Podcast 1:7 - History and Future of Data Center Architectures

Podcast 1:7 - History and Future of Data Center Architectures

Released Tuesday, 29th October 2019
Good episode? Give it some love!
Podcast 1:7 - History and Future of Data Center Architectures

Podcast 1:7 - History and Future of Data Center Architectures

Podcast 1:7 - History and Future of Data Center Architectures

Podcast 1:7 - History and Future of Data Center Architectures

Tuesday, 29th October 2019
Good episode? Give it some love!
Rate Episode
List




In this episode, the history of data center architecture and application development is reviewed, and the trends of application development shaping the data center of the future. Find out how containers, serverless, and data mesh architectures are being leveraged to decrease deployment times and increase reliability.




Purpose Built Hardware-software Stacks

  • Build Hardware based on software stack requirements.
  • Long Development Times
  • No re-use of technology
  • Technology moves too fast
  • Hard to integrate with other applications
  • Creates technical debt


Virtualization Architectures

  • 20 years old technology (VMWare, KVM, HyperV)
  • Common Hardware re-use
  • Decrease Cost
  • Security concerns increase
  • Noisy neighbors


Cloud Architectures

  • Abstract and simplify Operations
  • Common Hardware re-use
  • Decrease Cost OpEx and CapEx
  • Bursting ability
  • Security concerns increase
  • Noisy neighbors
  • Integration costs


Service and Container Architectures

  • Automatic deployment across Clouds
  • Optimized OpEx and CapEx
  • Fault tolerance
  • Easier Integration
  • Security concerns increase
  • Increased complexity
  • Where’s my data


Internet of Things Architectures

  • Increase the amount of Data
  • Visibility increases
  • Security concerns increase
  • Increased complexity
  • Where’s my data


Data and Information Management Architectures

  • Automatic data management
  • Data Locality
  • Data Governance
  • Security concerns increase
  • Classification Profiles Not supported


Security and Identity Aspects

  • Common Identity (People, Devices, Software)
  • Access, Authorization, Authentication
  • Detect attacks throughout the ecosystem
  • Establish root of trust from through the stack
  • Quarantine with reliability
Show More