Upload
noel
View
25
Download
0
Embed Size (px)
DESCRIPTION
SEWP IT Trends. Our Vision / Mission for SEWP. “ To be the premier customer-focused contract vehicle for federal government purchases of IT products”. “ To serve up fresh technology for federal agencies”. Hardware. Software. Maintenance. IT Solutions. SEWP by the numbers. - PowerPoint PPT Presentation
Citation preview
1
SEWP IT Trends
2
Our Vision / Mission for SEWP
“To be the premier customer-focused contract vehicle for federal government purchases of IT products”
“To serve up fresh technologyfor federal agencies”
Hardware
Software
IT Solutions
Maintenance
3
SEWP by the numbers
1,000,000+ Line Items
550,000+ Unique products
16 Competed Prime contractors; 8 small businesses
3 Non-competed 8(a) set-aside contracts
2,000+ Manufacturers
24 Hours to add new products
4
Focus for Today
Survey of current SEWP Contract Holders plus meetings with 45+ industry leaders point towards key areas of emphasis in IT industry
Focus on a few trends in • Computer technology
• Storage / Archiving
• Security
Example of SEWP and new technology
Not comprehensive for Industry or SEWP
5
Computer Technology - CPU
Dual / Quad / … CPUs• AMD and Intel both have dual-core processors now
- http://www.amd.com/us-en/Processors/ProductInformation/0,,30_118_8825,00.html
- http://www.intel.com/business/bss/products/server/dual-core.htm?ppc_cid=ggl|dualcor_b2b|k3675|s
• Quad core processors in 2007
• Improved power for less heat and energy
• Software price implications
6
Computer Technology - Disk
Disk Technology• SATA: Serial ATA drives ( standard in HDD/motherboard interfaces)
are fast with the first generation having a volume of 150 MB/sec compared to Parallel ATA (PATA) drive's 100 MB/sec. SATA 3Gb/s is predicted to go up to 300 MB/sec. This compares to USB interfaces at 60 MB/sec and firewire volume of 200 MB/sec.
- http://www.sata-io.org
7
Computer Technology – Blades and Desktops
Centralized PC Blade Solutions
Example: ClearCube - http://www.clearcube.com
• PC Blade – rack mounted computer
• Cage – houses up to 8 PC blades
• User port – VHS-sized desk unit (replaces desktop PC)
• Central management software
8
Storage Virtualization
Definition• An intelligent device that sits in front of external storage systems and provides various levels
of system and data management functionality. The storage virtualization platform is essentially a storage controller that manages external storage systems. (The Storage Virtualization Landscape by The Enterprise Strategy Group (ESG)
• http://www.hds.com/pdf/Storage%20Virtualization%20Landscape%20ESG%20Report%20July%202005.pdf
Virtualization Objectives• Masking complexity of infrastructure
• Maximize Storage utilization by creating virtual pools of storage resources
• Movement without disruption and Centralized Management
Leading companies• EMC, IBM, NetApp and Hitachi.
9
Storage Virtualization Example
The Hitachi TagmaStore USP : a high-end storage virtualization solution
• www.hds.com
• Maximum of 192 FC ports
•Maximum of 128 GB of cache memory
• Up to 16 Ethernet ports for NAS connectivity
• Support for up to 32 PB of managed storage capacity
• Up to 2 million IOPS • FC, Escon and Ficon connectivity in any combination
10
E-mail Archiving and Storage
Information Lifecycle Management (ILM)• Retention and storage of e-mail
- Enormous quantity
- Retention Policies/ Regulation
- User needs and wants
- http://www.windowsitpro.com/Article/ArticleID/47139/Windows_47139.html
Example of Current Technology: Veritas Enterprise Vault- http://eval.veritas.com/mktginfo/products/Datasheets/Data_Protection/ent_vault_6_corporate_overvie
w_04182005_dsht.pdf
• Enterprise Vault software helps address: - • Application Storage Management
- • Compliance Retention & Discovery
- • Operational Excellence
- • Knowledge Exploitation
- • Upgrade, Migration & Consolidation
11
Global Data Services
High performance and secure access to shared data across Wide Area Network
• Geographic Caching
• Access-Sensitive Data Migration
• Distributed Meta-Data Directories
• Site-Aware Geographic RAID
• Multi-Site Synchronous I/O
• Coherent Asynchronous I/O
• Network Fencing and Incremental Re-Synch
• Parallel High-Speed Data Transport - http://www.yottayotta.com/global.html
12
Wireless Security
WiFi Wireless with integrated FIPS 140-2 and 802.11i security
• Example: 3e Technologies Inc.- wireless infrastructure networking options centered on secure access points:
DoD-proven security, mesh networking, ruggedized enclosures, harsh environments, extreme temperatures, wireless video, bridging, repeating,
- http://www.3eti.com/
13
Enterprise-Wide Information Protection
Need to mitigate risk and meet strict information protection requirements
• Example: Vormetric CoreGuard
• Personal Data Privacy Protection
• Digital Information Asset Protection
• Enforcement of IT Governance Policies- http://www.vormetric.com/solutions/
14
Physical Access / Biometrics
Card scanners
Iris scanners
Facial Recognition
Fingerprint access
Digital Fingerprint capture• Example: Lite-X
- http://www.lite-x.net/Technical_Specs/technical_specs.html
- Fingerprint / demographic / signature capture
- Immediate quality checking, display, formatting, electronic transmission
15
Thank You!
V. 08/02/2005