Tony Carmichael, Cisco Meraki | Cisco Live US 2019
>> Live from San Diego, California It's the queue covering Sisqo Live US 2019 Tio by Cisco and its ecosystem. Barker's >> Welcome Back. The Cuba's Live at Cisco Live, San Diego, California That's your sunny San Diego. I'm Lisa Martin and my co hostess day Volante. Dave and I are gonna be talking about Baraki with Tony Carmichael, product manager A P I and developer platforms from San Francisco Muraki Tony, welcome. >> Yeah, Thank you. I'm super happy to be here. >> So you were in this really cool Muraki T shirt. I got that work and get one of those. >> We can get one >> for you for sure. Right. This is Muraki. Take over. Our here in the definite zone. This definite zone has been jam packed yesterday. All day Today, people are excited talking a little bit about what Muraki is. And let's talk about what the takeover isn't. What people are having the chance to learn right now. >> Sure. Yes. Oma Rocky, founded in two thousand six. I can't believe it's been over 10 years now. Way really started with the mission of simplifying technology, simplifying it, making it easy to manage and doing so through a cloud managed network. So that's really what Muraki was founded. And then, in 2012 Iraqi was acquired by Cisco. So we continue to grow, you know, triple digit, double digit growth every single year on, we've expanded the portfolio. Now we've got wireless way. Actually, just announced WiFi six capabilities. We got switching. We've got security appliances, we've got video cameras and then on top of all of that, we've got a platform to manage it so you can go in. And if you're in it, it's all about. Is it connected? Is it online? And if there's a problem solving it quickly, right And so that's why we're really here, a deb net and doing the take over because we're seeing this transition in the industry where you know, really is more about being able to just get the job done and work smart, not hard on. And a lot of times AP eyes and having a really simple a platform to do that is paramount, right? So that's what we're talking about here and the takeover. Just answer. The other question is on our here, where we just basically everything is Muraki, right? So we're doing training sessions were doing labs reading education and some fun, too. So reading social media and we've got beers. If you want to come up and have a beer with us as well, >> all right, hit the definite is on for that. >> So how does how does WiFi six effect, for example, what you guys are doing it. Muraki. >> Yeah, so that's a That's a really great question. So WiFi six means, you know, faster and more reliable, right? That is fundamentally what it's all about now. WiFi over the years has very quickly transitioned from, like, nice tohave. Teo, You know, you and I check into our hotel, and within seconds we want to be online talking to our family, right? So it's no longer best efforts must have, whether it's in a hospital, hotel or in office environment. WiFi six ads. You know a lot of new features and functionality, and this is true from Rocky for Cisco at large, and it's all about speed and reliability right now on the developer side. And this is a lot of what we're talking about here. A definite it also opens up completely new potential opportunities for developers. So if you think about, You know, when you go to a concert, for example, and you see a crowd of 30,000 people and they're doing things like lighting up lanyards the plumbing, right? The stuff making that tic is you know, it has to work at scale with 30,000 people or more, and that's all being delivered through WiFi technology. So it opens up not just the potential for us, maybe as as concertgoers, but for the developer being able to do really, really cool things for tech in real time. >> So you talked about a simplification, was kind of a mission of the company when it started, and it had some serious chops behind it. I think Sequoia Google was involved as well, right? So, anyway, were you able to our how have you affected complexity of security ableto Dr Simplification into that part of the stack? >> So that's a fantastic question. If you think about you know, this shift towards a cloud connected world not just for Muraki, but for for all devices, right, consumer ipads, iPhones and writhe thing that opens up from a security standpoint is that you have the ability from a zero day right, so you had a zero day vulnerability. You know, it gets reported to the vendor within seconds or minutes. You could roll out, uh, patch to that. Right, That is that is a very new kind of thing, right? And with Muraki, we've had a variety of vulnerabilities. We also work with the Talis T Mat Sisko who are, you know, they've got over 10 or 50 researchers worldwide that are finding these vulnerabilities proactively and again within, you know, certainly within a 24 hour period, because we've got that connectivity toe every single device around the globe. Customers now Khun rely on depend on us to get that patch out sometimes while they sleep right, which is really like it sounds nice. And it sounds great from a marketing standpoint, but it's really all right. We have retailers that, you know, they're running their business on this technology. They have to remain compliant. And any vulnerability like that, you've got to get it fixed right before it becomes a newsworthy, for example. >> So as networks have dramatically transformed changed as a cisco and the last you know, you can't name the number of years time we look at the demands of the network, the amount of data they mount. A video data being projected, you know, like 80% plus of data in 80 2022 is going to be video data. So in that construct of customers in any industry need to be able to get data from point A to point B across. You know, the proliferation of coyote devices edge core. How can Muraki be a facilitator of that network automation that's critical for businesses to do in order to be competitive? >> Yeah, so it's a fantastic question. I think it's something that's at the heart of what every I T operation is thinking about, right? You hear about, you know, digitization. What does that mean? It means supporting the business and whatever things, whatever they're trying to do. And a lot of times nowadays, it is video. It's being able to connect in real time with a team that's maybe working across the globe now to get right to your question. There's two things that that Muraki is delivering on that really enables it teams right to deliver on that promise or that really it's more an expectation, right? The first you know, we've got a serious of technologies, including rst one product. That a lot for you to really get the most efficient, effective use out of your win connectivity, right? So being able to bring in broadband, bringing whatever circuits you can get ahold of and then do you know application delivery that is just reliable in dependable Catskill? Thie. Other aspect to this is giving data and insights to the teams that are responsible, reliable for that delivery. And this is where ap isa Really, Really. You know, it's really at the heart of all of this because if you're operating more than, say, 50 sites, right, there's lots of beautiful ways that we can visualize this right, and we can, you know, add reports that give you top 10. But the thing is, depending on your business, depending on your industry, different things they're gonna matter. So this is where Iraqi is investing in an open platform and making it super easy to run system wide reports and queries on you know which sites were slow, which sites were fast, prioritizing the ones that really needs some love right? And giving data back to the teams that have those Big Harry questions that need to get answered. Whether it's you know, you're C suite that saying Are we out of the way or just a really proactive team? That's just trying to make sure that the employees experiences good. >> What about some of the cool tools you guys are doing? Like talking about them Iraqi camera? >> Oh, yeah. I mean, so the other thing I was thinking of when you asked about this was, you know, video as a delivery medium. Of course it's necessary when you're doing, you know, video conference saying and things like that. But when we look at, say, the Muraki M V, which is really our latest product innovation, it's really us kind of taking the architecture of, ah, typical videos, surveillance system and flipping on its head, making it really easy to deploy Really simple, no matter where in the world you are to connect and see that video footage right? The other thing we're learning, though, is that why do people watch video surveillance? Either You're responding to an incident, right? So someone tripped and fell. There was an incident. Someone stole someone or someone sold something, or you're just trying to understand behavioral patterns. So when it comes to video, it's not always about the raw footage. It's really about extracting what we often call like metadata, right? So them rocky envy Some of the really cool innovations happening on that product right now are giving customers the end state visualization. Whether that's show me all the people in real time in the in the frame, give me a count of how many people visited this frame in the last hour. Right? So imagine we have cameras all over. We want to know what those what those trends and peaks and valleys look like rate. That's actually what we're after. No one wants to sit there looking at a screen counting people s. So this is where we're starting to see this total shift in how video can be analyzed and used for business purposes >> are able to detect anomalies. You're basically using analytics. Okay. Show me when something changes. >> That's right. Right. And we've seen some incredibly cool things being built with our FBI. So we've got a cinema, a really large customer, cinemas all over. And they're doing these immersive experiences where they're using the cameras. A sensor on DH. There saying, OK, when there's more than a handful of people. So we've got kind of a crowding within the communal spaces of the cinema Changed the digital sign Ege, right? Make it a really immersive experience. Now, they didn't buy the cameras for that. They bought the cameras for security, right? But why not? Also, then two birds, one stone, right? Use that investment and use it as a data sensor. Feed that in and make it completely new experience for people in the environment. >> Well, I couldn't so I can see the use case to excuse me for for, like, security a large venue. Oh, yeah. Big time >> infected. Thank you de mode along that front >> easy. And Mandy >> dio definite create where there wasa like a stalker. Yeah, where there was, like, a soccer match. And they're showing this footage and asking everyone What did you see happen? You know, a few seconds and actually what they did was using Iraqi. They were able to zero in on a fight that was breaking out, alert the then use security team and dispatch them within a very short period of time. >> Yeah, and we've seen like there's amazing there's tons of use cases. But that's a great example where you've got large crowds really dynamic environment, and you're not again. You don't want to necessarily have to have folks just looking at that feed waiting for something to happen. You want an intelligence system that can tell you when something happens? Right? So we've seen a ton of really cool use cases being built on. We're gonna continue to invest in those open AP eyes so that our customer, you know, we can move at the speed of our customers, right? Because I'm a rocky like, ultimately, our mission is like, simple i t. There's different layers of simple, Like what matters to a customer is like getting what they need to get done. Done. Um, we want way. Want to really be ableto enable them to innovate quickly. Ap eyes really are the center of that. >> Yeah, and so talk a little bit more about your relationship with definite how you fit in to that on the symbiotic. You know, nature. Yeah, Iraqi and definite. >> I would love to. So we've been working with with Suzie and the and the definite team now for really, since the start of definite, and I think it's brilliant, right? Because Sisko were, of course, like from a networking standpoint, we're always at the forefront. But what we started to see early on and I certainly wasn't the visionary here was this transition from, you know, just just like your core. Quintessential networking tio starting toe like Bring together Your network stack with the ability is also right and rapidly developed applications. So that was kind of the, you know, the precipice of Like Bringing Together and founding Dev. Net. And we've been with definite sense, which which, you know, it's been exciting. It's also really influence where our direction right? Because it's a lot for us to see what our customers trying to dio, How are they trying to do it? And how can we, from the product side, enable that three FBI's but then work with Dev Net to actually bring, you know, bring That's a life. So we've got, you know, developer evangelists working with customers. We've got solution architects, working with customers, building incredibly cool things and then putting it back out into the open source community, building that community. I mean, that is really where we've had in a maze. Amazing relationship with definite rate that that has been huge. Like we've seen our adoption and usage just absolutely shoot through the roof. We're at 45,000,000 requests per day on DH. Straight up, like could have been done without >> having that visions. Amazing. We have Susie on in a minute. But I mean, I >> Why do you think >> other sort of traditional companies, you know in the computer business haven't created something similar? I mean, seems like Cisco has figured out Debs and traditional hardware companies haven't so >> It's a really good question, like at the end of the day, it's an investment, right? Like I think a lot of companies like they tend to be quite tactical. Um, and look at okay, like maybe here we are now and here's where we're going. But it's an investment, and customers really say OK, this is the thing that they're trying accomplish, and we're not going to keep it closed and closed source and try to develop intellectual property. We're going to enable and empower on ecosystem to do that. Now I think like you're quickly starting to see this trend, right? Like certainly I wouldn't say that Muraki or Cisco are the only ones that are doing this, which is this, you know, cultivation of technology partners that are building turnkey solutions for customers. You know, cultivation of customers and enabling them to be able to build. And you create things that perhaps Cisco might not even ever think about. But But that is a shift in mentality, I think right, and I think like we're starting to see this more in the industry. But I am proud to say that like we were right on that bleeding edge and now we're able to ride that wave. Iraqis also had the luxury of being cloud native for a cloud board. It's our technology has always been, you know, at a place where if we want to deploy or create a new a p i n point that provides new data like literally, the team behind me can take that from prototype to production to test it into a customer within weeks on. And that is in many cases, what we're doing. >> It seems to me looking kind of alluding to Dave's point from a Cisco overall perspective, a company that has been doing customer partner events for 30 years. What started this networker? We now notices go live a large organization. Large organizations are not historically known for pivoting quickly or necessarily being developer friendly to this. Seems to me what definite has generated in just five short years seems to be a competitive differentiator that Cisco should be leveraging because it's it's truly developer family. >> I could not agree more. I mean the and this goes right to the core of what, uh What I think has made us so successful, Which is this, you know, this idea that at the heart of everything we do, we have to think about not just the customer experience right, which is like, What does it look like toe by what does look like toe unbox? What does it look like to install and what his day to look like? But also, and very importantly, distinct track around thinking about developer experience, developer experience like when your first building AP eyes and things like it's easy to say. OK, this is what they need. This is what they want. But Cisco, and really definite more than anything, has gotten to the heart of way have to think about the way these AP eyes look, the way they shape of their responses, the data they contain, the ease of use, the scale at which they operate and how easy it is to actually build on that. Right? So that's where you're going to start seeing more and more of our kind of S, T K's and libraries and just a lot of like we just this week launched the automation exchange that is again right at the center of We're listening. And we're not just listening to the customers who are trying to deploy 4,000 sites in a in a month or two. Um, we're also listening to the developers and what the challenge is that they're facing, right? Um, I'd love to see more of this. I mean, we're seeing a huge amount of adoption across Cisco. Um, and I think that there's other you know, there's plenty about their tech companies, you know that are that are really, I think, just helping push this forward right. Adding momentum to it. >> Speaking of momentum in the Iraqi momentum's going that way. I >> mean, it's good. Yeah, I would agree with you. >> Well, Tony, it's been a pleasure having you on the program. Absolutely. Success. Were excited to talk to Susie next. And it's like this unlimited possibilities zone here. Thank you so much for your time. >> Absolutely thanks so much Happy to be here. >> Alright for David Dante, I am Lisa Martin. You're watching the Cube live from Cisco Live San Diego. Thanks for watching.
SUMMARY :
Live from San Diego, California It's the queue covering Dave and I are gonna be talking about Baraki with Tony Carmichael, product manager A P I and I'm super happy to be here. So you were in this really cool Muraki T shirt. What people are having the chance to learn right now. a deb net and doing the take over because we're seeing this transition in the industry where you know, what you guys are doing it. So WiFi six means, you know, faster and more reliable, So you talked about a simplification, was kind of a mission of the company when it started, and again within, you know, certainly within a 24 hour period, because we've got that connectivity the last you know, you can't name the number of years time we look at the demands So being able to bring in broadband, bringing whatever circuits you can get ahold of and I mean, so the other thing I was thinking of when you asked about this was, you know, are able to detect anomalies. So we've got kind of a crowding within the communal spaces of the cinema Changed the digital sign Well, I couldn't so I can see the use case to excuse me for for, like, security a large venue. Thank you de mode along that front And Mandy And they're showing this footage and asking everyone What did you see happen? We're gonna continue to invest in those open AP eyes so that our customer, you know, we can move at the speed of our Yeah, and so talk a little bit more about your relationship with definite how you fit in to that on So that was kind of the, you know, the precipice of Like Bringing Together and founding But I mean, I or Cisco are the only ones that are doing this, which is this, you know, cultivation of Seems to me what definite has generated I mean the and this goes right to the core of what, Speaking of momentum in the Iraqi momentum's going that way. Yeah, I would agree with you. Well, Tony, it's been a pleasure having you on the program. Alright for David Dante, I am Lisa Martin.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
David Dante | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
Tony | PERSON | 0.99+ |
Tony Carmichael | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
Susie | PERSON | 0.99+ |
Cisco | ORGANIZATION | 0.99+ |
4,000 sites | QUANTITY | 0.99+ |
FBI | ORGANIZATION | 0.99+ |
San Diego, California | LOCATION | 0.99+ |
30 years | QUANTITY | 0.99+ |
Muraki | ORGANIZATION | 0.99+ |
2012 | DATE | 0.99+ |
30,000 people | QUANTITY | 0.99+ |
San Diego | LOCATION | 0.99+ |
Teo | PERSON | 0.99+ |
zero day | QUANTITY | 0.99+ |
one stone | QUANTITY | 0.99+ |
50 sites | QUANTITY | 0.99+ |
two birds | QUANTITY | 0.99+ |
five short years | QUANTITY | 0.99+ |
24 hour | QUANTITY | 0.99+ |
iPhones | COMMERCIAL_ITEM | 0.99+ |
Oma Rocky | PERSON | 0.99+ |
yesterday | DATE | 0.99+ |
Suzie | PERSON | 0.99+ |
two things | QUANTITY | 0.99+ |
ipads | COMMERCIAL_ITEM | 0.98+ |
30,000 people | QUANTITY | 0.98+ |
San Francisco | LOCATION | 0.98+ |
Sisko | PERSON | 0.98+ |
two | QUANTITY | 0.98+ |
Rocky | ORGANIZATION | 0.98+ |
50 researchers | QUANTITY | 0.97+ |
Muraki | PERSON | 0.97+ |
over 10 years | QUANTITY | 0.97+ |
San Diego, California | LOCATION | 0.97+ |
first | QUANTITY | 0.97+ |
this week | DATE | 0.97+ |
cisco | ORGANIZATION | 0.96+ |
over 10 | QUANTITY | 0.95+ |
two thousand | QUANTITY | 0.95+ |
Today | DATE | 0.94+ |
Meraki | PERSON | 0.93+ |
a month | QUANTITY | 0.92+ |
Khun | ORGANIZATION | 0.92+ |
more than a handful of people | QUANTITY | 0.9+ |
three | QUANTITY | 0.9+ |
Baraki | PERSON | 0.89+ |
80% plus | QUANTITY | 0.88+ |
45,000,000 requests | QUANTITY | 0.87+ |
one product | QUANTITY | 0.85+ |
one | QUANTITY | 0.85+ |
Iraqi | OTHER | 0.84+ |
Mandy | PERSON | 0.84+ |
WiFi six | OTHER | 0.83+ |
US | LOCATION | 0.83+ |
Muraki M | ORGANIZATION | 0.82+ |
Dev. Net | ORGANIZATION | 0.81+ |
Sequoia Google | ORGANIZATION | 0.8+ |
A P I | ORGANIZATION | 0.8+ |
tons of use cases | QUANTITY | 0.79+ |
top 10 | QUANTITY | 0.79+ |
Cisco Live | EVENT | 0.79+ |
Iraqi | LOCATION | 0.79+ |
every single year | QUANTITY | 0.79+ |
2019 | DATE | 0.78+ |
Dev Net | ORGANIZATION | 0.78+ |
Talis T Mat | ORGANIZATION | 0.76+ |
six | QUANTITY | 0.75+ |
Live | EVENT | 0.75+ |
Iraqis | PERSON | 0.72+ |
single device | QUANTITY | 0.71+ |
General Keith Alexander, Former Director of the NSA | AWS Public Sector Summit 2019
(upbeat music) >> Live, from Washington DC. It's theCUBE. Covering AWS Public Sector Summit. Brought to you by Amazon Web Services. >> Welcome back everyone to theCUBE's live coverage of the AWS Public Sector Summit here in Washington DC. I'm your host Rebecca Knight, co-hosting alongside of John Furrier. We are excited to welcome to the program, General Keith Alexander former NSA Director, the first Commander to lead the US Cyber Command, Four-star General with a 40 year career. Thank you so much for coming theCUBE, we are honored, we are honored to have you. >> It is an honor to be here. Thank you. >> So let's talk about cyber threats. Let's start there and have you just give us your observations, your thoughts on what are the most pressing cyber threats that keep you up at night? >> Well, so, when you think about threats, you think about Nation States, so you can go to Iran, Russia, China, North Korea. And then you think about criminal threats, well all the things like ransomware. Some of the Nation State actors are also criminals at night so they can use Nation State tools. And my concern about all the evolution of cyber-threats, is that the attacks are getting more destructive, the malware has more legs with worms and the impact on our commercial sector and our nation, increasingly bigger. So you have all those from cyber. And then I think the biggest impact to our country is the theft of intellectual property, right. That's our future. So you look out on this floor here, think about all the technical talent. Now imagine that every idea that we have, somebody else is stealing, making a product out of it, competing with us, and beating us. That's kind of what Huawei did, taking CISCO code to make Huawei, and now they're racing down that road. So we have a couple of big issues here to solve, protect our future, that intellectual property, stop the theft of money and other ideas, and protect our nation. So when you think about cyber, that's what I think about going to. Often times I'll talk about the Nation State threat. The most prevalent threats is this criminal threat and the most, I think, right now, important for us strategically is the theft of intellectual property. >> So why don't we just have a digital force to counter all this? Why doesn't, you know, we take the same approach we did when we, you know, we celebrated the 75th anniversary D-day, okay, World War II, okay, that was just recently in the news. That's a physical war, okay. We have a digital war happening whether you call it or not. I think it is, personally my opinion. I think it is. You're seeing the misinformation campaigns, financial institutions leaving England, like it's nobody's business. I mean it crippled the entire UK, that like a big hack. Who knows? But its happening digitally. Where's the forces? Is that Cyber Command? What do you do? >> So that's Cyber Command. You bring out an important issue. And protecting the nation, the reason we set up Cyber Command not just to get me promoted, but that was a good outcome. (laughing) But it was actually how do we defend the country? How do we defend ourselves in cyber? So you need a force to do it. So you're right, you need a force. That force is Cyber Command. There's an issue though. Cyber Command cannot see today, attacks on our country. So they're left to try to go after the offense, but all the offense has to do is hit over here. They're looking at these sets of targets. They don't see the attacks. So they wouldn't have seen the attack on Sony. They don't see these devastating attacks. They don't see the thefts. So the real solution to what you bring up is make it visible, make it so our nation can defend itself from cyber by seeing the attacks that are hitting us. That should help us protect companies in sectors and help us share that information. It has to be at speed. So we talk about sharing, but it's senseless for me to send you for air traffic control, a letter, that a plane is located overhead. You get it in the mail seven days later, you think, well-- >> Too late. >> That's too late. >> Or fighting blindfolded. >> That's right. >> I mean-- >> So you can't do either. And so what it gets you to, is we have to create the new norm for visibility in cyber space. This does a whole host of things and you were good to bring out, it's also fake news. It's also deception. It's all these other things that are going on. We have to make that visible. >> How do you do that, though? >> What do you do? I do that. (laughing) So the way you do it, I think, is start at the beginning. What's happening to the network? So, on building a defensible framework, you've got to be able to see the attacks. Not what you expect, but all the attacks. So that's anomaly detection. So that's one of the things we have to do. And then you have to share that at network speed. And then you have to have a machine-learning expert system AI to help you go at the speeds the attacker's going to go at. On fake-news, this is a big problem. >> Yeah. >> You know. This has, been throughout time. Somebody pointed out about, you know, George Washington, right, seven fake letters, written to say, "Oh no, I think the King's good." He never wrote that. And the reason that countries do it, like Russia, in the elections, is to change something to more beneficial for them. Or at least what they believe is more beneficial. It is interesting, MIT has done some studies, so I've heard, on this. And that people are 70% more like to re-Tweet, re-Tweet fake news than they are the facts. So. >> Because it's more sensational, because it's-- >> That's food. It's good for you, in a way. But it's tasty. >> Look at this. It's kind of something that you want to talk about. "Can you believe what these guys are doing? "That's outrageous, retweet." >> Not true. >> Not true. Oh, yeah, but it makes me mad just thinking about it. >> Right, right. >> And so, you get people going, and you think, You know, it's like going into a bar and you know, you go to him, "He thinks you're ugly." and you go to me, and you go, "He thinks you're ugly." (laughs) And so we get going and you started it and we didn't even talk. >> Right, right. >> And so that's what Russia does. >> At scale too. >> At scale. >> At the scale point. >> So part of the solution to that is understanding where information is coming from, being able to see the see the environment like you do the physical environment at speed. I think step one, if I were to pick out the logical sequence of what'll happen, we'll get to a defensible architecture over the next year or two. We're already starting to see that with other sectors, so I think we can get there. As soon as you do that, now you're into, how do I know that this news is real. It's kind of like a block-chain for facts. How do we now do that in this way. We've got to figure that out. >> We're doing our part there. But I want to get back to this topic of infrastructure, because digital, okay, there's roads, there's digital roads, there's packets moving round. You mentioned Huawei ripping off CISCO, which takes their R and D and puts it in their pockets. They have to get that. But we let fake news and other things, you've got payload, content or payload, and then you've got infrastructure distribution. Right, so, we're getting at here as that there are literally roads and bridges and digital construction apparatus, infrastructure, that needs to be understood, addressed, monitored, or reset, because you've had email that's been around for awhile. But these are new kinds of infrastructure, but the payload, malware, fake news, whatever it is. There's an interaction between payload and infrastructure. Your thoughts and reaction to that as a Commander, thinking about how to combat all this? >> I, my gut reaction, is that you're going to have to change, we will have to change, how we think about that. It's not any more roads and avenues in. It's all the environment. You know, it's like this whole thing. Now the whole world is opened up. It's like the Matrix. You open it up and there it is. It's everything. So what we have to do is think about is if it's everything, how do we now operate in a world where you have both truths and fiction? That's the harder problem. So that's where I say, if we solve the first problem, we're so far along in establishing perhaps the level so it raises us up to a level where we're now securing it, where we can begin to see now the ideas for the pedigree of information I think will come out. If you think about the amount of unique information created every year, there are digital videos that claim it's doubling every year or more. If that's true, that half of, 75% of it is fiction, we've got a big road to go. And you know there is a lot of fiction out there, so we've got to fix it. And the unfortunate part is both sides of that, both the fiction and the finding the fiction, has consequences because somebody says that "A wasn't true, "That person, you know, they're saying, he was a rapist, "he was a robber, he was a drugger," and then they find out it was all fake, but he still has that stigma. And then the person over here says, "See, they accused me of that. "They're out to get me in other areas. "They can exclaim what they want." >> But sometimes the person saying that is also a person who has a lot of power in our government, who is saying that it's fake news, when it's not fake news, or, you know what, I-- >> So that's part of the issue. >> It's a very different climate >> Some of it is fake. Some of it's not. And that's what makes it so difficult for the public. So you could say, "That piece was fake, "maybe not the other six." But the reality is, and I think this is where the media can really help. This is where you can help. How do we set up the facts? And I think that's the hardest part. >> It's the truth. >> Yeah, yeah. >> It's a data problem. And you know, we've talked about this off camera in the past. Data is critical for the systems to work. The visibility of the data. Having contextual data, the behavioral data. This gets a lot of the consequences. There's real consequences to this one. Theft, IP, freedom, lives. My son was video-gaming the other day and I could hear his friends all talking, "What's your ping start word? "What's your ping time? "I got lag, I'm dead." And this is a video game. Military, lagging, is not a game. People are losing their lives, potentially if they don't have the right tactical edge, access to technology. I know this is near and dear to your heart. I want to get your reaction. The Department of Defense is deploying strategies to make our military in the field, which represents 85% infantry, I believe, some statistic around that number, is relying on equipment. Technology can help, you know, that. Your thoughts on, the same direction. >> Going to the Cloud. Their effort to go to the Cloud is a great step forward, because it addresses just what you're saying. You know, everybody used to have their own data centers. But a data center has a fixed amount of computational capability. Once you reach it, you have to get another data center, or you just live with what you've got. In the Cloud if the problem's bigger, elasticity. Just add more corridors. And you can do things now that we could never do before. Perhaps even more importantly, you can make the Clouds global. And you can see around the world. Now you're talking about encrypted data. You're talking about ensuring that you have a level of encryption that you need, accesses and stuff. For mobile forces, that's the future. You don't carry a data center around with an infantry battalion. So you want that elasticity and you need the connectivity and you need the training to go with it. And the training gets you to what we were just talking about. When somebody serves up something wrong, and this happened to me in combat, in Desert Storm. We were launched on, everybody was getting ready to launch on something, and I said, "This doesn't sound right." And I told the Division Commander, "I don't agree. "I think this is crazy. "The Iraqis are not attacking us down this line. "I think it's old news. "I think somebody's taken an old report that we had "and re-read it and said oh my God, they're coming." And when we found out that was a JSTARS, remember how the JSTARS MTI thing would off of a wire, would look like a convoy. And that's what it was. So you have to have both. >> So you were on the cusp of an attack, deploying troops. >> That's right. >> On fake information, or misinformation, not accurate-- >> Old information. >> Old information. >> Old information. >> Old, fake, it's all not relevant. >> Well what happens is somebody interprets that to be true. So it gets back to you, how do you interpret the information? So there's training. It's a healthy dose of skepticism, you know. There are aliens in this room. Well, maybe not. (laughing) >> As far as we know. >> That's what everybody. >> But what a fascinating anecdote that you just told, about being in Desert Storm and having this report come and you saying, "Guys, this doesn't sound right." I mean, how often do you harken back to your experience in the military and when you were actually in combat, versus what you are doing today in terms of thinking about these threats? >> A lot. Because in the military, when you have troops in danger your first thought is how can I do more, how can I do better, what can I do to get them the intelligence they need? And you can innovate, and pressure is great innovator. (crunching sound) And it was amazing. And our Division Commander, General Griffith, was all into that. He said, "I trust you. "Do whatever you want." And we, it was amazing. So, I think that's a good thing. Note that when you go back and look at military campaigns, there's always this thing, the victor writes the history. (laughing) So you know, hopefully, the victor will write the truthful history. But that's not always the case. Sometimes history is re-written to be more like what they would like it to be. So, this fake news isn't new. This is something where I think journalists, historians, and others, can come together and say, "You know, that don't make sense. "Let's get the facts." >> But there's so much pressure on journalists today in this 24-hour news cycle, where you're not only expected to write the story, but you're expected to be Tweeting about it, or do a podcast about it later, to get that first draft of history right. >> So it may be part of that is as the reporter is saying it, step back and say, "Here's what we've been told." You know, we used to call those a certain type of sandwich, not a good-- (laughing) If memory serves it's a sandwich. One of these sandwiches. You're getting fed that, you're thinking, "You know, this doesn't make sense. "This time and day that this would occur." "So while we've heard this report. "It's sensational. "We need to go with the facts." And that's one of the areas that I think we really got to work. >> Journalism's changing too. I can tell you, from we've talked, data drives us. We've no advertising. Completely different model. In-depth interviews. The truth is out there. The key is how do you get the truth in context to real-time information for those right opportunities. Well, I want to get before we go, and thanks for coming on, and spending the time, General, I really appreciate it. Your company that you've formed, IronNet, okay, you're applying a lot of your discipline and knowledge in military cyber and cutting-edge tech. Tell us about your company. >> So one of the things that you, we brought up, and discussed here. When I had Cyber Command, one of the frustrations that I discussed with both Secretary Gates and Secretary Panetta, we can't see attacks on our country. And that's the commercial sector needs to help go fix that. The government can't fix that. So my thought was now that I'm in the commercial sector, I'll help fix the ability to see attacks on the commercial sector so we can share it with the government. What that entails is creating a behavioral analytic system that creates events, anomalies, an expert system with machine-learning and AI, that helps you understand what's going on and the ability to correlate and then give that to the government, so they can see that picture, so they have a chance of defending our country. So step one is doing that. Now, truth and lending, it's a lot harder than I thought it would be. (laughing) You know, I had this great saying, "Nothing is too hard "for those of us who don't have to do it." "How hard can this be?" Those were two of my favorite sayings. Now that I have to do it, I can say that it's hard, but it's doable. We can do this. And it's going to take some time. We are getting traction. The energy sector has been great to work with in this area. I think within a year, what we deploy with the companies, and what we push up to the Cloud and the ability to now start sharing that with government will change the way we think about cyber security. I think it's a disruptor. And we have to do that because that's the way they're going to attack us, with AI. We have to have a fast system to defend. >> I know you got to go, tight schedule here, but I want to get one quick question in. I know you're not a policy, you know, wonk, as they say, or expert. Well, you probably are an expert on policy, but if we can get a re-do on reshaping policy to enable these hard problems to be solved by entrepreneurs like yourself expertise that are coming into the space, quickly, with ideas to solve these big problems, whether it's fake news or understanding attacks. What do the policy makers need to do? Is it get out of the way? Do they rip up everything? Do they reshape it? What's your vision on this? What's your opinion? >> I think and I think the acting Secretary of Defense is taking this on and others. We've got to have a way of quickly going, this technology changes every two years or better. Our acquisition cycle is in many years. Continue to streamline the acquisition process. Break through that. Trust that the military and civilian leaders will do the right thing. Hold 'em accountable. You know, making the mistake, Amazon, Jeff Bezos, says a great thing, "Go quickly to failure so we can get "to success." And we in the military say, "If you fail, you're a dummy." No, no, try it. If it doesn't work, go on to success. So don't crush somebody because they failed, because they're going to succeed at some point. Try and try again. Persevere. The, so, I think a couple of things, ensure we fix the acquisition process. Streamline it. And allow Commanders and thought leaders the flexibility and agility to bring in the technology and ideas we need to make this a better military, a better intelligence community, and a better country. We can do this. >> All right. All right, I'm thinking Rosie the Riveter. We can do this. (laughing) >> We can do it. Just did it. >> General Alexander, thank you so much for coming on the show. >> Thank you. >> I'm Rebecca Knight for John Furrier. Stay tuned for more of theCUBE. (electronic music)
SUMMARY :
Brought to you by Amazon Web Services. the first Commander to It is an honor to be here. that keep you up at night? is that the attacks are we did when we, you know, So the real solution to what you bring up And so what it gets you to, So the way you do it, I think, And the reason that countries do it, But it's tasty. you want to talk about. mad just thinking about it. And so we get going and you started it So part of the solution that needs to be understood, And the unfortunate part This is where you can help. Data is critical for the systems to work. And the training gets you to what So you were on the cusp of interprets that to be true. anecdote that you just told, Note that when you go back and to get that first draft of history right. And that's one of the areas and spending the time, General, Cloud and the ability to now What do the policy makers need to do? Trust that the military We can do this. We can do it. for coming on the show. I'm Rebecca Knight for John Furrier.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
George Washington | PERSON | 0.99+ |
Rebecca Knight | PERSON | 0.99+ |
Amazon Web Services | ORGANIZATION | 0.99+ |
Huawei | ORGANIZATION | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Jeff Bezos | PERSON | 0.99+ |
Washington DC | LOCATION | 0.99+ |
MIT | ORGANIZATION | 0.99+ |
Sony | ORGANIZATION | 0.99+ |
40 year | QUANTITY | 0.99+ |
CISCO | ORGANIZATION | 0.99+ |
Rosie the Riveter | PERSON | 0.99+ |
24-hour | QUANTITY | 0.99+ |
NSA | ORGANIZATION | 0.99+ |
six | QUANTITY | 0.99+ |
both sides | QUANTITY | 0.99+ |
World War II | EVENT | 0.99+ |
IronNet | ORGANIZATION | 0.99+ |
both | QUANTITY | 0.99+ |
John Furrier | PERSON | 0.99+ |
Department of Defense | ORGANIZATION | 0.99+ |
seven fake letters | QUANTITY | 0.99+ |
first thought | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
Four-star | QUANTITY | 0.99+ |
first problem | QUANTITY | 0.99+ |
seven days later | DATE | 0.99+ |
Keith Alexander | PERSON | 0.98+ |
Panetta | PERSON | 0.98+ |
75% | QUANTITY | 0.98+ |
England | LOCATION | 0.98+ |
AWS Public Sector Summit | EVENT | 0.98+ |
Alexander | PERSON | 0.97+ |
General | PERSON | 0.97+ |
Secretary | PERSON | 0.97+ |
one | QUANTITY | 0.96+ |
One | QUANTITY | 0.96+ |
Gates | PERSON | 0.95+ |
theCUBE | ORGANIZATION | 0.94+ |
85% infantry | QUANTITY | 0.94+ |
next year | DATE | 0.94+ |
North Korea | LOCATION | 0.93+ |
D-day | EVENT | 0.93+ |
Griffith | PERSON | 0.93+ |
AWS Public Sector Summit | EVENT | 0.92+ |
Iran | LOCATION | 0.92+ |
UK | LOCATION | 0.92+ |
AWS Public Sector Summit 2019 | EVENT | 0.92+ |
75th anniversary | QUANTITY | 0.91+ |
first draft | QUANTITY | 0.91+ |
Russia | ORGANIZATION | 0.9+ |
US | ORGANIZATION | 0.89+ |
a year | QUANTITY | 0.88+ |
China | LOCATION | 0.86+ |
Desert Storm | TITLE | 0.85+ |
Russia | LOCATION | 0.85+ |
70% more | QUANTITY | 0.83+ |
Iraqis | PERSON | 0.83+ |
both truths | QUANTITY | 0.81+ |
two years | QUANTITY | 0.8+ |
doubling | QUANTITY | 0.79+ |
step one | QUANTITY | 0.79+ |
Desert Storm | EVENT | 0.79+ |
two of my favorite sayings | QUANTITY | 0.77+ |
first Commander | QUANTITY | 0.74+ |
one quick question | QUANTITY | 0.72+ |
States | ORGANIZATION | 0.67+ |
every year | QUANTITY | 0.64+ |
half | QUANTITY | 0.63+ |
Division | PERSON | 0.61+ |
step | QUANTITY | 0.57+ |
Cloud | TITLE | 0.56+ |
two | DATE | 0.54+ |
theCUBE | EVENT | 0.49+ |
sandwiches | QUANTITY | 0.49+ |
JSTARS MTI | COMMERCIAL_ITEM | 0.48+ |
rson | PERSON | 0.45+ |
JSTARS | COMMERCIAL_ITEM | 0.45+ |