democratizing access to science – reservoir simulation...
TRANSCRIPT
Arun NarayananCloud, Content & Big Data Business Manager
April 22, 2014George R. Brown Convention Center, Houston, Texas USA
Democratizing Access to Science –Reservoir Simulation in the Cloud
Lower Oil Prices – the new reality
Reliability
Efficiency
TechnologyIntegrationReliability – Technical challenges demand access to the best scienceIntegration – Users demand solutions tightly integrated with their workflowEfficiency – Operators are universally challenged to do more with less
Democratize access – improve customer access to technology
What is INTERSECT? – most accurate and reliable reservoir simulator
INTERSECT allows engineers to accurately and efficiently model• Complex geological
structures• Highly heterogeneous
formations• Challenging wells and
completion configurations • Advanced production
controls
Why INTERSECT in the cloud?
Most accurate and reliable
simulatorHigh
resolution Scalable Leverages HPC
Democratize access – improve customer access to technology
Why HPC in Cloud?Existing scenarios:
Managed Scale
Elastic Pay for use
New possibilities:
Unlimited INTERSECT in the cloud – available this quarter
Subscription provides
monthly accessFully integrated
workflowOPEX not CAPEX No hardware
Flexible licenses & hardware
Scale to demand Always Current Admin & IT
included
Value of INTERSECT in the cloud – contrasting on-prem with cloud
INTERSECT on premise INTERSECT in the cloud
HPC Hardware procurement Get approvals (weeks-months) No HPC hardware required
Capital Outlay CAPEX for hardware, $$$ No CAPEX required
Commitment Long-term commitment No commitment required
Total planning time required Months Days
Flexibility to increase compute or software licenses
Long cycle (repeat steps above) Easy to implement (hours)
Remote access Complex VPN required Works anywhere with Internetaccess – even with hotel wi-fi
Value of INTERSECT in the cloud – results
INTERSECT on premise INTERSECT in the cloud
How well does it perform? – overhead is 3-7% of total job time
Upload to Azure• Encrypted
Simulate• User chooses # of cores
Download Results• Encrypted
0
100
200
300
400
500
600
700
800
6M Cell 25M cell 75M Cell
Full Workflow times (minutes)
Upload Simulation Download
Data submission and Retrieval is approx. 7% of workflow
For larger models this reduces to approx. 3% of workflow
Azure scales consistently for 6M, 25M, and 75M cell models
Huge infrastructure scale is the enabler19 Regions ONLINE…huge datacenter capacity around the world…and we’re growing
100+ datacenters One of the top 3 networks in the world (coverage, speed, connections)
Operational Announced
Central USIowa
West USCalifornia
North EuropeIreland
East USVirginia
East US 2Virginia
US GovVirginia
North Central USIllinois
US GovIowa
South Central USTexas
Brazil SouthSao Paulo
West EuropeNetherlands
China North *Beijing
China South *Shanghai
Japan EastSaitama
Japan WestOsakaIndia West
TBD
India EastTBD
East AsiaHong Kong
SE AsiaSingapore
Australia WestMelbourne
Australia EastSydney
* Operated by 21Vianet
Cameras / Alarms
24X7 security staff
Barriers / Fencing
Days of backup power
Two-factor access control
Secure By Design
Operation Security Control
Compliance Certifications
Forensics
Penetration Testing
Secure and Isolated VNets
Inbound VNet ACLs
Forced Tunneling
Multiple virtual NICs
Security Appliances
Anti-Malware
VM Security Extensions
Role-Based Access Control
Encrypted VHD Boot
Logging / Auditing
Trust and Control
Security – Customer is in control of privacy & security
Identity and Access
Management
AES-256Data
Encryption
Data not left in the
cloud
Application Access
Management
Highly secure system for managing identities, along with support for delegation of administration to customers.
Strong standard for data encryption
Customer is the owner and holder of the private encryption key, which is not accessible by cloud providers or Schlumberger
Customer data is not stored in the Cloud and is deleted immediately it is delivered to the customer’s desktop
Data Deletion is recorded for verification
Access control and multi-factor authentication brings one more layer of security when data is submitted
Governance SSAE-16
Subject to regular independent audits.
Compliance with required policies and standards including SSAE16, ISO 27001
Current project status – beta testing
Beta test ongoing in Europe &
North America
Commercial launch this
quarter
Schlumberger-Private