Dhabaleswar “DK” Panda, Ohio State State University | SuperComputing 22
>>Welcome back to The Cube's coverage of Supercomputing Conference 2022, otherwise known as SC 22 here in Dallas, Texas. This is day three of our coverage, the final day of coverage here on the exhibition floor. I'm Dave Nicholson, and I'm here with my co-host, tech journalist extraordinaire, Paul Gillum. How's it going, >>Paul? Hi, Dave. It's going good. >>And we have a wonderful guest with us this morning, Dr. Panda from the Ohio State University. Welcome Dr. Panda to the Cube. >>Thanks a lot. Thanks a lot to >>Paul. I know you're, you're chopping at >>The bit, you have incredible credentials, over 500 papers published. The, the impact that you've had on HPC is truly remarkable. But I wanted to talk to you specifically about a product project you've been working on for over 20 years now called mva, high Performance Computing platform that's used by more than 32 organ, 3,200 organizations across 90 countries. You've shepherded this from, its, its infancy. What is the vision for what MVA will be and and how is it a proof of concept that others can learn from? >>Yeah, Paul, that's a great question to start with. I mean, I, I started with this conference in 2001. That was the first time I came. It's very coincidental. If you remember the Finman Networking Technology, it was introduced in October of 2000. Okay. So in my group, we were working on NPI for Marinette Quadrics. Those are the old technology, if you can recollect when Finman was there, we were the very first one in the world to really jump in. Nobody knew how to use Infin van in an HPC system. So that's how the Happy Project was born. And in fact, in super computing 2002 on this exhibition floor in Baltimore, we had the first demonstration, the open source happy, actually is running on an eight node infinite van clusters, eight no zeros. And that was a big challenge. But now over the years, I means we have continuously worked with all infinite van vendors, MPI Forum. >>We are a member of the MPI Forum and also all other network interconnect. So we have steadily evolved this project over the last 21 years. I'm very proud of my team members working nonstop, continuously bringing not only performance, but scalability. If you see now INFIN event are being deployed in 8,000, 10,000 node clusters, and many of these clusters actually use our software, stack them rapid. So, so we have done a lot of, like our focuses, like we first do research because we are in academia. We come up with good designs, we publish, and in six to nine months, we actually bring it to the open source version and people can just download and then use it. And that's how currently it's been used by more than 3000 orange in 90 countries. And, but the interesting thing is happening, your second part of the question. Now, as you know, the field is moving into not just hvc, but ai, big data, and we have those support. This is where like we look at the vision for the next 20 years, we want to design this MPI library so that not only HPC but also all other workloads can take advantage of it. >>Oh, we have seen libraries that become a critical develop platform supporting ai, TensorFlow, and, and the pie torch and, and the emergence of, of, of some sort of default languages that are, that are driving the community. How, how important are these frameworks to the, the development of the progress making progress in the HPC world? >>Yeah, no, those are great. I mean, spite our stencil flow, I mean, those are the, the now the bread and butter of deep learning machine learning. Am I right? But the challenge is that people use these frameworks, but continuously models are becoming larger. You need very first turnaround time. So how do you train faster? How do you do influencing faster? So this is where HPC comes in and what exactly what we have done is actually we have linked floor fighters to our happy page because now you see the MPI library is running on a million core system. Now your fighters and tenor four clan also be scaled to to, to those number of, large number of course and gps. So we have actually done that kind of a tight coupling and that helps the research to really take advantage of hpc. >>So if, if a high school student is thinking in terms of interesting computer science, looking for a place, looking for a university, Ohio State University, bruns, world renowned, widely known, but talk about what that looks like from a day on a day to day basis in terms of the opportunity for undergrad and graduate students to participate in, in the kind of work that you do. What is, what does that look like? And is, and is that, and is that a good pitch to for, for people to consider the university? >>Yes. I mean, we continuously, from a university perspective, by the way, the Ohio State University is one of the largest single campus in, in us, one of the top three, top four. We have 65,000 students. Wow. It's one of the very largest campus. And especially within computer science where I am located, high performance computing is a very big focus. And we are one of the, again, the top schools all over the world for high performance computing. And we also have very strength in ai. So we always encourage, like the new students who like to really work on top of the art solutions, get exposed to the concepts, principles, and also practice. Okay. So, so we encourage those people that wish you can really bring you those kind of experience. And many of my past students, staff, they're all in top companies now, have become all big managers. >>How, how long, how long did you say you've been >>At 31 >>Years? 31 years. 31 years. So, so you, you've had people who weren't alive when you were already doing this stuff? That's correct. They then were born. Yes. They then grew up, yes. Went to university graduate school, and now they're on, >>Now they're in many top companies, national labs, all over the universities, all over the world. So they have been trained very well. Well, >>You've, you've touched a lot of lives, sir. >>Yes, thank you. Thank >>You. We've seen really a, a burgeoning of AI specific hardware emerge over the last five years or so. And, and architectures going beyond just CPUs and GPUs, but to Asics and f PGAs and, and accelerators, does this excite you? I mean, are there innovations that you're seeing in this area that you think have, have great promise? >>Yeah, there is a lot of promise. I think every time you see now supercomputing technology, you see there is sometime a big barrier comes barrier jump. Rather I'll say, new technology comes some disruptive technology, then you move to the next level. So that's what we are seeing now. A lot of these AI chips and AI systems are coming up, which takes you to the next level. But the bigger challenge is whether it is cost effective or not, can that be sustained longer? And this is where commodity technology comes in, which commodity technology tries to take you far longer. So we might see like all these likes, Gaudi, a lot of new chips are coming up, can they really bring down the cost? If that cost can be reduced, you will see a much more bigger push for AI solutions, which are cost effective. >>What, what about on the interconnect side of things, obvi, you, you, your, your start sort of coincided with the initial standards for Infin band, you know, Intel was very, very, was really big in that, in that architecture originally. Do you see interconnects like RDMA over converged ethernet playing a part in that sort of democratization or commoditization of things? Yes. Yes. What, what are your thoughts >>There for internet? No, this is a great thing. So, so we saw the infinite man coming. Of course, infinite Man is, commod is available. But then over the years people have been trying to see how those RDMA mechanisms can be used for ethernet. And then Rocky has been born. So Rocky has been also being deployed. But besides these, I mean now you talk about Slingshot, the gray slingshot, it is also an ethernet based systems. And a lot of those RMA principles are actually being used under the hood. Okay. So any modern networks you see, whether it is a Infin and Rocky Links art network, rock board network, you name any of these networks, they are using all the very latest principles. And of course everybody wants to make it commodity. And this is what you see on the, on the slow floor. Everybody's trying to compete against each other to give you the best performance with the lowest cost, and we'll see whoever wins over the years. >>Sort of a macroeconomic question, Japan, the US and China have been leapfrogging each other for a number of years in terms of the fastest supercomputer performance. How important do you think it is for the US to maintain leadership in this area? >>Big, big thing, significantly, right? We are saying that I think for the last five to seven years, I think we lost that lead. But now with the frontier being the number one, starting from the June ranking, I think we are getting that leadership back. And I think it is very critical not only for fundamental research, but for national security trying to really move the US to the leading edge. So I hope us will continue to lead the trend for the next few years until another new system comes out. >>And one of the gating factors, there is a shortage of people with data science skills. Obviously you're doing what you can at the university level. What do you think can change at the secondary school level to prepare students better to, for data science careers? >>Yeah, I mean that is also very important. I mean, we, we always call like a pipeline, you know, that means when PhD levels we are expecting like this even we want to students to get exposed to, to, to many of these concerts from the high school level. And, and things are actually changing. I mean, these days I see a lot of high school students, they, they know Python, how to program in Python, how to program in sea object oriented things. Even they're being exposed to AI at that level. So I think that is a very healthy sign. And in fact we, even from Ohio State side, we are always engaged with all this K to 12 in many different programs and then gradually trying to take them to the next level. And I think we need to accelerate also that in a very significant manner because we need those kind of a workforce. It is not just like a building a system number one, but how do we really utilize it? How do we utilize that science? How do we propagate that to the community? Then we need all these trained personal. So in fact in my group, we are also involved in a lot of cyber training activities for HPC professionals. So in fact, today there is a bar at 1 1 15 I, yeah, I think 1215 to one 15. We'll be talking more about that. >>About education. >>Yeah. Cyber training, how do we do for professionals? So we had a funding together with my co-pi, Dr. Karen Tom Cook from Ohio Super Center. We have a grant from NASA Science Foundation to really educate HPT professionals about cyber infrastructure and ai. Even though they work on some of these things, they don't have the complete knowledge. They don't get the time to, to learn. And the field is moving so fast. So this is how it has been. We got the initial funding, and in fact, the first time we advertised in 24 hours, we got 120 application, 24 hours. We couldn't even take all of them. So, so we are trying to offer that in multiple phases. So, so there is a big need for those kind of training sessions to take place. I also offer a lot of tutorials at all. Different conference. We had a high performance networking tutorial. Here we have a high performance deep learning tutorial, high performance, big data tutorial. So I've been offering tutorials at, even at this conference since 2001. Good. So, >>So in the last 31 years, the Ohio State University, as my friends remind me, it is properly >>Called, >>You've seen the world get a lot smaller. Yes. Because 31 years ago, Ohio, in this, you know, of roughly in the, in the middle of North America and the United States was not as connected as it was to everywhere else in the globe. So that's, that's pro that's, I i it kind of boggles the mind when you think of that progression over 31 years, but globally, and we talk about the world getting smaller, we're sort of in the thick of, of the celebratory seasons where, where many, many groups of people exchange gifts for varieties of reasons. If I were to offer you a holiday gift, that is the result of what AI can deliver the world. Yes. What would that be? What would, what would, what would the first thing be? This is, this is, this is like, it's, it's like the genie, but you only get one wish. >>I know, I know. >>So what would the first one be? >>Yeah, it's very hard to answer one way, but let me bring a little bit different context and I can answer this. I, I talked about the happy project and all, but recently last year actually we got awarded an S f I institute award. It's a 20 million award. I am the overall pi, but there are 14 universities involved. >>And who is that in that institute? >>What does that Oh, the I ici. C e. Okay. I cycle. You can just do I cycle.ai. Okay. And that lies with what exactly what you are trying to do, how to bring lot of AI for masses, democratizing ai. That's what is the overall goal of this, this institute, think of like a, we have three verticals we are working think of like one is digital agriculture. So I'll be, that will be my like the first ways. How do you take HPC and AI to agriculture the world as though we just crossed 8 billion people. Yeah, that's right. We need continuous food and food security. How do we grow food with the lowest cost and with the highest yield? >>Water >>Consumption. Water consumption. Can we minimize or minimize the water consumption or the fertilization? Don't do blindly. Technologies are out there. Like, let's say there is a weak field, A traditional farmer see that, yeah, there is some disease, they will just go and spray pesticides. It is not good for the environment. Now I can fly it drone, get images of the field in the real time, check it against the models, and then it'll tell that, okay, this part of the field has disease. One, this part of the field has disease. Two, I indicate to the, to the tractor or the sprayer saying, okay, spray only pesticide one, you have pesticide two here. That has a big impact. So this is what we are developing in that NSF A I institute I cycle ai. We also have, we have chosen two additional verticals. One is animal ecology, because that is very much related to wildlife conservation, climate change, how do you understand how the animals move? Can we learn from them? And then see how human beings need to act in future. And the third one is the food insecurity and logistics. Smart food distribution. So these are our three broad goals in that institute. How do we develop cyber infrastructure from below? Combining HP c AI security? We have, we have a large team, like as I said, there are 40 PIs there, 60 students. We are a hundred members team. We are working together. So, so that will be my wish. How do we really democratize ai? >>Fantastic. I think that's a great place to wrap the conversation here On day three at Supercomputing conference 2022 on the cube, it was an honor, Dr. Panda working tirelessly at the Ohio State University with his team for 31 years toiling in the field of computer science and the end result, improving the lives of everyone on Earth. That's not a stretch. If you're in high school thinking about a career in computer science, keep that in mind. It isn't just about the bits and the bobs and the speeds and the feeds. It's about serving humanity. Maybe, maybe a little, little, little too profound a statement, I would argue not even close. I'm Dave Nicholson with the Queue, with my cohost Paul Gillin. Thank you again, Dr. Panda. Stay tuned for more coverage from the Cube at Super Compute 2022 coming up shortly. >>Thanks a lot.
SUMMARY :
Welcome back to The Cube's coverage of Supercomputing Conference 2022, And we have a wonderful guest with us this morning, Dr. Thanks a lot to But I wanted to talk to you specifically about a product project you've So in my group, we were working on NPI for So we have steadily evolved this project over the last 21 years. that are driving the community. So we have actually done that kind of a tight coupling and that helps the research And is, and is that, and is that a good pitch to for, So, so we encourage those people that wish you can really bring you those kind of experience. you were already doing this stuff? all over the world. Thank this area that you think have, have great promise? I think every time you see now supercomputing technology, with the initial standards for Infin band, you know, Intel was very, very, was really big in that, And this is what you see on the, Sort of a macroeconomic question, Japan, the US and China have been leapfrogging each other for a number the number one, starting from the June ranking, I think we are getting that leadership back. And one of the gating factors, there is a shortage of people with data science skills. And I think we need to accelerate also that in a very significant and in fact, the first time we advertised in 24 hours, we got 120 application, that's pro that's, I i it kind of boggles the mind when you think of that progression over 31 years, I am the overall pi, And that lies with what exactly what you are trying to do, to the tractor or the sprayer saying, okay, spray only pesticide one, you have pesticide two here. I think that's a great place to wrap the conversation here On
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Dave Nicholson | PERSON | 0.99+ |
Paul Gillum | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
Paul Gillin | PERSON | 0.99+ |
October of 2000 | DATE | 0.99+ |
Paul | PERSON | 0.99+ |
NASA Science Foundation | ORGANIZATION | 0.99+ |
2001 | DATE | 0.99+ |
Baltimore | LOCATION | 0.99+ |
8,000 | QUANTITY | 0.99+ |
14 universities | QUANTITY | 0.99+ |
31 years | QUANTITY | 0.99+ |
20 million | QUANTITY | 0.99+ |
24 hours | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
Karen Tom Cook | PERSON | 0.99+ |
60 students | QUANTITY | 0.99+ |
Ohio State University | ORGANIZATION | 0.99+ |
90 countries | QUANTITY | 0.99+ |
six | QUANTITY | 0.99+ |
Earth | LOCATION | 0.99+ |
Panda | PERSON | 0.99+ |
today | DATE | 0.99+ |
65,000 students | QUANTITY | 0.99+ |
3,200 organizations | QUANTITY | 0.99+ |
North America | LOCATION | 0.99+ |
Python | TITLE | 0.99+ |
United States | LOCATION | 0.99+ |
Dallas, Texas | LOCATION | 0.99+ |
over 500 papers | QUANTITY | 0.99+ |
June | DATE | 0.99+ |
One | QUANTITY | 0.99+ |
more than 32 organ | QUANTITY | 0.99+ |
120 application | QUANTITY | 0.99+ |
Ohio | LOCATION | 0.99+ |
more than 3000 orange | QUANTITY | 0.99+ |
first ways | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
nine months | QUANTITY | 0.99+ |
40 PIs | QUANTITY | 0.99+ |
Asics | ORGANIZATION | 0.99+ |
MPI Forum | ORGANIZATION | 0.98+ |
China | ORGANIZATION | 0.98+ |
Two | QUANTITY | 0.98+ |
Ohio State State University | ORGANIZATION | 0.98+ |
8 billion people | QUANTITY | 0.98+ |
Intel | ORGANIZATION | 0.98+ |
HP | ORGANIZATION | 0.97+ |
Dr. | PERSON | 0.97+ |
over 20 years | QUANTITY | 0.97+ |
US | ORGANIZATION | 0.97+ |
Finman | ORGANIZATION | 0.97+ |
Rocky | PERSON | 0.97+ |
Japan | ORGANIZATION | 0.97+ |
first time | QUANTITY | 0.97+ |
first demonstration | QUANTITY | 0.96+ |
31 years ago | DATE | 0.96+ |
Ohio Super Center | ORGANIZATION | 0.96+ |
three broad goals | QUANTITY | 0.96+ |
one wish | QUANTITY | 0.96+ |
second part | QUANTITY | 0.96+ |
31 | QUANTITY | 0.96+ |
Cube | ORGANIZATION | 0.95+ |
eight | QUANTITY | 0.95+ |
over 31 years | QUANTITY | 0.95+ |
10,000 node clusters | QUANTITY | 0.95+ |
day three | QUANTITY | 0.95+ |
first | QUANTITY | 0.95+ |
INFIN | EVENT | 0.94+ |
seven years | QUANTITY | 0.94+ |
Dhabaleswar “DK” Panda | PERSON | 0.94+ |
three | QUANTITY | 0.93+ |
S f I institute | TITLE | 0.93+ |
first thing | QUANTITY | 0.93+ |
Adam Meyers, CrowdStrike | CrowdStrike Fal.Con 2022
>> We're back at the ARIA Las Vegas. We're covering CrowdStrike's Fal.Con 22. First one since 2019. Dave Vellante and Dave Nicholson on theCUBE. Adam Meyers is here, he is the Senior Vice President of Intelligence at CrowdStrike. Adam, thanks for coming to theCUBE. >> Thanks for having me. >> Interesting times, isn't it? You're very welcome. Senior Vice President of Intelligence, tell us what your role is. >> So I run all of our intelligence offerings. All of our analysts, we have a couple hundred analysts that work at CrowdStrike tracking threat actors. There's 185 threat actors that we track today. We're constantly adding more of them and it requires us to really have that visibility and understand how they operate so that we can inform our other products: our XDR, our Cloud Workload Protections and really integrate all of this around the threat actor. >> So it's that threat hunting capability that CrowdStrike has. That's what you're sort of... >> Well, so think of it this way. When we launched the company 11 years ago yesterday, what we wanted to do was to tell customers, to tell people that, well, you don't have a malware problem, you have an adversary problem. There are humans that are out there conducting these attacks, and if you know who they are what they're up to, how they operate then you're better positioned to defend against them. And so that's really at the core, what CrowdStrike started with and all of our products are powered by intelligence. All of our services are our OverWatch and our Falcon complete, all powered by intelligence because we want to know who the threat actors are and what they're doing so we can stop them. >> So for instance like you can stop known malware. A lot of companies can stop known malware, but you also can stop unknown malware. And I infer that the intelligence is part of that equation, is that right? >> Absolutely. That that's the outcome. That's the output of the intelligence but I could also tell you who these threat actors are, where they're operating out of, show you pictures of some of them, that's the threat intel. We are tracking down to the individual persona in many cases, these various threats whether they be Chinese nation state, Russian threat actors, Iran, North Korea, we track as I said, quite a few of these threats. And over time, we develop a really robust deep knowledge about who they are and how they operate. >> Okay. And we're going to get into some of that, the big four and cyber. But before we do, I want to ask you about the eCrime index stats, the ECX you guys call it a little side joke for all your nerds out there. Maybe you could explain that Adam >> Assembly humor. >> Yeah right, right. So, but, what is that index? You guys, how often do you publish it? What are you learning from that? >> Yeah, so it was modeled off of the Dow Jones industrial average. So if you look at the Dow Jones it's a composite index that was started in the late 1800s. And they took a couple of different companies that were the industrial component of the economy back then, right. Textiles and railroads and coal and steel and things like that. And they use that to approximate the overall health of the economy. So if you take these different stocks together, swizzle 'em together, and figure out some sort of number you could say, look, it's up. The economy's doing good. It's down, not doing so good. So after World War II, everybody was exuberant and positive about the end of the war. The DGI goes up, the oil crisis in the seventies goes down, COVID hits goes up, sorry, goes down. And then everybody realizes that they can use Amazon still and they can still get the things they need goes back up with the eCrime index. We took that approach to say what is the health of the underground economy? When you read about any of these ransomware attacks or data extortion attacks there are criminal groups that are working together in order to get things spammed out or to buy credentials and things like that. And so what the eCrime index does is it takes 24 different observables, right? The price of a ransom, the number of ransom attacks, the fluctuation in cryptocurrency, how much stolen material is being sold for on the underground. And we're constantly computing this number to understand is the eCrime ecosystem healthy? Is it thriving or is it under pressure? And that lets us understand what's going on in the world and kind of contextualize it. Give an example, Microsoft on patch Tuesday releases 56 vulnerabilities. 11 of them are critical. Well guess what? After hack Tuesday. So after patch Tuesday is hack Wednesday. And so all of those 11 vulnerabilities are exploitable. And now you have threat actors that have a whole new array of weapons that they can deploy and bring to bear against their victims after that patch Tuesday. So that's hack Wednesday. Conversely we'll get something like the colonial pipeline. Colonial pipeline attack May of 21, I think it was, comes out and all of the various underground forums where these ransomware operators are doing their business. They freak out because they don't want law enforcement. President Biden is talking about them and he's putting pressure on them. They don't want this ransomware component of what they're doing to bring law enforcement, bring heat on them. So they deplatform them. They kick 'em off. And when they do that, the ransomware stops being as much of a factor at that point in time. And the eCrime index goes down. So we can look at holidays, and right around Thanksgiving, which is coming up pretty soon, it's going to go up because there's so much online commerce with cyber Monday and such, right? You're going to see this increase in online activity; eCrime actors want to take advantage of that. When Christmas comes, they take vacation too; they're going to spend time with their families, so it goes back down and it stays down till around the end of the Russian Orthodox Christmas, which you can probably extrapolate why that is. And then it goes back up. So as it's fluctuating, it gives us the ability to really just start tracking what that economy looks like. >> Realtime indicator of that crypto. >> I mean, you talked about, talked about hack Wednesday, and before that you mentioned, you know, the big four, and I think you said 185 threat actors that you're tracking, is 180, is number 185 on that list? Somebody living in their basement in their mom's basement or are the resources necessary to get on that list? Such that it's like, no, no, no, no. this is very, very organized, large groups of people. Hollywood would have you believe that it's guy with a laptop, hack Wednesday, (Dave Nicholson mimics keyboard clacking noises) and everything done. >> Right. >> Are there individuals who are doing things like that or are these typically very well organized? >> That's a great question. And I think it's an important one to ask and it's both it tends to be more, the bigger groups. There are some one-off ones where it's one or two people. Sometimes they get big. Sometimes they get small. One of the big challenges. Have you heard of ransomware as a service? >> Of course. Oh my God. Any knucklehead can be a ransomwarist. >> Exactly. So we don't track those knuckleheads as much unless they get onto our radar somehow, they're conducting a lot of operations against our customers or something like that. But what we do track is that ransomware as a service platform because the affiliates, the people that are using it they come, they go and, you know, it could be they're only there for a period of time. Sometimes they move between different ransomware services, right? They'll use the one that's most useful for them that that week or that month, they're getting the best rate because it's rev sharing. They get a percentage that platform gets percentage of the ransom. So, you know, they negotiate a better deal. They might move to a different ransomware platform. So that's really hard to track. And it's also, you know, I think more important for us to understand the platform and the technology that is being used than the individual that's doing it. >> Yeah. Makes sense. Alright, let's talk about the big four. China, Iran, North Korea, and Russia. Tell us about, you know, how you monitor these folks. Are there different signatures for each? Can you actually tell, you know based on the hack who's behind it? >> So yeah, it starts off, you know motivation is a huge factor. China conducts espionage, they do it for diplomatic purposes. They do it for military and political purposes. And they do it for economic espionage. All of these things map to known policies that they put out, the Five Year Plan, the Made in China 2025, the Belt and Road Initiative, it's all part of their efforts to become a regional and ultimately a global hegemon. >> They're not stealing nickels and dimes. >> No they're stealing intellectual property. They're stealing trade secrets. They're stealing negotiation points. When there's, you know a high speed rail or something like that. And they use a set of tools and they have a set of behaviors and they have a set of infrastructure and a set of targets that as we look at all of these things together we can derive who they are by motivation and the longer we observe them, the more data we get, the more we can get that attribution. I could tell you that there's X number of Chinese threat groups that we track under Panda, right? And they're associated with the Ministry of State Security. There's a whole other set. That's too associated with the People's Liberation Army Strategic Support Force. So, I mean, these are big operations. They're intelligence agencies that are operating out of China. Iran has a different set of targets. They have a different set of motives. They go after North American and Israeli businesses right now that's kind of their main operation. And they're doing something called hack and lock and leak. With a lock and leak, what they're doing is they're deploying ransomware. They don't care about getting a ransom payment. They're just doing it to disrupt the target. And then they're leaking information that they steal during that operation that brings embarrassment. It brings compliance, regulatory, legal impact for that particular entity. So it's disruptive >> The chaos creators that's.. >> Well, you know I think they're trying to create a they're trying to really impact the legitimacy of some of these targets and the trust that their customers and their partners and people have in them. And that is psychological warfare in a certain way. And it, you know is really part of their broader initiative. Look at some of the other things that they've done they've hacked into like the missile defense system in Israel, and they've turned on the sirens, right? Those are all things that they're doing for a specific purpose, and that's not China, right? Like as you start to look at this stuff, you can start to really understand what they're up to. Russia very much been busy targeting NATO and NATO countries and Ukraine. Obviously the conflict that started in February has been a huge focus for these threat actors. And then as we look at North Korea, totally different. They're doing, there was a major crypto attack today. They're going after these crypto platforms, they're going after DeFi platforms. They're going after all of this stuff that most people don't even understand and they're stealing the crypto currency and they're using it for revenue generation. These nuclear weapons don't pay for themselves, their research and development don't pay for themselves. And so they're using that cyber operation to either steal money or steal intelligence. >> They need the cash. Yeah. >> Yeah. And they also do economic targeting because Kim Jong Un had said back in 2016 that they need to improve the lives of North Koreans. They have this national economic development strategy. And that means that they need, you know, I think only 30% of North Korea has access to reliable power. So having access to clean energy sources and renewable energy sources, that's important to keep the people happy and stop them from rising up against the regime. So that's the type of economic espionage that they're conducting. >> Well, those are the big four. If there were big five or six, I would presume US and some Western European countries would be on there. Do you track, I mean, where United States obviously has you know, people that are capable of this we're out doing our thing, and- >> So I think- >> That defense or offense, where do we sit in this matrix? >> Well, I think the big five would probably include eCrime. We also track India, Pakistan. We track actors out of Columbia, out of Turkey, out of Syria. So there's a whole, you know this problem is getting worse over time. It's proliferating. And I think COVID was also, you know a driver there because so many of these countries couldn't move human assets around because everything was getting locked down. As machine learning and artificial intelligence and all of this makes its way into the cameras at border and transfer points, it's hard to get a human asset through there. And so cyber is a very attractive, cheap and deniable form of espionage and gives them operational capabilities, not, you know and to your question about US and other kind of five I friendly type countries we have not seen them targeting our customers. So we focus on the threats that target our customers. >> Right. >> And so, you know, if we were to find them at a customer environment sure. But you know, when you look at some of the public reporting that's out there, the malware that's associated with them is focused on, you know, real bad people, and it's, it's physically like crypted to their hard drive. So unless you have sensor on, you know, an Iranian or some other laptop that might be target or something like that. >> Well, like Stuxnet did. >> Yeah. >> Right so. >> You won't see it. Right. See, so yeah. >> Well Symantec saw it but way back when right? Back in the day. >> Well, I mean, if you want to go down that route I think it actually came from a company in the region that was doing the IR and they were working with Symantec. >> Oh, okay. So, okay. So it was a local >> Yeah. I think Crisis, I think was the company that first identified it. And then they worked with Symantec. >> It Was, they found it, I guess, a logic controller. I forget what it was. >> It was a long time ago, so I might not have that completely right. >> But it was a seminal moment in the industry. >> Oh. And it was a seminal moment for Iran because you know, that I think caused them to get into cyber operations. Right. When they realized that something like that could happen that bolstered, you know there was a lot of underground hacking forums in Iran. And, you know, after Stuxnet, we started seeing that those hackers were dropping their hacker names and they were starting businesses. They were starting to try to go after government contracts. And they were starting to build training offensive programs, things like that because, you know they realized that this is an opportunity there. >> Yeah. We were talking earlier about this with Shawn and, you know, in the nuclear war, you know the Cold War days, you had the mutually assured destruction. It's not as black and white in the cyber world. Right. Cause as, as Robert Gates told me, you know a few years ago, we have a lot more to lose. So we have to be somewhat, as the United States, careful as to how much of an offensive posture we take. >> Well here's a secret. So I have a background on political science. So mutually assured destruction, I think is a deterrent strategy where you have two kind of two, two entities that like they will destroy each other if they so they're disinclined to go down that route. >> Right. >> With cyber I really don't like that mutually assured destruction >> That doesn't fit right. >> I think it's deterrents by denial. Right? So raising the cost, if they were to conduct a cyber operation, raising that cost that they don't want to do it, they don't want to incur the impact of that. Right. And think about this in terms of a lot of people are asking about would China invade Taiwan. And so as you look at the cost that that would have on the Chinese military, the POA, the POA Navy et cetera, you know, that's that deterrents by denial, trying to, trying to make the costs so high that they don't want to do it. And I think that's a better fit for cyber to try to figure out how can we raise the cost to the adversary if they operate against our customers against our enterprises and that they'll go someplace else and do something else. >> Well, that's a retaliatory strike, isn't it? I mean, is that what you're saying? >> No, definitely not. >> It's more of reducing their return on investment essentially. >> Yeah. >> And incenting them- disincening them to do X and sending them off somewhere else. >> Right. And threat actors, whether they be criminals or nation states, you know, Bruce Lee had this great quote that was "be like water", right? Like take the path of least resistance, like water will. Threat actors do that too. So, I mean, unless you're super high value target that they absolutely have to get into by any means necessary, then if you become too hard of a target, they're going to move on to somebody that's a little easier. >> Makes sense. Awesome. Really appreciate your, I could, we'd love to have you back. >> Anytime. >> Go deeper. Adam Myers. We're here at Fal.Con 22, Dave Vellante, Dave Nicholson. We'll be right back right after this short break. (bouncy music plays)
SUMMARY :
he is the Senior Vice Senior Vice President of Intelligence, so that we can inform our other products: So it's that threat hunting capability And so that's really at the core, And I infer that the intelligence that's the threat intel. the ECX you guys call it What are you learning from that? and positive about the end of the war. and before that you mentioned, you know, One of the big challenges. And it's also, you know, Tell us about, you know, So yeah, it starts off, you know and the longer we observe And it, you know is really part They need the cash. And that means that they need, you know, people that are capable of this And I think COVID was also, you know And so, you know, See, so yeah. Back in the day. in the region that was doing the IR So it was a local And then they worked with Symantec. It Was, they found it, I so I might not have that completely right. moment in the industry. like that because, you know in the nuclear war, you know strategy where you have two kind of two, So raising the cost, if they were to It's more of reducing their return and sending them off somewhere else. that they absolutely have to get into to have you back. after this short break.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Dave Vellante | PERSON | 0.99+ |
Symantec | ORGANIZATION | 0.99+ |
Dave Nicholson | PERSON | 0.99+ |
Dave Nicholson | PERSON | 0.99+ |
Adam Myers | PERSON | 0.99+ |
Bruce Lee | PERSON | 0.99+ |
Adam Meyers | PERSON | 0.99+ |
Adam | PERSON | 0.99+ |
February | DATE | 0.99+ |
2016 | DATE | 0.99+ |
NATO | ORGANIZATION | 0.99+ |
Turkey | LOCATION | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Iran | LOCATION | 0.99+ |
Robert Gates | PERSON | 0.99+ |
two | QUANTITY | 0.99+ |
Syria | LOCATION | 0.99+ |
one | QUANTITY | 0.99+ |
11 vulnerabilities | QUANTITY | 0.99+ |
Ministry of State Security | ORGANIZATION | 0.99+ |
World War II | EVENT | 0.99+ |
Shawn | PERSON | 0.99+ |
CrowdStrike | ORGANIZATION | 0.99+ |
Kim Jong Un | PERSON | 0.99+ |
Wednesday | DATE | 0.99+ |
Columbia | LOCATION | 0.99+ |
Israel | LOCATION | 0.99+ |
56 vulnerabilities | QUANTITY | 0.99+ |
Cold War | EVENT | 0.99+ |
May of 21 | DATE | 0.99+ |
Christmas | EVENT | 0.99+ |
six | QUANTITY | 0.99+ |
24 different observables | QUANTITY | 0.99+ |
late 1800s | DATE | 0.99+ |
China | ORGANIZATION | 0.99+ |
2019 | DATE | 0.99+ |
People's Liberation Army Strategic Support Force | ORGANIZATION | 0.99+ |
first | QUANTITY | 0.98+ |
both | QUANTITY | 0.98+ |
185 threat actors | QUANTITY | 0.98+ |
President | PERSON | 0.98+ |
two people | QUANTITY | 0.98+ |
China | LOCATION | 0.98+ |
Microsoft | ORGANIZATION | 0.98+ |
Russia | ORGANIZATION | 0.98+ |
two entities | QUANTITY | 0.98+ |
Thanksgiving | EVENT | 0.98+ |
Tuesday | DATE | 0.98+ |
North Korea | ORGANIZATION | 0.98+ |
Hollywood | ORGANIZATION | 0.98+ |
today | DATE | 0.97+ |
Dow Jones | OTHER | 0.97+ |
Chinese | OTHER | 0.97+ |
11 of them | QUANTITY | 0.97+ |
each | QUANTITY | 0.97+ |
One | QUANTITY | 0.97+ |
Iran | ORGANIZATION | 0.96+ |
First one | QUANTITY | 0.96+ |
30% | QUANTITY | 0.96+ |
POA Navy | ORGANIZATION | 0.96+ |
Stuxnet | PERSON | 0.95+ |
Israeli | OTHER | 0.94+ |
Las Vegas | LOCATION | 0.94+ |
180 | QUANTITY | 0.94+ |
Russian | OTHER | 0.94+ |
US | LOCATION | 0.94+ |
Fal.Con 22 | EVENT | 0.91+ |
five | QUANTITY | 0.9+ |
ARIA | ORGANIZATION | 0.89+ |
United States | LOCATION | 0.89+ |
Crisis | ORGANIZATION | 0.88+ |
North Koreans | PERSON | 0.87+ |
eCrime | ORGANIZATION | 0.85+ |
11 years ago yesterday | DATE | 0.84+ |
few years ago | DATE | 0.84+ |
Deepak Singh, AWS | AWS re:Invent 2020.
>>from around the globe. It's the Cube with digital coverage of AWS reinvent 2020 sponsored by Intel and AWS. Yeah, welcome back to the Cubes. Live coverage of AWS reinvent 2020. It's virtual this year over three weeks. Next three weeks we're here on the ground, covering all the live action. Hundreds of videos Walter Wall coverage were virtual not in person this year. So we're bringing all the interviews remote. We have Deepak Singh, vice president of Compute Services. A range of things within Amazon's world. He's the container guy. He knows all what's going on with open source. Deepak, great to see you again. Sorry, we can't be in person, but that's the best we could do. Thanks for coming on. And big keynote news all year all over the keynote. Your DNA is everywhere in the keynote. Thanks for coming on. >>Yeah. Now, no thanks for having me again. It's always great to be on the Cube. Unfortunately, not sitting in the middle of the floral arrangement, which I kind of miss. I know, but it waas great morning for us. We had a number of announcements in the container space and sort of adjacent to that in the developer and operator experience space about making it easy for people to adopt things like containers and serverless. So we're pretty excited about. And his keynote today and the rest agreement. >>It's interesting, You know, I've been following Amazon. Now start a three invent. I've been using Amazon since easy to started telling that garment that story. But you look like the mainstream market right now. This is a wake up call for Cloud. Um, mainly because the pandemic has been forced upon everybody. I talked to Andy about that he brought up in the keynote, but you start to get into the meat on the bone here. When you're saying OK, what does it really mean? The containers, the server Lis, Uh, the machine learning all kind of tied together with computers getting faster. So you see an absolute focus of infrastructures of service, which has been the bread and butter for Amazon web services. But now that kinda you know, connective tissue between where the machine learning kicks in. This is where I see containers and lambda and serve Earless really kicking ass and and really fill in the hole there because that's really been the innovation story and containers air all through that and the eks anywhere was to me the big announcement because it shows Amazon's wow vision of taking Amazon to the edge to the data center. This is a big important announcement. Could you explain E. K s anywhere? Because I think this is at the heart of where customers are looking to go to its where the puck is going. You're skating to where the puck is. Explain the importance of eks anywhere. >>Yeah, I'll actually step back. And I talked about a couple of things here on I think some of the other announcements you heard today like the smaller outposts, uh, you know, the one you and do you outpost skills are also part of that story. So I mean, if you look at it, AWS started thinking about what will it take for us to be successful in customers data centers a few years ago? Because customers still have data centers, they're still running there On our first step towards that Waas AWS in many ways benefits a lot from the way we build hardware. How what we do with nitro all the way to see C two instance types that we have. What we have a GPS on our post waas. Can we bring some of the core fundamental properties that AWS has into a customer data center, which then allowed PCs any KS and other AWS services to be run on output? Because that's how we run today. But what we started hearing from customers waas That was not enough for two reasons. One, not all of them have big data centers. They may want to run things on, you know, in a much smaller location. I like to think about things like oil rates of point of sale places, for they may have existing hardware that they still plan to use and intend to use for a very long time with the foundational building blocks easy to EBS. Those get difficult when we go on to hardware. That is not a W s hardware because be very much depend on that. But it containers we know it's possible. So we started thinking about what will it take for us to bring the best of AWS toe help customers run containers in their own data center, so I'll start with kubernetes, so with que binaries. People very often pick Kubernetes because they start continue rising inside their own data centers. And the best solution for them is Cuban Aires. So they learn it very well. They understand it, their organizations are built around it. But then they come to AWS and run any chaos. And while communities is communities, if you're running upstream, something that runs on Prem will run on AWS. They end up in two places in sort of two situations. One, they want to work with AWS. They want to get our support. They want to get our expertise second, most of them once they start running. Eks realized that we have a really nice operational posture of a D. K s. It's very reliable. It scales. They want to bring that same operational posture on Prem. So with the ts anywhere what we decided to do Waas start with the bits underlying eks. The eks destroyed that we announced today it's an open source communities distribution with some additional pieces that that we had some of the items that we use that can be run anywhere. They're not dependent on AWS. You don't even have be connected to a W s to use eks destro, but we will Patrick. We will updated. It's an open source project on get help. So that's a starting point that's available today. No, Over the next several months, what will add is all of the operational to link that we have from chaos, we will make available on premises so that people can operate the Cuban and these clusters on Prem just the way they do on AWS. And then we also announced the U. K s dashboard today which gives you visibility into our communities clusters on AWS, and we'll extend that so that any communities clusters you're running will end up on the dashboard to get a single view into what's going on. And that's the vision for eks anywhere, which is if you're running communities. We have our operational approach to running it. We have a set of tools that we're gonna that we have built. We want everybody to have access to the same tools and then moving from wherever you are to aws becomes super easy cause using the same tooling. We did something similar with the C s as well the DCs anywhere. But we did it a little bit differently. Where in the CSU was centralized control plane and all we want for you is to bring a CPU and memory. The demo for that actually runs in a bunch of raspberry PiS. So as long as you can install the C s agent and connect to an AWS region, you're good to go. So same problem. Different, slightly different solutions. But then we are customers fall into both buckets. So that's that's the general idea is when we say anywhere it means anywhere and we'll meet you there >>and then data centers running the case in the data center and cloud all good stuff. The other thing that came out I want you to explain is the importance of what Andy was getting to around this notion of the monolith versus Micro Services at one slightly put up. And that's where he was talking about Lambda and Containers for smaller compute loads. What does it mean? What was he talking about there? Explain what he means by that >>that Z kind of subtle and quite honestly, it's not unique to London containers. That's the way the world was going, except that with containers and with several functions with panda. You got this new small building blocks that allow you to do it that much better. So you know you can break your application off. In the smaller and smaller pieces, you can have teams that own each of those individual pieces each other pieces. Each of these services can be built using architecture that you secret, some of them makes sense. Purely service, land and media gateway. Other things you may want to run on the C s and target. Ah, third component. You may have be depending on open source ecosystem of applications. And there you may want to run in communities. So what you're doing is taking up what used to be one giant down, breaking up into a number of constituent pieces, each of which is built somewhat independently or at least can be. The problem now is how do you build the infrastructure where the platform teams of visibility in tow, what all the services are they being run properly? And also, how do you scale this within an organization, you can't train an entire organ. Communities overnight takes time similar with similarly with server list eso. That's kind of what I was talking about. That's where the world is going. And then to address that specific problem we announced AWS proton, uh, AWS program is essentially a service that allows you to bring all of these best practices together, allows the centralized team, for example, to decide what are the architectures they want to support. What are the tools that they want to support infrastructure escort, continuous delivery, observe ability. You know all the buzzwords, but that's where the world's going and then give them a single framework where they can deploy these and then the developers can come into self service. It's like I want to build a service using Lambda. I don't even learn how toe put it all together. I'm just gonna put my coat and pointed at this stock that might centralized team has built for me. All I need to do is put a couple of parameters, um, and I'm off to the races and not scale it to end, and it gives you the ability to manage also, So >>it's really kind of the building blocks pushing that out to the customer. I gotta ask you real quick on the proton. That's a fully managed service created best. Could you explain what that means for the developer customer? What's the bottom line? What's the benefit to >>them? So the biggest benefit of developers if they don't need to become an expert at every single technology out there, they can focus on writing application court, not have to learn how to crawl into structure and how pipelines are built and what are the best practices they could choose to do. So the developers, you know, modern and companies Sometimes developers wear two hats and the building off, the sort of underlying scaffolding and the and the build applications for application development. Now all you have to do is in writing an application code and then just go into a proton and say, This is architecture, that I'm going to choose your self, service it and then you're off to the races. If there's any underlying component that's changing, or any updates are coming on, put on it automatically take care off updates for you or give you a signal that says, Hey, the stock has to be updated first time to redeploy accord so you can do all of that in a very automated fashion. That's why everything is done. Infrastructures Gold. It's like a key, uh, infrastructure and told us, and continuous delivery of sort of key foundational principles off put on. And what they basically do is doing something that every company that we talked oh wants to do. But only a handful have the teams and the skill set to do that. It takes a lot of work and it takes ah lot of retraining. And now most companies don't need to do that. Or at least not in that here. So I think this is where the automation and manageability that brings makes life a lot easier. >>Yeah, a lot of drugs. No docker containers. They're very familiar with it. They want to use that. Whatever. Workflow. Quickly explain again to me so I can understand fully the benefit of the lamb container dynamic. Because what was the use case there? What's the problem that you solve? And what does it mean for the developer? What specifically is going on there? What's the What's the benefit? Why would I care? >>Yeah, eso I'll actually talked about one of the services that my team runs called it of your stature. AWS batch has a front time that's completely serverless. It's Lambda and FBI did play its back in the PCs running on the city right? That's the better the back end services run on their customers. Jobs in the running. Our customers are just like that. You know, we have many customers out there that are building services that are either completely service, but they fit that pattern. They are triggered by events. They're taking an event from something and then triggering a bunch of services or their triggering an action which is doing some data processing. And then they have these long running services, which almost universally in our running on containment. How do you bring all of this together into a single framework, as opposed to some people being experts on Lambda and some people being experts and containers? That's not how the real world works. So trying to put all of this because these teams do work together into a single framework was our goal, because that's what we see our customers doing, and I think they'll they'll do it. More related to that is the fact that Lambda now supports Dr Images containing images as a packaging format because a lot of companies have invested in tooling, toe build container images and our land. I can benefit from that as well. While customers get all the, you know, magic, The Lambda brings you >>a couple of years ago on this on the Cube. I shared this tweet out earlier in the week. Andy, we pressed and even services launches like, would you launch build Amazon on Lamb? Day says we probably would. And then he announced to me And he also I think you mentioned the keynote that half of Amazon's new APS are built on lambda. >>Yeah, that's good. This >>is a new generation of developers. >>Oh, absolutely. I mean, you should talk to the Lambda today also, but even like even in the container side, almost half of the new container customers that we have on AWS in 2020 have chosen target, which is serverless containers. They're not picking E c s or E. T. S and running at least two. They're running it on target the vast majority of those two PCs, but we see that trend on the container side as well, and actually it's accelerating. More and more and more new customers will pick target, then running containers on the city. >>Deepak, great to chat with you. I know you gotta go. Thanks for coming on our program. Breaking down the keynote analysis. You've got a great, um, focus area is only going to get hotter and grow faster and a lot more controversy and goodness coming at the same time. So congratulations. >>Thank you. And always good to be here. >>Thanks for coming on. This is the Cube Virtual. We are the Cube. Virtual. I'm John for your host. Thanks for watching.
SUMMARY :
Deepak, great to see you again. in the container space and sort of adjacent to that in the developer and operator experience I talked to Andy about that he brought up in the keynote, but you start to get into the meat on So that's that's the general idea is when we say anywhere it means anywhere and we'll meet you there to explain is the importance of what Andy was getting to around this notion of the monolith versus In the smaller and smaller pieces, you can have teams it's really kind of the building blocks pushing that out to the customer. So the biggest benefit of developers if they don't need to become an expert at every single technology out there, What's the problem that you solve? It's Lambda and FBI did play its back in the PCs running on the city right? And then he announced to me And he also I think you mentioned the keynote that half Yeah, that's good. almost half of the new container customers that we have on AWS in 2020 have I know you gotta go. And always good to be here. This is the Cube Virtual.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Andy | PERSON | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Deepak Singh | PERSON | 0.99+ |
2020 | DATE | 0.99+ |
Deepak | PERSON | 0.99+ |
Walter Wall | PERSON | 0.99+ |
today | DATE | 0.99+ |
first step | QUANTITY | 0.99+ |
John | PERSON | 0.99+ |
two situations | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
two PCs | QUANTITY | 0.99+ |
Lambda | TITLE | 0.99+ |
two reasons | QUANTITY | 0.99+ |
One | QUANTITY | 0.99+ |
Each | QUANTITY | 0.99+ |
two places | QUANTITY | 0.99+ |
London | LOCATION | 0.98+ |
FBI | ORGANIZATION | 0.98+ |
Hundreds of videos | QUANTITY | 0.98+ |
this year | DATE | 0.98+ |
Intel | ORGANIZATION | 0.97+ |
first time | QUANTITY | 0.97+ |
third component | QUANTITY | 0.97+ |
U. K | LOCATION | 0.97+ |
single framework | QUANTITY | 0.96+ |
each | QUANTITY | 0.96+ |
both buckets | QUANTITY | 0.96+ |
Cuban Aires | LOCATION | 0.96+ |
Cube | COMMERCIAL_ITEM | 0.95+ |
Cube Virtual | COMMERCIAL_ITEM | 0.95+ |
pandemic | EVENT | 0.94+ |
single | QUANTITY | 0.93+ |
Patrick | PERSON | 0.93+ |
over three weeks | QUANTITY | 0.93+ |
few years ago | DATE | 0.92+ |
aws | ORGANIZATION | 0.9+ |
second | QUANTITY | 0.9+ |
Compute Services | ORGANIZATION | 0.9+ |
Lambda | ORGANIZATION | 0.88+ |
couple of years ago | DATE | 0.87+ |
Kubernetes | TITLE | 0.87+ |
Next three weeks | DATE | 0.86+ |
two hats | QUANTITY | 0.82+ |
single technology | QUANTITY | 0.82+ |
EBS | ORGANIZATION | 0.81+ |
Prem | ORGANIZATION | 0.8+ |
months | DATE | 0.77+ |
The Lambda | TITLE | 0.76+ |
three | QUANTITY | 0.74+ |
C s | TITLE | 0.71+ |
least two | QUANTITY | 0.69+ |