Slides: Data Value and IT Architectures

12
1 EMC CONFIDENTIAL—INTERNAL USE ONLY EMC CONFIDENTIAL—INTERNAL USE ONLY DATA VALUE AND IT ARCHITECTURES STEVE TODD, EMC FELLOW, VP OF STRATEGY AND INNOVATION MAY 26, 2016

Transcript of Slides: Data Value and IT Architectures

Page 1: Slides: Data Value and IT Architectures

1EMC CONFIDENTIAL—INTERNAL USE ONLYEMC CONFIDENTIAL—INTERNAL USE ONLY

DATA VALUE AND IT ARCHITECTURESSTEVE TODD, EMC FELLOW, VP OF STRATEGY AND INNOVATIONMAY 26, 2016

Page 2: Slides: Data Value and IT Architectures

2EMC CONFIDENTIAL—INTERNAL USE ONLYEMC CONFIDENTIAL—INTERNAL USE ONLY

THOUGHT LEADERSHIPKEYNOTES:

ARTICLES (30+):

Page 3: Slides: Data Value and IT Architectures

3EMC CONFIDENTIAL—INTERNAL USE ONLYEMC CONFIDENTIAL—INTERNAL USE ONLY

VALUATION APPROACHESApplication

Agility

Content Workflow

ContentProcessing

Data Protection Ecosystem

ContentIngest

Page 4: Slides: Data Value and IT Architectures

4EMC CONFIDENTIAL—INTERNAL USE ONLYEMC CONFIDENTIAL—INTERNAL USE ONLY

CONTENT PROCESSING

NLP, Translation, Stemming, Tokenization

Domain A Domain B Domain C Domain D

Valuation Algorithms

Page 5: Slides: Data Value and IT Architectures

5EMC CONFIDENTIAL—INTERNAL USE ONLYEMC CONFIDENTIAL—INTERNAL USE ONLY

DATA PROTECTION ECOSYSTEM

Backup Schedule/Catalog

Backup Data

Valuation Algorithms

Mappings Between Primary/Protection

System

P1 B1

P2 B2

Schedule Num Copies

(x)

Catalog V1

V2

V3

Page 6: Slides: Data Value and IT Architectures

6EMC CONFIDENTIAL—INTERNAL USE ONLYEMC CONFIDENTIAL—INTERNAL USE ONLY

CONTENT INGESTSpout

1Spout

2

Bolt 2

Bolt 1

Bolt 3

Bolt 4

Page 7: Slides: Data Value and IT Architectures

7EMC CONFIDENTIAL—INTERNAL USE ONLYEMC CONFIDENTIAL—INTERNAL USE ONLY

APPLICATION AGILITY

APPS

DATA

SPEED

ANALYTICS

Zero Downtime Upgrade to Production

Commit Code

Change

1

Automate Build & Test

(Unit Test, Static Code Analysis)

2

Store Binaries &

Build Artifacts

3

Automated Integration

Testing

4

Acceptance,Performance

& Load

5 6

Page 8: Slides: Data Value and IT Architectures

8EMC CONFIDENTIAL—INTERNAL USE ONLYEMC CONFIDENTIAL—INTERNAL USE ONLY

CONTENT WORKFLOW

Customer Reference: EMC IT prototype [add link]

End User End User End User

Driver

Source

Driver DriverDriver

Driver DriverDriver

Source Source Source Source Source

Driver DriverDriver

Driver Driver

Driver Driver

Page 9: Slides: Data Value and IT Architectures

9EMC CONFIDENTIAL—INTERNAL USE ONLYEMC CONFIDENTIAL—INTERNAL USE ONLY

DATA VALUE TREE CATALOGUEANALYTICSANDBOX

VALUE TREE CATALOG

Page 10: Slides: Data Value and IT Architectures

10EMC CONFIDENTIAL—INTERNAL USE ONLYEMC CONFIDENTIAL—INTERNAL USE ONLY

DATA LAKE DATA VALUE LISTING

DATA SET VALUEA $15KB $47KC $300KD 0E $14M

VALUE TREE CATALOG

VALUE TREE CATALOG

Page 11: Slides: Data Value and IT Architectures

11EMC CONFIDENTIAL—INTERNAL USE ONLYEMC CONFIDENTIAL—INTERNAL USE ONLY

• Async replication is never perfect– Inherent data lag between production and replica – This is unprotected data; will be lost in disaster– Data loss drives monetary loss– We aim to minimize monetary loss in a case of disaster

• Optimize replication resources for minimize data loss’s costs

Minimize Monetary Loss in Disaster

Peleg Yiftachel, Udi Shemer, Omer Sagi3 165 327 489 651 813 975 113712991461162317851947210922712433259527572919

Assume Data A is X times more important than App B

Non optimizedBusiness optimized (*2)Business optimized (*4)Business optimized (*10)

Time (secs)Busin

ess d

am-

age

in d

isast

er

Page 12: Slides: Data Value and IT Architectures