SlideShare uma empresa Scribd logo
1 de 16
Baixar para ler offline
SelfSelf--TuningTuning
Data CentersData Centers
R&DR&D
Reza Rahimi, PhD
Senior Staff Software Architect,
Huawei R&D Storage Lab,
Santa Clara, USA.
Keynote Talk,
Big Data Innovation Summit, Jan 2017,
Las Vegas, USA.
ProloguePrologue
Every Important trend has an
R&D
ProloguePrologue
Every Important trend has an
Interesting story, so does big data
Business Challenge:
Software Defined Business
Software Defined Transportation Software Defined Video Streaming
Control, Management
and Analytics Tier
R&D
Software Defined Leasing/Hostelling Software Defined Data Centers
and Analytics Tier
Resource Pool Tier
Engineering Challenge:
Big Data Problem
Resource/Supply Providing
Monitoring, Analytics, Management
Prediction/Optimization
Customer/Service User
Control and
Management Tier
Resource
Pool Tier
Large amount of data and meta data generated
R&D
Large amount of data and meta data generated
Workloads and Applications:
First Class Citizens of Data Centers
R&D
First Class Citizens of Data Centers
Applications Spectrum
Computing (CPU , GPU, DSP, FPGA,...)
Self-Driving CarsRobotic/AI Applications
These applications will be
fully or partially supported
by Data Centers Services
(Cloud-Based)
R&D
Storage (DRAM, SSD, HDD,..)
Network (Wired, Wi-Fi, 4G,…)
Data Management Systems
Video Streaming/IoT,…
Typical Data Center Architecture
As a simple rule of thumb:
Enterprise Data Center Size :
100 Hosts
1000 VMs
~Logs : 40 GB/Day
Data Center
Management
Host 1 Host 2
Host n
Apps are running
on VMs
R&D
VM-1-k
VM-1-1 VM-2-1
VM-2-m
VM-n-1
VM-n-l
logslogs logs
Storage Pool
Big Data Engineering
and Science
Data Center Management
Challenges and Opportunities
R&D
Challenges and Opportunities
Challenges in Data Center
Management
Service Level Agreement (SLA) :
Throughput/Latency (e-commerce applications):
► 2014 US $304 billion increasing 15.4% yearly in e-commerce [1],
► 100ms latency costs 1% decrease in sale [3],
► Page loading should be less than 2 seconds per page not to lose
customer, will decrease overall sales by 7% [2],
R&D
Availability and Fault Tolerance :
► Example Huawei public cloud 99.9999 Availability [4] =
Daily: 0.9s
Weekly: 6.0s
Monthly: 26.3s
Yearly: 5m 15.6s
Scalable and Elastic (on Demand) :
► Should know when and how to scale to satisfy SLA dynamically,
Data Center Energy Efficiency and Resource Utilization :
► By 2020 reduction of energy cost 30% based on
European law-Green DC [5],
Challenges in Data Center
Management
Security and Privacy :
► Should guarantee data privacy (like medical data, Financial Data,…) and
security against attacks, data ownership,…
R&D
By 2020 reduction of energy cost 30% based on
European law-Green DC [5],
► US data centers consume ~ 90 billion Kilowatt hours annually =
House hold in NY for two years
► Pollute over 150 million tons of carbon yearly in USA [5],
► ~ 90 percent of the VMs utilizes < 15% of assigned cores [9],
► ~ 90 percent of the VMs only have < 10 IOPS [9],
► Average server runs on [12%-18%] of their capacity most of the time
still consuming 30% to 60% of their maximum power consumption [6,7].
► High utilization -> save in power consumption->Low carbon footprint
Software Compliance and License :
► ~ $500,000 spent on software licensing for average size data center,
► It could be per User/Device/VM/Core/…
► Different models and policies for license like [8]:
1) Running licensed workload on bare metal (no virtualization),
2) Running licensed workload on dedicated cluster,
3) Migrate licensed workload,
Challenges in Data Center
Management
R&D
3) Migrate licensed workload,
4) …
► Workloads and cluster growth bring challenges for software license,
► This bring the challenge how to minimize the cost of software on data
centers and not violate license policy,
Dynamic Service Pricing :
► Computing, network and storage are utilities for workloads.
► Should model to find a dynamic way and good policy of pricing in
competitive market of cloud providers while increasing revenue.
Self-Tuning Data Center :
Simplified Service Architecture
VM
Scheduling and
Orchestrating Services
and Resources
Real-time Log and
Monitoring Service
Alert and Policy
Service
Recommendation
Service
2) Ask correct size, type
And location for resource
Based on request
1) Request resource
3) Correct conf and resource
size and place
4) Allocate required
resources
1) Telemetry and log sending
Initial
State
R&D
1) Telemetry and log sending
2) Query logs for policy and
alert checks
4) Check for violation
and warnings
5) Alert of Violation
6) Ask for Recommendation
7 ) Send Recommendations
and Recipes
8 ) Apply Recommendation
Operational and
Recovery State
1 ) Ask Recommendation
For Self-Tune (for example
in low traffic state)
2) Send Tuning Plan
and Recommendation
(like VM migration or resizing)
3 ) Apply Self-Tuning
recommendation
Self-Tuning
State
3) Collected Data
Huawei Position in
Self-Tuning Data Center
► Huawei Cloud is growing very fast > 50% revenue increase y-y.
► Huawei launched its first public cloud outside China in Europe
(announced in CeBIT 2016) with 50,000 Hosts.
► Working on intelligent service in Huawei R&D Storage Lab in USA to
address self-tuning data centers and provide solution for Huawei
customers and their needs.
► Using and contributing idea from/to open source big data
R&D
► Using and contributing idea from/to open source big data
community.
Conclusions and
Future Directions
► Cloud-based ecosystem is the future of IT.
► Cloud data center composed of different resources
to satisfy applications requirements.
► Managing these resources is a complicated task that human
can not do it manually.
► Machines in data centers are generating big amount of logs which
describe what happen in data center.
R&D
describe what happen in data center.
► Data scientists and engineers are needed to study system
behavior and data center optimization.
► This will result to the next generation data centers which are self-tuning
and need minimum human efforts.
References
[1] U.S Census Bureau News : http://www2.census.gov/retail/releases/historical/ecomm/14q4.pdf
[2] Akamai Newsroom : http://www.akamai.com/html/about/press/releases/2009/press_091409.html
[3] High Scalability Blog : http://highscalability.com/latency-everywhere-and-it-costs-you-sales-how-crush-it
[4] High Availability : https://en.wikipedia.org/wiki/High_availability
[5] European Commission on Renewable Energy : https://ec.europa.eu/energy/en/topics/renewable-
energy
R&D
energy
[6] ISSUE Brief : https://www.nrdc.org/sites/default/files/data-center-efficiency-assessment-IB.pdf
[7] ISSUE Paper : https://www.nrdc.org/sites/default/files/data-center-efficiency-assessment-IP.pdf
[8] Turbotonic white paper “Licensing, Compliance & Audits in the Cloud Era”, 2015.
[9] CloudPhysics, Global IT Data Lake Report, Q4 2016
R&D
Thanks ☺☺☺☺
Questions?

Mais conteúdo relacionado

Mais procurados

Mobile cloud computing
Mobile cloud computingMobile cloud computing
Mobile cloud computingFatih Özlü
 
End-to-End Security in Mobile-Cloud Computing
End-to-End Security in Mobile-Cloud ComputingEnd-to-End Security in Mobile-Cloud Computing
End-to-End Security in Mobile-Cloud ComputingDr Sukhpal Singh Gill
 
Offloading in Mobile Cloud Computing
Offloading in Mobile Cloud ComputingOffloading in Mobile Cloud Computing
Offloading in Mobile Cloud ComputingSaif Salah
 
Mobile Cloud Comuting
Mobile Cloud Comuting Mobile Cloud Comuting
Mobile Cloud Comuting ines beltaief
 
Mobile Cloud Computing
Mobile Cloud Computing Mobile Cloud Computing
Mobile Cloud Computing Varun Vijay
 
Cloud Computing for Mobile Robots
Cloud Computing for Mobile RobotsCloud Computing for Mobile Robots
Cloud Computing for Mobile RobotsDarshan Rajagopal
 
Cloud and Mobile Computing
Cloud and Mobile ComputingCloud and Mobile Computing
Cloud and Mobile ComputingBill Petro
 
Energy Efficient Mobile Applications with Mobile Cloud Computing ( MCC )
Energy Efficient Mobile Applications with Mobile Cloud Computing ( MCC )Energy Efficient Mobile Applications with Mobile Cloud Computing ( MCC )
Energy Efficient Mobile Applications with Mobile Cloud Computing ( MCC )Anand Bhojan
 
Security and privacy issues with mobile cloud computing applications june 2016
Security and privacy issues with mobile cloud computing applications june 2016Security and privacy issues with mobile cloud computing applications june 2016
Security and privacy issues with mobile cloud computing applications june 2016Merlec Mpyana
 
A Survey of Mobile Cloud Computing: Architecture, Applications, and Approaches
A Survey of Mobile Cloud Computing: Architecture, Applications, and ApproachesA Survey of Mobile Cloud Computing: Architecture, Applications, and Approaches
A Survey of Mobile Cloud Computing: Architecture, Applications, and ApproachesThuy An Dang
 
Www.eecis.udel.edu ~cshen 367_papers_survey_mcc
Www.eecis.udel.edu ~cshen 367_papers_survey_mccWww.eecis.udel.edu ~cshen 367_papers_survey_mcc
Www.eecis.udel.edu ~cshen 367_papers_survey_mccYashank Pratap Singh
 
Cloud Computing on ISO/IEC JTC 1
Cloud Computing on ISO/IEC JTC 1Cloud Computing on ISO/IEC JTC 1
Cloud Computing on ISO/IEC JTC 1Seungyun Lee
 
Cloud computing course and tutorials
Cloud computing course and tutorialsCloud computing course and tutorials
Cloud computing course and tutorialsUdara Sandaruwan
 
Mobile Cloud Computing 2012
Mobile Cloud Computing 2012 Mobile Cloud Computing 2012
Mobile Cloud Computing 2012 Bhavya Siddappa
 
Research Seminar Presentation - A framework for partitioning and execution of...
Research Seminar Presentation - A framework for partitioning and execution of...Research Seminar Presentation - A framework for partitioning and execution of...
Research Seminar Presentation - A framework for partitioning and execution of...malinga2009
 
Mobile-Cloud Computing
Mobile-Cloud ComputingMobile-Cloud Computing
Mobile-Cloud ComputingKamal Patel
 
Cloud computing report
Cloud computing reportCloud computing report
Cloud computing reportErManish5
 

Mais procurados (20)

Mobile cloud computing
Mobile cloud computingMobile cloud computing
Mobile cloud computing
 
End-to-End Security in Mobile-Cloud Computing
End-to-End Security in Mobile-Cloud ComputingEnd-to-End Security in Mobile-Cloud Computing
End-to-End Security in Mobile-Cloud Computing
 
Offloading in Mobile Cloud Computing
Offloading in Mobile Cloud ComputingOffloading in Mobile Cloud Computing
Offloading in Mobile Cloud Computing
 
Mobile Cloud Comuting
Mobile Cloud Comuting Mobile Cloud Comuting
Mobile Cloud Comuting
 
Mobile Cloud Computing
Mobile Cloud Computing Mobile Cloud Computing
Mobile Cloud Computing
 
IJET-V3I1P24
IJET-V3I1P24IJET-V3I1P24
IJET-V3I1P24
 
Cloud Computing for Mobile Robots
Cloud Computing for Mobile RobotsCloud Computing for Mobile Robots
Cloud Computing for Mobile Robots
 
Cloud and Mobile Computing
Cloud and Mobile ComputingCloud and Mobile Computing
Cloud and Mobile Computing
 
Energy Efficient Mobile Applications with Mobile Cloud Computing ( MCC )
Energy Efficient Mobile Applications with Mobile Cloud Computing ( MCC )Energy Efficient Mobile Applications with Mobile Cloud Computing ( MCC )
Energy Efficient Mobile Applications with Mobile Cloud Computing ( MCC )
 
CloudBus
CloudBusCloudBus
CloudBus
 
Security and privacy issues with mobile cloud computing applications june 2016
Security and privacy issues with mobile cloud computing applications june 2016Security and privacy issues with mobile cloud computing applications june 2016
Security and privacy issues with mobile cloud computing applications june 2016
 
A Survey of Mobile Cloud Computing: Architecture, Applications, and Approaches
A Survey of Mobile Cloud Computing: Architecture, Applications, and ApproachesA Survey of Mobile Cloud Computing: Architecture, Applications, and Approaches
A Survey of Mobile Cloud Computing: Architecture, Applications, and Approaches
 
Www.eecis.udel.edu ~cshen 367_papers_survey_mcc
Www.eecis.udel.edu ~cshen 367_papers_survey_mccWww.eecis.udel.edu ~cshen 367_papers_survey_mcc
Www.eecis.udel.edu ~cshen 367_papers_survey_mcc
 
Cloud Computing on ISO/IEC JTC 1
Cloud Computing on ISO/IEC JTC 1Cloud Computing on ISO/IEC JTC 1
Cloud Computing on ISO/IEC JTC 1
 
Cloud computing course and tutorials
Cloud computing course and tutorialsCloud computing course and tutorials
Cloud computing course and tutorials
 
Mobile Cloud Computing 2012
Mobile Cloud Computing 2012 Mobile Cloud Computing 2012
Mobile Cloud Computing 2012
 
Research Seminar Presentation - A framework for partitioning and execution of...
Research Seminar Presentation - A framework for partitioning and execution of...Research Seminar Presentation - A framework for partitioning and execution of...
Research Seminar Presentation - A framework for partitioning and execution of...
 
Untitled 1
Untitled 1Untitled 1
Untitled 1
 
Mobile-Cloud Computing
Mobile-Cloud ComputingMobile-Cloud Computing
Mobile-Cloud Computing
 
Cloud computing report
Cloud computing reportCloud computing report
Cloud computing report
 

Destaque

Optimizing Multicast Throughput in IP Network
Optimizing Multicast Throughput in IP NetworkOptimizing Multicast Throughput in IP Network
Optimizing Multicast Throughput in IP NetworkReza Rahimi
 
The Next Big Thing in IT
The Next Big Thing in ITThe Next Big Thing in IT
The Next Big Thing in ITReza Rahimi
 
Machine Learning The Key Ingredient to Self-Driving Data Center
Machine Learning The Key Ingredient to Self-Driving Data CenterMachine Learning The Key Ingredient to Self-Driving Data Center
Machine Learning The Key Ingredient to Self-Driving Data CenterSergey A. Razin
 
Self-Driving Data Center (Apply Machine Learning to the Cloud)
Self-Driving Data Center (Apply Machine Learning to the Cloud)Self-Driving Data Center (Apply Machine Learning to the Cloud)
Self-Driving Data Center (Apply Machine Learning to the Cloud)Sergey A. Razin
 
The Self Healing Cloud: Protecting Applications and Infrastructure with Autom...
The Self Healing Cloud: Protecting Applications and Infrastructure with Autom...The Self Healing Cloud: Protecting Applications and Infrastructure with Autom...
The Self Healing Cloud: Protecting Applications and Infrastructure with Autom...Denim Group
 
SMS Spam Filter Design Using R: A Machine Learning Approach
SMS Spam Filter Design Using R: A Machine Learning ApproachSMS Spam Filter Design Using R: A Machine Learning Approach
SMS Spam Filter Design Using R: A Machine Learning ApproachReza Rahimi
 
Linear Programming and its Usage in Approximation Algorithms for NP Hard Opti...
Linear Programming and its Usage in Approximation Algorithms for NP Hard Opti...Linear Programming and its Usage in Approximation Algorithms for NP Hard Opti...
Linear Programming and its Usage in Approximation Algorithms for NP Hard Opti...Reza Rahimi
 
Dynatrace: New Approach to Digital Performance Management - Gartner Symposium...
Dynatrace: New Approach to Digital Performance Management - Gartner Symposium...Dynatrace: New Approach to Digital Performance Management - Gartner Symposium...
Dynatrace: New Approach to Digital Performance Management - Gartner Symposium...Michael Allen
 
Security Insights at Scale
Security Insights at ScaleSecurity Insights at Scale
Security Insights at ScaleRaffael Marty
 
Applying Machine Learning to Network Security Monitoring - BayThreat 2013
Applying Machine Learning to Network Security Monitoring - BayThreat 2013Applying Machine Learning to Network Security Monitoring - BayThreat 2013
Applying Machine Learning to Network Security Monitoring - BayThreat 2013Alex Pinto
 
Mobile cloud computing; Future of Cloud Computing
Mobile cloud computing; Future of Cloud ComputingMobile cloud computing; Future of Cloud Computing
Mobile cloud computing; Future of Cloud ComputingVineet Garg
 
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't ChangedAI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't ChangedRaffael Marty
 

Destaque (12)

Optimizing Multicast Throughput in IP Network
Optimizing Multicast Throughput in IP NetworkOptimizing Multicast Throughput in IP Network
Optimizing Multicast Throughput in IP Network
 
The Next Big Thing in IT
The Next Big Thing in ITThe Next Big Thing in IT
The Next Big Thing in IT
 
Machine Learning The Key Ingredient to Self-Driving Data Center
Machine Learning The Key Ingredient to Self-Driving Data CenterMachine Learning The Key Ingredient to Self-Driving Data Center
Machine Learning The Key Ingredient to Self-Driving Data Center
 
Self-Driving Data Center (Apply Machine Learning to the Cloud)
Self-Driving Data Center (Apply Machine Learning to the Cloud)Self-Driving Data Center (Apply Machine Learning to the Cloud)
Self-Driving Data Center (Apply Machine Learning to the Cloud)
 
The Self Healing Cloud: Protecting Applications and Infrastructure with Autom...
The Self Healing Cloud: Protecting Applications and Infrastructure with Autom...The Self Healing Cloud: Protecting Applications and Infrastructure with Autom...
The Self Healing Cloud: Protecting Applications and Infrastructure with Autom...
 
SMS Spam Filter Design Using R: A Machine Learning Approach
SMS Spam Filter Design Using R: A Machine Learning ApproachSMS Spam Filter Design Using R: A Machine Learning Approach
SMS Spam Filter Design Using R: A Machine Learning Approach
 
Linear Programming and its Usage in Approximation Algorithms for NP Hard Opti...
Linear Programming and its Usage in Approximation Algorithms for NP Hard Opti...Linear Programming and its Usage in Approximation Algorithms for NP Hard Opti...
Linear Programming and its Usage in Approximation Algorithms for NP Hard Opti...
 
Dynatrace: New Approach to Digital Performance Management - Gartner Symposium...
Dynatrace: New Approach to Digital Performance Management - Gartner Symposium...Dynatrace: New Approach to Digital Performance Management - Gartner Symposium...
Dynatrace: New Approach to Digital Performance Management - Gartner Symposium...
 
Security Insights at Scale
Security Insights at ScaleSecurity Insights at Scale
Security Insights at Scale
 
Applying Machine Learning to Network Security Monitoring - BayThreat 2013
Applying Machine Learning to Network Security Monitoring - BayThreat 2013Applying Machine Learning to Network Security Monitoring - BayThreat 2013
Applying Machine Learning to Network Security Monitoring - BayThreat 2013
 
Mobile cloud computing; Future of Cloud Computing
Mobile cloud computing; Future of Cloud ComputingMobile cloud computing; Future of Cloud Computing
Mobile cloud computing; Future of Cloud Computing
 
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't ChangedAI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
AI & ML in Cyber Security - Welcome Back to 1999 - Security Hasn't Changed
 

Semelhante a Self-Tuning Data Centers

The Growth Of Data Centers
The Growth Of Data CentersThe Growth Of Data Centers
The Growth Of Data CentersGina Buck
 
Wicsa2011 cloud tutorial
Wicsa2011 cloud tutorialWicsa2011 cloud tutorial
Wicsa2011 cloud tutorialAnna Liu
 
Dell NVIDIA AI Powered Transformation in Financial Services Webinar
Dell NVIDIA AI Powered Transformation in Financial Services WebinarDell NVIDIA AI Powered Transformation in Financial Services Webinar
Dell NVIDIA AI Powered Transformation in Financial Services WebinarBill Wong
 
Was steckt drinnen, im Data Market Austria?
Was steckt drinnen, im Data Market Austria?Was steckt drinnen, im Data Market Austria?
Was steckt drinnen, im Data Market Austria?Data Market Austria
 
Introduction to Modern Data Virtualization 2021 (APAC)
Introduction to Modern Data Virtualization 2021 (APAC)Introduction to Modern Data Virtualization 2021 (APAC)
Introduction to Modern Data Virtualization 2021 (APAC)Denodo
 
Advanced Analytics and Machine Learning with Data Virtualization
Advanced Analytics and Machine Learning with Data VirtualizationAdvanced Analytics and Machine Learning with Data Virtualization
Advanced Analytics and Machine Learning with Data VirtualizationDenodo
 
Qo Introduction V2
Qo Introduction V2Qo Introduction V2
Qo Introduction V2Joe_F
 
Government Applications of Cloud Computing
Government Applications of Cloud ComputingGovernment Applications of Cloud Computing
Government Applications of Cloud ComputingRoger Smith
 
Confluent Partner Tech Talk with BearingPoint
Confluent Partner Tech Talk with BearingPointConfluent Partner Tech Talk with BearingPoint
Confluent Partner Tech Talk with BearingPointconfluent
 
Big data in Private Banking
Big data in Private BankingBig data in Private Banking
Big data in Private BankingJérôme Kehrli
 
SQL Server 2008 R2 StreamInsight
SQL Server 2008 R2 StreamInsightSQL Server 2008 R2 StreamInsight
SQL Server 2008 R2 StreamInsightEduardo Castro
 
Data Virtualization: From Zero to Hero
Data Virtualization: From Zero to HeroData Virtualization: From Zero to Hero
Data Virtualization: From Zero to HeroDenodo
 
CRTC Cloud- Scott Sadler
CRTC Cloud- Scott SadlerCRTC Cloud- Scott Sadler
CRTC Cloud- Scott SadlerKrisValerio
 
Cloud & Big Data - Digital Transformation in Banking
Cloud & Big Data - Digital Transformation in Banking Cloud & Big Data - Digital Transformation in Banking
Cloud & Big Data - Digital Transformation in Banking Sutedjo Tjahjadi
 
Dell Digital Transformation Through AI and Data Analytics Webinar
Dell Digital Transformation Through AI and  Data Analytics WebinarDell Digital Transformation Through AI and  Data Analytics Webinar
Dell Digital Transformation Through AI and Data Analytics WebinarBill Wong
 
How Data Virtualization Puts Enterprise Machine Learning Programs into Produc...
How Data Virtualization Puts Enterprise Machine Learning Programs into Produc...How Data Virtualization Puts Enterprise Machine Learning Programs into Produc...
How Data Virtualization Puts Enterprise Machine Learning Programs into Produc...Denodo
 
Bridging the Last Mile: Getting Data to the People Who Need It
Bridging the Last Mile: Getting Data to the People Who Need ItBridging the Last Mile: Getting Data to the People Who Need It
Bridging the Last Mile: Getting Data to the People Who Need ItDenodo
 
Cyber Resilience Summit Briefing March 15, 2016
Cyber Resilience Summit Briefing March 15, 2016Cyber Resilience Summit Briefing March 15, 2016
Cyber Resilience Summit Briefing March 15, 2016John Weiler
 
Cyber Resilience Summit Briefing
Cyber Resilience Summit Briefing Cyber Resilience Summit Briefing
Cyber Resilience Summit Briefing John Weiler
 
A Logical Architecture is Always a Flexible Architecture (ASEAN)
A Logical Architecture is Always a Flexible Architecture (ASEAN)A Logical Architecture is Always a Flexible Architecture (ASEAN)
A Logical Architecture is Always a Flexible Architecture (ASEAN)Denodo
 

Semelhante a Self-Tuning Data Centers (20)

The Growth Of Data Centers
The Growth Of Data CentersThe Growth Of Data Centers
The Growth Of Data Centers
 
Wicsa2011 cloud tutorial
Wicsa2011 cloud tutorialWicsa2011 cloud tutorial
Wicsa2011 cloud tutorial
 
Dell NVIDIA AI Powered Transformation in Financial Services Webinar
Dell NVIDIA AI Powered Transformation in Financial Services WebinarDell NVIDIA AI Powered Transformation in Financial Services Webinar
Dell NVIDIA AI Powered Transformation in Financial Services Webinar
 
Was steckt drinnen, im Data Market Austria?
Was steckt drinnen, im Data Market Austria?Was steckt drinnen, im Data Market Austria?
Was steckt drinnen, im Data Market Austria?
 
Introduction to Modern Data Virtualization 2021 (APAC)
Introduction to Modern Data Virtualization 2021 (APAC)Introduction to Modern Data Virtualization 2021 (APAC)
Introduction to Modern Data Virtualization 2021 (APAC)
 
Advanced Analytics and Machine Learning with Data Virtualization
Advanced Analytics and Machine Learning with Data VirtualizationAdvanced Analytics and Machine Learning with Data Virtualization
Advanced Analytics and Machine Learning with Data Virtualization
 
Qo Introduction V2
Qo Introduction V2Qo Introduction V2
Qo Introduction V2
 
Government Applications of Cloud Computing
Government Applications of Cloud ComputingGovernment Applications of Cloud Computing
Government Applications of Cloud Computing
 
Confluent Partner Tech Talk with BearingPoint
Confluent Partner Tech Talk with BearingPointConfluent Partner Tech Talk with BearingPoint
Confluent Partner Tech Talk with BearingPoint
 
Big data in Private Banking
Big data in Private BankingBig data in Private Banking
Big data in Private Banking
 
SQL Server 2008 R2 StreamInsight
SQL Server 2008 R2 StreamInsightSQL Server 2008 R2 StreamInsight
SQL Server 2008 R2 StreamInsight
 
Data Virtualization: From Zero to Hero
Data Virtualization: From Zero to HeroData Virtualization: From Zero to Hero
Data Virtualization: From Zero to Hero
 
CRTC Cloud- Scott Sadler
CRTC Cloud- Scott SadlerCRTC Cloud- Scott Sadler
CRTC Cloud- Scott Sadler
 
Cloud & Big Data - Digital Transformation in Banking
Cloud & Big Data - Digital Transformation in Banking Cloud & Big Data - Digital Transformation in Banking
Cloud & Big Data - Digital Transformation in Banking
 
Dell Digital Transformation Through AI and Data Analytics Webinar
Dell Digital Transformation Through AI and  Data Analytics WebinarDell Digital Transformation Through AI and  Data Analytics Webinar
Dell Digital Transformation Through AI and Data Analytics Webinar
 
How Data Virtualization Puts Enterprise Machine Learning Programs into Produc...
How Data Virtualization Puts Enterprise Machine Learning Programs into Produc...How Data Virtualization Puts Enterprise Machine Learning Programs into Produc...
How Data Virtualization Puts Enterprise Machine Learning Programs into Produc...
 
Bridging the Last Mile: Getting Data to the People Who Need It
Bridging the Last Mile: Getting Data to the People Who Need ItBridging the Last Mile: Getting Data to the People Who Need It
Bridging the Last Mile: Getting Data to the People Who Need It
 
Cyber Resilience Summit Briefing March 15, 2016
Cyber Resilience Summit Briefing March 15, 2016Cyber Resilience Summit Briefing March 15, 2016
Cyber Resilience Summit Briefing March 15, 2016
 
Cyber Resilience Summit Briefing
Cyber Resilience Summit Briefing Cyber Resilience Summit Briefing
Cyber Resilience Summit Briefing
 
A Logical Architecture is Always a Flexible Architecture (ASEAN)
A Logical Architecture is Always a Flexible Architecture (ASEAN)A Logical Architecture is Always a Flexible Architecture (ASEAN)
A Logical Architecture is Always a Flexible Architecture (ASEAN)
 

Mais de Reza Rahimi

Boosting Personalization In SaaS Using Machine Learning.pdf
Boosting Personalization  In SaaS Using Machine Learning.pdfBoosting Personalization  In SaaS Using Machine Learning.pdf
Boosting Personalization In SaaS Using Machine Learning.pdfReza Rahimi
 
Self-Tuning and Managing Services
Self-Tuning and Managing ServicesSelf-Tuning and Managing Services
Self-Tuning and Managing ServicesReza Rahimi
 
Low Complexity Secure Code Design for Big Data in Cloud Storage Systems
Low Complexity Secure Code Design for Big Data in Cloud Storage SystemsLow Complexity Secure Code Design for Big Data in Cloud Storage Systems
Low Complexity Secure Code Design for Big Data in Cloud Storage SystemsReza Rahimi
 
Smart Connectivity
Smart ConnectivitySmart Connectivity
Smart ConnectivityReza Rahimi
 
Exploiting an Elastic 2-Tiered Cloud Architecture for Rich Mobile Applications
Exploiting an Elastic 2-Tiered Cloud Architecture for Rich Mobile ApplicationsExploiting an Elastic 2-Tiered Cloud Architecture for Rich Mobile Applications
Exploiting an Elastic 2-Tiered Cloud Architecture for Rich Mobile ApplicationsReza Rahimi
 
Fingerprint High Level Classification
Fingerprint High Level ClassificationFingerprint High Level Classification
Fingerprint High Level ClassificationReza Rahimi
 
The Case for a Signal Oriented Data Stream Management System
The Case for a Signal Oriented Data Stream Management SystemThe Case for a Signal Oriented Data Stream Management System
The Case for a Signal Oriented Data Stream Management SystemReza Rahimi
 
Network Information Processing
Network Information ProcessingNetwork Information Processing
Network Information ProcessingReza Rahimi
 
Pervasive Image Computation: A Mobile Phone Application for getting Informat...
Pervasive Image Computation: A Mobile  Phone Application for getting Informat...Pervasive Image Computation: A Mobile  Phone Application for getting Informat...
Pervasive Image Computation: A Mobile Phone Application for getting Informat...Reza Rahimi
 
Gaussian Integration
Gaussian IntegrationGaussian Integration
Gaussian IntegrationReza Rahimi
 
Interactive Proof Systems and An Introduction to PCP
Interactive Proof Systems and An Introduction to PCPInteractive Proof Systems and An Introduction to PCP
Interactive Proof Systems and An Introduction to PCPReza Rahimi
 
Quantum Computation and Algorithms
Quantum Computation and Algorithms Quantum Computation and Algorithms
Quantum Computation and Algorithms Reza Rahimi
 

Mais de Reza Rahimi (12)

Boosting Personalization In SaaS Using Machine Learning.pdf
Boosting Personalization  In SaaS Using Machine Learning.pdfBoosting Personalization  In SaaS Using Machine Learning.pdf
Boosting Personalization In SaaS Using Machine Learning.pdf
 
Self-Tuning and Managing Services
Self-Tuning and Managing ServicesSelf-Tuning and Managing Services
Self-Tuning and Managing Services
 
Low Complexity Secure Code Design for Big Data in Cloud Storage Systems
Low Complexity Secure Code Design for Big Data in Cloud Storage SystemsLow Complexity Secure Code Design for Big Data in Cloud Storage Systems
Low Complexity Secure Code Design for Big Data in Cloud Storage Systems
 
Smart Connectivity
Smart ConnectivitySmart Connectivity
Smart Connectivity
 
Exploiting an Elastic 2-Tiered Cloud Architecture for Rich Mobile Applications
Exploiting an Elastic 2-Tiered Cloud Architecture for Rich Mobile ApplicationsExploiting an Elastic 2-Tiered Cloud Architecture for Rich Mobile Applications
Exploiting an Elastic 2-Tiered Cloud Architecture for Rich Mobile Applications
 
Fingerprint High Level Classification
Fingerprint High Level ClassificationFingerprint High Level Classification
Fingerprint High Level Classification
 
The Case for a Signal Oriented Data Stream Management System
The Case for a Signal Oriented Data Stream Management SystemThe Case for a Signal Oriented Data Stream Management System
The Case for a Signal Oriented Data Stream Management System
 
Network Information Processing
Network Information ProcessingNetwork Information Processing
Network Information Processing
 
Pervasive Image Computation: A Mobile Phone Application for getting Informat...
Pervasive Image Computation: A Mobile  Phone Application for getting Informat...Pervasive Image Computation: A Mobile  Phone Application for getting Informat...
Pervasive Image Computation: A Mobile Phone Application for getting Informat...
 
Gaussian Integration
Gaussian IntegrationGaussian Integration
Gaussian Integration
 
Interactive Proof Systems and An Introduction to PCP
Interactive Proof Systems and An Introduction to PCPInteractive Proof Systems and An Introduction to PCP
Interactive Proof Systems and An Introduction to PCP
 
Quantum Computation and Algorithms
Quantum Computation and Algorithms Quantum Computation and Algorithms
Quantum Computation and Algorithms
 

Último

『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书rnrncn29
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleanscorenetworkseo
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书zdzoqco
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhimiss dipika
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Sonam Pathan
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一Fs
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作ys8omjxb
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Excelmac1
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxeditsforyah
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationLinaWolf1
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Sonam Pathan
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationMarko4394
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一z xss
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一Fs
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书rnrncn29
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predieusebiomeyer
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)Christopher H Felton
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一Fs
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Paul Calvano
 

Último (20)

『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
『澳洲文凭』买拉筹伯大学毕业证书成绩单办理澳洲LTU文凭学位证书
 
Elevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New OrleansElevate Your Business with Our IT Expertise in New Orleans
Elevate Your Business with Our IT Expertise in New Orleans
 
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Serviceyoung call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
young call girls in Uttam Nagar🔝 9953056974 🔝 Delhi escort Service
 
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
办理多伦多大学毕业证成绩单|购买加拿大UTSG文凭证书
 
Contact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New DelhiContact Rya Baby for Call Girls New Delhi
Contact Rya Baby for Call Girls New Delhi
 
Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170Call Girls Near The Suryaa Hotel New Delhi 9873777170
Call Girls Near The Suryaa Hotel New Delhi 9873777170
 
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
定制(Lincoln毕业证书)新西兰林肯大学毕业证成绩单原版一比一
 
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
Potsdam FH学位证,波茨坦应用技术大学毕业证书1:1制作
 
Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...Blepharitis inflammation of eyelid symptoms cause everything included along w...
Blepharitis inflammation of eyelid symptoms cause everything included along w...
 
Q4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptxQ4-1-Illustrating-Hypothesis-Testing.pptx
Q4-1-Illustrating-Hypothesis-Testing.pptx
 
PHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 DocumentationPHP-based rendering of TYPO3 Documentation
PHP-based rendering of TYPO3 Documentation
 
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
Call Girls In The Ocean Pearl Retreat Hotel New Delhi 9873777170
 
NSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentationNSX-T and Service Interfaces presentation
NSX-T and Service Interfaces presentation
 
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
办理(UofR毕业证书)罗切斯特大学毕业证成绩单原版一比一
 
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
定制(Management毕业证书)新加坡管理大学毕业证成绩单原版一比一
 
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
『澳洲文凭』买詹姆士库克大学毕业证书成绩单办理澳洲JCU文凭学位证书
 
SCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is prediSCM Symposium PPT Format Customer loyalty is predi
SCM Symposium PPT Format Customer loyalty is predi
 
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
A Good Girl's Guide to Murder (A Good Girl's Guide to Murder, #1)
 
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
定制(AUT毕业证书)新西兰奥克兰理工大学毕业证成绩单原版一比一
 
Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24Font Performance - NYC WebPerf Meetup April '24
Font Performance - NYC WebPerf Meetup April '24
 

Self-Tuning Data Centers

  • 1. SelfSelf--TuningTuning Data CentersData Centers R&DR&D Reza Rahimi, PhD Senior Staff Software Architect, Huawei R&D Storage Lab, Santa Clara, USA. Keynote Talk, Big Data Innovation Summit, Jan 2017, Las Vegas, USA.
  • 2. ProloguePrologue Every Important trend has an R&D ProloguePrologue Every Important trend has an Interesting story, so does big data
  • 3. Business Challenge: Software Defined Business Software Defined Transportation Software Defined Video Streaming Control, Management and Analytics Tier R&D Software Defined Leasing/Hostelling Software Defined Data Centers and Analytics Tier Resource Pool Tier
  • 4. Engineering Challenge: Big Data Problem Resource/Supply Providing Monitoring, Analytics, Management Prediction/Optimization Customer/Service User Control and Management Tier Resource Pool Tier Large amount of data and meta data generated R&D Large amount of data and meta data generated
  • 5. Workloads and Applications: First Class Citizens of Data Centers R&D First Class Citizens of Data Centers
  • 6. Applications Spectrum Computing (CPU , GPU, DSP, FPGA,...) Self-Driving CarsRobotic/AI Applications These applications will be fully or partially supported by Data Centers Services (Cloud-Based) R&D Storage (DRAM, SSD, HDD,..) Network (Wired, Wi-Fi, 4G,…) Data Management Systems Video Streaming/IoT,…
  • 7. Typical Data Center Architecture As a simple rule of thumb: Enterprise Data Center Size : 100 Hosts 1000 VMs ~Logs : 40 GB/Day Data Center Management Host 1 Host 2 Host n Apps are running on VMs R&D VM-1-k VM-1-1 VM-2-1 VM-2-m VM-n-1 VM-n-l logslogs logs Storage Pool Big Data Engineering and Science
  • 8. Data Center Management Challenges and Opportunities R&D Challenges and Opportunities
  • 9. Challenges in Data Center Management Service Level Agreement (SLA) : Throughput/Latency (e-commerce applications): ► 2014 US $304 billion increasing 15.4% yearly in e-commerce [1], ► 100ms latency costs 1% decrease in sale [3], ► Page loading should be less than 2 seconds per page not to lose customer, will decrease overall sales by 7% [2], R&D Availability and Fault Tolerance : ► Example Huawei public cloud 99.9999 Availability [4] = Daily: 0.9s Weekly: 6.0s Monthly: 26.3s Yearly: 5m 15.6s Scalable and Elastic (on Demand) : ► Should know when and how to scale to satisfy SLA dynamically,
  • 10. Data Center Energy Efficiency and Resource Utilization : ► By 2020 reduction of energy cost 30% based on European law-Green DC [5], Challenges in Data Center Management Security and Privacy : ► Should guarantee data privacy (like medical data, Financial Data,…) and security against attacks, data ownership,… R&D By 2020 reduction of energy cost 30% based on European law-Green DC [5], ► US data centers consume ~ 90 billion Kilowatt hours annually = House hold in NY for two years ► Pollute over 150 million tons of carbon yearly in USA [5], ► ~ 90 percent of the VMs utilizes < 15% of assigned cores [9], ► ~ 90 percent of the VMs only have < 10 IOPS [9], ► Average server runs on [12%-18%] of their capacity most of the time still consuming 30% to 60% of their maximum power consumption [6,7]. ► High utilization -> save in power consumption->Low carbon footprint
  • 11. Software Compliance and License : ► ~ $500,000 spent on software licensing for average size data center, ► It could be per User/Device/VM/Core/… ► Different models and policies for license like [8]: 1) Running licensed workload on bare metal (no virtualization), 2) Running licensed workload on dedicated cluster, 3) Migrate licensed workload, Challenges in Data Center Management R&D 3) Migrate licensed workload, 4) … ► Workloads and cluster growth bring challenges for software license, ► This bring the challenge how to minimize the cost of software on data centers and not violate license policy, Dynamic Service Pricing : ► Computing, network and storage are utilities for workloads. ► Should model to find a dynamic way and good policy of pricing in competitive market of cloud providers while increasing revenue.
  • 12. Self-Tuning Data Center : Simplified Service Architecture VM Scheduling and Orchestrating Services and Resources Real-time Log and Monitoring Service Alert and Policy Service Recommendation Service 2) Ask correct size, type And location for resource Based on request 1) Request resource 3) Correct conf and resource size and place 4) Allocate required resources 1) Telemetry and log sending Initial State R&D 1) Telemetry and log sending 2) Query logs for policy and alert checks 4) Check for violation and warnings 5) Alert of Violation 6) Ask for Recommendation 7 ) Send Recommendations and Recipes 8 ) Apply Recommendation Operational and Recovery State 1 ) Ask Recommendation For Self-Tune (for example in low traffic state) 2) Send Tuning Plan and Recommendation (like VM migration or resizing) 3 ) Apply Self-Tuning recommendation Self-Tuning State 3) Collected Data
  • 13. Huawei Position in Self-Tuning Data Center ► Huawei Cloud is growing very fast > 50% revenue increase y-y. ► Huawei launched its first public cloud outside China in Europe (announced in CeBIT 2016) with 50,000 Hosts. ► Working on intelligent service in Huawei R&D Storage Lab in USA to address self-tuning data centers and provide solution for Huawei customers and their needs. ► Using and contributing idea from/to open source big data R&D ► Using and contributing idea from/to open source big data community.
  • 14. Conclusions and Future Directions ► Cloud-based ecosystem is the future of IT. ► Cloud data center composed of different resources to satisfy applications requirements. ► Managing these resources is a complicated task that human can not do it manually. ► Machines in data centers are generating big amount of logs which describe what happen in data center. R&D describe what happen in data center. ► Data scientists and engineers are needed to study system behavior and data center optimization. ► This will result to the next generation data centers which are self-tuning and need minimum human efforts.
  • 15. References [1] U.S Census Bureau News : http://www2.census.gov/retail/releases/historical/ecomm/14q4.pdf [2] Akamai Newsroom : http://www.akamai.com/html/about/press/releases/2009/press_091409.html [3] High Scalability Blog : http://highscalability.com/latency-everywhere-and-it-costs-you-sales-how-crush-it [4] High Availability : https://en.wikipedia.org/wiki/High_availability [5] European Commission on Renewable Energy : https://ec.europa.eu/energy/en/topics/renewable- energy R&D energy [6] ISSUE Brief : https://www.nrdc.org/sites/default/files/data-center-efficiency-assessment-IB.pdf [7] ISSUE Paper : https://www.nrdc.org/sites/default/files/data-center-efficiency-assessment-IP.pdf [8] Turbotonic white paper “Licensing, Compliance & Audits in the Cloud Era”, 2015. [9] CloudPhysics, Global IT Data Lake Report, Q4 2016