More Related Content Similar to Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций. Similar to Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций. (20) More from Cisco Russia (20) Cовременное предприятие. Надежные технологии для подключения, совместной работы и инноваций.1. The Agile Enterprise
Connect, Collaborate, Innovate and Transform – Securely!
Den Sullivan
Head of Architecture & Enterprise
Emerging Markets
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 1
2. Shaping The Business Environment
Business Volatility Rapid Globalisation Personalisation
• Less predictable • Connected economy - flows of • Consumerisation of IT
environment information, capital, goods, • Rising expectations
• More resiliency (24/7) people
Ecological Footprint Demographics Technology
• Safeguard vital resources • Small ageing v. large younger • More and faster disruption
to remain competitive population • Mobility, post PC era
• Gen Y workforce & customers • Network-centric organisations
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Cisco Public
Confidential 2
3. Mega Challenges
Opportunity for Transformation
Business Volatility Rapid Globalisation Personalisation
Less predictable environment Connected economy – Consumerisation of IT
More resiliency (24/7) flows of information, Rising expectations
capital, goods, people
Ecological Footprint Demographics Technology
Safeguard vital resources Small ageing v. large younger population More and faster disruption
for competitiveness Gen Y workforce & customers Mobility, post PC era
Network-centric organisations
Improve innovation to Improve productivity Socioeconomic development supported
provide your company with differentiation and through cross-functional collaboration by ICT, driving job growth, prosperity
a competitive edge in the eyes of customers and creating a productivty borderless and competitiveness of Emerging
organisation countries
Increase Revenue Reduce Operating Expenses Build National Infrastructure
Smart
Faster More Faster
New Cost Use Skills Safety Broadband
Product Recurring Decision
Revenue Reduction Vital Education Healthcare Rollout
to Market Revenue Making
Resources
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 3
4. 4
Source: Buckminster Fuller’s Law
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential
5. During the 21st Century …
we may experience 20,000 years of progress
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 5
6. ‘I Cannot Imagine A Life Without…’
My Mobile Phone The Internet A Car My Current Partner
14 - 29 year old population
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 6
7. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 7
9. Slide to Change Channel
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 9
10. Information Explosion
billion email messages per day apps downloaded
every second
of video
uploaded every minute By 2015, video minutes
1/4 million full-length Hollywood (equivalent of 674 days) will traverse the Internet every second
releases every week (3 billion views per day)
Last year’s mobile data traffic was
We store 3x the size of the entire global
of this new information
internet in 2000
Home to photos
of the world’s mobile data
Sources: Cisco IBSG, 2006–2011; Cisco VNI, June 2011; Technorati; Radicati Group; IDC; The
traffic will be video by 2015
Economist; Apple; InformationWeek
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 10
11. One zettabyte
=
stack of books from
Earth to Pluto
Increase of 540,000
20 times
(72 billion miles) times from 2003;
more than 90% from
video
If an 11 oz.
cup of coffee equals
1 gigabyte - then
1 zettabyte
would have the
same volume of the
Great Wall of China
Source: Cisco Visual Networking Index (VNI), June 2011
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Cisco Public
Confidential 11
12. More data was created during any 48 hour period
last year than by ALL of humanity during the past
30,000 years
15. LET’S THRIVE NOT JUST SURVIVE
in an Environment of Change
Building Out World Class Infrastructures
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 15
16. 100 addresses for 4.8 trillion addresses for
52,000 trillion trillion
every atom every star in the known
addresses per person
on the earth’s surface universe
IPv4 addresses: 4,294,967,296
IPv6 addresses: 340,282,366,920,938,463,463,374,607,431,768,211,456
Sources: Cisco IBSG, 2006–2011; Steve Leibson, Computer History Museum; CNN
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Cisco Public
Confidential 16
17. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Cisco Public
Confidential 17
18. This tree has 3,000 Cow transmits
followers…do you? 200 MB per year Connected shoe
cross referenced transmit data from your
with environmental / stomach
weather data
Sources: Cisco IBSG, 2011; Sparked, 2010; Nike, 2010; David Van Sickle, 2011; Proteus, 2011
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Cisco Public
Confidential 18
19. “The best way to
predict the future
is to create it”
Peter Drucker
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 19
22. Changing People:
Changing the Way They Work
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 22
23. ANYWHERE ANY DEVICE ANY CONTENT
Richest
Secure Intra- & Inter-
Experience
Company
in Any Location Video handled as Flexible Access Communications
Easily as Voice, Data COLLABORATION from All Clients
Consistent Access Future-Proofed
Policy Across Energy for Regulatory
Secure, Reliable & Optimised
Network Seamless Access for BORDERLESS Application
Control whilst Requirements
Energy
Mobile Devices NETWORKS Delivery Anytime,
Anywhere
Efficient
Any Service, Comprehensive
One System for
Any Form Optimised for Orchestration
Computing,
Factor, Any
Networking &
DATA CENTRE Virtualization & of Automated
Platform Cloud – Reduced Provisioning
Storage VIRTUALIZATION Capex/Opex
Converged
Infrastructure to Multiple Technologies
Consistent for Optimal Flexibility
Deliver New & Future Ability to Change SP
Video, Mobile, Cloud Reliability &
Services Business Models
Services Anywhere, Availability IP NGN All IP Mobile
Network
Anytime, Any Device
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 23
24. Any-to-Any Visual
Collaboration Networking
On-Premise Cloud
Seamless Agile
Mobility Infrastructure
End-to-End
Security
© 2011 Cisco and/or its affiliates. All rights reserved.
Interoperable Open Architecture Cisco Confidential 24
25. NETWORK Data
Desktop Center
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 25
26. Mobility
Bring Your
NETWORK Data
Desktop
Own Devices Center
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 26
27. Mobility Cloud/
Bring Your
NETWORK Virtualization
Data
SaaS | DC / V
Own Devices Center
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 27
28. Immersive
Collaboration
Pervasive Video
Mobility Cloud/
Bring Your
NETWORK Virtualization
SaaS | DC / V
Own Devices
SECURITY
IT PRODUCTIVITY
ENERGY EFFICIENCY
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 28
29. Immersive
Collaboration
Pervasive Video
Cloud/
Mobility A “BORDERLESS”
NETWORK Virtualization
Bring Your SaaS | DC / V
Own Devices
SECURITY
IT PRODUCTIVITY
ENERGY EFFICIENCY
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 29
30. © 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 30
31. 2008 b.c
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 31
32. Your Data Center Strategy Enabled You To:
Drive Business Objectives AND Innovate with Operational Excellence
Reduced Need to reduce costs Server virtualization: Applications Drive for green—
business risk and increase profits higher performance experience power, cooling,
and space
IT as enabling partner of New services LAN and storage VM-Level Workload
the business to market convergence awareness provisioning
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 32
33. ?
How Long Does it Take to Provision a Server in Your Organisation?
© 2010 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 33
34. Trusted
WiFi
Authenticate User
Fingerprint Device
Apply Corporate Config
Enterprise Apps
Automatic Policies
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 34
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 34
35. Uncompromised
Experience
Trusted
WiFi
Unified Policy
Apply defined policy
Self provisioning
MDM integration
profiles based on:
Device Type
User
Location
Application
Simplified
Operations
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 35
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 35
36. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 36
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 36
37. Trusted
WiFi
Access: FULL
No Yes
Customer Database
Mobile TelePresence
Email
Instant Messenger
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 37
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 37
38. Unified Policy
Identity based
Trusted access control
WiFi
Uncompromised
Experience
Interference protection
Client acceleration
802.11u, 11r
Are the clients here yet? Jabber, WebEx
Not yet but i will let you know
the moment they arrive.
Simplified
Operations
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 38
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 38
39. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 39
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 39
40. Untrusted WiFi
Access: Limited
Customer Database
Mobile TelePresence
Email
Instant Messenger
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 40
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 40
41. Unified Policy
Identity based access
control
VPN client
Email scanning
Uncompromised
Experience
Interference protection
Client acceleration
802.11u,
Jabber, WebEx
Simplified
Operations
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 41
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 41
42. © 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 42
Presentation_ID © 2008 Cisco Systems, Inc. All rights reserved. Cisco Confidential 42
43. Application Development IT Infrastructure/Ops IT Management
Call or Email IT One-Off No Standard Process
Operations Custom Server
“Why does it take weeks to get a Builds
server?”
“Why does it cost so much?”
Architecture Incomplete No Visibility into
Reviews Requirements Future Demand
Approval Add Security, Are SLA’s Being
Process Back-up, etc. Met?
“Every application hosting request has
their own unique requirements”
“We can’t enforce standards”
Track Down Exception No Data to Track
Status
“Not enough resource to meet demand”
Management Cost
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 43
44. End User Self-Service Governance Service Orchestration
Compare Element Managers
Service Tiers
and Options UCS Manager
Guided
Shopping Enterprise Orchestration
‘Wizard’
Service VMWare vCenter
Catalogue Policy-Based Global
Controls Orchestration
Service Requests
Rich Interactive
Forms EMC/ NetApp
Storage
Provisioning
Ordering and
Approvals
Server Provisioner
Status Updates
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 44
45. 10 Mins
How Long Does it Take to Provision a Server in Your Organisation?
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 45
46. Progressing the Private Cloud
Compute TCO ($/Qtr/OS instance)
$4,000
$3,500
$3,000 TCO for Physical
Average TCO
$2,500 -14%
$2,000 -25%
$1,500 -18%
$1,000
$500 TCO for
$0 Virtual
Legacy, all physical Legacy, medium Current state UCS/Cloud, medium UCS/Cloud, high
virtualization (60%) virtualization (65%) virtualization (80%)
‘Medium Aggressive’ Unified Computing ‘Highly Aggressive’
Virtualization and Automation Virtualization
Delivery 6 -8 weeks 2 -3 weeks 15 mins VM 15 minutes 15 minutes
Time (on demand ) (manual ) 2 - 9 days E2E (self -service) (self -service)
© 2012 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 46
Presentation_ID Cisco IT NDCS, RCDN9 build-out cost tracking (state-of-art Tier-III DC facility), Dec 2009
Source: © 2009 Cisco Systems, Inc. All rights reserved. Cisco Confidential 46
47. “YOU CAN POSTPONE A ROCKET LAUNCH BUT
WE HAVE NEVER POSTPONED AN OLYMPICS,
BECAUSE THE I.T. IS NOT WORKING”
Jean-Benoit Gauthier, Director of Technology,
International Olympic Committee
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 47
48. 1,000 access points 94
205 Olympic Committees
National
wireless
locations
16,500
telephones
10.8Mto spectators
tickets 27,000
5,000 family members media
Olympic
4B
70,000
volunteers
broadcast audience
6,000 employees
2,220
switches 21,800 & team officials
athletes
LOCOG
80,000
pc connections 14,000 19 sites
live
10M connecting to www.mylondon2012.com
people
cable TV sockets
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 48
49. Business Imperatives
Change
Raise Customer Interactions
Satisfaction
New Network
Scale your Use Cases
Services
Work
Increase Anyplace
Productivity
Reduce
Operational
Benefit
TCO
Efficiency
ology In novation
Te c h n
Technology Innovation
Compute Switching Collaboration Wireless Security Virtualization
© 2011 Cisco and/or its affiliates. All rights reserved.
Routing
CISCO CONFIDENTIAL INTERNAL USE ONLY 49
50. Architectural
Framework Benefits
Drive Business Enable IT Empower the User
Transformation Total Cost of ownership, Risk
User Experience, Innovation,
Scale Business processes, Mitigation, Investment
Productivity, Efficiency
Service creation & optimisation Protection
© 2011 Cisco and/or its affiliates. All rights reserved. CISCO CONFIDENTIAL INTERNAL USE ONLY 50
53. What Else Happened in 60 Minutes…
Nearly 9 Billion Emails Sent
Over 8 Million Tweets
Almost 6 Million Facebook Status Updates
Almost 8,000 Professionals Joined LinkedIn
2880 Hours of Video Uploaded on YouTube
720,000 apps downloaded
54. Thank you for your 60 mins
twitter.com/@densullivan
© 2011 Cisco and/or its affiliates. All rights reserved. Cisco Confidential 54