Image Title

Search Results for Asics:

Google's PoV on Confidential Computing NO PUB


 

>> Welcome Nelly and Patricia, great to have you. >> Great to be here. >> Thank you so much for having us. >> You're very welcome. Nelly, why don't you start, and then Patricia you can weigh in. Just tell the audience a little bit about each of your roles at Google Cloud. >> So I'll start, I'm honing a lot of interesting activities in Google and again, security or infrastructure securities that I usually hone, and we're talking about encryption, Antware encryption, and confidential computing is a part of portfolio. In additional areas that I contribute to get with my team to Google and our customers is secure software supply chain. Because you need to trust your software. Is it operating your confidential environment to have end to end story about if you believe that your software and your environment doing what you expect, it's my role. >> Got it, okay. Patricia? >> Well I am a technical director in the office of the CTO, OCTO for short, in Google Cloud. And we are a global team. We include former CTOs like myself and senior technologies from large corporations, institutions, and a lot of success for startups as well. And we have two main goals. First, we work side by side with some of our largest, more strategic or most strategic customers and we help them solve complex engineering technical problems. And second, we are device Google and Google Cloud engineering and product management on emerging trends in technologies to guide the trajectory of our business. We are unique group, I think, because we have created this collaborative culture with our customers. And within OCTO I spend a lot of time collaborating with customers in the industry at large on technologies that can address privacy, security, and sovereignty of data in general. >> Excellent, thank you for that both of you. Let's get into it. So Nelly, what is confidential computing from Google's perspective? How do you define it? >> Confidential computing is a tool. And it's one of the tools in our toolbox. And confidential computing is a way how would help our customers to complete this very interesting end to end lifecycle of their data. And when customers bring in the data to Cloud and want to protect it, as they ingest it to the Cloud, they protect it address when they store data in the Cloud. But what was missing for many, many years is ability for us to continue protecting data and workloads of our customers when they running them. And again, because data is not brought to Cloud to have huge graveyard, we need to ensure that this data is actually indexed. Again there is some insights driven and drawn from this data. You have to process this data and confidential computing here to help. Now we have end to end protection of our customer's data when they bring the workloads and data to Cloud, thanks to confidential computing. >> Thank you for that. Okay, we're going to get into the architecture a bit but before we do Patricia, why do you think this topic of confidential computing is such an important technology? Can you explain, do you think it's transformative for customers and if so, why? >> Yeah, I would maybe like to use one thought, one way, one intuition behind why confidential matters. Because at the end of the day it reduces more and more the customers thrush boundaries and the attack surface, that's about reducing that periphery, the boundary, in which the customer needs to mind about trust and safety. And in a way is a natural progression that you're using encryption to secure and protect data in the same way that we are encrypting data in transit and at rest. Now we are also encrypting data while in use. And among other beneficial I would say one of the most transformative ones is that organizations will be able to collaborate with each other and retain the confidentiality of the data. And that is across industry. Even though it's highly focused on, I wouldn't say highly focused, but very beneficial for highly regulated industries. It applies to all of industries. And if you look at financing for example, where bankers are trying to detect fraud and specifically double finance where you are a customer is actually trying to get a finance on an asset, let's say a boat or a house and then it goes to another bank and gets another finance on that asset. Now bankers would be able to collaborate and detect fraud while preserving confidentiality and privacy of the of the data. >> Interesting, and I want to understand that a little bit more but I'm going to push you a little bit on this, Nelly, if I can, because there's a narrative out there that says confidential computing is a marketing ploy. I talked about this upfront, by Cloud providers that are just trying to placate people that are scared of the Cloud. And I'm presuming you don't agree with that but I'd like you to weigh in here. The argument is confidential computing is just memory encryption, it doesn't address many other problems, it is overhyped by Cloud providers. What do you say to that line of thinking? >> I absolutely disagree as you can imagine, it's a crazy statement. But the most importantly is we mixing multiple concepts I guess. And exactly as Patricia said, we need to look at the end-to-end story not again the mechanism of how confidential computing trying to again execute and protect customer's data, and why it's so critically important. Because what confidential computing was able to do it's in addition to isolate our tenants in multi-tenant environments the Cloud over. To offer additional stronger isolation, we called it cryptographic isolation. It's why customers will have more trust to customers and to other customers, the tenants that's running on the same host but also us, because they don't need to worry about against threats and more malicious attempts to penetrate the environment. So what confidential computing is helping us to offer our customers, stronger isolation between tenants in this multi-tenant environment but also incredibly important, stronger isolation of our customers. So tenants from us, we also writing code, we also software providers will also make mistakes or have some zero days sometimes again us introduced, sometimes introduced by our adversaries. But what I'm trying to say by creating this cryptographic layer of isolation between us and our tenants, and amongst those tenants, they're really providing meaningful security to our customers and eliminate some of the worries that they have running on multi-tenant spaces or even collaborating together this very sensitive data, knowing that this particular protection is available to them. >> Okay, thank you, appreciate that. And I, you know, I think malicious code is often a threat model missed in these narratives. You know, operator access, yeah, could maybe I trust my Clouds provider, but if I can fence off your access even better I'll sleep better at night. Separating a code from the data, everybody's arm Intel, AM, Invidia, others, they're all doing it. I wonder if Nell, if we could stay with you and bring up the slide on the architecture. What's architecturally different with confidential computing versus how operating systems and VMs have worked traditionally? We're showing a slide here with some VMs, maybe you could take us through that. >> Absolutely, and Dave, the whole idea for Google and industry way of dealing with confidential computing is to ensure as it's three main property is actually preserved. Customers don't need to change the code. They can operate in those VMs exactly as they would with normal non-confidential VMs. But to give them this opportunity of lift and shift or no changing their apps and performing and having very, very, very low latency and scale as any Cloud can, something that Google actually pioneered in confidential computing. I think we need to open and explain how this magic was actually done. And as I said, it's again the whole entire system have to change to be able to provide this magic. And I would start with we have this concept of root of trust and root of trust where we will ensure that this machine, the whole entire post has integrity guarantee, means nobody changing my code on the most low level of system. And we introduce this in 2017 code Titan. Those our specific ASIC specific, again inch by inch system on every single motherboard that we have, that ensures that your low level former, your actually system code, your kernel, the most powerful system, is actually proper configured and not changed, not tempered. We do it for everybody, confidential computing concluded. But for confidential computing what we have to change we bring in a MD again, future silicon vendors, and we have to trust their former, their way to deal with our confidential environments. And that's why we have obligation to validate integrity not only our software and our firmware but also firmware and software of our vendors, silicon vendors. So we actually, when we booting this machine as you can see, we validate that integrity of all of this system is in place. It means nobody touching, nobody changing, nobody modifying it. But then we have this concept of the secure processor. It's special Asics best, specific things that generate a key for every single VM that our customers will run or every single node in Kubernetes, or every single worker thread in our Spark capability. We offer all of that, and those keys are not available to us. It's the best keys ever in encryption space. Because when we are talking about encryption the first question that I'm receiving all the time, where's the key, who will have access to the key? Because if you have access to the key then it doesn't matter if you encrypt it enough. But the case in confidential computing quite so revolutionary technology, ask Cloud providers who don't have access to the keys. They're sitting in the hardware and they fed to memory controller. And it means when Hypervisors that also know about these wonderful things, saying I need to get access to the memories that this particular VM I'm trying to get access to. They do not encrypt the data, they don't have access to the key. Because those keys are random, ephemeral and VM, but the most importantly in hardware not exportable. And it means now you will be able to have this very interesting role that customers all Cloud providers, will not be able to get access to your memory. And what we do, again, as you can see our customers don't need to change their applications. Their VMs are running exactly as it should run. And what you're running in VM you actually see your memory in clear, it's not encrypted. But God forbid is trying somebody to do it outside of my confidential box. No, no, no, no, no, you will not be able to do it. Now you'll see cybernet. And it's exactly what combination of these multiple hardware pieces and software pieces have to do. So OS is also modified, and OS is modified such way to provide integrity. It means even OS that you're running in UVM bucks is not modifiable and you as customer can verify. But the most interesting thing I guess how to ensure the super performance of this environment because you can imagine, Dave, that's increasing it's additional performance, additional time, additional latency. So we're able to mitigate all of that by providing incredibly interesting capability in the OS itself. So our customers will get no changes needed, fantastic performance, and scales as they would expect from Cloud providers like Google. >> Okay, thank you. Excellent, appreciate that explanation. So you know again, the narrative on this is, well you know you've already given me guarantees as a Cloud provider that you don't have access to my data but this gives another level of assurance. Key management as they say is key. Now you're not, humans aren't managing the keys the machines are managing them. So Patricia, my question to you is in addition to, you know, let's go pre-confidential computing days what are the sort of new guarantees that these hardware-based technologies are going to provide to customers? >> So if I am a customer, I am saying I now have full guarantee of confidentiality and integrity of the data and of the code. So if you look at code and data confidentiality the customer cares then they want to know whether their systems are protected from outside or unauthorized access. And that we covered with Nelly that it is. Confidential computing actually ensures that the applications and data antennas remain secret, right? The code is actually looking at the data only the memory is decrypting the data with a key that is ephemeral, and per VM, and generated on demand. Then you have the second point where you have code and data integrity and now customers want to know whether their data was corrupted, tempered, with or impacted by outside actors. And what confidential computing insures is that application internals are not tampered with. So the application, the workload as we call it, that is processing the data it's also it has not been tempered and preserves integrity. I would also say that this is all verifiable. So you have attestation, and this attestation actually generates a log trail and the log trail guarantees that provides a proof that it was preserved. And I think that the offers also a guarantee of what we call ceiling, this idea that the secrets have been preserved and not tempered with. Confidentiality and integrity of code and data. >> Got it, okay, thank you. You know, Nelly, you mentioned, I think I heard you say that the applications, it's transparent,you don't have to change the application it just comes for free essentially. And I'm, we showed some various parts of the stack before. I'm curious as to what's affected but really more importantly what is specifically Google's value add? You know, how do partners, you know, participate in this? The ecosystem or maybe said another way how does Google ensure the compatibility of confidential computing with existing systems and applications? >> And a fantastic question by the way. And it's very difficult and definitely complicated world because to be able to provide these guarantees actually a lot of works was done by community. Google is very much operate and open. So again, our operating system we working in this operating system repository OS vendors to ensure that all capabilities that we need is part of their kernels, are part of their releases, and it's available for customers to understand and even explore if they have fun to explore a lot of code. We have also modified together with our silicon vendors, kernel, host kernel, to support this capability and it means working this community to ensure that all of those patches are there. We also worked with every single silicon vendor as you've seen, and that's what I probably feel that Google contributed quite a bit in this role. We moved our industry, our community, our vendors to understand the value of easy to use confidential computing or removing barriers. And now I don't know if you noticed Intel is pulling the lead and also announcing the trusted domain extension very similar architecture and no surprise, it's again a lot of work done with our partners to again, convince, work with them, and make this capability available. The same with ARM this year, actually last year, ARM unknowns are future design for confidential computing. It's called confidential computing architecture. And it's also influenced very heavily with similar ideas by Google and industry overall. So it's a lot of work in confidential computing consortiums that we are doing. For example, simply to mention to ensure interop, as you mentioned, between different confidential environments of Cloud providers. We want to ensure that they can attest to each other. Because when you're communicating with different environments, you need to trust them. And if it's running on different Cloud providers you need to ensure that you can trust your receiver when you are sharing your sensitive data workloads or secret with them. So we coming as a community and we have this at the station, the community based systems that we want to build and influence and work with ARM and every other Cloud providers to ensure that they can interrupt. And it means it doesn't matter where confidential workloads will be hosted but they can exchange the data in secure, verifiable, and controlled by customers way. And to do it, we need to continue what we are doing. Working open again and contribute with our ideas and ideas of our partners to this role to become what we see confidential computing has to become, it has to become utility. It doesn't need to be so special but it's what what we've wanted to become. >> Let's talk about, thank you for that explanation. Let talk about data sovereignty, because when you think about data sharing you think about data sharing across, you know, the ecosystem and different regions and then of course data sovereignty comes up. Typically public policy lags, you know, the technology industry and sometimes is problematic. I know, you know, there's a lot of discussions about exceptions, but Patricia, we have a graphic on data sovereignty. I'm interested in how confidential computing ensures that data sovereignty and privacy edicts are adhered to even if they're out of alignment maybe with the pace of technology. One of the frequent examples is when you you know, when you delete data, can you actually prove the data is deleted with a hundred percent certainty? You got to prove that and a lot of other issues. So looking at this slide, maybe you could take us through your thinking on data sovereignty. >> Perfect, so for us, data sovereignty is only one of the three pillars of digital sovereignty. And I don't want to give the impression that confidential computing addresses at all. That's why we want to step back and say, hey, digital sovereignty includes data sovereignty where we are giving you full control and ownership of the location, encryption, and access to your data. Operational sovereignty where the goal is to give our Google Cloud customers full visibility and control over the provider operations, right? So if there are any updates on hardware, software, stack, any operations, that is full transparency, full visibility. And then the third pillar is around software sovereignty where the customer wants to ensure that they can run their workloads without dependency on the provider's software. So they have sometimes is often referred as survivability that you can actually survive if you are untethered to the Cloud and that you can use open source. Now let's take a deep dive on data sovereignty, which by the way is one of my favorite topics. And we typically focus on saying, hey, we need to care about data residency. We care where the data resides because where the data is at rest or in processing it typically abides to the jurisdiction, the regulations of the jurisdiction where the data resides. And others say, hey, let's focus on data protection. We want to ensure the confidentiality and integrity and availability of the data which confidential computing is at the heart of that data protection. But it is yet another element that people typically don't talk about when talking about data sovereignty, which is the element of user control. And here Dave, is about what happens to the data when I give you access to my data. And this reminds me of security two decades ago, even a decade ago, where we started the security movement by putting firewall protections and login accesses. But once you were in, you were able to do everything you wanted with the data, an insider had access to all the infrastructure, the data, and the code. And that's similar because with data sovereignty we care about whether it resides, who is operating on the data. But the moment that the data is being processed, I need to trust that the processing of the data will abide by user control, by the policies that I put in place of how my data is going to be used. And if you look at a lot of the regulation today and a lot of the initiatives around the International Data Space Association, IDSA, and Gaia X, there is a movement of saying the two parties, the provider of the data and the receiver of the data going to agree on a contract that describes what my data can be used for. The challenge is to ensure that once the data crosses boundaries, that the data will be used for the purposes that it was intended and specified in the contract. And if you actually bring together, and this is the exciting part, confidential computing together with policy enforcement. Now the policy enforcement can guarantee that the data is only processed within the confines of a confidential computing environment. That the workload is cryptographically verified that there is the workload that was meant to process the data and that the data will be only used when abiding to the confidentiality and integrity, safety of the confidential computing environment. And that's why we believe confidential computing is one, necessary and essential technology that will allow us to ensure data sovereignty especially when it comes to user control. >> Thank you for that. I mean it was a deep dive, I mean brief, but really detailed, so I appreciate that, especially the verification of the enforcement. Last question, I met you two because as part of my year end prediction post you guys sent in some predictions, and I wasn't able to get to them in the predictions post. So I'm thrilled that you were able to make the time to come on the program. How widespread do you think the adoption of confidential computing will be in '23 and what's the maturity curve look like, you know, this decade in, in your opinion? Maybe each of you could give us a brief answer. >> So my prediction in five, seven years as I started, it'll become utility. It'll become TLS. As of, again, 10 years ago we couldn't believe that websites will have certificates and we will support encrypted traffic. Now we do, and it's become ubiquity. It's exactly where our confidential computing is heading and heading, I don't know if we are there yet yet. It'll take a few years of maturity for us, but we'll do that. >> Thank you, and Patricia, what's your prediction? >> I would double that and say, hey, in the future, in the very near future you will not be able to afford not having it. I believe as digital sovereignty becomes ever more top of mind with sovereign states and also for multinational organizations and for organizations that want to collaborate with each other, confidential computing will become the norm. It'll become the default, If I say mode of operation, I like to compare that, today is inconceivable if we talk to the young technologists. It's inconceivable to think that at some point in history and I happen to be alive that we had data at address that was not encrypted. Data in transit, that was not encrypted. And I think that we will be inconceivable at some point in the near future that to have unencrypted data while we use. >> You know, and plus, I think the beauty of the this industry is because there's so much competition this essentially comes for free. I want to thank you both for spending some time on Breaking Analysis. There's so much more we could cover. I hope you'll come back to share the progress that you're making in this area and we can double click on some of these topics. Really appreciate your time. >> Anytime. >> Thank you so much.

Published Date : Feb 10 2023

SUMMARY :

Patricia, great to have you. and then Patricia you can weigh in. In additional areas that I contribute to Got it, okay. of the CTO, OCTO for Excellent, thank you in the data to Cloud into the architecture a bit and privacy of the of the data. but I'm going to push you a is available to them. we could stay with you and they fed to memory controller. So Patricia, my question to you is and integrity of the data and of the code. that the applications, and ideas of our partners to this role is when you you know, and that the data will be only used of the enforcement. and we will support encrypted traffic. and I happen to be alive and we can double click

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
NellyPERSON

0.99+

PatriciaPERSON

0.99+

International Data Space AssociationORGANIZATION

0.99+

DavePERSON

0.99+

GoogleORGANIZATION

0.99+

IDSAORGANIZATION

0.99+

last yearDATE

0.99+

2017DATE

0.99+

two partiesQUANTITY

0.99+

oneQUANTITY

0.99+

twoQUANTITY

0.99+

second pointQUANTITY

0.99+

FirstQUANTITY

0.99+

ARMORGANIZATION

0.99+

first questionQUANTITY

0.99+

fiveQUANTITY

0.99+

bothQUANTITY

0.99+

IntelORGANIZATION

0.99+

two decades agoDATE

0.99+

AsicsORGANIZATION

0.99+

secondQUANTITY

0.99+

Gaia XORGANIZATION

0.99+

OneQUANTITY

0.99+

eachQUANTITY

0.98+

seven yearsQUANTITY

0.98+

OCTOORGANIZATION

0.98+

one thoughtQUANTITY

0.98+

a decade agoDATE

0.98+

this yearDATE

0.98+

10 years agoDATE

0.98+

InvidiaORGANIZATION

0.98+

'23DATE

0.98+

todayDATE

0.98+

CloudTITLE

0.98+

three pillarsQUANTITY

0.97+

one wayQUANTITY

0.97+

hundred percentQUANTITY

0.97+

zero daysQUANTITY

0.97+

three main propertyQUANTITY

0.95+

third pillarQUANTITY

0.95+

two main goalsQUANTITY

0.95+

CTOORGANIZATION

0.93+

NellPERSON

0.9+

KubernetesTITLE

0.89+

every single VMQUANTITY

0.86+

NellyORGANIZATION

0.83+

Google CloudTITLE

0.82+

every single workerQUANTITY

0.77+

every single nodeQUANTITY

0.74+

AMORGANIZATION

0.73+

doubleQUANTITY

0.71+

single motherboardQUANTITY

0.68+

single siliconQUANTITY

0.57+

SparkTITLE

0.53+

kernelTITLE

0.53+

inchQUANTITY

0.48+

HPE Compute Security - Kevin Depew, HPE & David Chang, AMD


 

>>Hey everyone, welcome to this event, HPE Compute Security. I'm your host, Lisa Martin. Kevin Dee joins me next Senior director, future Surfer Architecture at hpe. Kevin, it's great to have you back on the program. >>Thanks, Lisa. I'm glad to be here. >>One of the topics that we're gonna unpack in this segment is, is all about cybersecurity. And if we think of how dramatically the landscape has changed in the last couple of years, I was looking at some numbers that H P V E had provided. Cybercrime will reach 10.5 trillion by 2025. It's a couple years away. The average total cost of a data breach is now over 4 million, 15% year over year crime growth predicted over the next five years. It's no longer if we get hit, it's when it's how often. What's the severity? Talk to me about the current situation with the cybersecurity landscape that you're seeing. >>Yeah, I mean the, the numbers you're talking about are just staggering and then that's exactly what we're seeing and that's exactly what we're hearing from our customers is just absolutely key. Customers have too much to lose. The, the dollar cost is just, like I said, staggering. And, and here at HP we know we have a huge part to play, but we also know that we need partnerships across the industry to solve these problems. So we have partnered with, with our, our various partners to deliver these Gen 11 products. Whether we're talking about partners like a M D or partners like our Nick vendors, storage card vendors. We know we can't solve the problem alone. And we know this, the issue is huge. And like you said, the numbers are staggering. So we're really, we're really partnering with, with all the right players to ensure we have a secure solution so we can stay ahead of the bad guys to try to limit the, the attacks on our customers. >>Right. Limit the damage. What are some of the things that you've seen particularly change in the last 18 months or so? Anything that you can share with us that's eye-opening, more eye-opening than some of the stats we already shared? >>Well, there, there's been a massive number of attacks just in the last 12 months, but I wouldn't really say it's so much changed because the amount of attacks has been increasing dramatically over the years for many, many, many years. It's just a very lucrative area for the bad guys, whether it's ransomware or stealing personal data, whatever it is, it's there. There's unfortunately a lot of money to be made into it, made from it, and a lot of money to be lost by the good guys, the good guys being our customers. So it's not so much that it's changed, it's just that it's even accelerating faster. So the real change is, it's accelerating even faster because it's becoming even more lucrative. So we have to stay ahead of these bad guys. One of the statistics of Microsoft operating environments, the number of tax in the last year, up 50% year over year, that's a huge acceleration and we've gotta stay ahead of that. We have to make sure our customers don't get impacted to the level that these, these staggering number of attacks are. The, the bad guys are out there. We've gotta protect, protect our customers from the bad guys. >>Absolutely. The acceleration that you talked about is, it's, it's kind of frightening. It's very eye-opening. We do know that security, you know, we've talked about it for so long as a, as a a C-suite priority, a board level priority. We know that as some of the data that HPE e also sent over organizations are risking are, are listing cyber risks as a top five concern in their organization. IT budgets spend is going up where security is concerned. And so security security's on everyone's mind. In fact, the cube did, I guess in the middle part of last, I did a series on this really focusing on cybersecurity as a board issue and they went into how companies are structuring security teams changing their assumptions about the right security model, offense versus defense. But security's gone beyond the board, it's top of mind and it's on, it's in an integral part of every conversation. So my question for you is, when you're talking to customers, what are some of the key challenges that they're saying, Kevin, these are some of the things the landscape is accelerating, we know it's a matter of time. What are some of those challenges and that they're key pain points that they're coming to you to help solve? >>Yeah, at the highest level it's simply that security is incredibly important to them. We talked about the numbers. There's so much money to be lost that what they come to us and say, is security's important for us? What can you do to protect us? What can you do to prevent us from being one of those statistics? So at a high level, that's kind of what we're seeing at a, with a little more detail. We know that there's customers doing digital transformations. We know that there's customers going hybrid cloud, they've got a lot of initiatives on their own. They've gotta spend a lot of time and a lot of bandwidth tackling things that are important to their business. They just don't have the bandwidth to worry about yet. Another thing which is security. So we are doing everything we can and partnering with everyone we can to help solve those problems for customers. >>Cuz we're hearing, hey, this is huge, this is too big of a risk. How do you protect us? And by the way, we only have limited bandwidth, so what can we do? What we can do is make them assured that that platform is secure, that we're, we are creating a foundation for a very secure platform and that we've worked with our partners to secure all the pieces. So yes, they still have to worry about security, but there's pieces that we've taken care of that they don't have to worry about and there's capabilities that we've provided that they can use and we've made that easy so they can build su secure solutions on top of it. >>What are some of the things when you're in customer conversations, Kevin, that you talk about with customers in terms of what makes HPE E'S approach to security really unique? >>Well, I think a big thing is security is part of our, our dna. It's part of everything we do. Whether we're designing our own asics for our bmc, the ilo ASIC ILO six used on Gen 11, or whether it's our firmware stack, the ILO firmware, our our system, UFI firmware, all those pieces in everything we do. We're thinking about security. When we're building products in our factory, we're thinking about security. When we're think designing our supply chain, we're thinking about security. When we make requirements on our suppliers, we're driving security to be a key part of those components. So security is in our D N a security's top of mind. Security is something we think about in everything we do. We have to think like the bad guys, what could the bad guy take advantage of? What could the bad guy exploit? So we try to think like them so that we can protect our customers. >>And so security is something that that really is pervasive across all of our development organizations, our supply chain organizations, our factories, and our partners. So that's what we think is unique about HPE is because security is so important and there's a whole lot of pieces of our reliance servers that we do ourselves that many others don't do themselves. And since we do it ourselves, we can make sure that security's in the design from the start, that those pieces work together in a secure manner. So we think that gives us a, an advantage from a security standpoint. >>Security is very much intention based at HPE e I was reading in some notes, and you just did a great job of talking about this, that fundamental security approach, security is fundamental to defend against threats that are increasingly complex through what you also call an uncompromising focus to state-of-the-art security and in in innovations built into your D N A. And then organizations can protect their infrastructure, their workloads, their data from the bad guys. Talk to us briefly in our final few minutes here, Kevin, about fundamental uncompromising protected the value in it for me as an HPE customer. >>Yeah, when we talk about fundamental, we're talking about the those fundamental technologies that are part of our platform. Things like we've integrated TPMS and sorted them down in our platforms. We now have platform certificates as a standard part of the platform. We have I dev id and probably most importantly, our platforms continue to support what we really believe was a groundbreaking technology, Silicon Root of trust and what that's able to do. We have millions of lines of firmware code in our platforms and with Silicon Root of trust, we can authenticate all of those lines of firmware. Whether we're talking about the the ILO six firmware, our U E I firmware, our C P L D in the system, there's other pieces of firmware. We authenticate all those to make sure that not a single line of code, not a single bit has been changed by a bad guy, even if the bad guy has physical access to the platform. >>So that silicon route of trust technology is making sure that when that system boots off and that hands off to the operating system and then eventually the customer's application stack that it's starting with a solid foundation, that it's starting with a system that hasn't been compromised. And then we build other things into that silicon root of trust, such as the ability to do the scans and the authentications at runtime, the ability to automatically recover if we detect something has been compromised, we can automatically update that compromised piece of firmware to a good piece before we've run it because we never want to run firmware that's been compromised. So that's all part of that Silicon Root of Trust solution and that's a fundamental piece of the platform. And then when we talk about uncompromising, what we're really talking about there is how we don't compromise security. >>And one of the ways we do that is through an extension of our Silicon Root of trust with a capability called S Spdm. And this is a technology that we saw the need for, we saw the need to authenticate our option cards and the firmware in those option cards. Silicon Root Prota, Silicon Root Trust protects against many attacks, but one piece it didn't do is verify the actual option card firmware and the option cards. So we knew to solve that problem we would have to partner with others in the industry, our nick vendors, our storage controller vendors, our G vendors. So we worked with industry standards bodies and those other partners to design a capability that allows us to authenticate all of those devices. And we worked with those vendors to get the support both in their side and in our platform side so that now Silicon Rivers and trust has been extended to where we protect and we trust those option cards as well. >>So that's when, when what we're talking about with Uncompromising and with with Protect, what we're talking about there is our capabilities around protecting against, for example, supply chain attacks. We have our, our trusted supply chain solution, which allows us to guarantee that our server, when it leaves our factory, what the server is, when it leaves our factory, will be what it is when it arrives at the customer. And if a bad guy does anything in that transition, the transit from our factory to the customer, they'll be able to detect that. So we enable certain capabilities by default capability called server configuration lock, which can ensure that nothing in the server exchange, whether it's firmware, hardware, configurations, swapping out processors, whatever it is, we'll detect if a bad guy did any of that and the customer will know it before they deploy the system. That gets enabled by default. >>We have an intrusion detection technology option when you use by the, the trusted supply chain that is included by default. That lets you know, did anybody open that system up, even if the system's not plugged in, did somebody take the hood off and potentially do something malicious to it? We also enable a capability called U EFI secure Boot, which can go authenticate some of the drivers that are located on the option card itself. Those kind of capabilities. Also ilo high security mode gets enabled by default. So all these things are enabled in the platform to ensure that if it's attacked going from our factory to the customer, it will be detected and the customer won't deploy a system that's been maliciously attacked. So that's got >>It, >>How we protect the customer through those capabilities. >>Outstanding. You mentioned partners, my last question for you, we've got about a minute left, Kevin is bring AMD into the conversation, where do they fit in this >>AMD's an absolutely crucial partner. No one company even HP can do it all themselves. There's a lot of partnerships, there's a lot of synergies working with amd. We've been working with AMD for almost 20 years since we delivered our first AM MD base ProLiant back in 2004 H HP ProLiant, DL 5 85. So we've been working with them a long time. We work with them years ahead of when a processor is announced, we benefit each other. We look at their designs and help them make their designs better. They let us know about their technology so we can take advantage of it in our designs. So they have a lot of security capabilities, like their memory encryption technologies, their a MD secure processor, their secure encrypted virtualization, which is an absolutely unique and breakthrough technology to protect virtual machines and hypervisor environments and protect them from malicious hypervisors. So they have some really great capabilities that they've built into their processor, and we also take advantage of the capabilities they have and ensure those are used in our solutions and in securing the platform. So a really such >>A great, great partnership. Great synergies there. Kevin, thank you so much for joining me on the program, talking about compute security, what HPE is doing to ensure that security is fundamental, that it is unpromised and that your customers are protected end to end. We appreciate your insights, we appreciate your time. >>Thank you very much, Lisa. >>We've just had a great conversation with Kevin Depu. Now I get to talk with David Chang, data center solutions marketing lead at a md. David, welcome to the program. >>Thank, thank you. And thank you for having me. >>So one of the hot topics of conversation that we can't avoid is security. Talk to me about some of the things that AMD is seeing from the customer's perspective, why security is so important for businesses across industries. >>Yeah, sure. Yeah. Security is, is top of mind for, for almost every, every customer I'm talking to right now. You know, there's several key market drivers and, and trends, you know, in, out there today that's really needing a better and innovative solution for, for security, right? So, you know, the high cost of data breaches, for example, will cost enterprises in downtime of, of the data center. And that time is time that you're not making money, right? And potentially even leading to your, to the loss of customer confidence in your, in your cust in your company's offerings. So there's real costs that you, you know, our customers are facing every day not being prepared and not having proper security measures set up in the data center. In fact, according to to one report, over 400 high-tech threats are being introduced every minute. So every day, numerous new threats are popping up and they're just, you know, the, you know, the bad guys are just getting more and more sophisticated. So you have to take, you know, measures today and you have to protect yourself, you know, end to end with solutions like what a AM MD and HPE has to offer. >>Yeah, you talked about some of the costs there. They're exorbitant. I've seen recent figures about the average, you know, cost of data breacher ransomware is, is close to, is over $4 million, the cost of, of brand reputation you brought up. That's a great point because nobody wants to be the next headline and security, I'm sure in your experiences. It's a board level conversation. It's, it's absolutely table stakes for every organization. Let's talk a little bit about some of the specific things now that A M D and HPE E are doing. I know that you have a really solid focus on building security features into the EPIC processors. Talk to me a little bit about that focus and some of the great things that you're doing there. >>Yeah, so, you know, we partner with H P E for a long time now. I think it's almost 20 years that we've been in business together. And, and you know, we, we help, you know, we, we work together design in security features even before the silicons even, you know, even born. So, you know, we have a great relationship with, with, with all our partners, including hpe and you know, HPE has, you know, an end really great end to end security story and AMD fits really well into that. You know, if you kind of think about how security all started, you know, in, in the data center, you, you've had strategies around encryption of the, you know, the data in, in flight, the network security, you know, you know, VPNs and, and, and security on the NS. And, and even on the, on the hard drives, you know, data that's at rest. >>You know, encryption has, you know, security has been sort of part of that strategy for a a long time and really for, you know, for ages, nobody really thought about the, the actual data in use, which is, you know, the, the information that's being passed from the C P U to the, the, the memory and, and even in virtualized environments to the, the, the virtual machines that, that everybody uses now. So, you know, for a long time nobody really thought about that app, you know, that third leg of, of encryption. And so a d comes in and says, Hey, you know, this is things that as, as the bad guys are getting more sophisticated, you, you have to start worrying about that, right? And, you know, for example, you know, you know, think, think people think about memory, you know, being sort of, you know, non-persistent and you know, when after, you know, after a certain time, the, the, you know, the, the data in the memory kind of goes away, right? >>But that's not true anymore because even in in memory data now, you know, there's a lot of memory modules that still can retain data up to 90 minutes even after p power loss. And with something as simple as compressed, compressed air or, or liquid nitrogen, you can actually freeze memory dams now long enough to extract the data from that memory module for up, you know, up, up to two or three hours, right? So lo more than enough time to read valuable data and, and, and even encryption keys off of that memory module. So our, our world's getting more complex and you know, more, the more data out there, the more insatiable need for compute and storage. You know, data management is becoming all, all the more important, you know, to keep all of that going and secure, you know, and, and creating security for those threats. It becomes more and more important. And, and again, especially in virtualized environments where, you know, like hyperconverged infrastructure or vir virtual desktop memories, it's really hard to keep up with all those different attacks, all those different attack surfaces. >>It sounds like what you were just talking about is what AMD has been able to do is identify yet another vulnerability Yes. Another attack surface in memory to be able to, to plug that hole for organizations that didn't, weren't able to do that before. >>Yeah. And, you know, and, and we kind of started out with that belief that security needed to be scalable and, and able to adapt to, to changing environments. So, you know, we, we came up with, you know, the, you know, the, the philosophy or the design philosophy that we're gonna continue to build on those security features generational generations and stay ahead of those evolving attacks. You know, great example is in, in the third gen, you know, epic C P U, that family that we had, we actually created this feature called S E V S N P, which stands for SECURENESS Paging. And it's really all around this, this new attack where, you know, your, the, the, you know, it's basically hypervisor based attacks where people are, you know, the bad actors are writing in to the memory and writing in basically bad data to corrupt the mem, you know, to corrupt the data in the memory. So s e V S and P is, was put in place to help, you know, secure that, you know, before that became a problem. And, you know, you heard in the news just recently that that becoming a more and more, more of a bigger issue. And the great news is that we had that feature built in, you know, before that became a big problem. >>And now you're on the fourth gen, those epic crosses talk of those epic processes. Talk to me a little bit about some of the innovations that are now in fourth gen. >>Yeah, so in fourth gen we actually added, you know, on top of that. So we've, we've got, you know, the sec the, the base of our, our, what we call infinity guard is, is all around the secure boot. The, you know, the, the, the, the secure root of trust that, you know, that we, we work with HPE on the, the strong memory encryption and the S E V, which is the secure encrypted virtualization. And so remember those s s and p, you know, incap capabilities that I talked about earlier. We've actually, in the fourth gen added two x the number of sev v s and P guests for even higher number of confidential VMs to support even more customers than before. Right? We've also added more guest protection from simultaneous multi threading or S M T side channel attacks. And, you know, while it's not officially part of Infinity Guard, we've actually added more APEC acceleration, which greatly benefits the security of those confidential VMs with the larger number of VCPUs, which basically means that you can build larger VMs and still be secured. And then lastly, we actually added even stronger a e s encryption. So we went from 128 bit to 256 bit, which is now military grade encryption on top of that. And, you know, and, and that's really, you know, the de facto crypto cryptography that is used for most of the applications for, you know, customers like the US federal government and, and all, you know, the, is really an essential element for memory security and the H B C applications. And I always say if it's good enough for the US government, it's good enough for you. >>Exactly. Well, it's got to be, talk a little bit about how AMD is doing this together with HPE a little bit about the partnership as we round out our conversation. >>Sure, absolutely. So security is only as strong as the layer below it, right? So, you know, that's why modern security must be built in rather than, than, you know, bolted on or, or, or, you know, added after the fact, right? So HPE and a MD actually developed this layered approach for protecting critical data together, right? Through our leadership and, and security features and innovations, we really deliver a set of hardware based features that, that help decrease potential attack surfaces. With, with that holistic approach that, you know, that safeguards the critical information across system, you know, the, the entire system lifecycle. And we provide the confidence of built-in silicon authentication on the world's most secure industry standard servers. And with a 360 degree approach that brings high availability to critical workloads while helping to defend, you know, against internal and external threats. So things like h hp, root of silicon root of trust with the trusted supply chain, which, you know, obviously AMD's part of that supply chain combined with AMD's Infinity guard technology really helps provide that end-to-end data protection in today's business. >>And that is so critical for businesses in every industry. As you mentioned, the attackers are getting more and more sophisticated, the vulnerabilities are increasing. The ability to have a pa, a partnership like H P E and a MD to deliver that end-to-end data protection is table stakes for businesses. David, thank you so much for joining me on the program, really walking us through what am MD is doing, the the fourth gen epic processors and how you're working together with HPE to really enable security to be successfully accomplished by businesses across industries. We appreciate your insights. >>Well, thank you again for having me, and we appreciate the partnership with hpe. >>Well, you wanna thank you for watching our special program HPE Compute Security. I do have a call to action for you. Go ahead and visit hpe com slash security slash compute. Thanks for watching.

Published Date : Dec 14 2022

SUMMARY :

Kevin, it's great to have you back on the program. One of the topics that we're gonna unpack in this segment is, is all about cybersecurity. And like you said, the numbers are staggering. Anything that you can share with us that's eye-opening, more eye-opening than some of the stats we already shared? So the real change is, it's accelerating even faster because it's becoming We do know that security, you know, we've talked about it for so long as a, as a a C-suite Yeah, at the highest level it's simply that security is incredibly important to them. And by the way, we only have limited bandwidth, So we try to think like them so that we can protect our customers. our reliance servers that we do ourselves that many others don't do themselves. and you just did a great job of talking about this, that fundamental security approach, of code, not a single bit has been changed by a bad guy, even if the bad guy has the ability to automatically recover if we detect something has been compromised, And one of the ways we do that is through an extension of our Silicon Root of trust with a capability ensure that nothing in the server exchange, whether it's firmware, hardware, configurations, That lets you know, into the conversation, where do they fit in this and in securing the platform. Kevin, thank you so much for joining me on the program, Now I get to talk with David Chang, And thank you for having me. So one of the hot topics of conversation that we can't avoid is security. numerous new threats are popping up and they're just, you know, the, you know, the cost of, of brand reputation you brought up. know, the data in, in flight, the network security, you know, you know, that app, you know, that third leg of, of encryption. the data from that memory module for up, you know, up, up to two or three hours, It sounds like what you were just talking about is what AMD has been able to do is identify yet another in the third gen, you know, epic C P U, that family that we had, Talk to me a little bit about some of the innovations Yeah, so in fourth gen we actually added, you know, Well, it's got to be, talk a little bit about how AMD is with that holistic approach that, you know, that safeguards the David, thank you so much for joining me on the program, Well, you wanna thank you for watching our special program HPE Compute Security.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Lisa MartinPERSON

0.99+

David ChangPERSON

0.99+

KevinPERSON

0.99+

DavidPERSON

0.99+

Kevin DeePERSON

0.99+

AMDORGANIZATION

0.99+

Kevin DepewPERSON

0.99+

MicrosoftORGANIZATION

0.99+

LisaPERSON

0.99+

2004DATE

0.99+

15%QUANTITY

0.99+

HPORGANIZATION

0.99+

10.5 trillionQUANTITY

0.99+

HPE EORGANIZATION

0.99+

H P EORGANIZATION

0.99+

360 degreeQUANTITY

0.99+

over $4 millionQUANTITY

0.99+

2025DATE

0.99+

fourth gen.QUANTITY

0.99+

fourth genQUANTITY

0.99+

over 4 millionQUANTITY

0.99+

DL 5 85COMMERCIAL_ITEM

0.99+

256 bitQUANTITY

0.99+

last yearDATE

0.99+

three hoursQUANTITY

0.98+

amdORGANIZATION

0.98+

128 bitQUANTITY

0.98+

over 400 high-tech threatsQUANTITY

0.98+

HPEORGANIZATION

0.98+

Infinity GuardORGANIZATION

0.98+

one pieceQUANTITY

0.98+

almost 20 yearsQUANTITY

0.98+

oneQUANTITY

0.97+

millions of linesQUANTITY

0.97+

single bitQUANTITY

0.97+

50%QUANTITY

0.97+

one reportQUANTITY

0.97+

OneQUANTITY

0.97+

hpeORGANIZATION

0.96+

third genQUANTITY

0.96+

todayDATE

0.96+

bothQUANTITY

0.96+

H P V EORGANIZATION

0.96+

firstQUANTITY

0.95+

twoQUANTITY

0.95+

third legQUANTITY

0.94+

last couple of yearsDATE

0.93+

Silicon RiversORGANIZATION

0.92+

up to 90 minutesQUANTITY

0.92+

S SpdmORGANIZATION

0.9+

ILOORGANIZATION

0.88+

AMORGANIZATION

0.88+

US governmentORGANIZATION

0.86+

single lineQUANTITY

0.85+

last 18 monthsDATE

0.82+

Gen 11QUANTITY

0.81+

last 12 monthsDATE

0.81+

AM MD base ProLiantCOMMERCIAL_ITEM

0.8+

next five yearsDATE

0.8+

up to twoQUANTITY

0.8+

ProtectORGANIZATION

0.79+

couple yearsQUANTITY

0.79+

Dhabaleswar “DK” Panda, Ohio State State University | SuperComputing 22


 

>>Welcome back to The Cube's coverage of Supercomputing Conference 2022, otherwise known as SC 22 here in Dallas, Texas. This is day three of our coverage, the final day of coverage here on the exhibition floor. I'm Dave Nicholson, and I'm here with my co-host, tech journalist extraordinaire, Paul Gillum. How's it going, >>Paul? Hi, Dave. It's going good. >>And we have a wonderful guest with us this morning, Dr. Panda from the Ohio State University. Welcome Dr. Panda to the Cube. >>Thanks a lot. Thanks a lot to >>Paul. I know you're, you're chopping at >>The bit, you have incredible credentials, over 500 papers published. The, the impact that you've had on HPC is truly remarkable. But I wanted to talk to you specifically about a product project you've been working on for over 20 years now called mva, high Performance Computing platform that's used by more than 32 organ, 3,200 organizations across 90 countries. You've shepherded this from, its, its infancy. What is the vision for what MVA will be and and how is it a proof of concept that others can learn from? >>Yeah, Paul, that's a great question to start with. I mean, I, I started with this conference in 2001. That was the first time I came. It's very coincidental. If you remember the Finman Networking Technology, it was introduced in October of 2000. Okay. So in my group, we were working on NPI for Marinette Quadrics. Those are the old technology, if you can recollect when Finman was there, we were the very first one in the world to really jump in. Nobody knew how to use Infin van in an HPC system. So that's how the Happy Project was born. And in fact, in super computing 2002 on this exhibition floor in Baltimore, we had the first demonstration, the open source happy, actually is running on an eight node infinite van clusters, eight no zeros. And that was a big challenge. But now over the years, I means we have continuously worked with all infinite van vendors, MPI Forum. >>We are a member of the MPI Forum and also all other network interconnect. So we have steadily evolved this project over the last 21 years. I'm very proud of my team members working nonstop, continuously bringing not only performance, but scalability. If you see now INFIN event are being deployed in 8,000, 10,000 node clusters, and many of these clusters actually use our software, stack them rapid. So, so we have done a lot of, like our focuses, like we first do research because we are in academia. We come up with good designs, we publish, and in six to nine months, we actually bring it to the open source version and people can just download and then use it. And that's how currently it's been used by more than 3000 orange in 90 countries. And, but the interesting thing is happening, your second part of the question. Now, as you know, the field is moving into not just hvc, but ai, big data, and we have those support. This is where like we look at the vision for the next 20 years, we want to design this MPI library so that not only HPC but also all other workloads can take advantage of it. >>Oh, we have seen libraries that become a critical develop platform supporting ai, TensorFlow, and, and the pie torch and, and the emergence of, of, of some sort of default languages that are, that are driving the community. How, how important are these frameworks to the, the development of the progress making progress in the HPC world? >>Yeah, no, those are great. I mean, spite our stencil flow, I mean, those are the, the now the bread and butter of deep learning machine learning. Am I right? But the challenge is that people use these frameworks, but continuously models are becoming larger. You need very first turnaround time. So how do you train faster? How do you do influencing faster? So this is where HPC comes in and what exactly what we have done is actually we have linked floor fighters to our happy page because now you see the MPI library is running on a million core system. Now your fighters and tenor four clan also be scaled to to, to those number of, large number of course and gps. So we have actually done that kind of a tight coupling and that helps the research to really take advantage of hpc. >>So if, if a high school student is thinking in terms of interesting computer science, looking for a place, looking for a university, Ohio State University, bruns, world renowned, widely known, but talk about what that looks like from a day on a day to day basis in terms of the opportunity for undergrad and graduate students to participate in, in the kind of work that you do. What is, what does that look like? And is, and is that, and is that a good pitch to for, for people to consider the university? >>Yes. I mean, we continuously, from a university perspective, by the way, the Ohio State University is one of the largest single campus in, in us, one of the top three, top four. We have 65,000 students. Wow. It's one of the very largest campus. And especially within computer science where I am located, high performance computing is a very big focus. And we are one of the, again, the top schools all over the world for high performance computing. And we also have very strength in ai. So we always encourage, like the new students who like to really work on top of the art solutions, get exposed to the concepts, principles, and also practice. Okay. So, so we encourage those people that wish you can really bring you those kind of experience. And many of my past students, staff, they're all in top companies now, have become all big managers. >>How, how long, how long did you say you've been >>At 31 >>Years? 31 years. 31 years. So, so you, you've had people who weren't alive when you were already doing this stuff? That's correct. They then were born. Yes. They then grew up, yes. Went to university graduate school, and now they're on, >>Now they're in many top companies, national labs, all over the universities, all over the world. So they have been trained very well. Well, >>You've, you've touched a lot of lives, sir. >>Yes, thank you. Thank >>You. We've seen really a, a burgeoning of AI specific hardware emerge over the last five years or so. And, and architectures going beyond just CPUs and GPUs, but to Asics and f PGAs and, and accelerators, does this excite you? I mean, are there innovations that you're seeing in this area that you think have, have great promise? >>Yeah, there is a lot of promise. I think every time you see now supercomputing technology, you see there is sometime a big barrier comes barrier jump. Rather I'll say, new technology comes some disruptive technology, then you move to the next level. So that's what we are seeing now. A lot of these AI chips and AI systems are coming up, which takes you to the next level. But the bigger challenge is whether it is cost effective or not, can that be sustained longer? And this is where commodity technology comes in, which commodity technology tries to take you far longer. So we might see like all these likes, Gaudi, a lot of new chips are coming up, can they really bring down the cost? If that cost can be reduced, you will see a much more bigger push for AI solutions, which are cost effective. >>What, what about on the interconnect side of things, obvi, you, you, your, your start sort of coincided with the initial standards for Infin band, you know, Intel was very, very, was really big in that, in that architecture originally. Do you see interconnects like RDMA over converged ethernet playing a part in that sort of democratization or commoditization of things? Yes. Yes. What, what are your thoughts >>There for internet? No, this is a great thing. So, so we saw the infinite man coming. Of course, infinite Man is, commod is available. But then over the years people have been trying to see how those RDMA mechanisms can be used for ethernet. And then Rocky has been born. So Rocky has been also being deployed. But besides these, I mean now you talk about Slingshot, the gray slingshot, it is also an ethernet based systems. And a lot of those RMA principles are actually being used under the hood. Okay. So any modern networks you see, whether it is a Infin and Rocky Links art network, rock board network, you name any of these networks, they are using all the very latest principles. And of course everybody wants to make it commodity. And this is what you see on the, on the slow floor. Everybody's trying to compete against each other to give you the best performance with the lowest cost, and we'll see whoever wins over the years. >>Sort of a macroeconomic question, Japan, the US and China have been leapfrogging each other for a number of years in terms of the fastest supercomputer performance. How important do you think it is for the US to maintain leadership in this area? >>Big, big thing, significantly, right? We are saying that I think for the last five to seven years, I think we lost that lead. But now with the frontier being the number one, starting from the June ranking, I think we are getting that leadership back. And I think it is very critical not only for fundamental research, but for national security trying to really move the US to the leading edge. So I hope us will continue to lead the trend for the next few years until another new system comes out. >>And one of the gating factors, there is a shortage of people with data science skills. Obviously you're doing what you can at the university level. What do you think can change at the secondary school level to prepare students better to, for data science careers? >>Yeah, I mean that is also very important. I mean, we, we always call like a pipeline, you know, that means when PhD levels we are expecting like this even we want to students to get exposed to, to, to many of these concerts from the high school level. And, and things are actually changing. I mean, these days I see a lot of high school students, they, they know Python, how to program in Python, how to program in sea object oriented things. Even they're being exposed to AI at that level. So I think that is a very healthy sign. And in fact we, even from Ohio State side, we are always engaged with all this K to 12 in many different programs and then gradually trying to take them to the next level. And I think we need to accelerate also that in a very significant manner because we need those kind of a workforce. It is not just like a building a system number one, but how do we really utilize it? How do we utilize that science? How do we propagate that to the community? Then we need all these trained personal. So in fact in my group, we are also involved in a lot of cyber training activities for HPC professionals. So in fact, today there is a bar at 1 1 15 I, yeah, I think 1215 to one 15. We'll be talking more about that. >>About education. >>Yeah. Cyber training, how do we do for professionals? So we had a funding together with my co-pi, Dr. Karen Tom Cook from Ohio Super Center. We have a grant from NASA Science Foundation to really educate HPT professionals about cyber infrastructure and ai. Even though they work on some of these things, they don't have the complete knowledge. They don't get the time to, to learn. And the field is moving so fast. So this is how it has been. We got the initial funding, and in fact, the first time we advertised in 24 hours, we got 120 application, 24 hours. We couldn't even take all of them. So, so we are trying to offer that in multiple phases. So, so there is a big need for those kind of training sessions to take place. I also offer a lot of tutorials at all. Different conference. We had a high performance networking tutorial. Here we have a high performance deep learning tutorial, high performance, big data tutorial. So I've been offering tutorials at, even at this conference since 2001. Good. So, >>So in the last 31 years, the Ohio State University, as my friends remind me, it is properly >>Called, >>You've seen the world get a lot smaller. Yes. Because 31 years ago, Ohio, in this, you know, of roughly in the, in the middle of North America and the United States was not as connected as it was to everywhere else in the globe. So that's, that's pro that's, I i it kind of boggles the mind when you think of that progression over 31 years, but globally, and we talk about the world getting smaller, we're sort of in the thick of, of the celebratory seasons where, where many, many groups of people exchange gifts for varieties of reasons. If I were to offer you a holiday gift, that is the result of what AI can deliver the world. Yes. What would that be? What would, what would, what would the first thing be? This is, this is, this is like, it's, it's like the genie, but you only get one wish. >>I know, I know. >>So what would the first one be? >>Yeah, it's very hard to answer one way, but let me bring a little bit different context and I can answer this. I, I talked about the happy project and all, but recently last year actually we got awarded an S f I institute award. It's a 20 million award. I am the overall pi, but there are 14 universities involved. >>And who is that in that institute? >>What does that Oh, the I ici. C e. Okay. I cycle. You can just do I cycle.ai. Okay. And that lies with what exactly what you are trying to do, how to bring lot of AI for masses, democratizing ai. That's what is the overall goal of this, this institute, think of like a, we have three verticals we are working think of like one is digital agriculture. So I'll be, that will be my like the first ways. How do you take HPC and AI to agriculture the world as though we just crossed 8 billion people. Yeah, that's right. We need continuous food and food security. How do we grow food with the lowest cost and with the highest yield? >>Water >>Consumption. Water consumption. Can we minimize or minimize the water consumption or the fertilization? Don't do blindly. Technologies are out there. Like, let's say there is a weak field, A traditional farmer see that, yeah, there is some disease, they will just go and spray pesticides. It is not good for the environment. Now I can fly it drone, get images of the field in the real time, check it against the models, and then it'll tell that, okay, this part of the field has disease. One, this part of the field has disease. Two, I indicate to the, to the tractor or the sprayer saying, okay, spray only pesticide one, you have pesticide two here. That has a big impact. So this is what we are developing in that NSF A I institute I cycle ai. We also have, we have chosen two additional verticals. One is animal ecology, because that is very much related to wildlife conservation, climate change, how do you understand how the animals move? Can we learn from them? And then see how human beings need to act in future. And the third one is the food insecurity and logistics. Smart food distribution. So these are our three broad goals in that institute. How do we develop cyber infrastructure from below? Combining HP c AI security? We have, we have a large team, like as I said, there are 40 PIs there, 60 students. We are a hundred members team. We are working together. So, so that will be my wish. How do we really democratize ai? >>Fantastic. I think that's a great place to wrap the conversation here On day three at Supercomputing conference 2022 on the cube, it was an honor, Dr. Panda working tirelessly at the Ohio State University with his team for 31 years toiling in the field of computer science and the end result, improving the lives of everyone on Earth. That's not a stretch. If you're in high school thinking about a career in computer science, keep that in mind. It isn't just about the bits and the bobs and the speeds and the feeds. It's about serving humanity. Maybe, maybe a little, little, little too profound a statement, I would argue not even close. I'm Dave Nicholson with the Queue, with my cohost Paul Gillin. Thank you again, Dr. Panda. Stay tuned for more coverage from the Cube at Super Compute 2022 coming up shortly. >>Thanks a lot.

Published Date : Nov 17 2022

SUMMARY :

Welcome back to The Cube's coverage of Supercomputing Conference 2022, And we have a wonderful guest with us this morning, Dr. Thanks a lot to But I wanted to talk to you specifically about a product project you've So in my group, we were working on NPI for So we have steadily evolved this project over the last 21 years. that are driving the community. So we have actually done that kind of a tight coupling and that helps the research And is, and is that, and is that a good pitch to for, So, so we encourage those people that wish you can really bring you those kind of experience. you were already doing this stuff? all over the world. Thank this area that you think have, have great promise? I think every time you see now supercomputing technology, with the initial standards for Infin band, you know, Intel was very, very, was really big in that, And this is what you see on the, Sort of a macroeconomic question, Japan, the US and China have been leapfrogging each other for a number the number one, starting from the June ranking, I think we are getting that leadership back. And one of the gating factors, there is a shortage of people with data science skills. And I think we need to accelerate also that in a very significant and in fact, the first time we advertised in 24 hours, we got 120 application, that's pro that's, I i it kind of boggles the mind when you think of that progression over 31 years, I am the overall pi, And that lies with what exactly what you are trying to do, to the tractor or the sprayer saying, okay, spray only pesticide one, you have pesticide two here. I think that's a great place to wrap the conversation here On

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Dave NicholsonPERSON

0.99+

Paul GillumPERSON

0.99+

DavePERSON

0.99+

Paul GillinPERSON

0.99+

October of 2000DATE

0.99+

PaulPERSON

0.99+

NASA Science FoundationORGANIZATION

0.99+

2001DATE

0.99+

BaltimoreLOCATION

0.99+

8,000QUANTITY

0.99+

14 universitiesQUANTITY

0.99+

31 yearsQUANTITY

0.99+

20 millionQUANTITY

0.99+

24 hoursQUANTITY

0.99+

last yearDATE

0.99+

Karen Tom CookPERSON

0.99+

60 studentsQUANTITY

0.99+

Ohio State UniversityORGANIZATION

0.99+

90 countriesQUANTITY

0.99+

sixQUANTITY

0.99+

EarthLOCATION

0.99+

PandaPERSON

0.99+

todayDATE

0.99+

65,000 studentsQUANTITY

0.99+

3,200 organizationsQUANTITY

0.99+

North AmericaLOCATION

0.99+

PythonTITLE

0.99+

United StatesLOCATION

0.99+

Dallas, TexasLOCATION

0.99+

over 500 papersQUANTITY

0.99+

JuneDATE

0.99+

OneQUANTITY

0.99+

more than 32 organQUANTITY

0.99+

120 applicationQUANTITY

0.99+

OhioLOCATION

0.99+

more than 3000 orangeQUANTITY

0.99+

first waysQUANTITY

0.99+

oneQUANTITY

0.99+

nine monthsQUANTITY

0.99+

40 PIsQUANTITY

0.99+

AsicsORGANIZATION

0.99+

MPI ForumORGANIZATION

0.98+

ChinaORGANIZATION

0.98+

TwoQUANTITY

0.98+

Ohio State State UniversityORGANIZATION

0.98+

8 billion peopleQUANTITY

0.98+

IntelORGANIZATION

0.98+

HPORGANIZATION

0.97+

Dr.PERSON

0.97+

over 20 yearsQUANTITY

0.97+

USORGANIZATION

0.97+

FinmanORGANIZATION

0.97+

RockyPERSON

0.97+

JapanORGANIZATION

0.97+

first timeQUANTITY

0.97+

first demonstrationQUANTITY

0.96+

31 years agoDATE

0.96+

Ohio Super CenterORGANIZATION

0.96+

three broad goalsQUANTITY

0.96+

one wishQUANTITY

0.96+

second partQUANTITY

0.96+

31QUANTITY

0.96+

CubeORGANIZATION

0.95+

eightQUANTITY

0.95+

over 31 yearsQUANTITY

0.95+

10,000 node clustersQUANTITY

0.95+

day threeQUANTITY

0.95+

firstQUANTITY

0.95+

INFINEVENT

0.94+

seven yearsQUANTITY

0.94+

Dhabaleswar “DK” PandaPERSON

0.94+

threeQUANTITY

0.93+

S f I instituteTITLE

0.93+

first thingQUANTITY

0.93+

William Choe & Shane Corban | Aruba & Pensando Announce New Innovations


 

(intro music playing) >> Hello everyone, and welcome to the power of n where HPE Aruba and Pensando are changing the game, the way customers scale with the cloud, and what's next in the evolution in switching. Hey everyone, I'm John furrier with the cube, and I'm here with Shane Corbin, director of technical product management at Pensando, and William show vice president of product management, Aruba HPE. Gentlemen, thank you for coming on and doing a deep dive and, and going into the, the big news. So the first question I want to ask you guys is um, what do you guys see from a market customer perspective that kicked this project off? um, amazing um, results um, over the past year or so? Where did it all come from? >> No, it's a great question, John. So when we were doing our homework, there were actually three very clear customer challenges. First, security threats were largely spawn with on, within the perimeter. In fact, Forrester highlighted 80% of threats originate within the internal network. Secondly, workloads are largely distributed creating a ton of east-west traffic. And then lastly, network services such as firewalls, load balancers, VPN aggregators are expensive, they're centralized, and they ultimately result in service chaining complexity. >> John: So, so, >> John: Go ahead, Shane. >> Yeah. Additionally, when we spoke to our customers after launching initially the distributed services platform, these compliance challenges clearly became apparent to us and while they saw the architecture value of adopting what the largest public cloud providers have done by putting a smart NIC in each compute node to provide these stateful services. Enterprise customers were still, were struggling with the need to upgrade fleets and brown field servers and the associated per node cost of adding a smart NIC to every compute node. Typically the traffic volumes for on a per node basis within an enterprise data center are significantly lower than cloud. Thus, we saw an opportunity here to, in conjunction with Aruba, develop a new category of switching product um, to share the processing capabilities of our unique intellectual property around our DPU across a rack of servers that net net delivers the same set of services through a new category of platform, enabling a distributed services architecture, and ultimately addressing the compliance and TCO generating huge TCO and ROI for customers. >> You know, one of the things that we've been reporting on with you guys, as well as the cloud scale, this is the volume of data and just the performance and scale. I think the timing of the, of this partnership and the product development is right on point. And you've got the edge right around the corner, more, more distributed nature of cloud operations, huge, huge change in the marketplace. So great timing on the origination story there. Great stuff. Tell me more about the platform itself, the details, what's under the hood, the hardware OS, what are the specs? >> Yeah, so we started with a very familiar premise. Rubik customers are already leveraging CX with an edge to cloud common operating model, in deploying leaf and spine networks. Plus we're excited to introduce the industry's first distributed services switch, where the first configuration has 48-25 gig ports with a hundred gig couplings running Aruba CX cloud native operating system, Pensando Asic's software inside, enabling layer four through six, seven stateful services. Shane, do you want to elaborate on. >> Yeah, let me elaborate on that a little bit further, um, you know, as we spoke existing platforms and how customers were seeking to address these challenges were, are inherently limited by the ASIC dye size, and that does limit their scale and performance and ability in traditional switching platforms to deliver truly stateful functions in, in, in a switching platform, this was, you know, architecturally from the ground up, when we developed our DPU, first and second generation, we delivered it, or we, we built it with stateful services in mind from the get-go, we leveraged the clean state design with our P four program with DPU. We evolved to our seven nanometers based pro DPU right now, which is essentially enabling software and Silicon. And this has generated a new level of performance scale, flexibility and capability in terms of services. This serves as the foundation for our 200 gig card, were we taking the largest cloud providers into production for. And the DPU itself is, is designed inherently to process stage, track stateful connections, and stateful flow is at very, very large scale without impacting performance. And in fact, the two of these DPU components server disk, services foundation of the CX 10 K, and this is how we enable stateful functions in a switching platform functions like stateful network fire-walling, stateful segmentation, enhanced programmable telemetry, which we believe will bring a whole lot of value to our customers. And this is a platform that's inherently programmable from the ground up. We can, we can build and leverage this platform to build new use cases around encryption, enabling stateful load balancing, stateful NAT to name a few, but, but the key message here is, this is, this is a platform with the next generation of architecture's in mind, is programmed, but at all, there's the stack, and that's what makes it fundamentally different than anything else. >> I want to just double click on that if you don't mind, before we get to the competitive question, because I think you brought up the state thing. I think this is worth calling out, if you guys don't mind commenting more on this states issue, because this is big. Cloud native developers right now, want speed, they're shifting left at the CICD pipeline with programmability. So going down and having the programmability, and having state is a really big deal. Can you guys just expand on that a little bit more and why it's important and, and how hard it really is to pull off? >> I, I can start, I guess, um, it's very hard to pull off because of the sheer amount of connections you need to track when you're developing something like a stateful firewall or a stateful load balancer, a key component of that is managing the connections at very, very large scale and understanding what's happening with those connections at scale, without impacting application performance. And this is fundamentally different at traditional switching platform, regardless of how it's deployed today in Asics, don't typically process and manage state like this. Um, memory resources within the chip aren't sufficient, um, the policy scale that you can um, implement on a platform aren't sufficient to address and fundamentally enable deployable firewalling, or load balancing, or other stateful services. >> That's exactly right. And so the other kind of key point here is that, if you think about the sophistication of different security threats, it does really require you to be able to look at the entire packet, and, and more so be able to look at the entire flow and be able to log that history, so that you can get much better heuristics around different anomalies, security threats that are emerging today. >> That's a great, great point. Thanks for, for, um, bringing that extra, extra point out. I would just add to this, we're reporting this all the time on Silicon angle in the cube is that, you know, the, you know, the, the automation wave that's coming with around data, you know, it's a center of data, not data centers we heard earlier on with the, in, in, in the presentation. Data drives automation, having that enabled with the state is a real big deal. So, I think that's really worth calling out. Now, I've got to ask the competition question, how is this different? I mean, this is an evolution. I would say, it's a revolution. You guys are being being humble, um, but how is this different from what customers can deploy today? >> Architecturally, if you take a look at it. We've, we've spoken about the technology and fundamentally in the platform what's unique, in the architecture, but, foundationally when customers deploy stateful services they're typically deployed leveraging traditional big box appliances for east-west our workload based agents, which seek to implement stateful security for each east-west. Architecturally what we're enabling is stateful services like firewalling, segmentation, can scale with the fabric and are delivered at the optimal point for east west which is through leaf for access layer of the network. And we do this for any type of workload. Be it deployed on a virtualized compute node, be a deployed on a containerized worker node, be deployed on bare metal, agnostic up typology, it can be in the access layer of a three tier design and a data center. It can be in the leaf layer of a VX VPN based fabric, but the goal is an all centrally managed to a single point of orchestration and control of which William will talk about shortly. The goal of this is to drive down the TCO of your data center as a whole, by allowing you to retire legacy appliances that are deployed in an east-west roll, and not utilize host based agents, and thus save a whole lot of money and we've modeled on the order of 60 to 70% in terms of savings in terms of the traditional data center pod design of a thousand compute nodes which we'll be publishing. And as, as we go forward additional services, as we mentioned, like encryption, this platform has the capability to terminate up to 800 gigs of our line rates encryption, IP sec, VPN per platform, stateful Nat load balancing, and this is all functionality we'll be adding to this existing platform because it's programmable as we've mentioned from the ground up. >> What are some of the use cases lead? And what's the top use cases, what's the low hanging fruit and where does this go? You've got service providers, enterprises. What are the types of customers you guys see implementing? >> Yeah, that's, what's really exciting about the CX 10,000. We actually see customer interest from all types of different markets, whether it be higher education, service providers to financial services, basically all enterprises verticals with private cloud or edge data centers. For example, it could be a hospital, a big box retailer, or a colon such as Iniquinate So it's really the CX 10,000 that creates a new switching category, enabling stateful services in that leaf node right at the workload, unifying network and security automation policy management. Second, the CX 10,000 greatly improves security posture and eliminates the need for hair-pinning east-west traffic all the way back to the centralized deployments. Lastly, As Shane highlighted, there's a 70% TCO savings by eliminating that appliance sprawl and ultimately collapsing the network security operations. >> I love the category creation um, vibe here. Love it. And also the technical and the cloud alignment's great. But how do the customers manage all this? Okay, I got a new category. I just put the box in, throw away some other ones? I mean, how does this all get done? And how does the customers manage all this? >> Yeah, so we're, we're looking to build on top of the river fabric composer. It's another familiar site for our customers, and what's already provides for compute storage and network automation, with a broad ecosystem integrations, such as VMware vSphere Vcenter as with Nutanix prism and so aligned with the CX 10,000 FGA, now you have a fabric composer, unified security and policy orchestration, and management with the ability to find firewall policies efficiently and provide that telemetry to collect your such a Splunk. >> John: So the customer environments right now involve a lot of multi-vendor and new frameworks, obviously, cloud native. How does this fit into the customer's existing environment with the ecosystem? How do they get, get going here? >> Yeah, great question. Um, Our customers can get going as we, we've built a flexible platform that can be deployed in either Greenfield or brownfield. Obviously it's a best of breed architecture for distributed services we're building in conjunction with Aruba. But if customers want to gradually integrate this into their existing environments and they're using other vendors, spines or cores, this can be inserted seamlessly as, as a lead for an access, access tier switch to deliver the exact same set of services within that architecture. So it plugs seamlessly in because it supports all the standard control plan protocols, a VX 90 VPN, and a traditional attitude, three tier designs easily. Now, for any enterprise solution deployment, it's critical that you build a holistic ecosystem around it. It's clear that, this will get customer deployments and the ecosystem being diverse and rich is very, very important. And as part of our integrations with the controller, we're building a broad suite of integrations across threat detection, application dependency mapping, Siemens sooam, dev ops infrastructure as code tools. (inaudible) And it's clear if you look at these categories of integrations, you know, XDR or threat detection requires full telemetric from within the data center, it's been hard to accomplish to date because you typically need agents on, on your compute nodes to give you the visibility into what's going on or firewalls for east west fuels. Now, our platform can natively provide full visibility into all flows east- west in the data center. And this can become the source of telemetry truth that these MLX CR engines require to work. The other aspects of ecosystem around application dependency mapping, this single core challenge with deploying segmentation east west is understanding the rules to put in & Right, first is how do you insert the service, um, service device in such a way that it won't add more complexity? We don't add any complexity because we're in line natively. How you would understand it, would allow you to build the rules that are necessary to do segmentation. We integrate with tools like Guardi core, we provide our flogs as source of data, and they can provide room recommendations and policy recommendations for customers. Around, we're building integrations around Siemen soam with, with tools like Splunk and elastic, elastic search that will allow NetOps and SecOps teams to visualize trend and manage the services delivered by the CX 10 K. And the other aspect of ecosystem, from a security standpoint is clearly how do I get policy for these traditional appliances and enforce them on this next generation architecture that you've built, that can enable stateful services. So we're building integrations with tools like turf and an algo sec third-party sources of policy that we can ingest and enforce on the infrastructure, allowing you to gradually, um, migrate to this new architecture over time. >> John: It's really a cloud native switch. I mean, you solve people's problems, pin- points, but yet positioned for growth. I mean, it sounds that's my takeaway, but I got to ask you guys both, what's the takeaway for the customers because it's not that simple for them, I mean it's, we a have complicated environment. (all giggling) >> Yeah, I think it's, I think it's really simple, um, you know, every 10 years or so, we see major evolutions in the data center and the switching environment, but we do believe we've created a new category with the distributed services, distributed services switch, delivering cloud scale distributed services, where the local, where the workloads reside greatly, simplifying network, security provisioning, and operations with the urban fabric composer while improving security posture and the TCO. But that's not all the folks, it's a journey, right Shane? >> Yeah, it's absolutely a journey. And this is the first step in a long journey with a great partner like Aruba. There's other platforms, hundred or 400 gig hardware platforms where we're looking at and then this additional services that we can enable over time, allowing customers to drive even more TCO value out of the platform of the architecture services like encryption for securing the cloud on-ramp, services like stateful load balancing to deploy east-west in the data center and, you know, holistically that's, that's the goal, deliver value for customers. And we believe we have an architecture and a platform, and this is a first step in a long journey. >> It's a great way of, I just ask one final, final question for both of you as product leaders, you got to be excited having a category creation product here in this market, this big wave, but what's your thoughts? >> Yeah, exactly right, it doesn't happen that often, and so we're, we're all in it's, it's exciting to be able to work with a great team like Pensando and Shane here. Um, so we're really, really excited about this launch. >> Yeah, it's awesome. The team is great. It's a great partnership between Pensando and Aruba. You know, we, we look forward to delivering value for our joint customers. >> John: Thank you both for sharing under the hood and more details on the product. Thanks for coming on. >> [William And Shane] Thank you. >> Okay. The next evolution in switching, I'm John Furrier here with the power of nHPE Aruba and Pensando changing the game, the way customers scale up in the cloud and networking. Thanks for watching. (music playing)

Published Date : Oct 20 2021

SUMMARY :

the way customers scale with the cloud, and they ultimately result in service and the associated per node cost and just the performance and scale. introduce the industry's and this is how we and how hard it really is to pull off? because of the sheer amount of connections And so the other kind of on Silicon angle in the cube and fundamentally in the What are some of the use cases lead? and eliminates the need for And how does the and so aligned with the CX 10,000 FGA, John: So the customer and the ecosystem being diverse and rich but I got to ask you guys both, and the switching environment, and this is a first and so we're, we're all in it's, we look forward to delivering value on the product. the way customers scale up in the cloud

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Shane CorbinPERSON

0.99+

JohnPERSON

0.99+

WilliamPERSON

0.99+

ShanePERSON

0.99+

60QUANTITY

0.99+

hundredQUANTITY

0.99+

80%QUANTITY

0.99+

sixQUANTITY

0.99+

70%QUANTITY

0.99+

John FurrierPERSON

0.99+

FirstQUANTITY

0.99+

PensandoORGANIZATION

0.99+

Shane CorbanPERSON

0.99+

ArubaORGANIZATION

0.99+

SecondQUANTITY

0.99+

200 gigQUANTITY

0.99+

firstQUANTITY

0.99+

first questionQUANTITY

0.99+

CX 10,000COMMERCIAL_ITEM

0.99+

first configurationQUANTITY

0.99+

threeQUANTITY

0.99+

twoQUANTITY

0.99+

SiemensORGANIZATION

0.98+

William ChoePERSON

0.98+

bothQUANTITY

0.98+

400 gigQUANTITY

0.98+

first stepQUANTITY

0.98+

ForresterORGANIZATION

0.98+

Pensando AsicORGANIZATION

0.98+

second generationQUANTITY

0.98+

seven nanometersQUANTITY

0.98+

48-25 gigQUANTITY

0.98+

SecondlyQUANTITY

0.97+

todayDATE

0.97+

CXTITLE

0.97+

AsicsORGANIZATION

0.97+

singleQUANTITY

0.97+

HPE ArubaORGANIZATION

0.96+

oneQUANTITY

0.96+

three tierQUANTITY

0.95+

one finalQUANTITY

0.94+

first distributed servicesQUANTITY

0.92+

illiamORGANIZATION

0.92+

IniquinateORGANIZATION

0.91+

nHPEORGANIZATION

0.91+

ASICORGANIZATION

0.9+

hundred gigQUANTITY

0.89+

10 yearsQUANTITY

0.88+

RubikORGANIZATION

0.87+

CX 10,000 FGACOMMERCIAL_ITEM

0.85+

SplunkTITLE

0.84+

up to 800 gigsQUANTITY

0.83+

each computeQUANTITY

0.83+

NetOpsTITLE

0.82+

Aruba HPEORGANIZATION

0.81+

GuardiTITLE

0.8+

seven stateful servicesQUANTITY

0.79+

SecOpsTITLE

0.77+

VMware vSphere VcenterTITLE

0.76+

east-LOCATION

0.75+

CX 10 KTITLE

0.75+

layer fourOTHER

0.74+

single pointQUANTITY

0.72+

each eastQUANTITY

0.7+

GreenfieldLOCATION

0.7+

east westLOCATION

0.64+

questionQUANTITY

0.63+

John Maddison. Fortinet | CUBEConversation, July 2020


 

>>From the cube studios in Palo Alto, in Boston, connecting with thought leaders all around the world. This is a cute conversation. >>Everyone. Welcome to the cube conversation here from our Palo Alto studios. I'm John furrier, host of the cube. We're here with our remote crew, getting all the interviews, getting all the stories that matter during this time were all sheltering in place during the COVID crisis. We've got a great returning guest, John Madison, EVP of products and chief marketing officer. Fordanet John. Great to see you, uh, looking good with the home studio. They're getting used to it. Yeah, indeed. Good to be here again, John. Thanks for coming. I really appreciate it. We're hearing a lot about sassy, which has a secure access network adjuncts, zero trust network access. Uh, what does that all mean now these days? What does this sassy? Well, there's definitely a lot of hype around the word sassy, which is the security of the age. Uh, for us actually it confirms a strategy that we've had since the beginning of the company. >>And two important concepts. One is, uh, the coming together of, uh, networking and security. We could refer to it as security driven networking, and we've been doing it using ACX and appliances for a long time. Uh, we're now going to expand it to a cloud as well as that's one concept, again, bringing together networking and security or converging them in a way. And then the second concept is more around a platform approach. So if you look at the definition of sassy, it includes, it includes web gateway as a service you a trust Caz B, a wife, et cetera. And so bringing those together in a platform approach, we refer to it as the fabric. So we're actually really happy about those two concepts coming together. Maybe the name itself could be, could be different, but definitely the concepts and the technologies play really well to our strategy. >>Yeah, it's sassy. S a S E not two ways, not like SAS softwares of service. Wait for one noses cloud. Yeah. I tried using the full name and I've reverted back to sassy again. So short and sassy, keep it short and sweet. Um, okay, well this is a super important relevant topic for multiple reasons. One is COVID is kind of accelerated the future for everybody. And you know, we've been kind of riffing on Twitter and throughout the industry I've been calling it the big IOT, uh, experiment because the unforecasted disruption of COVID is forced everyone to work at home. So the notion of work changes workplace is now home workforce, the people, how their interaction with the networks, workloads, workflows, all changing new expectations, new experiences. This is the real deal. And the edge is where the action is. That's the big, new obvious architectural highlight here. >>Yeah, so we talked last time. I think it would just be getting this work from home, uh, element, but, um, we're still here. And I think what it says is that what is forced is that, uh, enterprises and customers need to look at their edges and they're increasing. So we always, the one edge was a new one over the last two years. As we introduced us the, when they had a data center edge, they had an endpoint edge and now you have a home edge. And so you've got to apply security as a cloud edge as well. You've got to apply security to these edges. And the key is the flexibility to apply the security you want and you need against this agent. And so we're seeing some customers right now, look at setting up mini enterprise networks to protect that home age again, in that, in the homes of their executives or developers. >>And we reported with the news. You guys had a couple of months ago around just as such been a feeding frenzy for hackers and bad actors to go after the home environment. Um, as well as the it guys who are working from home, you have the cloud consumption's shifted as well. You're seeing the cloud players doing extremely well because now you have more cloud, you have more vulnerabilities at the edge with the home. This is changing completely increasing the attacks. >>Yeah. The tack factors, you know, predominantly, still actually, you know, a lot of fishing, but then if you're on the network, that attack factor is very important. So for us, and, you know, we did an acquisition last week of opaque networks because that gave us an additional consumption model and different additional form factor. So if somebody going from the home straight into the cloud, or the pairing off a branching off an SD Wang connection straight into the cloud, we can now apply that cloud edge security throughout our sassy capabilities. And so again, the ability to have security at all, these edges has become very important going forward. So for us now we've got appliances, we've got virtual machines, we've got cloud delivery, and this is becoming very important to customers. I'm not saying, and customers are not saying they're going to go to just cloud only going forward. They're going to be hybrid. And so having those options is very important. >>You mentioned opaque networks, we reported that acquisition. Congratulations. What does that mean for Fordanet and where does that technology fit? And you mentioned software. Can you just take a minute to explain the acquisition impact Affordanet and where does the tech fit? >>Well, as I said, we've been driving a lot of this conversion, sassy conversions through our appliances. Um, but it's sometimes makes sense to put that security closer to the cloud during points or wherever. And so opaque, we really liked their model of building out these hyper hearing stations and making sure they got high-speed security there as well as edges. And so, um, we bring, we're going to bring that inside our environment, uh, update it to include some of our technology, uh, but it gives us now great flexibility, uh, of applying that security at the SD wan edge, the data center agent now without edge or longer-term roadmaps will integrate orchestration capabilities. It also includes a zero trust network access capability as well. So really when we looked at our, uh, of sassy framework, uh, we had most of the things in place. This now adds firewall as a service as well as zero trust network access, giving us the most complete sassy framework in the marketplace. >>What is the security component of the work at home? You mentioned earlier, there's more networks and companies are looking to kind of up level the capabilities. Can you give an example and take us through what that like and what companies are thinking about, because it's not just, here's some extra money for your home bandwidth, your people are working there. It's like, it's gotta be industrial strength edge. Now it's not just, um, you know, temporary and their kids are home too. So you got they're gaming, they're watching Netflix, people zooming in and doing WebExes all day long. >>Yeah, it can be as simple as putting a zero trust network access, you know, an agent on there and doing some security locally, and then going back through a proxy in a, we believe actually that it's, it can be even better than that. That can apply many enterprise security in your house through a next gen firewall, give high availability through SD wan, uh, then, you know, expand out their secure access and switching and end points. And we can do that today. I think what's going to be key going forward is as you're dealing as it, uh, teams have to deal with more of a consumer approach remotely in the homes, we're gonna have to simplify the way things get set up, such that you can easily separate out, maybe home usage from corporate enterprise users. So that will be something we'll be working on over the next 18 months. >>I mean, just the provisioning, the hardware, okay, here you go. Plug it in it. Should it be plug and play? And this is kind of back to the future of where SAS is going. I mean, the old days was plug and play was the technology. Now you've hit that concept. It has to be auto configured. You have to provision pretty quickly. What's the future of sassy in your mind. >>Yeah. And so, you know, if you think about, you know, coming back to the home usage, then people have dumbed down those routers and the security is very simplistic. So we, people can just plug and play. If you, it needs to be a bit more sophisticated. Uh, you're going to need to put some tools in place. We believe longterm that the sassy model, once you've got the platforms in place, once you've got SD wan in place, your Cosby or your sassy zero trust and longterm, you're going to need an orchestration system. That's more AI driven. So we've done a lot of work on AI around security and making sure we can see things very quickly. Um, but the longterm goal, I think will be around AI ops, AI network ops, uh, where the system and the big data systems are looking across your network, across these different components to see where there may be an issue. Maybe there's a certain length has gone down across a certain ISP. We need to bring that back up. Maybe there's a certain cure or as to an application in the cloud somewhere. So we need to change the OnRamp. Uh, so once everything's in place and you have that console and policy engine that can look across everything, and then we need to get smarter by looking at the data and the logs, et cetera, and applying some of that AI technology. >>You know, John, we've been following Fordanet as you know, for many, many years and watching the evolution of you guys as a company. And also as the industry, the new waves are coming in. Um, a lot of the stuff you're doing with the fabric and now the secure driven networking has been kind of on the playbook. So I want to get your thoughts before we get into those topics and define them and kind of unpack them. But generally customers are looking at, um, a slew of vendors out there and you have 10 of two approaches. You have a platform, and then you have the we're an application or fully full stack or SAS or something. And this there's trade offs between the two. And how should customers understand the difference? Because there's different value propositions for each platforms, more enabling out of the box, SAS or point solution can solve a particular thing, but it may not have that breadth. How should customers think about a platform approach or fabric and how should they think about the value and how to engage with that longterm? >>Yeah, I'm definitely seeing more customers look towards a platform going forward. They just can't manage all the different point solutions and you don't have to train an individual in that product. You have to have a separate management console, you have to integrate it. And so more and more I'm finding customers wanting to converge, which is the basis of sassy consolidate applications onto a platform of security applications. What's important over that platform is that the consumption model is flexible enough to be an appliance, to be a virtual machine and to be cloud delivery does as a customer's networks move and their orchestration systems move into different, more cloud, or they've got their IP enabling their factories, for example, then they need that security to be flexible. So yes, you need to be a platform as the way forward. Um, but two things. One is you need a flexible consumption model for it. You know, clients, virtual machine and cloud. And also that platform needs to be very open. It needs to have connectors into the main orchestration systems that needs to allow people to build API and automation. So, uh, yes, you, you need a platform, but it needs to be open and it needs to be flexible. >>Great, great insight there. And that's exactly what the marketing, especially with cloud the kind of scale, second follow up question to that is how do you tell the difference between a tool camouflage is a platform. So I have a tool I want to sell you a tool, but no, it's a platform. So a lot of people are peddling tools and saying their platforms. How do you know the difference? >>Well, to me, a platform that has much greater scope across the attack surface festival, they attack factors whether that be email or application the network, the end point. So platforms not just of a specific attack back to go across the complete surface. And then also a platform is Wednesday organically built, allows those products to communicate. So then you can build automation across it. It's very hard to build automation across two or three different vendors. They have different scripts. So been able to build that automation. And then of course, on top of that, to have a single view, single visibility capability, as well as longterm applied that AI ops across it. So platform is very, very different from the, some of the tools I've seen in the marketplace. >>I want to get to your reaction to a comment that your CEO said about security driven, networking, and underscores what we've been saying for years, blah, blah, blah. He goes on in this era of hyperconnectivity and expanding networks with the network edge stretching across the entire digital infrastructure, um, networking and security have to be kind of be their, their convergence. You mentioned describe how you view hyper-connectivity and expanding networks and how the edge stretches across the digital infrastructure. What's what does that look like? Can you share your vision of that? >>Well, when you think about networking, if you go back 20 years, when you have these 10 megabit per second connections, learning, networking, and routing and switching, they haven't really changed that much over the last eight years, 20 years, they've just got a lot faster, gone to now to 400. You give us a second, but the basic functionality is the same. And so it's allowed them to go a lot faster. Um, security is very different, even though it started off with firewalling than VPN, and then next gen firewall, SSL inspection, all these functionalities IPS have been added, making a lot harder for it to keep up in the network. And so one of the fundamental principles of security and networking is bringing these two things together, but accelerating them either using a six and now cloud through our acquisition, uh, to allow those to run in a converged format. >>And that's very important because as I said, there's now more, you can look at it two ways. You can say the perimeter has expanded because it used to be a very narrow perimeter. The data center across these areas, or at the edges have formed as well. There's new edges sitting at the OT environment, sitting at the wan edge, sitting at the home mattress. I talked about seeing the cloud edge. And so the ability to apply that security in very high performance, very high quality security, not just a small sampling of security, a full enterprise stack, but those edges is going to be critical going forward. And the flexibility to apply in different ways is going to be very important. >>I think the convergence piece is totally relevant and honestly it consolidating into a platform is very key point there. Um, while I got you here, I would just like you I'd like you to define what is security driven networking and what does it mean to be security driven? So define security, driven, networking, and give an example of what it means. >>Yeah. And so I think it's, I think the one edge was one of the best examples of it. I mean, actually go before that next gen Fila was where you bought firewalling and then content inspection to go there. But I think the latest one is definitely the one edge or secure SD land where you had a networking function, which was to get the users to the right applications. And so they got this application now steering that goes out through there. Well, you also want to apply security to that because security into the wham, you've also got to protect the land. And so the ability to run a security stack there, whether it be IDs, right, patient control is very important. So getting all those networking functions, working at high speed, getting all the security functions, working at high speed, uh, is that it's the kind of the Genesis of security driven networking, and you can apply it there. We can also apply it in other places at the age, in the cloud. Now the home, uh, it's a very, very important concept, uh, to be able to run networking and security together. But high speed, >>Everyone has their own kind of weird definition of sassy, depending on when you're building your own or different analyst firms. Uh, I noticed you guys have a different take on this. Even Gartner has a different view on this. How do you guys diff differ from that, that definition and what should people be aware of when they hear that? What is the right definition? >>Yeah. You know, it's unfortunate. I mean, I think Ghana does some good work there and that they define it and I've come up with sassy, but this is like acronym soup. And, you know, I want a bit of next gen firewall on my sassy. It's just, it's just so many different terms. It confuses the customer. Then what makes it more confusing is that vendors look at their portfolio and go, Oh, sassy is a hot topic. I've got a sassy as well. And really, it should be very clear what the definition from Gardner is. It is bringing together security and networking. Now their definition is that they, uh, you should do that in the cloud, which we agree with as well, but it can only be in the cloud. The reason it's in the cloud is because not many people have got the ability to run on an appliance very fast. >>So we believe our different stairs that you should be able to run it on an appliance virtual machine in cloud. And then the second kind of differences that they've defined the components of Sassies being Estee, wagon, Cosby, firewalls, a service zero trust. We also think that the land age is very important. So we would add into that definition, that secure access of wifi and Ethan at switching as well. And so we try and point out, you know, the gun definition and we also point out where we differ and I think that's fair to the customer can make a good decision. >>I think it is fair. And I think one of the things I've been saying for years, and I love garden, I love the guys over there and gals. I just don't think that their business model is real time as much, but they ended up kind of getting it right down the road. But you brought up a good point. And again, I've been saying this for years, cloud changes Gartner's model because there's, if you have quadrants, it implies silos and implies categories. And one of the best things about cloud is it does horizontally scale. So some of the best vendors actually have multiple capabilities that might fall on different quadrants that may or may not be judged on a criteria that meets what cloud's doing. So, yeah, for instance, Asics, you mentioned right. That's in there too. You get cloud and ACX is that where they've got two different categories? You add the edge in there. If you do all three, really great as an integrated, converged and consolidated platform, you're technically awesome, but you might not fit in the quadrant. >>Yes. That's a really good point. I have this conversation with them all the time in that traditionally enterprises have a networking teams and security teams, and they've been in silos or I've had a networking team that just does switching or just this routing, just this SD wan. And I have a security team that does web gateway, and then they like to separate them all into different components. When you look inside those Nike quadrants, they're all different, even at the same vendor, the different products. And what we like to do is bring it all together. You a single operating system, a single appliance or cloud virtual machine. Sometimes it's not quite, it doesn't quite fit the model, but in the end, you're trying to do the same thing. Know, and COVID-19 >>One of the real realities that everyone's dealing with is it does expose everything and an expose. And again, it's been a disruption unforecasted, but it's not like an outage or a flood or a hurricane. If it happened and it's happening, it really puts the pressure on looking at the network. It's looking at how you can have continuous operations. How are you working with your people and workloads, workforces apps. You got to have it all there. And if you're not digitally enabled, you're going to be on the wrong side of history. This is what companies are facing every day. And they've got to come back and double down on the right project. So every CXO I talk about, that's the number one challenge I need to come out of the pandemic with a growth strategy and an architecture. That's going to allow me to take advantage of the new realities. Hey, it's really good for people to work at home. That's cool. Some people are going to continue to do that. Maybe that's normal. Maybe that's a new tactic >>And it's going to vary by industry as well. So if I'm a retail outlet, I absolutely need it 100% of the time, but those retail outlets cause people are ordering online and then they're driving up. And so it has changed the dynamics. It's for me working at home, I have to be on all the time. And so the ability to do really good, high quality networking, high availability, high IQ of as, with this integrated security across the different edges is super critical. >>I was talking with a network friend of mine. Again, we were having a few zoom cocktails and do a little social networking online. And we were like, and we've, and we've mentioned it before in the queue, but we keep coming back to the land is the new land. And meaning that it's in the old days, land was everything, everything, the local area network, and you were inside the data center, everything was great on premises. When is the new land? So if you think about it that way you go, okay, when edge I got a, now Atlanta at home, you got to SD wan and your house, of course you worked for Fournette. So it's a little bit beneficial for you, your, your, your, your geek there, but this is the new normal where it's all one network. It's not just a land link, it's a system. Can you react to that? What's your take on that? When is the new land kind of ref, >>First of all, it can't be too picky. He goes on the CMO as well. So there's no talk about the geekiness. Um, but, um, it's just, it just makes as a skip saying, it's, it's, it's making sure that wherever you may be, uh, you know, you're doing less traveling these days, but that may come back at some point or where they are at a branch office or a campus environment or wherever applications, and then moving around in different clouds, in different areas, in terms of consumption of workloads, um, wherever that's happening, you gotta be able to be flexible and applying that security to the different edges, land edge, one edge home edge data center edge. And so the ability to do that, uh, while providing high speed and connectivity, uh, is very important. And then again, as you go forward and you implement that platform approach. So not just the point product now, three or four products working together, uh, being able to apply that policy orchestration and AI ops is going to make sure that they get that user in the end. It's all about the user experience. Do I have a high quality of experience, whatever application I'm using? That's the key measurement in the end? >>You know, one observation I would have, if you look back at the whole virtualization trend, going back to the early days of VMware, that kind of enabled Amazon and kind of having a large scale kind of infrastructure, hyperconvergence really kind of collapsed everything together. And now you seeing things with Amazon, like outposts, you seeing, you know, these non premises devices, which is basically one cloud operations kind of highlights what you're saying here. And I want to get your thoughts on this because the combination of Asics with cloud, it's not a bug, it's a feature for you guys. That's a value proposition and it's kind of consistent with some of the big players like AWS. When you look at what they're doing and apprenticeships, for instance, what they're putting in the servers, having that combination of horsepower Asex with cloud is a guiding principle of the future architecture. Can you share your thoughts was also, you guys are, are announcing that and have that feature. >>Yeah, well, w another reason why I like the opaque acquisition as they were their major appearing pubs into the different cloud service providers that were using hardware and that hardware, uh, we, we can run hardware and with our Asics almost 50, a hundred times faster than equipment CPU. So I've got a firewall application I've gone on appliance. There, I may need a hundred virtual machines and, and CPU they're running the same thing. So again, we're coming back to our definition of security driven, networking in our minds. It can be basic, it can be virtual machine and it can be cloud. Now, imagine if we can take the best benefits of basic and combine that with cloud, uh, that's a great model going forward again, given that flexibility. So when people think cloud something has to run on something, it doesn't run in fresh air. So, you know, the big cloud vendors are putting in some Asex to accelerate some of the AI stuff, and we're going to use the same thing in some of our major, what we call 40 sassy. You know, our naming methodology is 40, whatever it does or going forward to provide us that performance and high availability now. Yeah. So you're always going to need some flexibility of virtual machines in certain areas, but we think the combination of both, it gives us a great advantage. Yeah. >>And there's definitely evidence that, I mean, there's a, there's kind of two schools of thought on hardware. Are you a box mover, you know, commodity general purpose, or are you using the hardware and a system architecture, acceleration has been a huge advantage, whether I've seen companies doing accelerated Kubernetes processing, you know, for clusters and some, you know, see GPS are out there. It's, it's, it's how you use the hardware. Yeah. That's the, really the key it's and again, back to the architecture. So, okay. So wrapping up, if you, if you believe that, and you look at the fabric that you guys are having out there, and as it evolves, what's the, what's the next level for 400. How do you see this going forward? You've got security driven networking, and you got the fabric. What's next? What are you guys working on the product side? >>I know you're public, you can't reveal any future earnings, but give us a taste of kind of the direction on the roadmap. I think, you know, we've got now all the, all the kind of component that underlying components of the platform in terms of the ability to apply appliances, deliver it by appliances or virtual machine or cloud. Um, we've got a very broad portfolio from endpoint, uh, all the way into, to the cloud and the networks, all those things that are in place. Obviously you always need some features here and there as you go forward and nest it when and next gen firewall, et cetera. Um, but I think the longterm, I think a goal for his nine is to, again, to apply a bit more intelligence, uh, both from a security perspective and from a network perspective, such that we can predict things, we can automatically change things. >>We can build automation and react to things much more quickly. So I think the building blocks are in place. Now. I think it's the ability to provide a bit more smarts across it, uh, which of course takes big data and very specific application programming. And I think, uh, definitely our customers are asking us about that. And we look very closely with our customers to build out that, to make sure it meets their needs going forward while it's great to see the platform continue to grow and, and fill in a holistic view of the, of the landscape from edge to throughout the enterprise. So a great strategy and thanks for the update, John Madison, the VP of product and CMR for that. John. Great to have you on. Thanks for coming on extra. Okay. This is the cube conversation here in Palo Alto studios. I'm Chad for a year hosting the cube. Thanks for watching.

Published Date : Jul 30 2020

SUMMARY :

From the cube studios in Palo Alto, in Boston, connecting with thought leaders all around the world. I'm John furrier, host of the cube. So if you look at the definition of sassy, it includes, And you know, flexibility to apply the security you want and you need against this agent. You're seeing the cloud players doing extremely well because now you have more cloud, And so again, the ability to have security at all, And you mentioned software. Um, but it's sometimes makes sense to put that security closer to the cloud during points or wherever. So you got they're gaming, uh, then, you know, expand out their secure access and switching and end points. I mean, just the provisioning, the hardware, okay, here you go. and you have that console and policy engine that can look across everything, and then we need to get smarter by And also as the industry, the new waves are coming in. You have to have a separate management console, you have to integrate it. So I have a tool I want to sell you a tool, but no, it's a platform. So then you can build automation across it. Can you share your vision of that? And so one of the fundamental principles of security and networking is bringing these two things together, And so the ability to apply that security in very high performance, very high quality security, Um, while I got you here, I would just like you I'd like you to define what is security driven networking And so the ability Uh, I noticed you guys have a different take on this. The reason it's in the cloud is because not many people have got the ability to So we believe our different stairs that you should be able to run it on an appliance virtual machine in cloud. And one of the best things about cloud is it does horizontally scale. And I have a security team that does web gateway, that's the number one challenge I need to come out of the pandemic with a growth strategy and And so the ability to do really good, high quality networking, And meaning that it's in the old days, land was everything, And so the ability to do that, And now you seeing things with Amazon, So, you know, the big cloud vendors are putting in some Asex to accelerate some of the AI stuff, you know, for clusters and some, you know, see GPS are out there. I think, you know, we've got now all the, all the kind of component Great to have you on.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
JohnPERSON

0.99+

twoQUANTITY

0.99+

AmazonORGANIZATION

0.99+

John MaddisonPERSON

0.99+

AsicsORGANIZATION

0.99+

Palo AltoLOCATION

0.99+

100%QUANTITY

0.99+

John MadisonPERSON

0.99+

10QUANTITY

0.99+

July 2020DATE

0.99+

BostonLOCATION

0.99+

AWSORGANIZATION

0.99+

EthanPERSON

0.99+

second conceptQUANTITY

0.99+

GartnerORGANIZATION

0.99+

AtlantaLOCATION

0.99+

threeQUANTITY

0.99+

one conceptQUANTITY

0.99+

two thingsQUANTITY

0.99+

NikeORGANIZATION

0.99+

COVID-19OTHER

0.99+

two waysQUANTITY

0.99+

20 yearsQUANTITY

0.99+

bothQUANTITY

0.99+

OneQUANTITY

0.99+

AffordanetORGANIZATION

0.99+

last weekDATE

0.98+

two conceptsQUANTITY

0.98+

Fordanet JohnPERSON

0.98+

20QUANTITY

0.98+

each platformsQUANTITY

0.98+

FordanetORGANIZATION

0.98+

two important conceptsQUANTITY

0.98+

400QUANTITY

0.98+

oneQUANTITY

0.98+

todayDATE

0.98+

zero trustQUANTITY

0.97+

secondQUANTITY

0.96+

a secondQUANTITY

0.96+

second kindQUANTITY

0.96+

FournetteORGANIZATION

0.95+

one edgeQUANTITY

0.95+

sixQUANTITY

0.95+

almost 50QUANTITY

0.94+

single applianceQUANTITY

0.94+

three different vendorsQUANTITY

0.94+

TwitterORGANIZATION

0.94+

two different categoriesQUANTITY

0.93+

single operating systemQUANTITY

0.93+

FirstQUANTITY

0.93+

WebExesTITLE

0.93+

two approachesQUANTITY

0.93+

nineQUANTITY

0.92+

single viewQUANTITY

0.9+

COVIDOTHER

0.89+

a yearQUANTITY

0.89+

10 megabit per secondQUANTITY

0.88+

GardnerORGANIZATION

0.87+

GhanaORGANIZATION

0.86+

last two yearsDATE

0.86+

WednesdayDATE

0.85+

Caz BORGANIZATION

0.85+

pandemicEVENT

0.85+

two schoolsQUANTITY

0.85+

one networkQUANTITY

0.83+

couple of months agoDATE

0.83+

a hundred timesQUANTITY

0.81+

single visibilityQUANTITY

0.8+

AsexORGANIZATION

0.79+

SASORGANIZATION

0.78+

Randy Pond, Pensando | Future Proof Your Enterprise 2020


 

(upbeat music) >> Announcer: From theCUBE studios in Palo Alto and Boston, connecting with thought leaders all around the world, this is theCUBE Conversation. >> Stu: Hi, I'm Stu Miniman and welcome to this special Cube presentation. We're talking with Pensando, and their event is "Future Proof Your Enterprise", to help us really understand where the company is, and the partnerships, what they're hearing from customers. Really happy to welcome back to our program Randy Pond, he's the Chief Financial Officer at Pensando. Randy, thanks so much for joining us. >> Randy: My pleasure, thanks for having me. >> All right, well Randy, obviously today, we're talking to people everywhere, they're remote so, not quite as plush as the last time we talked to you at the Goldman-Sachs office, in New York City, beautiful view in the background. That was a great backdrop, when you talk about bringing a company out of stealth, John Chambers there, your chairman, Antonio Neri >> Yeah Neri. >> Talking about the investment in the partnership. And Goldman-Sachs, an excellent customer there, here we are little bit more than six months later and that partnership with HPE is taking the next step. You've got the general availability, this month, of the HPE Proliant with Pensando Solutions. Bring us up to speed a little bit though, we'll talk about HPE maybe in a second but, your customers, your progress, you had, I believe it was up to your C round of funding, when you came out of stealth so, give us your viewpoint as to where the company is today. >> So today, I think, we're sort of, divide the conversation between financial and a business perspective. So financially, we're in great shape, the C round came together very well, we were way over subscribed. We raised our limits to secure additional funding, which has worked out really well, getting where we are currently with the pandemic. So financially, we're in great shape, our case burn has held steady and we've done a good job of forecasting, that's why I thing the Bird's pleased. From a business perspective, we've done a really good job delivering on our real maximum product perspective. So, the team has released the cloud production, we released the cloud to customers about a month or two ago. We just did a release to the enterprise space, through HPE. We got another release coming up the end of this month. There's releases scheduled for Q3 and Q4 of this year. Our second ASIC will come back, I think, the 15th of June, so we're going to get access to our new design, I think that's great news. You know our cloud customers are excited about that 'cause it provides a little more capability than the current device does. And we had a great Q1 and we're off to a great start on Q2. We overachieved in Q1, we look like we're going to overachieve again in Q2, both in terms of units and dollars, so we're in a pretty good place. >> Yeah, I'd like to see if we could break down say kind of the financial and the business piece. On the financial side piece, you've worked with this team for quite a long time, there's got to be a different financial model that you put in place when you know that you've got, really, your exit built in, add from the three spin-ins before, proof the product, get it out there and then, well, I've got an in-house feed with a full panel there, as opposed today. Is the model we should be thinking, what percentage of that is OEM? You talk about there's the cloud model, and the enterprise model and, how do you structure things a little bit differently for that type of model versus, maybe, what the spin-ins were or a traditional start-up. >> Sure. >> that might have a different, a few different models to choose from? >> So, we're much closer aligned to a traditional start-up environment. Now, the one unique point is the HPE relationship because they've been my partner, they are my primary go to market partner in the enterprise space today but, they're also a strategic investor. So, the reality is, in the enterprise space we have to sell the product through the OEMs, the average enterprise customer doesn't have the capacity to install themself. But that is a very different model than it is in the cloud side. So, it's an indirect sales model, most likely through HPE and other server providers, like Dell, Cisco possibly, and Super Micro. Every customer has their sort of, requested server manufacturer. On the cloud side, individuals build their own so, that's a, I ship to them and they install it themselves, it's a different software model, it's a different manufacturing model as in, we have a more traditional direct sales model on that side, but we've got a partner middle model on the enterprise side today. We've set 'em up as both, HPE sort of serves like a quasi Cisco environment for us, because we're depending on their engine to find our leads, and it's worked out really really well. >> Excellent, maybe bring us inside a little bit, where you are with (away from microphone) about customer acquisition leading up to now and what's the expectation now that HPE is fully ready to roll. >> So, we, I'm going to start the conversation again. There's the cloud side, so on the cloud side we have three committed customers today. One is in production, the other two are going into production later part of this year, they need the release we're going to give them in September/October timeframe but they've committed to us from a design perspective. And then there's a follow-on generational product in '21 where they really ramp hard. I already have a bind contract with two, I'm working on the third. And, on the enterprise side, we're modeling ourselves after the top 200 HPE customers right now. They normally align themselves around financial services, pharmaceuticals, transportation, sled, we're working through those customers. We have active talks with many of them today, they're in our sales pipeline, we manage that relationship together. Generally, HPE opens the door, we explain the technology to the technical team, they say they can see a place for us and they let us stand up a plat, and then we go from there. >> Excellent, so Randy we referenced the global pandemic going on right now. It's been a bit of a bifurcated model in the tech world. Though it's been definitely a tailwind, somewhat, from the cloud standpoint, there's many infrastructure pieces that have seen an immediate acceleration, things like work from home technology. So, there's certain devices and certain deployments. And there's other things that, of course, we put a pause button trying, too much uncertainty out there. What are you seeing at the market and how's that impacting you, as a relatively new start-up? >> Yeah, so in general, your point is well taken. The cloud players are telling us their demand is up dramatically and therefore the signal they're sending us is, they want to accelerate deployment and it's likely it's going to be bigger than we originally had estimated so, that's been great news for us. In the enterprise space it's really very different, you know we're not selling a lot of product to Walmart, or Gap, or the retail space, they're struggling mightily, any hotels, motels, Carnival Lines is not buying our product today. But, if you look at the financials, if you look at the pharmas, their demand's up quite a bit, they're both buying ahead a little bit to hedge their bets in the supply chain, for the situation today, and they're actually seeing the real demand go up. And, the banks especially have seen it go up 'cause their work from home has gone through the roof. So, it's been a good opportunity for us to sort of seize the moment and demonstrate how we can be part of their new implementations, and bring new services to 'em. >> Yeah, Randy, wonder if you can actually give us, a little bit, that voice of the customer and what is the problem you're solving? Because, we talked about, there's certain immediate initiatives that accompany the era, absolutely like, today, security is more important than ever. When people are working from home, the bad actors actually are trying even harder to get involved there, we talked a little bit about cloud, so what is that itch that Pensando scratches and, therefore, how do you fit into the current landscape? >> Sure, you know, with our customers today there's similar problems and dissimilar problems, between the cloud and the enterprise. The similar problems is that Pensando quickly solves things, like East West security inside of their environments, their computer environments, which is difficult to do today, it's expensive and difficult to do today. We've provided pervasively and wire rate, and that's sort of an easy sell, initially. Another one that's been pretty easy for everyone to look at is observability and telemetry because of where we're positioned, in the computer space, we see every packet, which provides us with a lot of knowledge about what's going on in their environment. So, that's been a pretty easy initial sell. In the case of the enterprise customers, we can sell other pieces of their solution that are either expensive, or introduce latency or management problems. Whether it's firewall technology, or load balancing technology, or micro segmentation technology, all of which we can do inside of our blade. And today it's done either through appliances or through virtual machines consuming CPUs. In the cloud space, we do all of that, plus we allow them to download their own image into our devices today, which is pretty powerful, we have a lot of memory and we have a lot of capacity, from an Arm core perspective. And we allow them to pick and choose the features and functionalities they want, and then run everything at wire speeds, at much faster speeds. The enterprise is running 10/25, the cloud partners are running 25/50 going to 100, where we're even more compelling, we think. >> Randy, want to get back to talk a little bit more about HPE. You spent long time working at Cisco, for a good part of that HPE was one of your bigger partners on that. So, tell us what it's like working with HPE, any compare/contrast would be welcome. >> You know, it's interesting, so the cultural environment of HPE, under Antonio Neri, is very similar to what we saw at Cisco. And he and John have a phenomenal relationship, it's a very collegial environment, it's a very bright environment. They move quickly, for a big business. Where it's vastly different is they are much tougher on the numbers side because they're under much more margin pressure, and compounded pressures, that we never had (chuckles) at Cisco, just in all fairness to them. But, if we look through the organization, like the executive that was assigned to our account, from a sales perspective, used to work at Cisco. I think one or two of his guys used to work with Cisco. There's program management people that used to work with Cisco, there're people in engineering that came from Cisco so, it's an environment that's similar enough that it's easy enough for us to navigate. And, we're connected sort of on all levels, which has really been useful, and we have a weekly standing dialog across all the different functions. So, we're pretty deeply embedded with HPE right now and it's gone very very well. >> Yeah, you said that, even with the global pandemic right now, that Pensando is a bit ahead of where you expected shipments to be. I'm curious always, when I talk to a CFO, how do you see macroeconomic impact of what is going on there? Any concerns on your end about supply chain, either for yourselves or for partners, like HPE? How do you see what we're currently going through and the recovery future? >> So, it's an interesting question. You know, getting this pandemic sort of processed through the supply chains like a pig through a python, there's just no way to get around it. I mean, you know we had the first breakdown when they closed the country of Malaysia and I just couldn't build final product. They literally just shut the place down so, it took us about 10 days to get ourselves up and running, from a skeleton perspective. The government worked with us, they let a small crew come into our manufacturing partner to get some finished goods off for one of our OEM customers. As we've come back up, we've seen lead times extend on some of the custom parts, it's just a fact of life. I think there's a little bit of an artificial demand that's driving the supply chain a little bit crazy right now because now people are panicked that what happens if it comes back, will I get caught again, can I get enough inventory to buffer myself for, you know, two weeks to three or four months, depending on how aggressive you want to be, or conservative you want to be in that space. And then, I think, as the supply chain trickles back online, you end up discovering that yes, I can build final product, and I can get the Asics, and the memory, but now I want to buy some, you know, RS232 devices and it turns out that sure he's got 'em but the magnetic, that goes inside of it, that comes from Western China, they aren't quite up and running just yet. But we're seeing legacy problems, nothing catastrophic, nothing that's been painful. We've had to move some work around to get an incremental volume for ourselves, we've added fab vendors, and a few other things. So, it's really made us focus on second sourcing everywhere we can because we thought we were small enough, and the volume perspective wasn't that big a deal, we'll just get second sourcing once we get the product to market. That's heated back up and we're doing all that work now. So, I think, knock on wood, our recovery has gone very well we don't see any big problems in the supply chain. Now, I think, the bigger the player, like an HPE, and the longer the window they were shut down, the harder they pull when they turn the supply chain back on. But I think the big players, Cisco, HPE, and others it's going to take them a longer time, I think, to really see how this trickles all the way through, 'cause you can't really get good visibility how much safety stock or buffer stock does everybody have, at every level of the chain. So, everybody pulls at once, you run dry in a week, a month? Is it fast enough to recover, from a production perspective? All those things, I think, they're still not quite resolved yet. >> Just one other related aspect of the pandemic, that I would love your viewpoint on. You know, work from home, obviously, is what everyone is doing right now. I'm curious if you think that, what the recovery would look like from that standpoint, is there anything from Pensando that makes you shift where you think about hiring it? I've been to the Cisco headquarters and the long street, with a lot of buildings, and a lot of people. And everybody's wondering, will that headquarters, and centralized structure, that we had before, is that forever changed? >> You know that's a great question. So, it's for certain changed, I think, in terms of therapeutic, or a vaccine, for the current covid virus. So, that's just a fact of life and we've been comparing notes with a lot of other companies about what they're doing to bring the workers back, who want it, who are comfortable and want to come back to work. 'Cause, even inside of Pensando, I've got some folks who're like, "Listen, I'm not comfortable coming back, "I've got kids at home , I don't want to take the chance." That's fine, we don't have a problem with that. And, quite frankly, we can make a case that, in some of our functional areas, we're more productive than we were before the pandemic. In India specifically, this has been a boon for us because they're not getting on and off buses, they're not spending three or four hours trying to get back and forth to work, they're happy working from home, we're happy having them at home. The guy who runs India for us says productivity's up, and employee satisfaction couldn't be higher. Our plans now is, we have to bring a small team back into our headquarters, in Milpitas, to bring up our new Asic. But, that's going to be 15 to 20 people, and not all at one time, we're going to spread them out. We're already articulating what parts of the building can and can't be used , one way hallways, masking, temperature taking, everything you would expect. The next phase for us is some sort of rotational work where we'll say, "We're going to bring 25% of the people in, "30% of the people in, you work the week, you're off "for two, you work the week you're off two." And so we can get through the back of this thing, it's unlikely, it's almost impossible, in my mind, we would bring back 100% of our employees in the building. Now, does that change the view longterm? It's a great question because, I think what it's forced us to do is to get more comfortable with remote work, so that we can truly make it an option of any one employee, in specific areas. Like, the lab guys have to be in the lab, and the IT guys got to be in the computer room, but if you're a software developer, or if you're a marketing guy, do you really have to be in the building? And I think it's pushed us to really learn to manage them more effectively, with remoteness. And I think it provides us, at least, with options going forward. When I hire the next 100, do I have to put 'em in a building someplace or do I just deal with them where they are and bring them into the fold? We've brought on dozens of people, since the pandemic started, and quite honestly, we onboard 'em , we train 'em, and we mainstream 'em remotely and it's worked out great. >> Excellent, all right Randy let's bring it back to the HPE partnership for the final question. >> Sure! >> Tell us what we should be looking at, through the rest of this year, what the general availability of this means to your business and the impact you expect it to have on your customer. >> So, from an HPE perspective, I think this is going to be great innovation that they're bringing to the marketplace, to their customer set. It allows them, I think, to separate themselves from the market, at least for some period of time, until the other players get pulled along by the end users. Their product has a pretty steep ramp, their front half and the back half of the year, for us, are dramatically different, in terms of size and ramp. And it really sets us up for a very large, we hope, fiscal '22, which , for us, will end in January 31st of '22. But we're going to know, I mean we go GA in just a few weeks and we're going to get a sense if we can turn these POCs into end customers. And we're also going to see the ramp of the cloud customers in Q4. So, you know, I really feel like, both for us and for HPE, the next three four months, as we start getting back to some regularity of interacting with customers physically, not just remotely, and we see the early benefits and some of the early profit ownership analysis on deployment erect technology. This could be dramatic for us and for them, quite honestly. >> All right, well Randy Pond, CFO of Pensando, thanks so much, really a pleasure catching up with you and getting to discuss about how Pensando's helping to future proof your enterprise. >> Thank you much, my pleasure, have a great day. >> All right, I'm Stu Miniman, check out theCUBE.net for all our coverage, thank you for watching, thank you. (soft music)

Published Date : Jun 17 2020

SUMMARY :

leaders all around the world, and the partnerships, what thanks for having me. the last time we talked of the HPE Proliant So, the team has released Is the model we should be thinking, So, the reality is, in the ready to roll. the cloud side we have three from the cloud standpoint, and it's likely it's going to into the current landscape? In the cloud space, we do all of that, of that HPE was one of your on the numbers side because and the recovery future? and I can get the Asics, and the memory, aspect of the pandemic, and the IT guys got to partnership for the final question. and the impact you expect and the back half of the and getting to discuss Thank you much, my you for watching, thank you.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
CiscoORGANIZATION

0.99+

DellORGANIZATION

0.99+

WalmartORGANIZATION

0.99+

RandyPERSON

0.99+

HPEORGANIZATION

0.99+

Goldman-SachsORGANIZATION

0.99+

Antonio NeriPERSON

0.99+

15QUANTITY

0.99+

100%QUANTITY

0.99+

JohnPERSON

0.99+

Randy PondPERSON

0.99+

oneQUANTITY

0.99+

twoQUANTITY

0.99+

Stu MinimanPERSON

0.99+

25%QUANTITY

0.99+

BostonLOCATION

0.99+

New York CityLOCATION

0.99+

IndiaLOCATION

0.99+

PensandoORGANIZATION

0.99+

AsicsORGANIZATION

0.99+

30%QUANTITY

0.99+

John ChambersPERSON

0.99+

Palo AltoLOCATION

0.99+

Stu MinimanPERSON

0.99+

two weeksQUANTITY

0.99+

threeQUANTITY

0.99+

NeriPERSON

0.99+

four monthsQUANTITY

0.99+

Pensando SolutionsORGANIZATION

0.99+

MilpitasLOCATION

0.99+

15th of JuneDATE

0.99+

SeptemberDATE

0.99+

OneQUANTITY

0.99+

Randy PondPERSON

0.99+

OctoberDATE

0.99+

pandemicEVENT

0.99+

Western ChinaLOCATION

0.99+

StuPERSON

0.99+

thirdQUANTITY

0.99+

Super MicroORGANIZATION

0.99+

bothQUANTITY

0.99+

todayDATE

0.99+

Q4DATE

0.99+

'21DATE

0.99+

four hoursQUANTITY

0.98+

a weekQUANTITY

0.98+

20 peopleQUANTITY

0.98+

GapORGANIZATION

0.98+

100QUANTITY

0.98+

fiscal '22DATE

0.98+

about 10 daysQUANTITY

0.98+

one timeQUANTITY

0.97+

Q2DATE

0.97+

a monthQUANTITY

0.97+

Randy Arseneau & Steve Kenniston, IBM | CUBEConversation, August 2019


 

from the silicon angle media office in Boston Massachusetts it's the queue now here's your host David on tape all right buddy welcome to this cute conversation my name is Dave Ville on time or the co-host of the cube and we're gonna have a conversation to really try to explore does infrastructure matter you hear a lot today I've ever since I've been in this business I've heard Oh infrastructure is dead hardware is dead but we're gonna explore that premise and with me is Randy Arsenault and Steve Kenaston they're both global market development execs at IBM guys thanks for coming in and let's riff thanks for having us Dave so here's one do I want to start with the data we were just recently at the MIT chief data officer event 10 years ago that role didn't even exist now data is everything so I want to start off with you here this bro my data is the new oil and we've said you know what data actually is more valuable than oil oil I can put in my car I can put in my house but I can't put it in both data is it doesn't follow the laws of scarcity I can use the same data multiple times and I can copy it and I can find new value I can cut cost I can raise revenue so data in some respects is more valuable what do you think right yeah I would agree and I think it's also to your point kind of a renewable resource right so so data has the ability to be reused regularly to be repurposed so I would take it even further we've been talking a lot lately about this whole concept that data is really evolving into its own tier so if you think about a traditional infrastructure model where you've got sort of compute and network and applications and workloads and on the edge you've got various consumers and producers of that data the data itself has those pieces have evolved the data has been evolving as well it's becoming more complicated it's becoming certainly larger and more voluminous it's better instrumented it carries much more metadata it's typically more proximal with code and compute so the data itself is evolving into its own tier in a sense so we we believe that we want to treat data as a tier we want to manage it to wrap the services around it that enable it to reach its maximum potential in a sense so guys let's we want to make this interactive in a way and I'd love to give you my opinions as well as links are okay with that but but so I want to make an observation Steve if you take a look at the top five companies in terms of market cap in the US of Apple Google Facebook Amazon and of course Microsoft which is now over a trillion dollars they're all data companies they've surpassed the bank's the insurance companies the the Exxon Mobil's of the world as the most valuable companies in the world what are your thoughts on that why is that I think it's interesting but I think it goes back to your original statement about data being the new oil the and unlike oil Ray's said you can you can put it in house what you can't put it in your car you also when it's burnt it's gone right but with data you you have it around you generate more of it you keep using it and the more you use it and the more value you get out of it the more value the company gets out of it and so as those the reason why they continue to grow in value is because they continue to collect data they continue to leverage that data for intelligent purposes to make user experiences better their business better to be able to go faster to be able to new new things faster it's all part of part of this growth so data is one of the superpowers the other superpower of course is machine intelligence or what everybody talks about as AI you know it used to be that processing power doubling every 18 months was what drove innovation in the industry today it's a combination of data which we have a lot of it's AI and cloud for scaling we're going to talk about cloud but I want to spend a minute talking about AI when I first came into this business AI was all the rage but we didn't have the amount of data that we had today we don't we didn't have the processing power it was too expensive to store all this data that's all changed so now we have this emerging machine intelligence layer being used for a lot of different inks but it's sort of sitting on top of all these workloads that's being injected into databases and applications it's being used to detect fraud to sell us more stuff you know in real time to save lives and I'm going to talk about that but it's one of these superpowers that really needs new hardware architectures so I want to explore machine intelligence a little bit it really is a game changers it really is and and and tying back to the first point about sort of the the evolution of data and the importance of data things like machine learning and adaptive infrastructure and cognitive infrastructure have driven to your point are a hard requirement to adapt and improve the infrastructure upon which that lives and runs and operates and moves and breathes so we always had Hardware evolution or development or improvements and networks and the basic you know components of the infrastructure being driven again by advances in material science and silicon etc well now what's happening is the growth and importance and and Dynamis city of data is far outpacing the ability of the physical sciences to keep pace right that's a reality that we live in so therefore things like you know cognitive computing machine learning AI are kind of bridging the gap almost between the limitations we're bumping up against in physical infrastructure and the immense unlocked potential of data so that intermediary is really where this phenomenon of AI and machine learning and deep learning is happening and you're also correct in pointing out that it's it's everywhere I mean it's imbuing every single workload it's transforming every industry and a fairly blistering pace IBM's been front and center around artificial intelligence in cognitive computing since the beginning we have a really interesting perspective on it and I think we bring that to a lot of the solutions that we offer as well Ginni Rometty a couple years ago actually use the term incumbent disruptors and when I think of that I think about artificial intelligence and I think about companies like the ones I mentioned before that are very valuable they have data at their core most incumbents don't they have data all over the place you know they might have a bottling plant at the core of the manufacturing plant or some human process at the core so to close that gap artificial intelligence from the incumbents the appointees they're gonna buy that from companies like IBM they're gonna you know procure Watson or other AI tools and you know or maybe you know use open-source AI tools but they're gonna then figure out how to apply those to their business to do whatever fraud detection or recommendation engines or maybe even improve security and we're going to talk about this in detail but Steve this there's got to be new infrastructure behind that we can't run these new workloads on infrastructure that was designed 30 40 years ago exactly I mean I think I am truly fascinated by with this growth of data it's now getting more exponential and why we think about why is it getting more exponential it's getting more exponential because the ease at which you can actually now take advantage of that data it's going beyond the big financial services companies the big healthcare companies right we're moving further and further and further towards the edge where people like you and I and Randi and I have talked about the maker economy right I want to be able to go in and build something on my own and then deliver it to either as a service as a person a new application or as a service to my infrastructure team to go then turn it on and make something out of that that infrastructure it's got to come down in cost but all the things that you said before performance reliability speed to get there intelligence about data movement how do we get smarter about those things all of the underlying ways we used to think about how we managed protect secure that it all has evolved and it's continuing to evolve everybody talks about the journey the journey to cloud why does that matter it's not just the cloud it's also the the componentry underneath and it's gonna go much broader much bigger much faster well and I would just add just amplify what Steve said about this whole maker movement one of the other pressures that that's putting on corporate IT is it's driving essentially driving product development and innovation out to the end to the very edge to the end user level so you have all these very smart people who are developing these amazing new services and applications and workloads when it gets to the point where they believe it can add value to the business they then hand it off to IT who is tasked with figuring out how to implement it scale it protect it secured debt cetera that's really where I believe I um plays a key role or where we can play a key role add a lot of values we understand that process of taking that from inception to scale and implementation in a secure enterprise way and I want to come back to that so we talked about data as one of the superpowers an AI and the third one is cloud so again it used to be processor speed now it's data plus AI and cloud why is cloud important because cloud enables scale there's so much innovation going on in cloud but I want to talk about you know cloud one dot o versus cloud two dot o IBM talks about you know the new era of cloud so what was cloud one dot o it was largely lift and shift it was taking a lot of crap locations and putting him in the public cloud it was a lot of tests in dev a lot of startups who said hey I don't need to you know have IT I guess like the cube we have no ID so it's great for small companies a great way to experiment and fail fast and pay for you know buy the drink that was one dot o cloud to dot all to datos is emerging is different it's hybrid it's multi cloud it's massively distributed systems distributed data on Prem in many many clouds and it's a whole new way of looking at infrastructure and systems design so as Steve as you and I have talked about it's programmable so it's the API economy very low latency we're gonna talk more about what that means but that concept of shipping code to data wherever it lives and making that cloud experience across the entire infrastructure no matter whether it's on Prem or in cloud a B or C it's a complicated problem it really is and when you think about the fact that you know the big the big challenge we started to run into when we were talking about cloud one always shadow IT right so folks really wanted to be able to move faster and they were taking data and they were actually copying it to these different locations to be able to use it for them simply and easily well once you broke that mold you started getting away from the security and the corporate furnance that was required to make sure that the business was safe right it but it but it but following the rules slowed business down so this is why they continued to do it in cloud 2.0 I like the way you position this right is the fact that I no longer want to move data around moving data it within the infrastructure is the most expensive thing to do in the data center so if I can move code to where I need to be able to work on it to get my answers to do my AI to do my intelligent learning that all of a sudden brings a lot more value and a lot more speed and speed as time as money rate if I can get it done faster I get more valuable and then just you know people often talk about moving data but you're right on you the last thing you want to do is move data in just think about how long it takes to back up the first time you ever backed up your iPhone how long it took well and that's relatively small compared to all the data in a data center there's another subtext here from a standpoint of cloud 2.0 and it involves the edge the edge is a new thing and we have a belief inside of wiki bond and the cube that we talk about all the time that a lot of the inference is going to be done at the edge what does that mean it means you're going to have factory devices autonomous vehicles a medical device equipment that's going to have intelligence in there with new types of processors and we'll talk about that but a lot of the the inference is that conclusions were made real-time and and by the way these machines will be able to talk to each other so you'll have a machine to machine communication no humans need to be involved to actually make a decision as to where should I turn or you know what should be the next move on the factory floor so again a lot of the data is gonna stay in place now what does that mean for IBM you still have an opportunity to have data hubs that collect that data analyze it maybe push it up to the cloud develop models iterate and push it back down but the edge is a fundamentally new type of approach that we've really not seen before and it brings in a whole ton of new data yeah that's a great point and it's a market phenomenon that has moved and is very rapidly moving from smartphones to the enterprise right so right so your point is well-taken if you look in the fact is we talked earlier that compute is now proximal to the data as opposed to the other way around and the emergence of things like mesh networking and you know high bandwidth local communications peer-to-peer communications it's it's not only changing the physical infrastructure model and the and the best practices around how to implement that infrastructure it's also fundamentally changing the way you buy them the way you consume them the way you charge for them so it's it's that shift is changing and having a ripple effect across our industry in every sense whether it's from the financial perspective the operational perspective the time to market perspective it's also and we talked a lot about industry transformation and disruptors that show up you know in an industry who work being the most obvious example and just got an industry from the from the bare metal and recreate it they are able to do that because they've mastered this new environment where the data is king how you exploit that data cost-effectively repeatably efficiently is what differentiates you from the pack and allows you to create a brand new business model that that didn't exist prior so that's really where every other industry is going you talking about those those those big five companies in North America that are that are the top top companies now because of data I often think about rewind you know 25 years do you think Amazon when they built Amazon really thought they were going to be in the food service business that the video surveillance business the drone business all these other book business right maybe the book business right but but their architecture had to scale and change and evolve with where that's going all around the data because then they can use these data components and all these other places to get smarter bigger and grow faster and that's that's why they're one of the top five this is a really important point especially for the young people in the audience so it used to be that if you were in an industry if you were in health care or you were in financial services or you were in manufacturing you were in that business for life every industry had its own stack the sales the marketing the R&D everything was wired to that industry and that industry domain expertise was really not portable across businesses because of data and because of digital transformations companies like Amazon can get into content they can get into music they can get it to financial services they can get into healthcare they can get into grocery it's all about that data model being portable across those industries it's a very powerful concept that you and I mean IBM owns the weather company right so I mean there's a million examples of traditional businesses that have developed ways to either enter new markets or expand their footprint in existing markets by leveraging new sources of data so you think about a retailer or a wholesale distributor they have to very accurately or as accurately as possible forecast demand for goods and make sure logistically the goods are in the right place at the right time well there are million factors that go into that there's whether there's population density there's local cultural phenomena there's all sorts of things that have to be taken into consideration previously that would be near impossible to do now you can sit down again as an individual maker I can sit down at my desk and I can craft a model that consumes data from five readily available public api's or data sets to enhance my forecast and I can then create that model execute it and give it to two of my IT guy to go scale-out okay so I want to start getting into the infrastructure conversation again remember the premise of this conversation it doesn't read for structure matter we want to we want to explore that oh I start at the high level with with with cloud multi-cloud specifically we said cloud 2.0 is about hybrid multi cloud I'm gonna make a statements of you guys chime in my my assertion is that multi cloud has largely been a symptom of multi-vendor shadow IT different developers different workloads different lines of business saying hey we want to we want to do stuff in the cloud this happened so many times in the IT business all and then I was gonna govern it how is this gonna be secure who's got access control on and on and on what about compliance what about security then they throw it over to IT and they say hey help us fix this and so itea said look we need a strategy around multi cloud it's horses for courses maybe we go for cloud a for our collaboration software cloud B for the cognitive stuff cloud C for the you know cheap and deep storage different workloads for different clouds but there's got to be a strategy around that so I think that's kind of point number one and I T is being asked to kind of clean up this stuff but the future today the clouds are loosely coupled there may be a network that connects them but there's there's not a really good way to take data or rather to take code ship it to data wherever it lives and have it be a consistent well you were talking about an enterprise data plane that's emerging and that's kind of really where the opportunity is and then you maybe move into the control plane and the management piece of it and then bring in the edge but envision this mesh of clouds if you will whether it's on pram or in the public cloud or some kind of hybrid where you can take metadata and code ship it to wherever the data is leave it there much smaller you know ship five megabytes of code to a petabyte of data as opposed to waiting three months to try to ship you know petabytes to over the network it's not going to work so that's kind of the the spectrum of multi cloud loosely coupled today going to this you know tightly coupled mesh your guys thoughts on that yeah that's that's a great point and and I would add to it or expand that even further to say that it's also driving behavioral fundamental behavioral and organizational challenges within a lot of organizations and large enterprises cloud and this multi cloud proliferation that you spoke about one of the other things that's done that we talked about but probably not enough is it's almost created this inversion situation where in the past you'd have the business saying to IT I need this I need this supply chain application I need this vendor relationship database I need this order processing system now with the emergence of this cloud and and how easy it is to consume and how cost-effective it is now you've got the IT guys and the engineers and the designers and the architects and the data scientists pushing ideas to the business hey we can expand our footprint and our reach dramatically if we do this so you've get this much more bi-directional conversation happening now which frankly a lot of traditional companies are still working their way through which is why you don't see you know 100% cloud adoption but it drives those very productive full-duplex conversations at a level that we've never seen before I mean we encounter clients every day who are having these discussions are sitting down across the table and IT is not just doesn't just have a seat at the table they are often driving the go-to-market strategy so that's a really interesting transformation that we see as well in addition to the technology so there are some amazing things happening Steve underneath the covers and the plumbing and infrastructure and look at we think infrastructure matters that's kind of why we're here we're infrastructure guys but I want to make a point so for decades this industry is marked to the cadence of Moore's law the idea that you can double processing speeds every 18 months disk drive processors disk drives you know they followed that curve you could plot it out the last ten years that started to attenuate so what happened is chip companies would start putting more cores on to the real estate well they're running out of real estate now so now what's happening is we've seen this emergence of alternative processors largely came from mobile now you have arm doing a lot of offload processing a lot of the storage processing that's getting offloaded those are ARM processors in video with GPUs powering a lot of a lot of a is yours even seeing FPGAs they're simple they're easy them to spin up Asics you know making a big comeback so you've seen these alternative processes processors powering things underneath where the x86 is and and of course they're still running applications on x86 so that's one sort of big thing big change in infrastructure to support this distributed systems the other is flash we saw flash basically take out spinning disk for all high-speed applications we're seeing the elimination of scuzzy which is a protocol that sits in between the the the disk you know and the rest of the network that's that's going away you're hearing things like nvme and rocky and PCIe basically allowing stores to directly talk to the so now a vision envision this multi-cloud system where you want to ship metadata and code anywhere these high speed capabilities interconnects low latency protocols are what sets that up so there's technology underneath this and obviously IBM is you know an inventor of a lot of this stuff that is really gonna power this next generation of workloads your comments yeah I think I think all that 100% true and I think the one component that we're fading a little bit about it even in the infrastructure is the infrastructure software right there's hardware we talked a lot talked about a lot of hardware component that are definitely evolving to get us better stronger faster more secure more reliable and that sort of thing and then there's also infrastructure software so not just the application databases or that sort of thing but but software to manage all this and I think in a hybrid multi cloud world you know you've got these multiple clauses for all practical purposes there's no way around it right marketing gets more value out of the Google analytic tools and Google's cloud and developers get more value out of using the tools in AWS they're gonna continue to use that at the end of the day I as a business though need to be able to extract the value from all of those things in order to make different business decisions to be able to move faster and surface my clients better there's hardware that's gonna help me accomplish that and then there are software things about managing that whole consetta component tree so that I can maximize the value across that entire stack and that stack is multiple clouds plus the internal clouds external clouds everything yeah so it's great point and you're seeing clear examples of companies investing in custom hardware you see you know Google has its own ship Amazon its own ship IBM's got you know power 9 on and on but none of this stuff works if you can't manage it so we talked before about programmable infrastructure we talked about the data plane and the control plane that software that's going to allow us to actually manage these multiple clouds as at least a quasi single entity you know something like a logical entity certainly within workload classes and in Nirvana across the entire you know network well and and the principal or the principle drivers of that evolution of course is containerization right so the containerization phenomenon and and you know obviously with our acquisition of red hat we're now very keenly aware and acutely plugged into the whole containerization phenomenon which is great we're you're seeing that becoming almost the I can't think of us a good metaphor but you're seeing containerization become the vernacular that's being spoken in multiple different types of reference architectures and use case environments that are vastly different in their characteristics whether they're high throughput low latency whether they're large volume whether they're edge specific whether they're more you know consolidated or hub-and-spoke models containerization is becoming the standard by which those architectures are being developed and with which they're being deployed so we think we're very well-positioned working with that emerging trend and that rapidly developing trend to instrument it in a way that makes it easier to deploy easier to instrument easier to develop so that's key and I want to sort of focus now on the relevance of IBM one side one thing that we understand because that that whole container is Asian think back to your original point Dave about moving data being very expensive and the fact that the fact that you want to move code out to the data now with containers microservices all of that stuff gets a lot easier development becomes a lot faster and you're actually pushing the speed of business faster well and the other key point is we talked about moving code you know to the data as you move the code to the data and run applications anywhere wherever the data is using containers the kubernetes etc you don't have to test it it's gonna run you know assuming you have the standard infrastructure in place to do that and the software to manage it that's huge because that means business agility it means better quality and speed alright let's talk about IBM the world is complex this stuff is not trivial the the more clouds we have the more edge we have the more data we have the more complex against IBM happens to be very good at complex three components of the innovation cocktail data AI and cloud IBM your customers have a lot of data you guys are good with data it's very strong analytics business artificial intelligence machine intelligence you've invested a lot in Watson that's a key component business and cloud you have a cloud it's not designed to compete not knock heads and the race to zero with with the cheap and deep you know storage clouds it's designed to really run workloads and applications but you've got all three ingredients as well you're going hard after the multi cloud world for you guys you've got infrastructure underneath you got hardware and software to manage that infrastructure all the modern stuff that we've talked about that's what's going to power the customers digital transformations and we'll talk about that in a moment but maybe you could expand on that in terms of IBM's relevance sure so so again using the kind of maker the maker economy metaphor bridging from that you know individual level of innovation and creativity and development to a broadly distributed you know globally available work loader or information source of some kind the process of that bridge is about scale and reach how do you scale it so that it runs effectively optimally is easily managed Hall looks and feels the same falls under the common umbrella of services and then how do you get it to as many endpoints as possible whether it's individuals or entities or agencies or whatever scale and reach iBM is all about scale and reach I mean that's kind of our stock and trade we we are able to take solutions from small kind of departmental level or kind of skunkworks level and make them large secure repeatable easily managed services and and make them as turnkey as possible our services organizations been doing it for decades exceptionally well our product portfolio supports that you talk about Watson and kind of the cognitive computing story we've been a thought leader in this space for decades I mean we didn't just arrive on the scene two years ago when machine learning and deep learning and IO ste started to become prominent and say this sounds interesting we're gonna plant our flag here we've been there we've been there for a long time so you know I kind of from an infrastructure perspective I kind of like to use the analogy that you know we are technology ethos is built on AI it's built on cognitive computing and and sort of adaptive computing every one of our portfolio products is imbued with that same capability so we use it internally we're kind of built from AI for AI so maybe that's the answer to this question of it so what do you say that somebody says well you know I want to buy you know my flash storage from pure AI one of my bi database from Oracle I want to buy my you know Intel servers from Dell you know whatever I want to I want to I want control and and and I gotta go build it myself why should I work with IBM do you do you get that a lot and how do you respond to that Steve I think I think this whole new data economy has opened up a lot of places for data to be stored anywhere I think at the end of the day it really comes down to management and one of the things that I was thinking about as you guys were we're conversing is the enterprise class or Enterprise need for things like security and protection that sort of thing that rounds out the software stack in our portfolio one of the things we can bring to the table is sure you can go by piece parts and component reform from different people that you want right and in that whole notion around fail-fast sure you can get some new things that might be a little bit faster that might be might be here first but one of the things that IBM takes a lot of pride was a lot of qual a lot of pride into is is the quality of their their delivery of both hardware and software right so so to me even though the infrastructure does matter quite a bit the question is is is how much into what degree so when you look at our core clients the global 2,000 right they want to fail fast they want to fail fast securely they want to fail fast and make sure they're protected they want to fail fast and make sure they're not accidentally giving away the keys to the kingdom at the end of the day a lot of the large vendor a lot of the large clients that we have need to be able to protect their are their IP their brain trust there but also need the flexibility to be creative and create new applications that gain new customer bases so the way I the way I look at it and when I talk to clients and when I talk to folks is is we want to give you them that while also making sure they're they're protected you know that said I would just add that that and 100% accurate depiction the data economy is really changing the way not only infrastructure is deployed and designed but the way it can be I mean it's opening up possibilities that didn't exist and there's new ones cropping up every day to your point if you want to go kind of best to breed or you want to have a solution that includes multi vendor solutions that's okay I mean the whole idea of using again for instance containerization thinking about kubernetes and docker for instance as a as a protocol standard or a platform standard across heterogeneous hardware that's fine like like we will still support that environment we believe there are significant additive advantages to to looking at IBM as a full solution or a full stack solution provider and our largest you know most mission critical application clients are doing that so we think we can tell a pretty compelling story and I would just finally add that we also often see situations where in the journey from the kind of maker to the largely deployed enterprise class workload there's a lot of pitfalls along the way and there's companies that will occasionally you know bump into one of them and come back six months later and say ok we encountered some scalability issues some security issues let's talk about how we can develop a new architecture that solves those problems without sacrificing any of our advanced capabilities all right let's talk about what this means for customers so everybody talks about digital transformation and digital business so what's the difference in a business in the digital business it's how they use data in order to leverage data to become one of those incumbent disruptors using Ginny's term you've got to have a modern infrastructure if you want to build this multi cloud you know connection point enterprise data pipeline to use your term Randy you've got to have modern infrastructure to do that that's low latency that allows me to ship data to code that allows me to run applet anywhere leave the data in place including the edge and really close that gap between those top five data you know value companies and yourselves now the other piece of that is you don't want to waste a lot of time and money managing infrastructure you've got to have intelligence infrastructure you've got to use modern infrastructure and you've got to redeploy those labor assets toward a higher value more productive for the company activities so we all know IT labor is a chop point and we spend more on IT labor managing Leung's provisioning servers tuning databases all that stuff that's gotta change in order for you to fund digital transformations so that to me is the big takeaway as to what it means for customer and we talked about that sorry what we talked about that all the time and specifically in the context of the enterprise data pipeline and within that pipeline kind of the newer generation machine learning deep learning cognitive workload phases the data scientists who are involved at various stages along the process are obviously kind of scarce resources they're very expensive so you can't afford for them to be burning cycles and managing environments you know spinning up VMs and moving data around and creating working sets and enriching metadata that they that's not the best use of their time so we've developed a portfolio of solutions specifically designed to optimize them as a resource as a very valuable resource so I would vehemently agree with your premise we talked about the rise of the infrastructure developer right so at the end of the day I'm glad you brought this topic up because it's not just customers it's personas Pete IBM talks to different personas within our client base or our prospect base about why is this infrastructure important to to them and one of the core components is skill if you have when we talk about this rise of the infrastructure developer what we mean is I need to be able to build composable intelligent programmatic infrastructure that I as IT can set up not have to worry about a lot of risk about it break have to do in a lot of troubleshooting but turn the keys over to the users now let them use the infrastructure in such a way that helps them get their job done better faster stronger but still keeps the business protected so don't make copies into production and screw stuff up there but if I want to make a copy of the data feel free go ahead and put it in a place that's safe and secure and it won't it won't get stolen and it also won't bring down the enterprise's is trying to do its business very key key components - we talked about I infused data protection and I infused storage at the end of the day it's what is an AI infused data center right it needs to be an intelligent data center and I don't have to spend a lot of time doing it the new IT person doesn't want to be troubleshooting all day long they want to be in looking at things like arm and vme what's that going to do for my business to make me more competitive that's where IT wants to be focused yeah and it's also we just to kind of again build on this this whole idea we haven't talked a lot about it but there's obviously a cost element to all this right I mean you know the enterprise's are still very cost-conscious and they're still trying to manage budgets and and they don't have an unlimited amount of capital resources so things like the ability to do fractional consumption so by you know pay paper drink right buy small bits of infrastructure and deploy them as you need and also to Steve's point and this is really Steve's kind of area of expertise and where he's a leader is kind of data efficiency you you also can't afford to have copy sprawl excessive data movement poor production schemes slow recovery times and recall times you've got a as especially as data volumes are ramping you know geometrically the efficiency piece and the cost piece is absolutely relevant and that's another one of the things that often gets lost in translation between kind of the maker level and the deployment level so I wanted to do a little thought exercise for those of you think that this is all you know bromide and des cloud 2.0 is also about we're moving from a world of cloud services to one where you have this mesh which is ubiquitous of of digital services you talked about intelligence Steve you know the intelligent data center so all these all these digital services what am I talking about AI blockchain 3d printing autonomous vehicles edge computing quantum RPA and all the other things on the Gartner hype cycle you'll be able to procure these as services they're part of this mesh so here's the thought exercise when do you think that owning and driving your own vehicle is no longer gonna be the norm right interesting thesis question like why do you ask the question well because these are some of the disruptions so the questions are designed to get you thinking about the potential disruptions you know is it possible that our children's children aren't gonna be driving their own car it's because it's a it's a cultural change when I was 16 year olds like I couldn't wait but you started to see a shifted quasi autonomous vehicles it's all sort of the rage personally I don't think they're quite ready yet but it's on the horizon okay I'll give you another one when will machines be able to make better diagnosis than doctors actually both of those are so so let's let's hit on autonomous and self-driving vehicles first I agree they're not there yet I will say that we have a pretty thriving business practice and competency around working with a das providers and and there's an interesting perception that a das autonomous driving projects are like there's okay there's ten of them around the world right maybe there's ten metal level hey das projects around the world what people often don't see is there is a gigantic ecosystem building around a das all the data sourcing all the telemetry all the hardware all the network support all the services I mean building around this is phenomenal it's growing at a had a ridiculous rate so we're very hooked into that we see tremendous growth opportunities there if I had to guess I would say within 10 to 12 years there will be functionally capable viable autonomous vehicles not everywhere but they will be you will be able as a consumer to purchase one yeah that's good okay and so that's good I agree that's a the time line is not you know within the next three to five years all right how about retail stores will well retail stores largely disappeared we're we're rainy I was just someplace the other day and I said there used to be a brick-and-mortar there and we were walking through the Cambridge Tseng Galleria and now the third floor there's no more stores right there's gonna be all offices they've shrunken down to just two floors of stores and I highly believe that it's because you know the brick you know the the retailers online are doing so well I mean think about it used to be tricky and how do you get in and and and I need the Walmart minute I go cuz I go get with Amazon and that became very difficult look at places like bombas or Casper or all the luggage plate all this little individual boutique selling online selling quickly never having to have to open up a store speed of deployment speed of product I mean it's it's it's phenomenal yeah and and frankly if if Amazon could and and they're investing billions of dollars and they're trying to solve the last mile problem if Amazon could figure out a way to deliver ninety five percent of their product catalog Prime within four to six hours brick-and-mortar stores would literally disappear within a month and I think that's a factual statement okay give me another one will banks lose control traditional banks lose control of the payment systems you can Moselle you see that banks are smart they're buying up you know fin tech companies but right these are entrenched yeah that's another one that's another one with an interesting philosophical element to it because people and some of its generational right like our parents generation would be horrified by the thought of taking a picture of a check or using blockchain or some kind of a FinTech coin or any kind of yeah exactly so Bitcoin might I do my dad ask you're not according I do I don't bit going to so we're gonna we're waiting it out though it's fine by the way I just wanted to mention that we don't hang out in the mall that's actually right across from our office I want to just add that to the previous comment so there is a philosophical piece of it they're like our generation we're fairly comfortable now because we've grown up in a sense with these technologies being adopted our children the concept of going to a bank for them will be foreign I mean it will make it all have no context for the content for the the the process of going to speak face to face to another human it just say it won't exist well will will automation whether its robotic process automation and other automation 3d printing will that begin to swing the pendulum back to onshore manufacturing maybe tariffs will help to but again the idea that machine intelligence increasingly will disrupt businesses there's no industry that's safe from disruption because of the data context that we talked about before Randy and I put together a you know IBM loves to use were big words of transformation agile and as a sales rep you're in the field and you're trying to think about okay what does that mean what does that mean for me to explain to my customer so he put together this whole thing about what his transformation mean to one of them was the taxi service right in the another one was retail so and not almost was fencers I mean you're hitting on on all the core things right but this transformation I mean it goes so deep and so wide when you think about exactly what Randy said before about uber just transforming just the taxi business retailers and taxis now and hotel chains and that's where the thing that know your customer they're getting all of that from data data that I'm putting it not that they're doing work to extract out of me that I'm putting in so that autonomous vehicle comes to pick up Steve Kenaston it knows that Steve likes iced coffee on his way to work gives me a coupon on a screen I hit the button it automatically stops at Starbucks for me and it pre-ordered it for me you're talking about that whole ecosystem wrapped around just autonomous vehicles and data now it's it's unbeliev we're not far off from the Minority Report era of like Anthem fuck advertising targeted at an individual in real time I mean that's gonna happen it's almost there now I mean you just use point you will get if I walk into Starbucks my phone says hey why don't you use some points while you're here Randy you know so so that's happening at facial recognition I mean that's all it's all coming together so and again underneath all this is infrastructure so infrastructure clearly matters if you don't have the infrastructure to power these new workloads you're drugged yeah and I would just add and I think we're all in agreement on that and and from from my perspective from an IBM perspective through my eyes I would say we're increasingly being viewed as kind of an arms dealer and that's a probably a horrible analogy but we're being used we're being viewed as a supplier to the providers of those services right so we provide the raw materials and the machinery and the tooling that enables those innovators to create those new services and do it quickly securely reliably repeatably at a at a reasonable cost right so it's it's a step back from direct engagement with consumer with with customers and clients and and architects but that's where our whole industry is going right we are increasingly more abstracted from the end consumer we're dealing with the sort of assembly we're dealing with the assemblers you know they take the pieces and assemble them and deliver the services so we're not as often doing the assembly as we are providing the raw materials guys great conversation I think we set a record tends to be like that so thank you very much for no problem yeah this is great thank you so much for watching everybody we'll see you next time you're watching the cube

Published Date : Aug 8 2019

SUMMARY :

the the the disk you know and the rest

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Randy ArsenaultPERSON

0.99+

Steve KenastonPERSON

0.99+

StevePERSON

0.99+

MicrosoftORGANIZATION

0.99+

three monthsQUANTITY

0.99+

Dave VillePERSON

0.99+

RandyPERSON

0.99+

Exxon MobilORGANIZATION

0.99+

DavePERSON

0.99+

IBMORGANIZATION

0.99+

AmazonORGANIZATION

0.99+

August 2019DATE

0.99+

100%QUANTITY

0.99+

DavidPERSON

0.99+

iPhoneCOMMERCIAL_ITEM

0.99+

Steve KennistonPERSON

0.99+

two floorsQUANTITY

0.99+

DellORGANIZATION

0.99+

third floorQUANTITY

0.99+

GoogleORGANIZATION

0.99+

RandiPERSON

0.99+

25 yearsQUANTITY

0.99+

ninety five percentQUANTITY

0.99+

AppleORGANIZATION

0.99+

billions of dollarsQUANTITY

0.99+

North AmericaLOCATION

0.99+

over a trillion dollarsQUANTITY

0.99+

WalmartORGANIZATION

0.99+

million factorsQUANTITY

0.99+

30DATE

0.99+

StarbucksORGANIZATION

0.99+

10 years agoDATE

0.99+

uberORGANIZATION

0.99+

FacebookORGANIZATION

0.99+

twoQUANTITY

0.99+

six hoursQUANTITY

0.99+

Boston MassachusettsLOCATION

0.99+

Randy ArseneauPERSON

0.98+

two years agoDATE

0.98+

fourQUANTITY

0.98+

WatsonTITLE

0.98+

x86TITLE

0.98+

first pointQUANTITY

0.98+

Cambridge Tseng GalleriaLOCATION

0.98+

GartnerORGANIZATION

0.98+

bothQUANTITY

0.98+

six months laterDATE

0.98+

OracleORGANIZATION

0.98+

12 yearsQUANTITY

0.97+

USLOCATION

0.97+

todayDATE

0.97+

oneQUANTITY

0.97+

AWSORGANIZATION

0.96+

a minuteQUANTITY

0.96+

Susie Wee, Cisco DevNet | Cisco Live US 2018


 

>> Live from Orlando, Florida. It's theCUBE, covering Cisco Live 2018. Brought to you by Cisco, NetApp, and theCUBE's ecosystem partners. >> Okay welcome back everyone, we're here live in the Cisco DevNet Zone, at Cisco Live 2018. It's theCUBE's exclusive coverage. This is Go Live, I'm John Furrier with Stu Miniman there, here with Suzie Wee who is the CTO and Vice President of Cisco. This is her baby DevNet, the fastest growing developer program in Cisco history, only four years old. Welcome to theCUBE, good to see you again. >> Hey John good to see you, hey Stu. >> I made that stat, it was only four years old. So DevNet, obviously just for color commentary, really successful developer program, only in it's fourth year or so for Cisco. But it's really changing the face of Cisco. It's showing that a new collaboration, a new co-development, a new developer framework is being built on top of networks and it's on a collision course with Cloud Native. Kay, this is a great path for network engineers. It really changed the show vibe so congratulations. >> Thank you, thank you. Yeah, and why do you say collision course? There's like a whole new paradigm, right? And it's pretty amazing, it's pretty amazing. >> Well some of the things that we've been seeing here, obviously CCIE's or 25 years of excellence and stats was out here >> Yes, Yes. >> The key note from the CEO, Chuck Robbins, talks about an old way and new way. Developers are clearly in the driver's seat here and network engineers, Cisco partners, customers technical folks and engineers. They're at the keys to the kingdom and you introduced a concept called Network Dev Ops. >> Yes. >> Okay, a few years ago when we first had you on theCUBE. Where is that now? Where is Network Dev Ops now? What's the vibe internally? Is there a full acceptance to it? Is there embracing it? >> It's amazing and ya know it's like, when we were pushing it we were just saying, "Hey, the network is changing, the network "is gonna be programmable, the network "is going to have API's", and you go back four years and then you're just like, "What was the buzz?" The buzz was SDN, y'know the buzz was SDN. SDN was open flow, it was separation of control plain from data plain. But, it was still kind of research. And what we knew is like, it wouldn't become real until the people who are building and operating the World's networks were ready to adopt it. And so, at first of course, it was like, there were the people who were like, "Okay this network thing, this programmability "is gonna come to the network, but what can we do there?" And since then, people have jumped in, they've like really gotten in. And like here at this Cisco Live, what we're seeing is that people are ready to code. And so the concept of, I'm a networker, now there's software built into my entire network programming portfolio. How do I build the skills? I'm a developer, and the networkers are getting comfortable with understanding that they need to code, they need to understand these skills. But one thing that we did, was we actually separated out, like, the definition of developer. >> Yep. >> Y'know. >> You guys done a good job of really defining a path for the network engineer, who can extend their skill set and solve network problems, be creative, and also do great business outcome oriented things. So, I want you to take a minute to explain the DevNet story because you guys just didn't throw a PowerPoint at this. You dug in, you built it up, and you threw a lot of resources for Cisco, I mean small for Cisco's scale, but you guys dug in, you did the homework and you're doing new things. So take us to the DevNet story and what's happening this year in the momentum. Take us through that little journey. >> Yeah, so the story was back in actually 2013. Cisco was saying, "Hey, we're gonna get into software "we're doing software, we have a software strategy." And all of that is fantastic, either... But the thing that was missing, was like, Hey, we need an ecosystem, like the reason you do software is to have an ecosystem. And in order to have an ecosystem you want people to build upon your stuff. You need to expose your API's. It doesn't happen by itself, you need to have a developer program so that you can actually really let people use all of that and partake in the ecosystem. So we, kind of, I evangelized, evangelized, evangelized, gave a couple hundred pitches, got the okay to start DevNet, and that was in 2014. And then in 2014, then we said okay. So now we got the okay to start a developer program for Cisco. But, y'know, it's still not a sure shot that it would work. >> Yeah. >> And then we said our dream is to have a developer conference at Cisco Live. And so we wanted to have that developer conference at Cisco Live and then three months later, we had it. And we're like okay, 24 hour hack-a-thon, deep dive API sessions, but would the people come? Would they be ready? And then, they came. Like, they came, it was packed. It was just like wall to wall of people, who are excited to learn about software. So now you go and then you fast forward, y'know, four years, and now we just hit 500,000 developers. 500,000 people have registered for DevNet. And you can be like, "Well what does that mean?" We have half a million developers. Is it a real number? Well, my team kept scrubbing the database. Like so, we had hit 400,000 and then our numbers got lower and I was like "Come on guys, stop it!" And they were like, "No, no, no, we have to scrub it, "we gotta out the duplicates." And then finally we got it up and we've grown it. It basically is at 500,000 registered developers. And what that means is like, now we have a community. We have a community of people who are getting up on network API's, we have a community of people who can develop, and once you do that you hit this completely different inflection point. Where at first our mission was just to help networkers be developers, to help the app developers understand that the network has API's and to do stuff there. That's still our goal, to enable developers. But now we have a community, what we can do is really catalyze that community into business and impact. >> Suzie, first of all congratulations. It's been so much fun to be here in the DevNet Zone. It'd been a few years since I'd been to Cisco Live. And y'know, people in these sessions every time. And you go, people are coding, they're white-boarding, they're, y'know building. Playing with Legos, they're doing all sorts of stuff. Over the last five years, y'know, we all knew that, y'know, developers of the new Kingmakers. It's been talked about a lot. But we've seen many infrastructure companies try. They create little developer conferences, they bring in speakers, they'll get some momentum, and then after a year or two, it kind of fizzles out. >> Yes. >> Give us a little bit behind the scenes, as to, y'know is it because networking people are worried about their jobs and they're getting on-board? Is it, y'know, I know part of it is your team and the ecosystem you've built here. But, give is some of the reasons why this has succeeded when so many other have, kind of, come and gone. >> Yeah well, I mean we're very fortunate that we've kind of executed in a way that it has continued to be here and we know that's really hard to do. It takes executive support, it takes the troops, it takes fighting anti-bodies, and kind of all of that kind of stuff. But I think, like, the key has been that we've been working with the community. When we had that first DevNet Zone, that first developer conference at Cisco Live four years ago, people came. And that told Cisco something, right? And then as we've continued to build it out, we've actually been not doing it as a silo within Cisco. We've been doing it with our sales organization, with our partner organization, we've been doing it with our ecosystem and our partners and out there. We've just continuously been doing it based on what their needs are. >> And Suzie, I love that, because there are some of the events I saw, they were like, "Well, the developer "is this special unicorn", and we're gonna have this special area, it's velvet rope, we're gonna treat 'em really well. But, this is the first thing you see when you come in, you're very approachable. The line I've heard from your team is, "We are going to meet them where they are." There are no, y'know, "Gosh I haven't "touched programming in 20 years." No, no, no, you're fine, you're good come on in. I'm not sure if I'm really (mumbles). Well you're not programming, you're coding. So, I think that's part of the success, is these people. Y'know, this is their careers, and you're giving them that path forward. >> It is, and when we look at like, developer programs, you'd think it would be easy to start a developer program. But, there's no formula for it, y'know? And when we did it for Cisco, like as we've grown this, it depends on the products that we have, it depends on the community that we have, the types of solutions, what our customers want. And basically what happens is, we did have a core set of networkers who are scared. And we, instead of making DevNet the elite place for the elite developers, we said it is the place to bring in the community. We're gonna be welcoming, we're bringing them in on the journey, because they're the ones who need to be there. And so we've really tried this more open approach. And if you look at Cisco's community of networkers, they're amazing, like, they are developing and installing and operating networks around the World in every country. They've been dedicated, but they are scared of that transition to software and programmability. And they've been dedicated to us, we're dedicated to them, getting to that next level. >> You just did a good job of bringing that tribe kind of mentality and co-development, co-creation, people who are learning. So you have first time learners kicking the tires on coding and growing and experts. So Cisco Champions coming in; Powerhouse developers. >> Yeah >> Not Cisco employees, it's Cisco Champions, and so a nice balance. So that's a good sign of success. >> And you're right, that's key because it's not just, like just beginners. I mean, first of all, there is a very large stage of new people who are just coming in and then wanting to get started and that's awesome. And in addition, very advanced folks, who are like, y'know, just the most advanced developer you'd find, who also has networking expertise. And then of course, the app developers. We're talking to app developers and cloud developers and DevOps pros, and they're coming in as well. >> Yea, and Suzie you bring up a great point. Cause one of the challenges when you have the cool new innovation stuff, is the business, like well how does that connect back? So help connect the dots, we heard Chuck Robbins on stage. Not only was it just DevNet and 500,000 but the new products that are coming out just tie right into it. >> It's crazy, like yea, it's awesome. Because what happens is, programmability, Cisco, is building programmability into our entire portfolio. It's not that we have one product that has API's, I mean that's where we were a few years ago. But now we look... Our enterprise networking products, y'know, for the data center, for service provider, for wireless. All of those products are programmable. Our security products are programmable. IoT, collaboration, our entire portfolio is now programmable, so it gives you this kind of whole portfolio of programmability to play with, and that cross-domain. Who covers that many domains? And that's really powerful. When we take a look at the programmability, it was like for the network devices themselves. Like those have Asics that are programmable. So if there's like a new protocol that comes up to handle IoT things, we can actually re-program the Asics to get that going at line rates. You can do like, on-board application hosting on those network devices. We have controller levels, so you can hit the network, and then now you have like analytics and insights that you can do to pull out information from the network, and then be able to, y'know, operate at that level as well. >> So a strategic advantage architecturally for Cisco, certainly in the network side and scaling up at the stack with Kubernetes and (mumbles). We saw Google on-stage, kinda giving an indicator of where it's going. I want to ask you about the culture question for DevNet. Obviously people are fascinated with the success of DevNet, we've been great to follow the success through your journey and being part of it. But for the folks that are now seeing the success, and want to join: What can they expect, if I join the DevNet mission? What's the expectation? What's gonna be the vibe? What would you share to someone watching, that's gonna jump in and join the journey, what can they expect? >> Well, I think that first of all, it's going to be very welcoming. Like, they're gonna feel welcome. And I'm just proud of my team, because people come in and they actually say, "Wow, sometimes you go to developer conferences "and it's a little bit intimidating." And yea, you might be intimidated, but here you're going to feel welcome. Because, y'know, we really want things to happen. And then there's gonna be this kind of like, intrigue in terms of what you can build. Because what we're building is different. It's not a well known area, like everyone knows how to build apps for a mobile device. People don't know how to build applications for programmable infrastructure. Like, the fact that hey, your wireless access points now give you location and proximity information. I can write an indoor location app. Sounds simple, but it's awesome. >> Connect a camera to it. >> It's amazing, right? >> Hello! >> And then what happens is, as you're doing that, you have like, connect a camera, you're like put a Playstation into a hospital... The Children's Hospital of L.A came and spoke, and they were talking about the business problem. They had a patient, who was very sick, a young boy. And his wish was to have Playstation so he could play it. And then they had to go to their networkers cause you don't put Playstations in hospitals. They had to make that happen and intent-based networking lets you make that wish, and then activate that in the network, that's now a programmable infrastructure. So the types of problems that you can solve are different, it's amazing. >> The new apps are coming out and you're creating a new, first generation green field of networked apps. >> Yes. (chuckles heartily) >> Like what iPhone did for mobile apps, you guys are doing for networks. >> That's right, that's right. >> So that's awesome, it's super cool. Programmable infrastructure, all DevOps kinda geeky stuff. For the next steps, as you guys are now at the beginning of the next inflection point. >> Yes. >> What're you guys focused on? What's happening with the team? What's happening with some of the initiatives you're doing? Also demos get better and better. The training classes are still going on. What's your focus? >> So with some of the things that are happening now, which is... So we've hit this milestone of half a million developers. But what does that mean? What that means is that, we have half a million people who can use network API's. What that means also, is that they're contributing code. So it's no longer just, "Here I'm gonna help "you use your API", but now it's also like, they're contributors back. And what we're doing, is we're actually embracing that and making that part of the innovation model for networking. So, you're not just taking Cisco's platforms and the innovation there, which is of course growing tremendously, but now you can also add in innovation by the community. And I know it's a straight forward concept for software. It's not a straightforward concept for networking and infrastructure. >> To bring an open-source ethos, to code sharing, co-contributing. >> Exactly, and something that we've released is code exchange, definite code exchange. And what it is, is just a list of curated software. Software that's out of GitHub, that works for our platforms, y'know. But the thing that developers are always like, "Okay there's a lot of software out there, "which one should I use?" and then basically giving them like, the curated list of here's the stuff that you can use. >> So Suzie, it's been fun to watch the transformation of Cisco overall. As we look at... Before, we used to measure in boxes and ports. What's the measurement internally? When you talk about saying, "Okay how are we doing "on our journey to become a software company?" Give us a little insight as to internally how Cisco measures that. >> The way that we measure that now is, we're talking to our customers and our partners and their adoption of API's, of programmability, their ability to execute on that and to be successful in this business. And so, it's really an external looking view. So it's all just like okay, how much do they get it? How much can they use it? How much are they building the skills? So it's really looking at the success of the community and being able to build the skills and use these products and build solutions with them. >> Suzie, congratulations on continuing growing, hitting a major milestone, 500,000 developers, half a million developers, that's a real community. It's just the beginning now, it's the start line. >> (chuckling) The start line, it is. >> One finish line is another start line. >> It is a start line, it's absolutely the start line. >> And you guys had a great event last night at the Mango party, the Mango Cafe. Talk about that, you had a celebration. Turns out a lot of people showed up. It was supposed to be a little private party. >> It was a little private party, yea. So we, y'know, just wanted to thank the team and thank our community. Because, quite honestly, to get to this half a million it wasn't just the people who work for me who got it there. It's the fact that, there's of course our team who's very dedicated to that, but then it's our partners. It's even you guys, right? It's our partners who have like... I understand this mission, I'm gonna jump in, I'm gonna help it happen. It's our systems engineers, it's our partners, it's our innovation folks, it's people from the community who understand the mission and have joined in to push it forward. So we had this party last night at Mango Cafe, you guys were there. The people were callin it kinda the best one. It's really just appreciation for our community and what they've done to get it there. Because it's not us, it's our community who've done it. >> This is the open ethos. Cisco becoming open. What's it like to be on the inside and seeing Cisco open up like this? >> It's, I mean, it's amazing. And what's amazing is like, when I started DevNet you'd think like okay, "I'm gonna run a developer program." The thing that surprises me is just, how hurtful it is to so many people. Like, people, they find a path. They see a new opportunity, they figure out a new way they wanna advance their businesses and their careers. And it's like, all heart. And that's how it grew. Like with the resources, it's just because people who had felt this heart and this connection into this mission and drive, they're taking it to the next level so it's amazing >> Like open-source software, people love to be part of a great project. >> It is, it is. >> And DevNet certainly is. And DevNet Create. Don't forget DevNet Create is your other event that bring the cloud native world with the networking world together. >> It is. >> Great project. >> You were with us at DevNet Create and that's where it's this mixing of communities of like, the app developers with the networkers who are getting out there. And what's funny is, we didn't know how those communities would interact. And they're mixing, they're getting it. They're just like "Okay, I have this location software, "I need to work together with the guys "who are gonna install the network and then "we can make this amazing experience." And they're mixing and when they do it the right things happening. >> Very complimentary, there's love going wild. >> App guys love the network guys to take care of the network and the network guys love the app guys that take care of the apps. >> Exactly! Exactly. >> It's a win-win. Great stuff, congratulations. Again, a new way to program. Just like we saw the iPhone creating the app store. Networking now is programmable. We expect to see a lot of great creativity, new problems, new things being created. And that's an opportunity for all. We're here at theCUBE bringing you all the action from the DevNet Zone at Cisco Live. More live coverage. Day three, stay with us, I'm John Furrier with Stu Miniman, we'll be right back. (upbeat music)

Published Date : Jun 13 2018

SUMMARY :

Brought to you by Cisco, NetApp, Welcome to theCUBE, good to see you again. But it's really changing the face of Cisco. Yeah, and why do you say collision course? They're at the keys to the kingdom we first had you on theCUBE. And so the concept of, I'm a networker, to explain the DevNet story because you guys got the okay to start DevNet, and that was in 2014. And you can be like, "Well what does that mean?" And you go, people are coding, they're white-boarding, But, give is some of the reasons why this has succeeded it has continued to be here and we when you come in, you're very approachable. it depends on the products that we have, So you have first time learners So that's a good sign of success. And then of course, the app developers. Cause one of the challenges when you have and then now you have like analytics and insights But for the folks that are now seeing the success, And yea, you might be intimidated, So the types of problems that you can solve and you're creating a new, first generation you guys are doing for networks. For the next steps, as you guys are now What're you guys focused on? and making that part of the innovation model for networking. to code sharing, co-contributing. of here's the stuff that you can use. So Suzie, it's been fun to watch So it's really looking at the success of the community It's just the beginning now, it's the start line. And you guys had a great event It's the fact that, there's of course our team What's it like to be on the inside into this mission and drive, they're taking it to the people love to be part of a great project. And DevNet certainly is. "who are gonna install the network and then love the app guys that take care of the apps. from the DevNet Zone at Cisco Live.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Suzie WeePERSON

0.99+

Chuck RobbinsPERSON

0.99+

Susie WeePERSON

0.99+

CiscoORGANIZATION

0.99+

SuziePERSON

0.99+

2014DATE

0.99+

John FurrierPERSON

0.99+

JohnPERSON

0.99+

KayPERSON

0.99+

2013DATE

0.99+

fourth yearQUANTITY

0.99+

Stu MinimanPERSON

0.99+

Orlando, FloridaLOCATION

0.99+

iPhoneCOMMERCIAL_ITEM

0.99+

24 hourQUANTITY

0.99+

AsicsORGANIZATION

0.99+

500,000 developersQUANTITY

0.99+

StuPERSON

0.99+

PowerPointTITLE

0.99+

25 yearsQUANTITY

0.99+

400,000QUANTITY

0.99+

500,000 peopleQUANTITY

0.99+

half a million developersQUANTITY

0.99+

three months laterDATE

0.99+

half a million peopleQUANTITY

0.99+

four years agoDATE

0.99+

PlaystationCOMMERCIAL_ITEM

0.99+

theCUBEORGANIZATION

0.98+

LegosORGANIZATION

0.98+

500,000 registered developersQUANTITY

0.98+

NetAppORGANIZATION

0.98+

20 yearsQUANTITY

0.98+

one productQUANTITY

0.98+

Day threeQUANTITY

0.98+

four yearsQUANTITY

0.98+

a yearQUANTITY

0.98+

twoQUANTITY

0.97+

last nightDATE

0.97+

firstQUANTITY

0.97+

Cisco Live 2018EVENT

0.96+

DevNet CreateEVENT

0.95+

half a millionQUANTITY

0.95+

CTOPERSON

0.94+

GitHubORGANIZATION

0.93+

Cisco ChampionsORGANIZATION

0.93+

oneQUANTITY

0.93+

DevNetTITLE

0.91+

this yearDATE

0.91+

Network Dev OpsTITLE

0.91+

GoogleORGANIZATION

0.91+

few years agoDATE

0.9+

first generationQUANTITY

0.9+

four years oldQUANTITY

0.89+

Cisco LiveEVENT

0.89+

Sachin Gupta, Cisco | Cisco Live US 2018


 

>> Live from Orlando, Florida, it's theCUBE. Covering Cisco Live 2018. Brought to you by Cisco, NetApp, and theCUBE's ecosystem partnership. (upbeat music) >> Hello everyone, welcome back live here in Orlando, Florida for Cisco Live 2018. This is theCUBE's exclusive coverage of Cisco Live. Gonna go throughout the events, extract them. I'm John Furrier, my co-host Stu Miniman. Three days of live coverage, our next guest is Sachin Gupta, Senior Vice President and Product Management, Cisco, 20 plus year career, welcome to theCUBE. Thanks for joining us. >> Thank you, thank you for having me. >> So we love the product execs, because you've got visibility into the customers but also into the engineering roadmap, which now, as Chuck the CEO laid out, is in a new modern era. >> Exactly. >> So you guys are busy (laughs), right? >> Yeah. >> What does that mean? I mean, what do you guys think about, what do you talk about in the product teams, to go modern with cloud, obviously a lot going on. You got cyber-ops go-- really heavily on with the routers right now, and all the core products. You gotta maintain that. >> Right. >> But yet build out a future path. >> Yeah. >> What are you guys working on? What's the core story? >> I mean this has been pretty significant, I mean we had to reinvent the entire network. And, the motivation behind this is, for many many years, our customers could go in, manually operate these networks, go box by box, they're putting command line in, they're deciding the configuration of each element, setting it up this way, and they provide connectivity, some basic security, some experience this way. And what's happening now is, it's just a sheer volume and scale of things that they're having to deal with. I mean everybody comes in with four mobile devices, there's all these things that are connecting. We talk about 26 billion things connected to the network in 2020. It's mind boggling. And then at the same time, the applications are moving to the cloud, which means your threats surface has expanded. We needed to do things fundamentally differently. And so we reinvented the entire stack, and we're serious about that. The ASICS, the platforms, that they're built on, the operating system, modular, programmable, API driven, the controller system on top. Everything had to be redone from scratch. >> One of the exciting things in following Cisco over the years, Stu and I have been following you guys from really the beginning, you go back, say 15 years ago. The big debate in Cisco is, should we move up the stack, and how should we move the stack? But now, the time, it's almost a perfect path, 'cause you got software defined data center, completely going full throttle, really relevant, lot of stuff going on at the root level of the networks, so networking's not going away anytime soon, and as the things I mentioned, security's obviously a big concern, and then now you got Kubernetes and Diane Greene from Google Cloud saying, "Hey this Kubernetes and containers and service meshes, feels a lot like some of the kind of coolness of networking." So the network engineers now have a kind of a path, if you will, to take their core competence, and drive more value around that. Talk about what that actually means. >> Yeah, so there's a couple of things, interesting things that you mentioned. First of all the data center moving to a software defined path. So we've applied a lot of learning from that. And so we've taken the fabric approach, the automation approach, and brought that to the campus with DNA Center, right. Basically Software-Defined Access and DNA Center. And DNA Center actually is built on a Kubernetes model, so in a cloud type of platform, to allow it to scale out with service offers. So we've actually taken both examples applied it. What does it mean from a network engineer point of view? Instead of repeating mundane tasks again and again, now they can automate network wide. The entire network operates as a single system. I can define a policy, and say "I need this user group, I need these doctors, to have access to these medical records. I want this telepresence application to get high priority." Specify intent, let that system automatically apply that everywhere. And then take data and analytics out of that infrastructure, to ensure that the intent was delivered as expected. It's a very powerful-- They can sort of instead of be boxed by box network engineers, now they're system wide looking at the entire network as a whole system. >> Yeah, Sachin, wondering if you can give us a little bit of insight here. You talked about customers not being box by box. Well, from the product side, you know, you spent a lot of your career helping define the catalyst boxes, and we watched the generations of catalyst switches over the years. Cisco transforming from being measured in boxes and ports, to being a software company. How do you, on the inside, measure that transformation? You talked about things like, the DNA Center and the like, but, what's that been like on the inside, and how do you measure internally that balance between software and kind of the hardware world? >> We measure it through customer success through that software. So how many customers were actually able to get a DNA Center - it's an appliance that has software embedded in it - and get value through the network. And I think one thing I'll tell you is, we found that while, reinvention of the network sounds scary, or "Hey, how do I even start reinventing my entire network, as a customer how do I start?" That you can take DNA Center, take the network that you have, and start sending data from DNA Center, as from your network, sorry, from your access points, from your switches, your routers, your identity product. Send it to DNA Center, and start getting immediate value. Immediate value. So what was the experience for this user at this time, how do I pinpoint where the issue is and go fix it? And so we find that, for these customers, yes the switches, the, all the new products we brought out are important because they're programmable, they have rich capabilities, rich data streaming. But, at the same time a lot of the products they have through a software model they can now get network wide assurance. They can troubleshoot, get automated remediation steps that Cisco recommends. And now the new announcement, if we go there is, how do we expose all of this through an API layer? >> Yeah, it's interesting, 'cause if you think back 10, 15 years ago, doing a network upgrade, oh my God, that was a scary thing for customers. You're thinking forklift, am I doing some major build out, I start up my core, I build out to the edge, it's generation shifting. What we hear from the DevNet team here is you gotta meet them where they are, add value, and then you can make change along the way, almost like we do with applications, slowly pulling things apart. >> Absolutely right, and one of the immediate values is assurance, analytics for assurance. Helping you troubleshoot better. But other piece of value that customers love and that we get great feedback, is you know, racking and stacking a switch sometimes, like in a branch site, they would pay more to get it stacked than the switch itself. Because imagine you know you've got a remote side, you don't have a highly trained person flying somebody out, getting them, installing it, spending a few days there, costs a lot of money. And now we're seeing we can automate onboarding your product, we can automate software upgrades for those products, using DNA Center with intent-based networking. So you start there. Then you start transforming it for policy based automation, some of the more advanced security capabilities that the system provides. >> Yeah, we hear day zero a lot, when some of those use cases, and then you see the shift happening with software as a holistic view. Wanna explore that with you for a second. Because if you think about the system, which I totally agree with by the way, it's awesome. Then you got the DNA Center. A lot of people like, understand it, and people are now moving to that, now trying to understand it. Share the mental model, on how people should think architecturally around DNA Center. Is it an abstraction layer, is it just a set of API's? What are you enabling with the API's? What's actually gonna be the result from that architecture? So, how should I think about it, architecturally, and then what are some of the enabling things that could come as a result? >> Let me explain this a little bit, maybe with two examples, right? On, an example of how it works, an example of where we think we can take this. So how it works is, before the API's on the switch would mean that, you can say, "Hey, how much memory do you have left," you know, "Let me copy an image to you," "Let me reboot the switch to upgrade it," "Let me check if it works." And that's the level you were operating at. When we say DNA Center is a platform and has API's, now you have an intent that you could express which says, "Take all the switches of this type, on this site, and upgrade all of them." Right, and now you have to go through all those steps behind the scenes and that's the abstraction that it provides. So those are intent-based API's. So what's exciting first of all is, look, with that, I can extend, integrate it with IT services, I can integrate it with ServiceNow for example, IP address management schemes, cross network domains. I can support third party, I could do all those things. What's exciting for me is, I'm gonna pull out my device, right? You think about it, this thing has a phone, it has a camera, accelerometer, all sorts of things. But the way it's exposed through the app developer, is through very simple API's and through an app store. We are-- >> So you're essentially enabling. >> We're unleashing innovation on that network. By taking away the need to understanding the depths of networking for the developer that sits on top. >> So it's really on top, a holistic view. So, you're taking away steps it takes to get something done. >> Right. >> And integrating other things. Is that-- on the app side. >> Yeah, from the app side now, I mean, you look at DevNet, and the capabilities that DevNet brings to the table, and now, of the app developer, our systems integrator can invoke powerful network technology without understanding the depths of networking. 'Cause what they're looking for is, you know what I'll give you an example, I'll talk about doctors and medical records. If you need to onboard a group of contractors to help out for six months and have secure access, you can now define that in an application layer, at an identity layer, and automate that completely through DNA Center, without understanding exactly what the network will need to do, in a highly sophisticated way, across all those boxes to make it happen. >> So is DNA Center a net new capability for your customers? >> It is. DNA Center's been around since last August. So less than a year. It is a new controller built for the enterprise. And so yes, many many customers are using it. But for a lot of customers, it's a net new powerful piece of technology. >> I gotta ask you a personal question. You've been in Cisco for a long time, you've seen waves come, and new waves emerging. Why has DevNet been so successful? And you got DevNet Create with the cloud native side kinda coming together, bringing those two worlds together. I mean timing's everything, right? In life, right? So is it timing, is it just-- What is the, I mean the success is pretty significant. 500 thousand developers, you know you guys have. And that's a great developer program. That's robust. >> Yeah. >> So it's on its way to continuing to rise. Why is it so successful? >> I'll give you my honest example. I think you know, networking, people have thought, is sort of big, you know, big boxes, is sort of what networking is. And we always tell people, that even when you think about switches, the majority of our engineering investment is in software. So my network engineers, yes they're plugging in a switch, but the majority of their life is operating the software on that infrastructure. And so by the very nature of networking and network engineers, they're actually very comfortable with software. They're very comfortable with scripting and those kinds of capabilities. Now you enter DevNet. DevNet says, "I am now going to give you a easy way, sandbox way, learning and enablement, for you to learn the API's not just on the network, on the collapse systems, on the security systems, in the data center, and be much more powerful at how quickly you can move. You're much more agile." So I think it was a pretty natural evolution for the network engineer. Now, the last piece of the puzzle was the network. And now with DNA Center, we provide the same sort of API abstraction for the network itself. And I mean, look, so far, network engineers are loving it. I was talking to Paul, who's at Presidio, who's a network engineer. He's actually one of the DevNet Creator award winners. And, loves it. He's a network practitioner, and now can solve problems for his business as a partner and his customers, could never do before. >> Great point. I mean we interviewed Paul, great guy. But you just said something I think is really interesting. The people in the community, the network engineers, they've been solving problems. That's what they do. >> That's what they do! And with software! >> And so now you add scripting to your point, this is not new things, it's not foreign, but the networks are core. >> Yes. >> They're not learning Python to get a career change. They're extending their capability. >> That's exactly right. They're not doing Python just to do Python. They're using Python, they're using the API's, they're using the DNA Center platform to become more powerful as a network engineer. For networking, to solve business problems. >> Yeah, I think the timing, combined with just where cloud is, where you guys are with the programmability, it really is, right, again, timing's everything. >> It's exciting. I think-- >> So, one of the things we've been looking at with Cisco is, Cisco's moving up the stack. And I think, we want you to help connect the dots for us. Intent-based networking really is one of the ways that networking people are building applications. I think in the key note, they walked through some specific examples. What kind of things are people building with intent-based networks that they couldn't do before? >> I think, you know, so some of the app examples that sit on top, right? So, I'll give you simple examples, and some other interesting things. Accenture, for example, is doing automated software updates, much more intelligent software updates, based on you know business information, like who, how many people will get impacted with the update, tying it to the service process with ServiceNow. That's an Accenture use case. World Wide Tech has taken DNA Center, made it mobile. So instead of consuming it on your laptop like this, you can now consume network status, client status, health, on your mobile device. You've got, Dimension Data, that's actually doing SSID leasing. So in your sites as a customer, if you need to create temporary network connectivity, for certain types of users, you can deliver that automatically. Right, so you've got examples of all kinds that are leveraging the power of the network, without actually have to understand all the nitty gritty details behind it. And as a developer or a systems integrator, providing tremendous more value to our customers. >> It's interesting too, one of things that World Wide Technology said here when we interviewed them on the first day yesterday, was, in the old model, there was dislocated capabilities. They'd go talk about business outcomes, essentially what the intent was on the business side, and then, "Great we're done. Now let's shake hands with Cisco." Cisco would come in, and the networking guys would come in, "Okay, here's what you can do." So now, those are coming together. >> Yes. >> Which shrinks the accela--, the time frame, on the execution. So, to actually put it together, that is really kind of DevOps-like. I mean, this is integration, this is kind of like-- >> Right. >> This is a big trend. >> It's a big trend, because now the network has an ability through DNA Center, to take that business outcome, you described it as an intent, translate that into what the network understands, activate it, and then provide the data analytics and assurance, back to the application. And so, you're absolutely right. Before, you'd have to go manually, take that business outcome, and figure out now, how do I, you know, make this happen, through a network that did not operate as a single system. >> Yeah. >> And now the worlds are coming together, and our partners and our customers can move much much more quickly. >> Well you guys are doing a great job, we really think that the clear path to the stack, where the stack is integrating with networking, is colliding - in a good way - you've still got the hard core, software defined, networking in the data center and the networks. So it's awesome. I wanna get your thoughts on, as an industry participant, also Cisco executive, for the folks that couldn't make Cisco live this year, what's the biggest story? I mean we heard a lot of things. If you had to boil it down, what's the most important development happening this year at Cisco live? >> I think the big announcement is DNA Center platform. Where, it is an open API system which supports third party infrastructure, and has that API layer, accelerating innovation through our partners. But what I will tell you, is, that the important message I'd like to deliver, is they can start on this network reinvention today. It is not about a rip and replace of the gear that they have. They can add the software capabilities of DNA Center on the infrastructure they have. And get immediate out the gate benefit, with things like network assurance, DNA assurance. And so I really encourage everybody to look at this and say, "Yes, you know what? Maybe I'll get to the last step later." Start now. You're gonna see immediate value. >> And there's not a lot of-- there's really no disruption. >> And there's no disruption in that. >> They can put their toe in the water, or jump all-- full throttle. >> Exactly. And once you like the controller approach, you can see how it integrates with API's, with everything else in your IT processes, you can then take more steps, like software defined access, policy based automation. Which are more intrusive, and but provide tremendous value. But there's a way to start that's not intrusive. >> Well we're super excited to see how DNA Center continues to accelerate, we love what's going on in DevNet, DevNet Create, you're seeing the cloud growth happen, you're seeing all kinds of new modern era things that we've never seen before. So congratulations. >> DNA Center platform, multiplied by DevNet, right? It's exponential growth. >> Yeah, so it's a great wave. People's jobs will become easier, again, automation for the right reasons, accelerating new value creation opportunities. This is theCUBE. Here in Orlando. Bringing you all the action at Cisco Live. Extracting the signal of noise. I'm John Furrier, Stu Miniman. Stay with us, we've got more. Here on day two of three days of coverage. Stay with us. (music)

Published Date : Jun 12 2018

SUMMARY :

Brought to you by Cisco, NetApp, and and Product Management, Cisco, but also into the engineering roadmap, I mean, what do you guys think about, The ASICS, the platforms, that they're built on, and as the things I mentioned, that the intent was delivered as expected. Well, from the product side, you know, take the network that you have, along the way, almost like we do and that we get great feedback, is you know, Wanna explore that with you for a second. And that's the level you were operating at. By taking away the need to understanding the depths So it's really on top, a holistic view. Is that-- on the app side. and now, of the app developer, our systems integrator It is a new controller built for the enterprise. And you got DevNet Create with Why is it so successful? And so by the very nature of networking The people in the community, the network engineers, And so now you add scripting They're not learning Python to get a career change. They're not doing Python just to do Python. you guys are with the programmability, I think-- And I think, we want you to help connect the dots for us. that are leveraging the power of the network, "Okay, here's what you can do." Which shrinks the accela--, the time frame, the network has an ability through DNA Center, And now the worlds are coming together, for the folks that couldn't make the important message I'd like to deliver, They can put their toe in the water, And once you like the controller approach, how DNA Center continues to accelerate, DNA Center platform, multiplied by DevNet, right? again, automation for the right reasons,

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
PaulPERSON

0.99+

CiscoORGANIZATION

0.99+

Stu MinimanPERSON

0.99+

six monthsQUANTITY

0.99+

SachinPERSON

0.99+

John FurrierPERSON

0.99+

Sachin GuptaPERSON

0.99+

OrlandoLOCATION

0.99+

2020DATE

0.99+

Diane GreenePERSON

0.99+

ChuckPERSON

0.99+

three daysQUANTITY

0.99+

PythonTITLE

0.99+

theCUBEORGANIZATION

0.99+

Orlando, FloridaLOCATION

0.99+

NetAppORGANIZATION

0.99+

20 plus yearQUANTITY

0.99+

Three daysQUANTITY

0.99+

last AugustDATE

0.99+

less than a yearQUANTITY

0.99+

DevNetORGANIZATION

0.99+

two examplesQUANTITY

0.99+

15 years agoDATE

0.99+

StuPERSON

0.98+

both examplesQUANTITY

0.98+

this yearDATE

0.98+

each elementQUANTITY

0.98+

oneQUANTITY

0.98+

AccentureORGANIZATION

0.97+

four mobile devicesQUANTITY

0.97+

Cisco Live 2018EVENT

0.97+

FirstQUANTITY

0.97+

two worldsQUANTITY

0.96+

todayDATE

0.96+

DNA CenterORGANIZATION

0.94+

day twoQUANTITY

0.94+

World Wide TechORGANIZATION

0.94+

DevNet CreatorTITLE

0.93+

single systemQUANTITY

0.92+

500 thousand developersQUANTITY

0.92+

World Wide TechnologyORGANIZATION

0.91+

Google CloudTITLE

0.9+

firstQUANTITY

0.87+

ASICSORGANIZATION

0.87+

Cisco LiveEVENT

0.84+

OneQUANTITY

0.83+

yesterdayDATE

0.82+

10, 15 years agoDATE

0.79+

about 26 billion thingsQUANTITY

0.78+

USLOCATION

0.78+

first dayQUANTITY

0.77+

a secondQUANTITY

0.76+

Cisco liveEVENT

0.72+

DevNet CreateTITLE

0.71+

2018DATE

0.7+

KubernetesTITLE

0.7+

PresidioORGANIZATION

0.69+

Dimension DataORGANIZATION

0.64+

Cat Graves & Natalia Vassilieva, HPE | HPE Discover Madrid 2017


 

>> (Narrator) Live from Madrid, Spain. It's The Cube covering HP Discover Madrid 2017, brought to you by Hewlett Packard Enterprise. >> We're back at HPE Discover Madrid 2017. This is The Cube, the leader in live tech coverage. My name is Dave Vellante and I'm with my co-host for the week, Peter Burris. Cat Graves is here, she's a research scientist at Hewlett Packard Enterprises. And she's joined by Natalia Vassilieva. Cube alum, senior research manager at HPE. Both with the labs in Palo Alto. Thanks so much for coming on The Cube. >> Thank you for having us. >> You're welcome. So for decades this industry has marched to the cadence of Moore's Law, bowed down to Moore's Law, been subservient to Moore's Law. But that's changing, isn't it? >> Absolutely. >> What's going on? >> I can tell Moore's Law is changing. So we can't increase the number, of course, on the same chip and have the same space. We can't increase the density of the computer today. And from the software perspective, we need to analyze more and more data. We are now marching calls into the area of artificial intelligence when we need to train larger and larger models, we need more and more compute for that. And the only possible way today to speed up the training of those modules, to actually enable the AI, is to scale out. Because we can't put more cores on the chip. So we try to use more chips together But then communication bottlenecks come in. So we can't efficiently use all of those chips. So for us on the software side, on the part of people who works how to speed up the training, how to speed up the implementation of the algorithms, and the work of those algorithms, that's a problem. And that's where Cat can help us because she's working on a new hardware which will overcome those troubles. >> Yeah, so in our lab what we do is try and think of new ways of doing computation but also doing the computations that really matter. You know, what are the bottlenecks for the applications that Natalia is working on that are really preventing the performance from accelerating? Again exponentially like Moore's Law, right? We'd like to return to Moore's Law where we're in that sort of exponential growth in terms of what compute is really capable of. And so what we're doing in labs is leveraging novel devices so, you've heard of memristor in the past probably. But instead of using memristor for computer memory, non volatile memory for persistent memory driven computer systems, we're using these devices instead for doing computation itself in the analog domain. So one of our first target applications, and target core computations that we're going after is matrix multiplication. And that is a fundamental mathematical building block for a lot of different machine learning, deep learning, signal processing, you kind of name it, it's pretty broad in terms of where it's used today. >> So Dr. Tom Bradicich was talking about the dot product, and it sounds like it's related. Matrix multiplications, suddenly I start breaking out in hives but is that kind of related? >> That's exactly what it is. So, if you remember your linear algebra in college, a dot product is exactly a matrix multiplication. It's the dot in between the vector and the matrix. The two itself, so exactly right. Our hardware prototype is called the dot product engine. It's just cranking out those matrix multiplications. >> And can you explain how that addresses the problem that we're trying to solve with respect to Moore's Law? >> Yeah, let me. You mentioned the problem with Moore's Law. From me as a software person, the end of Moore's Law is a bad thing because I can't increase their compute power anymore on the single chip. But for Cat it's a good thing because it forced her to think what's unconventional. >> (Cat) It's an opportunity. >> It's an opportunity! >> It forced her to think, what are unconventional devices which she can come up with? And we also have to mention they understand that general purpose computing is not always a solution. Sometimes if you want to speed up the thing, you need to come up with a device which is designed specifically for the type of computation which you care about. And for machine learning technification, again as I've mentioned, these matrix-matrix multiplications matrix-vector multiplications, these are the core of it. Today if you want to do those AI type applications, you spend roughly 90% of the time doing exactly that computation. So if we can come up with a more power efficient and a more effective way of doing that, that will really help us, and that's what dot product engine is solving. >> Yes, an example some of our colleagues did in architectural work. Sort of taking the dot product engine as the core, and then saying, okay if I designed a computer architecture specifically for doing convolutional neural networks. So image classification, these kinds of applications. If I built this architecture, how would it perform? And how would it compare to GPUs? And we're seeing 10 to 100 X speed up over GPUs. And even 15 X speed up over if you had a custom-built, state of the art specialized digital Asic. Even comparing to the best that we can do today, we are seeing this potential for a huge amount of speed up and also energy savings as well. >> So follow up on that, if I may. So you're saying these alternative processors like GPUs, FGPAs, custom Asics, can I infer from that that that is a stop-gap architecturally, in your mind? Because you're seeing these alternative processors pop up all over the place. >> (Cat) Yes. >> Is that a fair assertion? >> I think that recent trends are obviously favoring a return to specialized hardware. >> (Dave) Yeah, for sure. Just look at INVIDIA, it's exploding. >> I think it really depends on the application and you have to look at what the requirements are. Especially in terms of where there's a lot of power limitations, right, GPUs have become a little bit tricky. So there's a lot of interest in the automotive industry, space, robotics, for more low power but still very high performance, highly efficient computation. >> Many years ago when I was actually thinking about doing computer science and realized pretty quickly that I didn't have the brain power to get there. But I remember thinking in terms of there's three ways of improving performance. You can do it architecturally, what do you do with an instruction? You can do it organizationally, how do you fit the various elements together? You can do it with technology, which is what's the clock speed, what's the underlying substrate? Moore's Law is focused on the technology. Risk, for example, focused on architecture. FPGAs, arm processors, GPUs focus on architecture. What we're talking about to get back to that doubling the performance every 18 months from a computing standpoint not just a chip standpoint, now we're talking about revealing and liberating, I presume, some of the organization elements. Ways of thinking about how to put these things together. So even if we can't get improvements that we've gotten out of technology, we can start getting more performance out of new architectures. But organizing how everything works together. And make it so that the software doesn't have to know, or the developer, doesn't have to know everything about the organization. Am I kind of getting there with this? >> Yes, I think you are right. And if we are talking about some of the architectural challenges of today's processors, not only we can't increase the power of a single device today, but even if we increase the power of a single device, then the challenge would be how do you bring the data fast enough to that device? So we will have problems with feeding that device. And again, what dot product engine does, it does computations in memory, inside. So you limit the number of data transfers between different chips and you don't face the problem of feeding their computation thing. >> So similar same technology, different architecture, and using a new organization to take advantage of that architecture. The dot product engine being kind of that combination. >> I would say that even technology is different. >> Yeah, my view of it we're actually thinking about it holistically. We have in labs software working with architects. >> I mean it's not just a clock speed issue. >> It's not just a clock speed issue. It's thinking about what computations actually matter, which ones you're actually doing, and how to perform them in different ways. And so one of the great things as well with the dot product engine and these kind of new computation accelerators, is with something like the memory driven computing architecture. We have now an ecosystem that is really favoring accelerators and encouraging the development of these specialized hardware pieces that can kind of slot in in the same architecture that can scale also in size. >> And you invoke that resource in an automated way, presumably. >> Yeah, exactly. >> What's the secret sauce behind that? Is that software that does that or an algorithm that chooses the algorithm? >> A gen z. >> A gen z's underlying protocol is to make the device talk to the data. But at the end of the system software, it's algorithms also which will make a decision at every particular point which compute device I should use to do a particular task. With memory driven computing, if all my data sits in the shared pool of memory and I have different heterogeneous compute devices, being able to see that data and to talk to that data, then it's up to the system management software to allocate the execution of a particular task to the device which does that the best. In a more power efficient way, in the fastest way, and everybody wins. >> So as a software person, you now with memory driven computing have been thinking about developing software in a completely different way. Is that correct? >> (Natalia) Yeah. You're not thinking about going through I/O stack anymore and waiting for a mechanical device and doing other things? >> It's not only the I/O stack. >> As I mentioned today, the only possibility for us to decrease the time of processing for the algorithms is to scale out. That means that I need to take into account the locality of the data. It's not only when you distribute the computation across multiple nodes, even if we have some number based which is we have different sockets in a single system. With local memory and the memory which is remote to that socket but which is local to another socket. Today as a software programmer, as a developer, I need to take into account where my data sits. Because I know in order to accept the data on a local memory it'll take me 100 seconds to accept my data. In the remote socket, it will take me longer. So when I developed the algorithm in order to prevent my computational course to stall and to wait for the data, I need to schedule that very carefully. With memory driven computing, giving an assumption that, again, all memory not only in the single pool, but it's also evenly accessible from every compute device. I don't need to care about that anymore. And you can't even imagine such a relief it is! (laughs) It makes our life so much easier. >> Yeah, because you're spending a lot of time previously trying to optimize your code >> Yes for that factor of the locality of the data. How much of your time was spent doing that menial task? >> Years! In the beginning of Moore's Law and the beginning of the traditional architectures, if you turn to the HPC applications, every HPC application device today needs to take care of data locality. >> And you hear about when a new GPU comes out or even just a slightly new generation. They have to take months to even redesign their algorithm to tune it to that specific hardware, right? And that's the same company, maybe even the same product sort of path lined. But just because that architecture has slightly changed changes exactly what Natalia is talking about. >> I'm interested in switching subjects here. I'd love to spend a minute on women in tech. How you guys got into this role. You're both obviously strong in math, computer backgrounds. But give us a little flavor of your background, Cat, and then, Natalia, you as well. >> Me or you? >> You start. >> Hm, I don't know. I was always interested in a lot of different things. I kind of wanted to study and do everything. And I got to the point in college where physics was something that still fascinated me. I felt like I didn't know nearly enough. I felt like there was still so much to learn and it was constantly challenging me. So I decided to pursue my Ph.D in that, and it's never boring, and you're always learning something new. Yeah, I don't know. >> Okay, and that led to a career in technology development. >> Yeah, and I actually did my Ph.D in kind of something that was pretty different. But towards the end of it, decided I really enjoyed research and was just always inspired by it. But I wanted to do that research on projects that I felt like might have more of an impact. And particularly an impact in my lifetime. My Ph.D work was kind of something that I knew would never actually be implemented in, maybe a couple hundred years or something we might get to that point. So there's not too many places, at least in my field in hardware, where you can be doing what feels like very cutting edge research, but be doing it in a place where you can see your ideas and your work be implemented. That's something that led me to labs. >> And Natalia, what's your passion? How did you arrive here? >> As a kid I always liked different math puzzles. I was into math and pretty soon it became obvious that I like solving those math problems much more than writing about anything. I think in middle school there was the first class on programming, I went right into that. And then the teacher told me that I should probably go to a specialized school and that led me to physics and mathematics lyceum and then mathematical department at the university so it was pretty straightforward for me since then. >> You're both obviously very comfortable in this role, extremely knowledgeable. You seem like great leaders. Why do you feel that more women don't pursue a career in technology. Do you have these discussions amongst yourselves? Is this something that you even think about? >> I think it starts very early. For me, both my parents are scientists, and so always had books around the house. Always was encouraged to think and pursue that path, and be curious. I think its something that happens at a very young age. And various academic institutions have done studies and shown when they do certain things, its surmountable. Carnegie Mellon has a very nice program for this, where they went for the percentage of women in their CS program went from 10% to 40% in five years. And there were a couple of strategies that they implemented. I'm not gonna get all of them, but one was peer to peer mentoring, when the freshmen came in, pairing them with a senior, feeling like you're not the only one doing what you're doing, or interested in what you're doing. It's like anything human, you want to feel like you belong and can relate to your group. So I think, yeah. (laughs) >> Let's have a last word. >> On that topic? >> Yeah sure, or any topic. But yes, I'm very interested in this topic because less than 20% of the tech business is women. Its 50W% of the population. >> I think for me its not the percentage which matters Just don't stay in the way of those who's interested in that. And give equal opportunities to everybody. And yes, the environment from the very childhood should be the proper one. >> Do you feel like the industry gives women equal opportunity? >> For me, my feeling would be yes. You also need to understand >> Because of your experience Because of my experience, but I also originally came from Russia, was born in St. Petersburg, and I do believe that ex-Soviet Union countries has much better history in that. Because the Soviet Union, we don't have man and woman. We have comrades. And after the Second World War, there was women who took all hard jobs. And we used to get moms at work. All moms of all my peers have been working. My mom was an engineer, my dad is an engineer. From that, there is no perception that the woman should stay at home, or the woman is taking care of kids. There is less of that. >> Interesting. So for me, yes. Now I think that industry going that direction. And that's right. >> Instructive, great. Well, listen, thanks very much for coming on the Cube. >> Sure. >> Sharing the stories, and good luck in lab, wherever you may end up. >> Thank you. >> Good to see you. >> Thank you very much. >> Alright, keep it right there everybody. We'll be back with our next guest, Dave Vallante for Peter Buress. We're live from Madrid, 2017, HPE Discover. This is the Cube.

Published Date : Nov 29 2017

SUMMARY :

brought to you by Hewlett Packard Enterprise. for the week, Peter Burris. to the cadence of Moore's Law, And from the software perspective, for doing computation itself in the analog domain. the dot product, and it sounds like it's related. It's the dot in between the vector and the matrix. You mentioned the problem with Moore's Law. for the type of computation which you care about. Sort of taking the dot product engine as the core, can I infer from that that that is a stop-gap a return to specialized hardware. (Dave) Yeah, for sure. and you have to look at what the requirements are. And make it so that the software doesn't have to know, of the architectural challenges of today's processors, The dot product engine being kind of that combination. We have in labs software working with architects. And so one of the great things as well And you invoke that resource the device talk to the data. So as a software person, you now with and doing other things? for the algorithms is to scale out. for that factor of the locality of the data. of the traditional architectures, if you turn to the HPC And that's the same company, maybe even the same product and then, Natalia, you as well. And I got to the point in college where That's something that led me to labs. at the university so it was pretty straightforward Why do you feel that more women don't pursue and so always had books around the house. Its 50W% of the population. And give equal opportunities to everybody. You also need to understand And after the Second World War, So for me, yes. coming on the Cube. Sharing the stories, and good luck This is the Cube.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Dave VellantePERSON

0.99+

Dave VallantePERSON

0.99+

Peter BurrisPERSON

0.99+

Natalia VassilievaPERSON

0.99+

NataliaPERSON

0.99+

Palo AltoLOCATION

0.99+

10%QUANTITY

0.99+

10QUANTITY

0.99+

Tom BradicichPERSON

0.99+

100 secondsQUANTITY

0.99+

Peter BuressPERSON

0.99+

15 XQUANTITY

0.99+

St. PetersburgLOCATION

0.99+

RussiaLOCATION

0.99+

HPEORGANIZATION

0.99+

DavePERSON

0.99+

Hewlett Packard EnterprisesORGANIZATION

0.99+

Hewlett Packard EnterpriseORGANIZATION

0.99+

Carnegie MellonORGANIZATION

0.99+

TodayDATE

0.99+

50W%QUANTITY

0.99+

MadridLOCATION

0.99+

five yearsQUANTITY

0.99+

Madrid, SpainLOCATION

0.99+

40%QUANTITY

0.99+

todayDATE

0.99+

Cat GravesPERSON

0.99+

Second World WarEVENT

0.99+

less than 20%QUANTITY

0.99+

bothQUANTITY

0.99+

Moore's LawTITLE

0.99+

twoQUANTITY

0.99+

single chipQUANTITY

0.98+

CatPERSON

0.98+

100 XQUANTITY

0.98+

single poolQUANTITY

0.98+

AsicsORGANIZATION

0.97+

2017DATE

0.97+

BothQUANTITY

0.97+

INVIDIAORGANIZATION

0.96+

oneQUANTITY

0.96+

single systemQUANTITY

0.95+

HPORGANIZATION

0.94+

single deviceQUANTITY

0.94+

first classQUANTITY

0.93+

AsicORGANIZATION

0.92+

first targetQUANTITY

0.92+

Soviet UnionLOCATION

0.92+

Many years agoDATE

0.9+

I/OTITLE

0.89+

three waysQUANTITY

0.87+

90%QUANTITY

0.87+

Moore'sTITLE

0.86+

Discover Madrid 2017EVENT

0.8+

decadesQUANTITY

0.76+

Dr.PERSON

0.75+

every 18 monthsQUANTITY

0.73+

couple hundred yearsQUANTITY

0.7+

Soviet UnionORGANIZATION

0.65+

The CubeCOMMERCIAL_ITEM

0.53+

CubeORGANIZATION

0.46+

CubeCOMMERCIAL_ITEM

0.38+

Hu Yoshida, Hitachi Data Systems - CUBEconversation - #theCUBE


 

hi everybody Jeff Rick here with the Q we're having a cute conversation in the Palo Alto studio something that we do when we have a little break in the show schedule we can take a minute catch our breath and still sit down with the tech leaders that you want to hear from but now we can do it in the studio outside the context of the hustle and bustle of a show and really excited to have a true industry veteran he's been around for probably longer than he wants me to say on air so I'll let him say how long but who is she - the CTO of Hitachi Data Systems welcome thank you Jeff great to see you pleasure to be here well doing a little research for this interview you've been around for a while you've done a number of interviews and the thing that struck me was kind of that maybe the last big trend that you were so excited about server virtualization and what a phenomenal difference that made in the marketplace as well as your business are we going through another one of those now yes well we're you know we're going through this digital transformation and I guess IDC is the one that started that term and it's based upon you know the social mobile analytics and cloud or smack because they called it and that has brought some new technologies and be able to create some new innovations in terms of how businesses can transform themselves right Hitachi Data Systems you guys are you guys are way down in the bowels of these big systems you guys are powering a lot of the storage and and you came from the mainframe business so how is it affecting your business how are you seeing you know real concrete changes in what your customers are asking you for and how you see their business changing yes well we started it as well we started as mainframes and then we transition to storage from the mainframe businesses that are declined but we're more than storage you know we have now we have an x86 of server platform a blade server that enables us to provide a converged solution along with our networking partners like brocade and these converts oceans are kind of the basis for private clouds because it eliminates all the the need for infrastructure connectivity and things like that so you can roll in one of these things plug in a the power plug on the network and and actually pick an application from a table menu of tables templates and be off and running so it makes it very easy to move into this new phase of digital transformation yeah cuz it's funny because on the infrastructure side you know it's kind of production line 101 as soon as you take care of one piece in the production line then you move to your next point of failure you move to your next point of failure you know between compute and and and storage and networking everyone seem to see the kind of networking was kind of the slowest leg of the three and kind of coming up to the modern architecture but now with this type of announcement they're really bringing their game up quite a bit right yeah no Gen 6 is really going to open up a lot of bandwidth and I ops for us and move a lot of the actually you know it's the peaks that we worry about right we have to over configure for the peaks but they've got this you know 32 gigabits per second yes the old mob no problem right everybody calls me everybody calls mom on Mother's Day and AT&T doesn't have to build the whole network out for Mother's Day but Mother's Day only comes once a year yeah yeah the other huge trend that you've talked about extensively which is another driver behind this is really software defined and how software-defined is spreading throughout many parts of the infrastructure and and adding a whole new layer of flexibility expandability elasticity to what customers can do with their infrastructure right yeah software-defined is is key to this transformational transformation that we're talking about and to us Software Defined you know many times people consider software-defined as a way of commoditizing the hardware and to us is much different than that it's really the communication between hardware and the application layer a good example is v-ball from VMware where we can publish our unique capabilities up through the vasa interface API and vSphere can see our capabilities and they find a virtual volume or on their capabilities and on our part we can see into vmware know that we're talking or configuring for a virtual machine not just presenting up Lunz and you know blocks but we can actually recognize that this virtual machine is higher priority than others and we can allocate to the right resources right so it's a communication process and a synergy between applications and hardware infrastructure and then what this has enabled what you've talked about in numerous times too is the ability for an individual to manage a whole lot more in terms of infrastructure storage etc so now as the as the you know kind of amount of stuff that I'm responsible for goes up you know the management and the management tools and the ability to manage this this bigger more complex things becomes much more significant yeah much simpler you know the old view of infrastructure or the data center it was sort of like a triangle you know with with the base of it being the infrastructure costs and the operations and all that the top of it was was the smaller part was what we focused on the applications and analytics what we have to do now is turn that triangle upside down so we focused less on the infrastructure software do you find helps us do that cloud helps us to do that and automate that so that we can spend most of our effort on the application the end user analytics right we hear that time and time again especially with with the DevOps ethos and what amazon has done with you know swipe your card infrastructure that it's really the application that drives everything and there's a there's an expectation in the developer world that now with containers that the application or the infrastructure to just respond and what I need from the application as opposed to limiting my application development based on what I think or I got away from them to spin up a new server or whatever that's completely flip-flopped as you said yeah I mean you make a good point on it's very disruptive I mean not just on the infrastructure side but it's also in development side as you as you talked about so DevOps and agile and scrum and those things are very important so instead of the waterfall approach we took the development right that's too slow we've got to go you know be faster and using these technologies are one thing but how we use that technology and innovation we put into that is what really makes a difference right and you put in the game like we said you've been in the game for a while and and you've mentioned in a number of your interviews you know that these little guys have driven kind of this last big wave of innovation but there's a new one coming on we hear about it all the time it's sio T Internet of Things now as sensors get cheap and actually a benefit of these is now all the sensors that are in them they are less expensive and much more pervasive so now we can put them on dogs you can put them on shipping boxes from Amazon you can put them on all kinds of things you know from your point of view as you start to see IOT build and the momentum building that's a lot of hype probably right now but it's coming right and big companies like GE are behind it and a lot of players are behind it what does that make you think how excited are you about IOT is there some specific challenges you're looking forward to taking down or DC is just kind of the next big step function of kind of demand for the big three of compute networking and storage yeah it's it's another integration process between the information technology we have grew up with the data centers and the operational technology that comes from those sensors how do we bring those things together you know we have you know we have to be able to bridge that too one of the ways we can do that is with several things we have to bridge we have to bridge the infrastructure and then that's software-defined we have to bridge the data and so we have to move more toward object stores with more enriched metadata and we've got to bridge the information so the the data that comes from aisle key is different from your structured data center but you need to bring together that Oracle or s ap data together with this sensor data that comes in and integrate that together so we acquired a company last year called Pentaho that does that allows me to integrate all these things and the way it we have all these connectors to all these disparate types of databases is that it's open source so open source contributes a lot of this we just harden it and provide a subscription maintenance for that so open source is another key driver for for enabler for this transformation did you even talked about the transformation at Hitachi going from proprietary Asics proprietary software to more open source and Intel chips and again kind of leveraging best-of-breed at scale and bringing that type of capability into your right you know the other thing is the Intel's roadmap I mean that is amazing how they went to all these cores and everything and so that is enabled us to do away with a lot of the Asics we use to have to make we do have some ASICs and FPGAs for special purpose but primarily its standard Intel memory and cores and that what that enables us to do is to have a straw floor hypervisor for storage in other words all our mid-range you remember how we used to have separate mid-range and enterprise storage right now that's all running all with one hypervisor storage hypervisor it's interesting we I think was at HP maybe were talked about you know this IOT the concept of kind of IT versus ot and congratulations on the Pentaho acquisition we're at Pentaho world to create a great event great show a lot of traction but you know the ot the operational technology that runs shop floors that people at GE or work that's been cranking along all the time then yeah the IT is kind of two separate worlds and this in this IOT really is bringing those two worlds together and the connectivity together of the devices in the sensors and the shopfloor versus the IT systems you know and what's fortunate for us is he taught you data systems is our parent company has been in the IOT oh well the operational world they build nuclear reactors or trains locomotives and all the infrastructure types of things right and so we're able to bring that expertise together with our expertise and information systems and create this IOT solution right spot right we're in a great spot so a little more specific about the announcement today you're partnering with with brocade on this Gen 6 mhm what does it mean to you for attach II data systems what does it mean for your customers oh well it enables us you know we're going to all flash I mean I think we've already passed the tipping point for all flash you know with our 6.4 terabyte flash drive so we're actually cheaper than lower cost total cost of ownership than hard drives and so the cost is not a factor anymore and then all the surveys the Gartner just did a survey said that you know the users of flash reported you know savings not only in power cooling maintenance and performance normal things but also things like licensing costs because they don't have to license as many cores or instances of databases because of performance of flash so what this Gen 6 does it just opens up the highway or the lanes as Jack was talking about for us to be able to drive more workload through there right and and possibly even reduce the footprint even further by making better utilization of what we have and not have as many cores and instances of applications and as you were talking about a little bit online it's beyond just flash or the all flash array but really now looking down the road and potentially the all flash data center and the impacts of that is gonna have as these data centers keep getting bigger bigger the demands the loads are going up enough power continues to be an issue but this is a complete game-changer in terms of it all right you know all flash arrays were the hot thing right the investors are just big VCS are going crazy about those things investing a lot of money into them but you know the small flash arrays are really appliances if you want an all flash data center you still have to worry about all the enterprise things around availability you know replication disaster recovery security features shredding encryption and all that those things come with an enterprise array so if you're talking about all enterprise all flash Data Center it's more than just an all flash array you've got to expand that requirements to include all the enterprise requirements we traditionally had right so and that's that's why I Jen brocade is so the Gen 6 is so important to this right because not only does it give us the performance but it also has some additional availability features like they have forward error correction for in-stream types of error Corrections it has F CSP they do chap you know like a challenge handshake authentication protocol that we have with with Ethernet they do that with fiber channel and so we you had those additional capabilities and in the Fibre Channel switches now right in six really really just in sync with software-defined everything right it's not beads now you have management you have software capabilities you have all kinds of writings that you can now add in and as you said what's the point of hooking up a really fast drive to it'll hold an old legacy connection system that really wasn't built for the performance that you get out and the i/o insight which is key to seeing seeing that whole network at sandwich there so before I let you go running out of time just kind of get your perspective as to where we are today in kind of the IT industry with these massive shifts in terms of you know cloud and big data now being an asset and on liability and flash even the all flash data center and and mobile and around the corner IOT is you kind of sit back you know on a Friday night maybe with a glass of wine and think wow this is just crazy for all the innovation you live through and seeing how do you rank where we are today and what do you think about when you look out over the - yeah I don't know you know I've been in this business a long time but every year it just seems to be getting you know more and more the world is just expanding you know we see it you know so much data being created and we know we can't store all that data it's a part of the things that we'll have to struggle with is how what do we save and what we don't save and what can we recreate just from metadata so metadata Dappy stores become more important but you know today we're in this transition we we have to have sort of take it bimodal approach we still have our course systems that we need to take care of and nurture and grow and scale but we also need to then move into the the new the new innovations are the things that are that are not as atomic and as we have in our data center but eventual consistency things like that so we have both worlds but we need to be able to bridge the information the data and the infrastructure between the two and and networking is a key piece of that bridging the shortage of opportunity going forward no all right you thanks for taking a few minutes out of your day appreciate thank you all right who you sheet I'm chef Ricky you're watching Q conversations so looking angles to be the cue production thanks for watching

Published Date : Jul 19 2016

SUMMARY :

lot of the actually you know it's the

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Jeff RickPERSON

0.99+

JeffPERSON

0.99+

Hitachi Data SystemsORGANIZATION

0.99+

last yearDATE

0.99+

RickyPERSON

0.99+

AT&TORGANIZATION

0.99+

Hitachi Data SystemsORGANIZATION

0.99+

JackPERSON

0.99+

HitachiORGANIZATION

0.99+

GartnerORGANIZATION

0.99+

AmazonORGANIZATION

0.99+

AsicsORGANIZATION

0.99+

amazonORGANIZATION

0.99+

vSphereTITLE

0.99+

Palo AltoLOCATION

0.99+

Mother's DayEVENT

0.99+

PentahoORGANIZATION

0.99+

GEORGANIZATION

0.99+

one pieceQUANTITY

0.99+

6.4 terabyteQUANTITY

0.99+

OracleORGANIZATION

0.98+

Friday nightDATE

0.98+

todayDATE

0.98+

two worldsQUANTITY

0.97+

DevOpsTITLE

0.97+

once a yearQUANTITY

0.97+

agileTITLE

0.97+

both worldsQUANTITY

0.95+

HPORGANIZATION

0.95+

twoQUANTITY

0.95+

oneQUANTITY

0.93+

vmwareTITLE

0.93+

a lot of moneyQUANTITY

0.92+

-ballTITLE

0.92+

threeQUANTITY

0.91+

two separate worldsQUANTITY

0.9+

LunzTITLE

0.89+

IDCORGANIZATION

0.88+

a minuteQUANTITY

0.87+

Gen 6QUANTITY

0.83+

Gen 6OTHER

0.83+

VMwareTITLE

0.81+

CTOPERSON

0.74+

HuPERSON

0.73+

6QUANTITY

0.71+

PentahoLOCATION

0.71+

one thingQUANTITY

0.71+

sixQUANTITY

0.69+

VCSORGANIZATION

0.69+

big wave ofEVENT

0.69+

32 gigabitsQUANTITY

0.68+

IntelORGANIZATION

0.66+

YoshidaORGANIZATION

0.63+

everyQUANTITY

0.58+

number of interviewsQUANTITY

0.57+

wineQUANTITY

0.56+

few minutesQUANTITY

0.55+

JenPERSON

0.51+

FibreOTHER

0.51+

x86OTHER

0.5+

secondQUANTITY

0.46+

101OTHER

0.33+