Image Title

Search Results for Bentley:

Walter Bentley, Red Hat | AnsibleFest 2022


 

>>Hello from Chicago, Lisa Martin, back with you and John Furrier. This is day one of the Cube's coverage of Ansible Fest 2022. John, we've been having great conversations all morning about automation and how it's really pivotal and central. One of the things that we want to talk about next is automation as a strategy. Yeah. You know, some of the barriers to customer adoption, one of them is, well, can we, can we really understand where the most ROI is gonna be? But another one is automation happening kind of in pockets and silos. And we're gonna be talking next with one of our alumni about breaking those down. >>This is gonna be a great segment from the customer perspective, the conversations they're having problems trying to solve, and really got a great cube alumni back to share. And we're excited. It's be a good segment. >>We do have a great alumni, Walter Bentley, Fresh from the keynote stages back with us, the senior manager of the automation practice at Red Hat. Walter, it's great to have you back on the program. >>Thank you. Thank you for having me back. I really look forward to doing this every year and you know, it's, it's >>Exciting. So we had your great energetic keynote this morning and you were really talking about organizations need to think about automation from a strategic lens perspective, a really a true long term investment. Where are most organizations today and how are you gonna help them get there? >>Right. So most organizations today are kind of in that sweet spot where they've discovered that they can do the tactical automation and they can deal with those small day-to-day things. And now they wanna move into the space where they're really able to plug automation into their current workflows and try to optimize it. And, and that's the perfect direction to be heading. And, and what I always encourage our customers is that once you get to that point, don't stop. You gotta keep going because the next phase is, is when you begin to innovate with automation. And when automation is at first is, is at the beginning of the, of everything you're creating. And at that point, that's when you're really gonna see the great benefits from it. >>How have your customer conversations evolved over the last couple of years, particularly as the world has changed, but we've also seen the acceleration of automation and so much, so much advancement in the technology. >>Right. You know, you'll be shocked that our customers wanted us to speak to them in more of an enterprise architecture level. They wanted us to really be able to come in and help them design how they're going to lay out their automation vision. And that surprised me at first. My background being in architecture for many years, I didn't know that, you know, automation had evolved to that level. And, and that was one of the things that we, we tried to do our best to rise to the occasion and be able to answer that call. >>You know, Walter, one of the things when we were in person last in 2019, you were on the cube and then we did the remote. We were kind of right. You got it right. When we were, we were talking about this, Hey, if this goes the way we think it's gonna go, the automation layer is gonna be horizontally scaled with the cloud. So income, cloud, growth, lift and shift. Now I got some refactored applications in the cloud and I got on premises edge coming hybrid steady state. What does automation look like? You had said it's gonna scale. Yep. And so as clients realize, well this is was the kind of a group within the group doing some automation stuff with Ansible, all great stuff, Product leadership, great community check, check, check. Now, how do you make that a global architecture for a company? What, what's it take to make that an enterprise scale architecture? What's the next step for the, for the journey and, and for the community and the customers? >>So one of the major announcements today is actually one of the right steps in the right direction, which is now that you can deploy a on all of your hyperscalers, right? So you have it local, you're covering your private cloud area, now you're able to cover your hyperscalers. Now it's time to unite them together so that they can all kind of work as one function. And to me, that is the enterprise approach that that to aap. And I'm just so excited that we finally have rolled it out for aws. We have it for Azure, of course we have it inside. And we're also working on things like you said, like the edge, but also things like making sure we're covering customers that are air gaped customers that do not have the capability of the ingress in, in, in, in being, of being able to go in and out of that environment and that network. Right. We're working on strategic, strategic solutions to be able to do that better >>For what's interesting, we've been talking about super cloud on the cube. I, we coined that term at reinvent about people using cloud in a different way to kind of do things and it's become kind of also a, a term for multi-cloud. Yes. So if you think about what you just said, it's interesting, this cloud services that could, they all have stores, they have compute, There might be a day where they're all kind of invisible. Yes. And you can have spanning services across the cloud, but yet they can still differentiate on their own. So it's not so much about sneakers, it's more about that interoperability. How do you see that? What's your reaction to that? Right. >>Well, that's one of the core reasons why we move to the name of the answ automation platform. Platform being the key right? Is, is the platform is supposed to be able to span into different environments and really kind of unite them together. And that was one of the the things that I really liked about when we went to that late last year. Yeah. Late last year. And, and we've been working with our customers and make sure that we make that front and center, that they move towards that environment so that they can begin to do better scale and really operate at that, at that executive level. >>What's your favorite customer story that you think really articulates the value of what you just said? >>Right. So the one, so I'll give you a different one from the one that I, that I talked about on stage. And, and again, it it, when we went in from a services engagement, we did not expect the outcome of the fact that they would access this particular customer. We went in something very tactical, just laying down the platform for them. And, and the expectation was we would lay it down and walk away and then hopefully they would pick it up and kind of run with it. What we came to realize is that they liked the oversight and they liked the way that we were working with them. And they wanted to take those preferred approaches and really embed them Right. And their organization. And so they invited us back actually for two or three different consulting engagements to come back and just help them drive that adoption. And this is at the, they're at the very beginning, right? So they're doing it a little bit different in a lot of other organizations. The other organizations would lay down the platform, do some things, and then call us back to help them them with adoption, Right. >>Is the report card out? Yeah, >>Absolutely. They did it differently. And, and that to me stood out as the level of maturity their IT organization is. >>It sounds like they went from tactical to strategic Yes. Pretty quickly. Which is not normally the >>Case. No, no, not at all. Not normally the case. But as you can clearly see that, we're starting to see that more and more with our customers. They're upleveling, I hate for the theme, but they're upleveling. Right. And, and, and that's what I meant by my organization, my team that I, that I run, we have to do more with our customers because they're expecting more >>For them to level up. And I loved how that was used this morning. I'm like, Yeah, that's a cool term. Level up. We all gotta level up to some degree. How are you helping organizations do that from a cultural shift perspective? Because of course the people are so integral to this being successful. Can't forget >>That. Absolutely. So, you know, you know, remember the days of when you would have the DevOps team and that was like the thing, like you have to form your DevOps team and once you got that, you're good to go. And, and I always tell our customers that's a good start, but that's definitely not where you want to end. And you have to get to the point where you have all parts of your organization writing automation content, feeling comfortable, being able to kind of control their day to day. And so that's where you have to break down those silos. You have to really have those, you know, your operators and your developers and, and your DBAs and your networking folks really communicating. And, and if everyone kind of takes care of their own world and write content to control what they do on a day to day, they can bring those together. >>Walter, on buzzword it's been kicking around Silicon Valley in the tech industry re recently is multiplayer versus single player software. Yes. And I I heard that must be from gamers obviously. Yes. Discourse pop. I heard that on, stayed here in the matrix announcement earlier. You know, when you talk about teamwork ops devs while working together, clearly the operator role is changing. What that means is changing devs are getting stronger and more open source, they're shifting left and all that good stuff in the, in the CID pipeline as the teams work together, multiplayer in an organization. What's the success form of that you see emerging for how to organize, how to motivate, how to get people kind of in a good, you know, teamwork pass score kind of team oriented approach? >>Well, I'm really proud to talk about is how AAP has really enabled that and, and kind of fast tracks that ability for everyone to work together within a, the all the functionality that's now built into it. There's pieces of it that are focused on different operators or different parts of the IT organization, right. And, and, and we're made to be able to help to bring them all together. You know, I love the components such as the service catalog. You know, imagine being able to have a place where you can publish all of your, your content for other people to consume. You know, back in the day everything was stored in, in a repository, right? And you had to know what you were looking for. And so just small changes like that, having the, the, the Ansible toy, right? So you're having tools that are actually built in for those who are writing the content to be able to have at their fingertips the ability to test their content right from inside of the, the, the toy, right? So the terminal interface, just those small little nuances to me is what helps to bring it all together and kind of create that >>Great leverage glue. Yes. Not a lot of busy work and you know, absolutely. Hunting and packing for stuff like configuring manually. >>Absolutely. >>Awesome. What's next for you guys? >>Well, you know, we have some big announcements coming up tomorrow. I won't, I won't get into as much as I want to talk about >>It. Events. Yeah, >>Yeah, yeah. Something starts with the e but also some really fantastic technology. We're, what we're doing is, is we're really taking the idea of automation and really feeding into it in a sense that we're building into some mar some, some really smart technology into aap. And I'm, I'm, I'm excited, I'm excited for direction it's going and I know everyone tomorrow are gonna really, really hear some great >>Things. We heard upleveling, we heard upleveling culture shift. If I asked you what does culture shift mean, how would you answer that? >>I would answer that in a sense that it, it, the culture shift is, is shifting from the place where you feel that you're on an island and you have to solve for it alone as well as feeling that you have to solve for the whole ribbon of whatever you're working on. And that culture shift is moving from that mentality to the fact that you have a whole team of folks who may know how to solve for that already. And you feel comfortable being able to reach out to them and work with them to be able to build that. And that's, that to me is the change. You know, I'm, I'm a old school infrastructure dude, you know, I was the one who would, who would wake up two o'clock in the morning to fix a problem, right? I thought it was on me, but now the culture shift is now it's, we are a team and we're gonna work together to solve it. So that's, that's kind of my view on >>It. And the appetite in organizations is there, cuz oftentimes in the, in the siloed world, it's, I own this, this is my baby. Right? Right. How do you help them as a, as a trusted advisor to really open up the kimono and embrace that collaboration? Because ultimately that's the right strategic direction for the business, >>Right? The first step in that is making sure that everyone is kind of operating from the same book, right. Or the same plan. And, and until you actually write that plan down and publish it in a place for other people to consume it, it creates a little bit of a barrier, right? So that's the first thing we do is write down that plan, make it available for all the consume. And at the beginning, you know, not everyone runs to it, but over time if their curiosity begins to peak and then over time they begin to consume it and possibly contribute to it themselves over time, that's, that's how we kind of conquer that. And so far we've seen some good success. >>What would you say if someone said, you know, I want some proof, proof in the pudding proven methods to help accelerate the time to value with automation and help organizations to really understand and quantify the ROI for doing so. >>Right. And, and to me that's, this is the conversation I love having because we've, we've come out with something that we call success metrics and, and yes, they are exactly what they sound like, right? There are some metrics that you can use to measure in your organization to kind of determine your maturity around automation. The two key things that I would love to share about that is that when we think of metrics, right? We think of performance, we think of, you know, how well something is running, how long it's been running. Those are all great, but the two additional success metrics that we include in there are around more of the cultural field. The perception, right? The perception as well as how comfortable your employees feel using that product. And that's where that, that the shift of looking at the cultural, not just the technical side, but the cultural side of things has made a big difference. So I love sharing those metrics with our customers. It usually resonates and then we help them dig in on, to see how they, how they fit, and also give them some ideas as to how they can improve going forward. >>I'm sure they appreciate that knowing where that, where we are now, how do we get to the end, not the end state. Obviously it's a journey, but how do we get farther along in this from a unified front approach rather than absolutely operating in these silos, which is not gonna get us to the, the the on the journey that we should be on. Correct. Yeah. Yep. So some good stuff coming out tomorrow. Not gonna give us any nuggets, which totally understands. Nope. >>No, but it's, you're gonna be very excited. Yes. It's good stuff. >>Awesome. I gotta ask you one quick question before we wrap up. You mentioned multi-cloud earlier. This is a big conversation in the industry. A lot of people are debating what that is. It sounds good on paper. Where is the customer's view as they look at this journey? Because we, we see a future where there'll be services that won't be common across clouds. There's a differentiation and some that will be, and that, that just be shared like compute for instance. And let, let us be there where you can call in to the multi-cloud. What's, how do you, how do your customers think about multi-cloud? Are they having that conversation more they go, Is that more of a destination of the future? In their mind >>It feels more like a destination of the future. Right now, a lot of organizations have kind of solidified on one cloud per se that they want to be able to roll out as far as being able to scale up and down their resources. But the idea is, is eventually, you know, you, you're gonna go with whatever works best for that product or whatever works best for that, that business case that you're trying to solve for. And, and that's why I love the fact that AEP is kind of generically being able to be applied across all of them. So that, that is, that is gonna be your unifier, right? That's gonna be the layer that will stay the same no matter where you go. And that's one of the things that I love about our product around that is that, that we are meant to be the unifier and we're >>Bless the whole today. It's a great opportunity for Ansible that's there. All >>Right. To be the unifier. Last question for you before we wrap. What was some of the feedback about, from your session this morning on Ansible really being that unifier? Any, any folks come up to you and say anything that was particularly insightful? >>Well, you know what, it it, what was kind of alluded to or shared with me directly was the fact that, you know, thinking about automation as you would traditional platforms, right? And, and building a strategy and, and the idea that you need to write that down and actually make some decisions around that. And, and it wasn't that it wasn't thought about it, it was just, it just never came front to mind. And, and so I'm happy that I was able to plant that seed because that, that's what we're seeing that makes the difference between those who are very successful with automation and those, those who may >>Not be writing it down. Sometimes it's fact to basics that back to basics really help absolutely fuel the growth of organizations. Walter, thank you. Thanks for joining John and me on the queue today talking about what's going on, automation as a strategy, the vision and how Ansible is really on its way to becoming that unifier. We appreciate your insights. Cool. >>No, it's my pleasure. And thank you for having me again. All >>Right, cool. Our pleasure for Walter Bentley and John Furrier. I'm Lisa Martin. You're watching The Cube Live from Chicago. Day one of our coverage of Ansible Fest 2022 continues next.

Published Date : Oct 18 2022

SUMMARY :

You know, some of the barriers to customer adoption, one of them is, This is gonna be a great segment from the customer perspective, the conversations they're having problems trying Walter, it's great to have you back on the program. I really look forward to doing this every year and you know, you gonna help them get there? You gotta keep going because the next phase is, is when you begin to innovate with automation. the technology. I didn't know that, you know, automation had evolved to that level. You know, Walter, one of the things when we were in person last in 2019, you were on the cube and then we did the remote. that do not have the capability of the ingress in, in, in, in being, of being able to go in and out And you can have spanning services across the cloud, Is, is the platform is supposed to be able to span into different environments and really kind So the one, so I'll give you a different one from the one that I, that I talked about on stage. And, and that to me stood out as the level of maturity their IT Which is not normally the my team that I, that I run, we have to do more with our customers because they're expecting more Because of course the like the thing, like you have to form your DevOps team and once you got that, you're good to go. What's the success form of that you see emerging for how So the terminal interface, just those small little nuances to me Hunting and packing for What's next for you guys? Well, you know, we have some big announcements coming up tomorrow. Yeah, And I'm, I'm, I'm excited, I'm excited for direction it's going and I know everyone tomorrow culture shift mean, how would you answer that? but now the culture shift is now it's, we are a team and we're gonna work together to solve it. direction for the business, And at the beginning, you know, not everyone runs to it, but over time if their curiosity help accelerate the time to value with automation and help organizations to really understand and quantify the There are some metrics that you can use to measure in your organization to kind of determine your maturity around not the end state. No, but it's, you're gonna be very excited. And let, let us be there where you can call in to the multi-cloud. And that's one of the things that I love about our product around that is that, that we are meant to be the unifier and Bless the whole today. Any, any folks come up to you and say anything that was particularly And, and building a strategy and, and the idea that you need to write that Thanks for joining John and me on the queue today talking about what's going on, And thank you for having me again. Day one of our coverage of Ansible Fest 2022

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
JohnPERSON

0.99+

Lisa MartinPERSON

0.99+

WalterPERSON

0.99+

twoQUANTITY

0.99+

AnsibleORGANIZATION

0.99+

John FurrierPERSON

0.99+

2019DATE

0.99+

tomorrowDATE

0.99+

threeQUANTITY

0.99+

Silicon ValleyLOCATION

0.99+

Red HatORGANIZATION

0.99+

todayDATE

0.99+

The Cube LiveTITLE

0.99+

Walter BentleyPERSON

0.99+

two o'clockDATE

0.99+

first thingQUANTITY

0.99+

OneQUANTITY

0.98+

ChicagoLOCATION

0.98+

first stepQUANTITY

0.98+

oneQUANTITY

0.98+

one functionQUANTITY

0.98+

Ansible Fest 2022EVENT

0.98+

late last yearDATE

0.98+

Day oneQUANTITY

0.97+

one quick questionQUANTITY

0.97+

Late last yearDATE

0.93+

one cloudQUANTITY

0.88+

two additional successQUANTITY

0.88+

firstQUANTITY

0.88+

AzureTITLE

0.87+

this morningDATE

0.87+

dayQUANTITY

0.82+

two key thingsQUANTITY

0.81+

CubeORGANIZATION

0.74+

single playerQUANTITY

0.74+

last coupleDATE

0.71+

AnsibleFest 2022EVENT

0.65+

yearsDATE

0.65+

consultingQUANTITY

0.59+

AEPTITLE

0.52+

AAPTITLE

0.52+

cubeORGANIZATION

0.51+

Walter Bentley and Jason Smith, Red Hat | AnsibleFest 2020


 

(upbeat music) >> Narrator: From around the globe, it's theCUBE with digital coverage of Ansible Fest 2020 brought to you by Red Hat. >> Welcome back to theCUBE's coverage, Cube virtual's coverage of Ansible Fest 2020 virtual. We're not face to face this year. I'm your host John Furrier with theCube. We're virtual, this theCube virtual and we're doing our part, getting the remote interviews with all the best thought leaders experts and of course the Red Hat experts. We've got Walter Bentley, Senior Manager of Automation practice with Red Hat and Jason Smith, Vice President of North American services, back on theCube. We were in Atlanta last year in person. Guys, thanks for coming on virtually. Good morning to you. Thanks for coming on. >> Good morning John. Good morning, good morning. >> So since Ansible Fest last year a lot's happened where she's living in seems to be an unbelievable 2020. Depending on who you talk to it's been the craziest year of all time. Fires in California, crazy presidential election, COVID whole nine yards, but the scale of Cloud has just unbelievably moved some faster. I was commenting with some of your colleagues around the snowflake IBO it's built on Amazon, right? So value is changed, people are shifting, you starting to clear visibility on what these modern apps are looking like, it's Cloud native, it's legacy integrations, it's beyond lift and shift as we've been seeing in the business. So I'd love to get, Jason we'll start with you, your key points you would like people to know about Ansible Fest 2020 this year because there's a lot going on this year because there's a lot to build on and there's a tailwind for Cloud native and customers have to move fast. What's your thoughts? >> Yeah so, a lot has happened since last year and customers are looking to be a lot more selective around their automation technologies. So they're not just looking for another tool. They're really looking for an automation platform, a platform that they can leverage more of an enterprise strategy and really be able to make sure that they have something that's secure, scalable, and they can use across the enterprise to be able to bring teams together and really drive value and productivity out of their automation platform. >> What's the key points in the customers and our audience around the conversations around the learning, that's the new stuff happening in using Ansible this year? What are the key top things, Jason? Can you comment on what you're seeing the big takeaway for our audience watching? >> Yeah, so a lots change like you said, since last year. We worked with a lot of customers around the world to implement Ansible and automation at scale. So we're using our automation journeys as we talked about last year and really helping customers lay out a more prescriptive approach on how they're going to deliver automation across their enterprise. So customers are really working with us because we're working with the largest customers in the world to implement their strategies. And when we work with new customers we can bring those learnings and that experience to them. So they're not having to learn that for the first time and figure it out on their own, but they're really able to learn and leverage the experience we have through hundreds of customers and at enterprise scale and can take the value that we can bring in and help them through those types of projects much more quickly than they could on their own. >> It's interesting. We were looking at the research numbers and look at the adoption of what Ansible's doing and you guys are with Red Hat it's pretty strong. Could you share on the services side because there's a lot of services going on here? Not just network services and software services, just traditional services. What are the one or two reasons why customer engaged with Red Hat services? What would that be? >> Yeah so, like I said, I mean, we bring that experience. So customers that typically might have to spend weeks troubleshooting and making decisions on how they're going to deliver their implementations, they can work with us and we can bring those best practices in and allow them to make those decisions and implement those best practices within hours instead of weeks, and really be able to accelerate their projects. Another thing is we're a services company as part of a product company. So we're not there just to deliver services. We're really focused on the success of the customer, leveraging our technologies. So we're there to really train and mentor them through the process so that they're really getting up to speed quickly. They're taking advantage of all of the expertise that we have to be able to build their own experience and expertise. So they can really take over once we're gone and be able to support and advance that technology on their own. So they're really looking to us to not only implement those technologies for them, but really with them and be able to train and mentor them. Like I said, and take advantage of those learnings. We also help them. We don't just focus on the technologies but really look at the people in process side of things. So we're bringing in a lot of principles from DevOps and Agile on open practices and helping customers really transform and be able to do things in a new way, to be much more efficient, a lot more agile, be able to drive a lot more value out of our technology. >> Walter, I got to ask you, last year we were chatting about this, but I want to get the update. And I'd like you to just give us a quick refresh definition about the automation adoption journey because this is a real big deal. I mean, we're looking at the trends. Everyone realizes automation is super important at scale, as you think about whether it's software data, anything's about automation it's super important, but it's hard. I mean, the marketplace we were looking at the numbers. I was talking to IDC for you guys at this festival and of Ansible Fest, and they said about five to 10% of enterprises are containerized, which means this huge wave coming of containerization. This is about the automation adoption journey because you start containerizing, (laughs) right? You start looking at the workflows on the pipelinig and how the codes being released and everything. This is important stuff. Give us the update on the automation adoption journey and where it is in the portfolio. >> Well, yeah, just as you called it out, last year on main stage and Ansible fest, almost every customer expressed the need and desire to have to have a strategy as to how they drive their adoption of automation inside their enterprise. And as we've gone over the past few months of splitting this in place with many customers, what we've learned is that many customers have matured into a place where they are now looking at the end to end workflow. Instead of just looking at the tactical thing that they want to automate, they are actually looking at the full ribbon, the full workflow and determining are there changes that need to be made and adjusted to be more efficient when it comes to dealing with automation. And then the other piece as we alluded to already is the contagious nature of that adoption. We're finding that there are organizations that are picking up the automation adoption journey, and because of the momentum it creates inside of that organization we're finding other municipalities that are associated with them are now also looking to be able to take on the journey because of that contagious nature. So we can see that how it's spreading in a positive way. And we're really looking forward to being able to do more of it as the next quarter and the next year comes up. >> Yeah, and that whole sharing thing is a big part of the content theme and the community thing. So great reference on that, good thing is word of mouth and community and collaboration is a good call out there. A quick question for you, you guys recently had a big win with NTT DoCoMo and their engagement with you guys on the automation, adoption journey. Walter, what were some of the key takeaways? Jason you can chime in too I'd like to get some specifics around where it's been successful >> To me, that customer experience was one that really was really exciting, primarily because we learned very early on that they were completely embodying that open source culture and they were very excited to jump right in and even went about creating their own community of practice. We call them communities of practice. You may know them as centers of excellence. They wanted to create that very early in increment, way before we were even ready to introduce it. And that's primarily because they saw how being able to have that community of practice in place created an environment of inclusion across the organization. They had legacy tools in place already, actually, there was a home grown legacy tool in place. And they very quickly realized that it didn't need to remove that tool, they just needed to figure out a way of being able to how to optimize and streamline how they leverage it and also be able to integrate it into the Ansible automation platform. Another thing I wanted to very quickly note is that they very quickly jumped onto the idea of being able to take those large workflows that they had and breaking them up into smaller chunks. And as you already know, from last year when we spoke about it, that's a pivotal part of what the automation adoption journey brings to our organization. So to sum it all up, they were all in, automation first mindset is what that was driving them. And all of those personas, all of those personal and cultural behaviors are what really helped drive that engagement to be very successful. >> Jason, we'll get your thoughts on this because again, Walter brought up last year's reference to breaking things up into modules. We look at this year's key news it's all about collections. You're seeing content is a big focus, content being not like a blog post or a media asset. Like this is content, but code is content. It's sharing. If it's being consumed by other people, there's now community. You're seeing the steam of enabling. I mean, you're looking at successes, like you guys are having with NTT DoCoMo and others. Once people realize there's a better way and success is contagious, as Walter was saying, you are now enabling new ways to do things faster at scale and all that good stuff has been go check out the keynotes. You guys talk about it all day long with the execs. But I want to learn, right? So when you enable success, people want to be a part of it. And I could imagine there's a thirst and demand for training and the playbooks and all the business models, innovations that's going on. What are you seeing for people that want to learn? Is there training? Is there certifications? Because once you get the magic formula as Walter pointed out, and we all know once people see what success looks like, they're going to want to duplicate it. So as this wave comes, it's like having the new surfboard. I want to surf that wave. So what's the update on Ansible's training, the tools, how do I learn, it's a certification of all. Just take a minute to explain what's going on. >> Yeah, so it's been a crazy world as we've talked about over the last six, seven months here, and we've really had to adapt ourselves and our training and consulting offerings to be able to support our remote delivery models. So we very, very quickly back in the March timeframe, we're able to move our consultants to a remote work force and really implement the tools and technologies to be able to still provide the same value to customers remotely as we have in person historically. And so it's actually been really great. We've been able to make a really seamless transition and actually our C-SAT net promoter scores have actually gone up over the last six months or so. So I think we've done a great job being able to still offer the same consulting capabilities remotely as we have onsite. And so that's obviously with a real personal touch working hand in hand with our customers to deliver these solutions. But from a training perspective, we've actually had to do the same thing because customers aren't onsite, they can't do in person training. We've been able to move our training offerings to completely virtual. So we're continuing to train our customers on Ansible and our other technologies through a virtual modality. And we've also been able to take all of our certifications and now offer those remotely. So as, whereas customers historically, would have had to gone into a center and get those certifications in person, they can now do those certifications remotely. So all of our training offerings and consulting offerings are now available remotely as well as they were in person in the past and will be hopefully soon enough, but it's really not-- >> You would adopt to virtual. >> Excuse me. >> You had to adopt to the virtual model quickly for trainings. >> Exactly. >> What about the community role? What's the role of the community? You guys have a very strong community. Walter pointed out the sharing aspect. Well, I pointed out he talked about the contagious people are talking. You guys have a very robust community. What's the role of community in all of this? >> Yeah, so as Walter said, we have our communities a practice that we use internally we work with customers to build communities of practice, which are very much like a centers of excellence, where people can really come together and share ideas and share best practices and be able to then leverage them more broadly. So, whereas in the past knowledge was really kept in silos, we're really helping customers to build those communities and leverage those communities to share ideas and be able to leverage the best practices that are being adopted more broadly. >> That's awesome. Yeah, break down those silos of course. Open up the data, good things will happen, a thousand flowers bloom, as we always say. Walter, I want to get your thoughts on this collection, what that enables back to learning and integrations. So if collections are going to be more pervasive and more common place the ability to integrate, we were covering for VMware world, there's a VMware module collection, I should say. What are customers doing when you integrate in cross technology parties because now obviously customers are going to have a lot of choice and options. If I'm an integration partner, it's all about Cloud native and the kinds of things we're talking about, you're going to have a lot of integration touch points. What's the most effective way for customers integrating other technology partners into Ansible? >> And this is one of the major benefits that came out of the announcement last year with the Ansible automation platform. The Anible automation platform really enables our customers to not just be able to do automation, but also be able to connect the dots or be able to connect other tools, such as other ITM SM tools or be able to connect into other parts of their workflows. And what we're finding in breaking down really quickly is two things. Collections obviously, is a huge aspect. And not just necessarily the collections but the automation service catalog is really where the value is because that's where we're placing all of these certified collections and certified content that's certified by Red Hat now that we create alongside with these vendors and they're unavailable to customers who are consuming the automation platform. And then the other component is the fact that we're now moved into a place where we now have something called the automation hub. which is very similar to galaxy, which is the online version of it. But the automation hub now is a focus area that's dedicated to a customer, where they can store their content and store those collections, not just the ones that they pull down that are certified by Red hat, but the ones that they create themselves. And the availability of this tool, not only just as a SaaS product, but now being able to have a local copy of it, which is brand new out of the press, out of the truck, feature is huge. That's something that customers have been asking for a very long time and I'm very happy that we're finally able to supply it. >> Okay, so backup for a second, rewind, fell off the truck. What does that mean? It's downloadable. You're saying that the automation hub is available locally. Is that what-- >> Yes, Sir. >> So what does that mean for the customer? What's the impact for them? >> So what that means is that previously, customers would have to connect into the internet. And the automation hub was a SaaS product, meaning it was available via the internet. You can go there, you can sync up and pull down content. And some customers prefer to have it in house. They prefer to have it inside of their firewall, within their control, not accessible through the internet. And that's just their preferences obviously for sometimes it's for compliance or business risk reasons. And now, because of that, we were able to meet that ask and be able to make a local version of it. Whereas you can actually have automation hub locally your environment, you can still sync up data that's out on the SaaS version of automation hub, but be able to bring it down locally and have it available with inside of your firewall, as well as be able to add your content and collections that you create internally to it as well. So it creates a centralized place for you to store all of your automation goodness. >> Jason, I know you got a hard stop and I want to get to you on the IBM question. Have you guys started any joint service engages with IBM? >> Yeah, so we've been delivering a lot of engagements jointly through IBM. We have a lot of joint customers and they're really looking for us to bring the best of both Red Hat services, Red Hat products, and IBM all together to deliver joint solutions. We've actually also worked with IBM global technology services to integrate Ansible into their service offerings. So they're now really leveraging the power of Ansible to drive lower cost and more innovation with our customers and our joint customers. >> I think that's going to be a nice lift for you guys. We'll get into the IBM machinery. I mean, you guys got a great offering, you always had great reviews, great community. I mean, IBM's is just going to be moving this pretty quickly through the system, I can imagine. What's some of the the feedback so far? >> Yeah, it's been great. I mean, we have so many, a large joint customers and they're helping us to get to a lot of customers that we were never able to reach before with their scale around the world. So it's been great to be able to leverage the IBM scale with the great products and services that Red Hat offers to really be able to take that more broadly and continue to drive that across customers in an accelerated pace. >> Well, Jason, I know you've got to go. We're going to stay with Walter while you drop off, but I want to ask you one final question. For the folks watching or asynchronously coming in and out of Ansible Fest 2020 this year. What is the big takeaway that you'd like to share? What is the most important thing people should pay attention to? Well, a couple things it don't have to be one thing, do top three things. what should people be paying attention to this year? And what's the most important stories that you should highlight? >> Yeah, I think there's a lot going on, this technology is moving very quickly. So I think there's a lot of great stories. I definitely take advantage of the customer use cases and hearing how other customers are leveraging Ansible for automation. And again really looking to not use it just as a tool, but really in an enterprise strategy that can really change their business and really drive cost down and increase revenues by leveraging the innovation that Ansible and automation provides. >> Jason, thank you for taking the time. Great insight. Really appreciate the commentary and hopefully we'll see you next year in person Walter. (all talking simultaneously) Walter, let's get back to you. I want to get into this use case and some of the customer feedback, love the stories. And we look, we'd love to get the new data, we'd love to hear about the new products, but again, success is contagious, you mentioned that I want to hear the use cases. So a lot of people have their ear to the ground, they look up the virtual environments, they're learning through new ways, they're looking for signals of success. So I got to ask you what are the things that you're hearing over and over again, as you guys are spinning up engagements? What are some of the patterns that are emerging that are becoming a trend in terms of what customers are consistently doing to overcome some of their challenges around automation? >> Okay, absolutely. So what we're finding is that over time that customers are raising the bar on us. And what I mean by that is that their expectations out of being able to take on tools now has completely changed and specifically when we're talking around automation. Our customers are now leading with the questions of trying to find out, well, how do we reduce our operational costs with this automation tool? Are we able to increase revenue? Are we able to really truly drive productivity and efficiency within our organization by leveraging it? And then they dovetail into, "Well, are we able to mitigate business risk, "even associated with leveraging this automation tool?" So as I mentioned, customers are up leveling what their expectations are out of the automation tools. And what I feel very confident about is that with the launch of the Ansible automation platform we're really able to be able to deliver and show our customers how they're able to get a return on their investment, how by taking part and looking at re-working their workflows how we're able to bring productivity, drive that efficiency. And by leveraging it to be able to mitigate risks you do get the benefits that they're looking for. And so that's something that I'm very happy that we were able to rise to the occasion and so far so good. >> Last year I was very motivated and very inspired by the Ansible vision and content product progress. Just the overall vibe was good, community of the product it's always been solid, but one of the things that's happening I want to get your commentary and reaction to this is that, and we've been riffing on this on theCube and inside the community is certainly automation, no brainer, machine learning automation, I mean, you can't go wrong. Who doesn't want automation? That's like saying, "I want to watch more football "and have good food and good wifi. I mean, it's good things, right? Automation is a good thing. So get that. But the business model issues you brought up ROI from the top of the ivory tower and these companies, certainly with COVID, we need to make money and have modern apps. And if you try to make that sound simple, right? X as a service, SaaS everything is a service. That's easy to say, "Hey, Walter, make everything as a service." "Got it, boss." Well, what the hell do you do? I mean, how do you make that happen? You got Amazon, you got Multicloud, you got legacy apps. You're talking about going in and re-architecting the application development process. So you need automation for the business model of everything as a service. What's your reaction to that? Because it's very complicated. It's doable. People are getting there but the Nirvana is, everything is a service. This is a huge conversation. I mean, it's really big, but what's your reaction to that when I bring that up. >> Right. And you're right, it is a huge undertaking. And you would think that with the delivery of COVID into our worlds that many organizations would probably shy away from making changes. Actually, they're doing the opposite. Like you mentioned, they're running towards automation and trying to figure out how do they optimize and be able to scale, based on this new demand that they're having, specifically new virtual demand. I'm happy you mentioned that we actually added something to the automation adoption journey to be able to combat or be able to solve for that change. And being able to take on that large ask of everything as a service, so to speak. And increment zero at the very beginning of the automation adoption journey we added something called navigate. And what navigate is, is it's a framework where we would come in and not just evaluate what they want to automate and bring that into a new workflow, but we evaluate what they already have in place, what automation they have in place, as well as the manual tasks and we go through, and we try to figure out how do you take that very complex, large thing and stream it down into something that can be first off determined as a service and made available for your organization to consume, and as well as be able to drive the business risks or be able to drive your business objectives forward. And so that exercise that we're now stepping our customers through makes a huge difference and puts it all out in front of you so that you can make decisions and decide which way you want to go taking one step at a time. >> And you know it's interesting, great insight, great comment. I think this is really where the dots are going to connect over the next few years. Everything is as a service. You got to lay the foundation. But if you really want to get this done I got to ask you the question around Ansible's ability to integrate and implement with other products. So could you give an examples of how Ansible has integrated and implemented with other Red Hat products or other types of technology vendors products? >> Right. So one example that always pops to the top of my head and I have to give a lot of credit to one of my managing architects who was leading this effort. Was the simple fact that you when you think about a mainframe, right? So now IBM is our new family member. When you think about mainframes, you think about IBM and it just so happens that there's a huge ask and demand and push around being able to automate ZOS mainframe. And IBM had already embarked on the path of determining, well, can this be done with Ansible? And as I mentioned before, my managing architect partnered up with the folks on IBM's side, so the we're bringing in Red Hat consulting, and now we have IBM and we're working together to move that idea forward of saying, "Hey, you can automate things with the mainframe." So think about it. We're in 2020 now in the midst of a new normal. And now we're thinking about and talking about automating mainframes. So that just shows how things have evolved in such a great way. And I think that that story is a very interesting one. >> It's so funny the evolution. I'm old enough to remember. I came out of college in the 80s and I would look at the old mainframe guys who were like "You guys are going to be dinosaurs." They're still around. I mean, some of the banking apps, I mean some of them are not multi threaded and all the good stuff, but they are powering, they are managing a workload, but this is the beautiful thing about Cloud. And some of the Cloud activities is that you can essentially integrate, you don't have to replace the old to bring in the new. This has been a common pattern. This is where containers, microservices, and Cloud has been a dream state because you can essentially re layer and glue it together. This is a big deal. What's your reaction to that? >> No, it's a huge deal. And the reality is, is that we need all of it. We need the legacy behaviors around infrastructure. So we need the mainframe still because they has a distinct purpose. And like you mentioned, a lot of our FSI customers that is the core of where a lot of their data and performance comes out of. And so it's not definitely not a pull out and replace. It's more of how they integrate and how can you streamline them working together to create your end to end workflow. And as you mentioned, making it available to your organizations to consume as a service. So definitely a fan of being able to integrate and add to and everything has a purpose. Is what we're coming to learn. >> Agility, the modern application, horizontal scalability, Cloud is the new data center. Walter great insights, always great to chat with you. You always got some good commentary. I want to ask you one final question. I asked Jason before he dropped off. Jason Smith, who was our guest here and hit a hard stop. What is the most important story that people should pay attention to this year at Ansible Fest? Remember it's virtual, so there's going to be a lot of content around there, people are busy, it's asynchronous consumption. What should they pay attention to from a content standpoint, maybe some community sizes or a discord group? I mean, what should people look at in this year? What should they walk away with as a key message? Take a minute to share your thoughts. >> Absolutely. Absolutely key messages is that, kind of similar to the message that we have when it comes down to the other circumstances going on in the world right now, is that we're all in this together. As an Ansible community, we need to work together, come together to be able to share what we're doing and break down those silos. So that's the overall theme. I believe we're doing that with the new. So definitely pay attention to the new features that are coming out with the Ansible automation platform. I alluded to the on-prem automation hub, that's huge. Definitely pay attention to the new content that is being released in the service catalog. There's tons of new content that focus on the ITSM and a tool. So being able to integrate and leverage those tools then the easier math model, there's a bunch of network automation advances that have been made, so definitely pay attention to that. And the last teaser, and I won't go into too much of it, 'cause I don't want to steal the thunder. But there is some distinct integrations that are going to go on with OpenShift around containers and the SQL automation platform that you definitely are going to want to pay attention to. If anyone is running OCP in their environment they definitely going to want to pay attention to this. Cause it's going to be huge. >> Private cloud is back, OpenStack is back, OCP. You got OpenShift has done really well. I mean, again, Cloud has been just a great enabler and bringing all this together for developers and certainly creating more glue, more abstractions, more automation, infrastructure is code is here. We're excited for it Walter, great insight. Great conversation. Thank you for sharing. >> No, it's my pleasure. And thank you for having me. >> I'm John Furrier with theCube, your host for theCube virtual's, part of Ansible Fest, virtual 2020 coverage. Thanks for watching. (gentle upbeat music)

Published Date : Oct 2 2020

SUMMARY :

brought to you by Red Hat. and of course the Red Hat experts. Good morning John. and customers have to move fast. and really be able to make sure and that experience to them. and look at the adoption and really be able to and how the codes being and because of the momentum it creates and their engagement with you guys and also be able to integrate it and the playbooks and and technologies to be able to You had to adopt to What about the community role? and be able to leverage the best practices the ability to integrate, that came out of the You're saying that the automation and be able to make a local version of it. and I want to get to to drive lower cost and more innovation I mean, IBM's is just going to and continue to drive We're going to stay with And again really looking to So I got to ask you what are the things And by leveraging it to and reaction to this of everything as a service, so to speak. the dots are going to connect and I have to give a lot of credit the old to bring in the new. and add to and everything has a purpose. that people should pay attention to that are going to go on with and bringing all this And thank you for having me. I'm John Furrier with theCube,

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
JasonPERSON

0.99+

WalterPERSON

0.99+

IBMORGANIZATION

0.99+

Jason SmithPERSON

0.99+

oneQUANTITY

0.99+

AtlantaLOCATION

0.99+

JohnPERSON

0.99+

John FurrierPERSON

0.99+

AnsibleORGANIZATION

0.99+

Red HatORGANIZATION

0.99+

last yearDATE

0.99+

2020DATE

0.99+

Walter BentleyPERSON

0.99+

AmazonORGANIZATION

0.99+

MarchDATE

0.99+

Last yearDATE

0.99+

next yearDATE

0.99+

Red hatORGANIZATION

0.99+

this yearDATE

0.99+

ZOSTITLE

0.98+

two thingsQUANTITY

0.98+

first timeQUANTITY

0.98+

SQLTITLE

0.98+

next quarterDATE

0.98+

two reasonsQUANTITY

0.98+

bothQUANTITY

0.98+

Ansible FestEVENT

0.98+

CaliforniaLOCATION

0.98+

one final questionQUANTITY

0.98+

OpenStackTITLE

0.97+

Walter Bentley, Red Hat & Vijay Chebolu, Red Hat Consulting | AnsibleFest 2019


 

>>live from Atlanta, Georgia. It's the Q covering Answerable Fest 2019. Brought to you by Red Hat. >>Hey, welcome back, everyone. It's the cubes. Live coverage here in Atlanta, Georgia, for answerable fast. Part of redheads. Big news. Ansel Automation Platform was announced. Among other things, they're great products. I'm John for ear, with my coast to minimum, but two great guests. You unpack all the automation platform features and benefits. Walter Bentley, senior manager. Automation Practicing red hat and vj Job Olu, director of Red Hat Consulting Guys Thanks for coming on. Thanks. So the activity is high. The buzz this year seems to be at an inflection point as this category really aperture grows big time seeing automation, touching a lot of things. Standardization. We heard glue layer standard substrate. This is what answer is becoming so lots of service opportunity, lot of happy customers, a lot of customers taking it to the next level. And a lot of customers trying to consolidate figure out hadn't make answerable kind of a standard of other couples coming in. You guys on the front lines doing this. What's the buzz? What's the main store? What's the top story going on around the service is how to deploy this. What are you guys seeing? >>So I think what we're seeing now is customers. Reactor building automation. For a long time, I have been looking at it at a very tactical level, which is very department very focused on silo. Whether country realizes with this modern develops and the change in how they actually go to the market, they need to bring the different teams together. So they're actually looking at watching my enterprise automation strategy be how to actually take what I've learned in one organization. And I still roll it across the enterprise so that now struggling and figuring out how to be scared, what we have, how do we change the culture of the organization to collaborate a lot more and actually drive automation across enterprise? >>Walter One of the things we've been we've talked about all the time in the Cube, and it's become kind of cliche. Digital transformation. Okay, I heard that before, and three things people process, technology, process and capability you guys have done You mentioned the siloed having capabilities that's been there. Check was done very, very well as a product technology Red hat in the portfolio. Great synergies. We talked about rail integration, all the benefits there. But the interesting thing this year that I've noticed is the people side of the equation is interesting. The people are engaged, is changing their role because automation inherently changes there, function in the organization because it takes away probably the mundane tasks. This is a big part of the equation. You guys air hitting that mark. How do you How are you guys seeing that? How you accelerating that has that changing your job, >>right? So customers are now economy realizing that going after automation in a very tactical manner is not exactly getting them what they want as a far as a return on investment in the automation. And what they're realizing is that they need to do more. And they're coming to us and more of an enterprise architectural level and say we want to talk mortgage grander strategy. And what they're coming to realize is that having just one small team of people that were calling the Dev Ops team is not gonna be ableto drive that adoption across the organization. So what we're trying to do is work with customers to show them how they collaboration in the culture of peace is huge. It's a huge part of adopting automation. Answerable is no longer considered a emerging tech anymore. And and I when I say that, I mean a lot of organizations are using answerable in many different ways. They're past that point, and now they're moving on to the next part, which is what is our holistic strategy and how we're gonna approach automation. And And we wanted leverage danceable, unanswerable tower to do that. >>Does that change how you guys do your roll out your practices in some of your programs? >>Well, we did have to make some adjustments in the sense of recognizing that the cultural piece is a pivotal part of it, and we can go in and we can write playbooks and rolls, and we can do all those things really great. But now we need to go in and help them structure themselves in a way where they can foster that collaboration and keep a moment. >>And I'll actually add on to that so reactive, large, open innovation labs three years ago, and what we have to learn doing that is using labs and allows practices to actually help customers embrace new culture and change. How they actually operate has actually helped us take those practices and bring it into our programs and kind of drive that to our customers. So we actually run our automation adoption program and the journey for customers through those practices that we actually learned in open innovation loves like open practice, library, even storming priority sliders and all of those modern techniques. So the goal is to help our customers understand those practices and actually embrace them and bring them into the organization to drive the change that that's looking for within the organization. >>A. J. Is there anything particular for those adoption practices when you're talking about Cloud? Because the communication amongst teams silos, you know, making things simpler is something that we absolutely do need for cloud. So I'm just curious how you connect kind of the cloud journey with the automation journey. >>So all of the journey program that actually created, whether it's a contender adoption program or the automation adoption program, we actually followed the same practices. So whether you're actually focused on a specific automation to, like, answerable or actually embarking on hybrid multicolored journey. We actually use the same practices so the customers don't have toe learn new things every time you have to go from one product, one of the so that actually brings a consistent experience to customers in driving change within the organization. So let's picture whether it is focusing automation focused on cloud migrating to the cloud. The practices remained the same, and the focus is about not trying to boil the ocean on day one. Try to break it into manageable chunks that give it a gun back to the business quickly learned from the mistakes that you make in each of the way and actually build upon it and actually be successful. >>So, Walter, I always love when we get to talk to the people that are working straight with customers because you come here to the conference, it's like, Oh, it's really easy Get started. It doesn't matter what role or what team you're in. Everybody could be part of it. But when you get to the actual customers, they're stumbling blocks. You know what are some of those things? What are some of the key things that stop people from taking advantage of all the wonderful things that all the users here are doing >>well. One of the things that I've identified and we've identified as a team is a lot of organizations always want to blow the ocean. And when and when it comes down to automation, they feel that if they are not doing this grand transformation and doing this this huge project, then they're not doing automation. And the reality is is that we're Trent with showing them that you can break things up into smaller chunks, as Visi alluded to. And even if you fail, you fail fast and you can start over again because you're dealing with things in a smaller chunk. And we've also noticed that by doing that, we're able to show them to return on investment faster so they can show their leadership, and their leadership can stand behind that and want to doom. Or so that's one of the areas. And then I kind of alluded to the other area, which is you have to have everybody involved. You want just subject matter experts riding content to do the automation. You don't want that just being one silo team. You want to have everybody involved and collaborate as much as possible. >>Maybe can you give us an example? Is about the r A y How fast to people get the results and, you know, prove toe scale this out. >>So with the automation adoption journey, what we're able to do is is that we come in and sit down with our customers and walk them through how to properly document their use cases. What the dependencies, What integration points, possibly even determining what is that? All right, ranking for that use case. And then we move them very quickly in the next increment. And in the next increment, we actually step them through, taking those use cases, breaking them down into minimum viable products and then actually putting those in place. So within a 90 day or maybe a little bit more than a little bit more than the 90 day window, were able to show the customer in many different parts of the organization how they're able to take advantage of automation and how the return on investment with hopes of obviously reducing either man hours or being able to handle something that is no a mundane task that you had to do manually over and over again. >>What are some of the things that people get confused about when they look at the breath of what's going on with the automation platform? When I see tool to platform, transitions are natural. We've seen that many times in the industry that you guys have had product success, got great community, that customers, they're active. And now you've got an ecosystem developing so kind of things air popping on all cylinders here. >>So the biggest challenge that we're actually being seeing customers is they actually now come to realize that it's very difficult to change the culture of the organization right there, actually embarking on this journey and the biggest confusion that is, how do we actually go make those changes? How do we bring some of the open practice some of the open source collaboration that Riddle had into the organization so they actually can operate in a more open source, collaborative way, and what we have actually learned is we actually have what we call its communities of practice within Red Hack. It is actually community off consultants, engineers and business owners. The actual collaborate and work together on offering the solutions to the market. So we're taking those experiences back to our customers and enabling them to create those communities of practice and automation community that everybody can be a part off. They can share experiences and actually learn from each other much easier than kind of being a fly on the wall or kind of throwing something or defense to see what sticks and what does not. >>What's interesting about the boiling the ocean comment you mentioned Walter and B J is your point. There is, is that the boil? The ocean is very aspirational. We need change rights. That's more of the thing outcome that they're looking for. But to get there is really about taking those first steps, and the folks on the front lines have you their applications. They're trying to solve or manage. Getting those winds is key. So one of things that I'm interested in is the analytics piece showing the victory so in the winds early is super important because that kind of shows the road map of what the outcome may look like versus the throw the kitchen, sink at it and, you know, boil the ocean of which we know to the failed strategy. Take us through those analytics. What are some of the things that people tend to knock down first? What are some of the analytical points that people look at for KP eyes? Can you share some insight into that? >>Sure, sure. So we always encourage our customers to go after the platform first. And I know that may sound the obvious, but the platform is something that is pretty straightforward. Every organization has it. Every organization struggles with provisioning, whether of a private cloud, public cloud, virtualization, you name it. So we have the customer kind of go after the platform first and look at some of their day to operations. And we're finding that that's where the heaviest return on investment really sits. And then once you get past that, we can start looking like in the end, work flows. You know, can they tie service now to tower, to be able to make a complete work flow of someone that's maybe requesting a BM, and they can actually go through that whole workflow by by leveraging tower and integration point like service. Now those air where we're finding that the operators of these systems going getting the fastest benefit. And it also, of course, benefits the business at the end of the day because they get what they need a lot fast. >>It's like a best practice and for you guys, you've seen that? Yes, sir. Docked with that out of E. J. What's your comment on all this? >>So going back to the question on metrics Automation is great, but it does not provide anybody to the business under the actually show. What was the impact, whether it's from a people standpoint, cost standpoint or anything else. So what we try to drive is enable customers. You can't build the baseline off where they are today, and as they're going through the incremental journey towards automation, measure the success of that automation against the baseline. And that actually adds the other way back to the customer. As a business you didn't get to see. I was creating a storage land. I was doing it probably 15 times a month. Take it or really even automated. It spend like a day created a playbook. I'll save myself probably half, of course, and that could be doing something that's better. So building those metrics and with the automation analytics that actually came in the platform trying those bass lines. So the number of executions, actually the huge value they'll actually be ableto realize the benefits of automation and measure the success off within enterprise. >>So I'm a customer prospect, like I want to get a win. I don't want to get fired. I won't get promoted. Right, I say, Okay, I gotta get a baseline and knock down some playbooks. Knock that down first. That what you're gonna getting it. That's a good starting. >>Starting. Understand your baseline today. Plan your backlog as to what you want to knock down. And once you know them down, build a dashboard as to what the benefits were, what the impact was actually built upon it. You actually will see an incremental growth in your success with automation. >>And then you go to the workflow and too, and that's your selling point for the next level. Absolutely good playbook. Is that the automation programs that in a nutshell or is that more of a best practice >>those components of the ah, the automation adoption journey that we allow the customer to kind of decide how they want their journey to be crafted. Of course, we have a very specific way of going about and walking them through it. But we allowed in the kind of crap that journey and that is those the two components that make up the automation. >>We're gonna put you guys on the spot with the tough question We heard from G. P. Morgan yesterday on the Kino, which I thought was very compelling. You know, days, hours, two minutes. All this is great stuff. It's real impact. Other customers validate that. So, congratulations. Can you guys share any anecdotal stories? You know, the name customers? Just about situations Where customs gone from this to this old way, new way and throw some numbers around Shearson Samantha >>is not a public reference, but I like to give you a customer. Exactly. Retail company. When we first actually went and ran a discovery session, it took them 72 days to approach in an instance. And the whole point was not because it took that long. It because every task haven't s l. A We're actually wait for the Acela manually. Go do that. We actually went in >>with our 72 hours, two days, two days, >>actually, going with the automation? We Actually, it was everybody was working on the S L. A. We actually brought it down to less than a day. So you just gave the developers looking to code 71 days back for him to start writing code. So that's the impact that we see automation bringing back to the customers, right? And you'll probably find the use causes across everywhere. Whether J. P. Morgan Chase you actually had the British Army and everyone here on states talking about it. It is powerful, but it is powerful relief you can measure and learn from it >>as the baseline point. Get some other examples because that's that's, uh, that's 70 days is that mostly delay its bureaucracy. It's It's so much time. >>It's manual past and many of the manual tasks that actually waiting for a person to do the task >>waterfall past things sound, although any examples you can >>yes, so the one example that always stands out to me and again, it's a pretty interviewing straight forward. Is Citrix patching? So we work with the organization. They were energy company, and they wanted to automate patching their searches environment, patching this citrus environment took six weekends and it took at least five or six engineers. And we're talking about in bringing an application owners, the folks who are handling the bare metal, all all that whole window. And by automating most of the patching process, we were able to bring it down to one weekend in one engineer who could do it from home and basically monitor the process instead of having to be interactive and active with it. And to me, that that was a huge win. Even though it's, you know, it's such dispatching. >>That's the marketing plan. Get your weekends back. Absolutely awesome. Shrimp on the barbecue, You know, Absolutely great job, guys. Thanks for the insight. Thanks. Come on. The key. Really appreciate it. Congratulations. Thank you. Thanks for sharing this queue here. Live coverage. Danceable fest. Where the big news is the ass. Full automation platform. Breaking it down here on the Q. I'm John. First to Minutemen. We're back with more coverage after this short break

Published Date : Sep 25 2019

SUMMARY :

Brought to you by Red Hat. So the activity is high. And I still roll it across the enterprise so that now struggling and figuring out how to be scared, Walter One of the things we've been we've talked about all the time in the Cube, and it's become kind of cliche. be ableto drive that adoption across the organization. But now we need to go in and help them structure themselves in a way where they can foster that So the goal is to help our customers understand those practices Because the communication amongst teams silos, you know, So all of the journey program that actually created, whether it's a contender adoption program or the automation adoption What are some of the key things that stop people from taking And the reality is is that we're Trent with showing them that you can break things up into smaller chunks, Is about the r A y How fast to people get the results and, And in the next increment, What are some of the things that people get confused about when they look at the breath of what's So the biggest challenge that we're actually being seeing customers is they actually now come to realize What are some of the things that people tend to knock down first? And it also, of course, benefits the business at the end of the day because they get what they need a lot fast. It's like a best practice and for you guys, you've seen that? And that actually adds the other way back to the customer. So I'm a customer prospect, like I want to get a win. as to what you want to knock down. Is that the automation programs that in a nutshell or is that more of a best practice those components of the ah, the automation adoption journey that we allow the customer to kind You know, the name customers? And the whole point was not because it took that long. So that's the impact that we see automation bringing back to the customers, right? as the baseline point. it from home and basically monitor the process instead of having to be interactive and active Breaking it down here on the Q.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Walter BentleyPERSON

0.99+

Red HatORGANIZATION

0.99+

WalterPERSON

0.99+

two daysQUANTITY

0.99+

72 daysQUANTITY

0.99+

six weekendsQUANTITY

0.99+

one weekendQUANTITY

0.99+

90 dayQUANTITY

0.99+

two minutesQUANTITY

0.99+

72 hoursQUANTITY

0.99+

70 daysQUANTITY

0.99+

Atlanta, GeorgiaLOCATION

0.99+

Vijay CheboluPERSON

0.99+

yesterdayDATE

0.99+

less than a dayQUANTITY

0.99+

British ArmyORGANIZATION

0.99+

B JPERSON

0.99+

one productQUANTITY

0.99+

Red Hat ConsultingORGANIZATION

0.99+

J. P. Morgan ChaseORGANIZATION

0.99+

one engineerQUANTITY

0.99+

JohnPERSON

0.98+

three years agoDATE

0.98+

one exampleQUANTITY

0.98+

oneQUANTITY

0.98+

first stepsQUANTITY

0.98+

two componentsQUANTITY

0.97+

red hatORGANIZATION

0.97+

two great guestsQUANTITY

0.97+

this yearDATE

0.97+

OneQUANTITY

0.97+

six engineersQUANTITY

0.97+

todayDATE

0.97+

2019DATE

0.97+

one organizationQUANTITY

0.96+

firstQUANTITY

0.96+

AcelaORGANIZATION

0.95+

vj Job OluPERSON

0.94+

RiddleORGANIZATION

0.94+

15 times a monthQUANTITY

0.94+

eachQUANTITY

0.93+

E. J.PERSON

0.9+

Red HackORGANIZATION

0.89+

MinutemenORGANIZATION

0.89+

day oneQUANTITY

0.88+

halfQUANTITY

0.87+

Answerable Fest 2019EVENT

0.85+

at least fiveQUANTITY

0.83+

CitrixORGANIZATION

0.83+

threeQUANTITY

0.83+

one small teamQUANTITY

0.81+

a dayQUANTITY

0.79+

71 daysQUANTITY

0.76+

couplesQUANTITY

0.75+

P. MorganPERSON

0.7+

AnsibleFestEVENT

0.69+

AnselORGANIZATION

0.68+

G.ORGANIZATION

0.67+

S L. A.ORGANIZATION

0.66+

teamQUANTITY

0.65+

Shearson SamanthaPERSON

0.57+

CubeCOMMERCIAL_ITEM

0.55+

KinoORGANIZATION

0.5+

customersQUANTITY

0.46+

Automation PlatformTITLE

0.4+

Keynote Analysis | AnsibleFest 2022


 

(gentle music) >> Hello from Chicago, Lisa Martin here at AnsibleFest 2022 with John Furrier. John, it's great to be here. The transformation of enterprise and industry through automation. This is not only the 10th anniversary of Ansible, this was the first in-person AnsibleFest since 2019. >> It's awesome, it's awesome, Lisa, and I want to welcome everyone to our live performance here in Chicago. We were remote for two years, 2019 in Atlanta. AnsibleFest, part of Red Hat now, Red Hat part of IBM. So much has happened in the past couple years and I think one of the things that we're going to cover this week here in Chicago, is the evolution of Ansible, where it fits into the new cloud-native ecosystems emerging, and also, kind of, what it means for developers and operators. And we're going to see a lot of that here at AnsibleFest with wall-to-wall coverage, keynote just happened. Very interesting to see, you know, Ansible stayed true to their knitting, as you say, you know. What do they do? No big announcements. Some big community news. But humble. >> Very humble. Very humble, but also very excited. All the keynotes did a great job of addressing that community, and being grateful to the community for, really, the evolution that we see at Ansible and now 10 years later. They were talking a lot about smoothing operations for the developers, democratizing automation across the organization. They talked a little bit about that skills gap. I wanted to get your opinion, 'cause as we know there's, they talked about it from a demand perspective, there's over 300,000 open positions on LinkedIn for Ansible skills. So a lot of opportunity there, a lot of opportunity for them to help democratize automation across organizations. >> Yeah, I mean, I think the big theme last year we heard, "Three things, top three things at AnsibleFest 2021, Animation, Automation, Automation." Again, this year the same theme, "Automate everywhere" is what they're talking about. But I think you're right, there's a cultural shift where the entire cloud ecosystems kind of spun to the doorstep of what Ansible's ecosystem stood for for many years in the decade, which is configuration, running things at scale. That notion is now persistent across all the enterprise. And I think the key takeaway from the keynote, in my opinion, is that configuration and automation around devices and infrastructure stuff is an enterprise architecture now, it's not just a, kind of a corner case, or a specific use case, it's going to be native across the entire enterprise architecture. And that's why we heard a lot of cultural shift conversations. And that is where the people who are running the Ansible stuff, they're going to be the keys to having the keys to the kingdom. And I think you're going to see a lot more of this automation at scale. I love the introduction of ops-as-code, that's a little piggyback off of infrastructure-as-code and infrastructure-as-configuration. They're saying operations now is the new software model and it's like ops dev, not dev ops. So it's really interesting to see how the operator is now a very big important role in the next level of cloud native. And it's really exciting because this is kind of what we've been reporting on theCUBE, for over 12 years. So, watching Ansible grow organically into a powerhouse community is very interesting. To see how they operationalize this, you know, going forward. >> Well the operator's becoming really pivotal catalysts in this next way, that you've been covering for 12 years. You know, if we think about some of the challenges and the barriers to adopting automation that organizations have had, one of them has been skills, staff rather. The other has been, "Hey, we need to really determine which processes to automate, that's actually going to give us the most ROI, most bang for our buck." They talked a little bit about that today, but that's still something that Ansible is working with its customers and the community to help sort of demystify. >> Yeah and I think that they were front and center around, "You on the room," people in the room, "you make this happen." They're very much, it's not a top-down corporate thing, Ansible staying true to their roots as I mentioned. But the thing about skills gap is interesting, you heard Kaete Piccirilli talking about, "Level Up how your organization automates, push your people, expand your scope." So the theme is, the power is in the hands of this community to essentially be the new enterprise architecture for operations. At the same time that feeds the trend around, we're seeing this accelerated cloud-native developer we're seeing, we're going to be at KubeCon next week, that cloud-native developer, they want to go faster, they want self-service. So you're seeing higher velocity cloud-native development putting pressure on the ops teams to level up, so the theme kind of connects for me. I think Red Hat has got it right here, with Ansible, that the theme is shifting to ops better get their act together, to level up and to the velocity of what the developers are expecting. At the same time, giving them the freedom to be using infrastructure-as-code, infrastructure-as-configuration, and ultimately, ops-as-code. To me, I think this is like the evolution of how infrastructure-as-code, which is the nirvana of DevOps, now is ops-as-code. Which means, if that's true, ops becomes much more invisible, if you will, which is what developers want. >> And we're going to be breaking down ops-as-code today, no doubt, in our conversations with some of the great Ansible community folks and partners and leaders that we have on, as well as tomorrow in our full two days of coverage. You talked about cultural shift, we talk about that a lot John, it's challenging, but one of the things I think that was very palpable this morning, is the power of the Ansible community. Not just those folks that are here with us in Chicago, but all the folks watching virtually online. >> Yeah. >> Truly help drive that cultural shift that is needed for organizations to really be able to streamline cloud ops. >> Yeah and I think Adam Miller who came on, I thought his portion was excellent, around community. He talked about, you know, the 10 years, put a little exclamation point on that. Managing the communications within the community. He actually brought up IRC and Slack and then, "We have Discord." And they introduced a new standard for communications it's called Matrix, which is open-source based. And even in their decision making, their principles around open source stay true. Again, they checked the box there, I thought that was really cool. The other thing that, within the meat of the product, the automation platform, Matt Jones was talking about the scale, the managing at scale, is one thing. But the thing that I think that hit, jumped out at me, was that this trusted automation messaging was really huge. Signing, having signatures, that really hits the supply chain that we've been talking about, and we're going to talk about it next week at KubeCon, the software supply chain is trusting the code. And I think as you have automation, it's a really big part of the new platform. So, I thought that was really the meat on the bone there. >> That was a very strong theme, was the trust this morning. You know, another thing that was important was Walter Bentley, who's coming on, I believe, later today, talked about how organizations really need to think about the value that automation can deliver to the business and then develop an automation strategy, really thinking at it strategically rather than what a lot of folks have done. And they've put automation in sort of in silos and pockets. He's really talking about, how can you actually make it strategic across the organization and make sure that you really fully see and understand and can articulate the value to the business, from a competitive advantage perspective, that it's going to deliver. >> Yeah, and Stefanie Chiras who's coming on too, she mentioned a lot about the multi-cloud, multi-environment layer, how Ansible can sit across all the environments and then still support the cloud-native through what she called "an automation loop". That's going to be really talking to what we're seeing as multi-cloud or super-cloud, next-gen cloud, where Ansible's role of automating isn't just corner case in the enterprise. Again, if it's an enterprise-wide architecture, it will be a centerpiece of multi-cloud, multiple capabilities. Whether that's compatibility services or, you know, stuff running best of breed on different clouds. 'Cause, obviously Amazon was on stage here, they're talking about this, big Ansible supporter. So, we've got Google supporting Ansible, so you got the multiple clouds and even VM-Ware environments. So, Ansible sits across all this. And so, I think the big opportunity that I'm seeing come out of this, is that if Ansible is in this position, this could be a catalyst for them to be the multi-cloud hybrid architecture for configuration and operations, and I think, the edge is going to be a really interesting conversation. We have a lot of guests coming on, I'll talk about that. But, I think running distributed workloads across multiple clouds in multiple environments, that's a killer app and we'll see if they can pull it off. We're going to be drilling everyone on that topic today, so I'm looking forward to it. >> We're going to be dissecting that. I like how you paint that picture of Ansible really as the nucleus of that hybrid cloud strategy. You know, so many organizations are living in a hybrid cloud world for many reasons, but for Ansible to be able to be that catalyst. And question for you, if we think about that, when we talk about multi-cloud strategically or organically or whatnot, where is automation moving in terms of the customer conversation? We know Ansible's really focused on smoothing the developer experience, but where is automation going, in your vision, up the C-suite stack? >> Well, multi-cloud is a C-suite message and they love to hear that, but you talk to anyone who's in the trenches, they hate multi-cloud. It's more complexity and there's a lot of issues around latency. So what you're seeing is, you're starting to see an evolution of more about compatibility and interoperability. And this is kind of classic enterprise abstraction layers when you start getting into these inflection points, as things get better, so it gets sometimes more complex. So I think Ansible's notion of simplicity and ease of use, could be the catalyst for this abstraction layer between clouds. So it's all about reducing the complexities, because at the end of the day, if you want to do something on multiple clouds, whether that's run common services across, that's not making it simpler. You got to, it's going to be harder before it gets easier. So, if that makes any sense. So doing multi-cloud sounds great on paper, but it's really hard and that's why no one's really doing it. So you're going to start to see multi-cloud, what we call super-cloud, which is more capabilities on one cloud. And then having them still differentiate the idea that some standard's going to emerge, is complete fantasy. I think you're going to, we still need more innovation. Amazon does a great job, Microsoft's coming up on number two position as well, the clouds still need to differentiate. But that doesn't change Ansible's position. They can still be that shim layer or bolt-on, to whatever clouds do best. If you run 'em on machine learning on Google, that's cool. You want to use Amazon for this? How do you make those work? That's a hard problem. And, again, that's where automation ends up. >> And with that context, do you think that Ansible has the capability of helping to dial down some of the complexity that's in this hybrid multi-cloud world? >> Yeah, I mean, I think the thing about what's going on great here, that's unique in the history of the computer industry, is open source is so powerful and it continues to power away with growth. So, more code is coming. So, software supply chain is a big issue, we heard that with the trusted thing, but also now, how people buy now is different. You can actually try stuff out on open source and then go to Red Hat, Ansible, and say, "Hey, I'm going to get some support." So there's a lot of community collective intelligence involved in decision making, not just coding, but buyer selection and consumption. So the entire paradigm of purchasing software and using it, has completely changed. So, that puts Ansible in a leading position because they got a great community, and now you've got open source continuing to thrive away. So, if you're a customer, you don't need the big enterprise sales pitch you can just try the code, if you like it, then you go with Ansible. So it's really kind of set up nicely, this cloud market, for companies like Ansible, because they have the community and they got the software, it's open and it is what it is, it's transparent, everything's above board. >> Yeah, you know, you talk about the community, you mentioned Matrix earlier, and one of the things that was also quite resonant during the keynote this morning was the power of collaboration and how incredibly important that is to them, to stay native to their open-source roots, as you you said. But also really go to where the customers are. And they talked about that with respect to Matrix and Discord and that was an interesting, this is the community reaching out to really kind of grow upon itself. >> Well, being someone who's used all those tools, even IRC 'cause I'm old, all the old folks use IRC. Then the, kind of, Gen X'ers use, and the millennials use Slack. Discord, the way they mentioned Discord, it's so true. If you're a gamer, you're younger, you're using Discord. Now, Matrix is new, they're trying to introduce an open source, 'cause remember they don't control Discord and they don't control Slack. So Slack's Salesforce now, and Discord is probably going to try to get bought by Microsoft, but still, it's not open. So Matrix is their open-sourced chat service. And I thought that was interesting and I think, that got my attention, because that went against the principles of users that like Slack. So, it'd be great. I mean if Matrix, if that takes off, then that's going to be a case study of going against-the-grain on the best-of-breed package software like Slack or Discord. But I think the demographic shift is interesting. Discord is for younger generations, let's see how Matrix will do. And the uptake wasn't that big. Only been around for a couple months, we've seen almost 5,000 members. But, you know, not a failure. >> Right. >> But not a home run either. >> Right. Well we'll have to see how that progresses- >> Yeah, we'll see how that plays out. >> as all of the generations in the workforce today try to work together and collaborate. You know, if we think about some of the things that we're going to talk about today and tomorrow, business outcomes, increasing business agility, being able to ensure compliance, with security and regulatory requirements, which are only proliferating, really also helping organizations to optimize those costs and be as competitive as they possibly can. So I'm excited to dissect the announcements that came out today, some of the things that we're going to hear today and tomorrow, and really get a great view of the automation infrastructure marketplace and what's going on. >> Yeah, it's going to be great. Infrastructure-as-code, infrastructure-as-config, operations-as-code, it's all leading to, you know, distributed computing edge. It's hybrid. >> Yep. All right John- >> Yeah. >> looking forward to two days of wall-to-wall CUBE coverage with you, coming to you live from Chicago, at the first AnsibleFest in person, since 2019. Lisa Martin and John Furrier with you here all day today and tomorrow, stick around, our first guest joins us. We're going to dissect ops-as-code, stick around. (gentle music)

Published Date : Oct 18 2022

SUMMARY :

This is not only the 10th is the evolution of Ansible, and being grateful to the community having the keys to the kingdom. and the barriers to adopting automation that the theme is shifting to of the great Ansible community folks to really be able to streamline cloud ops. that really hits the supply chain and can articulate the and I think, the edge is going to really as the nucleus of the clouds still need to differentiate. and then go to Red Hat, Ansible, and say, and one of the things and the millennials use Slack. how that progresses- how that plays out. as all of the generations Yeah, it's going to be great. at the first AnsibleFest

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Adam MillerPERSON

0.99+

Matt JonesPERSON

0.99+

Stefanie ChirasPERSON

0.99+

ChicagoLOCATION

0.99+

AmazonORGANIZATION

0.99+

AnsibleORGANIZATION

0.99+

Lisa MartinPERSON

0.99+

MicrosoftORGANIZATION

0.99+

IBMORGANIZATION

0.99+

John FurrierPERSON

0.99+

12 yearsQUANTITY

0.99+

AtlantaLOCATION

0.99+

JohnPERSON

0.99+

next weekDATE

0.99+

two daysQUANTITY

0.99+

GoogleORGANIZATION

0.99+

Walter BentleyPERSON

0.99+

tomorrowDATE

0.99+

Kaete PiccirilliPERSON

0.99+

last yearDATE

0.99+

two yearsQUANTITY

0.99+

LisaPERSON

0.99+

firstQUANTITY

0.99+

todayDATE

0.99+

10 yearsQUANTITY

0.99+

LinkedInORGANIZATION

0.99+

2019DATE

0.99+

DiscordORGANIZATION

0.99+

first guestQUANTITY

0.99+

MatrixORGANIZATION

0.98+

10 years laterDATE

0.98+

10th anniversaryQUANTITY

0.98+

oneQUANTITY

0.97+

over 12 yearsQUANTITY

0.97+

this yearDATE

0.97+

2022DATE

0.97+

Three thingsQUANTITY

0.96+

one cloudQUANTITY

0.96+

Red HatORGANIZATION

0.96+

SlackORGANIZATION

0.96+

three thingsQUANTITY

0.95+

over 300,000 open positionsQUANTITY

0.95+

this weekDATE

0.95+

later todayDATE

0.95+

almost 5,000 membersQUANTITY

0.94+

Skyla Loomis, IBM | AnsibleFest 2020


 

>> (upbeat music) [Narrator] From around the globe, it's theCUBE with digital coverage of AnsibleFest 2020, brought to you by Red Hat. >> Hello welcome back to theCUBE virtual coverage of AnsibleFest 2020 Virtual. We're not face to face this year. I'm John Furrier, your host. We're bringing it together remotely. We're in the Palo Alto Studios with theCUBE and we're going remote for our guests this year. And I hope you can come together online enjoy the content. Of course, go check out the events site on Demand Live. And certainly I have a lot of great content. I've got a great guest Skyla Loomis Vice president, for the Z Application Platform at IBM. Also known as IBM Z talking Mainframe. Skyla, thanks for coming on theCUBE Appreciate it. >> Thank you for having me. So, you know, I've talked many conversations about the Mainframe of being relevant and valuable in context to cloud and cloud native because if it's got a workload you've got containers and all this good stuff, you can still run anything on anything these days. By integrating it in with all this great glue layer, lack of a better word or oversimplifying it, you know, things going on. So it's really kind of cool. Plus Walter Bentley in my previous interview was talking about the success of Ansible, and IBM working together on a really killer implementation. So I want to get into that, but before that let's get into IBM Z. How did you start working with IBM Z? What's your role there? >> Yeah, so I actually just got started with Z about four years ago. I spent most of my career actually on the distributed platform, largely with data and analytics, the analytics area databases and both On-premise and Public Cloud. But I always considered myself a friend to Z. So in many of the areas that I'd worked on, we'd, I had offerings where we'd enabled it to work with COS or Linux on Z. And then I had this opportunity come up where I was able to take on the role of leading some of our really core runtimes and databases on the Z platform, IMS and z/TPF. And then recently just expanded my scope to take on CICS and a number of our other offerings related to those kind of in this whole application platform space. And I was really excited because just of how important these runtimes and this platform is to the world,really. You know, our power is two thirds of our fortune 100 clients across banking and insurance. And it's you know, some of the most powerful transaction platforms in the world. You know doing hundreds of billions of transactions a day. And you know, just something that's really exciting to be a part of and everything that it does for us. >> It's funny how distributed systems and distributed computing really enable more longevity of everything. And now with cloud, you've got new capabilities. So it's super excited. We're seeing that a big theme at AnsibleFest this idea of connecting, making things easier you know, talk about distributed computing. The cloud is one big distribute computer. So everything's kind of playing together. You have a panel discussion at AnsibleFest Virtual. Could you talk about what your topic is and share, what was some of the content in there? Content being, content as in your presentation? Not content. (laughs) >> Absolutely. Yeah, so I had the opportunity to co-host a panel with a couple of our clients. So we had Phil Allison from Black Knight and Pat Lane from Allstate and they were really joining us and talking about their experience now starting to use Ansible to manage to z/OS. So we just actually launched some content collections and helping to enable and accelerate, client's use of using Ansible to manage to z/OS back in March of this year. And we've just seen tremendous client uptake in this. And these are a couple of clients who've been working with us and, you know, getting started on the journey of now using Ansible with Z they're both you know, have it in the enterprise already working with Ansible on other platforms. And, you know, we got to talk with them about how they're bringing it into Z. What use cases they're looking at, the type of culture change, that it drives for their teams as they embark on this journey and you know where they see it going for them in the future. >> You know, this is one of the hot items this year. I know that events virtual so has a lot of content flowing around and sessions, but collections is the top story. A lot of people talking collections, collections collections, you know, integration and partnering. It hits so many things but specifically, I like this use case because you're talking about real business value. And I want to ask you specifically when you were in that use case with Ansible and Z. People are excited, it seems like it's working well. Can you talk about what problems that it solves? I mean, what was some of the drivers behind it? What were some of the results? Could you give some insight into, you know, was it a pain point? Was it an enabler? Can you just share why that was getting people are getting excited about this? >> Yeah well, certainly automation on Z, is not new, you know there's decades worth of, of automation on the platform but it's all often proprietary, you know, or bundled up like individual teams or individual people on teams have specific assets, right. That they've built and it's not shared. And it's certainly not consistent with the rest of the enterprise. And, you know, more and more, you're kind of talking about hybrid cloud. You know, we're seeing that, you know an application is not isolated to a single platform anymore right. It really expands. And so being able to leverage this common open platform to be able to manage Z in the same way that you manage the entire rest of your enterprise, whether that's Linux or Windows or network or storage or anything right. You know you can now actually bring this all together into a common automation plane in control plane to be able to manage to all of this. It's also really great from a skills perspective. So, it enables us to really be able to leverage. You know Python on the platform and that's whole ecosystem of Ansible skills that are out there and be able to now use that to work with Z. >> So it's essentially a modern abstraction layer of agility and people to work on it. (laughs) >> Yeah >> You know it's not the joke, Hey, where's that COBOL programmer. I mean, this is a serious skill gap issues though. This is what we're talking about here. You don't have to replace the, kill the old to bring in the new, this is an example of integration where it's classic abstraction layer and evolution. Is that, am I getting that right? >> Absolutely. I mean I think that Ansible's power as an orchestrator is part of why, you know, it's been so successful here because it's not trying to rip and replace and tell you that you have to rewrite anything that you already have. You know, it is that glue sort of like you used that term earlier right? It's that glue that can span you know, whether you've got rec whether you've got ACL, whether you're using z/OSMF you know, or any other kind of custom automation on the platform, you know, it works with everything and it can start to provide that transparency into it as well, and move to that, like infrastructure as code type of culture. So you can bring it into source control. You can have visibility to it as part of the Ansible automation platform and tower and those capabilities. And so you, it really becomes a part of the whole enterprise and enables you to codify a lot of that knowledge. That, you know, exists again in pockets or in individuals and make it much more accessible to anybody new who's coming to the platform. >> That's a great point, great insight.& It's worth calling out. I'm going to make a note of that and make a highlight from that insight. That was awesome. I got to ask about this notion of client uptake. You know, when you have z/OS and Ansible kind of come in together, what are the clients area? When do they get excited? When do they know that they've got to do? And what are some of the client reactions? Are they're like, wake up one day and say, "Hey, yeah I actually put Ansible and z/OS together". You know peanut butter and chocolate is (mumbles) >> Honestly >> You know, it was just one of those things where it's not obvious, right? Or is it? >> Actually I have been surprised myself at how like resoundingly positive and immediate the reactions have been, you know we have something, one of our general managers runs a general managers advisory council and at some of our top clients on the platform and you know we meet with them regularly to talk about, you know, the future direction that we're going. And we first brought this idea of Ansible managing to Z there. And literally unanimously everybody was like yes, give it to us now. (laughs) It was pretty incredible, you know? And so it's you know, we've really just seen amazing uptake. We've had over 5,000 downloads of our core collection on galaxy. And again that's just since mid to late March when we first launched. So we're really seeing tremendous excitement with it. >> You know, I want to want to talk about some of the new announcements, but you brought that up. I wanted to kind of tie into it. It is addictive when you think modernization, people success is addictive. This is another theme coming out of AnsibleFest this year is that when the sharing, the new content you know, coders content is the theme. I got to ask you because you mentioned earlier about the business value and how the clients are kind of gravitating towards it. They want it.It is addictive, contagious. In the ivory towers in the big, you know, front office, the business. It's like, we've got to make everything as a service. Right. You know, you hear that right. You know, and say, okay, okay, boss You know, Skyla, just go do it. Okay. Okay. It's so easy. You can just do it tomorrow, but to make everything as a service, you got to have the automation, right. So, you know, to bridge that gap has everything is a service whether it's mainframe. I mean okay. Mainframe is no problem. If you want to talk about observability and microservices and DevOps, eventually everything's going to be a service. You got to have the automation. Could you share your, commentary on how you view that? Because again, it's a business objective everything is a service, then you got to make it technical then you got to make it work and so on. So what's your thoughts on that? >> Absolutely. I mean, agility is a huge theme that we've been focusing on. We've been delivering a lot of capabilities around a cloud native development experience for folks working on COBOL, right. Because absolutely you know, there's a lot of languages coming to the platform. Java is incredibly powerful and it actually runs better on Z than it runs on any other platform out there. And so, you know, we're seeing a lot of clients you know, starting to, modernize and continue to evolve their applications because the platform itself is incredibly modern, right? I mean we come out with new releases, we're leading the industry in a number of areas around resiliency, in our security and all of our, you know, the face of encryption and number of things that come out with, but, you know the applications themselves are what you know, has not always kept pace with the rate of change in the industry. And so, you know, we're really trying to help enable our clients to make that leap and continue to evolve their applications in an important way, and the automation and the tools that go around it become very important. So, you know, one of the things that we're enabling is the self service, provisioning experience, right. So clients can, you know, from Open + Shift, be able to you know, say, "Hey, give me an IMS and z/OS connect stack or a kicks into DB2 stack." And that is all under the covers is going to be powered by Ansible automation. So that really, you know, you can get your system programmers and your talent out of having to do these manual tasks, right. Enable the development community. So they can use things like VS Code and Jenkins and GET Lab, and you'll have this automated CICB pipeline. And again, Ansible under the covers can be there helping to provision those test environments. You know, move the data, you know, along with the application, changes through the pipeline and really just help to support that so that, our clients can do what they need to do. >> You guys got the collections in the hub there, so automation hub, I got to ask you where do you see the future of the automating within z/OS going forward? >> Yeah, so I think, you know one of the areas that we'd like to see go is head more towards this declarative state so that you can you know, have this declarative configuration defined for your Z environment and then have Ansible really with the data and potency right. Be able to, go out and ensure that the environment is always there, and meeting those requirements. You know that's partly a culture change as well which goes along with it, but that's a key area. And then also just, you know, along with that becoming more proactive overall part of, you know, AI ops right. That's happening. And I think Ansible on the automation that we support can become you know, an integral piece of supporting that more intelligent and proactive operational direction that, you know, we're all going. >> Awesome Skyla. Great to talk to you. And so insightful, appreciate it. One final question. I want to ask you a personal question because I've been doing a lot of interviews around skill gaps and cybersecurity, and there's a lot of jobs, more job openings and there are a lot of people. And people are with COVID working at home. People are looking to get new skilled up positions, new opportunities. Again cybersecurity and spaces and event we did and want to, and for us its huge, huge openings. But for people watching who are, you know, resetting getting through this COVID want to come out on the other side there's a lot of online learning tools out there. What skill sets do you think? Cause you brought up this point about modernization and bringing new people and people as a big part of this event and the role of the people in community. What areas do you think people could really double down on? If I wanted to learn a skill. Or an area of coding and business policy or integration services, solution architects, there's a lot of different personas, but what skills can I learn? What's your advice to people out there? >> Yeah sure. I mean on the Z platform overall and skills related to Z, COBOL, right. There's, you know, like two billion lines of COBOL out there in the world. And it's certainly not going away and there's a huge need for skills. And you know, if you've got experience from other platforms, I think bringing that in, right. And really being able to kind of then bridge the two things together right. For the folks that you're working for and the enterprise we're working with you know, we actually have a bunch of education out there. You got to master the mainframe program and even a competition that goes on that's happening now, for folks who are interested in getting started at any stage, whether you're a student or later in your career, but you know learning, you know, learn a lot of those platforms you're going to be able to then have a career for life. >> Yeah. And the scale on the data, this is so much going on. It's super exciting. Thanks for sharing that. Appreciate it. Want to get that plug in there. And of course, IBM, if you learn COBOL you'll have a job forever. I mean, the mainframe's not going away. >> Absolutely. >> Skyla, thank you so much for coming on theCUBE Vice President, for the Z Application Platform and IBM, thanks for coming. Appreciate it. >> Thanks for having me. >> I'm John Furrier your host of theCUBE here for AnsibleFest 2020 Virtual. Thanks for watching. (upbeat music)

Published Date : Oct 2 2020

SUMMARY :

brought to you by Red Hat. And I hope you can come together online So, you know, I've And it's you know, some you know, talk about with us and, you know, getting started And I want to ask you in the same way that you of agility and people to work on it. kill the old to bring in on the platform, you know, You know, when you have z/OS and Ansible And so it's you know, we've I got to ask you because You know, move the data, you know, so that you can you know, But for people watching who are, you know, And you know, if you've got experience And of course, IBM, if you learn COBOL Skyla, thank you so much for coming I'm John Furrier your host of theCUBE

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
IBMORGANIZATION

0.99+

John FurrierPERSON

0.99+

Phil AllisonPERSON

0.99+

Red HatORGANIZATION

0.99+

AnsibleFestORGANIZATION

0.99+

Walter BentleyPERSON

0.99+

Skyla LoomisPERSON

0.99+

JavaTITLE

0.99+

PythonTITLE

0.99+

tomorrowDATE

0.99+

LinuxTITLE

0.99+

two thingsQUANTITY

0.99+

WindowsTITLE

0.99+

Pat LanePERSON

0.99+

this yearDATE

0.99+

SkylaPERSON

0.99+

AnsibleORGANIZATION

0.98+

bothQUANTITY

0.98+

midDATE

0.98+

100 clientsQUANTITY

0.98+

oneQUANTITY

0.98+

One final questionQUANTITY

0.98+

over 5,000 downloadsQUANTITY

0.97+

ZTITLE

0.97+

two billion linesQUANTITY

0.97+

March of this yearDATE

0.95+

Z.TITLE

0.95+

VS CodeTITLE

0.95+

COBOLTITLE

0.93+

z/OSTITLE

0.92+

single platformQUANTITY

0.91+

hundreds of billions of transactions a dayQUANTITY

0.9+

firstQUANTITY

0.9+

AllstateORGANIZATION

0.88+

Palo Alto StudiosLOCATION

0.88+

Z Application PlatformTITLE

0.86+

four years agoDATE

0.84+

COVIDEVENT

0.81+

late MarchDATE

0.81+

aboutDATE

0.8+

VicePERSON

0.79+

JenkinsTITLE

0.78+

Vice PresidentPERSON

0.77+

AnsibleFest 2020EVENT

0.77+

IBM Z.TITLE

0.72+

two thirdsQUANTITY

0.72+

one big distribute computerQUANTITY

0.72+

one dayQUANTITY

0.71+

z/OSMFTITLE

0.69+

Z.ORGANIZATION

0.69+

Black KnightTITLE

0.64+

ACLTITLE

0.64+

CICSORGANIZATION

0.63+

IMSTITLE

0.63+

Securing Your Cloud, Everywhere


 

>>welcome to our session on security titled Securing Your Cloud. Everywhere With Me is Brian Langston, senior solutions engineer from Miranda's, who leads security initiatives from Renta's most security conscious customers. Our topic today is security, and we're setting the bar high by talking in some depth about the requirements of the most highly regulated industries. So, Brian four Regulated industries What do you perceive as the benefits of evolution from classic infra za service to container orchestration? >>Yeah, the adoption of container orchestration has given rise to five key benefits. The first is accountability. Think about the evolution of Dev ops and the security focused version of that team. Deb. SEC ops. These two competencies have emerged to provide, among other things, accountability for the processes they oversee. The outputs that they enable. The second benefit is audit ability. Logging has always been around, but the pervasiveness of logging data within container or container environments allows for the definition of audit trails in new and interesting ways. The third area is transparency organizations that have well developed container orchestration pipelines are much more likely to have a higher degree of transparency in their processes. This helps development teams move faster. It helped operations teams operations teams identify and resolve issues easier and help simplify the observation and certification of security operations by security organizations. Next is quality. Several decades ago, Toyota revolutionized the manufacturing industry when they implemented the philosophy of continuous improvement. Included within that philosophy was this dependency and trust in the process as the process was improved so that the quality of the output Similarly, the refinement of the process of container orchestration yields ah, higher quality output. The four things have mentioned ultimately points to a natural outcome, which is speed when you don't have to spend so much time wondering who does what or who did what. When you have the clear visibility to your processes and because you can continuously improve the quality of your work, you aren't wasting time in a process that produces defects or spending time and wasteful rework phases. You can move much faster than we've seen this to be the case with our customers. >>So what is it specifically about? Container orchestration that gives these benefits, I guess. I guess I'm really asking why are these benefits emerging now around these technologies? What's enabling them, >>right? So I think it boils down to four things related to the orchestration pipelines that are also critical components. Two successful security programs for our customers and related industry. The first one is policy. One of the core concepts and container orchestration is this idea of declaring what you want to happen or declaring the way you want things done? One place where declarations air made our policies. So as long as we can define what we want to happen, it's much easier to do complementary activities like enforcement, which is our second enabler. Um, tools that allow you to define a policy typically have a way to enforce that policy. Where this isn't the case, you need to have a way of enforcing and validating the policies objectives. Miranda's tools allow custom policies to be written and also enforce those policies. The third enabler is the idea of a baseline. Having a well documented set of policies and processes allows you to establish a baseline. Um, it allows you to know what's normal. Having a baseline allows you to measure against it as a way of evaluating whether or not you're achieving your objectives with container orchestration. The fourth enabler of benefits is continuous assessment, which is about measuring constantly back to what I said a few minutes ago. With the toilet away measuring constantly helps you see whether your processes and your target and state are being delivered as your output deviates from that baseline, your adjustments can be made more quickly. So these four concepts, I think, could really make or break your compliance status. >>It's a really way interesting way of thinking about compliance. I had thought previously back compliance, mostly as a as a matter of legally declaring and then trying to do something. But at this point, we have methods beyond legal boilerplate for asserting what we wanna happen, as you say, and and this is actually opening up new ways to detect, deviation and and enforce failure to comply. That's really exciting. Um, so you've you've touched on the benefits of container orchestration here, and you've provided some thoughts on what the drivers on enablers are. So what does Miranda's fit in all this? How does how are we helping enable these benefits, >>right? Well, our goal and more antis is ultimately to make the world's most compliant distribution. We we understand what our customers need, and we have developed our product around those needs, and I could describe a few key security aspects about our product. Um, so Miranda's promotes this idea of building and enabling a secure software supply chain. The simplified version of that that pertains directly to our product follows a build ship run model. So at the build stage is doctor trusted registry. This is where images are stored following numerous security best practices. Image scanning is an optional but highly recommended feature to enable within D T R. Image tags can be regularly pruned so that you have the most current validated images available to your developers. And the second or middle stage is the ship stage, where Miranda's enforces policies that also follow industry best practices, as well as custom image promotion policies that our customers can write and align to their own internal security requirements. The third and final stages to run stage. And at this stage, we're talking about the engine itself. Docker Engine Enterprise is the Onley container, run time with 51 40 dash to cryptography and has many other security features built in communications across the cluster across the container platform are all secure by default. So this build ship stage model is one way of how our products help support this idea of a secure supply chain. There are other aspects of the security supply chain that arm or customer specific that I won't go into. But that's kind of how we could help our product. The second big area eso I just touched on the secure supply chain. The second big area is in a Stig certification. Um, a stick is basically an implementation or configuration guide, but it's published by the U. S government for products used by the US government. It's not exclusive to them, but for customers that value security highly, especially in a regulated industry, will understand the significance and value that the Stig certification brings. So in achieving the certification, we've demonstrated compliance or alignment with a very rigid set of guidelines. Our fifth validation, the cryptography and the Stig certification our third party at two stations that our product is secure, whether you're using our product as a government customer, whether you're a customer in a regulated industry or something else, >>I did not understand what the Stig really Waas. It's helpful because this is not something that I think people in the industry by and large talk about. I suspect because these things are hard to get and time consuming to get s so they don't tend to bubble up to the top of marketing speak the way glitzy new features do that may or may not >>be secure. >>The, uh so then moving on, how has container orchestration changed? How your customers approach compliance assessment and reporting. >>Yeah, This has been an interesting experience and observation as we've worked with some of our customers in these areas. Eso I'll call out three areas. One is the integration of assessment tooling into the overall development process. The second is assessment frequency and then the third is how results are being reported, which includes what data is needed to go into the reporting. There are very likely others that could be addressed. But those are three things that I have noticed personally and working with customers. >>What do you mean exactly? By integration of assessment tooling. >>Yeah. So our customers all generally have some form of a development pipeline and process eso with various third party and open source tools that can be inserted at various phases of the pipeline to do things like status static source would analysis or host scanning or image scanning and other activities. What's not very well established in some cases is how everything fits within the overall pipeline framework. Eso fit too many customers, ends up having a conversation with us about what commands need should be run with what permissions? Where in the environment should things run? How does code get there that does this scanning? Where does the day to go? Once the out once the scan is done and how will I consume it? Thies Real things where we can help our customers understand? Um, you know what? Integration? What? Integration of assessment. Tooling really means. >>It is fascinating to hear this on, baby. We can come back to it at the end. But what I'm picking out of this Ah, this the way you speak about this and this conversation is this kind of re emergence of these Japanese innovations in product productivity in in factory floor productivity. Um, like, just in time delivery and the, you know, the Toyota Miracle and, uh, and that kind of stuff. Fundamentally, it's someone Yesterday, Anders Wahlgren from cloud bees, of course. The C I. C D expert told me, um, that one of the things he likes to tell his, uh consult ease and customers is to put a GoPro on the head of your code and figure out where it's going and how it's spending its time, which is very reminiscent of these 19 fifties time and motion studies, isn't it that that that people, you know pioneered accelerating the factory floor in the industrial America of the mid century? The idea that we should be coming back around to this and doing it at light speed with code now is quite fascinating. >>Yeah, it's funny how many of those same principles are really transferrable from 50 60 70 years ago to today. Yeah, quite fascinating. >>So getting back to what you were just talking about integrating, assessment, tooling, it sounds like that's very challenging. And you mentioned assessment frequency and and reporting. What is it about those areas that that's required? Adaptation >>Eso eso assessment frequency? Um, you know, in legacy environments, if we think about what those look like not too long ago, uh, compliance assessment used to be relatively infrequent activity in the form of some kind of an audit, whether it be a friendly peer review or intercompany audit. Formal third party assessments, whatever. In many cases, these were big, lengthy reviews full of interview questions, Um, it's requests for information, periods of data collection and then the actual review itself. One of the big drawbacks to this lengthy engagement is an infrequent engagement is that vulnerabilities would sometimes go unnoticed or unmitigated until these reviews at it. But in this era of container orchestration, with the decomposition of everything in the software supply chain and with clearer visibility of the various inputs to the build life cycle, our customers can now focus on what tooling and processes can be assembled together in the form of a pipeline that allows constant inspection of a continuous flow of code from start to finish. And they're asking how our product can integrate into their pipeline into their Q A frameworks to help simplify this continuous assessment framework. Eso that's that kind of addresses the frequency, uh, challenge now regarding reporting, our customers have had to reevaluate how results are being reported and the data that's needed in the reporting. The root of this change is in the fact that security has multiple stakeholder groups and I'll just focus on two of them. One is development, and their primary focus, if you think about it, is really about finding and fixing defects. That's all they're focused on, really, is there is there pushing code? The other group, though, is the Security Project Management Office, or PMO. This group is interested in what security controls are at risk due to those defects. So the data that you need for these two stakeholder groups is very different. But because it's also related, it requires a different approach to how the data is expressed, formatted and ultimately integrated with sometimes different data sources to be able to appease both use cases. >>Mhm. So how does Miranda's help improve the rate of compliance assessment? Aziz? Well, as this question of the need for differential data presentation, >>right, So we've developed on exposed a P I S that helped report the compliance status of our product as it's implemented in our customers on environment. So through these AP eyes, we express the data and industry standard formats using plastic out Oscar is a relatively new project out of the mist organization. It's really all about standardizing a set of standards instead of formats that expresses control information. So in this way our customers can get machine and human readable information related to compliance, and that data can then be massaged into other tools or downstream processes that our customers might have. And what I mean by downstream processes is if you're a development team and you have the inspection tools, the process is to gather findings defects related to your code. A downstream process might be the ticketing system with the era that might log a formal defect or that finding. But it all starts with having a common, standard way of expressing thes scan output. And the findings such that both development teams and and the security PMO groups can both benefit from the data. So essentially we've been following this philosophy of transparency, insecurity. What we mean by that is security isn't or should not be a black box of information on Lee, accessible and consumable by security professionals. Assessment is happening proactively in our product, and it's happening automatically. We're bringing security out of obscurity by exposing the aspects of our product that ultimately have a bearing on your compliance status and then making that information available to you in very user friendly ways. >>It's fascinating. Uh uh. I have been excited about Oscar's since, uh, since first hearing about it, Um, it seems extraordinarily important to have what is, in effect, a ah query capability. Um, that that let's that that lets different people for different reasons formalize and ask questions of a system that is constantly in flux, very, very powerful. So regarding security, what do you see is the basic requirements for container infrastructure and tools for use in production by the industries that you are working with, >>right? So obviously, you know, the tools and infrastructure is going to vary widely across customers. But Thio generalize it. I would refer back to the concept I mentioned earlier of a secure software supply chain. There are several guiding principles behind us that are worth mentioning. The first is toe have a strategy for ensuring code quality. What this means is being able to do static source code analysis, static source code analysis tools are largely language specific, so there may be a few different tools that you'll need to have to be able to manage that, um, second point is to have a framework for doing regular testing or even slightly more formal security assessments. There are plenty of tools that can help get a company started doing this. Some of these tools are scanning engines like open ESCAP that's also a product of n'est open. ESCAP can use CS benchmarks as inputs, and these tools do a very good job of summarizing and visualizing output, um, along the same family or idea of CS benchmarks. There's many, many benchmarks that are published. And if you look at your own container environment, um, there are very likely to be many benchmarks that can form the core platform, the building blocks of your container environment. There's benchmarks for being too, for kubernetes, for Dr and and it's always growing. In fact, Mirante is, uh, editing the benchmark for container D, so that will be a formal CSCE benchmark coming up very shortly. Um, next item would be defining security policies that line with your organization's requirements. There are a lot of things that come out of box that comes standard that comes default in various products, including ours, but we also give you through our product. The ability to write your own policies that align with your own organization's requirements, uh, minimizing your tax surface. It's another key area. What that means is only deploying what's necessary. Pretty common sense. But sometimes it's overlooked. What this means is really enabling required ports and services and nothing more. Um, and it's related to this concept of least privilege, which is the next thing I would suggest focusing on these privileges related to minimizing your tax service. It's, uh, it's about only allowing permissions to those people or groups that excuse me that are absolutely necessary. Um, within the container environment, you'll likely have heard this deny all approach. This denial approach is recommended here, which means deny everything first and then explicitly allow only what you need. Eso. That's a very common, uh uh, common thing that sometimes overlooked in some of our customer environments. Andi, finally, the idea of defense and death, which is about minimizing your plast radius by implementing multiple layers of defense that also are in line with your own risk management strategy. Eso following these basic principles, adapting them to your own use cases and requirements, uh, in our experience with our customers, they could go a long way and having a secure software supply chain. >>Thank you very much, Brian. That was pretty eye opening. Um, and I had the privilege of listening to it from the perspective of someone who has been working behind the scenes on the launch pad 2020 event. So I'd like to use that privilege to recommend that our listeners, if you're interested in this stuff certainly if you work within one of these regulated industries in a development role, um, that you may want to check out, which will be easy for you to do today, since everything is available once it's been presented. Matt Bentley's live presentation on secure Supply Chain, where he demonstrates one possible example of a secure supply chain that permits image. Signing him, Scanning on content Trust. Um, you may want to check out the session that I conducted with Andres Falcon at Cloud Bees who talks about thes um, these industrial efficiency factory floor time and motion models for for assessing where software is in order to understand what policies can and should be applied to it. Um, and you will probably want to frequent the tutorial sessions in that track, uh, to see about how Dr Enterprise Container Cloud implements many of these concentric security policies. Um, in order to provide, you know, as you say, defense in depth. There's a lot going on in there, and, uh, and it's ah, fascinating Thio to see it all expressed. Brian. Thanks again. This has been really, really educational. >>My pleasure. Thank you. >>Have a good afternoon. >>Thank you too. Bye.

Published Date : Sep 15 2020

SUMMARY :

about the requirements of the most highly regulated industries. Yeah, the adoption of container orchestration has given rise to five key benefits. So what is it specifically about? or declaring the way you want things done? on the benefits of container orchestration here, and you've provided some thoughts on what the drivers So in achieving the certification, we've demonstrated compliance or alignment I suspect because these things are hard to get and time consuming How your customers approach compliance assessment One is the integration of assessment tooling into the overall development What do you mean exactly? Where does the day to go? America of the mid century? Yeah, it's funny how many of those same principles are really transferrable So getting back to what you were just talking about integrating, assessment, One of the big drawbacks to this lengthy engagement is an infrequent engagement is that vulnerabilities Well, as this question of the need for differential the process is to gather findings defects related to your code. the industries that you are working with, finally, the idea of defense and death, which is about minimizing your plast Um, and I had the privilege of listening to it from the perspective of someone who has Thank you. Thank you too.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
BrianPERSON

0.99+

Brian LangstonPERSON

0.99+

Matt BentleyPERSON

0.99+

Anders WahlgrenPERSON

0.99+

ToyotaORGANIZATION

0.99+

Andres FalconPERSON

0.99+

Cloud BeesORGANIZATION

0.99+

OneQUANTITY

0.99+

two stationsQUANTITY

0.99+

U. S governmentORGANIZATION

0.99+

50DATE

0.99+

bothQUANTITY

0.99+

thirdQUANTITY

0.99+

second pointQUANTITY

0.99+

ESCAPTITLE

0.99+

firstQUANTITY

0.99+

four thingsQUANTITY

0.99+

third areaQUANTITY

0.98+

US governmentORGANIZATION

0.98+

secondQUANTITY

0.98+

five key benefitsQUANTITY

0.98+

MirandaORGANIZATION

0.98+

second enablerQUANTITY

0.98+

todayDATE

0.97+

second benefitQUANTITY

0.97+

fifth validationQUANTITY

0.97+

OscarORGANIZATION

0.97+

three thingsQUANTITY

0.97+

MiracleCOMMERCIAL_ITEM

0.97+

ThioPERSON

0.97+

MiranteORGANIZATION

0.97+

AzizPERSON

0.97+

StigORGANIZATION

0.97+

one wayQUANTITY

0.96+

two competenciesQUANTITY

0.96+

Several decades agoDATE

0.95+

two stakeholder groupsQUANTITY

0.95+

YesterdayDATE

0.95+

four conceptsQUANTITY

0.94+

second bigQUANTITY

0.93+

fourth enablerQUANTITY

0.93+

19 fiftiesDATE

0.92+

RentaORGANIZATION

0.92+

both useQUANTITY

0.91+

three areasQUANTITY

0.9+

Securing Your CloudTITLE

0.9+

oneQUANTITY

0.9+

One placeQUANTITY

0.87+

51 40 dashQUANTITY

0.87+

D TTITLE

0.86+

launch pad 2020EVENT

0.86+

GoProORGANIZATION

0.86+

mid centuryDATE

0.85+

70 years agoDATE

0.84+

first oneQUANTITY

0.83+

few minutesDATE

0.83+

OscarEVENT

0.82+

two of themQUANTITY

0.81+

JapaneseOTHER

0.8+

Everywhere With MeTITLE

0.79+

60DATE

0.78+

Security Project Management OfficeORGANIZATION

0.77+

third enablerQUANTITY

0.75+

one possibleQUANTITY

0.74+

StigTITLE

0.67+

DebPERSON

0.66+

PMOORGANIZATION

0.62+

Two successful security programsQUANTITY

0.62+

AndiPERSON

0.61+

Dr Enterprise Container CloudORGANIZATION

0.6+

fourQUANTITY

0.6+

Docker EngineORGANIZATION

0.59+

AmericaLOCATION

0.53+

ThiesQUANTITY

0.5+

EsoORGANIZATION

0.49+

LeeORGANIZATION

0.48+

MirandaPERSON

0.47+

ON DEMAND SPEED K8S DEV OPS SECURE SUPPLY CHAIN


 

>> In this session, we will be reviewing the power and benefits of implementing a secure software supply chain and how we can gain a cloud like experience with the flexibility, speed and security of modern software delivering. Hi, I'm Matt Bentley and I run our technical pre-sales team here at Mirantis. I spent the last six years working with customers on their containerization journey. One thing almost every one of my customers has focused on is how they can leverage the speed and agility benefits of containerizing their applications while continuing to apply the same security controls. One of the most important things to remember is that we are all doing this for one reason and that is for our applications. So now let's take a look at how we can provide flexibility to all layers of the stack from the infrastructure on up to the application layer. When building a secure supply chain for container focused platforms, I generally see two different mindsets in terms of where their responsibilities lie between the developers of the applications and the operations teams who run the middleware platforms. Most organizations are looking to build a secure, yet robust service that fits their organization's goals around how modern applications are built and delivered. First, let's take a look at the developer or application team approach. This approach falls more of the DevOps philosophy, where a developer and application teams are the owners of their applications from the development through their life cycle, all the way to production. I would refer to this more of a self service model of application delivery and promotion when deployed to a container platform. This is fairly common, organizations where full stack responsibilities have been delegated to the application teams. Even in organizations where full stack ownership doesn't exist, I see the self service application deployment model work very well in lab development or non production environments. This allows teams to experiment with newer technologies, which is one of the most effective benefits of utilizing containers. In other organizations, there is a strong separation between responsibilities for developers and IT operations. This is often due to the complex nature of controlled processes related to the compliance and regulatory needs. Developers are responsible for their application development. This can either include dock at the development layer or be more traditional, throw it over the wall approach to application development. There's also quite a common experience around building a center of excellence with this approach where we can take container platforms and be delivered as a service to other consumers inside of the IT organization. This is fairly prescriptive in the manner of which application teams would consume it. Yeah when examining the two approaches, there are pros and cons to each. Process, controls and compliance are often seen as inhibitors to speed. Self-service creation, starting with the infrastructure layer, leads to inconsistency, security and control concerns, which leads to compliance issues. While self-service is great, without visibility into the utilization and optimization of those environments, it continues the cycles of inefficient resource utilization. And a true infrastructure as a code experience, requires DevOps, related coding skills that teams often have in pockets, but maybe aren't ingrained in the company culture. Luckily for us, there is a middle ground for all of this. Docker Enterprise Container Cloud provide the foundation for the cloud like experience on any infrastructure without all of the out of the box security and controls that our professional services team and your operations teams spend their time designing and implementing. This removes much of the additional work and worry around ensuring that your clusters and experiences are consistent, while maintaining the ideal self service model. No matter if it is a full stack ownership or easing the needs of IT operations. We're also bringing the most natural Kubernetes experience today with Lens to allow for multi-cluster visibility that is both developer and operator friendly. Lens provide immediate feedback for the health of your applications, observability for your clusters, fast context switching between environments and allowing you to choose the best in tool for the task at hand, whether it is the graphic user interface or command line interface driven. Combining the cloud like experience with the efficiencies of a secure supply chain that meet your needs brings you the best of both worlds. You get DevOps speed with all the security and controls to meet the regulations your business lives by. We're talking about more frequent deployments, faster time to recover from application issues and better code quality. As you can see from our clusters we have worked with, we're able to tie these processes back to real cost savings, real efficiency and faster adoption. This all adds up to delivering business value to end users in the overall perceived value. Now let's look and see how we're able to actually build a secure supply chain to help deliver these sorts of initiatives. In our example secure supply chain, where utilizing Docker desktop to help with consistency of developer experience, GitHub for our source control, Jenkins for our CACD tooling, the Docker trusted registry for our secure container registry and the Universal Control Plane to provide us with our secure container runtime with Kubernetes and Swarm, providing a consistent experience, no matter where our clusters are deployed. You work with our teams of developers and operators to design a system that provides a fast, consistent and secure experience. For my developers, that works for any application, Brownfield or Greenfield, Monolith or Microservice. Onboarding teams can be simplified with integrations into enterprise authentication services, calls to GitHub repositories, Jenkins access and jobs, Universal Control Plan and Docker trusted registry teams and organizations, Kubernetes namespace with access control, creating Docker trusted registry namespaces with access control, image scanning and promotion policies. So, now let's take a look and see what it looks like from the CICD process, including Jenkins. So let's start with Docker desktop. From the Docker desktop standpoint, we'll actually be utilizing visual studio code and Docker desktop to provide a consistent developer experience. So no matter if we have one developer or a hundred, we're going to be able to walk through a consistent process through Docker container utilization at the development layer. Once we've made our changes to our code, we'll be able to check those into our source code repository. In this case, we'll be using GitHub. Then when Jenkins picks up, it will check out that code from our source code repository, build our Docker containers, test the application that will build the image, and then it will take the image and push it to our Docker trusted registry. From there, we can scan the image and then make sure it doesn't have any vulnerabilities. Then we can sign them. So once we've signed our images, we've deployed our application to dev, we can actually test our application deployed in our real environment. Jenkins will then test the deployed application. And if all tests show that as good, we'll promote our Docker image to production. So now, let's look at the process, beginning from the developer interaction. First of all, let's take a look at our application as it's deployed today. Here, we can see that we have a change that we want to make on our application. So our marketing team says we need to change containerize NGINX to something more Mirantis branded. So let's take a look at visual studio code, which we'll be using for our ID to change our application. So here's our application. We have our code loaded and we're going to be able to use Docker desktop on our local environment with our Docker desktop plugin for visual studio code, to be able to build our application inside of Docker, without needing to run any command line specific tools. Here with our code, we'll be able to interact with Docker maker changes, see it live and be able to quickly see if our changes actually made the impact that we're expecting our application. So let's find our updated tiles for application and let's go ahead and change that to our Mirantis sized NGINX instead of containerized NGINX. So we'll change it in a title and on the front page of the application. So now that we've saved that changed to our application, we can actually take a look at our code here in VS code. And as simple as this, we can right click on the Docker file and build our application. We give it a name for our Docker image and VS code will take care of the automatic building of our application. So now we have a Docker image that has everything we need in our application inside of that image. So, here we can actually just right click on that image tag that we just created and do run. This will interactively run the container for us. And then once our containers running, we can just right click and open it up in a browser. So here we can see the change to our application as it exists live. So, once we can actually verify that our applications working as expected, we can stop our container. And then from here, we can actually make that change live by pushing it to our source code repository. So here, we're going to go ahead and make a commit message to say that we updated to our Mirantis branding. We will commit that change and then we'll push it to our source code repository. Again, in this case, we're using GitHub to be able to use as our source code repository. So here in VS code, we'll have that pushed here to our source code repository. And then, we'll move on to our next environment, which is Jenkins. Jenkins is going to be picking up those changes for our application and it checked it out from our source code repository. So GitHub notifies Jenkins that there's a change. Checks out the code, builds our Docker image using the Docker file. So we're getting a consistent experience between the local development environment on our desktop and then in Jenkins where we're actually building our application, doing our tests, pushing it into our Docker trusted registry, scanning it and signing our image in our Docker trusted registry and then deploying to our development environment. So let's actually take a look at that development environment as it's been deployed. So, here we can see that our title has been updated on our application, so we can verify that it looks good in development. If we jump back here to Jenkins, we'll see that Jenkins go ahead and runs our integration tests for our development environment. Everything worked as expected, so it promoted that image for our production repository in our Docker trusted registry. We're then, we're going to also sign that image. So we're assigning that yes, we've signed off that has made it through our integration tests and it's deployed to production. So here in Jenkins, we can take a look at our deployed production environment where our application is live in production. We've made a change, automated and very secure manner. So now, let's take a look at our Docker trusted registry, where we can see our name space for our application and our simple NGINX repository. From here, we'll be able to see information about our application image that we've pushed into the registry, such as the image signature, when it was pushed by who and then, we'll also be able to see the results of our image. In this case, we can actually see that there are vulnerabilities for our image and we'll actually take a look at that. Docker trusted registry does binary level scanning. So we get detailed information about our individual image layers. From here, these image layers give us details about where the vulnerabilities were located and what those vulnerabilities actually are. So if we click on the vulnerability, we can see specific information about that vulnerability to give us details around the severity and more information about what exactly is vulnerable inside of our container. One of the challenges that you often face around vulnerabilities is how exactly we would remediate that in a secure supply chain. So let's take a look at that. In the example that we were looking at, the vulnerability is actually in the base layer of our image. In order to pull in a new base layer for our image, we need to actually find the source of that and update it. One of the ways that we can help secure that as a part of the supply chain is to actually take a look at where we get our base layers of our images. Docker hub really provides a great source of content to start from, but opening up Docker hub within your organization, opens up all sorts of security concerns around the origins of that content. Not all images are made equal when it comes to the security of those images. The official images from Docker hub are curated by Docker, open source projects and other vendors. One of the most important use cases is around how you get base images into your environment. It is much easier to consume the base operating system layer images than building your own and also trying to maintain them. Instead of just blindly trusting the content from Docker hub, we can take a set of content that we find useful such as those base image layers or content from vendors and pull that into our own Docker trusted registry, using our mirroring feature. Once the images have been mirrored into a staging area of our Docker trusted registry, we can then scan them to ensure that the images meet our security requirements. And then based off of the scan result, promote the image to a public repository where you can actually sign the images and make them available to our internal consumers to meet their needs. This allows us to provide a set of curated content that we know is secure and controlled within our environment. So from here, we can find our updated Docker image in our Docker trusted registry, where we can see that the vulnerabilities have been resolved. From a developer's point of view, that's about as smooth as the process gets. Now, let's take a look at how we can provide that secure content for our developers in our own Docker trusted registry. So in this case, we're taking a look at our Alpine image that we've mirrored into our Docker trusted registry. Here, we're looking at the staging area where the images get temporarily pulled because we have to pull them in order to actually be able to scan them. So here we set up mirroring and we can quickly turn it on by making it active. And then we can see that our image mirroring, we'll pull our content from Docker hub and then make it available in our Docker trusted registry in an automatic fashion. So from here, we can actually take a look at the promotions to be able to see how exactly we promote our images. In this case, we created a promotion policy within Docker trusted registry that makes it so that content gets promoted to a public repository for internal users to consume based off of the vulnerabilities that are found or not found inside of the Docker image. So our actual users, how they would consume this content is by taking a look at the public to them, official images that we've made available. Here again, looking at our Alpine image, we can take a look at the tags that exist and we can see that we have our content that has been made available. So we've pulled in all sorts of content from Docker hub. In this case, we've even pulled in the multi architecture images, which we can scan due to the binary level nature of our scanning solution. Now let's take a look at Lens. Lens provides capabilities to be able to give developers a quick opinionated view that focuses around how they would want to view, manage and inspect applications deployed to a Kubernetes cluster. Lens integrates natively out of the box with Universal Control Plane clam bundles. So you're automatically generated TLS certificates from UCP, just work. Inside our organization, we want to give our developers the ability to see their applications in a very easy to view manner. So in this case, let's actually filter down to the application that we just employed to our development environment. Here, we can see the pod for application. And when we click on that, we get instant detailed feedback about the components and information that this pod is utilizing. We can also see here in Lens that it gives us the ability to quickly switch contexts between different clusters that we have access to. With that, we also have capabilities to be able to quickly deploy other types of components. One of those is helm charts. Helm charts are a great way to package up applications, especially those that may be more complex to make it much simpler to be able to consume and inversion our applications. In this case, let's take a look at the application that we just built and deployed. In this case, our simple NGINX application has been bundled up as a helm chart and is made available through Lens. Here, we can just click on that description of our application to be able to see more information about the helm chart. So we can publish whatever information may be relevant about our application. And through one click, we can install our helm chart. Here, it will show us the actual details of the helm charts. So before we install it, we can actually look at those individual components. So in this case, we can see this created an ingress rule. And then this will tell Kubernetes how did it create this specific components of our application. We'd just have to pick a namespace to deploy it to and in this case, we're actually going to do a quick test here because in this case, we're trying to deploy the application from Docker hub. In our Universal Control Plane, we've turned on Docker content trust policy enforcement. So this is actually going to fail to deploy. Because we're trying to employ our application from Docker hub, the image hasn't been properly signed in our environment. So the Docker content trust policy enforcement prevents us from deploying our Docker image from Docker hub. In this case, we have to go through our approved process through our secure supply chain to be able to ensure that we know where our image came from and that meets our quality standards. So if we comment out the Docker hub repository and comment in our Docker trusted registry repository and click install, it will then install the helm chart with our Docker image being pulled from our DTR, which then it has a proper signature. We can see that our application has been successfully deployed through our home chart releases view. From here, we can see that simple NGINX application and in this case, we'll get details around the actual deployed helm chart. The nice thing is, is that Lens provides us this capability here with helm to be able to see all of the components that make up our application. From this view, it's giving us that single pane of glass into that specific application, so that we know all of the components that is created inside of Kubernetes. There are specific details that can help us access the applications such as that ingress rule that we just talked about, gives us the details of that, but it also gives us the resources such as the service, the deployment and ingress that has been created within Kubernetes to be able to actually have the application exist. So to recap, we've covered how we can offer all the benefits of a cloud like experience and offer flexibility around DevOps and operations control processes through the use of a secure supply chain, allowing our developers to spend more time developing and our operators, more time designing systems that meet our security and compliance concerns.

Published Date : Sep 14 2020

SUMMARY :

of our application to be

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Matt BentleyPERSON

0.99+

GitHubORGANIZATION

0.99+

FirstQUANTITY

0.99+

one reasonQUANTITY

0.99+

MirantisORGANIZATION

0.99+

OneQUANTITY

0.99+

NGINXTITLE

0.99+

DockerTITLE

0.99+

two approachesQUANTITY

0.99+

MonolithORGANIZATION

0.99+

oneQUANTITY

0.98+

UCPORGANIZATION

0.98+

KubernetesTITLE

0.98+

One thingQUANTITY

0.98+

one developerQUANTITY

0.98+

JenkinsTITLE

0.98+

todayDATE

0.98+

BrownfieldORGANIZATION

0.97+

both worldsQUANTITY

0.97+

twoQUANTITY

0.97+

bothQUANTITY

0.96+

one clickQUANTITY

0.96+

GreenfieldORGANIZATION

0.95+

eachQUANTITY

0.95+

single paneQUANTITY

0.92+

Docker hubTITLE

0.91+

a hundredQUANTITY

0.91+

LensTITLE

0.9+

DockerORGANIZATION

0.9+

MicroserviceORGANIZATION

0.9+

VSTITLE

0.88+

DevOpsTITLE

0.87+

K8SCOMMERCIAL_ITEM

0.87+

Docker hubORGANIZATION

0.85+

waysQUANTITY

0.83+

KubernetesORGANIZATION

0.83+

last six yearsDATE

0.82+

JenkinsPERSON

0.72+

One ofQUANTITY

0.7+

Speed K8S Dev Ops Secure Supply Chain


 

>>this session will be reviewing the power benefits of implementing a secure software supply chain and how we can gain a cloud like experience with flexibility, speed and security off modern software delivery. Hi, I'm Matt Bentley, and I run our technical pre sales team here. Um Iran. Tous I spent the last six years working with customers on their container ization journey. One thing almost every one of my customers is focused on how they can leverage the speed and agility benefits of contain arising their applications while continuing to apply the same security controls. One of the most important things to remember is that we are all doing this for one reason, and that is for our applications. So now let's take a look at how we could provide flexibility all layers of the stack from the infrastructure on up to the application layer. When building a secure supply chain for container focus platforms, I generally see two different mindsets in terms of where the responsibilities lie between the developers of the applications and the operations teams who run the middleware platforms. Most organizations are looking to build a secure yet robust service that fits the organization's goals around how modern applications are built and delivered. Yeah. First, let's take a look at the developer or application team approach. This approach follows Mawr of the Dev ops philosophy, where a developer and application teams are the owners of their applications. From the development through their life cycle, all the way to production. I would refer this more of a self service model of application, delivery and promotion when deployed to a container platform. This is fairly common organizations where full stack responsibilities have been delegated to the application teams, even in organizations were full stack ownership doesn't exist. I see the self service application deployment model work very well in lab development or non production environments. This allows teams to experiment with newer technologies, which is one of the most effective benefits of utilizing containers and other organizations. There's a strong separation between responsibilities for developers and I T operations. This is often do the complex nature of controlled processes related to the compliance and regulatory needs. Developers are responsible for their application development. This can either include doctorate the development layer or b'more traditional throw it over the wall approach to application development. There's also quite a common experience around building a center of excellence with this approach, where we can take container platforms and be delivered as a service to other consumers inside of the I T organization. This is fairly prescriptive, in the manner of which application teams would consume it. When examining the two approaches, there are pros and cons to each process. Controls and appliance are often seen as inhibitors to speak. Self service creation, starting with the infrastructure layer, leads to inconsistency, security and control concerns, which leads to compliance issues. While self service is great without visibility into the utilization and optimization of those environments, it continues the cycles of inefficient resource utilization and the true infrastructure is a code. Experience requires Dev ops related coding skills that teams often have in pockets but maybe aren't ingrained in the company culture. Luckily for us, there is a middle ground for all of this Doc Enterprise Container Cloud provides the foundation for the cloud like experience on any infrastructure without all of the out of the box security and controls that are professional services Team and your operations team spend their time designing and implementing. This removes much of the additional work and worry Run, ensuring that your clusters and experiences are consistent while maintaining the ideal self service model, no matter if it is a full stack ownership or easing the needs of I T operations. We're also bringing the most natural kubernetes experience today with winds to allow for multi cluster visibility that is both developer and operator friendly. Let's provides immediate feedback for the health of your applications. Observe ability for your clusters. Fast context, switching between environments and allowing you to choose the best in tool for the task at hand. Whether is three graphical user interface or command line interface driven. Combining the cloud like experience with the efficiencies of a secure supply chain that meet your needs brings you the best of both worlds. You get Dave off speed with all the security controls to meet the regulations your business lives by. We're talking about more frequent deployments. Faster time to recover from application issues and better code quality, as you can see from our clusters we have worked with were able to tie these processes back to real cost savings, riel efficiency and faster adoption. This all adds up to delivering business value to end users in the overall perceived value. Now let's look at see how we're able to actually build a secure supply chain. Help deliver these sorts of initiatives in our example. Secure Supply chain. We're utilizing doctor desktop to help with consistency of developer experience. Get hub for our source Control Jenkins for a C A C D. Tooling the doctor trusted registry for our secure container registry in the universal control playing to provide us with our secure container run time with kubernetes and swarm. Providing a consistent experience no matter where are clusters are deployed. You work with our teams of developers and operators to design a system that provides a fast, consistent and secure experience for my developers that works for any application. Brownfield or Greenfield monolith or micro service on boarding teams could be simplified with integrations into enterprise authentication services. Calls to get help repositories. Jenkins Access and Jobs, Universal Control Plan and Dr Trusted registry teams and organizations. Cooper down his name space with access control, creating doctor trusted registry named spaces with access control, image scanning and promotion policies. So now let's take a look and see what it looks like from the C I c D process, including Jenkins. So let's start with Dr Desktop from the doctor desktop standpoint, what should be utilizing visual studio code and Dr Desktop to provide a consistent developer experience. So no matter if we have one developer or 100 we're gonna be able to walk through the consistent process through docker container utilization at the development layer. Once we've made our changes to our code will be able to check those into our source code repository in this case, abusing Get up. Then, when Jenkins picks up, it will check out that code from our source code repository, build our doctor containers, test the application that will build the image, and then it will take the image and push it toward doctor trusted registry. From there, we can scan the image and then make sure it doesn't have any vulnerabilities. Then we consign them. So once we signed our images, we've deployed our application to Dev. We can actually test their application deployed in our real environment. Jenkins will then test the deployed application, and if all tests show that is good, will promote the r R Dr and Mr Production. So now let's look at the process, beginning from the developer interaction. First of all, let's take a look at our application as is deployed today. Here, we can see that we have a change that we want to make on our application. So marketing Team says we need to change containerized injure next to something more Miranda's branded. So let's take a look at visual studio coat, which will be using for I D to change our application. So here's our application. We have our code loaded, and we're gonna be able to use Dr Desktop on our local environment with our doctor desktop plug in for visual studio code to be able to build our application inside of doctor without needing to run any command line. Specific tools here is our code will be able to interact with docker, make our changes, see it >>live and be able to quickly see if our changes actually made the impact that we're expecting our application. Let's find our updated tiles for application and let's go and change that to our Miranda sized into next. Instead of containerized in genetics, so will change in the title and on the front page of the application, so that we save. That changed our application. We can actually take a look at our code here in V s code. >>And as simple as this, we can right click on the docker file and build our application. We give it a name for our Docker image and V s code will take care of the automatic building of our application. So now we have a docker image that has everything we need in our application inside of that image. So here we can actually just right click on the image tag that we just created and do run this winter, actively run the container for us and then what's our containers running? We could just right click and open it up in a browser. So here we can see the change to our application as it exists live. So once we can actually verify that our applications working as expected, weaken, stop our container. And then from here, we can actually make that change live by pushing it to our source code repository. So here we're going to go ahead and make a commit message to say that we updated to our Mantis branding. We will commit that change and then we'll push it to our source code repository again. In this case we're using get Hub to be able to use our source code repository. So here in V s code will have that pushed here to our source code repository. And then we'll move on to our next environment, which is Jenkins. Jenkins is gonna be picking up those changes for our application, and it checked it out from our source code repository. So get Hub Notifies Jenkins. That there is a change checks out. The code builds our doctor image using the doctor file. So we're getting a consistent experience between the local development environment on our desktop and then and Jenkins or actually building our application, doing our tests, pushing in toward doctor trusted registry, scanning it and signing our image. And our doctor trusted registry, then 2.4 development environment. >>So let's actually take a look at that development environment as it's been deployed. So here we can see that our title has been updated on our application so we can verify that looks good and development. If we jump back here to Jenkins, will see that Jenkins go >>ahead and runs our integration tests for a development environment. Everything worked as expected, so it promoted that image for production repository and our doctor trusted registry. Where then we're going to also sign that image. So we're signing that. Yes, we have signed off that has made it through our integration tests, and it's deployed to production. So here in Jenkins, we could take a look at our deployed production environment where our application is live in production. We've made a change automated and very secure manner. >>So now let's take a look at our doctor trusted registry where we can see our game Space for application are simple in genetics repository. From here we will be able to see information about our application image that we've pushed into the registry, such as Thean Midge signature when it was pushed by who and then we'll also be able to see the scan results of our image. In this case, we can actually see that there are vulnerabilities for our image and we'll actually take a look at that. Dr Trusted registry does binary level scanning, so we get detailed information about our individual image layers. From here, these image layers give us details about where the vulnerabilities were located and what those vulnerabilities actually are. So if we click on the vulnerability, we can see specific information about that vulnerability to give us details around the severity and more information about what, exactly is vulnerable inside of our container. One of the challenges that you often face around vulnerabilities is how, exactly we would remediate that and secure supply chain. So let's take a look at that and the example that we were looking at the vulnerability is actually in the base layer of our image. In order to pull in a new base layer of our image, we need to actually find the source of that and updated. One of the ways that we can help secure that is a part of the supply chain is to actually take a look at where we get our base layers of our images. Dr. Help really >>provides a great source of content to start from, but opening up docker help within your organization opens up all sorts of security concerns around the origins of that content. Not all images are made equal when it comes to the security of those images. The official images from Docker, However, curated by docker, open source projects and other vendors, one of the most important use cases is around how you get base images into your environment. It is much easier to consume the base operating system layer images than building your own and also trying to maintain them instead of just blindly trusting the content from doctor. How we could take a set >>of content that we find useful, such as those base image layers or content from vendors, and pull that into our own Dr trusted registry using our rearing feature. Once the images have been mirrored into a staging area of our DACA trusted registry, we can then scan them to ensure that the images meet our security requirements and then, based off the scan result, promote the image toe a public repository where we can actually sign the images and make them available to our internal consumers to meet their needs. This allows us to provide a set of curated content that we know a secure and controlled within our environment. So from here we confined our updated doctor image in our doctor trust registry, where we can see that the vulnerabilities have been resolved from a developers point of view, that's about a smooth process gets. Now let's take a look at how we could provide that secure content for developers and our own Dr Trusted registry. So in this case, we're taking a look at our Alpine image that we've mirrored into our doctor trusted registry. Here we're looking at the staging area where the images get temporarily pulled because we have to pull them in order to actually be able to scan them. So here we set up nearing and we can quickly turn it on by making active. Then we can see that our image mirroring will pull our content from Dr Hub and then make it available in our doctor trusted registry in an automatic fashion. So from here, we can actually take a look at the promotions to be able to see how exactly we promote our images. In this case, we created a promotion policy within docker trusted registry that makes it so. That content gets promoted to a public repository for internal users to consume based off of the vulnerabilities that are found or not found inside of the docker image. So are actually users. How they would consume this content is by taking a look at the public to them official images that we've made available here again, Looking at our Alpine image, we can take a look at the tags that exist. We could see that we have our content that has been made available, so we've pulled in all sorts of content from Dr Hub. In this case, we have even pulled in the multi architectural images, which we can scan due to the binary level nature of our scanning solution. Now let's take a look at Len's. Lens provides capabilities to be able to give developers a quick, opinionated view that focuses around how they would want to view, manage and inspect applications to point to a Cooper Days cluster. Lindsay integrates natively out of the box with universal control playing clam bundles so you're automatically generated. Tell certificates from UCP. Just work inside our organization. We want to give our developers the ability to see their applications and a very easy to view manner. So in this case, let's actually filter down to the application that we just deployed to our development environment. Here we can see the pot for application and we click on that. We get instant, detailed feedback about the components and information that this pot is utilizing. We can also see here in Linz that it gives us the ability to quickly switch context between different clusters that we have access to. With that, we also have capabilities to be able to quickly deploy other types of components. One of those is helm charts. Helm charts are a great way to package of applications, especially those that may be more complex to make it much simpler to be able to consume inversion our applications. In this case, let's take a look at the application that we just built and deployed. This case are simple in genetics. Application has been bundled up as a helm chart and has made available through lens here. We can just click on that description of our application to be able to see more information about the helm chart so we can publish whatever information may be relevant about our application, and through one click, we can install our helm chart here. It will show us the actual details of the home charts. So before we install it, we can actually look at those individual components. So in this case, we could see that's created ingress rule. And then it's well, tell kubernetes how to create the specific components of our application. We just have to pick a name space to to employ it, too. And in this case, we're actually going to do a quick test here because in this case, we're trying to deploy the application from Dr Hub in our universal Control plane. We've turned on Dr Content Trust Policy Enforcement. So this is actually gonna fail to deploy because we're trying to deploy application from Dr Hub. The image hasn't been properly signed in our environment. So the doctor can to trust policy enforcement prevents us from deploying our doctor image from Dr Hub. In this case, we have to go through our approved process through our secure supply chain to be able to ensure that we know our image came from, and that meets our quality standards. So if we comment out the doctor Hub repository and comment in our doctor trusted registry repository and click install, it will then install the helm chart with our doctor image being pulled from our GTR, which then has a proper signature, we can see that our application has been successfully deployed through our home chart releases view. From here, we can see that simple in genetics application, and in this case we'll get details around the actual deploy and help chart. The nice thing is that Linds provides us this capability here with home. To be able to see all the components that make up our application from this view is giving us that single pane of glass into that specific application so that we know all the components that is created inside of kubernetes. There are specific details that can help us access the applications, such as that ingress world that we just talked about gives us the details of that. But it also gives us the resource is such as the service, the deployment in ingress that has been created within kubernetes to be able to actually have the application exist. So to recap, we've covered how we can offer all the benefits of a cloud like experience and offer flexibility around dev ups and operations controlled processes through the use of a secure supply chain, allowing our developers to spend more time developing and our operators mawr time designing systems that meet our security and compliance concerns

Published Date : Sep 12 2020

SUMMARY :

So now let's take a look at how we could provide flexibility all layers of the stack from the and on the front page of the application, so that we save. So here we can see the change to our application as it exists live. So here we can So here in Jenkins, we could take a look at our deployed production environment where our application So let's take a look at that and the example that we were looking at of the most important use cases is around how you get base images into your So in this case, let's actually filter down to the application that we just deployed to our development environment.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Matt BentleyPERSON

0.99+

UCPORGANIZATION

0.99+

MawrPERSON

0.99+

FirstQUANTITY

0.99+

CooperPERSON

0.99+

OneQUANTITY

0.99+

100QUANTITY

0.99+

one reasonQUANTITY

0.99+

two approachesQUANTITY

0.99+

todayDATE

0.99+

bothQUANTITY

0.99+

Dr HubORGANIZATION

0.98+

DavePERSON

0.98+

oneQUANTITY

0.98+

JenkinsTITLE

0.97+

twoQUANTITY

0.97+

LindsORGANIZATION

0.97+

IranLOCATION

0.97+

One thingQUANTITY

0.97+

one developerQUANTITY

0.96+

DACATITLE

0.95+

each processQUANTITY

0.95+

Dr DesktopTITLE

0.93+

one clickQUANTITY

0.92+

single paneQUANTITY

0.92+

both worldsQUANTITY

0.91+

Thean MidgePERSON

0.91+

dockerTITLE

0.89+

three graphical userQUANTITY

0.86+

MantisORGANIZATION

0.85+

last six yearsDATE

0.84+

DrORGANIZATION

0.82+

MirandaORGANIZATION

0.81+

BrownfieldORGANIZATION

0.8+

this winterDATE

0.75+

waysQUANTITY

0.75+

CTITLE

0.74+

one ofQUANTITY

0.74+

LindsayORGANIZATION

0.72+

ingressTITLE

0.71+

AlpineORGANIZATION

0.69+

most important use casesQUANTITY

0.67+

Cooper DaysORGANIZATION

0.66+

JenkinsPERSON

0.65+

mindsetsQUANTITY

0.63+

GreenfieldLOCATION

0.62+

MirandaPERSON

0.62+

RPERSON

0.59+

C A CTITLE

0.59+

LinzTITLE

0.59+

every oneQUANTITY

0.56+

challengesQUANTITY

0.53+

EnterpriseCOMMERCIAL_ITEM

0.5+

2.4OTHER

0.5+

HubORGANIZATION

0.48+

K8STITLE

0.48+

LensTITLE

0.44+

DocORGANIZATION

0.4+

HelpPERSON

0.39+

DockerORGANIZATION

0.37+

AlpineOTHER

0.35+

Brian Shield, Boston Red Sox | Acronis Global Cyber Summit 2019


 

>> Announcer: From Miami Beach, Florida, it's The Cube, covering Acronis Global Cyber Summit 2019. Brought to you by Acronis. >> Welcome back everyone. We are here with The Cube coverage for two days. We're wrapping up, getting down on day one in the books for the Acronis Global Cyber Summit 2019. I'm John Furrier, your host of The Cube. We are in Miami Beach, the Fontainebleau Hotel. I'm personally excited for this next guest because I'm a huge Red Sox fan, even though I got moved out to California. Giants is in a different area. National League is different than American League, still my heart with the Red Sox. And we're here with an industry veteran, seasoned professional in IT and data, Brian Shield. Boston Red Sox Vice President of Technology and IT. Welcome to The Cube, thanks for joining us. >> Thank you. It's great to be here. >> John: So congratulations on the rings. Since I moved out of town, Red sox win their World Series, break the curse of the Bambino. >> Hey we appreciate that. Thank you. >> My family doesn't want me back. You got to show >> Yeah, maybe I'll put this one up for the, maybe someone can zoom in on this. Which camera is the good one? This one here? So, there ya go. So, World Series champs for at least for another week. (laughter) >> Bummer about this year. Pitching just couldn't get it done. But, good team. >> Happens. >> Again, things move on, but you know. New regime, new GM going to come on board. >> Yup. >> So, but in general, Red Sox, storied franchise. Love it there. Fenway Park, the cathedral of baseball parks. >> Brian: Defnitely. >> And you're seeing that just play out now, standard. So just a great place to go. We have tickets there. So, I got to ask you. Technology, sports, really is modernized faster than I think any category. And certainly cyber security forced to modernize because of the threats. But sports, you got a business to run, not just IT and making the planes run on time. >> Sure. >> Scouts, money, whatever. >> Fans. >> You got fan experience. >> Stadium opportunities. >> Club management, scouts are out there. So you got business, team, fans. And data's a big part of it. That's part of your career. Tell us what the cutting edge innovation is at the Red Sox these days. >> I think baseball in general, as you indicated, it's a very evolving kind of environment. I mean historically I think people really sort of relish the nostalgia of sports and Fenway Park being as historic as it is, was probably the pinnacle of that, in some respects. But Red Sox have always been leaders and baseball analytics, you know. And everyone's pretty familiar with "Moneyball" and Brad Pitt. >> John: Is that a true story, he turned down the GM job? >> I'm told it is. (laughter) I don't know if I fully vetted that question. But over the last six, seven years, you know we've really turned our attention to sort of leveraging sort of technology across the businesses, right? Not just baseball and analytics and how we do scouting, which continues to evolve at a very rapid pace. But also as you pointed out, running a better business, understanding our fans, understanding fan behavior, understanding stadiums. There's a lot of challenges around running an effective stadium. First and foremost to all of us is really ensuring it's a great fan experience. Whether it's artificial intelligence, or IoT technologies or 5G or the latest Wifi, all those things are coming up at Fenway Park. You and I talked earlier about we're about to break ground for a new theater, so a live theater on the outside, beyond the bleachers type of thing. So that'll be a 5,400-seat arena, 200 live performances a year, and with e-sports, you know, complementing it. It just gives you an example of just how fast baseball is sort of transitioning. >> And the theater, is that going to be blown out from where that parking garage is, structure and going towards >> So the corner of Landsdown and Ipswich, if you think of that sort of corner back there, for those that are familiar with the Fenway area. So it's going to be a very big change and you'll see the difference too from within the ballpark. I think we'll lose a couple of rows of the bleachers. That'll be replaced with another gathering area for fans and things like that, on the back end of that theater. So build a great experience and I think it really speaks to sort of our ability to think of Fenway as more of a destination, as a venue, as a complementary experience. We want people to come to the area to enjoy sports and to enjoy entertainment and things. >> You know Brian, the consumerization of IT has been kicked around. Last decade, that was a big buzzword. Now the blending of a physical event and digital has certainly consumed the world. >> Absolutely. >> And we're starting to see that dynamic. You speak to a theater. That's a physical space. But digital is also a big part of kind of that complementary. It's not mutually exclusive for each other. They're integrated business models. >> Absolutely. >> So therefore, the technology has to be seamless. The data has to be available. >> Yup. >> And it's got to be secure. >> Well the data's got to be ubiquitous, right? I mean you don't want to, if we're going to have fans attending theater and then you're going to go to Fenway Park or they leave a game and then go to some other event or they attend a tour of Fenway Park, and beyond maybe the traditional what people might think about, is certainly when you think about baseball and Fenway Park. You know we have ten to twelve concerts a year. We'll host Spartan games, you know. This Christmas, I'm sorry, Christmas 2020 we now have sort of the Fenway Bowl. So we'll be hosting the AAC ACC championship games there with ESPN. >> John: Hockey games? >> Hockey games. Obviously we have Liverpool soccer being held there so it's much more of a destination, a venue for us. How we leverage all the wonderful things about Fenway Park and how we modernize, how we get basically the best of what makes Fenway Park as great as it is, yet as modern as we can make it, where appropriate to create a great fan experience. >> It's a tough balance between balancing the brand and having things on brand as well. >> Sure. >> Does that come into your job a lot around IT? Saying being on brand, not kind of tearing down the old. >> Yeah absolutely. I think our CEOs and leadership team, I mean it's not success for us if you pan to the audience and everyone is looking at their phone, right? That's not what we aspire to. We aspire to leverage technology to simplify people's experience of how do you get to the ballpark, how do I park, how do I get if I want to buy concessions or merchandise, how do I do it easily and simply? How do we supplement that experience with maybe additional data that you may not have had before. Things like that, so we're doing a lot of different testing right now whether it's 4D technologies or how we can understand, watch a play from different dimensions or AI and be able to perhaps see sort of the skyline of Boston since 1912, when Fenway Park launched... And so we sort of see all these technologies as supplemental materials, really kind of making it a holistic experience for fans. >> In Las Vegas, they have a section of Las Vegas where they have all their test beds. 5G, they call it 5G, it's really, you know, evolution, fake 5G but it's a sandbox. One of the challenges that you guys have in Boston, I know from a constraint standpoint physically, you don't have a lot of space. How do you sandbox new technologies and what are some of the things that are cool that people might not know about that are being sandboxed? So, one, how do you do it? >> Yeah. >> Effectively. And then what are some of the cool things that you guys are looking at or things they might not know about that would be interesting. >> Sure. Yeah so Fenway Park, we struggle as you know, a little bit with our footprint. You know, honestly, I walk into some of these large stadiums and I get instant jealousy, relative to just the amount of space that people have to work with and things. But we have a great relationship with our partners so we really partner, I think, particularly well with key partners like Verizon and others. So we now have 5G partially implemented at Fenway Park. We expect to have it sort of fully live come opening day next year. So we're really excited about that. We hope to have a new version of Wifi, the latest version of Wifi available, for the second half of the year. After the All-Star Break, probably after the season's over. But before our bowl game hopefully. We're looking at some really interesting ways that we can tease that out. That bowl game, we're really trying to use that as an opportunity, the Fenway Bowl, as an opportunity to make it kind of a high-tech bowl. So we're looking at ways of maybe doing everything from hack-a-thons to a pre-egaming sort of event to some interesting fan experiential opportunities and things like that. >> Got a lot of nerds at MIT, Northeastern, BU, Bentley, Babson, all the schools in the area. >> Yeah, so we'll be reaching out to colleges and we'll be reaching out to our, the ACC and AACs as well, and see what we can do to kind of create sort of a really fun experience and capitalize on the evolving role of e-sports and the role that technology can play in the future. >> I want to get to the e-sports in a second but I want to just get the plug in for Acronis. We're here at their Global Cyber Summit. You flew down for it, giving some keynote speeches and talks around security. It's a security company, data protection, to cyber protection. It is a data problem, not a storage appliance problem. It's a data problem holistically. You get that. >> Sure. Sure. >> You've been in the business for a long time. What is the security kind of posture that you guys have? Obviously you want to protect the data, protect privacy. But you got to business. You have people that work with you, supply chain, complex but yet dynamic, always on environment. >> That's a great question. It's evolving as you indicated. Major League Baseball, first and foremost, does an outstanding job. So the last, probably last four plus years, Major League Baseball has had a cyber security program that all the clubs partake in. So all 30 clubs are active participants in the program. They basically help build out a suite of tools as well as the ability to kind of monitor, help participate in the monitoring, sort of a lot of our cyber security assets and logs And that's really elevated significantly our posture in terms of security. We supplement that quite a bit and a good example of that is like Acronis. Acronis, for us, represents the ability for us to be able to respond to certain potential threats like ransom-ware and other things. As well as frankly, what's wonderful about a tool like this is that it allows us to also solve other problems. Making our scouts more efficient. We've got these 125 scouts scattered around the globe. These guys are the lifeblood of our, you know, the success of our business. When they have a problem, if they're in Venezuela or the Dominican or someplace else, in southeast Asia, getting them up and running as quickly as we can, being able to consume their video assets and other things as they're scouting prospects. We use Acronis for those solutions. It's great to kind of have a partner who can both double down as a cyber partner as well as someone who helps drive a more efficient business. >> People bring their phone into the stadiums too so those are end points now connecting to your network. >> Definitely. And as you pointed out before, we've got great partnerships. We've got a great concession relationship with Aramark and they operate, in the future they'll be operating off our infrastructure. So we're in the point of rolling out all new point-of-sale terminals this off-season. We're excited about that 'cause we think for the first time it really allows us to build a very comprehensive, very secure environment for both ourselves and for all the touchpoints to fans. >> You have a very stellar career. I noticed you were at Scudder Investments back in the '80s, very cutting-edge firm. FTD that set the whole standard for connecting retailers. Again, huge scale play. Can see the data kind of coming out, they way you've been a CIO, CTO. The EVP CIO at The Weather Channel and the weather.com again, first mover, kind of pioneer. And then now the Red Sox, pioneering. So I got to ask you the modernization question. Red Sox certainly have been cutting-edge, certainly under the last few owners, and the previous Henry is a good one, doing more and more, Has the business model of baseball evolved, 'cause you guys a franchise. >> Sure. >> You operate under the franchisor, Major League Baseball, and you have jurisdictions. So has digital blurred the lines between what Advanced Media unit can do. You got communities developing outside. I watch the games in California. I'm not in there but I'm present digitally. >> Sure. Sure. >> So how has the business model flexed with the innovation of baseball? >> That's a great question. So I mean, first off, the relationship between clubs like ours and MLB continue to evolve. We have a new commissioner, relatively new commissioner, and I think the whole one-baseball model that he's been promoting I think has been great. The boundaries sometimes between digital assets and how we innovate and things like that continues to evolve. Major League Baseball and technology groups and product groups that support Major League Baseball have been a fantastic partner of ours. If you look at some of the innovations with Statcast and some of the other types of things that fans are now becoming more familiar with. And when they see how fast a runner goes or how far a home run goes and all those sort of things, these kinds of capabilities are on the surface, but even like mobile applications, to make it easy for fans to come into ballparks and things like that really. What we see is really are platforms for the future touchpoints to all of our customers. But you're right, it gets complicated. Streaming videos and people hadn't thought of before. >> Latin America, huge audience for the Red Sox. Got great players down there. That's outside the jurisdiction, I think, of the franchise agreement, isn't it? (laughs) >> Well, it's complicated. As this past summer, we played two games in England, right? So we enjoy two games in London, sadly we lost to the Yankees in both of those, but amazing experience and Major League Baseball really hats off to those guys, what they did to kind of pull that together. >> You mentioned Statcast. Every year when I meet with Andy Jassy at AWS, he's a sports fan. We love to talk sports. That's a huge, kind of shows the power of data and cloud computing. >> No doubt. >> How do you guys interface with Statcast? Is that an Amazon thing? Do they come to you? Are they leveraging dimensions, camera angles? How does that all work? Are you guys involved in that or? >> Brian: Oh yeah, yeah. >> Is that separate? >> So Statcast is just one of many data feeds as you can imagine. One of the things that Major League Baseball does is all that type of data is readily available to every club. So every club has access to the data. The real competitive differentiator, if you will, is how you use it internally. Like how your analysts can consume that data. We have a baseball system we call Beacon. We retired Carmine, if you're familiar with the old days of Carmine. So we retired Carmine a few years ago with Beacon. And Beacon for us represents sort of our opportunity to effectively collapse all this information into a decision-making environment that allows us to hopefully to kind of make the best decisions to win the most games. >> I love that you're answering all these questions. I really appreciate it. The one I really want to get into is obviously the fan experience. We talked about that. No talent on the field means no World Series so you got to always be constantly replenishing the talent pool, farm system, recruiting, scouting, all these things go on. They're instrumental. Data's a key driver. What new innovations that the casual fan or IT person might be interested in what's going on around scouting and understanding the asset of a human being? >> Right. Sure. I mean some of this gets highly confidential and things, but I think at a macro level, as you start to see both in the minor leagues and in some portions of the major leagues, wearable technologies. I think beyond just sort of player performance information that you would see traditionally with you might associate it with like Billy Beane, and things like that with "Moneyball" which is evolved obviously considerably since those days. I mean understanding sort of player wellness, understanding sort of how to get the most out of a player and understanding sort of, be able to kind of predict potential injuries and accelerate recoveries and being able to use all of this technology where appropriate to really kind of help sort of maximize the value of player performance. I mean, David Ortiz, you know, I don't know where we would have been in 2018 without, you know, David. >> John: Yeah. >> But like, you know >> Longevity of a player. >> Absolutely. >> To when they're in the zone. You wear a ring now to tell you if you're sleeping well. Will managers have a visual, in-the-zone, don't pull 'em out, he can go an extra inning? >> Well, I mean they have a lot of data. We currently don't provide all that data to the clubhouse. I mean, you know, and so If you're in the dugout, that information isn't always readily available type of thing. But players know all this information. We continue to evolve it. At the end of the day though, it's finding the balancing act between data and the aptitudes of our coaching staff and our managers to really make the wise decisions. >> Brian, final question for you. What's the coolest thing you're working on right now? Besides the fan having a great experience, 'cause that's you kind of touched on that. What's the coolest thing that you're excited about that you're working on from a tech perspective that you think is going to be game-changing or interesting? >> I think our cloud strategy coming up in the future. It's still a little bit early stage, but our hope would be to kind of have clarity about that in the next couple months. I think is going to be a game-changer for us. I think having, you know, we enjoy a great relationship with Dell EMC and yet we also do work in the cloud and so being able to leverage the best of both of those to be able to kind of create sort of a compelling experience for both fans, for both player, baseball operations as well as sort of running an efficient business, I think is really what we're all about. >> I mean you guys are the poster child for hybrid cloud because you got core, data center, IoT, and >> No doubt. So it's exciting times. And we're very fortunate that with our relationship organizations like Dell and EMC, we have leading-edge technologies. So we're excited about where that can go and kind of what that can mean. It'll be a big step. >> Okay two personal questions from me as a fan. One is there really a money-counting room like in the movie "The Town"? Where they count a big stack of dollar bills. >> Well, I'm sure there is. I personally haven't visited it. (laughs) I know it's not in the room that they would tell you it is on the movie. (laughter) >> And finally, can The Cube get press passes to cover the games, next to NESN? Talk tech. >> Yeah, we'll see what we can do. >> They can talk baseball. We can talk about bandwidth. Right now, it's the level five conductivity. We're looking good on the pipes. >> Yeah we'll give you a tech tour. And you guys can sort of help us articulate all that to the fans. >> Thank you so much. Brian Shield, Vice President of Technology of the Boston Red Sox. Here talking about security and also the complications and challenges but the mega-opportunities around what digital and fan experiences are with the physical product like baseball, encapsulates kind of the digital revolution that's happening. So keep covering it. Here in Miami, I'm John Furrier. We'll be right back after this short break. (techno music)

Published Date : Oct 15 2019

SUMMARY :

Brought to you by Acronis. We are in Miami Beach, the Fontainebleau Hotel. It's great to be here. John: So congratulations on the rings. Hey we appreciate that. You got to show Which camera is the good one? Bummer about this year. Again, things move on, but you know. Fenway Park, the cathedral of baseball parks. because of the threats. So you got business, team, fans. sort of relish the nostalgia of sports But over the last six, seven years, you know and I think it really speaks to sort of and digital has certainly consumed the world. You speak to a theater. So therefore, the technology has to be seamless. Well the data's got to be ubiquitous, right? about Fenway Park and how we modernize, and having things on brand as well. Saying being on brand, not kind of tearing down the old. that you may not have had before. One of the challenges that you guys have in Boston, that you guys are looking at Yeah so Fenway Park, we struggle as you know, Bentley, Babson, all the schools in the area. and the role that technology can play in the future. to cyber protection. What is the security kind of posture that you guys have? These guys are the lifeblood of our, you know, so those are end points now connecting to your network. for both ourselves and for all the touchpoints to fans. So I got to ask you the modernization question. So has digital blurred the lines So I mean, first off, the relationship of the franchise agreement, isn't it? really hats off to those guys, That's a huge, kind of shows the power of data One of the things that Major League Baseball does What new innovations that the casual fan or IT person and in some portions of the major leagues, You wear a ring now to tell you if you're sleeping well. and our managers to really make the wise decisions. that you think is going to be game-changing and so being able to leverage the best of both of those and kind of what that can mean. like in the movie "The Town"? I know it's not in the room that they would to cover the games, next to NESN? We're looking good on the pipes. articulate all that to the fans. and also the complications and challenges

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
VenezuelaLOCATION

0.99+

VerizonORGANIZATION

0.99+

DavidPERSON

0.99+

John FurrierPERSON

0.99+

Brian ShieldPERSON

0.99+

Red SoxORGANIZATION

0.99+

2018DATE

0.99+

BostonLOCATION

0.99+

CaliforniaLOCATION

0.99+

AcronisORGANIZATION

0.99+

JohnPERSON

0.99+

BrianPERSON

0.99+

DellORGANIZATION

0.99+

Andy JassyPERSON

0.99+

YankeesORGANIZATION

0.99+

two gamesQUANTITY

0.99+

AramarkORGANIZATION

0.99+

David OrtizPERSON

0.99+

Red soxORGANIZATION

0.99+

MiamiLOCATION

0.99+

StatcastORGANIZATION

0.99+

5,400-seatQUANTITY

0.99+

Las VegasLOCATION

0.99+

tenQUANTITY

0.99+

LondonLOCATION

0.99+

two daysQUANTITY

0.99+

Scudder InvestmentsORGANIZATION

0.99+

AWSORGANIZATION

0.99+

AmazonORGANIZATION

0.99+

Miami BeachLOCATION

0.99+

Boston Red SoxORGANIZATION

0.99+

EnglandLOCATION

0.99+

The TownTITLE

0.99+

southeast AsiaLOCATION

0.99+

Miami Beach, FloridaLOCATION

0.99+

Fenway ParkLOCATION

0.99+

Brad PittPERSON

0.99+

ESPNORGANIZATION

0.99+

EMCORGANIZATION

0.99+

GiantsORGANIZATION

0.99+

BentleyORGANIZATION

0.99+

Latin AmericaLOCATION

0.99+

BeaconORGANIZATION

0.99+

bothQUANTITY

0.99+

World SeriesEVENT

0.99+

first timeQUANTITY

0.99+

both fansQUANTITY

0.99+

weather.comORGANIZATION

0.99+

Major League BaseballORGANIZATION

0.99+

OneQUANTITY

0.99+

125 scoutsQUANTITY

0.98+

FirstQUANTITY

0.98+

Acronis Global Cyber Summit 2019EVENT

0.98+

1912DATE

0.98+

IpswichLOCATION

0.98+

30 clubsQUANTITY

0.98+

Last decadeDATE

0.98+

The CubeORGANIZATION

0.98+

Global Cyber SummitEVENT

0.98+

ChristmasEVENT

0.97+

Day One Wrap | Red Hat Summit 2018


 

San Francisco it's the Red Hat summit 2018 brought to you by Red Hat okay welcome back everyone this is the cube live in San Francisco for Red Hat summit 2018 I'm John for the co-host of the cube and this week for three days of wall-to-wall coverage my co-host analyst is John Tory the co-founder of check reckoning and advisory and community development services firm industry legend formerly VMware's Bentley he was at the Q in 2010 our first ever cube nine years ago John Day one wrap up let's analyze what we heard and dissect and and put Red Hat into day one in the books but you know clearly it's a red-letter day for red hat so to speak your thoughts big day for open shift I think and hybrid cloud right we just saw a lot of signs here that we'll talk about that it's real there's real enterprises here real deployments in the cloud multi-cloud on-site hybrid cloud and i think there's really no doubt about that they really brought a brought the team out and you know red hat's become a bellwether relative to the tech industry because if you look at what they do there's so many irons on the fires but more the most important is that they have huge customer base in the enterprise which they've earned over a decades of work being the open source renegade to the open source darling and Tier one citizen they got a huge install basin they got to manage this so they can't just throw you know spaghetti at the wall they gotta have big solutions they're very technical company very humble but they do make some good tech bets absolutely we'll be talking with the folks from core OS tomorrow they have a couple of other action you know things we'll be talking about a lot of interesting partnerships the the most you know the thing here Linux is real and it's is the 20-year growth and that it's real in the enterprise and I mean the top line think the top line slowed and John is is is kubernetes than the gnu/linux for the cloud and I got to say there's some reality there yeah it's there's no doubt about it I mean then I've got my notes here just my summary for the day is on that point the new wave is here okay the glue layer that kubernetes and containers provide on top of say Linux in this case OpenShift a you know alternative past layer just a few years ago becomes the centerpiece of red hats you know architecture really providing some amazing benefits so I think what's clear is that this new shift this new wave is massive and we've heard on the cube multiple references to tcp/ip HTTP these are seminal moments where there's a massive inflection point where the games just radically changes for the better wealth creation happens startups boom new brands emerged that we've never heard of that just come out of the woodwork entrepreneurial activity hits an all-time high and they all these things are coming yeah I said John I was really impressed if we talk to a number of folks who are involved with technologies that some people might call legacy right we the Java programmers the IBM WebSphere folks they've been you you look at these technologies solid proven tested but yet still over here and adapted for today right and they talked about how they're fitting into openshift how they're fitting into modern application development and you're not leaving those people behind they're really here and you know the old joke going back to say Microsoft when Steve Ballmer was the CEO hell will freeze over when Linux isn't in in Microsoft ecosystem look today no further than what's going on in their developer Commerce called Microsoft build where Linux is the centerpiece of their open-source strategy and Microsoft has transformed themselves into a total open-source world so you know now you got Oracle with giving up Java II calling a Jakarta essentially bringing Java into an the Eclipse community huge move it's a kind of a nuance point but that's another signal of the shifts going on out in the open where communities aren't just yesterday's open source model a new generation of open source actors are coming in a new model I think the CNC F is showing it the Linux Foundation proves that you can have commercialization downstream with open source projects as that catalyst point as a big deal and I think that is happening at a new new level and it's super exciting to see yeah I mean open source is the new normal sure that that works it's in the enterprise but that doesn't mean that open source disappears it actually means that open source and communities and companies coming together to drive innovation actually gets more and more important I kind of thought well you know it's open source well everybody does open source but actually the the dynamics we're seeing of these both large companies partnering with small companies foundations like you talked about the Linux cutlasses various parts the Linux Foundation cloud boundary foundation etc right are really making a big impact well we had earlier on assistant general counsel David Levine and bringing about open source I think one key thing that's notable is this next generation of open source wave comes is the business model of open source and operationalizing it in not just server development lifecycle but in the business operation so for example spending resources on managing proprietary products with that have open source components separate from the community is a resource that you don't have to spend anymore if you just contribute everything to open source that energy can go away so I think open source projects and the product monetization component not new concepts is now highlighted as a bonafide competitive advantage across the company not just proven but like operationally sound legally verified certified and I think also you have to look at the distribution of open source versus the operation and management of open source we see a lot of management managed kubernetes coming out and in fact we didn't talk about today Microsoft big announcement here at the show Microsoft is on Azure is running a managed open ship not not kubernetes they already have kubernetes they're running a managed open ship another way of adding value to an open open source platforms to date directly to the IT operator honestly do you think these kind of deals would happen if you go back four years three years ago oh no way as you're running an open shift absolutely I mean were you crazy the you know the kingdom is turned upside down absolutely this is a notable point I want to get your reaction is because I see this absolutely as validation to the new wave being here with kubernetes containers as a de facto rallying point an inflection point big deals are happening IBM and Red Hat big deal we just talked about them with the players here two bellwether saying we're getting behind containers and two bays in a big way from that relationship essentially it changes the game literally overnight for IBM changes the game for Red Hat I think a little bit more for IBM than Red Hat already gets a ton of benefit but IBM instantly gets a cloud strategy that has a real scalable product market to it Arvind the the head of research laid that out and IBM now can go and compete with major players on deals with the private cloud more deals are coming absolutely this is the beginning now that everyone snapped into place is saying okay kubernetes and containers we now understand this the rallying cry a de facto standard I think a formation is going to happen in the next six to 12 months of major major major players now I mean we are in a not one size does not fit all world John so I mean we will continue to see healthy ecosystems I mean mesosphere and DT cos is still out there Dockers still out there right you will see very functional communities and and functioning application platforms and cloud platforms but you got to say the momentum is here I mean look at amine docker mace those fears look at when things like this happened this is my opinion so I'm just gonna say it out there when you have de facto standards that happen like this it's an opportunity to differentiate so I think what's gonna happen is docker meso sphere and others including the legacy guys like IBM and in others they have to differentiate their products they have to compete software companies so I think docker I think is come tonight at docker con but my opinion looking at from the outside is I think Dockers realized looking we can't make money from containers kubernetes is happening we're a great standard in that let's be a software company let's differentiate around kubernetes so this is just more pressure or more call-to-action to deliver good software hey it's never been of somebody said it's never been a better time to be an IT and IT infrastructure right this is a you think that the tools we have available to us super-powerful another key point I want to get your reaction on with kubernetes and containers this kind of de facto standardization is breathing new life into good initiatives and legacy projects so you think about OpenStack okay OpenStack gets a nice segmented approach is now clear with a where the swim lanes are you're an app developer you go over here and if you are a network and infrastructure guy you're going here but middleware a from talk to the Red Hat guys here we talk to IBM those legacy and apps can put a container around it and don't have to be thrown away and take their natural course now I think it's gonna be a three line through this holy a second life is for legacy and stuff and then to cloud is and it's in second inning because now you have the enablement for cloud your reaction the enablement of cloud Ibn iBM has cloud and then the market shares of nm who you believe they're not in that they're in the top three but they're not double digits according to synergy research and he bought us a little bit higher but still if you compare public cloud they're small they look at IBM's and tire and small base and saying if they have a specialty cloud that can be assembled quit Nellie yeah and scaled and maybe instantly successfully overnight yeah I think a few years ago you know there was a lot different always a few years back it always looks confusing right a few years back we were still arguing public cloud private cloud as private cloud ed is what is a true private cloud is that even valuable I still see people on Twitter making fun of everything anybody who's not 100% into the full public cloud which means they must not have talked to you know a lot of IT folks who have to business to run today so I think you're saying it's a it's a it's a multivalent world multi-cloud there's going to be differentiated clouds there's going to be operational clouds there's gonna be financial clouds and just it's it seems clear that you know from the perspective of right now here in San Francisco and 2018 that that you know the purpose of public-private hybrid seems pretty clear just like the purpose of like I said we're gonna in two weeks we'll be an openstack summit I mean the purpose of that seems pretty clear it's it's funny it's like I had this argument and each Assateague he thinks everything should go the public cloud goes eaten has one of the public clouds but he's kind of right and I and I and we talked about this way I with him I said if everything is running cloud operation we're talking about cloud ops we're talking about how its managed how its deployed code bases across the board if everything is clarified from an OP raishin standpoint the Dearing on Prem and cloud and IOT edge is there's no difference stuffs moving around so you almost treats a data center as an edge network so now it's sexually all cloud in my mind so then and also you do have to keep in mind time time horizons right anybody who has to do work the today this quarter right has to keep in mind what's what what portfolio of business deeds and tools do I have right now versus what it's gonna look like in a few years all right so I want to get your thoughts on your walk away from today I'll start my walk away from day one was talking some of the practitioners Macquarie Bank and Amadeus to me they're a tell signed the canary in the coalmine what's happening horizontally scalable synchronous infrastructure the new model is here now we're seeing them saying things like it's a streaming world not just Kafka for streaming data streaming services levels of granularity that at workers traded with containers and kubernetes up and down the stack to me architects who think that way will have a preferred advantage over everybody else that to me was like okay we're seeing it play out I guess I totally agree right the future isn't evenly distributed my takeaway though is there's certainly a future here and the people we talked to today are doing real-world enterprise scale multi-cloud micro services and modern architectures incorporating their legacy applications and components and that and they're just doing it and they're not even breaking a sweat so I think IT has really changed ok day one coverage continues day two tomorrow we have three days of wall-to-wall coverage day two and then finally day three Thursday here in San Francisco this is the cubes live coverage go to the cube dotnet to check out all the videos they're gonna be going up as soon as they are done live here and check out all the cube alumni and check out Silicon angle comm for all news coverage then of course you got tech reckoning Jon's company's the co-founder of for John Fourier and John Shroyer that's day one in the books thanks for watching see you tomorrow

Published Date : May 9 2018

**Summary and Sentiment Analysis are not been shown because of improper transcript**

ENTITIES

EntityCategoryConfidence
David LevinePERSON

0.99+

JohnPERSON

0.99+

John ShroyerPERSON

0.99+

Steve BallmerPERSON

0.99+

John ToryPERSON

0.99+

IBMORGANIZATION

0.99+

Java IITITLE

0.99+

John FourierPERSON

0.99+

2018DATE

0.99+

MicrosoftORGANIZATION

0.99+

20-yearQUANTITY

0.99+

San FranciscoLOCATION

0.99+

Linux FoundationORGANIZATION

0.99+

100%QUANTITY

0.99+

JonPERSON

0.99+

Macquarie BankORGANIZATION

0.99+

Red HatORGANIZATION

0.99+

todayDATE

0.99+

JavaTITLE

0.99+

three daysQUANTITY

0.99+

John DayPERSON

0.99+

CNC FORGANIZATION

0.99+

VMwareORGANIZATION

0.99+

OracleORGANIZATION

0.99+

tomorrowDATE

0.99+

nine years agoDATE

0.99+

San FranciscoLOCATION

0.98+

ThursdayDATE

0.98+

bothQUANTITY

0.98+

three daysQUANTITY

0.98+

2010DATE

0.98+

two baysQUANTITY

0.98+

ArvindPERSON

0.98+

yesterdayDATE

0.98+

LinuxTITLE

0.98+

tonightDATE

0.97+

EclipseTITLE

0.97+

over a decadesQUANTITY

0.97+

firstQUANTITY

0.96+

12 monthsQUANTITY

0.96+

Red Hat Summit 2018EVENT

0.96+

AmadeusORGANIZATION

0.96+

this weekDATE

0.96+

AssateaguePERSON

0.95+

one key thingQUANTITY

0.95+

Red HatTITLE

0.94+

JakartaLOCATION

0.94+

secondQUANTITY

0.93+

day twoQUANTITY

0.93+

AzureTITLE

0.93+

gnuTITLE

0.92+

day threeQUANTITY

0.91+

two weeksQUANTITY

0.91+

Red Hat summit 2018EVENT

0.9+

oneQUANTITY

0.9+

red hatEVENT

0.9+

day oneQUANTITY

0.89+

Red Hat summit 2018EVENT

0.87+

new waveEVENT

0.85+

twoQUANTITY

0.84+

few years agoDATE

0.84+

day oneQUANTITY

0.84+

sixQUANTITY

0.84+

Tier oneQUANTITY

0.83+

TwitterORGANIZATION

0.82+

day oneQUANTITY

0.82+

a few years agoDATE

0.82+

few years backDATE

0.8+