Upload
david-hill
View
271
Download
1
Embed Size (px)
Citation preview
Mac DevineVP and CTO for Innovation Services, IBM Distinguished EngineerIBM Cloud Division
[email protected]@mac_devine
Surthrival Guide to solving the Perfect Digital Storm
There is a Perfect (Digital) Storm brewing…
2
Surthrival Approach
3
The Golden Circle
Distributed Digital Enterprise Advanced predictive analytics
Real-time sensors
Explosion of mobile devices Enterprise Social MediaInfrastructure optimization(cloud computing)
Cyber security
The Perfect Storm: The Problem
5
Developer BusinessNumber of
DevicesAmount of
DataGeographicalDistribution
• Billions of Devices
• Data Onslaught
• Borderless Networks
• Security• Privacy• Data
Insights
Recipe for Disaster
Internet of Things Reference Model
Levels
Application(Reporting, Analytics, Control)
Data Abstraction(Aggregation & Access)
Data Accumulation(Storage)
Edge Computing(Data Element Analysis & Transformation)
Connectivity(Communication & Processing Units)
Physical Devices & Controllers(The “Things” in IoT)
Collaboration & Processes(Involving People & Business Processes)
1
2
3
4
5
6
7
Data at Rest
Data in Motion
Sensors, Devices, Machines,Intelligent Edge Nodes of all types
Center
Edge
The model is based on
“Information Flow”
IT
OT
The model is based on“Integrated Security &
Management”
Solving the “The Perfect Storm”
7
Data Acquisition Flexibility & Efficiency
Security Clear End to End Security Model
Scalability Automated Elastic Scaling on demand
Data & Analytics Real-time Insights, Actionable Intelligence
Eco-System Digital Platform, APIs for exposure
Actionable Insights = Always right decision
cs
Tier 1: Devices / Sensors (Things)
Tier 2: Protocol Gateways
rules
aggregation
filteringsampli
ng analytics zone
model dev. , training and
operationalization
real-time CEP
real-time predictive analytics
real-time entity matching
real-time event management
Tier 3: Operational Gateways
Analytics pushdown
rulesInternet
Tier4: Data & Analytics Zone
Context pushdown
But is th
is the rig
ht Archite
cture?
Business Insights
Autonomous Smarter
Processing
Edge Intelligence
OT/LOB
FACTS - F(ast), A(ccurate), C(omplete), T(rusted), S(calable)
Enterprise
Core IT
Project MTNDecentralized Autonomous Edge Computing
device
mobile
office
datacenter
car
cloud
• Blockchain• Contracts• Exchange• Markets• Directory
• Whisper• Async Messaging
• Bittorrent (->Swarm, ->IPFS)• Microservice Deployment• Firmware Deployment• Large Files
BrowserBrowser
API
• What is the Edge? Everything is the Edge (e.g. cloud, devices, homes, your datacenter, etc…)• MTN is the decentralized P2P Fabric that connects all the Edge endpoints together.• MTN only uses P2P Technologies because it is Decentralized.• Edge/endpoint behavior (connecting to other endpoints, and/or accept connections from other
endpoints, services provided/used, cost, security, duration, etc…) is driven by local policy.• There is no center. Edge/endpoint access to Exchanges, Directory Services, Discovery,
Markets, etc… is done locally.• Severable, fault tollerant, audiable, multiparity, encrypted, smart contract driven.• Cryptocurrency, virtual currency, hard currency, trade, cold hard cash supported.
Colonus
• Governance• Policy Enforcement• Automation• Autonomous (policy driven)• Control Plane• Push all compute to data, any
data, anywhere.• Every endpoint large or small a
cloud with static and/or dynamic services.
MTN = Decentralized Micro-services Platform
cs
Tier 1: Devices / Sensors (Things)
Tier 2: Protocol Gateways
rules
aggregation
filteringsampli
ng analytics zone
model dev. , training and
operationalization
real-time CEP
real-time predictive analytics
real-time entity matching
real-time event management
Tier 3: Operational Gateways
Analytics pushdown
rulesCloud
Tier4: Data & Analytics Zone
Context pushdown
Secure Connectors
M2M communication
Empoweredanalyst
Heroanalysts
The future of intelligence
Skills and experience spotting patterns in data and assessing threats
Using Watson to expand data sources and filter out the
noise, analysts can focus on their high value skills
Valu
e
The transformation of a Security Agency is about maximizing the performance of the analyst
A collaboration of human & machine to uncover
insights and counteract threats in the most timely
manner
Watson Can Be Transformational in Security
12
IBM investing in Cloud, IoT, API, Security & Big Data Analytics
Acquisitions
+$7B on 15 cloud acquisitions, including SoftLayer (2005 – ’13)
$2B on SoftLayer acquisition in 2013
Acquisitions have continued through 2015
Capacity Expansion
$1.2B Data Center Expansion40 cloud data centers15 countries 5 continents
$1B investment in BlueMix, IBM’s PaaS, running on SoftLayer
Bluemix
70+ Bluemix services, runtimes, boilerplates
40 Locations , ~500 IBM and Third-Party cloud services on the IBM Cloud marketplace
Partnerships
14
The Weather Company (now part of IBM)
Steer
Dev/Test
Deploy
OperateDevOps
Continuous Feedback
Design Thinking
Containers
Extreme Agile
Cognitive Intelligence
IoT
AnalyticsMicroservices
Tooling
Runtimes
Instant access to APIs, micro services and infrastructure needed to launch ideas
Composeable Digital Platform = Bluemix
Mobile
DB choices
API Management
Security
Alchemy
APIHarmony Watson
API Catalog
16
Excited? – Now get on it!!!
Join our BetaGo here for more information on
Getting Started (Initial Setup & Applications)
http://tremor.hovitos.engineering/Based on open source and open sourcing shortly.