Image Title

Search Results for Guzman:

Usman Nasir, Verizon | AIOps Virtual Forum 2020


 

>>from around the globe. It's the Cube with digital coverage of AI ops Virtual Forum Brought to you by Broadcom Welcome back to the Broadcom AI Ops Virtual Forum Lisa Martin here talking with Usman Naseer Global Product Management at Verizon we spend Welcome back. >>Uh huh. Hello, Good >>to see you. So 2020 The year of that needs no explanation. With the year of massive challenges, I wanted to get your take on the challenges that organizations are facing this year as the demand to deliver digital products and services has never been higher. >>Yeah, I e I think this is something is so close to all the part part right? It's something that's impacted the whole world equally. And I think regardless off which industry you win, you have been impacted by this in one form or the other and the i c t industry, the information and communication technology industry. You know, Verizon being really massive player in that whole arena, it has just been sort of struck with this massive confirmation that we have talked about for a long time. We have talked about these remote surgery capabilities whereby you got patients in Kenya were being treated by experts sitting in London or New York and also this whole consciousness about, you know, our carbon footprint and being environmentally conscious. This pandemic has taught a school of that and brought this to the forefront off organizational priority, right? The demand. I think that Zaveri natural consequence of everybody sitting at home. And the only thing that can keep things still going is the data communication, Right? But I would just say that that is what kind of at the heart of all of this. Just imagine if we are to realize any of these targets that the world is world leadership is setting for themselves. Hey, we have >>to be carbon >>neutral by Xia as a country as a geography, etcetera etcetera. You know, all of these things require you to have this remote working capability this remote interaction, not just between human but machine to machine interaction. And this is a unique value chain which is now getting created that you've got people we're communicating with other people or were communicating with other machines. But the communication is much more. I won't even use the term really time because we've used real time for voice and video, etcetera. We're talking low latency microsecond to see and making that can either cut somebody's, you know, um, our trees or that could actually go and remove the tumor, that kind of stuff. So that has become a reality. Everybody's asking for it. Remote learning, being an extremely massive requirement where, you know, we've had to enable these thes virtual classrooms ensuring the type of connectivity, ensuring the type of type of privacy which is just so, so critical. You can't just have everybody you know, Go on the internet and access the data source. You have to be. I'm sorry about the integrity and security of >>that. They've >>had the foremost. So I think all of these things, Yes. We have not been caught off guard. We were should be pretty forward looking in our, you know, plans in our evolution. But yes, it does this fast track a journey that we would probably the least we would have taken in three years. It has brought that down to two quarters where we had to execute them. >>Right? Massive acceleration. All right, so you articulated the challenges really well and a lot of the realities that many of our viewers air facing. Let's talk now about motivations ai ops as a tool as a catalyst for helping organizations overcome those challenges. >>So, yeah, now all that I said you can imagine, you know, it requires microsecond the sea and making which human being on this planet can do microsecond the sea and making on complex network infrastructure, which is impacting, and user applications which have multitudes off effect. You know, in real life, I used the example of a remote surgeon. Just imagine, if you know, even because you just lose your signal on the quality of that communication for that microsecond, it could be the difference between killing somebody in saving somebody's life. Is that particular? We talk about autonomous vehicles way talk about the transition to electric vehicles, smart motorways, etcetera, etcetera in federal environment. How is all of that going to work? You have so many different components coming in. You don't just have a natural can security anymore. You have software defined networking that's coming becoming a part of this. You have mobile edge computing that is rented for the technologies. Five g enables we're talking augmented reality. We're talking virtual reality all of these things require that resource is. And while we carbon conscious, we don't just wanna build a billionaire, a terrorist on the planet, right? We we have to make sure that resource is air given on demand and the best way of re sources can be given on demand and could be most efficient. Is that we're making is being made at million microsecond. And those resource is our accordingly being distribute. Right? If you're 10 flying on, people sipping their coffee is having teeth talking to somebody else. You know, just being away on holiday. I don't think we're gonna be able to handle that world that we have already stepped into. Risen's five g has already started businesses on the transformational journey where they're talking about end user experience, personalization. You're gonna have, you know, events where people are going to go. And it's going to be three dimensional experiences that are purely customized for you. How How does that all happen without this intelligence having their and a network with all of these multiple layers assaults spectrum, it doesn't just need to be intuitive. Hey, this is my private I p traffic. This is public traffic. You know it has to now be into or this is an application that to privatize over another has to be intuitive to the criticality in the context, off those transactions again that surgeons surgery is much more important than husband sitting and playing a video game. >>Yeah, I'm glad that you think that that's excellent. Let's go into some specific use cases. What are in some of the examples that you gave? Let's kind of dig deeper into some of that. What you think are the lowest hanging fruit for organizations, kind of pan industry to go after here. >>Excellent, right? And I think this just like different ways to look at the lowest timing food. Like for somebody like Verizon, who is the managed services provider, you know, very comprehensive medicines. But we obviously have food timing much lower than potentially for some of our customers who want to go on that journey, right? So for them to just >>go and try and >>harness the power of help, the food's might be a bit higher hanging. But for somebody like God, the immediate ones would be to reduce the number off alarms that are being generated by these overlays services. You've got your basic network. Then you've got your software defined networking. On top of that, you have your hybrid clouds. You have your edge computing coming on top of that, you know? So ALOF this means if there is an outrage on one device on the network, gonna make this very real for everybody, right? It's right out. I'm not divisive. Network does not stop all of those multiple applications for monitoring tools from raising havoc and raising thousands off alarms and everyone capacity. If people are attending to those thousands off alarms, it's like you having a police force. And there's a burglary in one bank and the alarm goes off in $50. How you gonna make the best use of your police force? You're gonna go investigate 50 banks? You wanna investigate one where the problem is. So it's as realize that and I think that's the first wind where people can save so much cost, which is currently being wasted. And resource is running around primary figure stuff up immediately. Anti this with network and security network and security is something which has eluded even the most. You know, amazing off brings in or engineering. Well, we took it. We have network expert, separate people. Security experts separate people to look for different things. But there are security events that can impact the performance of the network and then use your application, cetera, etcetera, which could be falsely attributed to the network. And then if you've got multiple parties, which are then which have to clear stakeholders, you can imagine the blame game that goes on pointing fingers, taking names, not taking responsibility. That is how all this happened. This is the only way to bring it all together to say Okay, this is what takes priority. If there's an event that has happened, what is its correlation to the other downstream systems, devices, components and user applications. And it subsequently, you know, like isolating into the right cause where you can most effectively resolve that problem. Certainly, I would say on demand virtualized resource virtualized resource is the heart and soul of the spirit of status that you can have them on them up so you can automate the allocation of these. Resource is based on, you know, customers consumption, their peaks, their crimes. All of that comes in. You see Hey, typically on a Wednesday, their traffic goes up significantly from this particular application. You know, going to this particular data center, you could have this automated this AI ops, which is just providing those resource, is, you know, on demand and tell us to have a much better commercial engagement with customers and just a much better service assurance model. And then one more thing on top of that, which is very critical, is that, as I was saying, giving that intelligence to the network to start having context of the criticality of a transaction that doesn't exist to it. You can't have that because for that you need to have this, you know, multi layer data. You need to have multiple system which are monitoring and controlling different aspects of your overall and user application value chain to be communicating with each other. And, you know, that's that's the only way to sort of achieve that goal. And that only happens with AI off. It's not possible with them. You can paradise Comdex. >>So Guzman, you clearly articulated some obvious low hanging for use cases that organizations can go after. Let's talk now about some of the considerations you talked about the importance of the network in AI ops. The approach, I assume, needs to be modular support needs to be heterogeneous. Talk to us about some of those key considerations that you would recommend >>absolutely. So again, basically starting with the network. Because if there is, if the network sitting at the middle of all of this is not working, then things from communicate with each other, right? And the cloud doesn't work. Nothing. None of this person has hit the hardest all of this. But then subsequently, when you talk about machine to machine communication or i o T. Which is the biggest transformation to spend, every company is going priority now to drive those class efficiencies enhancements. We've got some experience. The integrity off the tab becomes paramount, right? The security integrity of that. How do you maintain integrity off your detail beyond just the secured network components that Trevor right? That's where you get into the whole arena Blockchain technology where you have these digital signatures or barcodes that machine then and then an intelligent system is automatically able to validate and verify the integrity of the data and the commands that are being executed by those and you determine. But I think the terminal. So I o. T machines, right, that is paramount. And if anybody is not keeping that into their equation, that in its own self, is any eye off system that is therefore maintaining the integrity off your commands and your quote that sits on those those machines Right. Second, you have your network. You need to have any off platform, which is able to rationalize all the fat network information, etcetera. And couple that with that. The integrity peace. Because for the management, ultimately, they need to have a co haven't view off the analytics, etcetera, etcetera. They need to. They need to know where the problems are again, right? So let's see if there's a problem with the integrity off the commands that are being executed by a machine. That's a much bigger problems than not being able to communicate with that machine. And the first thing because you'd rather not talk to the machine or haven't do anything if it's going to start doing the wrong thing, So I think that's where it's just very intuitive. It's natural. You have to have subsequently if you have some kind of say and let me use that use case Off Autonomous comes again. I think we're going to see in the next five years it's much water rates, etcetera. It will set for autonomous because it's much more efficient. It's much more space, etcetera, etcetera. So whether that equation you're gonna have systems which will be specialist in looking at aspects and Trump's actions related to those systems, for example, an autonomous moving vehicle's brakes are much more important than the Vipers, Right? So this kind of intelligence, there will be multiple systems who have to sit and nobody has to. One person has to go and on these systems, I think these systems should be open source enough that you are able to integrate them, right? If something sitting in the cloud you were able to integrate for that with obviously the regard off the security and integrity off their data, that has two covers from one system to the extremely. >>So I'm gonna borrow that integrity theme for a second as we go into our last question. And that is this kind of take a macro. Look at the overall business impact that AI ops can help customers make. I'm thinking of, you know, the integrity of teams aligning business and I t. Which we probably can't talk about enough. We're helping organizations really effectively measure KP eyes that deliver that digital experience that all of us demanding consumers expect. What's the overall impact? What would you say in separation? >>So I think the overall impact is a lot. Of course, that customers and businesses give me term got prior to the term enterprises defense was inevitable. There's something that for the first time will come to light. And it's something that is going to, you know, start driving cost efficiencies and consciousness and awareness within their own business, which is obviously going to have, you know, abdominal kind of an effect. So what example being that, you know, you have a problem? Isolation? I talked about network security, this multilayered architectural which enables this new world of five g um, at the heart of all of it. It is to identify the problem to the source, right? Not be bogged down by 15 different things that are going wrong. What is causing those 15 things to go wrong, right that speed to isolation and its own self can make millions and millions off dollars to organizations every organization. Next one is obviously overall impacted customer experience. The five g waas. You can have your customers expecting experiences from you, even if you're not expecting to deliver them in 2021 2022. You'll have customers asking for those experiences or walking away if you do not provide those experiences. So for it's almost like a business can do nothing. Every year they don't have to reinvest if they just want to die on the wine. Businesses want to remain relevant. Businesses want to adopt the latest and greatest in technology, which enables them to, you know, have that superiority and continue it. So from that perspective that continue ity, we're ready that there are intelligence system sitting, rationalizing information and making this in supervised by people, of course, who were previously making some of those here. >>That was a great summary because you're right, you know, with how demanding consumers are. We don't get what we want. Quickly we turn right, we go somewhere else, and we could find somebody that can meet those expectations. So it was spent Thanks for doing a great job of clarifying the impact and the value that AI ops can bring to organizations. That sounds really now is we're in this even higher demand for digital products and services, which is not going away. It's probably going to only increase. It's table stakes for any organization. Thank you so much for joining me today and giving us your thoughts. >>Pleasure. Thank you. >>We'll be right back with our next segment.

Published Date : Nov 23 2020

SUMMARY :

AI ops Virtual Forum Brought to you by Broadcom Welcome With the year of massive challenges, I wanted to get your take on the challenges that organizations This pandemic has taught a school of that and brought this to the forefront off organizational You can't just have everybody you know, Go on the internet and access the data source. that. It has brought that down to two quarters where we had to execute them. and a lot of the realities that many of our viewers air facing. How is all of that going to work? What are in some of the examples that you gave? you know, very comprehensive medicines. You know, going to this particular data center, you could have this automated this AI ops, Let's talk now about some of the considerations you talked about the importance You have to have subsequently if you have some kind of say and let me use I'm thinking of, you know, the integrity of teams aligning business and I t. There's something that for the first time will come to light. Thank you so much for joining me today and giving us your thoughts. Thank you.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
LondonLOCATION

0.99+

VerizonORGANIZATION

0.99+

Lisa MartinPERSON

0.99+

TrumpPERSON

0.99+

KenyaLOCATION

0.99+

50 banksQUANTITY

0.99+

Usman NasirPERSON

0.99+

New YorkLOCATION

0.99+

millionsQUANTITY

0.99+

15 thingsQUANTITY

0.99+

$50QUANTITY

0.99+

three yearsQUANTITY

0.99+

SecondQUANTITY

0.99+

one bankQUANTITY

0.99+

GuzmanPERSON

0.99+

2020DATE

0.99+

twoQUANTITY

0.99+

BroadcomORGANIZATION

0.99+

one deviceQUANTITY

0.99+

Usman NaseerPERSON

0.99+

first windQUANTITY

0.99+

first timeQUANTITY

0.99+

todayDATE

0.98+

15 different thingsQUANTITY

0.98+

one systemQUANTITY

0.98+

10QUANTITY

0.98+

TrevorPERSON

0.97+

two quartersQUANTITY

0.96+

pandemicEVENT

0.95+

first thingQUANTITY

0.94+

RisenORGANIZATION

0.94+

WednesdayDATE

0.93+

2021 2022DATE

0.93+

million microsecondQUANTITY

0.9+

One personQUANTITY

0.87+

five gORGANIZATION

0.87+

Five gORGANIZATION

0.86+

ComdexORGANIZATION

0.86+

one formQUANTITY

0.85+

VipersORGANIZATION

0.82+

next five yearsDATE

0.82+

oneQUANTITY

0.81+

GodPERSON

0.79+

thousands offQUANTITY

0.79+

this yearDATE

0.79+

millions offQUANTITY

0.78+

secondQUANTITY

0.74+

one more thingQUANTITY

0.71+

threeQUANTITY

0.64+

AIOps Virtual ForumEVENT

0.61+

NextQUANTITY

0.55+

ZaveriORGANIZATION

0.5+

XiaORGANIZATION

0.45+

gORGANIZATION

0.37+

Sreenivasan Rajagopal, Broadcom | AIOps Virtual Forum 2020 Promo


 

>>from around the globe. It's the Cube with digital coverage of AI ops. Virtual Forum Brought to You by Broadcom >>Welcome to this preview of Broadcom's AI Ops Virtual Forum on your host Lisa Martin, and joining me to give you a sneak peek of this event that's on December 3rd is Srinivasan, Rajagopal or Raj, the head of a I Ops at Broadcom Raj, this event is coming up in a couple of weeks. Excited. >>Good to be here. I am excited, Lisa. You know, um, customers are poised for growth in 2021 and, uh, they are we believe they all. They will also come out off the pandemic toe, grow their business and serve their customers, you know? Well, they have to key challenges. How do you grow at the same time, operate with efficiency, right. These two challenges our decision makers are struggling with every day at scale. That is why they do digital transformation at scale. And our key influencers like I t operators and SRE personas are helping our decision makers in our customers to drive the efficiency they are trying toe focus on converting outputs to outcomes. That's what the eye ops is all about and you're gonna hear it from us. >>Yeah, We've got a panel of experts here. Rich Lane, senior research analyst for Forrester, is going to be joining us as well as Guzman nastier the global product management at Verizon. And, of course, Raj, you're gonna be hearing some of the latest trends for AI ops. Why, now is the time, Raj, What are some of the key takeaways that you think those key influencers and those decision makers are gonna walk away from this event empowered with >>So the You know, our decision makers and a key influencers have a single question in mind when they deal with enterprise large enterprise scenarios, the questions that they get asked by their C level execs are Are you ready? Are you ready when remote work is the norm? Are you ready when you have to optimize your investments and are you ready when you have to accelerate your transformation at scale toe operate as a digital enterprise? All of this requires them to think and act differently from people process technology. And how do you bring all of this together under the ages off what we call a I ops is what they're gonna learn about. >>Another thing, too, is you're going to hear the latest industry trends on AI ops from Raj and the panel of experts that we mentioned a minute ago. How organizations like yours are finding value from a I ops and something that Raj talked about a minute ago is understanding why Now is the time to be ready for I also Raj and I look forward to you joining us along with our other Panelists. December 3rd register for the Broadcom AI Ops Virtual form today.

Published Date : Nov 23 2020

SUMMARY :

It's the Cube with digital coverage of Martin, and joining me to give you a sneak peek of this event that's on December 3rd is the same time, operate with efficiency, now is the time, Raj, What are some of the key takeaways that you think those key influencers the questions that they get asked by their C level execs are Are you ready? is the time to be ready for I also Raj and I look forward to you joining us along

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
MichielPERSON

0.99+

AnnaPERSON

0.99+

DavidPERSON

0.99+

BryanPERSON

0.99+

JohnPERSON

0.99+

IBMORGANIZATION

0.99+

MichaelPERSON

0.99+

ChrisPERSON

0.99+

NECORGANIZATION

0.99+

EricssonORGANIZATION

0.99+

KevinPERSON

0.99+

Dave FramptonPERSON

0.99+

MicrosoftORGANIZATION

0.99+

Kerim AkgonulPERSON

0.99+

Dave NicholsonPERSON

0.99+

JaredPERSON

0.99+

Steve WoodPERSON

0.99+

PeterPERSON

0.99+

Lisa MartinPERSON

0.99+

NECJORGANIZATION

0.99+

Lisa MartinPERSON

0.99+

Mike OlsonPERSON

0.99+

AmazonORGANIZATION

0.99+

DavePERSON

0.99+

Michiel BakkerPERSON

0.99+

FCAORGANIZATION

0.99+

NASAORGANIZATION

0.99+

NokiaORGANIZATION

0.99+

Lee CaswellPERSON

0.99+

ECECTORGANIZATION

0.99+

Peter BurrisPERSON

0.99+

OTELORGANIZATION

0.99+

David FloyerPERSON

0.99+

Bryan PijanowskiPERSON

0.99+

Rich LanePERSON

0.99+

KerimPERSON

0.99+

Kevin BoguszPERSON

0.99+

Jeff FrickPERSON

0.99+

Jared WoodreyPERSON

0.99+

LincolnshireLOCATION

0.99+

KeithPERSON

0.99+

Dave NicholsonPERSON

0.99+

ChuckPERSON

0.99+

JeffPERSON

0.99+

National Health ServicesORGANIZATION

0.99+

Keith TownsendPERSON

0.99+

WANdiscoORGANIZATION

0.99+

GoogleORGANIZATION

0.99+

MarchDATE

0.99+

NutanixORGANIZATION

0.99+

San FranciscoLOCATION

0.99+

IrelandLOCATION

0.99+

Dave VellantePERSON

0.99+

Michael DellPERSON

0.99+

RajagopalPERSON

0.99+

Dave AllantePERSON

0.99+

EuropeLOCATION

0.99+

March of 2012DATE

0.99+

Anna GleissPERSON

0.99+

SamsungORGANIZATION

0.99+

Ritika GunnarPERSON

0.99+

Mandy DhaliwalPERSON

0.99+

Bong Gumahad and Chris Henson V2


 

>>From around the globe. It's the queue cover >>Space and cyber security >>Symposium 2020 hosted by Cal poly. >>Hello and welcome to the space and cybersecurity symposium 2020 hosted by Cal poly and the cube I'm chilling for a, your host. We have a great session here. Space, cyber security, the department of defense perspective. We have bond Google hall, director of C four ISR directorate office of the undersecretary of defense for acquisition and sustainment for the DOD and Chris Henson, technical director space and weapons, cybersecurity solutions for the national security agency. Gentlemen, thank you for taking the time for this awesome session. Thank you, John. Thank you. So we're gonna talk about the perspective of the DOD relative to space cybersecurity, a lot, going on congestion, contention, freedom, evolution innovation. So Paul, I'd like to have you start with your opening statement on how you see the space cybersecurity perspective, Don, thanks for the intro. Really appreciate it. First, let me give my thanks to Cal poly for a convening, the space and cybersecurity symposium this year, you know, and despite the pandemic, the organization and the content delivery spreading impressive, I really foot stomping. >>What can possibly be done with a number of these virtual platforms? This has been awesome. Thanks for the opportunity. I also want to recognize my colleague, Chris Nissen from NSA was actually assigned to our staff that LSD, but he brings both policy and technical perspective in this whole area. So I think you'll, you'll find his commentary, uh, and positions on things very refreshing or for today's seminar. Now space cyber security is a pretty interesting terminology for us all. Uh, cyber security means protecting against cyber threats and it's really more than just computers here on earth, right? Uh, space is the newest war fighting domain, and cybersecurity's perhaps even more of a challenge in this domain that and others. Uh, I'm sure it'll turn journal Thompson and major journals Shaw discuss the criticality of this new dorm space force. It's the newest military service in the earlier sessions and they're at the risk of repeating what they already addressed. >>Let me start by talking about what space means to DOD and what we're doing directly from my vantage point as part of the acquisition and sustainment arm of the Pentagon. Uh, what I want to share with you today is how the current space strategy ties into the national defense strategy and supports the department's operational objectives. As the director of CFRI SAR. I have come to understand how the integration of CFRI Sarcic. Billy is a powerful asset to enhance the lethality of the joint war fighter. Secretary Lord, our boss, the sec, the undersecretary for acquisition and sustainment is diligent in her pursuit to adapt and modernize acquisition processes, to influence the strategy and to focus our efforts domain are to make our objectives a reality. I think first and foremost, we are building a more lethal force. This joint force will project low Valley and custom contested environments and across all domains through an operationally integrated and resiliency for ISR infrastructure. >>We are also called debating our alliances, deepening interoperability, which is very important in a future fight and collab, collaboratively planning with those partner with us in the fight most significantly for our work in acquisition and sustainment, we continue to optimize the department for greater performance and affordability through reform of the acquisition process. Now space is our newest war fighting domain. And while it is indeed unique, it shares many common traits with the others land, air and sea all are important to the defense of the U S in conflict. No doubt about this. They will be contested and they must be defended. One domain will not win future conflicts in a joint operation in a future fight in the future conflict. They must all succeed. I see three areas being key to a DOD strategic success in space, one, developing our whole of government approach in close partnership with the private sector and our allies to prioritizing our investments in resiliency, innovation, and adaptive operations, and third responding rapidly and effectively to leverage emerging technologies and seize opportunities to advance your strengths, partnerships and alliances. >>Let me emphasize that space is increasingly congested and tested and demanded as essential delete Valley operational effectiveness and the security of our nation. Now the commercialization of space offers a broad set of investments in satellite technology, potential opportunities to leverage those investments and pathways to develop cost efficient space architecture, where the department and the nation. It's funny, there's a new race, a race for space. If you will, between commercial companies buying for dominance of space. Now the joint staff within DOD is currently building an operational construct to employ and engage as a unified force, coordinated across all domains. We call it the joint, all domain command and control. It is the framework that is under development to allow us to conduct integrated operations in the future. The objective of Jesse too is to provide the war fighter access to the decision making information while providing mission assurance of the information and resilience of the underlying terrestrial air in space networks that support them operationally. >>six to maintain seamless integration, adaptation, and employment of our capability. To sense signal connect, transmit, process control, direct, and deliver lethal capabilities against the enemy. We gain a strategic advantage through the integration of these capabilities across all the domains, by providing balance bowel space, awareness, horse protection, and weapons controlled and deployment capabilities. Now successfully any ratings, the systems and capabilities will provide our war fighters overwhelming superiority on the battlefield environment, challenged by near peer adversaries, as well as non state actors in space. The character of its employment is changing, driven by increasing demands, not just by DOD, but by the commercial sector as well. You know, more and more, uh, we see greater use of small satellite systems to address a myriad of emerging questions, ubiquitous communications, awareness, sensor diversity, and many more. Uh, as I said before, the commercial world is pioneering high rate production of small satellites in our efforts to deploy hundreds, if not thousands of nodes space X, Darlene constellation is one example. >>Another one is Amazon's Kiper, uh, Kuyper just received FCC approval to deploy like over 3000 of these different notes. While a number of these companies continue to grow. Some have struggled. They some pointed as one web, uh, nevertheless, the appetite remains strong and DOD is taking advantage of these advances to support our missions. We are currently exploring how to better integrate the DOD activities involving small satellites under the small satellite coordinating activity, scholarly call it. We want to ensure collaboration and interoperability to maximize efficiency in acquisition and operation. When we started this activity on over a year and a half ago, we documented over 70 plus separate small, small sat programs within DOD. And now we've developed a very vibrant community of interest surrounding a small satellites. Now, part of the work we have identified nine focus areas for further development. These are common areas to all systems and by continuing to expand on these, our plan is they enable a standard of practice that can be applied across all of the domains. >>This includes lawn services, ground processing distribution, and of course, a topic of interest to the symposium space security and Chris we'll, we'll talk more about that being the Houston expert, uh, in this area. Uh, one challenge that we can definitely start working on today is workforce development. Cybersecurity's unique as it straddles STEM and security and policy, the trade craft is different. And unfortunately I've seen estimates recently, so suggesting a workforce gap in the next several years, much like the STEM fields, uh, during the next session, I am a part of a panel with precedent, Armstrong, Cal poly, and Steve Jake's the founder of the national security space association to address workforce development. But for this panel, I'll look forward to having further dialogue surrounding space, opera security with Chris and John. Thank you, John >>Bob, thank you for that whole thing, Steven. Yes. Workforce gaps. We need the new skill space is here. Thank you very much. Chris Henson, technical director of space and weapons, cybersecurity solutions for the national security agency. Your statement, >>Thank you for having me. Uh, I'm one of several technical leaders in space at the national security agency. And I'm currently on a joint duty assignment at the office of under secretary of defense for acquisition and sustainment. I work under mr. GUMA hot in the C four ISR area, but almost 63 years ago on the 4th of October, 1957, Sputnik was the first artificial satellite launched by the Soviet union in space. History was made in each of you can continue to write future space history in your careers. And just like in 1957, the U S isn't alone in space to include our close partnerships and longterm activities with organizations like the Japanese space agency, the European space agency, and, uh, the Canadian space agency, just to name a few. And when we tackle cybersecurity per space, we have to address, address the idea that the communications command and control, uh, and those mission datas will transverse networks owned and operated by a variety of partners, not only.go.mil.com.edu, et cetera. We need to have all the partners address the cyber effects of those systems because the risk excepted by one is shared by all and sharing cyber best practices, lessons learned, uh, data vulnerabilities, threat data, mitigation, mitigation procedures, all our valuable takeaways, uh, in expanding this space community, improving overall conditions for healthy environment. So thank you for having me, and I appreciate the opportunity to speak to you and your audience. And I look forward to the discussion questions. Thank you. >>Thank you, Chris. Thank you, Bob. Okay. I mean open innovation, the internet, you see plenty of examples. The theme here is partners, commercial government. It's going to take a lot of people and tech companies and technologies to make space work. So we asked my first question, Bonnie, we'll start with you is what do you see as the DOD his role in addressing cybersecurity in space? Uh, it's real, uh, it's a new frontier. Um, it's not going away. It's only going to get more innovative, more open, more contested. It seems like a lot to do there. So what's your role in addressing cyber security in space? >>I think our role is to be the leader in developing and only is it the strategy, but the, uh, the implementation plan is to ensure a full of cybersecurity. If you look at the national cyber cyber strategy, I think publishing 2018 calls for like-minded countries, industry academia, and civil society. Once you mentioned John, the support technology development, uh, digital safety policy advocacy, and research you here today, and those listening are fulfilling their strategy. When you, when you develop, enable use cyber hygiene products, as examples of capabilities, you're pushing the goal to fruition. When you know, what's on your network patron network backup, you're in encrypt your network, you're hardening and preventing cyber attacks. And we in government academia in the case of Cal poly civil networks and in commercial companies, we all benefit from doing that cyber security. Uh, and I think Chris will, we'll, we'll definitely back me up on this more than passwords encryption or pharma. It's truly a mindset and a culture of enabling missions to succeed in assured in a resilient fashion. >>Chris, you're taking reaction to, to the cybersecurity challenge involved here, >>That's it, it's starting really at the highest level of governments. We have, uh, you know, the, the recent security policy directive five that just came out just a couple of days ago, recognize all the factors of cybersecurity that need to come into play. And probably the most important outcome of that as mr said, is the leadership role and that leadership, uh, blends out very well into partnership. So partnership with industry partnership with academia partnership, with, uh, other people that are exploring space. And those partnerships lend itself very naturally to sharing cybersecurity issues, topics as we come up with best practices as we come up with mitigation strategies. And as we come up with vulnerabilities and share that information, the, uh, we're not going to go alone in space, just like we're probably not going to go alone in many other industries or areas, uh, that the DOD has to be, uh, involved in many spectrums of deploying to space. >>And that deployment involves as Mr. Guzman said, encryption authentication, knowing what's on the network, knowing the, the fabric of that network. And if nothing else, this, uh, this, uh, internet of things and work from home environment that we've, uh, partaken of these last few months has even explored and expanded that notion even more dramatically as we have people dial in from all over the different, uh, locations, well space will be that natural node that, uh, natural, uh, next network and mesh involvement that we'll have to protect and explore on not just from a terrestrial involvement, but all segments of it. Th the comm segment, the space vehicle and the ground portion, >>No bond. We talked about this in our other segment, um, around with the president of Cal poly, but the operating models of the space force and the DOD and getting space. It's a software defined world, right? So cybersecurity is a real big issue. Cause you have an operating model that's requiring software to power, these low hanging satellites. That's just an extension to the network. It's distributed computing, know what this is. If you understand what technology we do in space, it's no different, it's just a different environment. So it's software defined that just lends itself well to hacking. I mean, if I'm a hacker I'm going, Hey, why not just take out a satellite and crash it down or make the GPS do something different? I mean, it's definitely an attack vector. This is a big deal. It's not just like getting credentials that are cashed on a server. You gotta really protect, >>Right? Because in one hand it space will carry not only, uh, uh, you know, for local national security information. Uh, but the, uh, I feel like at the economic wellbeing, the financial state of allowed a lot of countries and institutions, you know, more and more John lb, they'll be using space assets to, uh, uh, to make, uh, make, make all that happen. Right. So, and if you look at the, you talk, you mentioned the attack vectors in space, you know, it's not just the computers in the ground, but if you look at the whole life cycle for satellite systems in space, you know, that the, the, the tasking that you need to do that the command, the controlling of the vehicle, the data that comes down in the ground, even when you launch the, the birds, the satellites, you know, they only need to be protected because they're all somewhat vulnerable to, uh, to hacking, uh, to cyber attacks. Especially as we grow into commercialization space, it's going to be a lot more people out there playing in this world. It's going to be a lot more companies out there. And, you know, it's hard to track, uh, uh, you know, the, the potential of, of, of foreign influences as an example, and therefore the potential of being vulnerable in terms of the cyber threat. >>Gentlemen, I like you guys said to move on to this leadership role, you mentioned that you want to be a leader. I get it. The DOD is department of defense. That's a new frontier to defend war time zone. You mentioned war time opportunity potentially, but how do you guys assist that's term hat to getting done? Because there's public and private space operations happening, um, there's security challenge. What does being a leader mean? And how does the DOD department of defense assist driving the public and private? Do you lead from a project standpoint, you lead from a funding standpoint? Is it architectural? I mean, you're talking about now a new end to end architecture. It's not just cloud it's on premise. It's in devices, it's offloaded with new AI technology and Nicks and devices. It's IOT, it's all, this is all new, this is all new. What does it mean for the DOD to be a leader and how do you assist others to get involved? And what does that mean? >>Yeah, I think, uh, the one hand, you know, DOD used to lead, uh, in terms of, uh, uh, being the only source of funding for a lot of, uh, highly developmental efforts. Uh, we're seeing a different story in space. Again, I keep going back to the commercialization of space. We're seeing a lot more players, right? So in many ways >>Ally's commercial companies are actually legally leading the R and D uh, of a lot of different technologies. So we want to take, we certainly want to take advantage of that. So from a leadership standpoint, I think we, we, Lucia can come in, you know, by partnering a lot more with, with the commercial companies, uh, in 2022, the DOD released the defense, uh, uh, space strategy as an example that highlights the threats, the challenges and opportunities the United States has faced by, by sending a example of how we, how we, uh, how we counter, uh, the threats that are out there, not just the DOD, but, but the disability and the commercial sector as well. Our current conditions are strong, but we want to use four lines of effort to meet our challenges and capitalize on our desire state space, uh, lines of effort include building a comprehensive military badges space, integrating space into a national joint and combined operations. Like I mentioned before, shaping that strategic environment and cooperating with allies, partners, and industry and other U S governmental agencies, departments, and agencies to advance the cost of space to take full advantage of what space can provide us, uh, in DOD, uh, and the nation. Chris has a domain. Now, what's your take on all that? >>That's because again, it's going to take more people, >>More diverse, potentially more security >>Halls. What's your view on it? >>Well, let's, let's look at how innovation and new technologies can help us in these areas. So, uh, and, and mentioned it a couple of topics that you hit on already. One of the areas that we can improve on is certainly in the, uh, the architecture, uh, where we look at a zero trust architecture, one of the NIST standards that's come about where it talks about the authentication, uh, the need to know a granular approach, this idea of being able to protect, not just data, but the resources and how people can get access to those, whether they're coming in through an identification, authentication Prudential, or, uh, other aspects of, uh, the, the idea of not just anybody should be able to have access to data or anybody should have access once they're on the inside of the network. So that zero trust architecture is, is one approach where we can show some leadership and guidance. >>Another area is in, uh, a topic that you touched on as well was in the software area. So some innovations are coming on very rapidly and strong in this artificial intelligence and machine learning. So if we can take this AI and ML and apply it to our software development areas, they can parse so much information very quickly. And, uh, you know, this vast array of code that's going into system nowadays, and then that frees up our human, uh, explicit talent and developers that can then look at other areas and not focus on minor bawling to Beverly fix a vulnerability. Uh, they, they can really use their unique skills and talents to come up with a better process, a better way, and let the artificial intelligence and machine learning, find those common problems, those, those unknown, hidden lines of code that, uh, get put into a software alarm Prairie, and then pull down over and over again from system to system. So I think between, uh, an architecture leadership role and employee innovation are two areas that we can show, uh, some benefits and process improvement to this whole system. >>That's a great point, Chris, and you think about just the architectural computer architecture, you know, S you know, network attached storage is an advantage software defined there. You could have flash all flash arrays for storage. You could have multiple cores on a device and this new architecture, offloads things, and it's a whole new way to gain efficiencies. I mean, you got Intel, you got Nvidia, you've got armed all the processors all built in. Um, so there's definitely been commercial best practices and benefits to a new kind of architecture that takes advantage of these new things. It's just, just efficiencies. Um, but this brings up the whole supply chain conversation. I want to get your thoughts on this, because there is talk about predatory investments and access and tactics to gain supply chain access to space systems, your thoughts. >>Yeah. It's a serious threat and not just for, uh, the U S uh, space. So supply chain, if you will, is the supply chain. And I says, you know, writ large, I think, uh, I think it's a, it's a, it's a threat that's, that's real, we're we're seeing today. I just saw an example recently, uh, involving, uh, our, I think our launch services were, there was a, uh, a foreign, uh, threat that was those trying to get into a true through with predatory investments. Uh, so, uh, it is something that we need to, uh, be aware of it it's happening, uh, and is continuing to happen. Uh, it's an easy way to gain access, to, uh, do our IP. Uh, and, uh, so it's something that we, uh, are serious about in terms of, uh, awareness and, and countering >>Chris, your thoughts. I mean, we've see, I mean, I'm an open source guy. I was seen it when I grew up in the industry in the eighties, open source became a revolution, but with that, it enabled new tactics for, um, state sponsored attacks on it that became a domain in of itself. Um, that's well-documented and people talk about that all the time in cyber. Now you have open innovation with hardware, software connected systems. This is going to bring supply chain nightmare. How do you track it all? Who's got what software and what device, where the chip come from, who made it, this is the potential is everywhere. How do you see the, these tactics, whether it's a VC firm from another country or this, that, and the other thing startup. >>Yeah. So when we see, when we see coal companies being purchased by foreign investors, and, you know, we can get blocked out of those, whether it's in the food industry, or if it's in a microchip, then that microchip could be used in a cell phone or a satellite or an automobile. So all of our industries that have these companies that are being purchased, or a large born investment influx into those, you know, that could be suspect. And we, we have to be very careful with those, uh, and, and do the tracking of those, especially when those, uh, some of those parts of mechanisms are coming from off shore. And then going again, going back to, uh, the space policy directive five, it calls out for better supply chain, resource management, the tracking, the knowing the pedigree and the, the quantitative of ability of knowing where those software libraries came from, where the parts came from and the tracking and delivery of that from an end to end system. >>And typically when we have a really large vendor, they can, they can do that really well. But when we have a subcontractor to a subcontractor, to a subcontractor, their resources may not be such that they can do that. Try tracking in mitigation for counterfeits or fraudulent materials going into our systems. So it's a very difficult challenge, and we want to ensure as best we can that as we ingest those parts, as we ingest those software libraries and technologies into the system, that, uh, before we employ them, we have to do some robust testing. And I don't want to say that the last line of defense, but that certainly is a mechanism for finding out, do the systems perform as they stated, uh, on a test bench or a flat set, whatever the case may be before we actually deploy it. And then we're relying on the output or the data that comes from that, that system that may have some corrupt or suspect parts in it. >>Great point, this federal grant, >>The problem with space systems is kind of, you know, is once you, once you launch the bird or the sunlight, uh, your access to it is, is diminished significantly, right? Unless you, you go up there and take it down. Uh, so, you know, kind of to Chris's point, we need to be able to test all the different parts of insurer that is performing as, as described there ass, I spent as specified, uh, with, with good knowledge that it's, uh, it's, uh, it's trustworthy. Uh, and, uh, so we that all on the ground before we, we take it up to launch it. >>It's funny. You want agility, you want speed and you want security, and you want reliability and risk management all aggressive, and it's a technical problem. It says it's a business model problem. I'd love to get real quick. Before we jump into some of the more workforce and gap issues on the personnel side, have you guys should just take a minute to explain quickly what's the federal view. If you had to kind of summarize the federal view of the DOD and the roll with it wants to take, so all the people out there on the commercial side or students out there who are, you know, wanting to jump in, what is the current modern federal view of space cybersecurity. >>Chris, why don't you take that on I'll follow up. Okay. Uh, I don't know that I can give you the federal view, but I can certainly give you the department of defense. That cybersecurity is extremely important. And as our vendors and our suppliers, uh, take on a very, very large and important role, one area that we're looking at improving on is a cyber certification maturity model, where we, where we look at the vendors and how they implement an employee cyber hygiene. So that guidance in and of itself shows the emphasis of cyber security that when we want to write a contract or a vendor, uh, for, for a purchase, that's going to go into a space system. We'd like to know from a third party audit capability, can that vendor, uh, protect and defend to some extent the amount that that part or piece or software system is going to have a cyber protection already built into it from that vendor, from the ground floor up before it even gets put into a larger system. >>So that shows a level of the CMMC process that we've thought about and, uh, started to employ, uh, beginning in 2021 and will be further built on in, in the out years. How, how important the DOD takes that. And other parts of the government are looking at this, in fact, other nations are looking at the CMMC model. So I think it shows a concern in very many areas, uh, not just in the department of defense that they're going to adopt an approach like this. Uh, so it shows the, the pluses and the benefits of a cybersecurity model that, uh, all can build on boggy reaction. Yeah, I'll just, uh, I'll just add to that, John, you, you, you, you asked earlier about, you know, how do we, uh, track, uh, commercial entities or, or people in the space and cyber security domains? Uh, I can tell you that, uh, at least my view of it, you know, space and cyber security are new, it's exciting, it's challenging a lot technical challenges there. So I think in >>Terms of attracting the right people, personnel to work those areas, uh, I think it's, it's not only intellectually challenging, uh, but it's important for, for the dependency that NASA States, uh, and it's important for, for, for economic security, uh, writ large for, for us as well. So I think, uh, in terms of a workforce and trying to get people interested in, in those domains, uh, I hope that they see the same thing we do in terms of, of the challenges and the opportunities it presents itself in the future. >>Awesome. I love your talk on intro track there falling. You mentioned, uh, the three key areas of DOD sec success, developing a government whole government approach to partnership with the private sector. I think that's critical and the allies prioritizing the right investments on resilience, innovation, adaptive operations, and responding to rapidly to effectively emerging technology. So you can be fast, all think are all things. I all, all those things are relevant. So given that, I want to get your thoughts on the defense space strategy in 2020, the DOD released dispense defense space, strategy, highlighting threats, and challenges and opportunities. How would you summarize those threats and those challenges and opportunities? What are the, what are those things that you're watching in the defense space area? Right. >>Well, I think, I think I saw, as I said before, of course, as well, you know, uh, or, or seeing that a space will be highly contested, uh, because it's a critical element in our, in our war fighting construct, uh, Dwayne, a future conflict, I think we need to, to win space as well. So when you, when you look at our near peer adversaries, there's a lot of efforts, uh, in trying to, to, to take that advantage away from the United States. So, so the threat is real, uh, and I think it's going to continue to evolve and grow. Uh, and the more we use space, both commercial and government, I think you're going to see a lot more when these threads some AFAs itself, uh, in, in forms of cyber, cyber attacks, or even kinetic attacks in some cases as needed. Uh, so yeah, so with the, the, the threat is need growing, uh, space is congested, as we talked about, it will continually be contested in the future as well. So we need to have, uh, like we do now in, in, in all the other domains, a way to defend it. And that's what we're working on with India, with the, how do we pilot with tech, our assets in space, and how do we make sure that the data information that traverses through space assets are trust 40, um, and, uh, and, and, and free of any, uh, uh, interference >>Chris, exciting time. I'm your, if you're in technology, um, this is crossing many lines here, tech society will war time, defense, new areas, new tech. I mean, it's security, it's intoxicating at many levels, because if you think about it, it's not one thing. It's not one thing anymore. It spans a broader spectrum, these opportunities. >>Yeah. And I, and I think that expansion is, is a natural outgrowth from, as our microprocessors and chips and technology continue to shrink smaller and smaller. You know, we, we think of our, our cell phones and our handheld devices and tablets, and so on that have just continued to, uh, get embedded in our everyday society, our everyday way of life. And that's a natural extension when we start applying those to space systems. When we think of smallsats and cube sets and the technology that's, uh, can be repurposed into, uh, a small vehicle and the cost has come down so dramatically that, you know, we, we can afford to get a rapid experiments, rapid, um, exploitations and, and different approaches in space and learn from those and repeat them very quickly and very rapidly. And that applies itself very well to an agile development process, dev sec ops, and this notion of spins and cycles and refreshing and re uh, addressing priorities very quickly so that when we do put a new technology up, that the technology is very lean and cutting edge, and hasn't been years and years in the making, but it's, uh, relevant and new, and the, uh, the cybersecurity and the vulnerabilities of that have to be addressed because of, and allow that DevSecOps process to take place so that we can look at those vulnerabilities and get that new technology and those new, new experiments and demonstrations in space and get lessons learned from them over and over again. >>Well, that brings us to the next big topic I want to spend the remainder of our time on that is workforce this next generation. If I wasn't so old, I would quit my job and I would join medially. It's so much, it's a fun, it's exciting. And it's important. And this is what I think is a key point is that cybersecurity in and of itself has got a big gap of shortage of workers, nevermind, adding space to it. So this is, uh, the intersection of space and cybersecurity. There is a workforce opportunity for this next generation, a young person to person re-skilling, this is a big deal. Bong, you have thoughts on this. It's not just STEM, it's everything. >>Yeah. It's everything, you know, uh, the opportunities would have in space it's significant and tremendous. And I think, uh, if I were young, again, as you pointed out, John, uh, you know, I'm, I'm, I'm lucky that I'm in this domain in this world and I started years ago. Uh, but it continues to be exciting, uh, lots of, lots of opportunities, you know, and when you, when you look at, uh, some of the commercial space, uh, systems that are being, being put up, uh, if you look at, I mentioned Starlink before, and, and, uh, Amazon's Kuyper constellation. These guys are talking about couple of thousand satellites in space to provide ubiquitous communications for internet globally and that sort of thing. Uh, and they're not the only ones that are out there producing capability. Uh, we're seeing a lot more commercial imagery products being developed by bike, by companies, both within the U S and, and, uh, foreign foreign elements as well. So I think it's an exciting time to be in space. Certainly lots of opportunities, there's technical challenges, uh, galore in terms of, you know, not only the overcoming the physics of space, but being able to operate, uh, flexibly, uh, in, uh, get the most you can out of the capabilities we have, uh, uh, operating up as high as being cool. I mean, everyone looks at launch. >>She gets millions of views on live streams, the on demand, reruns get millions and millions of views. Um, it's, there's a lot of things there. Um, so Chris, what specifically could you share are things that people would work on? Um, jobs skills, what are some, what's the aperture, what's it look like if you zoom out and look at all the opportunities from a scale standpoint, what's out there, >>We'll talk to the aperture, but I want to give a shout out to our space force. And I mean, their, their job is to train and equip, uh, future space and, uh, that, that space talent. And I think that's going to be a huge plus up, uh, to have, uh, uh, a space force that's dedicated to training equipping, uh, the, an acquisition and a deployment model that, uh, will benefit not just the other services, but all of our national defense and our, uh, you know, our, our strategic way of, uh, how, how this company, country, employees space, uh, altogether. So having, having a space for us, I think, as a, is a huge, uh, a huge issue. And then to get to that aperture aspect of, of what you're, what you're asking and, you know, that addresses a larger workforce. Uh, we need so many different talents in, in this area. >>Uh, we can, we can have, we can employ a variety of people, uh, from technical writers to people who write, uh, write in developed software to those who, uh, are bending metal and actually, uh, working in a hardware environment. And, uh, those that do planning and launch operations and all of those spectrums and issues of jobs, or are directly related to a workforce that can contribute to, to space. And then once that data gets to the ground and employed out to a user, whether it's a data or we're looking at, uh, from a sensor recent, uh, recent events on, uh, shipping lanes, those types of things. So space has such a wide and diverse swath that the aperture's really wide open, uh, for a variety of backgrounds. And, and those that, uh, really just want to take an opportunity, take a, take a technical degree or a degree that, uh, can apply itself to a tough problem, uh, because they certainly exist in space. And we can, we can use that mindset of problem solving, whether you come at it from a hacker mindset, an ethical, a white hat approach to testing and vulnerability exploration, or somebody who knows how to actually, um, make, uh, operations, uh, safer, better, uh, through space situation awareness. So there's a, there's a huge swath of opportunity for us >>Bon talk about the, um, the cyber security enabled environment, the use cases that are possible when you have cybersecurity in play with space systems, um, which is in and of itself, a huge range of jobs, codings supply chain. We just talked about a bunch of them. There's still more connected use cases that go beyond that, that, that are enabled by it. If you think about it, and this is what the students at Cal poly and every other college and university community college, you name it, or watching videos on YouTube, anyone with a brain can jump in. If they, if they see the future, it's an all net new space force is driving awareness, but there's a whole slew of these new use cases that I call space enabled by cybersecurity systems. Your thoughts. >>Absolutely. I, you know, I was, uh, had planned on attending the, uh, uh, the cyber challenge that's Cal poly had planned in June, of course, a pandemic, uh, uh, took care of that plan. But, but I was intrigued by, by the approach that the Cal poly was taking with, with, uh, middle school and high school kids of, of, of, of exposing him to a problem set here. You have a, a satellite that came down from space, uh, and, uh, part of the challenge was to do Porensic analysis on the debris, uh, the remaining pieces of the sound like to figure out what happened. Uh, it had a, uh, a cybersecurity connotation. It was hacked. It was attacked by, by cyber threat nation, took it down. And the beauty of having these kids kind of play with, with the remaining parts of the satellite figure out what happened. >>So I was pretty exciting. I was really looking forward to participating in that, but again, the pandemic kind of blew that up, but I, I look forward to future events like that to, to get our young people intrigued and interested in, uh, in this new field of space. Now, you know, Chris was talking earlier about opportunities, the opportunity that you talk about, you know, while I would like to have people come to the government, right. To help us out. It's not, it's not just focused on government, right? There's not lots of opportunities in commercial space. I, if you will, uh, for, for a lot of talent to, uh, uh, to have, uh, to participate in. So the challenge is a man's government and the commercial sector, John, >>I mean, you get the hardcore, you know, I want to work for the DOD. I want to work for NSA. I want to work for the government. You clearly got people who want to have that kind of mission, but for the folks out there, Chris and bong that are like, I'll do I qualify it? It's like the black box of the DOD. It's like a secret thing. You got any clearance, you've got to get all these certifications. And you've got to take all kinds of tests and background checks. And, um, is it like that? And will that continue? Cause some people might say, Hey, can I even get involved? What do I do? So I know there's some private partnerships going on with companies out there in the private sector. So this is now a new, you guys seem to be partnering and going outside the comfort zone of the old kind of tactical things. What are some of those opportunities that people could get involved that they might not know about >>PR for NSA, there's a variety of workforce, uh, initiatives that, uh, uh, for anybody from a high school work study can take advantage of to, uh, those that would like have to have internships. And those that are in a traditional academic environment, there's, uh, several NSA schools across the country that have a academic and cyber acts, uh, sites of excellence that participate in projects that are shepherded and mentored by those at NSA that can get those tough problems that don't have maybe a classified or super sensitive, uh, nature that that can be worked in and in an academia environment. So, so those are two or three examples of how somebody can break into, uh, the, uh, an intelligence organization and the, and the other agencies have those, uh, opportunities as well across the intelligence community and the, the partnership between and collaborative collaboration between private industry and the agencies and the department of defense just continue to grow over and over again. And even myself being able to take care advantage of a joint duty assignment between my home organization and the Pentagon just shows another venue of somebody that's in one organization can partner and leverage with another organization as well. So I'm an example of, of that partnering that's going on today. >>So there's some innovation, bong, non traditional pathways to find talent. What are out there? What are new, what are these new nontraditional ways >>I was going to add to what Chris was, was mentioning John? Yeah. Even within view and under the purview of our chief information officer, back in 2013, the deputy surfed dirty defense signed the, uh, what we call the DOD cyberspace workforce strategy, uh, into effect. And that included a program called the cyber information technology exchange program. It's an exchange program in which a, uh, you know, private sector employee and worked for the DOD in cyber security positions, uh, span across multiple mission critical areas. So this is one opportunity to learn, uh, you know, in inside the DOD what's happening as a private sector person, if you will, uh, going back to what we talked about, you know, kinda, uh, opportunities, uh, within the government for, for somebody who might be interested, uh, you know, you don't have to be super smart, Bork and space. Uh, there's a lot of like, like Chris pointed out, there's a lot of different areas that we need to have people down within people to do, uh, to conduct the mission space. So you don't have to be mathematician mathematician. You don't have to be an engineer to succeed in this business. I think there's plenty of opportunities for, for any types of, of talent, any type of academic disciplines that, that, that, that they're out there. >>And I think, you know, Chris is shout out to the space force is really worth calling out again, because I think to me, that's a big deal. It's a huge deal. It's going to change the face of our nation and society. So super, super important. And that's going to rise the tide. I think it's gonna create, uh, some activation, uh, for a younger generation, certainly, and kind of new opportunities, new problems to solve new threats to take on and, and move it on. So really super conversation space in cybersecurity, the department of defense perspective, Von and Chris, thank you for taking the time. I'd love you guys just to close out. We'll start with you bong. And then Chris summarize for the folks watching, whether it's a student at Cal poly or other university or someone in industry and government, what is the department of defense perspective for space cybersecurity? >>Chris, won't go and take that on. I started, thank you. Uh, cyber security applies to much more than just the launch and download of mission data or human led exploration and the planning, testing, and experiments in the lab prior to launch require that cyber protection, just as much as any other space link, ground segment, trust rail network, or user data, and any of that loss of intellectual property or proprietary data is an extremely valuable and important, and really warrants, cybersecurity safeguards in any economic espionage or data exfiltration or denied access to that data I E ransomware or some other, uh, attack that can cripple any business or government endeavor. Uh, no matter how small or large, if it's left in our economic backbone, uh, clearly depends on space and GPS is more than just a direction finding our banking needs that a T and timing from P and T or whether it says systems that protect our shipping and airline industry of whether they can navigate and go through a particular storm or not, uh, even fighting forest fires picked up by a remote sensor. >>All those space-based assets, uh, require protection from spoofing date, uh, data denial or total asset loss. An example would be if a satellite sensitive optics were intentionally pointed at the sun and damaged, or if a command, uh, to avoid collision with another space vehicle was delayed or disrupted or a ground termination command. As we just saw just a few days ago at T minus three seconds prior to liftoff, if those all don't go as planned, uh, those losses are real and can be catastrophic. So the threat to space is pervasive real and genuine, and your active work across all those platforms is a necessary and appreciated. And your work in this area is critical, uh, going forward going forward. Uh, thank you for this opportunity to speak with you and, uh, talking on this important topic. >>Thank you, Chris Henson, goodbye. >>Closing remarks. Yeah. Likewise, John, uh, again, uh, as, as Chris said, thank you for, for the opportunity to discuss this very important, uh, around space, cyber security, as well as addressing, uh, at the end there, we were talking about workforce development and the need to have, uh, people, uh, in the mix for four features. We discussed with you. We need to start that recruiting early, uh, as we're doing to address, uh, the STEM gap today, we need to apply the same thing for cybersecurity. We, we absolutely need smart, innovative people to protect both Iraq. Anomic wellbeings a nation as well as our national defense. So this is the right conversation to have at this time, John and I, again, thank you and our Cal poly hose for, or, uh, having a symposium and, and having this opportunity to have this dialogue. Thank you, >>Gentlemen. Thank you for your time and great insights. We couldn't be there in person. We're here virtual for the space and cybersecurity symposium, 2020, the Cal poly I'm Jennifer with Silicon angle and the cube, your host. Thank you for watching.

Published Date : Oct 1 2020

SUMMARY :

It's the queue cover the space and cybersecurity symposium this year, you know, and despite the pandemic, Uh, space is the newest war fighting what I want to share with you today is how the current space strategy ties into the national defense strategy and effectively to leverage emerging technologies and seize opportunities to advance your assurance of the information and resilience of the underlying terrestrial air in space networks You know, more and more, uh, we see greater use of small satellite systems to address a myriad While a number of these companies continue to grow. and Steve Jake's the founder of the national security space association to address workforce development. We need the new skill space is here. the European space agency, and, uh, the Canadian space agency, So we asked my first question, Bonnie, we'll start with you is what do you see as the DOD his role in addressing the support technology development, uh, digital safety policy advocacy, is the leadership role and that leadership, uh, blends out very well over the different, uh, locations, well space will be that natural models of the space force and the DOD and getting space. uh, uh, you know, for local national security information. to be a leader and how do you assist others to get involved? Yeah, I think, uh, the one hand, you know, Ally's commercial companies are actually legally leading the R and D uh, of a lot of different What's your view on it? So, uh, and, and mentioned it a couple of topics that you hit on already. And, uh, you know, I mean, you got Intel, you got Nvidia, And I says, you know, Now you have open innovation with hardware, delivery of that from an end to end system. into the system, that, uh, before we employ them, Uh, and, uh, so we that all on the ground before we, we take it up to launch it. on the commercial side or students out there who are, you know, wanting to jump in, So that guidance in and of itself shows the emphasis of cyber security that So that shows a level of the CMMC process that we've thought about for the dependency that NASA States, uh, and it's important for, So you can be fast, all think are all things. Uh, and the more we use space, I mean, it's security, it's intoxicating at many levels, because if you think about it, and so on that have just continued to, uh, get embedded in our everyday society, So this is, uh, the intersection of space and cybersecurity. Uh, but it continues to be exciting, uh, lots of, jobs skills, what are some, what's the aperture, what's it look like if you zoom out and look our, uh, you know, our, our strategic way of, uh, how, how this company, can apply itself to a tough problem, uh, because they certainly exist when you have cybersecurity in play with space systems, um, analysis on the debris, uh, the remaining pieces of the sound like to figure Now, you know, Chris was talking earlier about opportunities, the opportunity that you talk about, I mean, you get the hardcore, you know, I want to work for the DOD. industry and the agencies and the department of defense just continue to So there's some innovation, bong, non traditional pathways to find talent. to learn, uh, you know, in inside the DOD what's happening as a private sector And I think, you know, Chris is shout out to the space force is really worth calling out again, because I think to and experiments in the lab prior to launch require that cyber protection, So the threat to space is pervasive real So this is the right conversation to have at this time, John and I, the space and cybersecurity symposium, 2020, the Cal poly I'm Jennifer with Silicon angle and the cube,

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
ChrisPERSON

0.99+

Chris HensonPERSON

0.99+

Chris NissenPERSON

0.99+

JohnPERSON

0.99+

StevenPERSON

0.99+

BonniePERSON

0.99+

BobPERSON

0.99+

GuzmanPERSON

0.99+

2013DATE

0.99+

Steve JakePERSON

0.99+

millionsQUANTITY

0.99+

2020DATE

0.99+

DwaynePERSON

0.99+

FCCORGANIZATION

0.99+

NvidiaORGANIZATION

0.99+

JuneDATE

0.99+

PaulPERSON

0.99+

VonPERSON

0.99+

2022DATE

0.99+

hundredsQUANTITY

0.99+

AmazonORGANIZATION

0.99+

GUMAPERSON

0.99+

DODORGANIZATION

0.99+

2018DATE

0.99+

first questionQUANTITY

0.99+

PentagonORGANIZATION

0.99+

4th of October, 1957DATE

0.99+

twoQUANTITY

0.99+

NSAORGANIZATION

0.99+

1957DATE

0.99+

2021DATE

0.99+

Cal polyORGANIZATION

0.99+

JenniferPERSON

0.99+

LuciaPERSON

0.99+

U SLOCATION

0.99+

todayDATE

0.99+

FirstQUANTITY

0.99+

U SORGANIZATION

0.98+

one exampleQUANTITY

0.98+

bothQUANTITY

0.98+

eachQUANTITY

0.98+

Darlene constellationLOCATION

0.98+

first artificial satelliteQUANTITY

0.98+

one organizationQUANTITY

0.98+

over 3000QUANTITY

0.98+

DonPERSON

0.98+

IntelORGANIZATION

0.98+

StarlinkORGANIZATION

0.98+

one opportunityQUANTITY

0.98+

eightiesDATE

0.98+

firstQUANTITY

0.98+

Shekar Ayyar, VMware | VMworld 2019


 

>> live from San Francisco, celebrating 10 years of high tech coverage. It's the Cube covering Veum World 2019. Brought to you by VM Wear and its ecosystem partners. >> Hey, welcome back here and live here in Mosconi North. The Emerald 2019 Cube Live coverage on Shopping Day Volante Jr Jr. Who's here? EVP general manager, Telco and Edge of Cloud for Vienna. Where Thanks for coming on. Thanks for having me. I know you're super busy. We don't have a lot of time. Get right to it. Um five g a big part of the key. No discussion that's gonna enable a whole bunch of Pakal the pregame show pre gaming not even talk about that. Also. Telco on the Edge Computing Big part Michael Dell said, Edges the future Now these air to emerging areas for you guys. What's the positioning? What's the update? >> No, absolutely. I mean, if you look a tw telecom infrastructure. For the longest time, telcos have played a role just as pure basic connectivity providers. And with five g coming on board, they finally have an opportunity to break out of that and redefine the cloud off the future. So for us the big opportunity around five g is not just the better provisioning off like Higher Man With Service is to consumer for voice and data buy the whole set off new enterprise service is that can be provided on top of this five g network. And in order to be able to do that, you really need to go in with a virtualized telco Cloud architecture. Underneath that, and so we are working with carriers globally now preparing them for five G with an architecture that's going to help them deploy. New service is faster for both their consumer as well as enterprise. >> Going to be the white knight at, so to speak. For these telcos because they've been struggling for years over the top and any kind of differentiates service is even in the network layer. Exactly. I've had tons of rack and stack machine, so they're after their well, well stacked up in terms of computer storage. Also connectivity to the edge. That's the back hall. So you have back haul, which is connectivity. Companies that have massive expertise in scale but fumbling in operational cloud natives that >> by not just that, but I also think that having the idea off on application platform that allows them to go and deploy service is faster and then decide whether they're just going to play at the network connectivity level or at the application tear or a full SAS tear. These are all options that are open to them now with this notion off. Telco five G coupled with an NFI and cloud telco cloud infrastructure. Underneath that and never before have they had this option to doing that. And this is now open to them >> and the cloud native is there greenfield for AP supporter having applications on top of it. Exact icing on the cake, right? >> Exactly, Exactly. And so they're all looking at core architectures and then, potentially, their radio architectures now all being opened up toe deploying new service is that are much faster to provisions and then extending that to EJ and >> five G's deploying. So we know it's out there. So it is pre game is Pat, Guzman said. You know, not even an inning Yet in the metaphor of baseball innings, I >> gotta ask you get my phone. That's not that's fake ill. I know it >> did that with four g to >> skeptic e stands for evolution, which is coming soon. >> That's vaporware for tell Coke language. The surface area is going to radically get bigger with this capability. Yeah, security's gonna be baked in. This is the number one concern for io ti. And more importantly, industrial I ot We've been reporting on silicon angle dot com. This is a national security issue because we're under cyber attacks. Town's getting locked out with ransomware critical infrastructure exposed. We're free country, and I want to be free. We don't lock down. So you have security built into this new promiscuous landscape that is called the coyote Edge. Because you wanna have no perimeter. You want the benefits of cloud. But one whole malware is in there. One take over physical device could cost lives. >> Yeah, there's a big concern. Yeah. What's your thoughts? Yeah, No. So I think there >> are two ways of looking at it. One is the way you looked at it in terms of the security perimeter expanding and then us making sure that we have the right level off infrastructure security baked in to enable this to be an easier, manageable security architecture. This is sort of the pitch you heard from Mia Mary, even in the context of our acquisition of carbon black and how we're thinking about baking security into the infrastructure, the other way of looking at this is if you think about some of the concerns around providers off telecom infrastructure today and how there might be or might not be security back doors. This is happening in today's hardware infrastructure. Okay, so in fact, I would argue that a sick software defined architecture, er, actually ends up providing you greater levels of security. Because what you now have is the option off running all of these network functions as secured as software workloads in a policy envelope that you can introspect. And then you can decide what kind of security you want to deploy on what kind of workload. >> That's an innovative approach. But it doesn't change much, really, from an infrastructure standpoint, does it? Or does it? >> No, it does, >> because now, instead of having a hardware box where you have to worry, I mean, if it's a close, hard red box and you don't quite know what is happening there, the question is, is that more secure than a infrastructure radio running the software that you can actually introspect. I would argue that the software defined approach is more secure than having a hardware box that you don't know. >> I would buy the premise that certainly we know that supply chain concerned. You know the speculation Super Micro, which never was proved. >> It doesn't matter who the vendor is or what the country is. It really is a concern in terms of not being able to introspect what has happened Going inside >> for my tea shop. I'm running VM where operating I want developers. So now you're going to tell Coz you revitalize their business model? They had a rule out appy. Now what did you see? That connecting is gonna be connective tissue between >> I'll think about it. I didn't feel goto a telco. We look at really three stakeholders in there. One is I t the second Is there be to be or enterprise facing business and then the 3rd 1 is their core and access network or the CTO. We're now have a value proposition of having a uniform architecture across all three stakeholders with the uniform ability to create applications and drop it on top of each of these infrastructures with the ability to manage and secure these again in a uniform way, not just that, but also make this work well with other cloud infrastructures private, hyper scale, public as well as EJ. >> That's table stakes. You have to do that. These jokers have to operate whatever >> well it is, But it's not. I mean, if you think about what the infrastructure off a tailcoat today is, it's far from that, because it's it's sort of a closed environment. You can't access anything from a telco environment in order to go build an application to it, and it does not resemble anything like any club >> you could enable Telco. Just I'm just kind of thinking connecting the dots here real time in the Cube. If I'm a telco, hell, I'll take that VM wear on a deli and see model. Make me a cloud and I'll sell Cloud Service is to markets that kind of >> it is. Actually it's a very important part of our business model because most telcos would not move their own infrastructure from a network standpoint onto a public cloud. But they are eagerly awaiting the ability to operate their own network as a cloud, and if they can have somebody manage that for them, then that is very much within the >> you're enabling. An increase in the number of cloud service provides potentially the paint on the makeup of the telco tier one tier two tier three size. Pretty much >> potentially. I mean, it's taking an existing operator and having them operate in a more agile way and potentially increasing anew form off a cloud service >> provided telcos wouldn't move into the public cloud because of they want to control. And the cost is that right or it's >> mostly control. It's not about cost. It's about taking What is your sort of coordinating for, ah, packet corps or for a radio network? Yeah, and there is also an angle around competition, I think telcos our what in about the Amazons of the world and the azure eyes of the world potentially becoming a service provided >> themselves. And that's what I wanted to ask you about the business impact of all this discussion you guys were having is, you know, the cost for bits coming down. The amount of data is increasing faster. You got over the top providers just, you know, picking off the telcos. Telcos can't compete their infrastructures of so hardened. Will this all change that? >> Absolutely So. I think that it has the potential to changing all that. I don't think all the telcos will take advantage of it. Some off them might end up being more traditional and sort of sticking to where they were. But for those that are willing to make the leap, I mean, as an example, Vodafone is a customer that has actually gone in with this architecture with us. A. T and T is working with us with the Vela Cloud software from via Mary bringing a new form off branch computer branch connectivity through SD man. So these are all examples of telcos that are actually leading the >> charter. But if they don't lean in, they have this vision there either. Well, it's either because they're protected by their local government or they're going to go out of business. No, I would >> agree. I mean, it's sort of silly from our standpoint to be talking about five G and not thinking about this as the architecture for five, right? I mean, if you only focus on radio waves and your wireless network that's like a part of the problem, but you really need to have the ability to deploy these agile service's. Otherwise, you could get killed by >> the O. T. T. So how do you compete against the competition? What's the business plan that you have? C. Five G? We see that in the horizon that's evolving its evolution, so to speak. Pun intended on edge is certainly very relevant for enterprises, whether it's manufacturing or industrial or just people. Yeah, >> I'd say there are two things. One is a CZ. I'm sure you heard from folks at GM, where our vision is this notion of any any anywhere. We've talked about any cloud at any application that any device. So that becomes one of the strongest different chaining factors in terms of what V Amir can bring. Tow any of our customers compared to the competition, right? Nobody can actually make it really across these dimensions. If you then take that architecture and use that to deploy a telco cloud, we're now making investments that are telco specific that allow the tailcoat than take this and make the most out of it. As an example, we're investing in open stack we're investing in container ization. We just bought a company called Johanna and Johanna essentially allows the operator to go and provide metrics from their radio access networks. Use at that to train a learning engine and then feed that back so that the operator can tune their network to get like fewer dropped calls in the region. So if you combined technology like that with this, any cloud infrastructure that we have underneath that that's the best in class deployment methodology for any. Tell Cho to deploy >> five. Your business model metrics for you internally is get Maur deployments. What stage of development five G certainly is in a certain stage, but you know, edges there. Where is the Progress bar? If you're the kind of oh, >> it's actually mold phenomenally. I mean, every time we have conversations like this, we're moving about further in terms off. How many carriers are deploying on via mare on a telco cloud Architecture? How many subscribers are basically being serviced by an architectural like this? And then how many network functions are being deployed? Two of'em air architecture. So we are over 100 carriers now we are over. We have about 800 million subscribers, or so that about globally are being serviced by a V M Air supported network. On then, we have essentially over 120 network functions that >> are operating on top of you. Usually bring in all the same stuff that's announced that the show that stuff's gonna fold into the operating platform or Joe Chuckles have different requirements. Off course. It's >> both. We take the best of what is there from the sort of overall vehement factory and then as a team. My team then builds other widgets on top that are telco specific. >> How big is your your tam up Terry for you? >> Well, so the best way to look at it as telcos globally spend about a trillion dollars in capital investment and then probably to X that in terms of their operating expenditure over the course off all of the things that they do right? And out of that, I would say probably a tent off that. So if you take about $100 billion opportunity, opens itself up toe infrastructure investment in terms off the kinds of things that we're talking about now, they're not gonna move from like 0 200 of course. So if you take some period of time, I would say good subset off that $100 billion opportunity is gonna open itself up >> to it. This kind of business cases, eliminating that two x factor, at least reducing it. Is that exactly? That's not just that Service is that's, >> ah, cost reduction alternative. But then you have the ability to go deploy. Service is faster, so it's really a combination off both sort of carrot and the stick, right? I mean, the character here is the ability to go monetize More new service is with five G faster. The stick is that if you don't do it, Ortiz will get there faster and your costs off. Deploying your simple service is will increase his >> telcos, in your opinion, have what they have to do to get the DNA chops to actually be able to compete with the over to top OT T providers and be more agile. I mean, it's obviously sort of new skills that they have to bring in a new talent. Yeah, >> well, first and foremost, they need toe get to a point where their infrastructure is agile and they get into a business model off knowing how to monetize that agile infrastructure. So, for example, they could offer network as a service on a consume as you go basis. They could offer a platform as a service on top off that network in order for or titties to go build applications so they can do Rev shares with the forties. Or they could have offer. Full service is where they could go in and say, We are the conferencing provider for videoconferencing for enterprises. I mean, these are all models that >> the great conversation love to do. Your Palo Alto? Yes. Have you in our studio want to do more of a deep dive? We love the serious, super provocative, and it's important Final question for you. Though Pat Sr here on the Cube, lay asked him, Look back in the past 10 years. Yeah, look back in the next 10 years. What waves should everyone be riding? He said three things that working security and kubernetes humans being number one actually promoting convinced everyone for the ride, for obvious reasons, clouded. I get that, but networking Yeah, that's your world. That's changing. Which which events do you go to where you meet your audience out there in the telco because networking is a telco fundamental thing. Sure moving packets around. This is a big thing, >> eh? So far, operator networking related stuff, I would say. I mean the biggest shows that for us would be Mobile World Congress as an example, right? It's where many operators are. But I would also say that when we do our own events like this is the ember. But the movie forums in in Asia packers an example. A lot of the telco conversations I find they are best done one on one before. Yeah, the forums are our forums, but we will goto have one on one conversations or small group conversations >> with our telco customers. Locals Shakaar Thanks for spending. You get a hard stop. Very busy. >> Thank you. Thanks for having me >> here, Sugar Yaar, Who's here inside the Cube bringing down five G, which is still pregame. A few winning something first thing is gonna come up soon, but edges super hot. A lot of telco customers be back with more live coverage of the emerald after this short break

Published Date : Aug 27 2019

SUMMARY :

Brought to you by VM Wear and its ecosystem partners. Edges the future Now these air to emerging areas for you guys. is not just the better provisioning off like Higher Man With Service is to and any kind of differentiates service is even in the network layer. These are all options that are open to them now with this notion off. and the cloud native is there greenfield for AP supporter having applications on top new service is that are much faster to provisions and then extending that You know, not even an inning Yet in the metaphor of baseball innings, I gotta ask you get my phone. promiscuous landscape that is called the coyote Edge. So I think there This is sort of the pitch you heard from Mia Mary, even in the context of our acquisition of carbon black But it doesn't change much, really, from an infrastructure standpoint, running the software that you can actually introspect. You know the speculation Super Micro, being able to introspect what has happened Going inside Now what did you see? One is I t the second Is there be to be or enterprise facing business and then the 3rd You have to do that. I mean, if you think about what the infrastructure off a tailcoat today is, you could enable Telco. But they are eagerly awaiting the ability to operate their of the telco tier one tier two tier three size. I mean, it's taking an existing operator and having them operate in a more And the cost is that right of the world potentially becoming a service provided You got over the top providers just, you know, picking off the telcos. Vodafone is a customer that has actually gone in with this architecture with us. it's either because they're protected by their local government or they're going to go out of business. I mean, it's sort of silly from our standpoint to be talking about five G and the O. T. T. So how do you compete against the competition? So that becomes one of the strongest different chaining factors in terms of what V Where is the Progress bar? I mean, every time we have conversations like this, Usually bring in all the same stuff that's announced that the show that stuff's We take the best of what is there from the sort of overall vehement factory Well, so the best way to look at it as telcos globally spend about a trillion dollars in capital This kind of business cases, eliminating that two x factor, I mean, the character here is the ability to go monetize More new service I mean, it's obviously sort of new skills that they have to bring in a new talent. in order for or titties to go build applications so they can do Rev shares with the forties. the great conversation love to do. I mean the biggest shows that for us would be Mobile World Congress as an example, right? with our telco customers. Thanks for having me here, Sugar Yaar, Who's here inside the Cube bringing down five G, which is still pregame.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Michael DellPERSON

0.99+

TelcoORGANIZATION

0.99+

San FranciscoLOCATION

0.99+

VodafoneORGANIZATION

0.99+

Mia MaryPERSON

0.99+

MaryPERSON

0.99+

$100 billionQUANTITY

0.99+

10 yearsQUANTITY

0.99+

JohannaORGANIZATION

0.99+

GuzmanPERSON

0.99+

EdgeORGANIZATION

0.99+

Shekar AyyarPERSON

0.99+

TelcosORGANIZATION

0.99+

Mosconi NorthLOCATION

0.99+

eachQUANTITY

0.99+

telcosORGANIZATION

0.99+

two waysQUANTITY

0.99+

OneQUANTITY

0.99+

telcoORGANIZATION

0.99+

PatPERSON

0.99+

Joe ChucklesPERSON

0.99+

todayDATE

0.98+

Super MicroORGANIZATION

0.98+

bothQUANTITY

0.98+

about $100 billionQUANTITY

0.98+

about a trillion dollarsQUANTITY

0.98+

over 100 carriersQUANTITY

0.98+

two thingsQUANTITY

0.98+

about 800 million subscribersQUANTITY

0.98+

TerryPERSON

0.98+

TwoQUANTITY

0.98+

AsiaLOCATION

0.98+

AmazonsORGANIZATION

0.97+

secondQUANTITY

0.97+

five gORGANIZATION

0.97+

Mobile World CongressEVENT

0.97+

fiveQUANTITY

0.97+

Palo AltoLOCATION

0.96+

VM WearORGANIZATION

0.96+

CloudORGANIZATION

0.96+

VMwareORGANIZATION

0.96+

ViennaLOCATION

0.96+

three thingsQUANTITY

0.96+

first thingQUANTITY

0.95+

over 120 network functionsQUANTITY

0.94+

GMORGANIZATION

0.93+

oneQUANTITY

0.92+

V AmirORGANIZATION

0.91+

Shopping DayEVENT

0.91+

agileTITLE

0.91+

twoQUANTITY

0.89+

EVPPERSON

0.89+

VMworldEVENT

0.89+

Pat SrPERSON

0.88+

0 200QUANTITY

0.87+

3rd 1QUANTITY

0.86+

five GORGANIZATION

0.86+

ChoPERSON

0.84+

five GCOMMERCIAL_ITEM

0.84+

CokeORGANIZATION

0.82+

next 10 yearsDATE

0.81+

firstQUANTITY

0.8+

A. TORGANIZATION

0.8+

OrtizPERSON

0.78+

three stakeholdersQUANTITY

0.77+