Image Title

Search Results for HP Enterprises:

Bob Moore & Jason Shropshire | HPE Discover 2017


 

>> Announcer: Live from Las Vegas it's theCUBE. Covering HPE Discover 2017 Brought to you by Hewlett-Packard Enterprise. >> Okay welcome back everyone, we're here live in Las Vegas it's theCUBE's exclusive coverage of HPE Discover 2017. HP Enterprises premier show, it's theCube on our third day I'm John Furrier, my co-host Dave Vallante. And our next guest Bob Moore returning back, Director of Server Software Private Security, he's got the hottest product, he's here on the show. We're going to go do a deeper dive. And Jason Shropshire SVP, CTO of InfusionPoints. Welcome back welcome to theCUBE. >> John, thank you Dave. You're the talk of the town here on the show with the simple messaging that is clean and tight. But outside of that, from a product stand point is really some of the security stuff you guys are doing in the Silicon. >> Bob: It is. >> In the server with Gen 10, pretty game changing, we've been curious, we want more information. >> Bob: Yeah. >> John: Give us some more update, what's the update? >> Glad to do that we're really proud of the announcement of course it's a big bold announcement this week. Claiming ourselves the world's most secure industry standard server. So that's big, that's huge, that's based on this new revolutionary security technology that we've been developing frankly over the past couple of years. So it's been two or three years in the making. A lot of hard work, we actually started to look at what type of security trends were happening, and what we might have to do to protect the servers. And we've come up with a game changing capability here. And it's one thing for us to say it internally at HPE, but we are so certain that we are in a great security position that we went external and found a security firm outside, that independently could look at it and do some compare, contrast testing with a competitive unit, so. >> So let's drill into that, actually I had some other questions on the industry in terms of what is going on at the chip level. Always on security is kind of a theme we've heard in the past from some of your competitors, but lets get into some of the competitive analysis. What do you guys see in the benchmarks. Jason, what do you guys discussing , because at the end of the day, claims are one thing. No offense to HP, you're kind of biased of course. We have folks on from the marketing team as well. Where's the proof in the pudding? >> Oh yeah, well one thing that we know for sure is that threat is real, right, with firmware. And it was great for us to analyze HP's new technology. We had on the bench two different beta units. >> John: You guys are the ones who did the benchmark. >> Jason: Yes the analysis. >> Independent. >> Independent yeah, FusionPoints is a cyber security firm independent from HP, they approached us to do the testing. >> John: Okay. >> We have head analysts that do this sort of thing all the time for our customers. >> So take us through what happened. >> Yeah so they procured for us three competitor servers. Sent them to our shop. We set them on a bench, all side by side. From what I can tell, no one's ever really done a test like that, you know, within the server industry. It was very exciting. There's been a lot of benchmarking done and performance, things like that. But from a black hat stand point, to actually look at the hardware, that hardware level testing, we couldn't find any examples of anyone doing it. I thought that alone was just evidence that HP was very serious about security and they knew what they had. So. >> John: You guys getting your answer, because you know the malware, and all the ransomware going on. People are going through elaborate lengths. >> Jason: Absolutely. >> Business model, organized teams, this is a really orchestrated security market now, with the black hat guys out there, really hacking away at every angle. >> Yeah well, you know we saw evidence that firmware issues and exploits are here to stay. The Vault7 release that happened recently showed us that there are exploit kits. Intel security released within a day a tool to let you do firmware validation. But to do that you have to take your server offline and build a gold image of what that firmware should look like. And then compare like a week later if you think you might have had a breech. You have to take your server down and compare it against that gold image. And who has the time to do that? But what we found in analyzing the Gen 10 server is HP has built this in, where this can be done in real time, while the server is running. No performance hit, no down time. It really is a revolutionary game changer I think for firmware security. >> So Bob, can you explain what IP you developed in Silicon that Intel, where do they leave off and you pick up? >> Sure, sure because Intel has some great security technology. And we actually support a lot of Intel technology. Their TXT, their Trusted Execution Technology as part of our Gen 10 servers. But what we've done at HPE is we've really taken it multiple steps further than that and we've developed. Because we're in a position where we develop our own custom HPE iLo-silicon chip, we're able to anchor what we actually do, imbed the cryptographic algorithms into that, and we anchor all the server's essential firmware. Right, think of it as anchoring it down into the bedrock. So there's really no way you can get in and breach that. And even if you did, instead of taking it offline like Jason was talking about here. We have the ability to not only provide that protection, but we would detect any type of malware or virus that gets in. And then frankly, we can recover that, almost immediately within a few minutes. In fact we're demonstrating that here during Discover this week. >> Is there anyplace online where people can get information, people watching, probably curious. >> Bob: Sure >> You can just give them the URL. >> Yeah just naturally it's our HPE.com/security. And that where there we've got some white papers there and other things there. >> So you say you can recover universally instantaneously. >> Bob: Yes. >> And you do that by what, fencing certain resources or... >> Yeah well what we've done, is we verify as the server is running, we're doing a runtime for more validation. So we're checking that firmware, making sure it's free of any malware, viruses, or compromised code. Completely perfect in original shape, like when we ship it from the factory. And we're storing in another location inside the server, a secure copy of that. Think of it as log box, inside the server, where it can't be found unless we need it to go into recovery mode. Then we draw from that, we've checked it daily, we've stored it there, we know it's authentic, and we can pull that back into recover in case something does happen to the server. >> And then asynchronously reclaim that wasted resource, clean it up and bring it back online. >> We can, we can recover the server, the firmware, toward the end of the year, we'll be recovering the operating system as well. Also we've got a really holistic way to get that recovered. When we talk to customers, a real big concern, and sometimes it's called bricking a server, you've got a bricked server, something that just won't operate. And it's important because 60% of small businesses that suffer a security breach, go out of business within six months, so it can be huge that lack of cashflow for customers. It's that denial of service, that disruption of business. Well we prevent all that, because we can not only protect the server, but then recover from a breach. >> So the anatomy of that breach, can we go through a common use case? So malware gets in, it gets into the server, it's hiding, typically you don't know about it. And in this new scenario with your Gen 10. You'll be able to identify that. >> Bob: That's right. >> To protect it, okay. And if I understand, the business impact of the problem you're solving is, not only are you sort of automating that protection, but you're also eliminating, a lot of wasted time, and downtime, and accelerating the response. >> Yeah I think that's what Jason was talking about earlier. Normally, if you're server gets infected, you completely take it off line and then do a manual recovery. And customers still have the choice to do that, but in our case we can recover immediately within a few minutes if something happens and gets a breach. >> Those types of exploits are typically in the data plane as well. With firmware you can't even really detect that you've been hacked. So down in the firmware virus scanners, those things don't work. So if you have a BIOS exploit, that is on either the iLO, that would be on the BMC the baseboard management controller. And undetectable by the operating system. >> That's crazy because it's a clean haven for hackers. I mean they know how to get in there, once you're in there, you're in. >> I don't know if a lot of customers realize this but the first thing when you turn a server on, there first thing that comes on is the firmware. In our case it's the iLO firmware. Over a million lines of the firmware code run before the operating system even starts. So that can be a cess pool for a trojan horse. And the research shows a virus, somewhat analogous to a human virus, it can stay there, hibernate in there for months, maybe even a year or more until it springs forth and opens up the passwords or bricks your servers, or does some nefarious thing. >> A cesspool from the customer standpoint, from a hacker is like going to the beach. Pina Coladas, you're clean you're down there having fun. >> Well what's your stats? The average time to detect an intrusion is over 200 days. >> Bob: That's right yeah. >> So essentially, you're detecting it instantaneously. >> We can, we run that runtime firmware validation on a regular basis, can be run as much as everyday, and so you'll know almost immediately. Which is really great because of a lot of regulatory bodies want to know if a breach has occurred. So this gives customers the ability to know somethings happened to them. >> Jason I want to challenge the claim here, because first of all I love the bravado. Yeah, we're bad ass, we're number one. >> We know that. >> What is the, how did the leaderboard come out? What was the results? Did HP come out number one? >> Oh absolutely. >> What's the lead, what's the gap, talk about the gap between HP and other servers. Did they send you the best servers? What was the benchmark, I'm sure you did your due diligence, take us to more of the results. >> Sure, sure, so yeah again we were comparing all the servers side by side. A test that had never been done from what I'd seen. When we looked at by feature, by feature, and started analyzing things. We sort of broke down and we saw we really had two different angles that we were looking at. The penetration test as aspect. What we were looking for vulnerabilities in the firmware, at the physical layer, at the network layer. They passed that with flying colors. We found a few minor issues that they jumped on and resolved for us in a matter of hours or days. And then the other aspect was a feature by feature comparison that we looked at. We looked at the silicon retruss obviously and we saw what the others were doing there. At best the other guys were using firmware to validate firmware. The obvious issue with that is if the firmware is compromised it's not trustworthy. >> Spoof, yeah, yeah. >> It's in no position to validate and verify. >> It's like Wallstreet policing itself. >> Jason: Yeah, can't trust that, They have a revolutionary intrusion detection switch on the Gen 10, that actually detects. If the lid is lifted on the server, anywhere from when it leaves the factory to the garage of the installation point, server doesn't have to be plugged in like the other guys. >> So if it's just a physical casing breach, >> Jason: Exactly. >> What happens there, flags the firmware, makes a note, does it shut it down? What happens? >> It makes a note, it puts it in the log entry so you can tell if that server has been tampered with in transit. >> So the insider threat potential should go away with that. >> Right, physical access, you don't have to worry about that because we can verify that server gets to the customer in it's unique, original, authentic condition. Because even though the power is off that is going to register and auto log an alert if that chassis has been opened. >> So I can't go to the vault of the Bellagio, like they did in Ocean's Eleven and put my little, and break into the server and you know go in there. >> Bob: Exactly. >> Okay, now back to the results. So the other guys, did they all pass or what. >> Well we did find some issues that we're looking at and doing some further testing on. >> So we're going to be polite and respect the confidentiality you have the ethos of security as you know sharing data is a huge deal, and it's for the integrity of the customer that you have to think about so props for that. For not digging into it, we'll wait for an official report if it does come out. Alright, so I got to ask you a personal question Jason. As someone who is in the front lines. You know every time there's a new kind of way, whether it's Bitcoin and Block chaining, you see a slew of underbelly hacking that goes mainstream that people are victimized. In this case firmware is now exposed, well known. >> Jason: Yeah. >> What as a professional, what gets you excited, and what gets you alarmed if anything about this? What new revelations have you walked away with from this? >> Well it's just how pervasive this issue is. You know the internet of things has exploded the number of IP devices that are out there. Most of them have, firmware issues, almost all of them have firmware issues. And we've just now seen bot nets being created by these devices. Cameras, IP cameras and things like that, that become attack platforms. So I just want, one of the things that impressed me very much about HP's approach here is that they're being a good corporate citizen by making a platform that's going to be implemented in tens of thousands IP addresses. Those systems I think will be much more secure. Again it can't become an attack platform for other people, for attackers to abuse. >> So the surface area, so your point about IOT. We always talk about the surface area of attack vectors. And that vector can then be minimized at the server level, because that's like the first mile in. >> Right we come and really refer to that as the attack vector or the attack surface. And so we narrow that attack surface way down. >> Can you even subjectively giVe us a sense as to how much of the problem this approach addresses? I mean is it 1%, 10%, 50% of the attacks that are out there? >> I think the important thing here is moving, shifting the bar. I've likened this, what HP is doing here to what Bill Gates did 15 years ago with the Microsoft memo. I mean that really revolutionized operating systems security within Microsoft and I think it had a ripple effect out into the industry as well. So I think HP is really pushing the bar in the same way but for firmware, instead of the operating system level that was the paradigm 15 years ago. >> And I think you'll find on our website we put some of the studies actually, and it's over half, I think it's 52% of the firms that responded have had a breach or malware virus in their firmware. So over half of those, and 17% had a catastrophic issue with that, it really is more pervasive. We've seen a lot of news about the data plane level, where thefts are taking place at the application level of the operati6ng system. And we've got to pay attention to the firmware layer now because that's like I said, a million lines of code in there running. And it could be an area where a trojan horse can sit, and we essentailly narrow that attack surface. We're also delivering with the Gen 10, the highest, the strongest set of security ciphers available in the world today. And that's a commercial national security algorithms. We're the only ones to support in our server, so we're proud of that. >> Well Bob and Jason thanks so much for sharing the insite. It's super exciting and relevant area, in the sense that it's super important for businesses and we're going to keep tracking this because the Wikibond team just put out new research around true private cloud, showing the on prim, cloudlike environments will be 260 billion dollar market. That's new research, that's groundbreaking, but points to the fact that the on pram server situation is going to be growing actually. >> Jason: For sure. >> So this is, and with cloud there's no perimeter so here you go, firmwares, potential exposure you solved that problem with good innovation. Thanks so much for sharing. >> Thanks you guys. >> Thank you. >> The inside Jason and Bob here on theCUBE talking about security servers, attack vectors, no perimeter, it's a bad world out there. Make sure you keep it protected of course. This is CUBE bringing you all the action here at HPE Discover. We'll be right back with more live coverage after this short break. I'm John Furrier, Dave Vellan6te. Be right back after this short break, stay with us.

Published Date : Jun 8 2017

SUMMARY :

Brought to you by Hewlett-Packard Enterprise. he's got the hottest product, he's here on the show. You're the talk of the town here on the show In the server with Gen 10, pretty game changing, been developing frankly over the past couple of years. We have folks on from the marketing team as well. We had on the bench two different beta units. independent from HP, they approached us to do the testing. all the time for our customers. at the hardware, that hardware level testing, the malware, and all the ransomware going on. orchestrated security market now, with the black hat guys But to do that you have to take your server offline We have the ability to not only provide that protection, Is there anyplace online where people can And that where there we've got Think of it as log box, inside the server, And then asynchronously reclaim that wasted resource, And it's important because 60% of small businesses that So the anatomy of that breach, of the problem you're solving is, not only are you And customers still have the choice to do that, So down in the firmware virus scanners, I mean they know how to get in there, but the first thing when you turn a server on, A cesspool from the customer standpoint, The average time to detect an intrusion is over 200 days. We can, we run that runtime firmware validation because first of all I love the bravado. What's the lead, what's the gap, talk about the gap We looked at the silicon retruss obviously of the installation point, It makes a note, it puts it in the log entry that is going to register and auto log and break into the server and you know go in there. So the other guys, did they all pass or what. Well we did find some issues that we're looking at and it's for the integrity of the customer You know the internet of things has exploded So the surface area, so your point about IOT. And so we narrow that attack surface way down. but for firmware, instead of the operating system level We're the only ones to support in our server, Well Bob and Jason thanks so much for sharing the insite. So this is, and with cloud there's no perimeter the action here at HPE Discover.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
JasonPERSON

0.99+

Dave VallantePERSON

0.99+

Bob MoorePERSON

0.99+

JohnPERSON

0.99+

BobPERSON

0.99+

HPORGANIZATION

0.99+

MicrosoftORGANIZATION

0.99+

John FurrierPERSON

0.99+

Dave Vellan6tePERSON

0.99+

Jason ShropshirePERSON

0.99+

60%QUANTITY

0.99+

Bill GatesPERSON

0.99+

DavePERSON

0.99+

52%QUANTITY

0.99+

twoQUANTITY

0.99+

17%QUANTITY

0.99+

Hewlett-Packard EnterpriseORGANIZATION

0.99+

50%QUANTITY

0.99+

three yearsQUANTITY

0.99+

1%QUANTITY

0.99+

a week laterDATE

0.99+

BMCORGANIZATION

0.99+

CUBEORGANIZATION

0.99+

firstQUANTITY

0.99+

10%QUANTITY

0.99+

FusionPointsORGANIZATION

0.98+

WikibondORGANIZATION

0.98+

first mileQUANTITY

0.98+

Las VegasLOCATION

0.98+

two different anglesQUANTITY

0.98+

over 200 daysQUANTITY

0.98+

first thingQUANTITY

0.98+

a yearQUANTITY

0.98+

oneQUANTITY

0.97+

two different beta unitsQUANTITY

0.97+

15 years agoDATE

0.97+

BellagioORGANIZATION

0.97+

InfusionPointsORGANIZATION

0.97+

Over a million linesQUANTITY

0.97+

this weekDATE

0.97+

six monthsQUANTITY

0.96+

over halfQUANTITY

0.96+

IntelORGANIZATION

0.96+

one thingQUANTITY

0.95+

HPE.com/securityOTHER

0.95+

260 billion dollarQUANTITY

0.95+

todayDATE

0.92+

Ocean's ElevenTITLE

0.92+

third dayQUANTITY

0.91+

tens of thousands IP addressesQUANTITY

0.9+

HPE DiscoverORGANIZATION

0.89+

HPE Discover 2017EVENT

0.89+

three competitor serversQUANTITY

0.87+

HPEORGANIZATION

0.82+

Chris Selland, HPE & Ken Kryst, PwC - #HPEDiscover #theCUBE


 

lie from las vegas it's the cube covering discover 2016 las vegas brought to you by Hewlett Packard Enterprise now here's your host Jeff Frick hey Jeff Rick here with the cube we're in Las Vegas at the hpe discovered 2016 the first year that HP Enterprises has discovered in Vegas they flipped the switch before they went to a London last year so we're excited to be back a lot of changes a lot more green squares all over the place green frames so it's pretty exciting but you know obviously what's at the forefront of all this is data in big data what's happening with data so we're excited to get somebody from the trenches who's out working with customers first off crystal and obviously VP biz dev cube alumni been on all the time we'll see him in Boston how long Krista that show the end of August a little further and then ken Chris the director of data analytics for pwc welcome thank you nice to be here absolutely so welcome so data a lot of talk about data in kind of this this this change in data as it's kind of a liability back in the day like what am I going to do with all this stuff i'm going to sample to now I've got the data but that's not really enough you need to get the data to information you got to get the information to incite then you got to get the insight into actionable information so what are you seeing out in the real world with some of the customers that you work with so I think that a lot of what we're seeing with customers out there I mean I was walking through the floor earlier today and to see all the things that HP is doing with various technologies the people are partnering with very impressive but fundamentally at the end of the day a lot of those technologies are producing data and like you said clients and customers are trying to figure out how do i generate value from this how do I get it in the right hands of the people that can make decisions what am I seeing out in the industry today a lot of stuff particularly around customers personalization better service client experience we have the whole concept of CX which is that customer experience end-to-end don't just worry about you know how am I going to retain customers and prevent churn but also go up the the lifecycle and figure out how to attract more customers using data personalizing my service offerings improving my digital products things of that nature I'd love to get your perspective there's a lot of talk of you know there's never enough data scientists right how we're going to get enough data scientist but it takes me back to the day when there's never going to be enough chauffeur's this car thing is never going to take off I mean are you seeing the you know this kind of this vision of getting the data into the decision-makers hands getting it out of the hallowed halls of just the data science are you seeing that happening in the real world and what are some of the ways that that happened definitely I mean we've talked a long time about the concept of the data scientists being that individual that is like the unicorn it doesn't exist right so what we talk more about now is like pulling together those SWAT teams where you have someone that understands the data someone that understands the business problem someone that understands deep analytics spin teams like that up go out and find the answers yeah that's funny that you said that because we hear that a lot that data science is not an individual's it's a team sport you know you really have to bring a lot of people to bear and it's it's not just this this hallowed thing down a mahogany row at the very end it's actually getting that in you know and getting dirty with a lot of folks yeah that and I would also say another thing that's going to help with regards to the whole data scientist crunch is machine learning robotics things of that nature artificial intelligence I definitely think that that's something that people kid about as something that's far down the future but I think it's coming very quickly and something that customer sorry excuse me company should pay attention today so Chris you've been playing in the space forever you've seen a lot of transformation wonder if you could speak specifically to how the cloud has really impacted this whole kind of big data meme in this big data discussion because now suddenly it's a lot of people that have a lot of access to a lot of stuff that aren't necessarily connected to the VPN you know back at corporate headquarters that enable that to go out well it's allowed a lot of customers to iterate faster to try new things more quickly set them up take them down it's gotten business people involved one of the things can and I talked about in the session we just gave together was about how this is becoming more of a business discussion so our partnership with solution partners like PwC become more and more important because it's not always just IT people these days driving the data lakes it's now you're starting to see other sea level execs you know CFO the CMO starting to drive some of these initiatives and cloud-based solutions make those things more accessible so we're definitely seeing both quicker iteration and more business involvement the other thing we hear Kendall a lot about was back in the day right you had to sample you know you couldn't store all the data you couldn't process all the data yeah there was a lot of sampling going on right now that's that's changing you know you can store the data you can grab a lot more than you even think that you might need today but what you might need tomorrow and you can run big processes against big data sets that you couldn't do before you seen that kind of manifest itself in the market oh yeah all over the place i mean my specialty is within the entertainment media and communications business so when you talk about the cable companies and phone companies out there digesting set-top box data data coming off of phones if you go into the world where you know people Internet of Things sensor data just that you know we call it data to lose where where where it's just coming in Fast and Furious and the folks that are responsible for maintaining protecting and serving that data up are challenged more and more today and there's a lot of business pressure because people that use you know apps on their phone don't understand why can't I do the same thing with data that I know that we have to makes it make it insightful and actionable and allow me to do my job right but then kind of the dark side of that is if you have too much data you know our argues are you swimming in data that's not necessarily an indication of the change that you're trying to impact or you know it's not an indicator of something that you can take action so how are people kind of filtering through to get the right data to the right people at the right time yeah I mean Chris mentioned this and one of his previous answers but the attack that we take and that we stress with our clients is to take a business capabilities driven approach so when you think about the guy in the field that's responsible for sales or the person in the call center that's responsible for customer service taking the viewpoint of how what data do they need how do they need it served up how do they need it parsed and when do they need it that is the key to the approach to figuring out how do i find the signals through the noise what data is really worthwhile and do i really need to protect and make sure it gets served up versus this stuff i can keep versus this stuff i really don't need right and of course the other big trend is is an actual word spark summit we had another crew up there is this whole move to real time right and streaming data and not not you know grabbing capturing reviewing and looking back but watching it in real time and taking action while it's dreaming totally changing the business yeah fascinating and big data are used you know you use that car analogy before and if you heard Meg in the keynote say I think every driverless car is going to create three library of congress's worth of in fourth of data so and obviously it's very important right so you want to aggregate the data about what's going on with if you're running a fleet of cars but obviously you also have to know what's going on in the car and that's that's about as real time as it gets so and so these things are complementary big data and fascinator highly complementary and we're seeing a lot more activity out at the edge and obviously we made some announcements here both in terms of partners and some of our initiatives at HB around that here so Ken last question video we hear over and over and over the videos and increasing proportion of the total traffic on the Internet nobody ever thought that people would hang out on their phones and watch Game of Thrones or an NFL game or go warriors and you're in the media comes or the cube that's right well we knew they would watch a cute Chris um they're only 18 minutes but that's a huge huge stressor on resources a huge stress Iran on capacity storage networking and yet the customers want it right the expectation is going to be there it's going to look good so how is that impacting the guys on the back end that are responsible for delivering a good experience but they also have pricing pressure and they've got a ton of demands on their resources yeah yeah it's funny that you bring that up I walked into my house last week and hell-bent on having some good family time with my wife and kids and the TV was on and all of them had multiple devices actually iPads and iPhones that they were and everything was sucking off the internet which was kind of amusing to me but that's exactly your point and a lot of the companies that we're working with in the communications industry specifically their main goal and focuses to make sure that the pipes are big enough that they're utilized properly to make sure people have the best experience possible so utilizing the technology not only capture the data but really deep analytics to pinpoint where are my peaks and troughs and utilization and usage going to be how do i divert and make sure the right resources are available again also that can provide the best customer experience just can't over provision it like bananas oh yeah but it's expensive so you don't want those pipes of the empty either that's the thing you want to have enough capacity but you don't want / build that so it's it's an analytics challenge this analytics challenge and it's I always think of the old AT&T ma belle you know problem on Mother's Day everybody calls mom on mother's day back in the day you had to build the pipe to support mother's day even though most people aren't calling or not on Mother's Day well can Chris thanks for stopping by can give you last word we're looking forward to in the next six months as you know see some of the exciting things your customers are working on yeah i mean the technological advances are really great i will say that customers especially business consumers of the data getting very much more smarter much more savvy er so the demands on the folks serving up that data storing that data and protecting that data are going to be you know more and more crucial but it's it's just great business to be a part of it's great to see it's great to see the technology and some of the stuff that you guys are doing so we're proud to be part of it and happy to be here thanks for stopping by Ken Chris crystal and I'm Jeff Rick you're watching the cube we'll see you next time

Published Date : Jun 9 2016

**Summary and Sentiment Analysis are not been shown because of improper transcript**

ENTITIES

EntityCategoryConfidence
ChrisPERSON

0.99+

Jeff FrickPERSON

0.99+

BostonLOCATION

0.99+

VegasLOCATION

0.99+

Game of ThronesTITLE

0.99+

Hewlett Packard EnterpriseORGANIZATION

0.99+

Ken KrystPERSON

0.99+

Las VegasLOCATION

0.99+

Jeff RickPERSON

0.99+

Jeff RickPERSON

0.99+

2016DATE

0.99+

AT&TORGANIZATION

0.99+

Chris SellandPERSON

0.99+

LondonLOCATION

0.99+

last yearDATE

0.99+

tomorrowDATE

0.99+

las vegasLOCATION

0.99+

HPORGANIZATION

0.99+

iPhonesCOMMERCIAL_ITEM

0.99+

last weekDATE

0.99+

iPadsCOMMERCIAL_ITEM

0.99+

todayDATE

0.99+

mother's dayEVENT

0.99+

mother's dayEVENT

0.99+

HP EnterprisesORGANIZATION

0.98+

Mother's DayEVENT

0.98+

end of AugustDATE

0.98+

Mother's DayEVENT

0.98+

congressORGANIZATION

0.98+

PwCORGANIZATION

0.97+

bothQUANTITY

0.97+

fourthQUANTITY

0.97+

KenPERSON

0.95+

KristaPERSON

0.95+

oneQUANTITY

0.95+

ken ChrisPERSON

0.94+

Fast and FuriousTITLE

0.93+

MegPERSON

0.93+

18 minutesQUANTITY

0.91+

Ken ChrisPERSON

0.86+

earlier todayDATE

0.86+

HBORGANIZATION

0.85+

next six monthsDATE

0.85+

lot of folksQUANTITY

0.83+

first yearQUANTITY

0.83+

HPEORGANIZATION

0.82+

a lot of customersQUANTITY

0.81+

companiesQUANTITY

0.78+

firstQUANTITY

0.78+

threeQUANTITY

0.76+

NFLEVENT

0.74+

CXTITLE

0.71+

pwcORGANIZATION

0.69+

lot of peopleQUANTITY

0.67+

dataQUANTITY

0.66+

KendallPERSON

0.59+

lotQUANTITY

0.58+

SWATORGANIZATION

0.57+

a lot moreQUANTITY

0.57+

IranORGANIZATION

0.54+