Codemotion Milano 2014 - IBM Keynote - Giulio Santoli
-
Upload
gjuljo -
Category
Technology
-
view
98 -
download
1
Transcript of Codemotion Milano 2014 - IBM Keynote - Giulio Santoli
MILAN november 28th/29th, 2014
Giulio Santoli
Software Development in the as-a-Service era
IBM Bluemix™
MILAN november 28th/29th, 2014 - Speaker’s name
Networking Networking Networking Networking
Storage Storage Storage Storage
Servers Servers Servers Servers
Virtualization Virtualization Virtualization Virtualization
O/S O/S O/S O/S
Middleware Middleware Middleware Middleware
Runtime Runtime Runtime Runtime
Data Data Data Data
Applications Applications Applications Applications
Traditional
On-Premises
Infrastructure
as a Service
Platform
as a Service
Software
as a Service
Cli
en
t M
an
ag
es
Ve
nd
or M
an
ag
es in
Clo
ud
Ve
nd
or M
an
ag
es in
Clo
ud
Ve
nd
or M
an
ag
es in
Clo
ud
Cli
en
t M
an
ag
es
Cli
en
t M
an
ag
es
Customization; higher costs; slower time to value
Standardization; lower costs; faster time to value
Cloud Service Models
MILAN november 28th/29th, 2014 - Speaker’s name
INDIA
CHINATokyo
Hong Kong
Singapore
Melbourne
Seattle
San Jose
Los Angeles
Mexico City
Denver
Chicago
Dallas
Houston
TorontoMontreal
BRAZIL
New York City
Washington D.C.
Miami
London Frankfurt
Amsterdam
Paris
Sydney
Atlanta
DATA CENTER & NETWORK POINT OF PRESENCE
NETWORK POINT OF PRESENCE
40 data centers by end of 2014$1.2B new investment in 201415 new data centers in 2014
SoftLayer datacenters around the World
MILAN november 28th/29th, 2014 - Speaker’s name
Bluemix is an open-standard, cloud-based platform for building, managing, and running applications of all types (web, mobile, big data, new smart devices, and so on).
IBM’s PaaS solution: Bluemix
IBM DevOps for BluemixManage the software lifecycle, from planning to production
Internet of ThingsIntegrate your apps with the physical world
Watson ServicesLeverage the power of Cognitive Computing in your apps
MILAN november 28th/29th, 2014 - Speaker’s name
siz
e
speed
corp
us
flexib
ility
#users
siz
e
speed
corp
us
flexib
ility
#users
2880 cores
Single user system
2-3 sentences input
5+ days to retrain
Wikipedia, general corpus
Single Power 750, 240% faster
1000s of users
20 pages of input
< Day to ingest and train
Medical corpus
Watson Developer Cloud
Millions of users
Open to Bluemix users
Few hours
Broad industry corpus
s sp
corp
flexib
i
#users
IBM Watson
The Era of Congitive Computing
Elementary, my dear (Thomas J.) Watson“ ”
MILAN november 28th/29th, 2014 - Speaker’s name
Dedicated
Public On-Prem
An own dedicated environment that’s securely connected to both the public Bluemix and your own network.
Dedicated to you
Single tenant hardware that’s dedicated to you –allowing you to satisfy regulatory & legal compliance.
Feels like home Secure, fast, and unmetered access. Bluemix Dedicated sits on your network via VPN or direct network connectivity.
Focus on apps, not iron
Focus on building custom applications and services. IBM manages the platform and dedicated services.
Global- so you’re local
Get closer to your users. Bluemix dedicated can live in any SoftLayer data center around the world.
Pay smart Pay based on intuitive runtime/service metrics and adjust capacity monthly depending on needs.
We’re on call 24/7
Experts are always on call to solve problems. Premium support options are also available to further meet your requirements.
New: Bluemix Dedicated
MILAN november 28th/29th, 2014 - Speaker’s name
Join us in theNew Technology Revolution!
IBM Bluemix™ IBM Watson™
MILAN november 28th/29th, 2014 - Speaker’s name
© 2014 IBM Corporation
IBM Security Systems
9
www.ibm.com/security
© Copyright IBM Corporation 2014. All rights reserved. The information contained in these materials is provided for informational purposes
only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use
of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any
warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement
governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in
all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole
discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any
way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United
States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response
to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated
or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure
and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to
be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems,
products or services to be most effective. IBM DOES NOT WARRANT THAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THE
MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.
ibm.biz/bluemixeurope
© Copyright IBM Corporation 2014. All rights reserved. The information contained in these materials is provided for informational purposes
only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use
of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any
warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement
governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in
all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole
discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any
way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United
States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.
Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response
to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated
or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure
and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to
be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems,
products or services to be most effective. IBM DOES NOT WARRANT THAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THE
MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.