150 likes | 282 Views
SEWP IT Trends. Our Vision / Mission for SEWP. “ To be the premier customer-focused contract vehicle for federal government purchases of IT products”. “ To serve up fresh technology for federal agencies”. Hardware. Software. Maintenance. IT Solutions. SEWP by the numbers.
E N D
Our Vision / Mission for SEWP “ To be the premier customer-focused contract vehicle for federal government purchases of IT products” “ To serve up fresh technologyfor federal agencies” Hardware Software Maintenance IT Solutions
SEWP by the numbers 1,000,000+ Line Items550,000+ Unique products 16 Competed Prime contractors; 8small businesses 3 Non-competed 8(a) set-aside contracts 2,000+ Manufacturers 24 Hours to add new products
Focus for Today • Survey of current SEWP Contract Holders plus meetings with 45+ industry leaders point towards key areas of emphasis in IT industry • Focus on a few trends in • Computer technology • Storage / Archiving • Security • Example of SEWP and new technology • Not comprehensive for Industry or SEWP
Computer Technology - CPU • Dual / Quad / … CPUs • AMD and Intel both have dual-core processors now • http://www.amd.com/us-en/Processors/ProductInformation/0,,30_118_8825,00.html • http://www.intel.com/business/bss/products/server/dual-core.htm?ppc_cid=ggl|dualcor_b2b|k3675|s • Quad core processors in 2007 • Improved power for less heat and energy • Software price implications
Computer Technology - Disk • Disk Technology • SATA: Serial ATA drives ( standard in HDD/motherboard interfaces) are fast with the first generation having a volume of 150 MB/sec compared to Parallel ATA (PATA) drive's 100 MB/sec. SATA 3Gb/s is predicted to go up to 300 MB/sec. This compares to USB interfaces at 60 MB/sec and firewire volume of 200 MB/sec. • http://www.sata-io.org
Computer Technology – Blades and Desktops • Centralized PC Blade Solutions • Example: ClearCube • http://www.clearcube.com • PC Blade – rack mounted computer • Cage – houses up to 8 PC blades • User port – VHS-sized desk unit (replaces desktop PC) • Central management software
Storage Virtualization • Definition • An intelligent device that sits in front of external storage systems and provides various levels of system and data management functionality. The storage virtualization platform is essentially a storage controller that manages external storage systems. (The Storage Virtualization Landscape by The Enterprise Strategy Group (ESG) • http://www.hds.com/pdf/Storage%20Virtualization%20Landscape%20ESG%20Report%20July%202005.pdf • Virtualization Objectives • Masking complexity of infrastructure • Maximize Storage utilization by creating virtual pools of storage resources • Movement without disruption and Centralized Management • Leading companies • EMC, IBM, NetApp and Hitachi.
Storage Virtualization Example • The Hitachi TagmaStore USP : a high-end storage virtualization solution • www.hds.com • • Maximum of 192 FC ports • •Maximum of 128 GB of cache memory • • Up to 16 Ethernet ports for NAS connectivity • • Support for up to 32 PB of managed storage capacity • • Up to 2 million IOPS • FC, Escon and Ficon connectivity in any combination
E-mail Archiving and Storage • Information Lifecycle Management (ILM) • Retention and storage of e-mail • Enormous quantity • Retention Policies/ Regulation • User needs and wants • http://www.windowsitpro.com/Article/ArticleID/47139/Windows_47139.html • Example of Current Technology: Veritas Enterprise Vault • http://eval.veritas.com/mktginfo/products/Datasheets/Data_Protection/ent_vault_6_corporate_overview_04182005_dsht.pdf • Enterprise Vault software helps address: • • Application Storage Management • • Compliance Retention & Discovery • • Operational Excellence • • Knowledge Exploitation • • Upgrade, Migration & Consolidation
Global Data Services • High performance and secure access to shared data across Wide Area Network • Geographic Caching • Access-Sensitive Data Migration • Distributed Meta-Data Directories • Site-Aware Geographic RAID • Multi-Site Synchronous I/O • Coherent Asynchronous I/O • Network Fencing and Incremental Re-Synch • Parallel High-Speed Data Transport • http://www.yottayotta.com/global.html
Wireless Security • WiFi Wireless with integrated FIPS 140-2 and 802.11i security • Example: 3e Technologies Inc. • wireless infrastructure networking options centered on secure access points: DoD-proven security, mesh networking, ruggedized enclosures, harsh environments, extreme temperatures, wireless video, bridging, repeating, • http://www.3eti.com/
Enterprise-Wide Information Protection • Need to mitigate risk and meet strict information protection requirements • Example: Vormetric CoreGuard • Personal Data Privacy Protection • Digital Information Asset Protection • Enforcement of IT Governance Policies • http://www.vormetric.com/solutions/
Physical Access / Biometrics • Card scanners • Iris scanners • Facial Recognition • Fingerprint access • Digital Fingerprint capture • Example: Lite-X • http://www.lite-x.net/Technical_Specs/technical_specs.html • Fingerprint / demographic / signature capture • Immediate quality checking, display, formatting, electronic transmission
Thank You! V. 08/02/2005