founder and ceo [email protected]
TRANSCRIPT
Alan Gin Founder and CEO
ZeroNines Mission
2
Provide business continuity solutions
to protect organizations and their
data, transactions, and customers.
Always Available™
Confidential – Not for Distribution. ©ZeroNines Technology, Inc. – Contact: [email protected] – Visit: www.ZeroNines.com
Agenda
3
Confidential – Not for Distribution. ©ZeroNines Technology, Inc. – Contact: [email protected] – Visit: www.ZeroNines.com
• What ZeroNines is
• What ZeroNines is not
• Customer Positioning
• Target
• Starting the conversation
What ZeroNines is…
4
Confidential – Not for Distribution. ©ZeroNines Technology, Inc. – Contact: [email protected] – Visit: www.ZeroNines.com
• Always Available Application protection
• In Data Center
• In Cloud
• In hybrid
• Multi-site
• Geographically dispersed
• Active-Active-Active
• Patented
Always Available™
What ZeroNines is not
5
Confidential – Not for Distribution. ©ZeroNines Technology, Inc. – Contact: [email protected] – Visit: www.ZeroNines.com
• Replication
• Fail-over
• Storage
• Disaster Recovery
Customer positioning
6
Confidential – Not for Distribution. ©ZeroNines Technology, Inc. – Contact: [email protected] – Visit: www.ZeroNines.com
• Application resiliency
• Hardware and OS agnostic
• Data Center to Data Center
• Heterogeneous Cloud
• Hybrid Cloud
• DC/Cloud Migration tool
Target use cases
7
Confidential – Not for Distribution. ©ZeroNines Technology, Inc. – Contact: [email protected] – Visit: www.ZeroNines.com
• Business Continuity for Critical Applications
• Data Center to Data Center migration
• Data Center to Cloud migration
• System Maintenance Strategy
• Other
Starting the conversation
8
Confidential – Not for Distribution. ©ZeroNines Technology, Inc. – Contact: [email protected] – Visit: www.ZeroNines.com
• What’s an hour of downtime cost?
• What’s your top 3-5 critical applications?
• What is your Cloud strategy?
• What’s your DR SLA and are you confident that
your DR system will recover within the SLA?
• Is X hours/days really acceptable or are you merely
settling for less…
Always Available™
Customer positioning
9
Confidential – Not for Distribution. ©ZeroNines Technology, Inc. – Contact: [email protected] – Visit: www.ZeroNines.com
• Low latency, business critical applications
• Web 2.0, .NET, Cloud
• Legacy applications (protocol adapters)
• No single-point-of-failure
10
Confidential – Not for Distribution. ©ZeroNines Technology, Inc. – Contact: [email protected] – Visit: www.ZeroNines.com
ZeroNines in Action… July 4, 2005
ZeroNines in Cloud… September 11, 2008
ZenVault for Always Available™ Peace of Mind
• ZenVault is a secure, centralized online library for life’s most important personal data, documents, and records.
• ZenVault provides Safe, Secure, and Always Available™ storage for records using:
– a patented fault tolerant architecture for cloud and data center protection
– a patent pending NSA level encryption technology
• ZenVault empowers the consumer to have control over and access to their stored information through smartphones, tablets and PCs.
14
ZenVault for Always Available™ Problems
• ZenVault can be customized leveraging it’s patent pending encryption and fault tolerance technologies to support specific industries:
– Insurance
– Medical Research
– Military
– Safe, Secure Data Storage
• Consumer
• Corporate
– Safe, Secure and SPAM-less Email
15
What is ZenVault?
ZenVault is a next generation personal data library that
encompasses breakthrough technologies designed to deliver a
safe, secure and Always Available™ user experience. It
provides unparalleled replicated and secure access to private
information on a variety of platforms ranging from Smartphones
and tablets to personal computers.
The price points range from $0-2-5 a month and the product
offering leverages a Freemium subscription model.
• Free iPhone and iPad app available
• Accessible on all Smartphones through mobile browser
• Leverages economics and continuity of CloudNines™
ZenVault Medical for Always Available™ Peace
of Mind
• ZenVault Medical provides Safe, Secure, and Always Available™ storage for the medical records that could save lives.
• ZenVault Medical supports the Personal Health Record (PHR) approach, empowering the consumer to have control over and access to their own information.
• ZenVault Medical utilizes patent pending NSA level encryption technology providing a secure, centralized online library for important personal health data, documents, and records.
17
Use Cases • A Patient is on a First Visit to a New Healthcare Professional
• A Returning Patient Must Fill Out the Standard Health Information
Data Sheet: A.K.A “The Clipboard”
• The Caregiver for Other Family Members
• An Unconscious Patient in the Emergency Room
• Increasing Independence of the Elderly and Disabled
• Filling out or Updating Insurance Forms
• Keeping the Personal Health History Current all the Time
18
Zen Intersection of Information
Designed for Reliability and Security in the
Cloud
ZenVault Architecture
• Cloud
• Virtualization
• Storage Consolidation
• Security/High Availability
• Manage Blogging/Email
• Highly Available and Secure
• Digital Commerce
ZeroNines Technology Advantage
Mitigating Software Risk
Device Neutral
ZenVault: Homepage
26
Sign-In page
27
Create Account page
28
P3: Emergency Access page
29
P3: A lesson for Social Networks: EMS Net
P3: EMS Net View
Personal Health Record (PHR)
32
ZenCryption (Patent pending)
33
In Case of Emergency (ICE)
34
Records Management (Premium)
35
Contacts Management
36
37
QUESTIONS?
38
Select Outages: 1989-2009
THE TRENDS
39
Confidential – Not for Distribution. ©ZeroNines Technology, Inc. – Contact: [email protected] – Visit: www.ZeroNines.com
A technology convergence is enabling new business models and
driving new requirements of technology.
Trends Emerging Business Models Foundational Requirements
Remote Desktop Applications
Google Docs, Microsoft Live, ZOHO
Platform as a Service (PaaS)
Salesforce.com, Google Apps
Software as a Service (Saas)
Salesforce.com, NetSuite
Infrastructure as a Service (IaaS)
IronScale, Amazon Web Services
Consumption based
Pay-as-You-Go
40
Confidential – Not for Distribution. ©ZeroNines Technology, Inc. – Contact: [email protected] – Visit: www.ZeroNines.com
Driving
Borderless
Business
Cloud
Computing
Virtualization
360o
Security
Mobile
Enterprise
Security
Reliability
Regulatory Compliance
Standardization
Ownership Balance
Governance Model
Enabling
THE BUSINESS
CHALLENGE
41
Confidential – Not for Distribution. ©ZeroNines Technology, Inc. – Contact: [email protected] – Visit: www.ZeroNines.com
What Are the Threats?
42
HARDWARE & SOFTWARE DATA CENTER REGIONAL
Component failures
Software failures
Backup system failures
Maintenance
Accidents and mistakes
Fire damage or fire
retardant systems
Terrorism
Acts of nature
Loss of power
Loss of communications
X X
Confidential – Not for Distribution. ©ZeroNines Technology, Inc. – Contact: [email protected] – Visit: www.ZeroNines.com
Confidential – Not for Distribution. ©ZeroNines Technology, Inc. – Contact: [email protected] – Visit: www.ZeroNines.com
Customer Situation
• Software applications are central to business
Wasn’t true decades ago except in a few industries
Now revenue and reputation, not just back-office bean counting,
are “on the line”—because businesses are online
Downtime is more expensive now than ever
• Legacy disaster recovery approaches don’t meet current and
anticipated requirements
Legacy architectures cannot assure business continuity
“Recovery” is what happens after a disaster has already
damaged the business
• The impact of downtime on businesses has risen faster than
DR/BC effectiveness
43
Customer Technical Problem Overview
Problems with Legacy DR/BC Architectures
44
Confidential – Not for Distribution. ©ZeroNines Technology, Inc. – Contact: [email protected] – Visit: www.ZeroNines.com
Global information access
Security
Application availability
Business continuity
Data replication
Support diverse systems
Reduce overall risk
Cut disaster prep costs
Regulatory compliance
THE ZERONINES
SOLUTION
45
Confidential – Not for Distribution. ©ZeroNines Technology, Inc. – Contact: [email protected] – Visit: www.ZeroNines.com
Confidential – Not for Distribution. ©ZeroNines Technology, Inc. – Contact: [email protected] – Visit: www.ZeroNines.com
The ZeroNines Architecture
The Synchronizer restores
applications that have gone
down, by processing
transactions they missed
while offline (as recorded by
the Journal).
The Guaranteed Message
Service ensures that all
messages are received in the
proper sequence between
nodes and switches.
The Journal captures and
logs all transactions and
serves as a source for audit
and recovery purposes.
ZeroNines in Action…
Here’s What Happens:
1. Server calls are originated by
networked clients: computers, email,
PDAs, phones, business software,
databases, etc.
2. Each transaction passes through
the ZeroNines Smart Switch Nodes,
which route it simultaneously to all
virtual servers in a one-to-many
(1:m) session.
3. Processing and storage take place
equally in all servers. All servers and
their apps are hot, and all are active.
There are no primary or secondary
servers.
4. All transactions and data exchanges
are recorded, verified, and subjected to
security measures.
5. Each virtual server sends its
responses back through the Smart
Switch Nodes.
6. The Smart Switch Nodes
cooperatively eliminate duplicate
responses and return a single response
to the client that originated it.
47
Confidential – Not for Distribution. ©ZeroNines Technology, Inc. – Contact: [email protected] – Visit: www.ZeroNines.com
ZeroNines in Action… July 4, 2005
ZeroNines in Cloud… September 11, 2008
ZeroNines in Action…
Always Available™ Technical Solution Overview
51
Confidential – Not for Distribution. ©ZeroNines Technology, Inc. – Contact: [email protected] – Visit: www.ZeroNines.com
Global information access
Security
Application availability
Business continuity
Data replication
Support diverse systems
Reduce overall risk
Cut disaster prep costs
Regulatory compliance
52
ZeroNines Products
Continuity Module Maintains business continuity.
Prevents applications & data
from going offline.
Audit Module Maps all transactions.
Tracks & records every transaction
for security and to facilitate rebuild.
Rebuild Module Restores other services.
Replays transactions so other
entities can be rebuilt to the same
logical state.
Confidential – Not for Distribution. ©ZeroNines Technology, Inc. – Contact: [email protected] – Visit: www.ZeroNines.com
Confidential – Not for Distribution. ©ZeroNines Technology, Inc. – Contact: [email protected] – Visit: www.ZeroNines.com
ZeroNines Benefits Summary
• Enables business continuity by overcoming the
challenges of legacy designs.
• Auditable for assurance, compliance and
application development and integration.
Customer can see the solution running always
Assurance is easy, quick, and costs practically nothing
Enables application troubleshooting at the transaction level
Regulatory compliance (e.g. HIPAA, SOX, Patriot Act) is supported
• Easy to configure & maintain.
No application rewrite required
No need to take the protected application offline for maintenance
Mix-and-match platforms
53
Design Principles
1:m transactions
Nodes (servers) process each transaction request completely, independently, simultaneously and return the result to the switch (requestor).
Duplicate replies are filtered on the switch so a single result is returned to the requesting application.
Journaling feature tracks and records every transaction for audit, security, and automatic server rebuild.
Server hierarchy is eliminated
No primary vs. secondary—not even first-among-equals. All servers are hot, all apps are active.
Eliminates single points of failure
No failover. Ever. Failover has been “designed out.”
Always Available architecture is application, OS, and platform agnostic, accommodating your
existing equipment and vendor-specific products and services.
54
Confidential – Not for Distribution. ©ZeroNines Technology, Inc. – Contact: [email protected] – Visit: www.ZeroNines.com
Diverse OS, applications, hardware, and product sets are accommodated
Agnostic regarding applications, OS, hardware, and platform
Integrates seamlessly with existing infrastructure and systems despite differing speeds, capacities, networks, applications, OS, hardware, vendors, etc.
Server sites are geographically diverse
Distance
Federal Working Paper suggests hundreds of miles
AlwaysAvailable™ supports thousands of miles
Distinct utilities & transportation
Logical resources
Anti-virus? Staff procedures?
ZeroNines Sweet Spot:
Target Application Characteristics:
Application Platforms:
HTTP / HTTPS
• Apache / Tomcat
• Microsoft ASP.NET
Electronic Mail – POP3 & SMTP
SLA Requirement:
7x24 availability
Application RTO approaches 0
Application Attributes:
HTTP – web browser/web service accessed
Deterministic
Mid OLTP profile
Difficult-to-replicate technologies (i.e. RDBMS)
Operating Platforms:
Virtualized Environments
• Microsoft Server 2008 Hyper-V Certified
• VMWare ESX Server
Cloud Computing Environment
• Amazon EC2
• Microsoft Azure
55
Confidential – Not for Distribution. ©ZeroNines Technology, Inc. – Contact: [email protected] – Visit: www.ZeroNines.com
TARGET CUSTOMERS
56
Confidential – Not for Distribution. ©ZeroNines Technology, Inc. – Contact: [email protected] – Visit: www.ZeroNines.com
Legend: Strong Applicability Niche Applicability Limited Applicability
Retail POS, inventory, authorization
Healthcare Critical care systems, EMR
Insurance Origination, underwriting
Oil & Gas 24x7 continuous processing systems
Manufacturing Multi-site operations dependent on
real-time supply chain
Financial Service Funding, payment, online banking
Telecommunications Call center applications
Utilities Call center applications
Pharmaceuticals Regulatory/compliance, clinical trials,
supply chain
Government Call center applications
Internet & Online eCommerce, on-line support
Transportation Dispatch, fleet management, routing
Logistics Warehousing, distribution, inventory
Construction Regulatory & safety
Continuity Module Audit Module Rebuild Module
Small Medium Large Small Medium Large Small Medium Large
Critical Applications
Industry Map
57
Confidential – Not for Distribution. ©ZeroNines Technology, Inc. – Contact: [email protected] – Visit: www.ZeroNines.com
Cloud Computing Observations
and the
Value of CloudNines™
Cloud computing ≈ utility computing on the Internet (or intranet)
• Processing and storage as a service
– “Computing plant” physically distant from users
• Aggregates demand from wide geographic area
• Enabled by commercially ubiquitous broadband networking
• Relatively inexpensive real estate and electricity
• Elasticity in resource utilization and pricing
– No premium for scale-up or discount for scale-down
• 1,000 servers x 1 hour = 1,000 hours x 1 server
– Apparently-infinite resource expansion for all but largest users
• Utility-like pricing & reliability requirements
– Security is a key issue still being addressed
– So is reliability, measured as uptime % (“availability”)
• ZeroNines enables utility-like application availability
– Unlimited-distance Transaction MultiSynch™ compliments intra-center elasticity of
cloud providers, both public and private
Key technology: digital networking
• Broadband now
commercially ubiquitous
• Price:performance up 2.7x
in 5 years
• CPU improvement is main
enabler of virtualization on
low-end hardware
Key technology: virtualization, especially for server consolidation
• Business case irresistible in
F100 in recent years
– when unadjusted for changes
in catastrophic risk
• Asset consistency drives
opex savings today
– Volume discounts are
overwhelming at cloud utility
scale
• Electricity rates drive long-
term expense advantages
Long-term, Cloud utilities offer more experience less expensively than all
but the best and busiest IT organizations
• Key technologies already available
• Providers with competitive pricing get first chance at experience,
especially in a budget-bruised financial-crisis world
– Cloud providers command purchase discounts of immense scale
• Asset consistency anchors discounts of 80% vs. medium-size data centers—a
big advantage now
– Cloud providers can locate “anywhere” that electricity and land are cheap and
broadband is available—an even bigger advantage later
• ZeroNines’ unlimited-distance feature is a powerful enabler for private and
public cloud providers
• Experience accrues to IT teams with the most challenges per year
– Teams at even modest –size hosting providers get more experience each year
than most medium and small businesses
• Specialization and quality of scope
• Utility transition will require decades, but the writing is on the wall
McKinsey: today, larger enterprises command better TCO…
S M L XL
EC2 Instance Size
20
60
100
140
180
EC2 monthly CPU-equivalent virtual core prices
($)
Typical data center assets cost
$45 / month / CPU equivalent
“Typical data center”: $20M/MW,
$0.1/kwh,$14K/server (2 x 4), 10% utilization
Windows On demand
Pre-pay Linux
Higher
TCO
TCO
Lower
• TCO of most EC2
options exceeds
enterprise TCO
• Enterprises get lower
TCO via pre-pay, but
only for Linux
Z9: cloud providers will provide superior uptime minutes/$, particularly of
“commodity” apps, compared to all but the best and busiest IT shops
• Long-term, public cloud providers outperform most U.S. business IT functions in “uptime minutes / $”
• Amazon’s SLA already > 80% of SMB’s
• Amazon’s cloud computing SLA (for example) : 99.5% availability
• Good; not enough for AlwaysAvailable™ customers
• US Census: 80% of U.S. businesses < 500 headcount
• Z9: Their IT resources are disproportionately lower, so their uptime is disproportionately lower than in the IDC survey
• IDC Survey: 99% availability in firms averaging 3,298 headcount
Start
But 99.5% isn’t adequate for many applications. Downtime cost is easy to
underestimate, because it hits revenue (1x) and reputation (12x).
Server consolidation increases catastrophic risk exponentially.
Server hardware availability improvements can’t keep up with that
exponential growth in catastrophic risk, so better architecture is needed.
“Failover” architecture is failure waiting to happen. Diligence can’t fix it.
MyFailSafe in Action… July 4, 2005
MyFailSafe in Action…
The ZeroNines Solution
Appendix