyperFlex. Краткий обзор
Системы Cisco HyperFlex. Краткий обзорCisco Russia
 
Финал "Премии инноваций Сколково". Интеллектуальная облачная платформа поиска...
Финал "Премии инноваций Сколково". Интеллектуальная облачная платформа поиска...Финал "Премии инноваций Сколково". Интеллектуальная облачная платформа поиска...
Финал "Премии инноваций Сколково". Интеллектуальная облачная платформа поиска...Cisco Russia
 
Развитие технологий коммутации трафика виртуальных машин.
Развитие технологий коммутации трафика виртуальных машин.Развитие технологий коммутации трафика виртуальных машин.
Развитие технологий коммутации трафика виртуальных машин.Cisco Russia
 
Интеграция ACI с виртуальными средами
Интеграция ACI с виртуальными средамиИнтеграция ACI с виртуальными средами
Интеграция ACI с виртуальными средамиCisco Russia
 
Критерии приобретения систем сетевой безопасности нового поколения
Критерии приобретения систем сетевой безопасности нового поколенияКритерии приобретения систем сетевой безопасности нового поколения
Критерии приобретения систем сетевой безопасности нового поколенияCisco Russia
 
Ориентированная на приложения инфраструктура Cisco ACI
Ориентированная на приложения инфраструктура Cisco ACI Ориентированная на приложения инфраструктура Cisco ACI
Ориентированная на приложения инфраструктура Cisco ACI Cisco Russia
 
Финал "Премии инноваций Сколково". Inviewlab.
Финал "Премии инноваций Сколково". Inviewlab.Финал "Премии инноваций Сколково". Inviewlab.
Финал "Премии инноваций Сколково". Inviewlab.Cisco Russia
 
Cisco Social Network Security
Cisco Social Network SecurityCisco Social Network Security
Cisco Social Network SecurityCisco Russia
 
Объединенная вычислительная система Cisco UCS. Часть 1.
Объединенная вычислительная система Cisco UCS. Часть 1.Объединенная вычислительная система Cisco UCS. Часть 1.
Объединенная вычислительная система Cisco UCS. Часть 1.Cisco Russia
 
Путь профессионала в IT
Путь профессионала в ITПуть профессионала в IT
Путь профессионала в ITAlexander Krass
 
Система Sourcefire IPS нового поколения
Система Sourcefire IPS нового поколенияСистема Sourcefire IPS нового поколения
Система Sourcefire IPS нового поколенияCisco Russia
 
Развитие технологий унифицированной сети ЦОД
Развитие технологий унифицированной сети ЦОДРазвитие технологий унифицированной сети ЦОД
Развитие технологий унифицированной сети ЦОДCisco Russia
 
Центр компьютерного обучения «Специалист» при МГТУ им. Н.Э. Баумана
Центр компьютерного обучения «Специалист» при МГТУ им. Н.Э. БауманаЦентр компьютерного обучения «Специалист» при МГТУ им. Н.Э. Баумана
Центр компьютерного обучения «Специалист» при МГТУ им. Н.Э. БауманаCisco Russia
 

Viewers also liked (19)

String of Paerls Infographic
String of Paerls InfographicString of Paerls Infographic
String of Paerls Infographic
 
Empower your Cisco Contact center with 2Ring
Empower your Cisco Contact center with 2RingEmpower your Cisco Contact center with 2Ring
Empower your Cisco Contact center with 2Ring
 
Отмена перехода на летнее время и оборудование Cisco
Отмена перехода на летнее время и оборудование CiscoОтмена перехода на летнее время и оборудование Cisco
Отмена перехода на летнее время и оборудование Cisco
 
Рекомендации по работе с Cisco TAC
Рекомендации по работе с Cisco TACРекомендации по работе с Cisco TAC
Рекомендации по работе с Cisco TAC
 
Краткий обзор Cisco Cyber Threat Defense
Краткий обзор Cisco Cyber Threat DefenseКраткий обзор Cisco Cyber Threat Defense
Краткий обзор Cisco Cyber Threat Defense
 
Системы Cisco HyperFlex. Краткий обзор
Системы Cisco HyperFlex. Краткий обзорСистемы Cisco HyperFlex. Краткий обзор
Системы Cisco HyperFlex. Краткий обзор
 
Финал "Премии инноваций Сколково". Интеллектуальная облачная платформа поиска...
Финал "Премии инноваций Сколково". Интеллектуальная облачная платформа поиска...Финал "Премии инноваций Сколково". Интеллектуальная облачная платформа поиска...
Финал "Премии инноваций Сколково". Интеллектуальная облачная платформа поиска...
 
SDN - Frost & Sullivan
SDN - Frost & SullivanSDN - Frost & Sullivan
SDN - Frost & Sullivan
 
Развитие технологий коммутации трафика виртуальных машин.
Развитие технологий коммутации трафика виртуальных машин.Развитие технологий коммутации трафика виртуальных машин.
Развитие технологий коммутации трафика виртуальных машин.
 
Интеграция ACI с виртуальными средами
Интеграция ACI с виртуальными средамиИнтеграция ACI с виртуальными средами
Интеграция ACI с виртуальными средами
 
Критерии приобретения систем сетевой безопасности нового поколения
Критерии приобретения систем сетевой безопасности нового поколенияКритерии приобретения систем сетевой безопасности нового поколения
Критерии приобретения систем сетевой безопасности нового поколения
 
Ориентированная на приложения инфраструктура Cisco ACI
Ориентированная на приложения инфраструктура Cisco ACI Ориентированная на приложения инфраструктура Cisco ACI
Ориентированная на приложения инфраструктура Cisco ACI
 
Финал "Премии инноваций Сколково". Inviewlab.
Финал "Премии инноваций Сколково". Inviewlab.Финал "Премии инноваций Сколково". Inviewlab.
Финал "Премии инноваций Сколково". Inviewlab.
 
Cisco Social Network Security
Cisco Social Network SecurityCisco Social Network Security
Cisco Social Network Security
 
Объединенная вычислительная система Cisco UCS. Часть 1.
Объединенная вычислительная система Cisco UCS. Часть 1.Объединенная вычислительная система Cisco UCS. Часть 1.
Объединенная вычислительная система Cisco UCS. Часть 1.
 
Путь профессионала в IT
Путь профессионала в ITПуть профессионала в IT
Путь профессионала в IT
 
Система Sourcefire IPS нового поколения
Система Sourcefire IPS нового поколенияСистема Sourcefire IPS нового поколения
Система Sourcefire IPS нового поколения
 
Развитие технологий унифицированной сети ЦОД
Развитие технологий унифицированной сети ЦОДРазвитие технологий унифицированной сети ЦОД
Развитие технологий унифицированной сети ЦОД
 
Центр компьютерного обучения «Специалист» при МГТУ им. Н.Э. Баумана
Центр компьютерного обучения «Специалист» при МГТУ им. Н.Э. БауманаЦентр компьютерного обучения «Специалист» при МГТУ им. Н.Э. Баумана
Центр компьютерного обучения «Специалист» при МГТУ им. Н.Э. Баумана
 

Similar to Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций.

Chambers cisco live keynote external june2012
Chambers cisco live keynote external june2012Chambers cisco live keynote external june2012
Chambers cisco live keynote external june2012Leslie Rubin
 
One Bank, One Architecture
One Bank, One ArchitectureOne Bank, One Architecture
One Bank, One ArchitecturePhi Jack
 
48 benot-long
48 benot-long48 benot-long
48 benot-longKBIZEAU
 
Smarter Planet and Megatrends
Smarter Planet and MegatrendsSmarter Planet and Megatrends
Smarter Planet and MegatrendsIBM Danmark
 
2012: The Tipping Point of Broad Scale Cloud Deployment
2012: The Tipping Point of Broad Scale Cloud Deployment2012: The Tipping Point of Broad Scale Cloud Deployment
2012: The Tipping Point of Broad Scale Cloud DeploymentOpen Data Center Alliance
 
IBM Tivoli - Security Solutions for the Cloud
IBM Tivoli - Security Solutions for the CloudIBM Tivoli - Security Solutions for the Cloud
IBM Tivoli - Security Solutions for the CloudVincent Kwon
 
Ecqn son phan - short version
Ecqn   son phan - short versionEcqn   son phan - short version
Ecqn son phan - short versionSon Phan
 
Cisco tec de beer, andersen, o'sullivan - video & collaboration
Cisco tec   de beer, andersen, o'sullivan - video & collaborationCisco tec   de beer, andersen, o'sullivan - video & collaboration
Cisco tec de beer, andersen, o'sullivan - video & collaborationCisco Public Relations
 
2015 CIO Outlook Presentation
2015 CIO Outlook Presentation2015 CIO Outlook Presentation
2015 CIO Outlook PresentationDNEWBOLD
 
Smarter Computing in a New Era of IT - Dr. Gururaj Rao
Smarter Computing in a New Era of IT - Dr. Gururaj RaoSmarter Computing in a New Era of IT - Dr. Gururaj Rao
Smarter Computing in a New Era of IT - Dr. Gururaj RaoJyothi Satyanathan
 
Internet of Everything (IoE) Economy
Internet of Everything (IoE) EconomyInternet of Everything (IoE) Economy
Internet of Everything (IoE) EconomyCisco Services
 
George Brown College: Leadership in the innovation economy
George Brown College: Leadership in the innovation economyGeorge Brown College: Leadership in the innovation economy
George Brown College: Leadership in the innovation economyCisco Canada
 
The Postdigital Enterprise: Harnessing Change, Managing Disruption
The Postdigital Enterprise: Harnessing Change, Managing DisruptionThe Postdigital Enterprise: Harnessing Change, Managing Disruption
The Postdigital Enterprise: Harnessing Change, Managing DisruptionCorey O'Neal
 
Insurance Technology As A Catalyst For Change - Emerging Market Segments
Insurance Technology As A Catalyst For Change - Emerging Market SegmentsInsurance Technology As A Catalyst For Change - Emerging Market Segments
Insurance Technology As A Catalyst For Change - Emerging Market SegmentsAgile Financial Technologies
 
"Преимущества облачных решений от Cisco" (Обзор облачной стратегии Cisco, Пр...
 "Преимущества облачных решений от Cisco" (Обзор облачной стратегии Cisco, Пр... "Преимущества облачных решений от Cisco" (Обзор облачной стратегии Cisco, Пр...
"Преимущества облачных решений от Cisco" (Обзор облачной стратегии Cisco, Пр...Cisco Russia
 

Similar to Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций. (20)

Chambers cisco live keynote external june2012
Chambers cisco live keynote external june2012Chambers cisco live keynote external june2012
Chambers cisco live keynote external june2012
 
One Bank, One Architecture
One Bank, One ArchitectureOne Bank, One Architecture
One Bank, One Architecture
 
48 benot-long
48 benot-long48 benot-long
48 benot-long
 
Insurance Technology Trends
Insurance Technology TrendsInsurance Technology Trends
Insurance Technology Trends
 
Smarter Planet and Megatrends
Smarter Planet and MegatrendsSmarter Planet and Megatrends
Smarter Planet and Megatrends
 
2012: The Tipping Point of Broad Scale Cloud Deployment
2012: The Tipping Point of Broad Scale Cloud Deployment2012: The Tipping Point of Broad Scale Cloud Deployment
2012: The Tipping Point of Broad Scale Cloud Deployment
 
IBM Tivoli - Security Solutions for the Cloud
IBM Tivoli - Security Solutions for the CloudIBM Tivoli - Security Solutions for the Cloud
IBM Tivoli - Security Solutions for the Cloud
 
Ecqn son phan - short version
Ecqn   son phan - short versionEcqn   son phan - short version
Ecqn son phan - short version
 
Greenplum hadoop
Greenplum hadoopGreenplum hadoop
Greenplum hadoop
 
Greenplum hadoop
Greenplum hadoopGreenplum hadoop
Greenplum hadoop
 
Cisco tec de beer, andersen, o'sullivan - video & collaboration
Cisco tec   de beer, andersen, o'sullivan - video & collaborationCisco tec   de beer, andersen, o'sullivan - video & collaboration
Cisco tec de beer, andersen, o'sullivan - video & collaboration
 
2015 CIO Outlook Presentation
2015 CIO Outlook Presentation2015 CIO Outlook Presentation
2015 CIO Outlook Presentation
 
Cisco Mobilize Magazine: Winter/Spring 2013
Cisco Mobilize Magazine: Winter/Spring 2013Cisco Mobilize Magazine: Winter/Spring 2013
Cisco Mobilize Magazine: Winter/Spring 2013
 
Cisco
CiscoCisco
Cisco
 
Smarter Computing in a New Era of IT - Dr. Gururaj Rao
Smarter Computing in a New Era of IT - Dr. Gururaj RaoSmarter Computing in a New Era of IT - Dr. Gururaj Rao
Smarter Computing in a New Era of IT - Dr. Gururaj Rao
 
Internet of Everything (IoE) Economy
Internet of Everything (IoE) EconomyInternet of Everything (IoE) Economy
Internet of Everything (IoE) Economy
 
George Brown College: Leadership in the innovation economy
George Brown College: Leadership in the innovation economyGeorge Brown College: Leadership in the innovation economy
George Brown College: Leadership in the innovation economy
 
The Postdigital Enterprise: Harnessing Change, Managing Disruption
The Postdigital Enterprise: Harnessing Change, Managing DisruptionThe Postdigital Enterprise: Harnessing Change, Managing Disruption
The Postdigital Enterprise: Harnessing Change, Managing Disruption
 
Insurance Technology As A Catalyst For Change - Emerging Market Segments
Insurance Technology As A Catalyst For Change - Emerging Market SegmentsInsurance Technology As A Catalyst For Change - Emerging Market Segments
Insurance Technology As A Catalyst For Change - Emerging Market Segments
 
"Преимущества облачных решений от Cisco" (Обзор облачной стратегии Cisco, Пр...
 "Преимущества облачных решений от Cisco" (Обзор облачной стратегии Cisco, Пр... "Преимущества облачных решений от Cisco" (Обзор облачной стратегии Cisco, Пр...
"Преимущества облачных решений от Cisco" (Обзор облачной стратегии Cisco, Пр...
 

More from Cisco Russia

Service portfolio 18
Service portfolio 18Service portfolio 18
Service portfolio 18Cisco Russia
 
История одного взлома. Как решения Cisco могли бы предотвратить его?
История одного взлома. Как решения Cisco могли бы предотвратить его?История одного взлома. Как решения Cisco могли бы предотвратить его?
История одного взлома. Как решения Cisco могли бы предотвратить его?Cisco Russia
 
Об оценке соответствия средств защиты информации
Об оценке соответствия средств защиты информацииОб оценке соответствия средств защиты информации
Об оценке соответствия средств защиты информацииCisco Russia
 
Обзор Сервисных Услуг Cisco в России и странах СНГ.
Обзор Сервисных Услуг Cisco в России и странах СНГ.Обзор Сервисных Услуг Cisco в России и странах СНГ.
Обзор Сервисных Услуг Cisco в России и странах СНГ.Cisco Russia
 
Клиентские контракты на техническую поддержку Cisco Smart Net Total Care
Клиентские контракты на техническую поддержку Cisco Smart Net Total CareКлиентские контракты на техническую поддержку Cisco Smart Net Total Care
Клиентские контракты на техническую поддержку Cisco Smart Net Total CareCisco Russia
 
Cisco Catalyst 9000 series
Cisco Catalyst 9000 series Cisco Catalyst 9000 series
Cisco Catalyst 9000 series Cisco Russia
 
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Russia
 
Профессиональные услуги Cisco для Software-Defined Access
Профессиональные услуги Cisco для Software-Defined AccessПрофессиональные услуги Cisco для Software-Defined Access
Профессиональные услуги Cisco для Software-Defined AccessCisco Russia
 
Обнаружение известного вредоносного кода в зашифрованном с помощью TLS трафик...
Обнаружение известного вредоносного кода в зашифрованном с помощью TLS трафик...Обнаружение известного вредоносного кода в зашифрованном с помощью TLS трафик...
Обнаружение известного вредоносного кода в зашифрованном с помощью TLS трафик...Cisco Russia
 
Промышленный Интернет вещей: опыт и результаты применения в нефтегазовой отрасли
Промышленный Интернет вещей: опыт и результаты применения в нефтегазовой отраслиПромышленный Интернет вещей: опыт и результаты применения в нефтегазовой отрасли
Промышленный Интернет вещей: опыт и результаты применения в нефтегазовой отраслиCisco Russia
 
Полугодовой отчет Cisco по информационной безопасности за 2017 год
Полугодовой отчет Cisco по информационной безопасности за 2017 год Полугодовой отчет Cisco по информационной безопасности за 2017 год
Полугодовой отчет Cisco по информационной безопасности за 2017 год Cisco Russia
 
Годовой отчет Cisco по кибербезопасности за 2017 год
Годовой отчет Cisco по кибербезопасности за 2017 годГодовой отчет Cisco по кибербезопасности за 2017 год
Годовой отчет Cisco по кибербезопасности за 2017 годCisco Russia
 
Безопасность для цифровой экономики. Развитие продуктов и решений Cisco
Безопасность для цифровой экономики. Развитие продуктов и решений CiscoБезопасность для цифровой экономики. Развитие продуктов и решений Cisco
Безопасность для цифровой экономики. Развитие продуктов и решений CiscoCisco Russia
 
Cisco StealthWatch. Использование телеметрии для решения проблемы зашифрованн...
Cisco StealthWatch. Использование телеметрии для решения проблемы зашифрованн...Cisco StealthWatch. Использование телеметрии для решения проблемы зашифрованн...
Cisco StealthWatch. Использование телеметрии для решения проблемы зашифрованн...Cisco Russia
 
Обеспечение бесперебойной работы корпоративных приложений в больших гетероген...
Обеспечение бесперебойной работы корпоративных приложений в больших гетероген...Обеспечение бесперебойной работы корпоративных приложений в больших гетероген...
Обеспечение бесперебойной работы корпоративных приложений в больших гетероген...Cisco Russia
 
Новое поколение серверов Сisco UCS. Гиперконвергентное решении Cisco HyperFle...
Новое поколение серверов Сisco UCS. Гиперконвергентное решении Cisco HyperFle...Новое поколение серверов Сisco UCS. Гиперконвергентное решении Cisco HyperFle...
Новое поколение серверов Сisco UCS. Гиперконвергентное решении Cisco HyperFle...Cisco Russia
 

More from Cisco Russia (20)

Service portfolio 18
Service portfolio 18Service portfolio 18
Service portfolio 18
 
История одного взлома. Как решения Cisco могли бы предотвратить его?
История одного взлома. Как решения Cisco могли бы предотвратить его?История одного взлома. Как решения Cisco могли бы предотвратить его?
История одного взлома. Как решения Cisco могли бы предотвратить его?
 
Об оценке соответствия средств защиты информации
Об оценке соответствия средств защиты информацииОб оценке соответствия средств защиты информации
Об оценке соответствия средств защиты информации
 
Обзор Сервисных Услуг Cisco в России и странах СНГ.
Обзор Сервисных Услуг Cisco в России и странах СНГ.Обзор Сервисных Услуг Cisco в России и странах СНГ.
Обзор Сервисных Услуг Cisco в России и странах СНГ.
 
Клиентские контракты на техническую поддержку Cisco Smart Net Total Care
Клиентские контракты на техническую поддержку Cisco Smart Net Total CareКлиентские контракты на техническую поддержку Cisco Smart Net Total Care
Клиентские контракты на техническую поддержку Cisco Smart Net Total Care
 
Cisco Catalyst 9000 series
Cisco Catalyst 9000 series Cisco Catalyst 9000 series
Cisco Catalyst 9000 series
 
Cisco Catalyst 9500
Cisco Catalyst 9500Cisco Catalyst 9500
Cisco Catalyst 9500
 
Cisco Catalyst 9400
Cisco Catalyst 9400Cisco Catalyst 9400
Cisco Catalyst 9400
 
Cisco Umbrella
Cisco UmbrellaCisco Umbrella
Cisco Umbrella
 
Cisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPsCisco Endpoint Security for MSSPs
Cisco Endpoint Security for MSSPs
 
Cisco FirePower
Cisco FirePowerCisco FirePower
Cisco FirePower
 
Профессиональные услуги Cisco для Software-Defined Access
Профессиональные услуги Cisco для Software-Defined AccessПрофессиональные услуги Cisco для Software-Defined Access
Профессиональные услуги Cisco для Software-Defined Access
 
Обнаружение известного вредоносного кода в зашифрованном с помощью TLS трафик...
Обнаружение известного вредоносного кода в зашифрованном с помощью TLS трафик...Обнаружение известного вредоносного кода в зашифрованном с помощью TLS трафик...
Обнаружение известного вредоносного кода в зашифрованном с помощью TLS трафик...
 
Промышленный Интернет вещей: опыт и результаты применения в нефтегазовой отрасли
Промышленный Интернет вещей: опыт и результаты применения в нефтегазовой отраслиПромышленный Интернет вещей: опыт и результаты применения в нефтегазовой отрасли
Промышленный Интернет вещей: опыт и результаты применения в нефтегазовой отрасли
 
Полугодовой отчет Cisco по информационной безопасности за 2017 год
Полугодовой отчет Cisco по информационной безопасности за 2017 год Полугодовой отчет Cisco по информационной безопасности за 2017 год
Полугодовой отчет Cisco по информационной безопасности за 2017 год
 
Годовой отчет Cisco по кибербезопасности за 2017 год
Годовой отчет Cisco по кибербезопасности за 2017 годГодовой отчет Cisco по кибербезопасности за 2017 год
Годовой отчет Cisco по кибербезопасности за 2017 год
 
Безопасность для цифровой экономики. Развитие продуктов и решений Cisco
Безопасность для цифровой экономики. Развитие продуктов и решений CiscoБезопасность для цифровой экономики. Развитие продуктов и решений Cisco
Безопасность для цифровой экономики. Развитие продуктов и решений Cisco
 
Cisco StealthWatch. Использование телеметрии для решения проблемы зашифрованн...
Cisco StealthWatch. Использование телеметрии для решения проблемы зашифрованн...Cisco StealthWatch. Использование телеметрии для решения проблемы зашифрованн...
Cisco StealthWatch. Использование телеметрии для решения проблемы зашифрованн...
 
Обеспечение бесперебойной работы корпоративных приложений в больших гетероген...
Обеспечение бесперебойной работы корпоративных приложений в больших гетероген...Обеспечение бесперебойной работы корпоративных приложений в больших гетероген...
Обеспечение бесперебойной работы корпоративных приложений в больших гетероген...
 
Новое поколение серверов Сisco UCS. Гиперконвергентное решении Cisco HyperFle...
Новое поколение серверов Сisco UCS. Гиперконвергентное решении Cisco HyperFle...Новое поколение серверов Сisco UCS. Гиперконвергентное решении Cisco HyperFle...
Новое поколение серверов Сisco UCS. Гиперконвергентное решении Cisco HyperFle...
 

Recently uploaded

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024Lonnie McRorey
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsRizwan Syed
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfPrecisely
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfRankYa
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsMiki Katsuragi
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxLoriGlavin3
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfAddepto
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024BookNet Canada
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.Curtis Poe
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionDilum Bandara
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024Stephanie Beckett
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piececharlottematthew16
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebUiPathCommunity
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Manik S Magar
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxNavinnSomaal
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek SchlawackFwdays
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Scott Keck-Warren
 

Recently uploaded (20)

TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024TeamStation AI System Report LATAM IT Salaries 2024
TeamStation AI System Report LATAM IT Salaries 2024
 
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptxE-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
E-Vehicle_Hacking_by_Parul Sharma_null_owasp.pptx
 
Scanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL CertsScanning the Internet for External Cloud Exposures via SSL Certs
Scanning the Internet for External Cloud Exposures via SSL Certs
 
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdfHyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
Hyperautomation and AI/ML: A Strategy for Digital Transformation Success.pdf
 
Search Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdfSearch Engine Optimization SEO PDF for 2024.pdf
Search Engine Optimization SEO PDF for 2024.pdf
 
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
Vertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering TipsVertex AI Gemini Prompt Engineering Tips
Vertex AI Gemini Prompt Engineering Tips
 
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptxMerck Moving Beyond Passwords: FIDO Paris Seminar.pptx
Merck Moving Beyond Passwords: FIDO Paris Seminar.pptx
 
Gen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdfGen AI in Business - Global Trends Report 2024.pdf
Gen AI in Business - Global Trends Report 2024.pdf
 
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
Transcript: New from BookNet Canada for 2024: BNC CataList - Tech Forum 2024
 
How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.How AI, OpenAI, and ChatGPT impact business and software.
How AI, OpenAI, and ChatGPT impact business and software.
 
Advanced Computer Architecture – An Introduction
Advanced Computer Architecture – An IntroductionAdvanced Computer Architecture – An Introduction
Advanced Computer Architecture – An Introduction
 
What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024What's New in Teams Calling, Meetings and Devices March 2024
What's New in Teams Calling, Meetings and Devices March 2024
 
Story boards and shot lists for my a level piece
Story boards and shot lists for my a level pieceStory boards and shot lists for my a level piece
Story boards and shot lists for my a level piece
 
Dev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio WebDev Dives: Streamline document processing with UiPath Studio Web
Dev Dives: Streamline document processing with UiPath Studio Web
 
DMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special EditionDMCC Future of Trade Web3 - Special Edition
DMCC Future of Trade Web3 - Special Edition
 
Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!Anypoint Exchange: It’s Not Just a Repo!
Anypoint Exchange: It’s Not Just a Repo!
 
SAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptxSAP Build Work Zone - Overview L2-L3.pptx
SAP Build Work Zone - Overview L2-L3.pptx
 
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
"Subclassing and Composition – A Pythonic Tour of Trade-Offs", Hynek Schlawack
 
Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024Advanced Test Driven-Development @ php[tek] 2024
Advanced Test Driven-Development @ php[tek] 2024
 

Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций.

  • 1. The Agile Enterprise Connect, Collaborate, Innovate and Transform – Securely! Den Sullivan Head of Architecture & Enterprise Emerging Markets © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1
  • 2. Shaping The Business Environment Business Volatility Rapid Globalisation Personalisation •  Less predictable •  Connected economy - flows of •  Consumerisation of IT environment information, capital, goods, •  Rising expectations •  More resiliency (24/7) people Ecological Footprint Demographics Technology •  Safeguard vital resources •  Small ageing v. large younger •  More and faster disruption to remain competitive population •  Mobility, post PC era •  Gen Y workforce & customers •  Network-centric organisations © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Cisco Public Confidential 2
  • 3. Mega Challenges Opportunity for Transformation Business Volatility Rapid Globalisation Personalisation Less predictable environment Connected economy – Consumerisation of IT More resiliency (24/7) flows of information, Rising expectations capital, goods, people Ecological Footprint Demographics Technology Safeguard vital resources Small ageing v. large younger population More and faster disruption for competitiveness Gen Y workforce & customers Mobility, post PC era Network-centric organisations Improve innovation to Improve productivity Socioeconomic development supported provide your company with differentiation and through cross-functional collaboration by ICT, driving job growth, prosperity a competitive edge in the eyes of customers and creating a productivty borderless and competitiveness of Emerging organisation countries Increase Revenue Reduce Operating Expenses Build National Infrastructure Smart Faster More Faster New Cost Use Skills Safety Broadband Product Recurring Decision Revenue Reduction Vital Education Healthcare Rollout to Market Revenue Making Resources © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
  • 4. 4 Source: Buckminster Fuller’s Law © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
  • 5. During the 21st Century … we may experience 20,000 years of progress © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
  • 6. ‘I Cannot Imagine A Life Without…’ My Mobile Phone The Internet A Car My Current Partner 14 - 29 year old population © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
  • 7. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
  • 8.
  • 9. Slide to Change Channel © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
  • 10. Information Explosion billion email messages per day apps downloaded every second of video uploaded every minute By 2015, video minutes 1/4 million full-length Hollywood (equivalent of 674 days) will traverse the Internet every second releases every week (3 billion views per day) Last year’s mobile data traffic was We store 3x the size of the entire global of this new information internet in 2000 Home to photos of the world’s mobile data Sources: Cisco IBSG, 2006–2011; Cisco VNI, June 2011; Technorati; Radicati Group; IDC; The traffic will be video by 2015 Economist; Apple; InformationWeek © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
  • 11. One zettabyte = stack of books from Earth to Pluto Increase of 540,000 20 times (72 billion miles) times from 2003; more than 90% from video If an 11 oz. cup of coffee equals 1 gigabyte - then 1 zettabyte would have the same volume of the Great Wall of China Source: Cisco Visual Networking Index (VNI), June 2011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Cisco Public Confidential 11
  • 12. More data was created during any 48 hour period last year than by ALL of humanity during the past 30,000 years
  • 13. OPPORTUNITY TO REDEFINE RELATIONSHIPS Between Citizens and Governments, Consumers and Enterprises …
  • 14. OPPORTUNITY TO LEAD CHANGE the Global Landscape and Hyperconnectivity …
  • 15. LET’S THRIVE NOT JUST SURVIVE in an Environment of Change Building Out World Class Infrastructures © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
  • 16. 100 addresses for 4.8 trillion addresses for 52,000 trillion trillion every atom every star in the known addresses per person on the earth’s surface universe IPv4 addresses: 4,294,967,296 IPv6 addresses: 340,282,366,920,938,463,463,374,607,431,768,211,456 Sources: Cisco IBSG, 2006–2011; Steve Leibson, Computer History Museum; CNN © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Cisco Public Confidential 16
  • 17. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Cisco Public Confidential 17
  • 18. This tree has 3,000 Cow transmits followers…do you? 200 MB per year Connected shoe cross referenced transmit data from your with environmental / stomach weather data Sources: Cisco IBSG, 2011; Sparked, 2010; Nike, 2010; David Van Sickle, 2011; Proteus, 2011 © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Cisco Public Confidential 18
  • 19. “The best way to predict the future is to create it” Peter Drucker © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
  • 20.
  • 21.
  • 22. Changing People: Changing the Way They Work © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
  • 23. ANYWHERE ANY DEVICE ANY CONTENT Richest Secure Intra- & Inter- Experience Company in Any Location Video handled as Flexible Access Communications Easily as Voice, Data COLLABORATION from All Clients Consistent Access Future-Proofed Policy Across Energy for Regulatory Secure, Reliable & Optimised Network Seamless Access for BORDERLESS Application Control whilst Requirements Energy Mobile Devices NETWORKS Delivery Anytime, Anywhere Efficient Any Service, Comprehensive One System for Any Form Optimised for Orchestration Computing, Factor, Any Networking & DATA CENTRE Virtualization & of Automated Platform Cloud – Reduced Provisioning Storage VIRTUALIZATION Capex/Opex Converged Infrastructure to Multiple Technologies Consistent for Optimal Flexibility Deliver New & Future Ability to Change SP Video, Mobile, Cloud Reliability & Services Business Models Services Anywhere, Availability IP NGN All IP Mobile Network Anytime, Any Device © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
  • 24. Any-to-Any Visual Collaboration Networking On-Premise Cloud Seamless Agile Mobility Infrastructure End-to-End Security © 2011 Cisco and/or its affiliates. All rights reserved. Interoperable Open Architecture Cisco Confidential 24
  • 25. NETWORK Data Desktop Center © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
  • 26. Mobility Bring Your NETWORK Data Desktop Own Devices Center © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
  • 27. Mobility Cloud/ Bring Your NETWORK Virtualization Data SaaS | DC / V Own Devices Center © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
  • 28. Immersive Collaboration Pervasive Video Mobility Cloud/ Bring Your NETWORK Virtualization SaaS | DC / V Own Devices SECURITY IT PRODUCTIVITY ENERGY EFFICIENCY © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
  • 29. Immersive Collaboration Pervasive Video Cloud/ Mobility A “BORDERLESS” NETWORK Virtualization Bring Your SaaS | DC / V Own Devices SECURITY IT PRODUCTIVITY ENERGY EFFICIENCY © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
  • 30. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
  • 31. 2008 b.c © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
  • 32. Your Data Center Strategy Enabled You To: Drive Business Objectives AND Innovate with Operational Excellence Reduced Need to reduce costs Server virtualization: Applications Drive for green— business risk and increase profits higher performance experience power, cooling, and space IT as enabling partner of New services LAN and storage VM-Level Workload the business to market convergence awareness provisioning © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
  • 33. ? How Long Does it Take to Provision a Server in Your Organisation? © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
  • 34. Trusted WiFi   Authenticate User   Fingerprint Device   Apply Corporate Config   Enterprise Apps   Automatic Policies © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 34
  • 35. Uncompromised Experience Trusted WiFi Unified Policy Apply defined policy     Self provisioning MDM integration profiles based on:   Device Type   User   Location   Application Simplified Operations © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 35
  • 36. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 36
  • 37. Trusted WiFi Access: FULL No Yes Customer Database Mobile TelePresence Email Instant Messenger © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 37
  • 38. Unified Policy   Identity based Trusted access control WiFi Uncompromised Experience   Interference protection   Client acceleration   802.11u, 11r Are the clients here yet?   Jabber, WebEx Not yet but i will let you know the moment they arrive. Simplified Operations © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 38
  • 39. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 39
  • 40. Untrusted WiFi Access: Limited Customer Database Mobile TelePresence Email Instant Messenger © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 40
  • 41. Unified Policy   Identity based access control   VPN client   Email scanning Uncompromised Experience   Interference protection   Client acceleration   802.11u,   Jabber, WebEx Simplified Operations © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 41
  • 42. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42 Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 42
  • 43. Application Development IT Infrastructure/Ops IT Management Call or Email IT One-Off No Standard Process Operations Custom Server “Why does it take weeks to get a Builds server?” “Why does it cost so much?” Architecture Incomplete No Visibility into Reviews Requirements Future Demand Approval Add Security, Are SLA’s Being Process Back-up, etc. Met? “Every application hosting request has their own unique requirements” “We can’t enforce standards” Track Down Exception No Data to Track Status “Not enough resource to meet demand” Management Cost © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
  • 44. End User Self-Service Governance Service Orchestration Compare Element Managers Service Tiers and Options UCS Manager Guided Shopping Enterprise Orchestration ‘Wizard’ Service VMWare vCenter Catalogue Policy-Based Global Controls Orchestration Service Requests Rich Interactive Forms EMC/ NetApp Storage Provisioning Ordering and Approvals Server Provisioner Status Updates © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44
  • 45. 10 Mins How Long Does it Take to Provision a Server in Your Organisation? © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45
  • 46. Progressing the Private Cloud Compute TCO ($/Qtr/OS instance) $4,000 $3,500 $3,000 TCO for Physical Average TCO $2,500 -14% $2,000 -25% $1,500 -18% $1,000 $500 TCO for $0 Virtual Legacy, all physical Legacy, medium Current state UCS/Cloud, medium UCS/Cloud, high virtualization (60%) virtualization (65%) virtualization (80%) ‘Medium Aggressive’ Unified Computing ‘Highly Aggressive’ Virtualization and Automation Virtualization Delivery 6 -8 weeks 2 -3 weeks 15 mins VM 15 minutes 15 minutes Time (on demand ) (manual ) 2 - 9 days E2E (self -service) (self -service) © 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46 Presentation_ID Cisco IT NDCS, RCDN9 build-out cost tracking (state-of-art Tier-III DC facility), Dec 2009 Source: © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 46
  • 47. “YOU CAN POSTPONE A ROCKET LAUNCH BUT WE HAVE NEVER POSTPONED AN OLYMPICS, BECAUSE THE I.T. IS NOT WORKING” Jean-Benoit Gauthier, Director of Technology, International Olympic Committee © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47
  • 48. 1,000 access points 94 205 Olympic Committees National wireless locations 16,500 telephones 10.8Mto spectators tickets 27,000 5,000 family members media Olympic 4B 70,000 volunteers broadcast audience 6,000 employees 2,220 switches 21,800 & team officials athletes LOCOG 80,000 pc connections 14,000 19 sites live 10M connecting to www.mylondon2012.com people cable TV sockets © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48
  • 49. Business Imperatives Change Raise Customer Interactions Satisfaction New Network Scale your Use Cases Services Work Increase Anyplace Productivity Reduce Operational Benefit TCO Efficiency ology In novation Te c h n Technology Innovation Compute Switching Collaboration Wireless Security Virtualization © 2011 Cisco and/or its affiliates. All rights reserved. Routing CISCO CONFIDENTIAL INTERNAL USE ONLY 49
  • 50. Architectural Framework Benefits Drive Business Enable IT Empower the User Transformation Total Cost of ownership, Risk User Experience, Innovation, Scale Business processes, Mitigation, Investment Productivity, Efficiency Service creation & optimisation Protection © 2011 Cisco and/or its affiliates. All rights reserved. CISCO CONFIDENTIAL INTERNAL USE ONLY 50
  • 51.
  • 52.
  • 53. What Else Happened in 60 Minutes… Nearly 9 Billion Emails Sent Over 8 Million Tweets Almost 6 Million Facebook Status Updates Almost 8,000 Professionals Joined LinkedIn 2880 Hours of Video Uploaded on YouTube 720,000 apps downloaded
  • 54. Thank you for your 60 mins twitter.com/@densullivan © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54