SlideShare ist ein Scribd-Unternehmen logo
1 von 23
Downloaden Sie, um offline zu lesen
RE-IMAGINING
THE DATACENTER
Diane Bryant
Senior Vice President & General Manager
Datacenter & Connected Systems Group
IT: Period of Transformation
Focused on
Productivity
through automation
Focused on
Rapid Service Delivery
through cloud & devices
Focused on
Cost Reduction
through connectivity
Computer-Centric Network-Centric Human-Centric
DEVICES
… and so on
DEVICES
DATACENTER
Other brands and names are the property of their respective owners.
Virtuous Cycle of Computing
SERVICES
New Services in Action
* Other names and brands may be claimed as the property of others.
MyMagic+
Visitor experience
transformed through
connected wristbands
linked to analytics
Smart Traffic
Safety improved through
ability to locate car in city
of >10M in ~300ms1
1. Source: Bocom
But It’s Still Early
Cloud
OF ENTERPRISE
WORKLOADS
RESIDE IN PUBLIC
CLOUD2
9%
Big Data
OF ENTERPRISES
MAKING DECISIONS
WITH BIG DATA
ANALYTICS1
6%
HPC
OF U.S.
MANUFACTURING
FIRMS USE HPC
CLUSTERS3
12%
1: Intel enterprise customer IT spending survey Q1 2013
2 IDG Enterprise 2012 Cloud Computing key trends and future effects
3 Intersect360 Research and NCMS, "Modeling and Simulation at U.S. Manufacturers: The Case for Digital Manufacturing," 2011
DATACENTER
Demands a New Level of
SCALE
Efficient, On-demand, Resilient
Yet Today’s Infrastructure is Strained
Server
Average utilization <50% despite
virtualization4
Network
2-3 weeks to provision new services1
66% CAGR in mobile data traffic2
Storage
40% data growth CAGR, 90% unstructured3
1: Source: Intel IT internal estimate
2: Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2012–2017
3: IDC’s Digital Universe Study, sponsored by EMC, December 2012
4: IDC Server Virtualization and The Cloud 2012
Intel’s Strategy:
RE-ARCHITECTING THE
DATACENTER
Intel’s Strength:
Transformation from Proprietary to Standards
Supercomputing Example
1500X
Performance
4X
Power Increase
Top 500*
(1997 – 2012)
Driven by Moore’s Law & Architecture Innovation
100X
Reduction
in cost per
FLOP
Source: Intel Analysis / Top500
Top 500 MSS
2013
80%
1997
3%
Software Defined Infrastructure
Changes the Game
Network Storage
From Static to Dynamic. From Manual to Automated.
Server
Re-architect the Network
Software Defined Network (SDN)
Standardize. Virtualize. Automate.
MANUAL
FIXED
HARDWARE
DEFINED
AUTOMATED
FLEXIBLE
SOFTWARE
DEFINED
With SDNTraditional Network
Idea
for service
IT
scopes
Needs
Balance
user demands
Manually
configure devices
Service
running
Set up
network services
Self service
configuration
Idea
for service
Service
running
Time to Provision New Service:
2-3 Weeks1
Time to Provision New Service:
Minutes1
1: Source: Intel IT internal estimate
Re-architect the Network
Today’s Base Stations
Limited programmability.
Latency constrained.
New Services at the
Edge of the Network
Tomorrow’s Base Stations
Intelligence at the edge.
Faster, personalized services.
DATACENTER
RADIO
NETWORK
CONTROLLER
DATACENTER
RADIO
NETWORK
CONTROLLER
Tomorrow’s StorageTraditional Storage
Storage as a Service
Wide range of optimized solutions
Application driven
Greater efficiency
Shared Capacity
High performance
High data protection
SAN
Warm
CapacityTB ZB
Access
Frequent
Infrequent
Hot
Cold
Re-architect Storage
Software Defined Storage
Accelerators
Storage SoCs
Next Gen NVM
Storage Software
Cache
Acceleration
Software
Other brands and names are the property of their respective owners.
Enterprise
Edition for
Lustre
Intelligence for
Efficiency and Resiliency
Tiered for
Capacity and Availability
Re-architect Storage
Software Defined Storage
Other names and brands may be claimed as the property of others
Sort 1TB of Data:
7 MINUTES
Sort 1TB of Data:
>4 Hours
The Power of Solutions:
Big Data Example
Intel® Xeon®
E5-2690 processor
Intel® SSD
520 series
Intel® 10GbE
adapters
Intel® Distribution
for Apache Hadoop*
`
Today
Application-driven allocation of
resources for greater efficiency
Applications constrained to
resources “in the box”
Re-architecting the Server at the Rack Level
Memory ComputeI/O
App AppApp
Tomorrow:
Composable Resources
Pooled
Compute
Pooled
Memory
Pooled
I/O
App
Diversity of Datacenter Workloads
E- Commerce
Dedicated
Hosting
Enterprise
Applications
High
Performance
Computing
Big DataContent Delivery
and Gaming
Graphics
Rendering
I/O Intensive
CPU&Memory
Intensive
Cold
Storage
Low End
Networking
Edge
Routing
Storage
De-dupe
Cloud RAN
Small
Cell
Intel Covering the Full Solution Space
Greater Efficiency through App Optimization & Arch Consistency
Low Power Product Direction
2011
All products, computer systems, dates, and figures specified are preliminary based
on current expectations, and are subject to change without notice.
Xeon E3
Sandy Bridge
32nm
As low as 20W
2012 2013 2014+
“Broadwell”
14nm
ANNOUNCING
TODAY
Xeon E3
Ivy Bridge
22nm
As low as 17W
Xeon E3
Haswell
22nm
As low as 13W
Centerton
32nm
As low as 6W
Avoton
Rangeley
22nm
“Denverton”
14nm
“Broadwell”
SoC
14nm
Software
Compatibility
Global
Ecosystem
Technology
Portfolio
Architecture
Consistency
Workload
Optimized
Silicon
Most Energy
Efficient
Transistors
Intel’s Unmatched Assets
Legal Disclaimers
All products, computer systems, dates, and figures specified are preliminary based on current expectations, and are subject to change without notice.
Intel processor numbers are not a measure of performance. Processor numbers differentiate features within each processor family, not across
different processor families. Go to: http://www.intel.com/products/processor_number
Intel, processors, chipsets, and desktop boards may contain design defects or errors known as errata, which may cause the product to deviate from
published specifications. Current characterized errata are available on request.
Intel® Virtualization Technology requires a computer system with an enabled Intel® processor, BIOS, virtual machine monitor (VMM). Functionality,
performance or other benefits will vary depending on hardware and software configurations. Software applications may not be compatible with all
operating systems. Consult your PC manufacturer. For more information, visit http://www.intel.com/go/virtualization
No computer system can provide absolute security under all conditions. Intel® Trusted Execution Technology (Intel® TXT) requires a computer system
with Intel® Virtualization Technology, an Intel TXT-enabled processor, chipset, BIOS, Authenticated Code Modules and an Intel TXT-compatible
measured launched environment (MLE). Intel TXT also requires the system to contain a TPM v1.s. For more information, visit
http://www.intel.com/technology/security
Intel, Intel Xeon, Intel Atom, Intel Xeon Phi, Intel Itanium, the Intel Itanium logo, the Intel Xeon Phi logo, the Intel Xeon logo and the Intel logo are
trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries.
Other names and brands may be claimed as the property of others.
Copyright © 2013, Intel Corporation. All rights reserved.

Weitere ähnliche Inhalte

Was ist angesagt?

V Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii EditedV Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii EditedSHC
 
Minicom White Paper Using Ram To Increase Security And Improve Efficiency In ...
Minicom White Paper Using Ram To Increase Security And Improve Efficiency In ...Minicom White Paper Using Ram To Increase Security And Improve Efficiency In ...
Minicom White Paper Using Ram To Increase Security And Improve Efficiency In ...elisasson
 
V Pro Bp08505 Phase Ii Edited
V Pro Bp08505 Phase Ii EditedV Pro Bp08505 Phase Ii Edited
V Pro Bp08505 Phase Ii EditedSHC
 
Why A Network Scanner?
Why A Network Scanner?Why A Network Scanner?
Why A Network Scanner?Kevin Neal
 
V Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii EditedV Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii EditedSHC
 
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...SolarWinds
 
Securing the Mobile enterprise
Securing the Mobile enterpriseSecuring the Mobile enterprise
Securing the Mobile enterpriseIBM Danmark
 
The Good, the bad, and the ugly of Thin Client/Server Computing
The Good, the bad, and the ugly of Thin Client/Server ComputingThe Good, the bad, and the ugly of Thin Client/Server Computing
The Good, the bad, and the ugly of Thin Client/Server ComputingThe Integral Worm
 
LF_DPDK17_Reducing Barriers to Adoption - Making DPDK Easier to Integrate int...
LF_DPDK17_Reducing Barriers to Adoption - Making DPDK Easier to Integrate int...LF_DPDK17_Reducing Barriers to Adoption - Making DPDK Easier to Integrate int...
LF_DPDK17_Reducing Barriers to Adoption - Making DPDK Easier to Integrate int...LF_DPDK
 
Desktop as a service (daas)
Desktop as a service (daas)Desktop as a service (daas)
Desktop as a service (daas)johndorian555
 
Bus Tour Windows 7 Deck (Full)
Bus Tour   Windows 7 Deck (Full)Bus Tour   Windows 7 Deck (Full)
Bus Tour Windows 7 Deck (Full)Stephen L Rose
 
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)ITCamp
 
LF_DPDK17_Enabling hardware acceleration in DPDK data plane applications
LF_DPDK17_Enabling hardware acceleration in DPDK data plane applicationsLF_DPDK17_Enabling hardware acceleration in DPDK data plane applications
LF_DPDK17_Enabling hardware acceleration in DPDK data plane applicationsLF_DPDK
 
Introducing the Fujitsu ScanSnap Network fi-6010N iScanner
Introducing the Fujitsu ScanSnap Network fi-6010N iScannerIntroducing the Fujitsu ScanSnap Network fi-6010N iScanner
Introducing the Fujitsu ScanSnap Network fi-6010N iScannerKevin Neal
 
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoTCanon Business CEE
 

Was ist angesagt? (19)

V Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii EditedV Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii Edited
 
Minicom White Paper Using Ram To Increase Security And Improve Efficiency In ...
Minicom White Paper Using Ram To Increase Security And Improve Efficiency In ...Minicom White Paper Using Ram To Increase Security And Improve Efficiency In ...
Minicom White Paper Using Ram To Increase Security And Improve Efficiency In ...
 
V Pro Bp08505 Phase Ii Edited
V Pro Bp08505 Phase Ii EditedV Pro Bp08505 Phase Ii Edited
V Pro Bp08505 Phase Ii Edited
 
Why A Network Scanner?
Why A Network Scanner?Why A Network Scanner?
Why A Network Scanner?
 
V Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii EditedV Pro Bp08505 Phase Iii Edited
V Pro Bp08505 Phase Iii Edited
 
Novinky QualysGuard 2010
Novinky QualysGuard 2010Novinky QualysGuard 2010
Novinky QualysGuard 2010
 
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
SolarWinds Government and Education Webinar: Virtual Technology Briefing 08.0...
 
Securing the Mobile enterprise
Securing the Mobile enterpriseSecuring the Mobile enterprise
Securing the Mobile enterprise
 
The Good, the bad, and the ugly of Thin Client/Server Computing
The Good, the bad, and the ugly of Thin Client/Server ComputingThe Good, the bad, and the ugly of Thin Client/Server Computing
The Good, the bad, and the ugly of Thin Client/Server Computing
 
LF_DPDK17_Reducing Barriers to Adoption - Making DPDK Easier to Integrate int...
LF_DPDK17_Reducing Barriers to Adoption - Making DPDK Easier to Integrate int...LF_DPDK17_Reducing Barriers to Adoption - Making DPDK Easier to Integrate int...
LF_DPDK17_Reducing Barriers to Adoption - Making DPDK Easier to Integrate int...
 
Desktop as a service (daas)
Desktop as a service (daas)Desktop as a service (daas)
Desktop as a service (daas)
 
Bus Tour Windows 7 Deck (Full)
Bus Tour   Windows 7 Deck (Full)Bus Tour   Windows 7 Deck (Full)
Bus Tour Windows 7 Deck (Full)
 
Virtual Desktops Brochure
Virtual Desktops BrochureVirtual Desktops Brochure
Virtual Desktops Brochure
 
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)
Managing Mobile Devices with Windows Intune and SCCM 2012 (Adrian Stoian)
 
LF_DPDK17_Enabling hardware acceleration in DPDK data plane applications
LF_DPDK17_Enabling hardware acceleration in DPDK data plane applicationsLF_DPDK17_Enabling hardware acceleration in DPDK data plane applications
LF_DPDK17_Enabling hardware acceleration in DPDK data plane applications
 
Introducing the Fujitsu ScanSnap Network fi-6010N iScanner
Introducing the Fujitsu ScanSnap Network fi-6010N iScannerIntroducing the Fujitsu ScanSnap Network fi-6010N iScanner
Introducing the Fujitsu ScanSnap Network fi-6010N iScanner
 
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
8 WAYS TO PROTECT THE DATA IN YOUR OFFICE: #4 Secure your office IoT
 
Managed services
Managed servicesManaged services
Managed services
 
Consumerization
ConsumerizationConsumerization
Consumerization
 

Ähnlich wie Re-Imagining the Data Center with Intel

Tackling Retail Technology Management Challenges at the Edge
Tackling Retail Technology Management Challenges at the EdgeTackling Retail Technology Management Challenges at the Edge
Tackling Retail Technology Management Challenges at the EdgeRebekah Rodriguez
 
Building Efficient Edge Nodes for Content Delivery Networks
Building Efficient Edge Nodes for Content Delivery NetworksBuilding Efficient Edge Nodes for Content Delivery Networks
Building Efficient Edge Nodes for Content Delivery NetworksRebekah Rodriguez
 
Lynn Comp - Big Data & Cloud Summit 2013
Lynn Comp - Big Data & Cloud Summit 2013Lynn Comp - Big Data & Cloud Summit 2013
Lynn Comp - Big Data & Cloud Summit 2013IntelAPAC
 
Introduction to container networking in K8s - SDN/NFV London meetup
Introduction to container networking in K8s - SDN/NFV  London meetupIntroduction to container networking in K8s - SDN/NFV  London meetup
Introduction to container networking in K8s - SDN/NFV London meetupHaidee McMahon
 
Accelerating Cloud Services - Intel
Accelerating Cloud Services - IntelAccelerating Cloud Services - Intel
Accelerating Cloud Services - IntelAmazon Web Services
 
Intel’s Big Data and Hadoop Security Initiatives - StampedeCon 2014
Intel’s Big Data and Hadoop Security Initiatives - StampedeCon 2014Intel’s Big Data and Hadoop Security Initiatives - StampedeCon 2014
Intel’s Big Data and Hadoop Security Initiatives - StampedeCon 2014StampedeCon
 
Inside story on Intel Data Center @ IDF 2013
Inside story on Intel Data Center @ IDF 2013Inside story on Intel Data Center @ IDF 2013
Inside story on Intel Data Center @ IDF 2013Intel IT Center
 
Accelerating Innovation from Edge to Cloud
Accelerating Innovation from Edge to CloudAccelerating Innovation from Edge to Cloud
Accelerating Innovation from Edge to CloudRebekah Rodriguez
 
5G Multi-Access Edge Compute
5G Multi-Access Edge Compute5G Multi-Access Edge Compute
5G Multi-Access Edge ComputeMichelle Holley
 
10 zig combined presentation deck v3
10 zig combined presentation deck v310 zig combined presentation deck v3
10 zig combined presentation deck v3Jennifer Phillips
 
ONS 2018 LA - Intel Tutorial: Cloud Native to NFV - Alon Bernstein, Cisco & K...
ONS 2018 LA - Intel Tutorial: Cloud Native to NFV - Alon Bernstein, Cisco & K...ONS 2018 LA - Intel Tutorial: Cloud Native to NFV - Alon Bernstein, Cisco & K...
ONS 2018 LA - Intel Tutorial: Cloud Native to NFV - Alon Bernstein, Cisco & K...Kuralamudhan Ramakrishnan
 
1 intro to_dpdk_and_hw
1 intro to_dpdk_and_hw1 intro to_dpdk_and_hw
1 intro to_dpdk_and_hwvideos
 
Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Srinivasa Addepalli
 
[Cisco Connect 2018 - Vietnam] Vipul shah intel it transformation an imperat...
[Cisco Connect 2018 - Vietnam] Vipul shah  intel it transformation an imperat...[Cisco Connect 2018 - Vietnam] Vipul shah  intel it transformation an imperat...
[Cisco Connect 2018 - Vietnam] Vipul shah intel it transformation an imperat...Nur Shiqim Chok
 
[Cisco Connect 2018 - Vietnam] It transformation an imperative for driving bu...
[Cisco Connect 2018 - Vietnam] It transformation an imperative for driving bu...[Cisco Connect 2018 - Vietnam] It transformation an imperative for driving bu...
[Cisco Connect 2018 - Vietnam] It transformation an imperative for driving bu...Nur Shiqim Chok
 
Vipul shah intel it transformation an imperative for driving business outcomes
Vipul shah  intel it transformation an imperative for driving business outcomesVipul shah  intel it transformation an imperative for driving business outcomes
Vipul shah intel it transformation an imperative for driving business outcomesNetworkCollaborators
 
Accelerated adoption of Internet of Things (IoT) with In-network computing an...
Accelerated adoption of Internet of Things (IoT) with In-network computing an...Accelerated adoption of Internet of Things (IoT) with In-network computing an...
Accelerated adoption of Internet of Things (IoT) with In-network computing an...Infosys
 
Embedded systems- nanocdac
Embedded systems- nanocdacEmbedded systems- nanocdac
Embedded systems- nanocdacnanocdac
 

Ähnlich wie Re-Imagining the Data Center with Intel (20)

Tackling Retail Technology Management Challenges at the Edge
Tackling Retail Technology Management Challenges at the EdgeTackling Retail Technology Management Challenges at the Edge
Tackling Retail Technology Management Challenges at the Edge
 
The Intel Xeon Scalable Processor and IoT
The Intel Xeon Scalable Processor and IoTThe Intel Xeon Scalable Processor and IoT
The Intel Xeon Scalable Processor and IoT
 
Building Efficient Edge Nodes for Content Delivery Networks
Building Efficient Edge Nodes for Content Delivery NetworksBuilding Efficient Edge Nodes for Content Delivery Networks
Building Efficient Edge Nodes for Content Delivery Networks
 
Cloud-Ready Networks
Cloud-Ready NetworksCloud-Ready Networks
Cloud-Ready Networks
 
Lynn Comp - Big Data & Cloud Summit 2013
Lynn Comp - Big Data & Cloud Summit 2013Lynn Comp - Big Data & Cloud Summit 2013
Lynn Comp - Big Data & Cloud Summit 2013
 
Introduction to container networking in K8s - SDN/NFV London meetup
Introduction to container networking in K8s - SDN/NFV  London meetupIntroduction to container networking in K8s - SDN/NFV  London meetup
Introduction to container networking in K8s - SDN/NFV London meetup
 
Accelerating Cloud Services - Intel
Accelerating Cloud Services - IntelAccelerating Cloud Services - Intel
Accelerating Cloud Services - Intel
 
Intel’s Big Data and Hadoop Security Initiatives - StampedeCon 2014
Intel’s Big Data and Hadoop Security Initiatives - StampedeCon 2014Intel’s Big Data and Hadoop Security Initiatives - StampedeCon 2014
Intel’s Big Data and Hadoop Security Initiatives - StampedeCon 2014
 
Inside story on Intel Data Center @ IDF 2013
Inside story on Intel Data Center @ IDF 2013Inside story on Intel Data Center @ IDF 2013
Inside story on Intel Data Center @ IDF 2013
 
Accelerating Innovation from Edge to Cloud
Accelerating Innovation from Edge to CloudAccelerating Innovation from Edge to Cloud
Accelerating Innovation from Edge to Cloud
 
5G Multi-Access Edge Compute
5G Multi-Access Edge Compute5G Multi-Access Edge Compute
5G Multi-Access Edge Compute
 
10 zig combined presentation deck v3
10 zig combined presentation deck v310 zig combined presentation deck v3
10 zig combined presentation deck v3
 
ONS 2018 LA - Intel Tutorial: Cloud Native to NFV - Alon Bernstein, Cisco & K...
ONS 2018 LA - Intel Tutorial: Cloud Native to NFV - Alon Bernstein, Cisco & K...ONS 2018 LA - Intel Tutorial: Cloud Native to NFV - Alon Bernstein, Cisco & K...
ONS 2018 LA - Intel Tutorial: Cloud Native to NFV - Alon Bernstein, Cisco & K...
 
1 intro to_dpdk_and_hw
1 intro to_dpdk_and_hw1 intro to_dpdk_and_hw
1 intro to_dpdk_and_hw
 
Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2Acceleration_and_Security_draft_v2
Acceleration_and_Security_draft_v2
 
[Cisco Connect 2018 - Vietnam] Vipul shah intel it transformation an imperat...
[Cisco Connect 2018 - Vietnam] Vipul shah  intel it transformation an imperat...[Cisco Connect 2018 - Vietnam] Vipul shah  intel it transformation an imperat...
[Cisco Connect 2018 - Vietnam] Vipul shah intel it transformation an imperat...
 
[Cisco Connect 2018 - Vietnam] It transformation an imperative for driving bu...
[Cisco Connect 2018 - Vietnam] It transformation an imperative for driving bu...[Cisco Connect 2018 - Vietnam] It transformation an imperative for driving bu...
[Cisco Connect 2018 - Vietnam] It transformation an imperative for driving bu...
 
Vipul shah intel it transformation an imperative for driving business outcomes
Vipul shah  intel it transformation an imperative for driving business outcomesVipul shah  intel it transformation an imperative for driving business outcomes
Vipul shah intel it transformation an imperative for driving business outcomes
 
Accelerated adoption of Internet of Things (IoT) with In-network computing an...
Accelerated adoption of Internet of Things (IoT) with In-network computing an...Accelerated adoption of Internet of Things (IoT) with In-network computing an...
Accelerated adoption of Internet of Things (IoT) with In-network computing an...
 
Embedded systems- nanocdac
Embedded systems- nanocdacEmbedded systems- nanocdac
Embedded systems- nanocdac
 

Mehr von Intel IT Center

AI Crash Course- Supercomputing
AI Crash Course- SupercomputingAI Crash Course- Supercomputing
AI Crash Course- SupercomputingIntel IT Center
 
FPGA Inference - DellEMC SURFsara
FPGA Inference - DellEMC SURFsaraFPGA Inference - DellEMC SURFsara
FPGA Inference - DellEMC SURFsaraIntel IT Center
 
High Memory Bandwidth Demo @ One Intel Station
High Memory Bandwidth Demo @ One Intel StationHigh Memory Bandwidth Demo @ One Intel Station
High Memory Bandwidth Demo @ One Intel StationIntel IT Center
 
INFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutions
INFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutionsINFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutions
INFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutionsIntel IT Center
 
Disrupt Hackers With Robust User Authentication
Disrupt Hackers With Robust User AuthenticationDisrupt Hackers With Robust User Authentication
Disrupt Hackers With Robust User AuthenticationIntel IT Center
 
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...Intel IT Center
 
Harness Digital Disruption to Create 2022’s Workplace Today
Harness Digital Disruption to Create 2022’s Workplace TodayHarness Digital Disruption to Create 2022’s Workplace Today
Harness Digital Disruption to Create 2022’s Workplace TodayIntel IT Center
 
Don't Rely on Software Alone. Protect Endpoints with Hardware-Enhanced Security.
Don't Rely on Software Alone.Protect Endpoints with Hardware-Enhanced Security.Don't Rely on Software Alone.Protect Endpoints with Hardware-Enhanced Security.
Don't Rely on Software Alone. Protect Endpoints with Hardware-Enhanced Security.Intel IT Center
 
Achieve Unconstrained Collaboration in a Digital World
Achieve Unconstrained Collaboration in a Digital WorldAchieve Unconstrained Collaboration in a Digital World
Achieve Unconstrained Collaboration in a Digital WorldIntel IT Center
 
Intel® Xeon® Scalable Processors Enabled Applications Marketing Guide
Intel® Xeon® Scalable Processors Enabled Applications Marketing GuideIntel® Xeon® Scalable Processors Enabled Applications Marketing Guide
Intel® Xeon® Scalable Processors Enabled Applications Marketing GuideIntel IT Center
 
#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...
#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...
#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...Intel IT Center
 
Identity Protection for the Digital Age
Identity Protection for the Digital AgeIdentity Protection for the Digital Age
Identity Protection for the Digital AgeIntel IT Center
 
Three Steps to Making a Digital Workplace a Reality
Three Steps to Making a Digital Workplace a RealityThree Steps to Making a Digital Workplace a Reality
Three Steps to Making a Digital Workplace a RealityIntel IT Center
 
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...Intel IT Center
 
Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0
Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0
Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0Intel IT Center
 
Intel® Xeon® Processor E5-2600 v4 Enterprise Database Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Enterprise Database Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Enterprise Database Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Enterprise Database Applications ShowcaseIntel IT Center
 
Intel® Xeon® Processor E5-2600 v4 Core Business Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Core Business Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Core Business Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Core Business Applications ShowcaseIntel IT Center
 
Intel® Xeon® Processor E5-2600 v4 Financial Security Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Financial Security Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Financial Security Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Financial Security Applications ShowcaseIntel IT Center
 
Intel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications ShowcaseIntel IT Center
 
Intel® Xeon® Processor E5-2600 v4 Tech Computing Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Tech Computing Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Tech Computing Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Tech Computing Applications ShowcaseIntel IT Center
 

Mehr von Intel IT Center (20)

AI Crash Course- Supercomputing
AI Crash Course- SupercomputingAI Crash Course- Supercomputing
AI Crash Course- Supercomputing
 
FPGA Inference - DellEMC SURFsara
FPGA Inference - DellEMC SURFsaraFPGA Inference - DellEMC SURFsara
FPGA Inference - DellEMC SURFsara
 
High Memory Bandwidth Demo @ One Intel Station
High Memory Bandwidth Demo @ One Intel StationHigh Memory Bandwidth Demo @ One Intel Station
High Memory Bandwidth Demo @ One Intel Station
 
INFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutions
INFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutionsINFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutions
INFOGRAPHIC: Advantages of Intel vs. IBM Power on SAP HANA solutions
 
Disrupt Hackers With Robust User Authentication
Disrupt Hackers With Robust User AuthenticationDisrupt Hackers With Robust User Authentication
Disrupt Hackers With Robust User Authentication
 
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...
Strengthen Your Enterprise Arsenal Against Cyber Attacks With Hardware-Enhanc...
 
Harness Digital Disruption to Create 2022’s Workplace Today
Harness Digital Disruption to Create 2022’s Workplace TodayHarness Digital Disruption to Create 2022’s Workplace Today
Harness Digital Disruption to Create 2022’s Workplace Today
 
Don't Rely on Software Alone. Protect Endpoints with Hardware-Enhanced Security.
Don't Rely on Software Alone.Protect Endpoints with Hardware-Enhanced Security.Don't Rely on Software Alone.Protect Endpoints with Hardware-Enhanced Security.
Don't Rely on Software Alone. Protect Endpoints with Hardware-Enhanced Security.
 
Achieve Unconstrained Collaboration in a Digital World
Achieve Unconstrained Collaboration in a Digital WorldAchieve Unconstrained Collaboration in a Digital World
Achieve Unconstrained Collaboration in a Digital World
 
Intel® Xeon® Scalable Processors Enabled Applications Marketing Guide
Intel® Xeon® Scalable Processors Enabled Applications Marketing GuideIntel® Xeon® Scalable Processors Enabled Applications Marketing Guide
Intel® Xeon® Scalable Processors Enabled Applications Marketing Guide
 
#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...
#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...
#NABshow: National Association of Broadcasters 2017 Super Session Presentatio...
 
Identity Protection for the Digital Age
Identity Protection for the Digital AgeIdentity Protection for the Digital Age
Identity Protection for the Digital Age
 
Three Steps to Making a Digital Workplace a Reality
Three Steps to Making a Digital Workplace a RealityThree Steps to Making a Digital Workplace a Reality
Three Steps to Making a Digital Workplace a Reality
 
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...
Three Steps to Making The Digital Workplace a Reality - by Intel’s Chad Const...
 
Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0
Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0
Intel® Xeon® Processor E7-8800/4800 v4 EAMG 2.0
 
Intel® Xeon® Processor E5-2600 v4 Enterprise Database Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Enterprise Database Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Enterprise Database Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Enterprise Database Applications Showcase
 
Intel® Xeon® Processor E5-2600 v4 Core Business Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Core Business Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Core Business Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Core Business Applications Showcase
 
Intel® Xeon® Processor E5-2600 v4 Financial Security Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Financial Security Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Financial Security Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Financial Security Applications Showcase
 
Intel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Telco Cloud Digital Applications Showcase
 
Intel® Xeon® Processor E5-2600 v4 Tech Computing Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Tech Computing Applications ShowcaseIntel® Xeon® Processor E5-2600 v4 Tech Computing Applications Showcase
Intel® Xeon® Processor E5-2600 v4 Tech Computing Applications Showcase
 

Kürzlich hochgeladen

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024Rafal Los
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonAnna Loughnan Colquhoun
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...Neo4j
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationRadu Cotescu
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityPrincipled Technologies
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking MenDelhi Call girls
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?Antenna Manufacturer Coco
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024Results
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptxHampshireHUG
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationSafe Software
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Miguel Araújo
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Servicegiselly40
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...Martijn de Jong
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)Gabriella Davis
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking MenDelhi Call girls
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)wesley chun
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024The Digital Insurer
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processorsdebabhi2
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfEnterprise Knowledge
 

Kürzlich hochgeladen (20)

The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024The 7 Things I Know About Cyber Security After 25 Years | April 2024
The 7 Things I Know About Cyber Security After 25 Years | April 2024
 
Data Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt RobisonData Cloud, More than a CDP by Matt Robison
Data Cloud, More than a CDP by Matt Robison
 
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...Workshop - Best of Both Worlds_ Combine  KG and Vector search for  enhanced R...
Workshop - Best of Both Worlds_ Combine KG and Vector search for enhanced R...
 
Scaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organizationScaling API-first – The story of a global engineering organization
Scaling API-first – The story of a global engineering organization
 
Boost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivityBoost PC performance: How more available memory can improve productivity
Boost PC performance: How more available memory can improve productivity
 
08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men08448380779 Call Girls In Friends Colony Women Seeking Men
08448380779 Call Girls In Friends Colony Women Seeking Men
 
What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?What Are The Drone Anti-jamming Systems Technology?
What Are The Drone Anti-jamming Systems Technology?
 
Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024Tata AIG General Insurance Company - Insurer Innovation Award 2024
Tata AIG General Insurance Company - Insurer Innovation Award 2024
 
A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024A Call to Action for Generative AI in 2024
A Call to Action for Generative AI in 2024
 
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
04-2024-HHUG-Sales-and-Marketing-Alignment.pptx
 
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time AutomationFrom Event to Action: Accelerate Your Decision Making with Real-Time Automation
From Event to Action: Accelerate Your Decision Making with Real-Time Automation
 
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
Mastering MySQL Database Architecture: Deep Dive into MySQL Shell and MySQL R...
 
CNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of ServiceCNv6 Instructor Chapter 6 Quality of Service
CNv6 Instructor Chapter 6 Quality of Service
 
2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...2024: Domino Containers - The Next Step. News from the Domino Container commu...
2024: Domino Containers - The Next Step. News from the Domino Container commu...
 
A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)A Domino Admins Adventures (Engage 2024)
A Domino Admins Adventures (Engage 2024)
 
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men08448380779 Call Girls In Greater Kailash - I Women Seeking Men
08448380779 Call Girls In Greater Kailash - I Women Seeking Men
 
Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)Powerful Google developer tools for immediate impact! (2023-24 C)
Powerful Google developer tools for immediate impact! (2023-24 C)
 
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
Bajaj Allianz Life Insurance Company - Insurer Innovation Award 2024
 
Exploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone ProcessorsExploring the Future Potential of AI-Enabled Smartphone Processors
Exploring the Future Potential of AI-Enabled Smartphone Processors
 
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdfThe Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
The Role of Taxonomy and Ontology in Semantic Layers - Heather Hedden.pdf
 

Re-Imagining the Data Center with Intel

  • 1. RE-IMAGINING THE DATACENTER Diane Bryant Senior Vice President & General Manager Datacenter & Connected Systems Group
  • 2. IT: Period of Transformation Focused on Productivity through automation Focused on Rapid Service Delivery through cloud & devices Focused on Cost Reduction through connectivity Computer-Centric Network-Centric Human-Centric
  • 3. DEVICES … and so on DEVICES DATACENTER Other brands and names are the property of their respective owners. Virtuous Cycle of Computing SERVICES
  • 4. New Services in Action * Other names and brands may be claimed as the property of others. MyMagic+ Visitor experience transformed through connected wristbands linked to analytics Smart Traffic Safety improved through ability to locate car in city of >10M in ~300ms1 1. Source: Bocom
  • 5. But It’s Still Early Cloud OF ENTERPRISE WORKLOADS RESIDE IN PUBLIC CLOUD2 9% Big Data OF ENTERPRISES MAKING DECISIONS WITH BIG DATA ANALYTICS1 6% HPC OF U.S. MANUFACTURING FIRMS USE HPC CLUSTERS3 12% 1: Intel enterprise customer IT spending survey Q1 2013 2 IDG Enterprise 2012 Cloud Computing key trends and future effects 3 Intersect360 Research and NCMS, "Modeling and Simulation at U.S. Manufacturers: The Case for Digital Manufacturing," 2011
  • 6. DATACENTER Demands a New Level of SCALE Efficient, On-demand, Resilient
  • 7. Yet Today’s Infrastructure is Strained Server Average utilization <50% despite virtualization4 Network 2-3 weeks to provision new services1 66% CAGR in mobile data traffic2 Storage 40% data growth CAGR, 90% unstructured3 1: Source: Intel IT internal estimate 2: Cisco Visual Networking Index: Global Mobile Data Traffic Forecast Update, 2012–2017 3: IDC’s Digital Universe Study, sponsored by EMC, December 2012 4: IDC Server Virtualization and The Cloud 2012
  • 9. Intel’s Strength: Transformation from Proprietary to Standards Supercomputing Example 1500X Performance 4X Power Increase Top 500* (1997 – 2012) Driven by Moore’s Law & Architecture Innovation 100X Reduction in cost per FLOP Source: Intel Analysis / Top500 Top 500 MSS 2013 80% 1997 3%
  • 10. Software Defined Infrastructure Changes the Game Network Storage From Static to Dynamic. From Manual to Automated. Server
  • 11. Re-architect the Network Software Defined Network (SDN) Standardize. Virtualize. Automate. MANUAL FIXED HARDWARE DEFINED AUTOMATED FLEXIBLE SOFTWARE DEFINED
  • 12. With SDNTraditional Network Idea for service IT scopes Needs Balance user demands Manually configure devices Service running Set up network services Self service configuration Idea for service Service running Time to Provision New Service: 2-3 Weeks1 Time to Provision New Service: Minutes1 1: Source: Intel IT internal estimate Re-architect the Network
  • 13. Today’s Base Stations Limited programmability. Latency constrained. New Services at the Edge of the Network Tomorrow’s Base Stations Intelligence at the edge. Faster, personalized services. DATACENTER RADIO NETWORK CONTROLLER DATACENTER RADIO NETWORK CONTROLLER
  • 14. Tomorrow’s StorageTraditional Storage Storage as a Service Wide range of optimized solutions Application driven Greater efficiency Shared Capacity High performance High data protection SAN Warm CapacityTB ZB Access Frequent Infrequent Hot Cold Re-architect Storage Software Defined Storage
  • 15. Accelerators Storage SoCs Next Gen NVM Storage Software Cache Acceleration Software Other brands and names are the property of their respective owners. Enterprise Edition for Lustre Intelligence for Efficiency and Resiliency Tiered for Capacity and Availability Re-architect Storage Software Defined Storage
  • 16. Other names and brands may be claimed as the property of others Sort 1TB of Data: 7 MINUTES Sort 1TB of Data: >4 Hours The Power of Solutions: Big Data Example Intel® Xeon® E5-2690 processor Intel® SSD 520 series Intel® 10GbE adapters Intel® Distribution for Apache Hadoop*
  • 17. ` Today Application-driven allocation of resources for greater efficiency Applications constrained to resources “in the box” Re-architecting the Server at the Rack Level Memory ComputeI/O App AppApp Tomorrow: Composable Resources Pooled Compute Pooled Memory Pooled I/O App
  • 18. Diversity of Datacenter Workloads E- Commerce Dedicated Hosting Enterprise Applications High Performance Computing Big DataContent Delivery and Gaming Graphics Rendering I/O Intensive CPU&Memory Intensive Cold Storage Low End Networking Edge Routing Storage De-dupe Cloud RAN Small Cell
  • 19. Intel Covering the Full Solution Space Greater Efficiency through App Optimization & Arch Consistency
  • 20. Low Power Product Direction 2011 All products, computer systems, dates, and figures specified are preliminary based on current expectations, and are subject to change without notice. Xeon E3 Sandy Bridge 32nm As low as 20W 2012 2013 2014+ “Broadwell” 14nm ANNOUNCING TODAY Xeon E3 Ivy Bridge 22nm As low as 17W Xeon E3 Haswell 22nm As low as 13W Centerton 32nm As low as 6W Avoton Rangeley 22nm “Denverton” 14nm “Broadwell” SoC 14nm
  • 22.
  • 23. Legal Disclaimers All products, computer systems, dates, and figures specified are preliminary based on current expectations, and are subject to change without notice. Intel processor numbers are not a measure of performance. Processor numbers differentiate features within each processor family, not across different processor families. Go to: http://www.intel.com/products/processor_number Intel, processors, chipsets, and desktop boards may contain design defects or errors known as errata, which may cause the product to deviate from published specifications. Current characterized errata are available on request. Intel® Virtualization Technology requires a computer system with an enabled Intel® processor, BIOS, virtual machine monitor (VMM). Functionality, performance or other benefits will vary depending on hardware and software configurations. Software applications may not be compatible with all operating systems. Consult your PC manufacturer. For more information, visit http://www.intel.com/go/virtualization No computer system can provide absolute security under all conditions. Intel® Trusted Execution Technology (Intel® TXT) requires a computer system with Intel® Virtualization Technology, an Intel TXT-enabled processor, chipset, BIOS, Authenticated Code Modules and an Intel TXT-compatible measured launched environment (MLE). Intel TXT also requires the system to contain a TPM v1.s. For more information, visit http://www.intel.com/technology/security Intel, Intel Xeon, Intel Atom, Intel Xeon Phi, Intel Itanium, the Intel Itanium logo, the Intel Xeon Phi logo, the Intel Xeon logo and the Intel logo are trademarks or registered trademarks of Intel Corporation or its subsidiaries in the United States and other countries. Other names and brands may be claimed as the property of others. Copyright © 2013, Intel Corporation. All rights reserved.