1. Trends In
Infrastructure
Services
Tell me and I’ll forget STKI Summit 2012
Show me and I may remember
Shahar Geiger Maor,
Involve me and I’ll understand VP & Senior Analyst
2. Presentation Visualization
MDM
Networking Security
ollaboration
2
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
3. End-To-End Security Project
Web Security Secure
WAF Browsing
Gateway
Application
Security
Information
DLP Laundering
Data
Security
Firewalls IPS NAC
Network
Security
Source: Taldor 3
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
4. TEAMS Project (A3)
Source: Malam-Team 4
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
5. The New Training Center-IDF
Source: Bynet 5
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
6. Presentation Visualization -Networking
MDM
Networking Security
ollaboration
6
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
7. STKI Index-2011 –Top Networking Queries
Data, 29%
Collaboration, 27%
Market Players, 22%
Trends, 9%
ADC, 4%
Mobile, 4%
Misc., 4%
7
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
8. IPv6
8
Source: http://i.imgur.com/l371J.jpg
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
9. Internet Protocol Version 6 (IPv6)
You are here
9
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
10. IPv6 Market Status
• Large orgs., cloud service providers, US government –All support
IPv6.
• IT: All major hardware and software providers support IPv6.
• Israel:
Sector IPv6 Awareness
Service Providers /
Telecommunications /
Global Organizations /
Other Organizations
10
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
11. Almost All Agree: IPv6 Is Critical
http://www.computerworld.com.au/slideshow/395230/most_enterprises_will_ipv6_by_2013_survey/ 11
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
12. IPv6 Recommendations
1. Awareness, awareness, awareness
2. Basic (internal IT) gap analysis
3. Executives’ awareness
4. Thorough gap analysis
(professional services) and
migration plan
5. POC (taste the flavor of IPv6).
6. Future system design and purchase
–IPv6 enabled
12
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
13. Presentation Visualization –Data Networking
MDM
Networking Security
ollaboration
13
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
14. Pressure!!!
14
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
15. Key Drivers For Network Transformation
• Server virtualization
• Storage Convergence
• East-west traffic patterns
• Growth of VMs and “server sprawl” management
Fabric (ˈfa-brik) n. An integrated data center network that supports servers, storage,
appliances and switches on a large scale. It provides a simple way to reach everything in
the data center using location-independent, Layer 2 addressing that creates a flat
network among components. It borrows features from routed network including
dynamically selecting the shortest and best route for connections, converges very quickly
when the network changes, uses all the links in the network and efficiently handles
broadcast and multicast traffic. It has high reliability with very fast convergence when a
failure occurs. It minimizes packet discards or is lossless and has extremely low end-to-
end latency. It automatically adjusts and applies the right configuration to whatever
devices connect to it. Also called Ethernet Fabric and Data Center Fabric. -Robin Layland
15
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
16. Changes In Technology Are Making
Server-to-server Traffic “The” Network Issue
SOA
Web
Application 2.0
SAAS
Client
Client – Server Architecture Service Oriented Architecture
25%
95% Server
Server Server
Server
A B C
Server
75%
Server
D DB
Source: Juniper Networks 16
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
17. Today’s Network Architectures Can’t Keep Pace
Source: HP Networking 17
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
18. Distributed Intelligence Details
Optimized Virtual Access Layer
• Today, access to the network lives in the virtual
hypervisor Physical
Virtual
• Consumes valuable host resources
• Virtual switch is offloaded to the physical Server
vNIC
vNIC
vNIC
vNIC
switch
• Eliminates the software switch; the advantages of a Virtual Switch
distributed virtual switch plus Distributed Intelligence
• Leverages Virtual Ethernet Port Aggregator (VEPA)
technology
NIC
• Virtual NICs are offloaded to the physical NIC
• Leverages Virtual Ethernet Bridging (VEB) technology
• Host resources are freed up for applications
• Gives 5-20% of host resources back to applications
• VMs have direct I/O with the network
Switch
• Network simplicity; common access across entire VCS;
network is managed in the network
Source: Brocade 18
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
19. Three-tier Architecture & Server-to-Server Traffic
Three-tier Legacy Network
N
Unnecessary layers
add hops and latency
Slows performance of
W 75% or more of traffic E Federated Apps &
VM mobility
Up to 50% of ports
interconnect switches;
S not servers or storage
Source: HP Networking 19
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
20. Two-tier Architectures Improve Performance
Simplified Two-tier Network
A-Series Core N
Switches with IRF IRF
IRF Removes a Networking
Layer to reduce CAPEX
A-Series ToR
Switches with IRF, IRF Virtual Connect
HP Virtual Connect IRF enables a single, low
W 75% or more of traffic E latency hop between up to
nine server racks
Virtual Connect provides
direct flight connections
S within an HP BladeSystem
Rack Servers Blade Servers
Source: HP Networking 20
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
21. The Fabric Architecture
Core Switches
All of the TOP of
Racks are a single
high capacity
Fabric!!!
Aggregation
switches
Firewall
Access
switches
Fabric
Switches
4
Pod 1 Pod 2
Source: Juniper
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
21
22. Intelligent L2 Domains
POD Evolution
Inter-POD Connectivity across L3
Shipping OTV Failure Boundary Preservation
Failure
IP Cloud
Boundary
Core
L3
L3 Aggregation
…
L2 vPC
… FabricPath… …
…
Access
L2
vPC
Servers
STP+ vPC/VSS FabricPath
STP NIC Teaming 16x ECMP
Enhancements Simplified loop- Low Latency / Lossless
Bridge free trees MAC Scaling
Assurance 2x Multi-pathing Operational Flexibility
Shipping Shipping Shipping
Source: Cisco
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
22
23. Wireless
23
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
24. Wireless Trends
• Welcome, IEEE 802.11ac…
• Wireless as a service
• Wireless IPS (Intrusion Prevention System)
• All vendors must have the following features:
1. Support for 802.11a/b/g/n
2. Controller-less WiFi network
3. A network management application
4. Standards-based security with 802.1X through WPA2
5. Provider can deliver network services (such as voice, video and
location).
24
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
25. Positioning Methodology
Israeli vendor rating – Market positioning is focused on the enterprise
sector (not SMB)
X axis: Market penetration (sales + installed base+ clients
perspective)
Y axis: localization, support, Local R&D center, number and
quality of SIs, etc.
Worldwide leaders are marked based on global positioning
Vendors to watch: Israeli market newcomers
STKI positioning represents the current Israeli market and not necessarily
what we recommend to our clients
25
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
26. xxx- Israeli Market Positioning 1Q12
Vendor B
Local Support
Player
Worldwide
Leader
Vendor A
Market Presence
26
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
27. Data Center Networking- Israeli Market Positioning 1Q12
Local Support Cisco
Juniper
Player
Alcatel-Lucent Worldwide
Leader
Avaya
HP
Brocade
IBM
Market Presence
27
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
28. Campus Networking- Israeli Market Positioning 1Q12
Cisco
Local Support
Alcatel-Lucent Player
Extreme HP Worldwide
Leader
Avaya
Juniper
Dell
Enterasys
Brocade
Market Presence
28
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
29. Wireless LAN- Israeli Market Positioning 1Q12
Cisco
Local Support
Player
Motorola
Worldwide
Leader
HP
Aruba
Alcatel-Lucent
Juniper
Aerohive
Ruckus
Enterasys
Market Presence
29
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
30. 30
Source: Bent Objects
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
31. Application Delivery Controllers
Mega trends:
•Cloud computing
•Virtualization – desktop, storage, network
•Mobility
• Security
•Datacenter consolidation
31
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
33. Key Drivers for Data Center Class WAN Optimization
• Disaster recovery
Protect more data across longer distances over converged networks
• Data center consolidation / cloud
Data and server placement not impacted by WAN performance
• Server and storage centralization
Users can be farther from resources
• Real-time collaboration
Improve quality of unified communications (voice/video)
• Virtualization
Multisite VDI and VM migration impacted by poor WAN quality
33
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
34. Application Delivery Controllers- Israeli Market Positioning 1Q12
Radware
Local Support
F5
Player
Citrix Worldwide
Leader
A10
Cisco
Barracuda
Market Presence
34
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
35. WAN Optimization- Israeli Market Positioning 1Q12
Local Support
Player
Citrix Riverbed
Worldwide
Leader
F5 Cisco
Silver Peak Radware
Juniper
Bluecoat
Market Presence
35
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
36. Presentation Visualization -Collaboration
MDM
Networking Security
ollaboration
36
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
38. Collaboration Basics
Source: Cisco
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
38
39. Email And Phone Are Still The Most Common Way To Interact With Customers
What are the top methods by which your employees communicate with your
customers, suppliers and partners?
Source: Information Week 39
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
40. Drivers Of Unified Communication Projects
1. Improve employee collaboration
2. Improve employee efficiency
3. Improve communications with customers
4. Create a more mobile workforce
5. Legacy PBX retirement
6. Upgrade technology to meet business needs/stay on
par with peers
7. Reduce operation expenditures
8. Reduce travel expenses
9. Decrease sales cycle times
40
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
41. Reasons for Not Using Unified Communications
1. Other projects have a higher priority
2. No definitive business value
3. Lack in-house expertise
4. UC technology is too expensive
5. Sizeable investment in current communications
platform
6. Auxiliary costs are too expensive (e.g. WAN bandwidth,
infrastructure upgrades)
7. Deployments are too complex
41
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
42. Cloud Based UCC –A Very Good Step Forward
1. B2B: connect to business
partners, customers, and
individuals outside
corporate network
2. Great for small and medium businesses
3. Help in reducing security issues (…but raise others)
4. Standardization
42
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
43. What’s Wrong?
We are still trying to automate
Multitude of vendors leads to
collaboration…needs to be
“non-immersive” experience
people centric
Insufficient focus on how
IT driven without alignment to
people collaborate today and
business priorities
what real pain points are
Not treating Collaboration as a Many of the benefits in UCC do
CEO Agenda Item not apply locally
43
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
44. How To Do It Right
Step 1: Identify Primary Business Imperatives
Time-to-
Market
Innovation Talent
Acquisition
and Retention
Customer
Cost Loyalty
Quality
Control
Sales
Effectiveness
Cultural Productivity
Evolution Business
Scaling and
Growth
44
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
45. How To Do It Right
Step 2: Associate Relevant Stakeholders and Processes:
Innovation
Accelerating the generation
and development of new
ideas into new or improved
products, services and
processes
45
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
46. How To Do It Right
Step 3: Analyze Existing Collaboration Patterns
46
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
47. How To Do It Right
Step 4: Execute Collaboration Programs:
online communities
blogs and microblogs
online shared workspaces
“click-to-connect”
collaboration spaces
comprehensive research repository
connecting experts
…Did we mention LinkedIn?
47
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
48. The ROI Problem
Elements of ROI Calculation
Capital Operational Alternative
TCO
expenditures expenditures cost
Feature
Job Employee
adoption Training UC benefit
satisfaction productivity
timeline
Increased sales
due to increased
collaboration
48
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
49. 65% Of Orgs Have Implemented UC Capabilities in 50% or Less of Total Users
Source: Information Week 49
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
50. Presentation Visualization -Customer Center
MDM
Networking Security
ollaboration
50
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
51. CRM Maturity Model
Business Value
Analytical Social CRM
Value investment CRM
Listening
Web Mobile
channel channel
platforms
projects projects IT oriented
Investment in order Project
to optimize costs Business
oriented
Operational Project
CRM/XRM
Commodity
investment
*Size of figure
= complexity/
Regulative cost of project
investment
Using Implementing Future usage
Market Maturity
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
52. Accelerating Customer Experience
CRM 1.0 CRM 2.0 CRM 3.0
Managing Managing influencers Engaging
Individual & ‘tribes’ & Influencing
customers
Customer
A Customer Customer
B C
The focus shift:
Transactions Interactions Experience
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
52
53. What is Social CRM
• Social CRM can be used for 2 purposes:
• Listening and Learning: Using the power of personal networks to
gain intelligence on customers, their habits, interests
• Brand auditing
• Awareness of campaigns success/failure
• Crowdsourcing (new products, design ideas)
• Interacting and Engaging: New channel for customer interactions
(sales, service, marketing)
• Social CRM projects will be short / simple. Companies will grow
into it (by using social CRM modules within CRM apps) or SaaS-
based products. The hardest part will be the “people” and
“processes” part, change management.
53
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
54. Power To The People – Is It Too Much Power???
• Social media criticism makes Gap dumps new
logo forces it to revert back to old logo
54
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
55. Social Media Projects Maturity
(Source: Altimeter Group) 55
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
56. Customer Care Trends
There’s Increasingly
no place unpredictable
to hide environmental
online events
The age of self
From
help, paranoia
‘push’ to
and advice
‘pull’
seeking
The rise The agile and
of the asset-less
any x organization
customer (…cloud)
56
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
57. Approaching (Interacting with) Customers
(…Too often, digital marketing efforts target only younger customer segments)
Source: McKinsey Global Survey 57
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
58. Key Benefits That Can Influence Consumers To Use a New Form of
Payment
Source: Javelin Strategy & Research 58
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
59. Heavy Duty Phone Systems For Trading Rooms
Directional and time indication
Call History
Modularity of Components Call Directory
Backpack
Extensibility Deskshare
Source: IPC
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
59
60. Unified Communications - Israeli Market Positioning 1Q12
Cisco
Local Support
Player
Avaya Microsoft
Worldwide
Leader
Digium
IBM Alcatel-Lucent
Siemens EC
Interactive Intelligence
Market Presence
60
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
61. Customer Center Infrastructure - Israeli Market Positioning 1Q12
Local Support
Player
Cisco
Avaya Worldwide
Leader
Aspect
Alcatel-Lucent
Cosmocom
Interactive Intelligence
Siemens EC
Market Presence
61
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
62. IP Telephony - Israeli Market Positioning 1Q12
Local Support Cisco
Player
Alcatel-Lucent
Tadiran Telecom Avaya Worldwide
Leader
Digium
Microsoft
Siemens EC
Market Presence
62
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
63. Presentation Visualization -Video
MDM
Networking Security
ollaboration
63
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
64. Global Mobile Data Traffic
100%
90%
80%
70%
VoIP
60%
Gaming
50%
File Sharing
40%
M2M
30%
Data
20%
Video
10%
0%
2011 2012 2013 2014 2015
2016
Source: Cisco VNI 2012 64
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
65. Enterprise Video Usage
Source: Business Video
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
65
66. Israeli Market Status
• Videoconferencing –Mature collaboration tool
• E-learning –Common in global orgs. Good as an enrichment
for existing tools
• Video streaming and CDN –Specific for content creators
(…Still waiting for enterprise YouTube)
• Digital signage –For special purposes
• Video Management Systems (storage analytics) –
Physicalhomeland security
66
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
67. AudioVideo Conferencing
Immersive
-To work within projection-
based Virtual Reality Systems CXOs
(Immersive)
Room
-The most common
Mid
tool for Video Management
Teleconferencing Conferencing
(Room)
Endpoint Employees
–”Skype like” (Endpoint)
67
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
68. Video Collaboration in Practice
Video
Conference
CDN
http://www.clalit.co.il/HE-IL/Family/parents/video+rofe+online.htm 68
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
69. Video e-Learning –Next Generation Customer Care Routing
Choose your next
choice on-the-fly
Video evolves according to choices made
http://blogs.wsj.com/speakeasy/2010/10/25/andy-grammers-keep-your-head-up-applies-choose-your-
own-adventure-logic-to-music-videos/ 69
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
70. Social Video + CDN (Content Delivery Network)
Powered by
Matrix CDN
Powered by
NAVIGAYA
Source: http://www.shmone.co.il/ 70
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
71. Digital Signage
Live
streaming
Batch
streaming
On-line
Integration
Integration
to backoffice
Source: http://www.diskin.com/he/content/index_b_06.html 71
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
72. Managing Bandwidth For Video
1. Buy more
bandwidth
2. Implement QOS
3. Use adaptive
technologies
4. Call Admission
Control (CAC)
72
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
73. Video Optimization -Medianet
Deliver the Network Optimized for Video Anytime, Anywhere, Any Device
Video, Voice and Data Applications
Media Services Interface (end-point and Proxy) APIs
Plug & Media
Play Multicast
NetFlow Monitoring
RSVP
NBAR
Management
IPSLA
Security
SAF
Media PfR QoS
Media
Services Awareness
Proxy
Media
Optimi-
zation
Source: Cisco
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
74. The Past, Present, and Future of Enterprise Outward Video
Past Present Future
Creation One day of shooting with a video production to Empowerment of the
(cost?) professional crew. the masses. individual
(100K$) (100$) (1$)
Management VHS tapes and DVDs Dozens of proprietary Big data, access
required physical space… and public Online management,
Some early forms of Video Platforms. multiple “instances”
searching programs Search still is a of each video
challenge
Delivery Television; Different format, Videos will still need
Mailing out tapes resolution, and to be viewed across
bandwidth all devices.
requirements
Tracking Broadcasts and mails had Views, what devices how effective a video
significant tracking are viewing the video, is by sales person, by
challenges. where in the world customer, by
and more. campaign, etc.
Source: http://www.reelseo.com/enterprise-video/ 74
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
75. Video Recommendation
75
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
76. Tele-Conferencing- Israeli Market Positioning 1Q12
Cisco
Polycom
Local Support
Adobe Logitech
(LifeZise) Player
Radvision
Worldwide
Avaya Leader
Microsoft
Emblaze
Vidyo
Citrix AT&T
Google Alcatel-Lucent
ooVoo Skype
Market Presence
76
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
77. What should be asked before going to the board with a capital request?
1. How much impact do our facilities have on the availability of
important business applications?
2. How much more capacity could we get from existing facilities?
3. What does future demand for data center capacity look like
and how can virtualization affect it?
4. How can we improve capacity allocation by tier?
5. How can we incorporate modular designs into our data center
footprint?
6. What is the complete list of key design decisions and their
financial impact?
77
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
78. virtualized platforms: A
way to limit data center capacity requirements
Source: McKinsey & Company 78
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
79. Reducing Capital Costs by Moving Into Lower-Tier Facilities
Source: McKinsey & Company 79
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
80. Israeli Data Center Statistics
350m2 • Average room size (brutto)
67% • Average size used for IT (netto)
• Host all servers? (Prod.,Test, Dev.
Yes (75%) Backup etc. )
1.4m2 • Average DC room size per IT staff
0.18m2 • Average DC room size per employee
Source: STKI 80
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
81. Data Center Outsourcing Benchmark
A research and service providers’
benchmark in the Israeli market.
By: Pini Cohen, Shahar Geiger Maor
Expected publication: May 2012
Stay posted for more news…
81
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
82. Output Management
82
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
83. Output Trends
Digital Mailing
Printing independence
Interactive forms and multimedia
Personalization
12 מרץ Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
83
84. Tablets Replace Paper
• Businesses and governments are trading paper for tablets, saving
money and promoting efficiency
• In the U.S., airlines are now allowed to rely on tablets instead of
onboard paper manuals, checklists and charts
• Amsterdam city council members now get iPads, retrieving
documents through a custom app that other Dutch government
agencies are set to adopt
84
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
85. Next Generation Outputs
Interactive Voice:
MP3
Accessible
Video
Mobile friendly
12 מרץ Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
85
86. Banks ‘Push‘ vs. Customers ‘Pull‘ Model
Pull
Push •Ownership of services & value
•Control electronic services to network shifts to customer
employees and customers. •P2P computing & networks
•Choose whom to allow into develop —secure, managed,
proprietary networks. controlled, powerful
•Own the value networks. •Organizations forced to deliver
•Set rules, pace and conditions for into consumer computing domains
interaction with them. •Architecture extends to consumer
•Pre-defined, prepackaged services. computing environment —
•Establish the parameters for you ―customer centric gets defined
to modify or access your •―Delivery models‖ subsumed into
information or services. ―consumption models‖ -ambient
findability
•Building blocks —contentaware,
data, Web Services, process
models, orchestration services.
86
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
87. Output Management-Israeli Market Positioning 1Q12
Consist
Local Support
Adobe
Autofont Player
Worldwide
Leader
ISIS-Papyrus Aman/Beeri
HP
Market Presence
87
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
88. Printers-Israeli Market Positioning 1Q12
Samsung
HP
Lexmark
Local Support
Brother Player
Canon Worldwide
Leader
Epson
Ricoh Xerox
Market Presence
88
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
89. Market Data
http://xkcd.com/657/large/ 89
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
90. Networking Staffing
25’th percentile 50’th percentile 75’th percentile Average
“Active” ports as of
total ports (%) 58% 63% 78% 66%
Total ports per 1
networking staff 917 1200 2000 2613
member (voice+data)
Ports per 1 employee
1.33 1.93 2.82 2.12
Employees per
1 Networking staff 561 775 1125 1119
member
Data networking : voice
networking staff ratio 1.13:1 1.5:1 2:1 1.7:1
Source: STKI 90
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
91. Networking Budget ~ 10% of IT OpEx
Source: The Corporate Executive Board Company 91
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
92. Constant Staffing Mix Within IT
Source: The Corporate Executive Board Company
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
92
94. Presentation Visualization
MDM
Networking Security
ollaboration
94
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
95. Desktop-PCs are getting old…Say Hello to the Post-PC Era
• No platform, form factor or technology will dominate.
• BYOD will remain the norm.
• Component prices continue downward trend.
• Off-Desktop devices consume more of the digital
experience
• Employees will use many devices, syncing data between
them via the cloud.
95
Source: Bent Objects
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
96. 2012 game changers :
• Consumerization of IT
• Bring your own Device (BYOD)
• Changing Client Architectures
Tablet computers, smartphones,
4G, social media, gaming,
desktop virtualization,
and other technology innovations
are bringing possibilities and
challenges to IT and the workplace
like never before
96
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
97. Experience Economy > Age of the Customer
• From 1900 to 1960, Age of Manufacturing , if you owned a factory,
you owned the market.
• From 1960 to 2000, Age of Distribution, if you owned the
distribution channels, you owned the market.
• From 2000 to 2011, Age of Information, if you owned the
information, you owned the market.
• From 2011, Age of the Customer, if you engage the customer, you
own the market
97
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
98. Why Mobile?
Communication Telecom: fire, Mobile Phone
Telephone
–A basic need letters… Device
• Population is spreading all • Starting to close the gap. • Large distances, real-time. • Always with me, cost
over the world. Closer to the end-user effective, muti-
purpose device, carrier-
• Distance is becoming a • Short distances, no real- • Static side infrastructure,
communication issue time Anywhere-to-anywhere
connection and more…
98
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
99. Mobile Outsourcing
Social
Trade
Fun Tools
Pics
Gesture
Touch
CalendarMail
Location
Ⅱ
Δ
Voice Video
Content Access
Search
99
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
100. Using Mobile Apps more then 10 times a day
100
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
101. Using Mobile App to Make a Purchase/ for Client Service
101
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
102. Decision Making in the Digital World
Seeking Intelligence,
Not Content
- Real time
60% of purchase decisions
being made before the
consumer stepped into the
store!!!
102
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
103. Many clients are asking about how to:
Set a solid
Digital Customer Experience
MDM
craft mobile policies
how to develop
manage the devices
mobile custom apps?
Secure their
select mobile devices mobile content
103
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
104. Answers are right here
Who is IT or Business?
Digital Customer Experience IT higher involvement
Owner in enterprise
how to develop
mobile custom apps?
Native or Hybrid Apps
select mobile devices People wants:
Enterprises wants:
104
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
105. What Do People Want ?
105
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
106. Three OSs, Three Ecosystems?
Source: IDC 106
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
107. Internet vs. Mobile Data Traffic
Global Internet Traffic Growth (Fixed)
300%
200%
100%
0%
1997 1998 1999 2000 2001 2002
Global Mobile Data Traffic Growth
200%
150%
100%
50%
0%
2009 2010 2011 2012 2013 2014
(estimate)
Source: Cisco VNI 2012 107
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
108. Mobile Statistics
– The number of active mobile broadband
subscriptions worldwide in 2011.
–The estimated number of mobile subscriptions
worldwide in 2011.
–Percentage of handsets shipped globally in 2011
that included a web browser.
– Apple iPad’s share of global tablet web traffic
in December.
Source: http://royal.pingdom.com/2012/01/17/internet-2011-in-numbers/ 108
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
109. Different Devices, Different Purpose
Work
Creation
Change
Flow
Consumption
Experience
109
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
110. List of Tablet Use Cases
How do you useplan to use your tablet? (Please select all that apply)
Surfing the web
Writing or reading mail
Watching video
listening to music
social media sites
Gaming
0% 10% 20% 30% 40% 50% 60% 70% 80% 90%
Source: Yankee Group 110
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic
111. Bring Your Own Device
Tablets occupy a middle
ground where
consumption and creation • Easier and more supportable
of data has a wide range. • More flexible device capability
BYOD needs to be a Virtualization
consideration once
interest enters this zone.
BYOD Full
Data Consumption and Creation Continuum
Light BYOC
There are two potential
paths that can be followed
at this point.
Integration
• Full network
- Light data consumption • Harder to support (e.g. local - Heavy data consumption
- Minimal data creation rather than centralized apps) - Local data creation
• Limited by device capabilities
Final steps:
- Full BYOD policy created by
Past this line, infrastructure, all business groups.
security, and operations - TCO calculation in
pillars must be considered in conjunction with Finance.
order to support advanced
data creation.
Source: Info-Tech Research Group 111
Shahar Geiger Maor’s work Copyright 2012 @STKI Do not remove source or attribution from any graphic or portion of graphic