Slides: Data Value and IT Architectures
-
Upload
john-furrier -
Category
Technology
-
view
474 -
download
0
Transcript of Slides: Data Value and IT Architectures
1EMC CONFIDENTIAL—INTERNAL USE ONLYEMC CONFIDENTIAL—INTERNAL USE ONLY
DATA VALUE AND IT ARCHITECTURESSTEVE TODD, EMC FELLOW, VP OF STRATEGY AND INNOVATIONMAY 26, 2016
2EMC CONFIDENTIAL—INTERNAL USE ONLYEMC CONFIDENTIAL—INTERNAL USE ONLY
THOUGHT LEADERSHIPKEYNOTES:
ARTICLES (30+):
3EMC CONFIDENTIAL—INTERNAL USE ONLYEMC CONFIDENTIAL—INTERNAL USE ONLY
VALUATION APPROACHESApplication
Agility
Content Workflow
ContentProcessing
Data Protection Ecosystem
ContentIngest
4EMC CONFIDENTIAL—INTERNAL USE ONLYEMC CONFIDENTIAL—INTERNAL USE ONLY
CONTENT PROCESSING
NLP, Translation, Stemming, Tokenization
Domain A Domain B Domain C Domain D
Valuation Algorithms
5EMC CONFIDENTIAL—INTERNAL USE ONLYEMC CONFIDENTIAL—INTERNAL USE ONLY
DATA PROTECTION ECOSYSTEM
Backup Schedule/Catalog
Backup Data
Valuation Algorithms
Mappings Between Primary/Protection
System
P1 B1
P2 B2
Schedule Num Copies
(x)
Catalog V1
V2
V3
6EMC CONFIDENTIAL—INTERNAL USE ONLYEMC CONFIDENTIAL—INTERNAL USE ONLY
CONTENT INGESTSpout
1Spout
2
Bolt 2
Bolt 1
Bolt 3
Bolt 4
7EMC CONFIDENTIAL—INTERNAL USE ONLYEMC CONFIDENTIAL—INTERNAL USE ONLY
APPLICATION AGILITY
APPS
DATA
SPEED
ANALYTICS
Zero Downtime Upgrade to Production
Commit Code
Change
1
Automate Build & Test
(Unit Test, Static Code Analysis)
2
Store Binaries &
Build Artifacts
3
Automated Integration
Testing
4
Acceptance,Performance
& Load
5 6
8EMC CONFIDENTIAL—INTERNAL USE ONLYEMC CONFIDENTIAL—INTERNAL USE ONLY
CONTENT WORKFLOW
Customer Reference: EMC IT prototype [add link]
End User End User End User
Driver
Source
Driver DriverDriver
Driver DriverDriver
Source Source Source Source Source
Driver DriverDriver
Driver Driver
Driver Driver
9EMC CONFIDENTIAL—INTERNAL USE ONLYEMC CONFIDENTIAL—INTERNAL USE ONLY
DATA VALUE TREE CATALOGUEANALYTICSANDBOX
VALUE TREE CATALOG
10EMC CONFIDENTIAL—INTERNAL USE ONLYEMC CONFIDENTIAL—INTERNAL USE ONLY
DATA LAKE DATA VALUE LISTING
DATA SET VALUEA $15KB $47KC $300KD 0E $14M
VALUE TREE CATALOG
VALUE TREE CATALOG
11EMC CONFIDENTIAL—INTERNAL USE ONLYEMC CONFIDENTIAL—INTERNAL USE ONLY
• Async replication is never perfect– Inherent data lag between production and replica – This is unprotected data; will be lost in disaster– Data loss drives monetary loss– We aim to minimize monetary loss in a case of disaster
• Optimize replication resources for minimize data loss’s costs
Minimize Monetary Loss in Disaster
Peleg Yiftachel, Udi Shemer, Omer Sagi3 165 327 489 651 813 975 113712991461162317851947210922712433259527572919
Assume Data A is X times more important than App B
Non optimizedBusiness optimized (*2)Business optimized (*4)Business optimized (*10)
Time (secs)Busin
ess d
am-
age
in d
isast
er