2022 007 Bradley Kam
>>Oh, welcome to this cube unstoppable domain showcase. I'm John for your host of the cube and showcasing all the great content about web three. And what's around the corner for web. For of course, stoppable domains is one of the big growth stories in the business bread. Can the co-founders here with me have ensembles mains break. Great to see you. Thanks for coming on the showcase. >>So you have a lot of history in the, in the web three, they're calling it net, but it's basically crypto and blockchain. You know, the white paper came out and then, you know how it developed was organically. We saw how that happened. Now, the co-founder was titled domains. You seeing the mainstream, I would say main street scene, super bowl commercials. Okay. You're seeing it everywhere. So it is, it is here. Stadiums are named after cryptos companies. It's here. Hey, it's no longer a fringe. It is reality. You guys are in the middle of it. What's what's going on with the trend. And where does unstoppable fit in? Where do you guys tie in here? >>I mean, I think that what's been happening in general, this whole revolution around cryptocurrencies and then in FTEs and what unstoppable domains is doing, it's all around creating this idea that people can own something that's digital. And this hasn't really been possible before Bitcoin Bitcoin was the first case. You could own money. You don't need a bank. No one else. You can completely control it. No one else can turn you off. Then there was this next phase of the revolution, which is assets beyond just currencies. So, and if T is digital art, what we're working on is like a decentralized identity, like a username for web three and each individual domain name is a is an NFT. But yeah, it's a, it's been a, it's been a, it's been a crazy ride over the past. >>It's fun because you on siliconangle.com, which we founded, we were covering early days of crypto. In fact, our first website, the developer want to be paid in crypto is interesting price of Bitcoin. I won't say that how low it was, but then you saw, you saw the, you know, the ICO way, the token started coming in, you started seeing much more engineering, focused, a lot of white papers coming out, a lot of cool ideas. And then now you got this mainstream of it. So I had to ask you, what are the coolest things you guys are working on because ensemble has a solution that solves a problem today, and that people are facing at the same time. It is part of this new architecture. What problem do you guys solve right now? That's in market that you're seeing the most traction on. >>Yeah. So it's really about, so whenever you inter interact with a blockchain, you wind up having to deal with one of these really, really crazy public keys, public addresses. And they're like anywhere from 20 to 40 characters, long they're random, they're impossible to memorize. And going back to even early days in crypto, I think if people knew that this tech was not going to go mainstream, if you have to copy and paste these things around, if I'm getting to send you like a million dollars, I'm going to copy and paste some random string of numbers and letters. I'm going to have no confirmations about who I'm sending it to. And I'm going to hope that it works out. It's just not practical people. Who've kind of always known there was going to be a solution. And one of the more popular ideas was doing kind of like what DNS did, which is instead of having to deal with these crazy IP addresses this long, random string of numbers to find a website, you have a name, like a keyword, something that's easy to remember, you know, like a hotels.com or something like that. And so what NFT domains are, is basically the same thing, but for blockchain addresses and yeah, it's just, it's just better and easier. There's this joke that everybody, if you want to send me money, you're going to send me a test transaction of, you know, like a dollar first, just to make sure that I get it, call me up and make sure that I get it before you go and send the big amount. I'm just not the way moving, you know, billions of dollars of value is going to work in the future. >>Yeah. And I think one of the things you just pointed out, make it easier. One of these, when you have these new waves, these shifts we saw with the web web pages, more and more web pages were coming on more online users, they call the online population is growing here, the same thing's happening. And the focus is on ease of use, making things simple, to understand and reducing the step it takes to do things, right. This is kind of, kind of what is going on and with the developer community and what a theory has done really well is brought in the developers. So that's the, that's the convergence of all the action. And so when you, so that's where you're at right now, how do you go forward from here? Obviously see this business development deals to do. You guys are partnering a lot. What's the strategy? What are some of the things that you can share about some of your business activity that points to how mainstream it is and where it's going? Okay. >>So I think the, the, the, the way to, the way to think about, and, and T domain name is that it's meant to be like your identity on web three. So it's gonna have a lot of different contexts. It's kind of like your, your Venmo account, where you could send me money to Brad dot crypto can be your decentralized website, where you can check out my content at Brad dot crypto. It can also be my like login kind of like a decentralized Facebook OAuth, where I can log into ADAPs and share information about myself and bring my data along with me. So it's got all of these, all of these different, all these different things that it can do, but where it's starting is inside of crypto wallets and crypto apps, and they are adopting it for this identity, this identity idea. And it's the same identity across all your apps. >>That's the thing that's kinda, that's new here. So, so yeah, that's the, that's the really, that's the really big and profound shift that's happening. And the reason why this is going to be maybe even more important, a lot of, you know, your, your listeners thing is that everyone's going to have a crypto wallet. Every person in the world is going to have a crypto wallet. Every app, every consumer app that you use is going to build one in Twitter, just launched, just built one. Reddit is building one. You're seeing it across all the consumer finance apps. So it's not just the crypto companies that you're thinking of. Every app is going to have a wallet, and it's going to really, it's going to really change the way that we use the internet. >>I think there's a couple of things you pointed. I want to get your reaction to and thoughts more on this constant adapts or decentralized applications or dimension when you call it, this is applications and that take advantage of, of the architecture and then this idea of users owning their own data. And this absolutely reverses the script today. Today, you see Facebook, you see LinkedIn, all these silos, they own the data. The, you are the product here. The users are in control. They have their data, but the apps are being built for it for the paradigm shift here. Right. That's what's happening. Is that right now? >>Totally, totally. And, and so it all starts, I mean, DAP is just this crazy term. It feels like it's this like really foreign, weird thing. All it means is that you sign in with your wallet instead of signing in with a username and password where the data is stored inside of that app, like inside of Facebook. So that's, that's the only real, like core underneath difference to keep in mind signing in with a wallet. But that is like a complete sea change in the way the internet works, because I have this, this key, this private key it's on my phone or my device or whatever. And I'm the only one that has it. So if somebody wanted to hack me, they need to go get access to my device. Two years ago, when Twitter got hacked, Barack Obama and Elon Musk were tweeting the same stuff. >>That's because Twitter had all the data. And so you needed to hack Twitter instead of each individual person, it's a completely different security model. It's, it's way better for users to have that. But if you're thinking from the user perspective what's going to happen is, is that instead of Facebook storing all of my data, and then me being trapped inside of Facebook, I'm going to store it. And I'm gonna move around on the internet, logging in with my web three username, my, my, my NFT domain name. And I'm going to have all my data with me. And then I could use a hundred different Facebooks all in one day. And it would be effortless for me to go and move from one to the other. So the monopoly situation that we exist in as a society is because of the way data storage works. >>So that's the huge point. So let's just, let's double down on that for one more. Second, this is huge point. I want to get your thoughts. I think people don't understand that in the mainstream having that horizontal traversal or, or, or the ability to move around with your identity in this case, your unstoppable domain and your data allows the user to take it from place to place. It's like going to other apps that could be Facebook where the user's in charge. And they're either deciding whether to share their data or not, or are certainly continually their data. And this allows for more of a horizontal scalability for the user, not for a company. >>Yeah. And what's going to happen is, is users are building up their reputation. They're building up their identity in web three. So you have your username and you have your, your profile and you have certain badges of, you know, activities that you've done. And you're building up this reputation. And now apps are looking at that and they're starting to create social networks and other things to provide me services because I, it started with the user as, or the user is starting to collect all this valuable data. And then apps are saying, well, Hey, let me give you a special experience based on that, but the real thing, and this is like, this is like the core mean, this is just like a core capitalist idea. In general, you have more competition, you get a better experience for users. We have not had competition on, on, in web two for decades because these companies have become monopolies. And what web three is really allowing is this wide open competition. And, and that is what, that's the core thing. Like, it's not like, you know, it's going to take time for, for, for web three to get better than web two. You know, it's very, very early days, but the reason why it's going to work is because of the competitive aspect here. Like you can just, it's just so much better for consumers when this happened. >>I would also add to that, first of all, great point, great insight. I would also add that the web presence technology based upon DNS specifically is first of all, it's asking, so it's not foreign characters. It's not union code for, for the geeks out there, but that's limiting to its limits you to be on a site. And so I think the combination of kind of inadequate or antiquated DNS has limitations. So if, and that doesn't help communities, right? So when you're in the communities, you have potentially marketplaces, that could be anywhere. So if you have a ID and just kind of thinking it forward here, but if you have your own data and your own ID, you can jump into a marketplace two-sided marketplace anywhere. And app can provide that if the community is robust, this is kind of where I see the use case going. How do you guys, do you guys agree with that statement and how do you see that ability for the user to take advantage of other competitive or new emerging communities or marketplace? >>So I think it all comes down. So I identity is just this huge problem in web two. And part of the reason why it's very, very hard for new marketplaces and new communities to emerge is because you need all kinds of trust and reputation. And it's very hard to get, to get real information about the users that you're interacting with. If you're, if you're in the web three paradigm, then what happens is, is you can go and check certain things on the blockchain to see if they're true. And you can know that they're true. A hundred percent. You can know that I have used unit swab in the past 30 days and open, see in the past 30 days, you can know for sure that this wallet is mine. The same owner of this wallet also owns this other wallet, owns this certain asset. So all of having the ability to know certain things about a stranger is really what's going to change behavior. >>And one of the things that we're really excited about is being able to prove information about yourself without sharing it. So I can tell you, Hey, I'm a unique person. I'm an American, I'm not an American, but I don't have to tell you who I am. And, and you can still know that it's true. And, and that is that concept is going to be what enables, what you're talking about. I'm going to be able to show up in some new community that was created two hours ago, and we can all trust each other that a certain set of facts are true. And that's possible because of >>Exchange and exchange value with smart contracts and other no middlemen involved activities, which is the promise of the new decentralized web. All right. So let me ask you a question on that, because I think this is key. The anonymous point is huge. If you look at any kind of abstraction layers or any evolution in technology over the years, it's always been about cleaning up the mess or the, or extending capabilities of something that was inadequate. We mentioned DNS. Now you got this, there's a lot of problems with web two, 2.0, social bots. You mentioned bots, bots are anonymous and they don't have a lot of time in market. So it's easy to start bots and everyone who does either scraping bots, everyone knows this. What you just pointed out was an ops environment that was user choice, but has all the data that could be verified. So it's almost like a blue check mark on Twitter without your name, >>Kind of, it's good. It's going to be hundreds of check marks, but exactly, because there's so many different things that you're going to want to be, you're going to want to communicate to strangers, but that's exactly the right. That's exactly the right mental model. It's going to be these check marks for all kinds of different contexts. And that's, what's going to enable people to trust that they're, you know, you're talking to a real person or you're talking to the type of person you thought you were talking to, et cetera. But yeah, it's, it's, you know, I, I think that the issues that we have with bots today are because a web tool has failed at solving identity. I think Facebook at one point was deleting half a billion fake accounts per quarter. Something like the entire number of user profiles. They were deleting per you know, per year. So it's just a total. >>They spring up like mushrooms. They just pop up the thing. This is the problem. I mean, the data that you acquire in new siloed platforms is used by them, the company. So you don't own the data. So you become the product as the cliche goes. But what you're saying is if you have an identity and you pop around to multiple sites, you also have your digital footprints and your exhaust that you own. Okay. That's time. That's reputation data. I mean, you can cut it any way you want, but the point is, it's your stuff over time, that's yours and that's immutable. It's on the blockchain. You can store it and make that permanent and add to it. Exactly. That's, that's a time-based thing versus today, bots that are spreading misinformation can, can get popped up when they get killed. They just start another one. So time actually is a metric for quality here. >>Absolutely. And people already use it in the crypto world to say like, Hey, this wallet was created greater than two years ago. This wallet has had, you know, head has had transactions for at least three or four years. Like this is probably a real, you know, this is probably a legit legitimate user and anybody can look that up. I mean, we could go look it up together right now on, on ether scan. It would take, you know, a minute. >>Yeah. It's awesome. Yeah. I'm a big fan. I can tell, I love this product. I think you guys are gonna do really well. Congratulations. I'm a big fan. I think this is needed. What are some of the deals you've done? blockchain.com has won an opera. Can you take us through those deals and why they're working with you? We'll start with blockchain.com. >>Yeah. So the whole thing here is that this identity standard for web three apps need to choose to support it. So we spent several years as a company working to get as many crypto wallets and browsers and crypto exchanges to support this, to support this identity standard. Some of the, some of the, the, the largest, and probably, you know, most, most popular companies to have done. This are blockchain.com. For example, blockchain.com, one of the largest crypto wallets in the world. And you can use your domain names instead of crypto addresses. And, and, and this is, this is, this is super cool because blockchain.com in particular focuses on onboarding new users. So they're very focused on how we're going to get the next 4 billion internet users to use this tech. And they said, you know, usernames are going to be essential. Like, how can we onboard this next several billion people? If we have to explain to them about all these crazy addresses, and it's not just one, like we want to give you 10 40 character addresses for all these different contexts. Like, it's just, it's just, it's just no way people are gonna be able to do that without, without having a username. So that's why we're really excited about, about what blockchain that comes through. And they, they, they want to train users that this is the way you should use it. >>Yeah. And certainly no one wants to remember. I remember writing down all my writing. I, I'm not, I was never a big wallet fan cause all the hacks, I used to write it down and store it in my safe. But if the house burns down or I, I kick the can I'm, who's going to find it. Right? So again, these are all important things, your key storing it, securing it, super important. Talk about opera. And that's an interesting partnership because it's got a browser and people know what it is, what are they doing? Different almost imagine they're innovating around the identity and what people's experiences with, what they touch. >>So this is, this is one of those things. That's a little bit easier. And I strongly encourage everybody to go and try dApps after this. Cause this is going to be one of those concepts to be a little easier. If you, if you try it, then if you hear about it, but the concept of a wallet and a browser are kind of merging. So it makes sense to have a wallet inside of your browser. Because when you go to a website, the website is going to want you to sign in with your wallet. So having that be in one app is quite convenient for users. And so opera was one of the trailblazers, a traditional browser that added a crypto wallet so that you can store money in there. And then also added support for domain names, for payments and for websites. So you can type in Brad dot crypto and you can send me money or you can type in Brad dot crypto into the browser and you can check out my website. I've got a little NFT gallery. You can see my collection up there right now. So that's the, that's the idea is that browsers have this kind of super power in a web three. And what I think is going to happen opera and brave have been kind of the trailblazers here. But I think is going to happen is that these traditional browsers are going to wake up and they're going to see that integrating a wallet is critical for them to be able to provide services to consumers. >>I mean, it is an app. I mean, why not make it a D app as well? Because why wouldn't I want to just send you crypto, like Venmo, you mentioned earlier, which people can understand that concept. Ben, let me make my cash. Same concept here, but built in to the browser, which is not a browser anymore. It's a, a reader, a D app reader, basically with a wallet. All right. So, so what does this mean for you guys in the marketplace? You've got opera pushing the envelope on browsing, changing the experience, enabling the applications to be discovered and navigated and consumed. You got blockchain.com, blockchain.com with the wallets and being embedded there. Good distribution. How, what, who are you looking for for partners? How do people partner? Let's just say the cube wants to do NFTs and we want to have a login for our communities, which are all open. How do we partner with you? Or do we have to wait? Or is there a, I mean, take us through the partnership strategy. How do we, how do people engage with unstoppable Dwayne's >>Yeah, so, I mean, I think that if you're, you know, if you're a wallet or a crypto exchange, it's super easy, we would love to have you support being able to send money using domains. We also have all sorts of different kind of marketing activities we can do together. We can give out free stuff to, to your communities. We have a bunch of education that we do. We're really trying to be this onboarding point to web three. So there's, I think a lot of, a lot of cool stuff we can do together on the commercial side and on the, the, the marketing side. And then the other category that we didn't talk about was dabs. And we now have this login with unstoppable domains, which you kind of alluded to there. And so you can log in with your domain name and then you can give the app permission to get certain information about you or proof of information about you, not the actual information, if you don't want to share it because it's your choice and you're in control. And so that would be, that would be another thing. Like if you all launch a DAP, we should absolutely have log-in with unstoppable. >>Yeah. There's so much headroom here. You've got a short-term solution with exchange. Get that distribution. I get that that's early days of the foundation, push the distribution, get you guys everywhere. But the real success comes in for the login. I mean, the sign-on single sign-on concept. I think that's going to be powerful, great stuff. Okay. Future, tell us something we don't know about ensemble domains that people might be interested in. >>I think it's really, I think the thing that you're going to hear about a lot from us in the future is going to be around this idea of identity, of being able to prove that you're a human and be able to tell apps that and apps are going to give you all kinds of special access and rewards and all kinds of other things, because, because you gave them that information. So that's the that's, that's probably, that's the hint I'm going to drop. >>Yeah. It's interesting. Brad, you bring trust, you bring quality verified data to intelligence, software, and machine learning, AI and access to distributed communities and distributed applications. Interesting to see what the software does, what that, cause it traditionally didn't have that before. I mean just in mindblowing, I mean, it's pretty crazy great stuff, Brad. Thanks for coming on. Thanks for sharing the insight. Co-founder unstoppable domains, Brad camp. Thanks for stopping by the cubes. Showcase with unstoppable domains.
SUMMARY :
Can the co-founders here with me have ensembles mains break. You know, the white paper came out and then, you know how it developed was organically. No one else can turn you off. the token started coming in, you started seeing much more engineering, focused, not the way moving, you know, billions of dollars of value is going to work in the future. What are some of the things that you can share about some of your business activity that points to how And it's the same identity across all your apps. So it's not just the crypto companies that you're thinking of. that take advantage of, of the architecture and then this idea of users owning their own data. And I'm the only one that has it. And I'm gonna move around on the internet, logging in with my web three username, So that's the huge point. So you have your username and you have your, your profile and you have certain badges So if you have a ID and just kind of thinking it forward here, but if you have your own So all of having the ability to know certain I'm an American, I'm not an American, but I don't have to tell you who I am. So let me ask you a question on that, that they're, you know, you're talking to a real person or you're talking to the type of person you thought you were talking I mean, the data that you acquire in Like this is probably a real, you know, this is probably a legit legitimate user and anybody can look that up. I think you guys are gonna do And you can use your domain names instead of crypto addresses. But if the house burns down or I, I kick the can I'm, who's going to find it. So you can type envelope on browsing, changing the experience, enabling the applications to be discovered and navigated And so you can log in with your domain name and of the foundation, push the distribution, get you guys everywhere. and be able to tell apps that and apps are going to give you all kinds of special access and Brad, you bring trust, you bring quality verified data to intelligence,
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Brad | PERSON | 0.99+ |
Elon Musk | PERSON | 0.99+ |
Barack Obama | PERSON | 0.99+ |
ORGANIZATION | 0.99+ | |
ORGANIZATION | 0.99+ | |
Today | DATE | 0.99+ |
John | PERSON | 0.99+ |
Second | QUANTITY | 0.99+ |
Brad dot crypto | ORGANIZATION | 0.99+ |
20 | QUANTITY | 0.99+ |
ORGANIZATION | 0.99+ | |
first website | QUANTITY | 0.99+ |
first case | QUANTITY | 0.99+ |
one app | QUANTITY | 0.99+ |
ORGANIZATION | 0.99+ | |
Two years ago | DATE | 0.99+ |
each | QUANTITY | 0.98+ |
three apps | QUANTITY | 0.98+ |
one | QUANTITY | 0.98+ |
two hours ago | DATE | 0.98+ |
Ben | PERSON | 0.98+ |
40 characters | QUANTITY | 0.98+ |
hundreds of check marks | QUANTITY | 0.98+ |
one day | QUANTITY | 0.98+ |
Brad camp | PERSON | 0.97+ |
Venmo | ORGANIZATION | 0.97+ |
four years | QUANTITY | 0.97+ |
Dwayne | PERSON | 0.97+ |
billions of dollars | QUANTITY | 0.97+ |
Bradley Kam | PERSON | 0.96+ |
2022 007 | OTHER | 0.96+ |
blockchain.com | OTHER | 0.96+ |
4 billion internet users | QUANTITY | 0.96+ |
opera | TITLE | 0.95+ |
today | DATE | 0.95+ |
each individual person | QUANTITY | 0.94+ |
one point | QUANTITY | 0.94+ |
One | QUANTITY | 0.93+ |
single | QUANTITY | 0.92+ |
hundred percent | QUANTITY | 0.91+ |
Facebooks | ORGANIZATION | 0.9+ |
10 40 character addresses | QUANTITY | 0.87+ |
half a billion fake accounts per quarter | QUANTITY | 0.85+ |
three | QUANTITY | 0.84+ |
past 30 days | DATE | 0.84+ |
two-sided | QUANTITY | 0.83+ |
Bitcoin | OTHER | 0.81+ |
American | OTHER | 0.78+ |
two years ago | DATE | 0.77+ |
siliconangle.com | OTHER | 0.77+ |
a hundred | QUANTITY | 0.77+ |
a million dollars | QUANTITY | 0.77+ |
a minute | QUANTITY | 0.76+ |
Every app | QUANTITY | 0.76+ |
first | QUANTITY | 0.73+ |
web two | QUANTITY | 0.72+ |
at least three | QUANTITY | 0.7+ |
billion people | QUANTITY | 0.66+ |
NFT | ORGANIZATION | 0.66+ |
those | QUANTITY | 0.63+ |
dot | TITLE | 0.62+ |
blockchain.com | ORGANIZATION | 0.61+ |
Mark Hinkle | KubeCon + CloudNativeCon NA 2021
(upbeat music) >> Greetings from Los Angeles, Lisa Martin here with Dave Nicholson. We are on day three of the caves wall-to-wall coverage of KubeCon CloudNativeCon North America 21. We're pleased to welcome Mark Hinkle to the program, the co-founder and CEO of TriggerMesh. Mark welcome. >> Thank you, It's nice to be here. >> Lisa: Love the name. Very interesting TriggerMesh. Talk to us about what TriggerMesh does and what, when you were founded and what some of the gaps were that you saw in the market. >> Yeah, so TriggerMesh actually the Genesis of the name is in, cloud event, driven architecture. You trigger workloads. So that's the trigger and trigger mesh, and then mesh, we mesh services together, so cloud, so that's why we're called TriggerMesh. So we're a cloud native open source integration platform. And the idea is that, the number of cloud services are proliferating. You still have stuff in your data center that you can't decommission and just wholesale lift and shift to the cloud. So we wanted to provide a platform to create workflows from the data center, to the cloud, from cloud to cloud and not, and use all the cloud native design principles, but not leave your past behind. So that's, what we do. We're, very, we were cloud, we are cloud operators and developers, and we wanted the experience to be very similar to the way that DevOps folks are doing infrastructure code and deploying that we want to make it easy to do integration as code. So we follow the same design patterns, use the same domain languages, some of those tools like Hashi corpse, Terraform, and that that's what we do and how we go about doing it. >> Lisa: And when were you guys founded? >> September, 2018. >> Oh so your young, your three years young. >> Three years it's feels like 21 >> I bet. >> And startup years it's a lot has happened, but yeah, we my co-founder and I were former early cloud folks. We were at cloud.com worked through the OpenStack years and the CloudStack, and we just saw the pattern of, abstraction coming about. So first you abstract the hardware, then you abstract the operating system. And now at with the Kubernetes container, you know, evolution, you're abstracting it up to the application layer and we want it to be able to provide tooling that lets you take full advantage of that. >> Dave: So being founded in 2018, what's your perception of that? The shift that happened during the pandemic in terms of the drive towards cloud adoption and the demands for services like you provide? >> Mark: Yeah, I think it's a mixed blessing. So we, people became more remote. They needed to enable digital transformation. Biggest thing, I think that that for us is, you know, you don't go to the bank anymore. And the banking industry is doing, you know, exponentially more remote, online transactions than in person. And it's very important. So we decided that financial services is where we were going to start with first because they have a lot of legacy architecture. They have a lot of need to move to the cloud to have better digital experiences. And we wanted to enable them to, you know, keep their mainframes online while they were still doing cutting edge, you know, mobile applications, that kind of thing. >> Lisa: And of course the legacy institutions like the BFA's the Wells Fargo, they're competing with the fintechs who are much more nimble, much more agile and able to sort of disrupt the financial services industry. Was that part of also your decision to start in financial services? >> It was a little bit of luck because we started with our network and it turned out the, you know, we saw, we started talking to our friends early on, cause we're a startup and said, this is what we're going to do. And where it really resonated was PNC bank was our, one of our first customers. You know, another financial regulatory company was another one, a couple of banks in Europe. And we, you know, as we started talking about what we were doing, that we just gravitated there because they had the, the biggest need, even though everybody has the need, their businesses are, you know, critically tied to digital transformation. >> So starting with financial services. >> It's, it's counter intuitive, isn't it? >> It was counterintuitive, but it lends credibility to any other industry vertical that you're going to approach. >> Yeah, yeah it does. It's a, it's a great, they're going to be our hardest customers and they have more at stake than a lot of like transactions are millions and millions of dollars per hour for these folks. So they don't want to play around, they, they have no tolerance for failure. So it's a good start, but it's sort of like taking up jogging and running a marathon in your first week. It's very very grilling in that sense, but it really has made us a lot better and gave us a lot of insight into the kinds of things we need to do from not just functionality, but security and that kind of thing. >> Where are you finding these customers with respect to adoption of Kubernetes? Are they leading? Are they knowing we've got to get there eventually from an infrastructure perspective? >> So the interesting thing is Kubernetes is a platform for us to deliver on, so we, we don't require you to be a Kubernetes expert we offer it as a SaaS, but what happens is that the Kubernetes folks are the ones that we end up really engaging with earlier on. And I think that we find that they're in this phase of they're containerizing their apps, that's the first step. And then they're putting them on Kubernetes and then their next step is a security and integration path. So once she, I think they call it and this is my buzzword of the show day two operations, right? So they, they get to day two and then they have a security and an integration concern before they go live. So they want to be able to make sure that they don't increase their attack face. And then they also want to make sure that this newly deployed containerized infrastructure is as well integrated as the previous, you know, virtualized or even, you know, on the server infrastructure that they had before. >> So TriggerMesh, doesn't solely work in the containerized world, you're, you're sort of you're bridging the divide. >> Mark: Yes. >> What percentage of the workloads that you're seeing are the result of modernization migration, as opposed to standing up net new application environments in Kubernetes? Do you have a sense for that? >> I think we live in a lot in the brown field. So, you know, folks that have an existing project that they're trying to bridge to it versus the Greenfield kind of, you know, the, the huge wins that you saw in the early cloud days of the Netflix and the Twitter's Dwayne scale. Now we're talking to the enterprises who have, you know, they have existing concerns. So I would say that it's, it's mostly people that are, you know, very few net new projects, unless it's a modernization and they're getting ready to decommission an old one, which is. >> Dave: So Brownfield financial services. You just said, you know, let's just, let's just go after that. >> You know, yeah. I mean, we had this dart forward and we put up buzzwords, but no, it was, it was actually just, and you know, we're still finding our way as far as early on where we're open source folks. And we did not open source from day one, which is very weird when everybody's new, your identity is, you know, I worked, I was the VP of marketing for Linux foundation and no JS and all these open source projects. And my co-founder and I are Apache committers. And our project wasn't open yet because we had to get to the point where it could be open and people could be productive in the use and contribution. And we had to staff up engineers. And now I think this week we open-sourced our entire platform. And I think that's going to open up, you know, that's where we started because it was not necessarily the lowest hanging fruit, but the profitable, less profitable, lowest hanging fruit was financial services. Now we are letting our code out into the wild. And I think it'll be interesting to see what comes back. >> So you just announced that this week TriggerMesh integration platform as an open source project here at KubeCon, what's been some of the feedback? >> It's all been positive. I haven't heard anything negative. We did it, so we're very, very, there's a very, the culture around open source is very tough. It's very critical if you don't do it right. So I think we did a good job, we used enough, we used a OSI approved. They've been sourced, licensed the Apache software, a V2 license. We hired someone who was well-respected in the DevREL world from a chef who understands the DevOps sort of culture methodologies. We staffed up our engineers who are going to be helping the free and open source users. So they're successful and we're betting that that will yield business results down the road. >> Lisa: And what are the two I see on your website, two primary use cases that you guys support. Can you dig into details on that? >> So the first one is sort of a workflow automation and a really simple example of that is you have a, something that happens in one cloud. So for example, you take a picture on your phone and you upload it and it goes to Amazon and there is a service that wants to identify what's in that picture. And once you put it on the line and the internship parlance, you could kick off a workflow from TensorFlow, which is artificial intelligence to identify the picture. And there isn't a good way for clouds to communicate from one to the other, without writing custom blue, which is really what, what we're helping to get rid of is there's a lot of blue written to put together cloud native applications. So that's a workflow, you know, triggering a server less function is the workflow. The other thing is actually breaking up data gravity. So I have a warehouse of data, in my data center, and I want to start replicating some portion of that. As it changes to a database as a service, we can based on an event flow, which is passive. We're not, we're not making, having a conversation like you would with an API where there's an event stream. That's like drinking from the fire hose and TriggerMesh is the nozzle. And we can direct that data to a DBaaS. We can direct that data to snowflake. We can direct that data to a cloud-based data lake on Microsoft Azure, or we can split it up, so some events could go to Splunk and all of the events can go to your data lake or some of those, those things can be used to trigger workloads on other systems. And that event driven architecture is really the design pattern of the individual clouds. We're just making it multi-cloud and on-prem. >> Lisa: Do you have a favorite customer example that you think really articulates that the value of that use case? >> Mark: Yeah I think a PNC is probably our, well for the, for the data flow one, I would say we have a regular to Oracle and one of their customers it was their biggest SMB customer of last year. The Oracle cloud is very, very important, but it's not as tool. It doesn't have the same level of tooling as a lot of the other ones. And to, to close that deal, their regulatory customer wanted to use Datadog. So they have hundreds and hundreds of metrics. And what TriggerMesh did was ingest the hundreds and hundreds of metrics and filter them and connect them to Datadog so that, they could, use Datadog to measure, to monitor workloads on Oracle cloud. So that, would be an example of the data flow on the workflow. PNC bank is, is probably our best example and PNC bank. They want to do. I talked about infrastructure code integration is code. They want to do policy as code. So they're very highly regulatory regulated. And what they used to do is they had policies that they applied against all their systems once a month, to determine how much they were in compliance. Well, theoretically if you do that once a month, it could be 30 days before you knew where you were out of compliance. What we did was, we provided them a way to take all of the changes within their systems and for them to a server less cluster. And they codified all of these policies into server less functions and TriggerMesh is triggering their policies as code. So upon change, they're getting almost real-time updates on whether or not they're in compliance or not. And that's a huge thing. And they're going to, they have, within their first division, we worked with, you know, tens of policies throughout PNC. They have thousands of policies. And so that's really going to revolutionize what they're able to do as far as compliance. And that's a huge use case across the whole banking system. >> That's also a huge business outcome. >> Yes. >> So Mark, where can folks go to learn more about TriggerMesh, maybe even read about more specifically about the announcement that you made this week. >> TriggerMesh.com is the best way to get an overview. The open source project is get hub.com/triggermesh/trigger mesh. >> Awesome Mark, thank you for joining Dave and me talking to us about TriggerMesh, what you guys are doing. The use cases that you're enabling customers. We appreciate your time and we wish you best of luck as you continue to forge into financial services and other industries. >> Thanks, it was great to be here. >> All right. For Dave Nicholson, I'm Lisa Martin coming to you live from Los Angeles at KubeCon and CloudNativeCon North America 21, stick around Dave and I, will be right back with our next guest.
SUMMARY :
the co-founder and CEO of TriggerMesh. Talk to us about what the data center, to the cloud, Oh so your young, So first you abstract the hardware, I think that that for us is, you know, like the BFA's the And we, you know, but it lends credibility to any So they don't want to play around, as the previous, you know, the containerized world, it's mostly people that are, you know, You just said, you know, to open up, you know, So I think we did a good that you guys support. So that's a workflow, you know, we worked with, you know, announcement that you made this week. TriggerMesh.com is the and me talking to us about you live from Los Angeles at
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Mark Hinkle | PERSON | 0.99+ |
Dave Nicholson | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
PNC | ORGANIZATION | 0.99+ |
Europe | LOCATION | 0.99+ |
2018 | DATE | 0.99+ |
Lisa | PERSON | 0.99+ |
September, 2018 | DATE | 0.99+ |
Mark | PERSON | 0.99+ |
Los Angeles | LOCATION | 0.99+ |
Wells Fargo | ORGANIZATION | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
three years | QUANTITY | 0.99+ |
Oracle | ORGANIZATION | 0.99+ |
hundreds | QUANTITY | 0.99+ |
BFA | ORGANIZATION | 0.99+ |
millions | QUANTITY | 0.99+ |
Netflix | ORGANIZATION | 0.99+ |
first division | QUANTITY | 0.99+ |
Three years | QUANTITY | 0.99+ |
two | QUANTITY | 0.99+ |
ORGANIZATION | 0.99+ | |
first step | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
KubeCon | EVENT | 0.99+ |
30 days | QUANTITY | 0.99+ |
TriggerMesh | ORGANIZATION | 0.98+ |
this week | DATE | 0.98+ |
CloudStack | TITLE | 0.98+ |
21 | QUANTITY | 0.98+ |
hub.com/triggermesh/trigger mesh | OTHER | 0.98+ |
first week | QUANTITY | 0.98+ |
KubeCon | ORGANIZATION | 0.98+ |
CloudNativeCon North America 21 | EVENT | 0.97+ |
Linux | ORGANIZATION | 0.97+ |
once a month | QUANTITY | 0.97+ |
Apache | ORGANIZATION | 0.97+ |
first | QUANTITY | 0.96+ |
first customers | QUANTITY | 0.96+ |
tens of policies | QUANTITY | 0.96+ |
two primary use cases | QUANTITY | 0.96+ |
one | QUANTITY | 0.95+ |
first one | QUANTITY | 0.95+ |
thousands of policies | QUANTITY | 0.94+ |
Brownfield | ORGANIZATION | 0.93+ |
day two | QUANTITY | 0.92+ |
day three | QUANTITY | 0.92+ |
one cloud | QUANTITY | 0.91+ |
Hashi corpse | TITLE | 0.91+ |
day two | QUANTITY | 0.9+ |
OpenStack | TITLE | 0.88+ |
PNC bank | ORGANIZATION | 0.87+ |
hundreds of metrics | QUANTITY | 0.87+ |
TensorFlow | ORGANIZATION | 0.86+ |
CloudNativeCon NA 2021 | EVENT | 0.85+ |
Terraform | TITLE | 0.83+ |
KubeCon CloudNativeCon North America 21 | EVENT | 0.82+ |
Kubernetes | TITLE | 0.81+ |
pandemic | EVENT | 0.81+ |
hundreds and | QUANTITY | 0.8+ |
cloud.com | ORGANIZATION | 0.79+ |
DevOps | TITLE | 0.75+ |
Greenfield | ORGANIZATION | 0.74+ |
Bong Gumahad and Chris Henson V2
>>From around the globe. It's the queue cover >>Space and cyber security >>Symposium 2020 hosted by Cal poly. >>Hello and welcome to the space and cybersecurity symposium 2020 hosted by Cal poly and the cube I'm chilling for a, your host. We have a great session here. Space, cyber security, the department of defense perspective. We have bond Google hall, director of C four ISR directorate office of the undersecretary of defense for acquisition and sustainment for the DOD and Chris Henson, technical director space and weapons, cybersecurity solutions for the national security agency. Gentlemen, thank you for taking the time for this awesome session. Thank you, John. Thank you. So we're gonna talk about the perspective of the DOD relative to space cybersecurity, a lot, going on congestion, contention, freedom, evolution innovation. So Paul, I'd like to have you start with your opening statement on how you see the space cybersecurity perspective, Don, thanks for the intro. Really appreciate it. First, let me give my thanks to Cal poly for a convening, the space and cybersecurity symposium this year, you know, and despite the pandemic, the organization and the content delivery spreading impressive, I really foot stomping. >>What can possibly be done with a number of these virtual platforms? This has been awesome. Thanks for the opportunity. I also want to recognize my colleague, Chris Nissen from NSA was actually assigned to our staff that LSD, but he brings both policy and technical perspective in this whole area. So I think you'll, you'll find his commentary, uh, and positions on things very refreshing or for today's seminar. Now space cyber security is a pretty interesting terminology for us all. Uh, cyber security means protecting against cyber threats and it's really more than just computers here on earth, right? Uh, space is the newest war fighting domain, and cybersecurity's perhaps even more of a challenge in this domain that and others. Uh, I'm sure it'll turn journal Thompson and major journals Shaw discuss the criticality of this new dorm space force. It's the newest military service in the earlier sessions and they're at the risk of repeating what they already addressed. >>Let me start by talking about what space means to DOD and what we're doing directly from my vantage point as part of the acquisition and sustainment arm of the Pentagon. Uh, what I want to share with you today is how the current space strategy ties into the national defense strategy and supports the department's operational objectives. As the director of CFRI SAR. I have come to understand how the integration of CFRI Sarcic. Billy is a powerful asset to enhance the lethality of the joint war fighter. Secretary Lord, our boss, the sec, the undersecretary for acquisition and sustainment is diligent in her pursuit to adapt and modernize acquisition processes, to influence the strategy and to focus our efforts domain are to make our objectives a reality. I think first and foremost, we are building a more lethal force. This joint force will project low Valley and custom contested environments and across all domains through an operationally integrated and resiliency for ISR infrastructure. >>We are also called debating our alliances, deepening interoperability, which is very important in a future fight and collab, collaboratively planning with those partner with us in the fight most significantly for our work in acquisition and sustainment, we continue to optimize the department for greater performance and affordability through reform of the acquisition process. Now space is our newest war fighting domain. And while it is indeed unique, it shares many common traits with the others land, air and sea all are important to the defense of the U S in conflict. No doubt about this. They will be contested and they must be defended. One domain will not win future conflicts in a joint operation in a future fight in the future conflict. They must all succeed. I see three areas being key to a DOD strategic success in space, one, developing our whole of government approach in close partnership with the private sector and our allies to prioritizing our investments in resiliency, innovation, and adaptive operations, and third responding rapidly and effectively to leverage emerging technologies and seize opportunities to advance your strengths, partnerships and alliances. >>Let me emphasize that space is increasingly congested and tested and demanded as essential delete Valley operational effectiveness and the security of our nation. Now the commercialization of space offers a broad set of investments in satellite technology, potential opportunities to leverage those investments and pathways to develop cost efficient space architecture, where the department and the nation. It's funny, there's a new race, a race for space. If you will, between commercial companies buying for dominance of space. Now the joint staff within DOD is currently building an operational construct to employ and engage as a unified force, coordinated across all domains. We call it the joint, all domain command and control. It is the framework that is under development to allow us to conduct integrated operations in the future. The objective of Jesse too is to provide the war fighter access to the decision making information while providing mission assurance of the information and resilience of the underlying terrestrial air in space networks that support them operationally. >>six to maintain seamless integration, adaptation, and employment of our capability. To sense signal connect, transmit, process control, direct, and deliver lethal capabilities against the enemy. We gain a strategic advantage through the integration of these capabilities across all the domains, by providing balance bowel space, awareness, horse protection, and weapons controlled and deployment capabilities. Now successfully any ratings, the systems and capabilities will provide our war fighters overwhelming superiority on the battlefield environment, challenged by near peer adversaries, as well as non state actors in space. The character of its employment is changing, driven by increasing demands, not just by DOD, but by the commercial sector as well. You know, more and more, uh, we see greater use of small satellite systems to address a myriad of emerging questions, ubiquitous communications, awareness, sensor diversity, and many more. Uh, as I said before, the commercial world is pioneering high rate production of small satellites in our efforts to deploy hundreds, if not thousands of nodes space X, Darlene constellation is one example. >>Another one is Amazon's Kiper, uh, Kuyper just received FCC approval to deploy like over 3000 of these different notes. While a number of these companies continue to grow. Some have struggled. They some pointed as one web, uh, nevertheless, the appetite remains strong and DOD is taking advantage of these advances to support our missions. We are currently exploring how to better integrate the DOD activities involving small satellites under the small satellite coordinating activity, scholarly call it. We want to ensure collaboration and interoperability to maximize efficiency in acquisition and operation. When we started this activity on over a year and a half ago, we documented over 70 plus separate small, small sat programs within DOD. And now we've developed a very vibrant community of interest surrounding a small satellites. Now, part of the work we have identified nine focus areas for further development. These are common areas to all systems and by continuing to expand on these, our plan is they enable a standard of practice that can be applied across all of the domains. >>This includes lawn services, ground processing distribution, and of course, a topic of interest to the symposium space security and Chris we'll, we'll talk more about that being the Houston expert, uh, in this area. Uh, one challenge that we can definitely start working on today is workforce development. Cybersecurity's unique as it straddles STEM and security and policy, the trade craft is different. And unfortunately I've seen estimates recently, so suggesting a workforce gap in the next several years, much like the STEM fields, uh, during the next session, I am a part of a panel with precedent, Armstrong, Cal poly, and Steve Jake's the founder of the national security space association to address workforce development. But for this panel, I'll look forward to having further dialogue surrounding space, opera security with Chris and John. Thank you, John >>Bob, thank you for that whole thing, Steven. Yes. Workforce gaps. We need the new skill space is here. Thank you very much. Chris Henson, technical director of space and weapons, cybersecurity solutions for the national security agency. Your statement, >>Thank you for having me. Uh, I'm one of several technical leaders in space at the national security agency. And I'm currently on a joint duty assignment at the office of under secretary of defense for acquisition and sustainment. I work under mr. GUMA hot in the C four ISR area, but almost 63 years ago on the 4th of October, 1957, Sputnik was the first artificial satellite launched by the Soviet union in space. History was made in each of you can continue to write future space history in your careers. And just like in 1957, the U S isn't alone in space to include our close partnerships and longterm activities with organizations like the Japanese space agency, the European space agency, and, uh, the Canadian space agency, just to name a few. And when we tackle cybersecurity per space, we have to address, address the idea that the communications command and control, uh, and those mission datas will transverse networks owned and operated by a variety of partners, not only.go.mil.com.edu, et cetera. We need to have all the partners address the cyber effects of those systems because the risk excepted by one is shared by all and sharing cyber best practices, lessons learned, uh, data vulnerabilities, threat data, mitigation, mitigation procedures, all our valuable takeaways, uh, in expanding this space community, improving overall conditions for healthy environment. So thank you for having me, and I appreciate the opportunity to speak to you and your audience. And I look forward to the discussion questions. Thank you. >>Thank you, Chris. Thank you, Bob. Okay. I mean open innovation, the internet, you see plenty of examples. The theme here is partners, commercial government. It's going to take a lot of people and tech companies and technologies to make space work. So we asked my first question, Bonnie, we'll start with you is what do you see as the DOD his role in addressing cybersecurity in space? Uh, it's real, uh, it's a new frontier. Um, it's not going away. It's only going to get more innovative, more open, more contested. It seems like a lot to do there. So what's your role in addressing cyber security in space? >>I think our role is to be the leader in developing and only is it the strategy, but the, uh, the implementation plan is to ensure a full of cybersecurity. If you look at the national cyber cyber strategy, I think publishing 2018 calls for like-minded countries, industry academia, and civil society. Once you mentioned John, the support technology development, uh, digital safety policy advocacy, and research you here today, and those listening are fulfilling their strategy. When you, when you develop, enable use cyber hygiene products, as examples of capabilities, you're pushing the goal to fruition. When you know, what's on your network patron network backup, you're in encrypt your network, you're hardening and preventing cyber attacks. And we in government academia in the case of Cal poly civil networks and in commercial companies, we all benefit from doing that cyber security. Uh, and I think Chris will, we'll, we'll definitely back me up on this more than passwords encryption or pharma. It's truly a mindset and a culture of enabling missions to succeed in assured in a resilient fashion. >>Chris, you're taking reaction to, to the cybersecurity challenge involved here, >>That's it, it's starting really at the highest level of governments. We have, uh, you know, the, the recent security policy directive five that just came out just a couple of days ago, recognize all the factors of cybersecurity that need to come into play. And probably the most important outcome of that as mr said, is the leadership role and that leadership, uh, blends out very well into partnership. So partnership with industry partnership with academia partnership, with, uh, other people that are exploring space. And those partnerships lend itself very naturally to sharing cybersecurity issues, topics as we come up with best practices as we come up with mitigation strategies. And as we come up with vulnerabilities and share that information, the, uh, we're not going to go alone in space, just like we're probably not going to go alone in many other industries or areas, uh, that the DOD has to be, uh, involved in many spectrums of deploying to space. >>And that deployment involves as Mr. Guzman said, encryption authentication, knowing what's on the network, knowing the, the fabric of that network. And if nothing else, this, uh, this, uh, internet of things and work from home environment that we've, uh, partaken of these last few months has even explored and expanded that notion even more dramatically as we have people dial in from all over the different, uh, locations, well space will be that natural node that, uh, natural, uh, next network and mesh involvement that we'll have to protect and explore on not just from a terrestrial involvement, but all segments of it. Th the comm segment, the space vehicle and the ground portion, >>No bond. We talked about this in our other segment, um, around with the president of Cal poly, but the operating models of the space force and the DOD and getting space. It's a software defined world, right? So cybersecurity is a real big issue. Cause you have an operating model that's requiring software to power, these low hanging satellites. That's just an extension to the network. It's distributed computing, know what this is. If you understand what technology we do in space, it's no different, it's just a different environment. So it's software defined that just lends itself well to hacking. I mean, if I'm a hacker I'm going, Hey, why not just take out a satellite and crash it down or make the GPS do something different? I mean, it's definitely an attack vector. This is a big deal. It's not just like getting credentials that are cashed on a server. You gotta really protect, >>Right? Because in one hand it space will carry not only, uh, uh, you know, for local national security information. Uh, but the, uh, I feel like at the economic wellbeing, the financial state of allowed a lot of countries and institutions, you know, more and more John lb, they'll be using space assets to, uh, uh, to make, uh, make, make all that happen. Right. So, and if you look at the, you talk, you mentioned the attack vectors in space, you know, it's not just the computers in the ground, but if you look at the whole life cycle for satellite systems in space, you know, that the, the, the tasking that you need to do that the command, the controlling of the vehicle, the data that comes down in the ground, even when you launch the, the birds, the satellites, you know, they only need to be protected because they're all somewhat vulnerable to, uh, to hacking, uh, to cyber attacks. Especially as we grow into commercialization space, it's going to be a lot more people out there playing in this world. It's going to be a lot more companies out there. And, you know, it's hard to track, uh, uh, you know, the, the potential of, of, of foreign influences as an example, and therefore the potential of being vulnerable in terms of the cyber threat. >>Gentlemen, I like you guys said to move on to this leadership role, you mentioned that you want to be a leader. I get it. The DOD is department of defense. That's a new frontier to defend war time zone. You mentioned war time opportunity potentially, but how do you guys assist that's term hat to getting done? Because there's public and private space operations happening, um, there's security challenge. What does being a leader mean? And how does the DOD department of defense assist driving the public and private? Do you lead from a project standpoint, you lead from a funding standpoint? Is it architectural? I mean, you're talking about now a new end to end architecture. It's not just cloud it's on premise. It's in devices, it's offloaded with new AI technology and Nicks and devices. It's IOT, it's all, this is all new, this is all new. What does it mean for the DOD to be a leader and how do you assist others to get involved? And what does that mean? >>Yeah, I think, uh, the one hand, you know, DOD used to lead, uh, in terms of, uh, uh, being the only source of funding for a lot of, uh, highly developmental efforts. Uh, we're seeing a different story in space. Again, I keep going back to the commercialization of space. We're seeing a lot more players, right? So in many ways >>Ally's commercial companies are actually legally leading the R and D uh, of a lot of different technologies. So we want to take, we certainly want to take advantage of that. So from a leadership standpoint, I think we, we, Lucia can come in, you know, by partnering a lot more with, with the commercial companies, uh, in 2022, the DOD released the defense, uh, uh, space strategy as an example that highlights the threats, the challenges and opportunities the United States has faced by, by sending a example of how we, how we, uh, how we counter, uh, the threats that are out there, not just the DOD, but, but the disability and the commercial sector as well. Our current conditions are strong, but we want to use four lines of effort to meet our challenges and capitalize on our desire state space, uh, lines of effort include building a comprehensive military badges space, integrating space into a national joint and combined operations. Like I mentioned before, shaping that strategic environment and cooperating with allies, partners, and industry and other U S governmental agencies, departments, and agencies to advance the cost of space to take full advantage of what space can provide us, uh, in DOD, uh, and the nation. Chris has a domain. Now, what's your take on all that? >>That's because again, it's going to take more people, >>More diverse, potentially more security >>Halls. What's your view on it? >>Well, let's, let's look at how innovation and new technologies can help us in these areas. So, uh, and, and mentioned it a couple of topics that you hit on already. One of the areas that we can improve on is certainly in the, uh, the architecture, uh, where we look at a zero trust architecture, one of the NIST standards that's come about where it talks about the authentication, uh, the need to know a granular approach, this idea of being able to protect, not just data, but the resources and how people can get access to those, whether they're coming in through an identification, authentication Prudential, or, uh, other aspects of, uh, the, the idea of not just anybody should be able to have access to data or anybody should have access once they're on the inside of the network. So that zero trust architecture is, is one approach where we can show some leadership and guidance. >>Another area is in, uh, a topic that you touched on as well was in the software area. So some innovations are coming on very rapidly and strong in this artificial intelligence and machine learning. So if we can take this AI and ML and apply it to our software development areas, they can parse so much information very quickly. And, uh, you know, this vast array of code that's going into system nowadays, and then that frees up our human, uh, explicit talent and developers that can then look at other areas and not focus on minor bawling to Beverly fix a vulnerability. Uh, they, they can really use their unique skills and talents to come up with a better process, a better way, and let the artificial intelligence and machine learning, find those common problems, those, those unknown, hidden lines of code that, uh, get put into a software alarm Prairie, and then pull down over and over again from system to system. So I think between, uh, an architecture leadership role and employee innovation are two areas that we can show, uh, some benefits and process improvement to this whole system. >>That's a great point, Chris, and you think about just the architectural computer architecture, you know, S you know, network attached storage is an advantage software defined there. You could have flash all flash arrays for storage. You could have multiple cores on a device and this new architecture, offloads things, and it's a whole new way to gain efficiencies. I mean, you got Intel, you got Nvidia, you've got armed all the processors all built in. Um, so there's definitely been commercial best practices and benefits to a new kind of architecture that takes advantage of these new things. It's just, just efficiencies. Um, but this brings up the whole supply chain conversation. I want to get your thoughts on this, because there is talk about predatory investments and access and tactics to gain supply chain access to space systems, your thoughts. >>Yeah. It's a serious threat and not just for, uh, the U S uh, space. So supply chain, if you will, is the supply chain. And I says, you know, writ large, I think, uh, I think it's a, it's a, it's a threat that's, that's real, we're we're seeing today. I just saw an example recently, uh, involving, uh, our, I think our launch services were, there was a, uh, a foreign, uh, threat that was those trying to get into a true through with predatory investments. Uh, so, uh, it is something that we need to, uh, be aware of it it's happening, uh, and is continuing to happen. Uh, it's an easy way to gain access, to, uh, do our IP. Uh, and, uh, so it's something that we, uh, are serious about in terms of, uh, awareness and, and countering >>Chris, your thoughts. I mean, we've see, I mean, I'm an open source guy. I was seen it when I grew up in the industry in the eighties, open source became a revolution, but with that, it enabled new tactics for, um, state sponsored attacks on it that became a domain in of itself. Um, that's well-documented and people talk about that all the time in cyber. Now you have open innovation with hardware, software connected systems. This is going to bring supply chain nightmare. How do you track it all? Who's got what software and what device, where the chip come from, who made it, this is the potential is everywhere. How do you see the, these tactics, whether it's a VC firm from another country or this, that, and the other thing startup. >>Yeah. So when we see, when we see coal companies being purchased by foreign investors, and, you know, we can get blocked out of those, whether it's in the food industry, or if it's in a microchip, then that microchip could be used in a cell phone or a satellite or an automobile. So all of our industries that have these companies that are being purchased, or a large born investment influx into those, you know, that could be suspect. And we, we have to be very careful with those, uh, and, and do the tracking of those, especially when those, uh, some of those parts of mechanisms are coming from off shore. And then going again, going back to, uh, the space policy directive five, it calls out for better supply chain, resource management, the tracking, the knowing the pedigree and the, the quantitative of ability of knowing where those software libraries came from, where the parts came from and the tracking and delivery of that from an end to end system. >>And typically when we have a really large vendor, they can, they can do that really well. But when we have a subcontractor to a subcontractor, to a subcontractor, their resources may not be such that they can do that. Try tracking in mitigation for counterfeits or fraudulent materials going into our systems. So it's a very difficult challenge, and we want to ensure as best we can that as we ingest those parts, as we ingest those software libraries and technologies into the system, that, uh, before we employ them, we have to do some robust testing. And I don't want to say that the last line of defense, but that certainly is a mechanism for finding out, do the systems perform as they stated, uh, on a test bench or a flat set, whatever the case may be before we actually deploy it. And then we're relying on the output or the data that comes from that, that system that may have some corrupt or suspect parts in it. >>Great point, this federal grant, >>The problem with space systems is kind of, you know, is once you, once you launch the bird or the sunlight, uh, your access to it is, is diminished significantly, right? Unless you, you go up there and take it down. Uh, so, you know, kind of to Chris's point, we need to be able to test all the different parts of insurer that is performing as, as described there ass, I spent as specified, uh, with, with good knowledge that it's, uh, it's, uh, it's trustworthy. Uh, and, uh, so we that all on the ground before we, we take it up to launch it. >>It's funny. You want agility, you want speed and you want security, and you want reliability and risk management all aggressive, and it's a technical problem. It says it's a business model problem. I'd love to get real quick. Before we jump into some of the more workforce and gap issues on the personnel side, have you guys should just take a minute to explain quickly what's the federal view. If you had to kind of summarize the federal view of the DOD and the roll with it wants to take, so all the people out there on the commercial side or students out there who are, you know, wanting to jump in, what is the current modern federal view of space cybersecurity. >>Chris, why don't you take that on I'll follow up. Okay. Uh, I don't know that I can give you the federal view, but I can certainly give you the department of defense. That cybersecurity is extremely important. And as our vendors and our suppliers, uh, take on a very, very large and important role, one area that we're looking at improving on is a cyber certification maturity model, where we, where we look at the vendors and how they implement an employee cyber hygiene. So that guidance in and of itself shows the emphasis of cyber security that when we want to write a contract or a vendor, uh, for, for a purchase, that's going to go into a space system. We'd like to know from a third party audit capability, can that vendor, uh, protect and defend to some extent the amount that that part or piece or software system is going to have a cyber protection already built into it from that vendor, from the ground floor up before it even gets put into a larger system. >>So that shows a level of the CMMC process that we've thought about and, uh, started to employ, uh, beginning in 2021 and will be further built on in, in the out years. How, how important the DOD takes that. And other parts of the government are looking at this, in fact, other nations are looking at the CMMC model. So I think it shows a concern in very many areas, uh, not just in the department of defense that they're going to adopt an approach like this. Uh, so it shows the, the pluses and the benefits of a cybersecurity model that, uh, all can build on boggy reaction. Yeah, I'll just, uh, I'll just add to that, John, you, you, you, you asked earlier about, you know, how do we, uh, track, uh, commercial entities or, or people in the space and cyber security domains? Uh, I can tell you that, uh, at least my view of it, you know, space and cyber security are new, it's exciting, it's challenging a lot technical challenges there. So I think in >>Terms of attracting the right people, personnel to work those areas, uh, I think it's, it's not only intellectually challenging, uh, but it's important for, for the dependency that NASA States, uh, and it's important for, for, for economic security, uh, writ large for, for us as well. So I think, uh, in terms of a workforce and trying to get people interested in, in those domains, uh, I hope that they see the same thing we do in terms of, of the challenges and the opportunities it presents itself in the future. >>Awesome. I love your talk on intro track there falling. You mentioned, uh, the three key areas of DOD sec success, developing a government whole government approach to partnership with the private sector. I think that's critical and the allies prioritizing the right investments on resilience, innovation, adaptive operations, and responding to rapidly to effectively emerging technology. So you can be fast, all think are all things. I all, all those things are relevant. So given that, I want to get your thoughts on the defense space strategy in 2020, the DOD released dispense defense space, strategy, highlighting threats, and challenges and opportunities. How would you summarize those threats and those challenges and opportunities? What are the, what are those things that you're watching in the defense space area? Right. >>Well, I think, I think I saw, as I said before, of course, as well, you know, uh, or, or seeing that a space will be highly contested, uh, because it's a critical element in our, in our war fighting construct, uh, Dwayne, a future conflict, I think we need to, to win space as well. So when you, when you look at our near peer adversaries, there's a lot of efforts, uh, in trying to, to, to take that advantage away from the United States. So, so the threat is real, uh, and I think it's going to continue to evolve and grow. Uh, and the more we use space, both commercial and government, I think you're going to see a lot more when these threads some AFAs itself, uh, in, in forms of cyber, cyber attacks, or even kinetic attacks in some cases as needed. Uh, so yeah, so with the, the, the threat is need growing, uh, space is congested, as we talked about, it will continually be contested in the future as well. So we need to have, uh, like we do now in, in, in all the other domains, a way to defend it. And that's what we're working on with India, with the, how do we pilot with tech, our assets in space, and how do we make sure that the data information that traverses through space assets are trust 40, um, and, uh, and, and, and free of any, uh, uh, interference >>Chris, exciting time. I'm your, if you're in technology, um, this is crossing many lines here, tech society will war time, defense, new areas, new tech. I mean, it's security, it's intoxicating at many levels, because if you think about it, it's not one thing. It's not one thing anymore. It spans a broader spectrum, these opportunities. >>Yeah. And I, and I think that expansion is, is a natural outgrowth from, as our microprocessors and chips and technology continue to shrink smaller and smaller. You know, we, we think of our, our cell phones and our handheld devices and tablets, and so on that have just continued to, uh, get embedded in our everyday society, our everyday way of life. And that's a natural extension when we start applying those to space systems. When we think of smallsats and cube sets and the technology that's, uh, can be repurposed into, uh, a small vehicle and the cost has come down so dramatically that, you know, we, we can afford to get a rapid experiments, rapid, um, exploitations and, and different approaches in space and learn from those and repeat them very quickly and very rapidly. And that applies itself very well to an agile development process, dev sec ops, and this notion of spins and cycles and refreshing and re uh, addressing priorities very quickly so that when we do put a new technology up, that the technology is very lean and cutting edge, and hasn't been years and years in the making, but it's, uh, relevant and new, and the, uh, the cybersecurity and the vulnerabilities of that have to be addressed because of, and allow that DevSecOps process to take place so that we can look at those vulnerabilities and get that new technology and those new, new experiments and demonstrations in space and get lessons learned from them over and over again. >>Well, that brings us to the next big topic I want to spend the remainder of our time on that is workforce this next generation. If I wasn't so old, I would quit my job and I would join medially. It's so much, it's a fun, it's exciting. And it's important. And this is what I think is a key point is that cybersecurity in and of itself has got a big gap of shortage of workers, nevermind, adding space to it. So this is, uh, the intersection of space and cybersecurity. There is a workforce opportunity for this next generation, a young person to person re-skilling, this is a big deal. Bong, you have thoughts on this. It's not just STEM, it's everything. >>Yeah. It's everything, you know, uh, the opportunities would have in space it's significant and tremendous. And I think, uh, if I were young, again, as you pointed out, John, uh, you know, I'm, I'm, I'm lucky that I'm in this domain in this world and I started years ago. Uh, but it continues to be exciting, uh, lots of, lots of opportunities, you know, and when you, when you look at, uh, some of the commercial space, uh, systems that are being, being put up, uh, if you look at, I mentioned Starlink before, and, and, uh, Amazon's Kuyper constellation. These guys are talking about couple of thousand satellites in space to provide ubiquitous communications for internet globally and that sort of thing. Uh, and they're not the only ones that are out there producing capability. Uh, we're seeing a lot more commercial imagery products being developed by bike, by companies, both within the U S and, and, uh, foreign foreign elements as well. So I think it's an exciting time to be in space. Certainly lots of opportunities, there's technical challenges, uh, galore in terms of, you know, not only the overcoming the physics of space, but being able to operate, uh, flexibly, uh, in, uh, get the most you can out of the capabilities we have, uh, uh, operating up as high as being cool. I mean, everyone looks at launch. >>She gets millions of views on live streams, the on demand, reruns get millions and millions of views. Um, it's, there's a lot of things there. Um, so Chris, what specifically could you share are things that people would work on? Um, jobs skills, what are some, what's the aperture, what's it look like if you zoom out and look at all the opportunities from a scale standpoint, what's out there, >>We'll talk to the aperture, but I want to give a shout out to our space force. And I mean, their, their job is to train and equip, uh, future space and, uh, that, that space talent. And I think that's going to be a huge plus up, uh, to have, uh, uh, a space force that's dedicated to training equipping, uh, the, an acquisition and a deployment model that, uh, will benefit not just the other services, but all of our national defense and our, uh, you know, our, our strategic way of, uh, how, how this company, country, employees space, uh, altogether. So having, having a space for us, I think, as a, is a huge, uh, a huge issue. And then to get to that aperture aspect of, of what you're, what you're asking and, you know, that addresses a larger workforce. Uh, we need so many different talents in, in this area. >>Uh, we can, we can have, we can employ a variety of people, uh, from technical writers to people who write, uh, write in developed software to those who, uh, are bending metal and actually, uh, working in a hardware environment. And, uh, those that do planning and launch operations and all of those spectrums and issues of jobs, or are directly related to a workforce that can contribute to, to space. And then once that data gets to the ground and employed out to a user, whether it's a data or we're looking at, uh, from a sensor recent, uh, recent events on, uh, shipping lanes, those types of things. So space has such a wide and diverse swath that the aperture's really wide open, uh, for a variety of backgrounds. And, and those that, uh, really just want to take an opportunity, take a, take a technical degree or a degree that, uh, can apply itself to a tough problem, uh, because they certainly exist in space. And we can, we can use that mindset of problem solving, whether you come at it from a hacker mindset, an ethical, a white hat approach to testing and vulnerability exploration, or somebody who knows how to actually, um, make, uh, operations, uh, safer, better, uh, through space situation awareness. So there's a, there's a huge swath of opportunity for us >>Bon talk about the, um, the cyber security enabled environment, the use cases that are possible when you have cybersecurity in play with space systems, um, which is in and of itself, a huge range of jobs, codings supply chain. We just talked about a bunch of them. There's still more connected use cases that go beyond that, that, that are enabled by it. If you think about it, and this is what the students at Cal poly and every other college and university community college, you name it, or watching videos on YouTube, anyone with a brain can jump in. If they, if they see the future, it's an all net new space force is driving awareness, but there's a whole slew of these new use cases that I call space enabled by cybersecurity systems. Your thoughts. >>Absolutely. I, you know, I was, uh, had planned on attending the, uh, uh, the cyber challenge that's Cal poly had planned in June, of course, a pandemic, uh, uh, took care of that plan. But, but I was intrigued by, by the approach that the Cal poly was taking with, with, uh, middle school and high school kids of, of, of, of exposing him to a problem set here. You have a, a satellite that came down from space, uh, and, uh, part of the challenge was to do Porensic analysis on the debris, uh, the remaining pieces of the sound like to figure out what happened. Uh, it had a, uh, a cybersecurity connotation. It was hacked. It was attacked by, by cyber threat nation, took it down. And the beauty of having these kids kind of play with, with the remaining parts of the satellite figure out what happened. >>So I was pretty exciting. I was really looking forward to participating in that, but again, the pandemic kind of blew that up, but I, I look forward to future events like that to, to get our young people intrigued and interested in, uh, in this new field of space. Now, you know, Chris was talking earlier about opportunities, the opportunity that you talk about, you know, while I would like to have people come to the government, right. To help us out. It's not, it's not just focused on government, right? There's not lots of opportunities in commercial space. I, if you will, uh, for, for a lot of talent to, uh, uh, to have, uh, to participate in. So the challenge is a man's government and the commercial sector, John, >>I mean, you get the hardcore, you know, I want to work for the DOD. I want to work for NSA. I want to work for the government. You clearly got people who want to have that kind of mission, but for the folks out there, Chris and bong that are like, I'll do I qualify it? It's like the black box of the DOD. It's like a secret thing. You got any clearance, you've got to get all these certifications. And you've got to take all kinds of tests and background checks. And, um, is it like that? And will that continue? Cause some people might say, Hey, can I even get involved? What do I do? So I know there's some private partnerships going on with companies out there in the private sector. So this is now a new, you guys seem to be partnering and going outside the comfort zone of the old kind of tactical things. What are some of those opportunities that people could get involved that they might not know about >>PR for NSA, there's a variety of workforce, uh, initiatives that, uh, uh, for anybody from a high school work study can take advantage of to, uh, those that would like have to have internships. And those that are in a traditional academic environment, there's, uh, several NSA schools across the country that have a academic and cyber acts, uh, sites of excellence that participate in projects that are shepherded and mentored by those at NSA that can get those tough problems that don't have maybe a classified or super sensitive, uh, nature that that can be worked in and in an academia environment. So, so those are two or three examples of how somebody can break into, uh, the, uh, an intelligence organization and the, and the other agencies have those, uh, opportunities as well across the intelligence community and the, the partnership between and collaborative collaboration between private industry and the agencies and the department of defense just continue to grow over and over again. And even myself being able to take care advantage of a joint duty assignment between my home organization and the Pentagon just shows another venue of somebody that's in one organization can partner and leverage with another organization as well. So I'm an example of, of that partnering that's going on today. >>So there's some innovation, bong, non traditional pathways to find talent. What are out there? What are new, what are these new nontraditional ways >>I was going to add to what Chris was, was mentioning John? Yeah. Even within view and under the purview of our chief information officer, back in 2013, the deputy surfed dirty defense signed the, uh, what we call the DOD cyberspace workforce strategy, uh, into effect. And that included a program called the cyber information technology exchange program. It's an exchange program in which a, uh, you know, private sector employee and worked for the DOD in cyber security positions, uh, span across multiple mission critical areas. So this is one opportunity to learn, uh, you know, in inside the DOD what's happening as a private sector person, if you will, uh, going back to what we talked about, you know, kinda, uh, opportunities, uh, within the government for, for somebody who might be interested, uh, you know, you don't have to be super smart, Bork and space. Uh, there's a lot of like, like Chris pointed out, there's a lot of different areas that we need to have people down within people to do, uh, to conduct the mission space. So you don't have to be mathematician mathematician. You don't have to be an engineer to succeed in this business. I think there's plenty of opportunities for, for any types of, of talent, any type of academic disciplines that, that, that, that they're out there. >>And I think, you know, Chris is shout out to the space force is really worth calling out again, because I think to me, that's a big deal. It's a huge deal. It's going to change the face of our nation and society. So super, super important. And that's going to rise the tide. I think it's gonna create, uh, some activation, uh, for a younger generation, certainly, and kind of new opportunities, new problems to solve new threats to take on and, and move it on. So really super conversation space in cybersecurity, the department of defense perspective, Von and Chris, thank you for taking the time. I'd love you guys just to close out. We'll start with you bong. And then Chris summarize for the folks watching, whether it's a student at Cal poly or other university or someone in industry and government, what is the department of defense perspective for space cybersecurity? >>Chris, won't go and take that on. I started, thank you. Uh, cyber security applies to much more than just the launch and download of mission data or human led exploration and the planning, testing, and experiments in the lab prior to launch require that cyber protection, just as much as any other space link, ground segment, trust rail network, or user data, and any of that loss of intellectual property or proprietary data is an extremely valuable and important, and really warrants, cybersecurity safeguards in any economic espionage or data exfiltration or denied access to that data I E ransomware or some other, uh, attack that can cripple any business or government endeavor. Uh, no matter how small or large, if it's left in our economic backbone, uh, clearly depends on space and GPS is more than just a direction finding our banking needs that a T and timing from P and T or whether it says systems that protect our shipping and airline industry of whether they can navigate and go through a particular storm or not, uh, even fighting forest fires picked up by a remote sensor. >>All those space-based assets, uh, require protection from spoofing date, uh, data denial or total asset loss. An example would be if a satellite sensitive optics were intentionally pointed at the sun and damaged, or if a command, uh, to avoid collision with another space vehicle was delayed or disrupted or a ground termination command. As we just saw just a few days ago at T minus three seconds prior to liftoff, if those all don't go as planned, uh, those losses are real and can be catastrophic. So the threat to space is pervasive real and genuine, and your active work across all those platforms is a necessary and appreciated. And your work in this area is critical, uh, going forward going forward. Uh, thank you for this opportunity to speak with you and, uh, talking on this important topic. >>Thank you, Chris Henson, goodbye. >>Closing remarks. Yeah. Likewise, John, uh, again, uh, as, as Chris said, thank you for, for the opportunity to discuss this very important, uh, around space, cyber security, as well as addressing, uh, at the end there, we were talking about workforce development and the need to have, uh, people, uh, in the mix for four features. We discussed with you. We need to start that recruiting early, uh, as we're doing to address, uh, the STEM gap today, we need to apply the same thing for cybersecurity. We, we absolutely need smart, innovative people to protect both Iraq. Anomic wellbeings a nation as well as our national defense. So this is the right conversation to have at this time, John and I, again, thank you and our Cal poly hose for, or, uh, having a symposium and, and having this opportunity to have this dialogue. Thank you, >>Gentlemen. Thank you for your time and great insights. We couldn't be there in person. We're here virtual for the space and cybersecurity symposium, 2020, the Cal poly I'm Jennifer with Silicon angle and the cube, your host. Thank you for watching.
SUMMARY :
It's the queue cover the space and cybersecurity symposium this year, you know, and despite the pandemic, Uh, space is the newest war fighting what I want to share with you today is how the current space strategy ties into the national defense strategy and effectively to leverage emerging technologies and seize opportunities to advance your assurance of the information and resilience of the underlying terrestrial air in space networks You know, more and more, uh, we see greater use of small satellite systems to address a myriad While a number of these companies continue to grow. and Steve Jake's the founder of the national security space association to address workforce development. We need the new skill space is here. the European space agency, and, uh, the Canadian space agency, So we asked my first question, Bonnie, we'll start with you is what do you see as the DOD his role in addressing the support technology development, uh, digital safety policy advocacy, is the leadership role and that leadership, uh, blends out very well over the different, uh, locations, well space will be that natural models of the space force and the DOD and getting space. uh, uh, you know, for local national security information. to be a leader and how do you assist others to get involved? Yeah, I think, uh, the one hand, you know, Ally's commercial companies are actually legally leading the R and D uh, of a lot of different What's your view on it? So, uh, and, and mentioned it a couple of topics that you hit on already. And, uh, you know, I mean, you got Intel, you got Nvidia, And I says, you know, Now you have open innovation with hardware, delivery of that from an end to end system. into the system, that, uh, before we employ them, Uh, and, uh, so we that all on the ground before we, we take it up to launch it. on the commercial side or students out there who are, you know, wanting to jump in, So that guidance in and of itself shows the emphasis of cyber security that So that shows a level of the CMMC process that we've thought about for the dependency that NASA States, uh, and it's important for, So you can be fast, all think are all things. Uh, and the more we use space, I mean, it's security, it's intoxicating at many levels, because if you think about it, and so on that have just continued to, uh, get embedded in our everyday society, So this is, uh, the intersection of space and cybersecurity. Uh, but it continues to be exciting, uh, lots of, jobs skills, what are some, what's the aperture, what's it look like if you zoom out and look our, uh, you know, our, our strategic way of, uh, how, how this company, can apply itself to a tough problem, uh, because they certainly exist when you have cybersecurity in play with space systems, um, analysis on the debris, uh, the remaining pieces of the sound like to figure Now, you know, Chris was talking earlier about opportunities, the opportunity that you talk about, I mean, you get the hardcore, you know, I want to work for the DOD. industry and the agencies and the department of defense just continue to So there's some innovation, bong, non traditional pathways to find talent. to learn, uh, you know, in inside the DOD what's happening as a private sector And I think, you know, Chris is shout out to the space force is really worth calling out again, because I think to and experiments in the lab prior to launch require that cyber protection, So the threat to space is pervasive real So this is the right conversation to have at this time, John and I, the space and cybersecurity symposium, 2020, the Cal poly I'm Jennifer with Silicon angle and the cube,
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Chris | PERSON | 0.99+ |
Chris Henson | PERSON | 0.99+ |
Chris Nissen | PERSON | 0.99+ |
John | PERSON | 0.99+ |
Steven | PERSON | 0.99+ |
Bonnie | PERSON | 0.99+ |
Bob | PERSON | 0.99+ |
Guzman | PERSON | 0.99+ |
2013 | DATE | 0.99+ |
Steve Jake | PERSON | 0.99+ |
millions | QUANTITY | 0.99+ |
2020 | DATE | 0.99+ |
Dwayne | PERSON | 0.99+ |
FCC | ORGANIZATION | 0.99+ |
Nvidia | ORGANIZATION | 0.99+ |
June | DATE | 0.99+ |
Paul | PERSON | 0.99+ |
Von | PERSON | 0.99+ |
2022 | DATE | 0.99+ |
hundreds | QUANTITY | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
GUMA | PERSON | 0.99+ |
DOD | ORGANIZATION | 0.99+ |
2018 | DATE | 0.99+ |
first question | QUANTITY | 0.99+ |
Pentagon | ORGANIZATION | 0.99+ |
4th of October, 1957 | DATE | 0.99+ |
two | QUANTITY | 0.99+ |
NSA | ORGANIZATION | 0.99+ |
1957 | DATE | 0.99+ |
2021 | DATE | 0.99+ |
Cal poly | ORGANIZATION | 0.99+ |
Jennifer | PERSON | 0.99+ |
Lucia | PERSON | 0.99+ |
U S | LOCATION | 0.99+ |
today | DATE | 0.99+ |
First | QUANTITY | 0.99+ |
U S | ORGANIZATION | 0.98+ |
one example | QUANTITY | 0.98+ |
both | QUANTITY | 0.98+ |
each | QUANTITY | 0.98+ |
Darlene constellation | LOCATION | 0.98+ |
first artificial satellite | QUANTITY | 0.98+ |
one organization | QUANTITY | 0.98+ |
over 3000 | QUANTITY | 0.98+ |
Don | PERSON | 0.98+ |
Intel | ORGANIZATION | 0.98+ |
Starlink | ORGANIZATION | 0.98+ |
one opportunity | QUANTITY | 0.98+ |
eighties | DATE | 0.98+ |
first | QUANTITY | 0.98+ |