+ All Categories
Home > Technology > Codemotion Milano 2014 - IBM Keynote - Giulio Santoli

Codemotion Milano 2014 - IBM Keynote - Giulio Santoli

Date post: 13-Jul-2015
Category:
Upload: gjuljo
View: 98 times
Download: 1 times
Share this document with a friend
Popular Tags:
9
MILAN november 28 th /29 th , 2014 [email protected] Giulio Santoli Software Development in the as-a-Service era IBM Bluemix
Transcript

MILAN november 28th/29th, 2014

[email protected]

Giulio Santoli

Software Development in the as-a-Service era

IBM Bluemix™

MILAN november 28th/29th, 2014 - Speaker’s name

A new economic paradigm…

MILAN november 28th/29th, 2014 - Speaker’s name

Networking Networking Networking Networking

Storage Storage Storage Storage

Servers Servers Servers Servers

Virtualization Virtualization Virtualization Virtualization

O/S O/S O/S O/S

Middleware Middleware Middleware Middleware

Runtime Runtime Runtime Runtime

Data Data Data Data

Applications Applications Applications Applications

Traditional

On-Premises

Infrastructure

as a Service

Platform

as a Service

Software

as a Service

Cli

en

t M

an

ag

es

Ve

nd

or M

an

ag

es in

Clo

ud

Ve

nd

or M

an

ag

es in

Clo

ud

Ve

nd

or M

an

ag

es in

Clo

ud

Cli

en

t M

an

ag

es

Cli

en

t M

an

ag

es

Customization; higher costs; slower time to value

Standardization; lower costs; faster time to value

Cloud Service Models

MILAN november 28th/29th, 2014 - Speaker’s name

INDIA

CHINATokyo

Hong Kong

Singapore

Melbourne

Seattle

San Jose

Los Angeles

Mexico City

Denver

Chicago

Dallas

Houston

TorontoMontreal

BRAZIL

New York City

Washington D.C.

Miami

London Frankfurt

Amsterdam

Paris

Sydney

Atlanta

DATA CENTER & NETWORK POINT OF PRESENCE

NETWORK POINT OF PRESENCE

40 data centers by end of 2014$1.2B new investment in 201415 new data centers in 2014

SoftLayer datacenters around the World

MILAN november 28th/29th, 2014 - Speaker’s name

Bluemix is an open-standard, cloud-based platform for building, managing, and running applications of all types (web, mobile, big data, new smart devices, and so on).

IBM’s PaaS solution: Bluemix

IBM DevOps for BluemixManage the software lifecycle, from planning to production

Internet of ThingsIntegrate your apps with the physical world

Watson ServicesLeverage the power of Cognitive Computing in your apps

MILAN november 28th/29th, 2014 - Speaker’s name

siz

e

speed

corp

us

flexib

ility

#users

siz

e

speed

corp

us

flexib

ility

#users

2880 cores

Single user system

2-3 sentences input

5+ days to retrain

Wikipedia, general corpus

Single Power 750, 240% faster

1000s of users

20 pages of input

< Day to ingest and train

Medical corpus

Watson Developer Cloud

Millions of users

Open to Bluemix users

Few hours

Broad industry corpus

s sp

corp

flexib

i

#users

IBM Watson

The Era of Congitive Computing

Elementary, my dear (Thomas J.) Watson“ ”

MILAN november 28th/29th, 2014 - Speaker’s name

Dedicated

Public On-Prem

An own dedicated environment that’s securely connected to both the public Bluemix and your own network.

Dedicated to you

Single tenant hardware that’s dedicated to you –allowing you to satisfy regulatory & legal compliance.

Feels like home Secure, fast, and unmetered access. Bluemix Dedicated sits on your network via VPN or direct network connectivity.

Focus on apps, not iron

Focus on building custom applications and services. IBM manages the platform and dedicated services.

Global- so you’re local

Get closer to your users. Bluemix dedicated can live in any SoftLayer data center around the world.

Pay smart Pay based on intuitive runtime/service metrics and adjust capacity monthly depending on needs.

We’re on call 24/7

Experts are always on call to solve problems. Premium support options are also available to further meet your requirements.

New: Bluemix Dedicated

MILAN november 28th/29th, 2014 - Speaker’s name

Join us in theNew Technology Revolution!

IBM Bluemix™ IBM Watson™

MILAN november 28th/29th, 2014 - Speaker’s name

© 2014 IBM Corporation

IBM Security Systems

9

www.ibm.com/security

© Copyright IBM Corporation 2014. All rights reserved. The information contained in these materials is provided for informational purposes

only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use

of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any

warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement

governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in

all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole

discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any

way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United

States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.

Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response

to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated

or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure

and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to

be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems,

products or services to be most effective. IBM DOES NOT WARRANT THAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THE

MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.

ibm.biz/bluemixeurope

© Copyright IBM Corporation 2014. All rights reserved. The information contained in these materials is provided for informational purposes

only, and is provided AS IS without warranty of any kind, express or implied. IBM shall not be responsible for any damages arising out of the use

of, or otherwise related to, these materials. Nothing contained in these materials is intended to, nor shall have the effect of, creating any

warranties or representations from IBM or its suppliers or licensors, or altering the terms and conditions of the applicable license agreement

governing the use of IBM software. References in these materials to IBM products, programs, or services do not imply that they will be available in

all countries in which IBM operates. Product release dates and/or capabilities referenced in these materials may change at any time at IBM’s sole

discretion based on market opportunities or other factors, and are not intended to be a commitment to future product or feature availability in any

way. IBM, the IBM logo, and other IBM products and services are trademarks of the International Business Machines Corporation, in the United

States, other countries or both. Other company, product, or service names may be trademarks or service marks of others.

Statement of Good Security Practices: IT system security involves protecting systems and information through prevention, detection and response

to improper access from within and outside your enterprise. Improper access can result in information being altered, destroyed or misappropriated

or can result in damage to or misuse of your systems, including to attack others. No IT system or product should be considered completely secure

and no single product or security measure can be completely effective in preventing improper access. IBM systems and products are designed to

be part of a comprehensive security approach, which will necessarily involve additional operational procedures, and may require other systems,

products or services to be most effective. IBM DOES NOT WARRANT THAT SYSTEMS AND PRODUCTS ARE IMMUNE FROM THE

MALICIOUS OR ILLEGAL CONDUCT OF ANY PARTY.


Recommended