RestartWeek Puerto Rico: Exclusive Cube Video Report on Crypto and Blockchain 2018
hello everyone I'm Jean Faria we are reporting on the ground near Puerto Rico for blockchain unbound exclusive conversations at coinage end of covering all the action restart week of ten of events cryptocurrency blockchain all the people are here with the local ecosystem the cube is here it's great to have you on thanks for joining blockchain innovation is today global this is a revolution way bigger than the Internet itself programmable money programmable contracts that wipes out finance it wipes out legal it wipes out governance in many ways there's no central authority you have access to open source software it's fully connected so now is the time to make it translate we've all heard about the steam digital transformation its businesses that if they don't evolve and adopt blockchain AI all these other things they have a threat of being put out of business it is extremely competitive a new set of stakeholders investors global players governments are it's happening now you have a chance to be a part of an economy without a permission of a centralized organization have to pay 200 people in 40 countries and it's an unholy mess with withholding taxes and concerns around money transfer costs a hassle it's a nightmare like all currency control so you're only allowed to move a certain amount of capital out the country legally so what happens in all your backups our currency and you can effectively invest in assets around the world this is making it much easier to contribute to help people to get healthy and you don't have to go to school there's a very big influx of young and talented minds at that right and this is really changing the revolution landscape you've got the radical Burning Man hippie guy all the way to a three-piece suit yeah and that diversity is very very rich a lot of people are scared I like whoa hold on slow down we're not gonna prove it the other half saying no this is the future so you have two competing forces colliding for some reason crypto really pokes at people's biases you know why does it have any value and I go well why does the United States dollar have any value I mean you've got Full Faith and Credit of the government that's in debt by 20 trillion dollars you know is that a good idea most people that come here sorry with the what the how and people are scared but the young people are like yo this is happening this is not a moment this is a movement is definitely oh say 1996-97 of the internet bubble it's just starting people know there's something really magical they don't quite know what you know America really grew because you're abused to have all the controls and so the capital by sea left Europe and away in America and now it's happening 300 years later as America has all the controls and the capital starting to go away so a new Liberation's happening incredible resources are now being poured in problems that were ignored for many many and what is beautiful is that block Candy's doing it open-source is accelerating the tech these ideas are being freely shared whereas before there's bottlenecks in the collaboration aspect if we're able to write a contract in a thousand people be able to verify that contract and we're able to transfer money from one person to another without the two parties being involved we've got a perfect scenario security and speed and fairness all at the same time you can create these chains of trust and that can happen anywhere in the world you're on a level playing field if you have 4G connectivity now you can compete globally and be a part of the global economy so if you're someone who's in the emerging developing world and you want to begin to build wealth and you'd like to own a piece of first world real estate and today the minimum is about a thousand dollars but by implementing the Plott chain further they won't eventually get down to one dollar you can buy a piece of real estate and enjoy the returns on that I want to solve the wealth gap and I truly believe we can do it when we can allow anyone anywhere to invest in good quality assets a conduit with the current system there's too many friction costs the killer app right is money it's paying people that is the killer app of the block type right now let's say that money is software and it is software so if you buy something with a credit card what do you think's happening it's all software and what has happened is open-source software has always eventually won with respect to close source software so proprietary money is probably back on its heels because open-source money's coming in something like that will give liquidity to a lot of small business owners America is a country of small business owners across the globe it supports small business owners it's an interesting model yeah you don't have to give up any equity you don't have to give up any poor seats yeah right it's much leaner my super if you're an investor you gotta get a pound of flesh somewhere is it's just getting it on the discounted tokens is there a little liquidity going on when you think about you know private sale presale is 99% a token deal right although equities coming in because a lot of more venture capital is coming in and they're demanding a piece of the action from a company and equity perspective its equity might be future revenue sometimes as dividends or the opportunity get dividends so it's a combination of you have a preference you care you know at the other day equity is I was always preferable there is a provision in the 1934 Securities Act called section 12 G it allows us Spacely to go public by telling the SEC we're doing it without having to delay it to wait for their permission after 60 days it's a derivative so we'll continue to clear comments but but the thing is with tokens who knows how long that'll take I mean is the SEC gonna Shepherd something through with crypto 1 or do they gonna make it take 5 years I don't know [Music] all over the island this is the new Oliver field the world is moving too fast today for a big country to keep up it's all gonna happen now in this next century at the city level and so we work a lot with four smaller countries or small countries because I know estonia armenia baja rains got you know dubai envy so i mean every country wants to be the crypto country multiple small countries are going to come into the space which they know now they can get the capital flowing into that company and they're gonna allow their rules to be lacs they're gonna let capital flow through and then us will have to change or maybe UK will have to change orders against us will have to change in the first world a lot of what we're talking about is a nice-to-have it's it's sort of a bit of a game and if i can participate but where I come from an emerging war that's a necessity they are no other solutions so if you live in South Africa or China or India and you want to get your money into a first world country like England Australia America it's very very difficult and virtually no one can do it but it's a major problem because you want wealth preservation you want but Plan B you want your children to be able to go to a first world university etc etc etc Puerto Rico being a free associated States of the United States of America is like the best place to actually test this possibly some push for that for infrastructure for you know internet for all sorts of different things in terms of building the best infrastructure the new newest best-in-class for your business it's four percent corporate taxes and individual it's zero percent now that's what you got to move here you gotta move here okay but you don't have to give you deliver your US citizenship no taxes are great at the same time they fall in love with the islands so it's amazing because to me Puerto Rico is a combination of LA's whether San Francisco's open-mindedness and Barcelona's you know deep European history it's just a really beautiful place and it's US territory so it's a short hop and a jump to the States if you need to most people in America mainland sort of think they're going to a foreign country because it's treated that way by our government how do I come to Puerto Rico do it right not offend the culture in abil them together what's your experience with the play ball stay good friends lost their relocation services for their business and themselves so they write a big check to you guys for the service but it's you guide them through the entire process and there's real energy here because there's a social movement underneath the entire cryptocurrency movement and that's to basically help your fellow man or women all these activity is really going to give a a shot in the arm to the Puerto Rican economy and we're bringing our funds and we're bringing our advisory the radar Thank You exponent there the hurricane was a horrible atrocity that happened and now we have this blank canvas to create a vision for Puerto Rico so what we're doing is we're connecting every single University on the island to work on open source projects to like make solutions for the private sector they know that if they can buy power on a cellphone like they're already doing for other goods and services now we've got a game-changer this is restart week and one of the other things that we've done is help all of the conference's come together collaborate rather than compete so go into the same week and put all of these satellite groups around it and then we blanket it a week around it so that we had one place for people to go and look for all of the events and then also for some for them to understand a movement about the education piece it's very difficult for people that kind of get caught up to speed because there's some technical things that need to understand to really apply this technology into the business world the other day we had an event where we talked 50 people how to create a smart contract from scratch those are 50 people who are not the same anymore ecosystems developing yet entrepreneurs you got projects you got funding coming in but as it's gonna be a fight for the ecosystem because you can't have zillion ecosystems there are definitely some you know the galaxies and you know regulatory aspects that you know put some concerns and a lot of you know people's mind since its inception you've seen people and media and mainstream media in particular target Bitcoin and they're just adopting the government narrative saying oh everyone in this industry is corrupt Oh everyone in this industry is an ICS camera Oh everyone in this industry is a a drug runner and they have all selling drugs on the dark web and and it's like you know what like you can do some research and don't get better than that traditional media they want to take down everybody that they don't consider you know like a birds of the same feather there actually are a lot of scammers and a lot of like dark forces inside of the cryptocurrency movement so that's why I think we welcome kind of more regulatory influence because you know none of us want to see bad actors in the space we've seen folks go out raise you know really big about to capital with no product roadmap no business talking roadmap no real way to get from zero to X what are they trying to shoehorn a regular business onto the blockchain and just assume that by adding crypto at the end of you know toilet paper they're gonna get something I had another founder tell me that you know Mike tokens are worth 100 million humming yep you don't have a user you just have a product you're tokens I've hiked if you ask me it's it's what little I can tell my house is 100 million dollars it's only worth as much as the top buyer how much we really need hardcore reputation systems in our industry and in the for the world I think 2018 is going to be the year of clarity on regulation and I think that's where Puerto Rico comes in and plays a major role just to see the thousands of people who have come here to support these several conferences has been amazing my most surprising thing though is the amount of people that have told me that they bought a one-way ticket and have no intention of going home so to make Puerto Rico your home I think is a really amazing first step when I go to the supermarket and where I go it's full of American and people from outside and when you ask them where you're from and they will tell you from Puerto Rico this is gonna become the epicenter of this multi-billion dollar market we need to have people prepared for this you have to create the transparency the beauty of the transparency is there's actually privacy baked in and that's what I love about blockchain is it has all of the good things all communities need to evolve in my opinion between technology communities open networks of governance where we have peer-to-peer distribution of finance and of resources in a way that allows people to aggregate around the marketplaces that are actually benefitting the way that they believe the world should work we're going to be tools that far surpassed what's currently available in terms of the messages the websites all these things for 20 years the Internet has been free it's a really beautiful thing for consumption and open-source is the absolute right methodology for software when it comes to your own content a reward it makes sense everybody is going to get to play together across every device the developers are going to get rewarded for creating content people are going to be rewarded for creating things inside the games and the players are going to get rewarded for getting to the top levels of all the games and we're going to reward them through our cryptocurrency if we begin to own ourself sovereign identity then when we're owning our data that's the foundation for universal basic income communications completely frictionless payment completely frictionless and governance completely frictionless and we have to put this all together who wins here the average citizen entrepreneur that is leveraged citizen player that wants to start something whether it's a banking a service provider of some sort an entrepreneur or a new financial instrument or firm you all have greenfield opportunity here the first thing I would tell found us is to reach out ok this community is very very supportive like you can reach out to me you can reach out to other guys LinkedIn Facebook or come to these events and say your idea and you need help because you will need help you cannot run this alone ok you are running a company you're running your team have a good team that's the first thing you got to be vigilant and you keeping your money in a hard wallet not keeping your private keys on your computer if you're using a centralized system those centralized systems are really easily exploitable strategic partnerships Advisors founding team and then show the idea to the people explain yourself frankly and honestly and I think the community will reward you to go and find it ring whether you're a fortune 500 company or a startup it's all about building the community and I believe that whether it's utility Target or security or combination of the two it provides an incredible vehicle to ultimately be the catalyst to your community and if you the to community adding value then you're going to build a company event it's always gonna be led by the business model because you need something to act as the power pull to pull the thing along right and you can continuously pump capital into something but if the model is wrong it's just going to drain and it's going to go to inefficient systems and in the end maybe do some help but but a very small percentage of the capacity of what it could do then the advice would be to entrepreneurs don't fret about the infrastructure just nail your business models right and because the switching cost might not be as high as you think that's right we're in the old days when we grew up yeah you made a bad technology decision you're out of business yeah but the first advice that I give my clients is to stomp this is this business that's too much formal in it yeah right if you're missing out so no just because everybody's out there Nico you should be doing an SEO right yeah 46% of I SEOs have already failed already failed start with the business gather this in the counties down right so free cash flow unique value proposition Prada market fit what sits under business think about the token model right the token model has to go in handy now with your business model and revenue model and once you figure out that business and took the models now it's time to think about compliance I'm gonna raise money in the US and abroad I've decided to go to security choking hypothetical instance absolute what do I do is there for you an incentive mechanism or is a fundraising mechanism or both who's gonna be my user who's gonna use this token right there aren't gonna be moms dads hospitals they was my target and then how they're gonna use it and are they gonna hold it I'm gonna sell it are they gonna trade it so all these different things define that oh c'mon once you get your token actually authenticated realized everything's transparent and it gets on that secondary market it's better to use that to invest in anything you need investment get everybody incentivized around your token all your employees all your vendors everybody incentivize around that token it's a thousand percent more powerful than a dollar so the dollar doesn't go up in value in your token your token can go up and down and as soon as you find just one spark it blows up everybody boats rise equal it's pasta Sara Lee the time to crack open the champagne you still have to demonstrate product market fit you have to help build a market in our particular case so there's a lot of hard work launch it's a start line it's just like it's only a step along the whole process you know what made people get it you showed them the money yeah you showed them the money sometimes people don't you can explain these concepts that are world-changing super high level or whatever people were not actually gonna get it until it's useful to them average business people and senior business people who have typically been shut off to the idea of blockchain are now seeing this as very real and here to stay momentum is just beginning it's gonna be amazing what these guys come up with that's one of the things I love about doing this thing right I'm an old guy and I get to hang around these smart young people makes me feel young again yeah but the other thing that we have and I think you should share it as well as we have to offer to these young guys experience thing we just invented a new category in the ico category an advisor token and a you have to have the stomach for it and I think you just have to be as educated and as you can what government entity can resist for the long term something that's actually trying to provide a better and better and better financial infrastructure you should be able to participate in many different nations who have many different economies that are all really cooperating interdependently to create the best possible life for all human good one dollar will not change your life but if you change your habits you'll change your financial destiny and so my philosophy is get it to a dollar so that every single person can participate and once you start to learn good habits around money and wealth the rest it's a formula like it's a flywheel instead the world will become a better place we'll have better companies positive impact is not counter to profit they go hand in hand the Puerto Rico movement it's a movement while Czech entrepreneurs capital investors the pioneers in the blockchain decentralized Internet are all here this is like the Silicon Valley of the crypto right I think they're calling it crypto island yes TV show we should be honest like it's not lost its crypto island exclusive coverage for Puerto Rico's - Cuba I'm John Ferrari getting the signal here out of all the noise in the market this is what we do this is the cube mission great strip we start week Point agenda open content community thanks for watching [Music]
**Summary and Sentiment Analysis are not been shown because of improper transcript**
ENTITIES
Entity | Category | Confidence |
---|---|---|
Jean Faria | PERSON | 0.99+ |
Puerto Rico | LOCATION | 0.99+ |
Puerto Rico | LOCATION | 0.99+ |
China | LOCATION | 0.99+ |
99% | QUANTITY | 0.99+ |
America | LOCATION | 0.99+ |
South Africa | LOCATION | 0.99+ |
two parties | QUANTITY | 0.99+ |
India | LOCATION | 0.99+ |
one dollar | QUANTITY | 0.99+ |
100 million | QUANTITY | 0.99+ |
US | LOCATION | 0.99+ |
100 million dollars | QUANTITY | 0.99+ |
20 years | QUANTITY | 0.99+ |
2018 | DATE | 0.99+ |
John Ferrari | PERSON | 0.99+ |
5 years | QUANTITY | 0.99+ |
1934 Securities Act | TITLE | 0.99+ |
200 people | QUANTITY | 0.99+ |
40 countries | QUANTITY | 0.99+ |
20 trillion dollars | QUANTITY | 0.99+ |
46% | QUANTITY | 0.99+ |
Sara Lee | PERSON | 0.99+ |
zero percent | QUANTITY | 0.99+ |
thousands of people | QUANTITY | 0.99+ |
Puerto Rico | LOCATION | 0.99+ |
ORGANIZATION | 0.99+ | |
50 people | QUANTITY | 0.99+ |
four percent | QUANTITY | 0.99+ |
a week | QUANTITY | 0.99+ |
multi-billion dollar | QUANTITY | 0.99+ |
first advice | QUANTITY | 0.98+ |
50 people | QUANTITY | 0.98+ |
first step | QUANTITY | 0.98+ |
two | QUANTITY | 0.98+ |
SEC | ORGANIZATION | 0.98+ |
three-piece | QUANTITY | 0.98+ |
Europe | LOCATION | 0.98+ |
both | QUANTITY | 0.98+ |
first thing | QUANTITY | 0.97+ |
one-way ticket | QUANTITY | 0.97+ |
one person | QUANTITY | 0.97+ |
one place | QUANTITY | 0.97+ |
ORGANIZATION | 0.97+ | |
one dollar | QUANTITY | 0.97+ |
today | DATE | 0.96+ |
England | LOCATION | 0.96+ |
thousand people | QUANTITY | 0.96+ |
San Francisco | LOCATION | 0.95+ |
America | ORGANIZATION | 0.95+ |
next century | DATE | 0.95+ |
about a thousand dollars | QUANTITY | 0.95+ |
Prada | ORGANIZATION | 0.92+ |
four smaller countries | QUANTITY | 0.92+ |
United States of America | LOCATION | 0.91+ |
Barcelona | LOCATION | 0.91+ |
LA | LOCATION | 0.91+ |
300 years later | DATE | 0.91+ |
UK | ORGANIZATION | 0.91+ |
zillion ecosystems | QUANTITY | 0.9+ |
60 days | QUANTITY | 0.88+ |
one | QUANTITY | 0.88+ |
Australia | LOCATION | 0.88+ |
two competing forces | QUANTITY | 0.88+ |
every single person | QUANTITY | 0.87+ |
United States | LOCATION | 0.87+ |
Silicon Valley | LOCATION | 0.84+ |
first world | QUANTITY | 0.83+ |
things | QUANTITY | 0.81+ |
Mike | PERSON | 0.81+ |
a lot of people | QUANTITY | 0.8+ |
Cuba | LOCATION | 0.8+ |
lot of scammers | QUANTITY | 0.79+ |
Czech | OTHER | 0.79+ |
Burning Man | TITLE | 0.79+ |
Puerto Rico movement | EVENT | 0.78+ |
estonia | LOCATION | 0.78+ |
ten | QUANTITY | 0.78+ |
first | QUANTITY | 0.78+ |
G | OTHER | 0.77+ |
one of | QUANTITY | 0.76+ |
armenia | LOCATION | 0.75+ |
Candy | PERSON | 0.75+ |
Damaris Rivera, Puerto Rico Advantage | Blockchain Unbound 2018
>> Narrator: Live from San Juan, Puerto Rico, it's theCube. Covering Blockchain Unbound, brought you to by Blockchain Industries. (upbeat Latin Music) >> Hello everyone welcome back to our our exclusive coverage, theCube in Puerto Rico for the big story about Blockchain UnBound. That's the event it's a global conference from investors, bitcoin billionaires and millionaires, as well as entrepreneurs coming to Puerto Rico to discuss the future of Blockchain, the future cryptocurrency, the future of decentral application. Partnering with the island of Puerto Rico, our next guest is Damarius Riviera with Puerto Rico Advantage. And the big story is a lot of people are moving here for either tax advantages or entrepreneurial reasons and Damarius and her team at the Puerto Rico Advantage help set that up. Damarius, welcome to theCube. >> Hola, how are you? >> Thanks for coming on. >> Thanks. >> One of the big rush here is like a gold rush for folks coming in, moving to Puerto Rico but it's hard. You guys provide a service to do that for folks. How fast is it, how does it work? How does the service work? Okay, we're Puerto Rico Advantage came together as me, I'm a local from Puerto Rico and my partners are American from Wisconsin. They're both Act 20 and Act 22 themselves. So when they got here to the island, they took like seven months to find out the opportunity analysis and if the tax incentives work for them. So when they met me, I worked previously in the government before so I know how all of this works and I said let's come with one business that will be a one stop for each client. So when they come to us they get their grants, plus the relocation services for their business and themselves. >> Certainly the incentives right now are really wonderful for business and folks who are building companies and creating wealth. The tax advantages are here. There's been a surge of people coming here. What's it like? What's, how many people are coming through? Was it a lot of volume? You guys busy? Give us some insight into how it's working. >> Yes, a lot of people are coming. They're moving real estate pretty much in San Juan area. It's gone, so the other places like Dorado and Rincon are packed. When I go to the supermarket, everywhere I go it's full of American and people from upstate. And when you ask them where you're from and they will tell you from Puerto Rico. They're already calling themselves Puerto Rican. So it's very exciting and a great opportunity for us. >> One of the things I've been impressed with is the acceptance and the blending of the island folks and people coming in. Take me through an example. Let's just say hypothetically, hypothetically, I wanted to move to Puerto Rico, what do I do? I call you guys up and say hey get me a flat, get me a house. I need security I need a car. Do I need a driver's license? Do I need insurance, I mean what has to happen? Take me through and how do I, and what happens for me? Is it turn key, is it easy? What do you guys do? What do I have to do? Take me through a use case. >> Okay, first when the client calls, if it's interested in Act 20 business, they will tell a little bit about their business and then we can say if their business qualified. Then, we will take them to the CBA and work everything about the grant. It usually takes two week depending on all the info the client gives us and the quickly and I will manage everything in the government agencies. For the residential part, we schedule their meetings when they have kids to the great private schools here. We help them with the real estate, driver's license. They do need driver's licenses. I take them to get their voters ID, everything. We have like a draft, a checklist, with everything they need to qualify for residence, a Puerto Rico resident. And we take them, we make the process very easy for them. >> So they write a big check to you guys, for the service, but you guide them through the entire process? >> Yes, we do. >> So, for individuals, you can do it for individuals and businesses and individuals right? >> Yes. >> Take me through the scenarios. >> For individuals it will be the basic Act 22. So, that one is very simple and we just tell them what they need to do to comply with the 183 days they need to reside here in Puerto Rico to get the benefits for the grants tax incentives. >> So, take me through the business aspect. >> Oh, the business aspect is also very easy. As long as your company gives an export service, it qualifies. So, we even do the, if they need to hire staff, manage their business, everything. We help them with everything. >> And you guys see a lot of business coming from, people that were going to go to the Cayman Islands, or somewhere else, are they coming here? >> Yes, everybody likes because they feel Puerto Rico is part of the United States, but then we don't pay federal taxes so they have that great benefit, so they're moving a lot of the companies here. >> So since the Hurricane obviously there's been a lot of effort in the U.S. and focusing attention on helping Puerto Rico, and there's been stories good and bad, but as the new Blockchain and the Bitcoin cryptocurrency newly minted millionaires and billionaires come in, how has the culture reacted to that? They seem to be open arms. Has it been well received? What's some of the feedback that's been happening here in Puero Rico with the new in migration of folks? >> Yes, it's very well received and it's amazing because this group of the Blockchain just came after Hurricane Maria. So people were amazed like, wow, they're still considering moving here and help the island, even after this big natural disaster. So, it gives hope to a lot of people here and it's helping the island to do a lot of more progress. >> And what's great is the island is first of all beautiful but, with the infrastructure, opportunity to reboot it and reset new infrastructure, all the tech geeks, this is Blockchain, they're like tech nerds. They love the high-speed internet, they want to have the good infrastructure and the schools have now connected Blockchain. I talked to an entrepreneur here two days ago where he's linking all the schools, educational institutions and colleges with Blockchain to create a community. So there's kind of a nerd nation emerging here in Puerto Rico, isn't there? >> Yes, yes, it's amazing that we've been considered for all of that. >> Well thank you for coming on and explaining The Puerto Rican Advantage. Also, her partners are Jennifer Brockman and Angela Brookman. You guys are doing a great service. Thank you for what you do. I think a lot of people that I've talked to really appreciated it. For folks who want to come to Puerto Rico and help out and contribute but also get some real advantages for the business and as an individual. The tax breaks and the benefits are significant here and it's part of the U.S. So, great stuff. Thank you so much. >> Yes, thank you a lot. >> More live coverage here in Puerto Rico. I'm John Furrier, host of theCube. We're back after this short break. (electronic music)
SUMMARY :
brought you to by for the big story about and if the tax incentives Certainly the incentives and they will tell you from Puerto Rico. One of the things and the quickly and I for the grants tax incentives. the business aspect. Oh, the business of the companies here. how has the culture reacted to that? the island to do a lot of more progress. They love the high-speed internet, for all of that. and it's part of the U.S. I'm John Furrier, host of theCube.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Angela Brookman | PERSON | 0.99+ |
Jennifer Brockman | PERSON | 0.99+ |
Damarius | PERSON | 0.99+ |
Wisconsin | LOCATION | 0.99+ |
Puerto Rico | LOCATION | 0.99+ |
San Juan | LOCATION | 0.99+ |
Cayman Islands | LOCATION | 0.99+ |
John Furrier | PERSON | 0.99+ |
Puerto Rico | LOCATION | 0.99+ |
Puero Rico | LOCATION | 0.99+ |
two week | QUANTITY | 0.99+ |
seven months | QUANTITY | 0.99+ |
Damaris Rivera | PERSON | 0.99+ |
Hurricane Maria | EVENT | 0.99+ |
Rincon | LOCATION | 0.99+ |
both | QUANTITY | 0.99+ |
United States | LOCATION | 0.99+ |
Act 20 | TITLE | 0.98+ |
Blockchain Industries | ORGANIZATION | 0.98+ |
two days ago | DATE | 0.98+ |
183 days | QUANTITY | 0.98+ |
Act 22 | TITLE | 0.97+ |
Dorado | LOCATION | 0.97+ |
San Juan, Puerto Rico | LOCATION | 0.97+ |
each client | QUANTITY | 0.97+ |
one business | QUANTITY | 0.97+ |
Puerto Rico Advantage | ORGANIZATION | 0.96+ |
U.S. | LOCATION | 0.96+ |
first | QUANTITY | 0.95+ |
One | QUANTITY | 0.91+ |
2018 | DATE | 0.89+ |
The Puerto Rican Advantage | TITLE | 0.89+ |
CBA | ORGANIZATION | 0.88+ |
Blockchain | TITLE | 0.83+ |
one | QUANTITY | 0.82+ |
Bitcoin | OTHER | 0.81+ |
one stop | QUANTITY | 0.79+ |
Latin | OTHER | 0.72+ |
Blockchain Unbound | TITLE | 0.71+ |
American | LOCATION | 0.71+ |
lot of people | QUANTITY | 0.66+ |
Puerto Rican | LOCATION | 0.63+ |
Blockchain | ORGANIZATION | 0.57+ |
theCube | ORGANIZATION | 0.55+ |
of people | QUANTITY | 0.53+ |
Blockchain UnBound | TITLE | 0.42+ |
Riviera | ORGANIZATION | 0.39+ |
Gustavo Diaz Skoff, Young Entrepreneurs Puerto Rico | Blockchain Unbound 2018
(lively music) >> Narrator: Live from San Juan, Puerto Rico. It's The Cube! Covering Blockchain Unbound. Brought to you by Blockchain Industries. (lively island music) >> Hey, hello everyone. I'm John Furrier. We are reporting on the ground here in Puerto Rico for Blockchain Unbound, a global conference of leaders from around the world who are coming into Puerto Rico with the local entrepreneurs, with the local ecosystem, to talk about the future of the digital nations in the world, digital transformation, also cryptocurrency, Blockchain...all the people are here, The Cube is here, as part of our 2018 kickoff of all the crypto Blockchain shows. My next guest here on The Cube is Gustavo Diaz Skoff, who is the founder and president of the Young Entrepreneurs in Puerto Rico's society, also heavily involved in the ecosystem. Thanks for speaking with me. >> Thank you. >> John: So, what's going on here in Puerto Rico? Also, we just talked with Michael Angelo, who is the co-founder of Edublock, but we're talking about a whole transformation going on in Puerto Rico. What's the young culture like? What's the old guard say? I mean, are people... What's going on? What's the mindset? What's going on in Puerto Rico? We know the hurricane that hit, but, again, looking past that, what's the cultural vibe right now in Puerto Rico? I think the cultural vibe right now is that there's a little bit of a hesitation, but, at the same time, there's a lot of excitement. Events that, like, for example, the one that were hosted yesterday, Law 23, that brought the local and the vicinity communities together to actually clear up and like lowered those stations and actually bonded and brought more energy into the whole push. I think that is the overarching vibe here in the island, it's just like awesome. There's...something's happening. We don't know quite yet what it is, but there is a historical narrative of the island, and there is definitely a very bullish view of the island. So what's really going on here is that the people are excited, but you got the whole world descending upon Puerto Rico. We grabbed a lot last night with the party. >> Yeah. >> We put out a nice sizzle reel this morning, but the vibe was awesome. People were dancing, a lot of people smiling. >> You were there? >> We were there! We just put some up on our telegram channel. >> I was the organizer of it. >> Congratulations, really awesome. >> Thank you. >> John: Outside, nice weather, things were great, but it really is about the cross-pollination. It's about the culture of Puerto Rico, maintaining the culture in Puerto Rico, seems to be the top story that we hear from folks here. Yes, we like to bring in the industry, but don't tell us what to do. We're Puerto Rico (laughing) you know, don't stomp on our land! I'm not being...but I mean there's kind of a vibe like 'look it, Puerto Rico's proud.' But that's got to translate into execution... what's the young guns doing? >> So, this is the reality in terms of what the young guns are doing, and, sadly, sometimes they're a very sad story, and the reality is like when you look at the world economic forums competitive reports, we have the sixth-largest conglomeration of trained scientists and engineers in the world. Holy shit! That's insane. But, at the same time, we have 90 percent of them being unemployed or underemployed, because we don't have like technology companies that are actually requesting and demanding that type of knowledge. And so, that's where we're actually failing in terms of execution, because we're going to end up working for a bank or for a government agency, and so there's not that many opportunities to actually go and build that. And now, just looking at the whole shift and how the world has basically come into our shores, it's like, wow. There is an opportunity to actually use this human capital and work together and just start developing and challenging ourselves locally to keep building, either as an entrepreneur or as an intrapreneur. >> John: You know, Brock Pierce, I thought, said it great today on the keynote he gave here at the Blockchain Unbound Conference, "It's a global 'we' going on; it's a 'we,' not a 'me.'" >> And I think, you know, someone who's seen many waves in my life, this is the biggest wave ever, because it's creating essentially a flat world, it's global, so it's not like the old guard, gatekeeper, migration paths up, so the migration for up the ladder, if you will, in society for a young individual was kind of structured in the past. >> Now the ladder has fallen. It's flat. (chuckling) >> Peter Thiel, who at one point was looking at paying people not to go to school, literally the world is your oyster with this new technology, because now it's a global fabric. There's no central authority. You have access to open source software. It's fully connected. So now's the time to make it translate. What do you hope for for the community in Puerto Rico to make that connection in the actual property flow, the relationships. What are you guys looking for to have happen? >> Yeah. So the answer is going to be a little bit historical, and that goes back to the question I asked off of the camera, was like, "Do you know where the first special economic zone was built, the first SEZ was built?" It was here in Puerto Rico. And for those that don't know, that was the economic model that we used as a human race in 130 nations in 4300 zones around the world to transition our economy from agriculture to manufacturing. And I believe that, right now, we're building that fabric. We're starting to reconstruct the second generation of an SEZ, and, whatever is happening here, to either build better cities, where people are able to access their food, are able to access capital, are able to access opportunities in a way that it's de-risked. I believe it's being built right now. And I think that is where we're heading. Because we already did it 71 years ago, and this is just the perfect concoction to re-do it. >> John: You know, I talk with a lot of leaders. One of them, in particular, Teresa Carlson, runs Amazon Web Services' global public sector, which is government, schools, and whatever. We're seeing for the first time, and this is what, I think, Amazon sees, and they're the leader in cloud computing, which is phenomenal, which, again, levels a lot of gatekeepers, if you think about it that way. She talks about digital nations, that we are now at the front end of the beginning of a wave where sovereignty, at a national level, with this no-border, kind of digital culture, is a huge opportunity. >> Yeah. >> How are you guys recruiting? How are you spreading the love? How are you spreading the word? Because it's not just developers, it's about the communities. >> Well, first of all, I think it's important to actually say that it's better, I think, Puerto Rico being a free associated states of the United States of America, it's like the best place to actually test this philosophy and push for that. I think that the way that we're actually starting to recruit that is by spreading out into the world and saying, "Hey, this is happening, come back." As I was mentioning, in May, we're going to Washington DC to present over 23 organizations that are working on basically all that's happening, and be able to bring more consciousness, bring more tools into the island and be able to build, essentially, the future of it. >> Tell me about the things that you're working on right now. You mentioned before we came on camera some of the things you were doing in Washington DC. What are some of the things you're hoping to accomplish over the next year in your role, inside the community here in Puerto Rico? >> I hope to, with Edublock, be able to help more students get into this space, be able to leverage better connections and relationships with these corporations that are in need now of Blockchain developers, and be able to have that circle of flow of the people here in the island and the people internationally that are looking for talent. That's my main goal. And if I could put a number of it, it would be amazing to have 500 students recruited, or with an internship, within corporations by the next 365 days. >> As you guys at Edublock are creating a separate event forum for what's happening at Blockchain Unbound to the education community, because it's pretty pricey to come to this conference, it's an investor's conference, it's an industry conference. You're seeing a world coming together, a lot of people coming in from the crypto blockchain community. What are people talking about in Puerto Rico about this migration and this intersection of the two worlds? Is it good, bad, confusing? Are people trying to figure it out? What's the vibe? >> They need more information. They need more data. (laughing) We only have a few articles, and that's it. >> John: Yeah. >> My father, for example... >> John: Articles from centralized news organizations, not trusted news organizations. >> Yes, yes. >> What does the decentralized data say? >> The decentralized data say is that this is a good technology, and we need to be careful, like we need to understand it correctly. And we need to raise awareness around the community, because it can either go really, really, really, really, really well, or we can repeat the past couple of years in the island. >> It could fail miserably or be a home run. >> Great stuff. We certainly want to expose the information and share what the stories of the key things that we're...you're doing a great job. You guys are doing great work. We support you from Silicon Valley with The Cube. >> Our job is open, free content, which we're doing here in Puerto Rico. We're with Gustavo Diaz Skoff, who is the founder and president of the Young Entrepreneur's Club here, Entrepreneurial Society, in Puerto Rico. We're on the ground, getting all the top stories and sharing the data with you. I'm John Furrier. Thanks for watching. (digital music)
SUMMARY :
Brought to you by Blockchain Industries. the local ecosystem, to Law 23, that brought the but the vibe was awesome. We just put some up on Puerto Rico, maintaining the culture in and the reality is like when you look at here at the Blockchain Unbound Conference, it's not like the old Now the ladder has fallen. So now's the time to make it translate. So the answer is going to be a We're seeing for the first time, it's about the communities. the best place to actually the things you were island and the people intersection of the two worlds? We only have a few John: Articles from centralized news in the island. or be a home run. stories of the key things and sharing the data with you.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Michael Angelo | PERSON | 0.99+ |
Teresa Carlson | PERSON | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
John | PERSON | 0.99+ |
Puerto Rico | LOCATION | 0.99+ |
John Furrier | PERSON | 0.99+ |
Peter Thiel | PERSON | 0.99+ |
Washington DC | LOCATION | 0.99+ |
Gustavo Diaz Skoff | PERSON | 0.99+ |
Young Entrepreneur's Club | ORGANIZATION | 0.99+ |
Amazon Web Services' | ORGANIZATION | 0.99+ |
90 percent | QUANTITY | 0.99+ |
Brock Pierce | PERSON | 0.99+ |
Edublock | ORGANIZATION | 0.99+ |
Silicon Valley | LOCATION | 0.99+ |
500 students | QUANTITY | 0.99+ |
May | DATE | 0.99+ |
Young Entrepreneurs | ORGANIZATION | 0.99+ |
130 nations | QUANTITY | 0.99+ |
One | QUANTITY | 0.99+ |
The Cube | ORGANIZATION | 0.99+ |
United States of America | LOCATION | 0.99+ |
Blockchain Unbound Conference | EVENT | 0.98+ |
yesterday | DATE | 0.98+ |
two worlds | QUANTITY | 0.98+ |
4300 zones | QUANTITY | 0.98+ |
San Juan, Puerto Rico | LOCATION | 0.98+ |
second generation | QUANTITY | 0.97+ |
first | QUANTITY | 0.97+ |
Blockchain Industries | ORGANIZATION | 0.97+ |
first time | QUANTITY | 0.97+ |
The Cube | TITLE | 0.96+ |
next year | DATE | 0.96+ |
71 years ago | DATE | 0.95+ |
over 23 organizations | QUANTITY | 0.94+ |
one point | QUANTITY | 0.93+ |
2018 | DATE | 0.93+ |
today | DATE | 0.93+ |
last night | DATE | 0.92+ |
Entrepreneurial Society | ORGANIZATION | 0.91+ |
Law 23 | EVENT | 0.88+ |
this morning | DATE | 0.85+ |
Blockchain Unbound | EVENT | 0.85+ |
first special economic | QUANTITY | 0.85+ |
sixth-largest conglomeration | QUANTITY | 0.79+ |
past couple of years | DATE | 0.77+ |
Blockchain Unbound | TITLE | 0.73+ |
Blockchain | ORGANIZATION | 0.69+ |
next 365 days | DATE | 0.68+ |
articles | QUANTITY | 0.61+ |
wave | EVENT | 0.59+ |
SEZ | LOCATION | 0.53+ |
Cube | ORGANIZATION | 0.5+ |
Unbound | EVENT | 0.48+ |
Corey Dyer, Digital Realty & Cliff Evans, HPE GreenLake | HPE Discover 2022
>>Que presents HP Discover 2022. Brought to You by HP >>Good morning, everyone. It's the Cube live in Las Vegas. Day two of our coverage of HP Discover 2022 from the Venetian Expo Centre. Lisa Martin and David want a what a day we had yesterday and today. Unbelievable >>for today. Big Big day today, >>Big day Today we've got a lot. We got some big heavy hitters on talking with HP customers. Partners, leadership. We've a couple of guests up with us next. Going to be talking more about the ecosystem. He's welcome. Corey Dire, the chief revenue officer, Digital Realty and Cliff Evans, senior director. H P E Green like partner ecosystem Guys. Great to have you on the >>programme. Thank you. Great to be here. >>Thank you for having us excited to be here >>with. So that's so that's harness that excitement. Cory, talk to us about the partnership. The announcement? What's going on there with Digital Realty and Green like? >>Yeah, we're crazy excited about it. You know, we've got customers dealing with data, gravity and the opportunity around that and how they could make use of it. And then they're thinking through digital transformation. How how you doing? Multi cloud and they need a partnership. To do that in this partnership with Green Leg and digital is perfect solution for them. So I'm crazy excited to be here with Cliff absolute with all of you to talk about it and hopefully build out a great partnership in relationship with HP. >>Talk to us. Sure, you're crazy Excitement >>club? Absolutely no. I think it is absolutely fantastic Partnership. I think the term is coming together as organisations. Bringing the two platforms together isn't it is an amazing thing that we have for customers, customers we know they want. They want a cloud experience. But really, they want to do that without really the DC footprint that had previously. So how did they do that in a way that really works for them in a secure client secure, sustainable way. But with the cloud experience. Really, the combination of the two pieces coming together really makes that happen, and that is what that's exciting. So we >>dig in to the two things that you mentioned Cory digital transformation and multiply. When I go back to the early days of cloud, it was that girl, you know, nobody's going to do anything you know ever again in the data centre. You know Charles Phillips, the the CEO of in four, famously said, Friends don't let friends, Bill Data centres, right? Everything's going in the cloud. So a lot of people predicted, You know, guys like you were going to be in trouble. The exact opposite happened. The market took off. So you mentioned digital transformation of multi cloud. Can we peel the onion on that? What? What is it about those two items? Are there other trends? They're driving your business, >>you know, You tied right on to to where it started. All enterprises started going to the club and then they got to the cloud and there was more that they needed to make that rial. I talk about multi cloud. You're going to use different cloud providers for different opportunities and different applications. And so you have to start thinking about how does this work in a world where you're gonna go to multiple clouds, multiple locations and what it really drove? It is the need for Cole location to make this because you've got a distributed architecture in order to enable all of this and then having to have us help you out with it. And partners like HP. That's part of where it comes from. But if you think through going to the cloud, can you stay there? Is that the full solution? You need to secure sustainable solution for that. One of the opportunities for us around that is that if you're building data centres for yourself on Prem, you don't have all the cloud access we do. We've got more cloud access points than anybody. So that helps in this digital transformation. >>How How much home? I'm sorry, Didn't mean to you how much homogeneity is there are our clients or customers saying, Hey, I kind of want the same experience in the same infrastructure. Same same. Or they saying, Hey, I want to do stuff in Digital Realty that I can't get from, you know, a cloud provider, Oracle Rack. You know, something like that, >>I would tell you that they come to us from all the partners. So we are partner community. We are not going up the stack anywhere on that. We do are we do our part. We're really good at doing the data centres really good at building data. They descended sustainable. Our position in the market is sustainability around it. We were the first to sign up on the science based initiatives for zero kind of carbon neutrality and in the future in 2030. And so yeah, so I think there's the partner aspect that they need help with on it to drive that Yeah. >>And I think from that from the HP Green Lake perspective, I think customers they very much want that that cloud experience. But I want to do on their own terms. The partnership allows that to happen on Gapen simply the cloud experiencing with the green light cloud platform to really go and deliver that genuine cloud experience and then building cloud services. On top of that, they get all the benefits that they would have from a public cloud experience, but done in the way that they would prefer to do it. So it's bringing those pieces together on >>I think the other side of you asked if it was it was the same across the board and ubiquitous. It's very bespoke. Solutions weaken D'oh! Every customer we have has a different footprint. Most from the multinationals. So we think through where their data is, where it needs to be accessed where their customers are, where their employees are, what makes the most sense. And then the partnership we have with HP into a whole lot for making very bespoke solution for that customer and help them be successful. Journey >>s O on. That s o. So what we've done with destroy lt is we have a specific offer around how we go to market with this really going how customers So we call it Green Light with co location. It's all about really positioning on offer to customers that says, Look, we can go and do this with you and do it simply and really make it happen very quickly and efficiently. So the customer ends up with a single contract in a single invoice for Green Lake Cloud Services on the co location piece, all in one single contracts. That just makes it a lot easier in terms of organising on a really big part of that as well is that our involvement is also spans right from the design to the implementation to support. So we do the whole thing to really help organisations golf and do this. So that's the big for me. The big differentiator. So rather than just having Green Lake in Cloud Services, were saying, Look, we can now do the Coehlo piece and they can really take the whole thing to a whole new level in terms of that public cloud experience >>in the sari and that that that invoice comes from HPD or Digital Realty is bundled into that >>correct? Yes, directly through the channel. We can sell that in a number of different ways. Customers get that that single invoice on a big part of that as well, just going a little bit deeper on that. So what we do is we We use a part of the company called Data Centre Technology Services, which are a great kind of consulting organisation with tremendous experience and something like 3000 projects across 40 countries from the very smallest of the very largest of data centre implementation. So all of that really makes the whole thing a lot easier from a customer's perspective in terms of designing, implementing and then supporting. So you pull all of that together. It's fantastic >>and I think it's really changed to add on to that partner in prison. So customers, now we're thinking about it differently and data centres differently, and they see us as a strategic partner along with HP. To go after this used to be space, power and calling. Now it's How much connectivity do you have? What your sustainability profile? What's your security profile? How do you secure this data? Date is the lifeblood of all these companies and you have to have a really secure, sustainable solution for them, >>right? That's absolutely critical for every industry. Talk about the specific value prop at a bespoke co location solution delivers to customers. Maybe you got a favourite customer example that you think really articulates the value of this partnership. >>So I think a combination. So so I think we touched on a lot of it, actually. So there's obviously the data centre aspect itself in terms of with the footprint that realty have across the world, you can pick and choose the data centre in the class of data centre that you want in terms of your Leighton see and connectivity that you want. Then really, it's the green make peace in terms of the flexibility that you get with that really is that value. And as I touched on the Green Lake with Cole Oh, I think for me is from our perspective, I think the biggest piece of value that we provide there to really go make it happen. Yeah, >>there's about 70 applications right now that are part of Green Lake Polo that you can bespoke for what you need to. You can think around your specific solutions that you need, and we've got it all right there with HP Green like and follow for us. And because we have a 290 data centre footprint across 50 markets, it gives us the opportunity really be the data centre provider in the Partner for H P, pretty much anywhere but with connective ity everywhere. >>When you say 70 applications, these the 70 services are you talking about talking >>about? Okay, Category 70 services. There's a lot of stuff. >>Cory, when you talked about sustainability a couple of times, is a really important ingredient of the customer decision. Why is it because they're indirectly paying the power bill or is because that's the right thing to do? And they care. There's increased. People care about it more because you go back a while ago. People way always talked about green it, but it was all lip service. Is that changing or is that there? Is there an economics >>changing in a really big way? Almost every conversation I have with customers is how are you doing Sustainability. So if they're doing an on Prem, that's not their core capabilities. They don't know how to do that. On our end, I mentioned our SP R science based initiatives that we signed up for. But how do we enable that? Enable it for how do we build in designer data centres? How do we actually work them and operate them? And then how do we go after all the green sources of sustainable energy including, I think since 2015, we've issued six billion in green bonds around that same support of it. So yeah, >>and your customer can then I presume, report that on their sustainability report a >>good way to think about it. You no longer have your data centre at its sometimes less efficient way than way are we're really good at building sustainable data centres, and then you can actually get some credits back and forth, >>just from agreement. Perspective. So Green Lake. So there's a specific Forrester Impact report that looks a green lake on how it how it performs from sustainability. Perspective on Greenlee really is giving you their 30% reduction in your energy consumption. So there's a big kind of win there as well, I think. Which is then, >>why? Where does that come from? >>So it Zim part that kind of the avoidance of over provisioning such that you going right size things, Then you have you have you have a certain amount of reserve capacity that you're using them just using the extra consumption piece when you need it. So rather than having everything running at full speed, it really is kind of struggling as to how that work. So you get a combination of effects >>with consulting and the thoughtfulness around this bespoke solution that you have. You end up needing fewer servers, pure technology that drives less power consumption and therefore you get a lot of this same really base it down. You >>talked about the savings you talked about the simplification delivery perspective. Talk about the implementation. What's the time to value that Organisations can glean from this partnership >>superfast So So yeah this This does accelerate the whole process from from initial kind of opportunity if you like and customer inquiry through to actual implementation So previously this would take considerable amount of time in terms of to ing and froing between multiple organisations on Now what we do is coordinate that do it efficiently and effectively So D. C. T s Data Sentinel services team very closely. Just have those connections often do those things incredibly quickly and it does accelerate the whole time >>and they're tied in with our team is well around. Where's the leighton? See where the solutions Because we're really thinking about what is your stack looked like from an HP perspective, but then where you need to deploy it so that you have access to the clouds You have the right proper Leighton see across your environment and you really haven't distributed architecture that works the best for you and your company. >>So this is probably answer those questions Probably both, but I'm asking anyway, I've always been a repatriation sceptic, but I'm happy to be proven wrong. You guys have other data. And maybe this is part of what one of my blind spots question is, is what's driving your business in terms of the EU's case? Is it organisations saying Hey, we want to get out of the data centre business way Don't want to put everything into the cloud but we're going to go on a digital realty and being green leg and we're gonna move into that cola Or is it? People say, You know, while we over rotated into the cloud, you were going to come back. So it's >>both. It's both, >>Yeah, in the empire. The credit. >>I think there are a lot of customers with good intentions on going to the cloud, and then there's some cost with it that maybe they didn't fully factor in it at that time. And now you've got the ability around these bespoke solutions to really right size every bit of this. And when they originally did it, they didn't think through a distributor architecture. They thought my own prim, and then I'm just gonna burst everything that a cloud that's no longer the case, and it's not really the most efficient way to your point about repatriation. They start pulling their storage back in. Well, where do you want your data? Where do you want your storage? You wanted as close as you can to the clouds for that capability and in a solution that's wrapped around it makes it very simple for you. >>I think the repatriation is very real and is increasing, eh? So we're seeing a lot of it in terms of activity and customers really trying to understand the cost that they're incurring now from a public cloud perspective. And how can they do that differently? In fact, with combined offer that we have it, it makes it a lot easier to compare. So, yeah, that really is accelerating because you don't >>see it in the macro numbers. I mean, just to be honest, you see the cloud guys combined growing 35%. And is that because your business is in transition from traditional on prime model, too, and as a service model, and so you've got that imbalance and it gets hidden in >>all that, and I think it's I think it's a new wave of things that are happening. Yeah. I mean, there's a there's a lot of things, obviously, that makes complete sense to me in Public Cloud, but I do think there's been an over rotation towards it, so I think now that realisation and it's going to take time to kind of pick that. But it's absolutely happening. There are a lot of opportunities that we've gotten some very big ones I'd love to talk about. Can't quite talk about them just get but really, where there's big, big savings in terms of what they're paying from a public cloud perspective, Really, what they want is that full management cloud service to go make it happen. So the combination of the data centre piece to Green Lake piece and then some management services, whether they're from ourselves or from party community, from manage service providers that we also work with, that gives them the complete package. >>So I have another premise. A lot of it, of course, is traditionally been focused on internal, and I feel like there's a new era coming. It's talks of the ecosystem. Are you seeing customers not only running there it in digital realty and connecting to the cloud in a hybrid fashion, but also actually building new value and building businesses that are customer facing on that that air monetize herbal. Are you seeing that? Is that happening and having examples, even generic? >>Well, basic from our perspective, our partner community, that's what they do. We have a tonne of enterprise customers, but I'll need to connect and integrate the data that you have doesn't do anything for you, Fitz on its own. And it's not interacting with other data points. And it's not around interacting with other customers, other solutions in one night. So it does help build out a partner community, a solution community for our customers in our data centres and across the >>are their industry patterns emerging. In other words, is that data ecosystems emerging by industry or is a sort of or horizontal? >>There's a mix. So I think there's a lot of lot of financial sector stuff. Yes, certainly. And then certainly manufacturing s O. I think it's interesting that you're getting a bit of a combination, but not a lot of financial sector. >>Of course, the big bags early on that they could build their own cloud. Yeah, now they're probably rethinking that. Yeah, well, maybe >>they're also service providers. When you're that large a za bank on their end. They're doing a lot of work. E. I would also say the other part that a lot of people see as an opportunity is around all the HPC and AI applications as well, in addition to manufacturing distribution. So there's a lot of use cases, a lot of reasons, like us from sort of doing this >>wrap us up with value, perhaps that you're talking Torto Financial Services Organisation or a manufacturing company. What is that 32nd elevator pitch value problem? Why they should go HP Making Digital Realty together. >>So I would say green, like Rico location gives you a single contract. Singling voice, easy to go and design, implement support and go make happen. Sorry, that's very simple way say, very just make it easy >>on. And I would just say thank you on that. It's been great to speak with you guys. And yeah, when you think through that part of it also is a bespoke opportunity to put your data where it needs to be closer to your customers. Closer to the action you were thinking through the rape reiteration of it. A lot of it's being built out there on phones and whatnot. So you've got to think through where your data is and how you managed to >>write and enable every every company in every industry to be a data company. Because that's what, of course, the demanding consumers demanding that demand isn't it is not going to turn down right now. Absolutely. Just thanks so much for David. Very much. Thank you. Together in the ecosystem, there are guests. And Dave l want a I'm Lisa Martin. You're watching the key of live from the Venetian Expo Centre in Vegas, Baby. David, I will be back there next guest in a minute.
SUMMARY :
Brought to You by HP of HP Discover 2022 from the Venetian Expo Centre. for today. Great to have you on the Great to be here. Cory, talk to us about the partnership. So I'm crazy excited to be here with Cliff Talk to us. Bringing the two platforms together isn't it is an amazing thing that we have for customers, customers we know So a lot of people predicted, You know, guys like you were going to be in trouble. to have us help you out with it. I'm sorry, Didn't mean to you how much homogeneity I would tell you that they come to us from all the partners. on Gapen simply the cloud experiencing with the green light cloud platform I think the other side of you asked if it was it was the same across the board and ubiquitous. customers that says, Look, we can go and do this with you and do it simply and really make it happen very quickly and So all of that really makes the whole thing a lot easier from a customer's Date is the lifeblood of all these companies and you have Maybe you got a favourite customer example that you think really articulates the value of this partnership. and connectivity that you want. provider in the Partner for H P, pretty much anywhere but with connective ity everywhere. There's a lot of stuff. is because that's the right thing to do? Almost every conversation I have with customers is how are you doing Sustainability. way than way are we're really good at building sustainable data centres, and then you can actually get some credits back and forth, you their 30% reduction in your energy consumption. So it Zim part that kind of the avoidance of over provisioning such that you going right size with consulting and the thoughtfulness around this bespoke solution that you have. talked about the savings you talked about the simplification delivery perspective. from initial kind of opportunity if you like and customer inquiry through to actual architecture that works the best for you and your company. You know, while we over rotated into the cloud, you were going to come back. It's both, Yeah, in the empire. Well, where do you want your data? So, yeah, that really is accelerating because you don't I mean, just to be honest, you see the cloud guys combined growing 35%. the data centre piece to Green Lake piece and then some management services, whether they're from ourselves or from Are you seeing We have a tonne of enterprise customers, but I'll need to connect and integrate the data that you have doesn't are their industry patterns emerging. So I think there's a lot of lot of financial sector stuff. Of course, the big bags early on that they could build their own cloud. So there's a lot of use cases, a lot of reasons, like us from sort of doing this What is that 32nd elevator pitch value problem? So I would say green, like Rico location gives you a single contract. It's been great to speak with you guys. of course, the demanding consumers demanding that demand isn't it is not going to turn down right now.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
David | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
HPD | ORGANIZATION | 0.99+ |
Corey Dire | PERSON | 0.99+ |
HP | ORGANIZATION | 0.99+ |
30% | QUANTITY | 0.99+ |
2030 | DATE | 0.99+ |
two pieces | QUANTITY | 0.99+ |
six billion | QUANTITY | 0.99+ |
35% | QUANTITY | 0.99+ |
Greenlee | ORGANIZATION | 0.99+ |
today | DATE | 0.99+ |
Las Vegas | LOCATION | 0.99+ |
Green Lake | ORGANIZATION | 0.99+ |
yesterday | DATE | 0.99+ |
two things | QUANTITY | 0.99+ |
Cory | PERSON | 0.99+ |
Today | DATE | 0.99+ |
both | QUANTITY | 0.99+ |
Cliff Evans | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
Torto Financial Services Organisation | ORGANIZATION | 0.99+ |
one night | QUANTITY | 0.99+ |
two items | QUANTITY | 0.99+ |
Green Light | ORGANIZATION | 0.99+ |
50 markets | QUANTITY | 0.99+ |
3000 projects | QUANTITY | 0.99+ |
Data Centre Technology Services | ORGANIZATION | 0.99+ |
Charles Phillips | PERSON | 0.99+ |
2015 | DATE | 0.99+ |
Green Leg | ORGANIZATION | 0.99+ |
Green Lake Cloud Services | ORGANIZATION | 0.99+ |
first | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
Corey Dyer | PERSON | 0.99+ |
two platforms | QUANTITY | 0.99+ |
70 services | QUANTITY | 0.99+ |
Leighton | ORGANIZATION | 0.99+ |
Vegas | LOCATION | 0.99+ |
Forrester | ORGANIZATION | 0.98+ |
four | QUANTITY | 0.98+ |
Green | ORGANIZATION | 0.98+ |
HP Green | ORGANIZATION | 0.98+ |
Green Lake Polo | ORGANIZATION | 0.98+ |
leighton | ORGANIZATION | 0.98+ |
Digital Realty | ORGANIZATION | 0.98+ |
Venetian Expo Centre | LOCATION | 0.98+ |
Day two | QUANTITY | 0.98+ |
70 applications | QUANTITY | 0.98+ |
HP Green Lake | ORGANIZATION | 0.97+ |
40 countries | QUANTITY | 0.97+ |
Lisa Martin | PERSON | 0.96+ |
single contract | QUANTITY | 0.96+ |
290 data centre | QUANTITY | 0.96+ |
32nd elevator | QUANTITY | 0.96+ |
Digital Realty | ORGANIZATION | 0.95+ |
Green Lake | LOCATION | 0.95+ |
about 70 applications | QUANTITY | 0.95+ |
Data Sentinel | ORGANIZATION | 0.94+ |
One | QUANTITY | 0.94+ |
Oracle Rack | ORGANIZATION | 0.94+ |
single invoice | QUANTITY | 0.92+ |
Cory | ORGANIZATION | 0.92+ |
Fitz | ORGANIZATION | 0.91+ |
HPE | ORGANIZATION | 0.89+ |
zero | QUANTITY | 0.84+ |
Gapen | ORGANIZATION | 0.83+ |
times | QUANTITY | 0.82+ |
Rico | ORGANIZATION | 0.8+ |
blind spots | QUANTITY | 0.78+ |
EU | ORGANIZATION | 0.77+ |
single contracts | QUANTITY | 0.75+ |
couple | QUANTITY | 0.75+ |
Bill Data centres | ORGANIZATION | 0.74+ |
HP Making Digital Realty | ORGANIZATION | 0.74+ |
2022 | DATE | 0.73+ |
Greg Muscarella, SUSE | Kubecon + Cloudnativecon Europe 2022
>>The cube presents, Coon and cloud native con Europe, 2022. Brought to you by red hat, the cloud native computing foundation and its ecosystem partners. >>Welcome to Valencia Spain and cuon cloud native con 20 Europe, 2022. I'm your host Keith towns alongside a new hope en Rico, senior reti, senior editor. I'm sorry, senior it analyst at <inaudible> Enrique. Welcome to the program. >>Thank you very much. And thank you for having me. It's exciting. >>So thoughts, high level thoughts of CU con first time in person again in couple years? >>Well, this is amazing for several reasons. And one of the reasons is that yeah, I had the chance to meet, uh, with, uh, you know, people like you again. I mean, we, we met several times over the internet over zoom calls. I, I started to eat these zoom codes. <laugh> because they're really impersonal in the end. And like last night we, we are together group of friends, industry folks. It's just amazing. And a part of that, I mean, the event is, uh, is a really cool, it's really cool. There are a lot from people interviews and, you know, real people doing real stuff, not just, uh, you know, again, in personal calls, you don't even know if they're telling the truth, but when you can, you know, look in their eyes, what they're doing, I, I think that's makes a difference. >>So speaking about real people, meeting people for the first time, new jobs, new roles, Greg Moscarella, enterprise container management and general manager at SUSE. Welcome to the show, welcome back clue belong. >>Thank you very much. It's awesome to be here. It's awesome to be back in person. And I completely agree with you. Like there's a certain fidelity to the conversation and a certain, uh, ability to get to know people a lot more. So it's absolutely fantastic to be here. >>So Greg, tell us about your new role and what SUSE has gone on at KU coupon. >>Sure. So I joined SA about three months ago to lead the rancher business unit, right? So our container management pieces and, you know, it's a, it's a fantastic time. Cause if you look at the transition from virtual machines to containers and to moving to microservices, right alongside that transition from on-prem to cloud, like this is a very exciting time to be in this industry. And rancher has been setting the stage. And again, I'm go back to being here. Rancher's all about the community, right? So this is a very open, independent, uh, community driven product and project. And so this, this is kinda like being back to our people, right. And being able to reconnect here. And so, you know, doing it, digital is great, but, but being here is changes the game for us. So we, we feed off that community. We feed off the energy. So, uh, and again, going back to the space and what's happening in it, great time to be in this space. And you guys have seen the transitions you've seen, I mean, we've seen just massive adoption, uh, of containers and Kubernetes overall and ranchers been been right there with some amazing companies doing really interesting things that I'd never thought of before. Uh, so I'm, I'm still learning on this, but, um, but it's been great so far. >>Yeah. And you know, when we talk about strategy about Kubernetes today, we are talking about very broad strategies. I mean, not just the data center or the cloud with, you know, maybe smaller organization adopting Kubernetes in the cloud, but actually large organization thinking guide and more and more the edge. So what's your opinion on this, you know, expansion of Kubernetes towards the edge. >>So I think you're, I think you're exactly right. And that's actually a lot of meetings I've been having here right now is these are some of these interesting use cases. So people who, uh, whether it be, you know, ones that are easy to understand in the telco space, right? Especially the adoption of 5g and you have all these space stations, new towers, and they have not only the core radio functions or network functions that they're trying to do there, but they have other applications that wanna run on that same environment. Uh, I spoke recently with some of our, our good friends at a major automotive manufacturer, doing things in their factories, right. That can't take the latency of being somewhere else. Right. So they have robots on the factory floor, the latency that they would experience if they tried to run things in the cloud meant that robot would've moved 10 centimeters. >>By the time, you know, the signal got back, it may not seem like a lot to you, but if, if, if you're an employee, you know, there, you know, uh, a big 2000 pound robot being 10 centimeters closer to you may not be what you, you really want. Um, there's, there's just a tremendous amount of activity happening out there on the retail side as well. So it's, it's amazing how people are deploying containers in retail outlets. You know, whether it be fast food and predicting, what, what, how many French fries you need to have going at this time of day with this sort of weather. Right. So you can make sure those queues are actually moving through. It's, it's, it's really exciting and interesting to look at all the different applications that are happening. So yes, on the edge for sure, in the public cloud, for sure. In the data center and we're finding is people want a common platform across those as well. Right? So for the management piece too, but also for security and for policies around these things. So, uh, it really is going everywhere. >>So talk to me, how do, how are we managing that as we think about pushing stuff out of the data center, out of the cloud cloud, closer to the edge security and life cycle management becomes like top of mind thought as, as challenges, how is rancher and sushi addressing >>That? Yeah. So I, I think you're, again, spot on. So it's, it starts off with the think of it as simple, but it's, it's not simple. It's the provisioning piece. How do we just get it installed and running right then to what you just asked the management piece of it, everything from your firmware to your operating system, to the, the cluster, uh, the Kubernetes cluster, that's running on that. And then the workloads on top of that. So with rancher, uh, and with the rest of SUSE, we're actually tacking all those parts of the problems from bare metal on up. Uh, and so we have lots of ways for deploying that operating system. We have operating systems that are, uh, optimized for the edge, very secure and ephemeral container images that you can build on top of. And then we have rancher itself, which is not only managing your ES cluster, but can actually start to manage the operating system components, uh, as well as the workload components. >>So all from your single interface, um, we mentioned policy and security. So we, yeah, we'll probably talk about it more, um, uh, in a little bit, but, but new vector, right? So we acquired a company called new vector, just open sourced, uh, that here in January, that ability to run that level of, of security software everywhere again, is really important. Right? So again, whether I'm running it on, whatever my favorite public cloud providers, uh, managed Kubernetes is, or out at the edge, you still have to have security, you know, in there. And, and you want some consistency across that. If you have to have a different platform for each of your environments, that's just upping the complexity and the opportunity for error. So we really like to eliminate that and simplify our operators and developers' lives as much as possible. >>Yeah. From this point of view, are you implying that even you, you are matching, you know, self, uh, let's say managed clusters at the, at the very edge now with, with, you know, added security, because these are the two big problems lately, you know, so having something that is autonomous somehow easier to manage, especially if you are deploying hundreds of these that's micro clusters. And on the other hand, you need to know a policy based security that is strong enough to be sure again, if you have these huge robots moving too close to you, because somebody act the, the, the class that is managing them, that is, could be a huge problem. So are you, you know, approaching this kind of problems? I mean, is it, uh, the technology that you are acquired, you know, ready to, to do this? >>Yeah. I, I mean, it, it really is. I mean, there's still a lot of innovation happening. Don't, don't get me wrong. We're gonna see a lot of, a lot more, not just from, from SA and ranch here, but from the community, right. There's a lot happening there, but we've come a long way and we solved a lot of problems. Uh, if I think about, you know, how do you have this distributed environment? Uh, well, some of it comes down to not just, you know, all the different environments, but it's also the applications, you know, with microservices, you have very dynamic environment now just with your application space as well. So when we think about security, we really have to evolve from a fairly static policy where like, you might even be able to set an IP address and a port and some configuration on that. >>It's like, well, your workload's now dynamically moving. So not only do you have to have that security capability, like the ability to like, look at a process or look at a network connection and stop it, you have to have that, uh, manageability, right? You can't expect an operator or someone to like go in and manually configure a YAML file, right? Because things are changing too fast. It needs to be that combination of convenient, easy to manage with full function and ability to protect your, your, uh, your resources. And I think that's really one of the key things that new vector really brings is because we have so much intelligence about what's going on there. Like the configuration is pretty high level, and then it just runs, right? So it's used to this dynamic environment. It can actually protect your workloads wherever it's going from pod to pod. Uh, and it's that, that combination, again, that manageability with that high functionality, um, that, that is what's making it so popular. And what brings that security to those edge locations or cloud locations or your data center. >>So one of the challenges you're kind of, uh, touching on is this abstraction on, upon abstraction. When I, I ran my data center, I could put, uh, say this IP address, can't talk to this IP address on this port. Then I got next generation firewalls where I could actually do, uh, some analysis. Where are you seeing the ball moving to when it comes to customers, thinking about all these layers of abstraction IP address doesn't mean anything anymore in cloud native it's yes, I need one, but I'm not, I'm not protecting based on IP address. How are customers approaching security from the name space perspective? >>Well, so it's, you're absolutely right. In fact, even when you go to IPV six, like, I don't even recognize IP addresses anymore. <laugh> yeah. >>That doesn't mean anything like, oh, just a bunch of, yeah. Those are numbers, alpha Ric >>And colons. Right. You know, it's like, I don't even know anymore. Right. So, um, yeah, so it's, it comes back to that, moving from a static, you know, it's the pets versus cattle thing. Right? So this static thing that I can sort of know and, and love and touch and kind of protect to this almost living, breathing thing, which is moving all around, it's a swarm of, you know, pods moving all over the place. And so, uh, it, it is, I mean, that's what Kubernetes has done for the workload side of it is like, how do you get away from, from that, that pet to a declarative approach to, you know, identifying your workload and the components of that workload and what it should be doing. And so if we go on the security side some more like, yeah, it's actually not even namespace namespace. >>Isn't good enough if we wanna get, if we wanna get to zero trust, it's like, just cuz you're running in my namespace doesn't mean I trust you. Right. So, and that's one of the really cool things about new vectors because of the, you know, we're looking at protocol level stuff within the network. So it's pod to pod, every single connection we can look at and it's at the protocol layer. So if you say you're on my SQL database and I have a mye request going into it, I can confirm that that's actually a mye protocol being spoken and it's well formed. Right. And I know that this endpoint, you know, which is a, uh, container image or a pod name or some, or a label, even if it's in the same name, space is allowed to talk to and use this protocol to this other pod that's running in my same name space. >>Right. So I can either allow or deny. And if I can, I can look into the content that request and make sure it's well formed. So I'll give you an example is, um, do you guys remember the log four J challenges from not too long ago, right. It was a huge deal. So if I'm doing something that's IP and port based and name space based, so what are my protections? What are my options for something that's got logged four J embedded in like, I either run the risk of it running or I shut it down. Those are my options. Like those neither one of those are very good. So we can do, because again, we're at the protocol layer. It's like, ah, I can identify any log for J protocol. I can look at whether it's well formed, you know, or if it's malicious and it's malicious, I can block it. If it's well formed, I can let it go through. So I can actually look at those, those, um, those vulnerabilities. I don't have to take my service down. I can run and still be protected. And so that, that extra level, that ability to kind of peek into things and also go pod to pod, you know, not just same space level is one of the key differences. So I talk about the evolution or how we're evolving with, um, with the security. Like we've grown a lot, we've got a lot more coming. >>So let's talk about that a lot more coming what's in the pipeline for SUSE. >>Well, probably before I get to that, we just announced new vector five. So maybe I can catch us up on what was released last week. Uh, and then we can talk a little bit about going, going forward. So new vector five, introduce something called um, well, several things, but one of the things I can talk in more detail about is something called zero drift. So I've been talking about the network security, but we also have run time security, right? So any, any container that's running within your environment has processes that are running that container. What we can do is actually comes back to that manageability and configuration. We can look at the root level of trust of any process that's running. And as long as it has an inheritance, we can let that process run without any extra configuration. If it doesn't have a root level of trust, like it didn't spawn from whatever the, a knit, um, function was in that container. We're not gonna let it run. Uh, so the, the configuration that you have to put in there is, is a lot simpler. Um, so that's something that's in, in new vector five, um, the web application firewall. So this layer seven security inspection has gotten a lot more granular now. So it's that pod Topo security, um, both for ingress egress and internal on the cluster. Right. >>So before we get to what's in the pipeline, one question around new vector, how is that consumed and deployed? >>How is new vector consumed, >>Deployed? And yeah, >>Yeah, yeah. So, uh, again with new vector five and, and also rancher 2 65, which just were released, there's actually some nice integration between them. So if I'm a rancher customer and I'm using 2 65, I can actually deploy that new vector with a couple clicks of the button in our, uh, in our marketplace. And we're actually tied into our role-based access control. So an administrator who has that has the rights can just click they're now in a new vector interface and they can start setting those policies and deploying those things out very easily. Of course, if you aren't using, uh, rancher, you're using some other, uh, container management platform, new vector still works. Awesome. You can deploy it there still in a few clicks. Um, you're just gonna get into, you have to log into your new vector, uh, interface and, and use it from there. >>So that's how it's deployed. It's, it's very, it's very simple to use. Um, I think what's actually really exciting about that too, is we've opensourced it? Um, so it's available for anyone to go download and try, and I would encourage people to give it a go. Uh, and I think there's some compelling reasons to do that now. Right? So we have pause security policies, you know, depreciated and going away, um, pretty soon in, in Kubernetes. And so there's a few things you might look at to make sure you're still able to run a secure environment within Kubernetes. So I think it's a great time to look at what's coming next, uh, for your security within your Kubernetes. >>So Paul, we appreciate chief stopping by from ity of Spain, from Spain, I'm Keith Townsend, along with en Rico Sinte. Thank you. And you're watching the, the leader in high tech coverage.
SUMMARY :
Brought to you by red hat, Welcome to the program. And thank you for having me. I had the chance to meet, uh, with, uh, you know, people like you again. So speaking about real people, meeting people for the first time, new jobs, So it's absolutely fantastic to be here. So Greg, tell us about your new role and what SUSE has gone So our container management pieces and, you know, it's a, it's a fantastic time. you know, maybe smaller organization adopting Kubernetes in the cloud, So people who, uh, whether it be, you know, By the time, you know, the signal got back, it may not seem like a lot to you, to what you just asked the management piece of it, everything from your firmware to your operating system, managed Kubernetes is, or out at the edge, you still have to have security, And on the other hand, you need to know a policy based security that is strong have to evolve from a fairly static policy where like, you might even be able to set an IP address and a port and some configuration So not only do you have to have So one of the challenges you're kind of, uh, touching on is this abstraction In fact, even when you go to IPV six, like, Those are numbers, it comes back to that, moving from a static, you know, it's the pets versus cattle thing. And I know that this endpoint, you know, and also go pod to pod, you know, not just same space level is one of the key differences. the configuration that you have to put in there is, is a lot simpler. Of course, if you aren't using, uh, rancher, you're using some other, So I think it's a great time to look at what's coming next, uh, for your security within your So Paul, we appreciate chief stopping by from ity of Spain,
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Greg Moscarella | PERSON | 0.99+ |
Greg Muscarella | PERSON | 0.99+ |
Spain | LOCATION | 0.99+ |
Paul | PERSON | 0.99+ |
January | DATE | 0.99+ |
SUSE | ORGANIZATION | 0.99+ |
10 centimeters | QUANTITY | 0.99+ |
Keith Townsend | PERSON | 0.99+ |
Enrique | PERSON | 0.99+ |
Greg | PERSON | 0.99+ |
last week | DATE | 0.99+ |
one | QUANTITY | 0.99+ |
2000 pound | QUANTITY | 0.99+ |
one question | QUANTITY | 0.99+ |
Valencia Spain | LOCATION | 0.98+ |
2022 | DATE | 0.97+ |
Coon | ORGANIZATION | 0.97+ |
both | QUANTITY | 0.97+ |
Kubernetes | TITLE | 0.97+ |
first time | QUANTITY | 0.97+ |
two big problems | QUANTITY | 0.97+ |
single interface | QUANTITY | 0.96+ |
IPV six | OTHER | 0.96+ |
Cloudnativecon | ORGANIZATION | 0.96+ |
Kubecon | ORGANIZATION | 0.95+ |
ingress | ORGANIZATION | 0.95+ |
today | DATE | 0.95+ |
each | QUANTITY | 0.95+ |
SQL | TITLE | 0.93+ |
5g | QUANTITY | 0.93+ |
SUSE | TITLE | 0.92+ |
ES | TITLE | 0.92+ |
red hat | ORGANIZATION | 0.9+ |
zero | QUANTITY | 0.9+ |
hundreds | QUANTITY | 0.88+ |
Kubernetes | ORGANIZATION | 0.87+ |
Keith towns | PERSON | 0.84+ |
vector five | OTHER | 0.84+ |
last night | DATE | 0.84+ |
vector five | TITLE | 0.83+ |
Europe | LOCATION | 0.83+ |
Rico Sinte | PERSON | 0.82+ |
three months ago | DATE | 0.81+ |
cuon cloud native con | ORGANIZATION | 0.79+ |
cloud native con | ORGANIZATION | 0.79+ |
SA | ORGANIZATION | 0.79+ |
couple years | QUANTITY | 0.78+ |
2 65 | COMMERCIAL_ITEM | 0.76+ |
about | DATE | 0.73+ |
Rico | PERSON | 0.72+ |
SA | LOCATION | 0.71+ |
single connection | QUANTITY | 0.63+ |
rancher | ORGANIZATION | 0.63+ |
French | OTHER | 0.6+ |
egress | ORGANIZATION | 0.58+ |
reasons | QUANTITY | 0.57+ |
20 | LOCATION | 0.56+ |
foundation | ORGANIZATION | 0.56+ |
CU | ORGANIZATION | 0.51+ |
five | TITLE | 0.47+ |
Kubernetes | PERSON | 0.46+ |
KU | ORGANIZATION | 0.45+ |
con | EVENT | 0.4+ |
vector | COMMERCIAL_ITEM | 0.36+ |
seven | QUANTITY | 0.35+ |
coupon | EVENT | 0.33+ |
Kristen Newcomer & Connor Gorman, Red Hat | Kubecon + Cloudnativecon Europe 2022
>>The cube presents, Coon and cloud native con Europe, 2022, brought to you by red hat, the cloud native computing foundation and its ecosystem partners. >>Welcome to Valencia Spain in Coon cloud native con 2022 Europe. I'm Keith Townsend, along with my cohot on Rico senior, Etti senior it analyst at gig home. We are talking to amazing people, creators people contributing to all these open source projects. Speaking of open source on Rico. Talk to me about the flavor of this show versus a traditional like vendor show of all these open source projects and open source based companies. >>Well, first of all, I think that the real difference is that this is a real conference. Hmm. So real people talking about, you know, projects about, so the, the open source stuff, the experiences are, you know, on stage and there are not really too many product pitches. It's, it's about, it's about the people. It's about the projects. It's about the, the challenges they had, how they, you know, overcome some of them. And, uh, that's the main difference. I mean, it's very educative informative and the kind of people is different. I mean, developers, you know, SREs, you know, you find ends on people. I mean, people that really do stuff that that's a real difference. I mean, uh, quite challenginghow discussing with them, but really, I mean, because they're really opinionated, but >>So we're gonna get talked to, to a company that has boosts on the ground doing open source since the, almost the start mm-hmm <affirmative> Kirsten newcomer, director of hybrid platform security at red hat and, uh, Connor Gorman, senior principal software engineer at red hat. So Kirsten, we're gonna start with you security and Kubernetes, you know, is Kubernetes. It's a, it's a race car. If I wanted security, I'd drive a minivan. <laugh> >>That's, that's a great frame. I think, I think though, if we stick with your, your car analogy, right, we have seen cars in cars and safety in cars evolve over the years to the point where you have airbags, even in, you know, souped up cars that somebody's driving on the street, a race car, race cars have safety built into, right. They do their best to protect those drivers. So I think while Kubernetes, you know, started as something that was largely, you know, used by Google in their environment, you know, had some perimeter based security as Kubernetes has become adopted throughout enterprises, as people. And especially, you know, we've seen the adoption accelerate during the pandemic, the move to both public cloud, but also private cloud is really accelerated. Security becomes even more important. You can't use Kubernetes in banking without security. You can't use it, uh, in automotive without security telco. >>And Kubernetes is, you know, Telco's adoption, Telco's deploying 5g on Kubernetes on open shift. Um, and, and this is just so the security capabilities have evolved over time to meet the customers and the adopters really red hat because of our enterprise customer base, we've been investing in security capabilities and we make those contributions upstream. We've been doing that really from the beginning of our adoption of Kubernetes, Kubernetes 1.0, and we continue to expand the security capabilities that we provide. And which is one of the reasons, you know, the acquisition of stack rocks was, was so important to us. >>And, and actually we are talking about security at different levels. I mean, so yeah, and different locations. So you are securing an edge location differently than a data center or, or, or maybe, you know, the cloud. So there are application level security. So there are so many angles to take this. >>Yeah. And, and you're right. I mean, I, there are the layers of the stack, which starts, you know, can start at the hardware level, right. And then the operating system, the Kubernetes orchestration all the services, you need to have a complete Kubernetes solution and application platform and then the services themselves. And you're absolutely right. That an edge deployment is different than a deployment, uh, on, you know, uh, AWS or in a private da data center. Um, and, and yet, because there is this, if you, if you're leveraging the heart of Kubernetes, the declarative nature of Kubernetes, you can do Kubernetes security in a way that can be consistent across these environments with the need to do some additions at the edge, right? You may, physical security is more important at the edge hardware based encryption, for example, whereas in a, in a cloud provider, your encryption might be at the cloud provider storage layer rather than hardware. >>So how do you orchestrate, because we are talking about orchestration all day and how do you orchestrate all these security? >>Yep. So one of the things, one of the evolutions that we've seen in our customer base in the last few years is we used to have, um, a small number of large clusters that our customers deployed and they used in a multi-tenant fashion, right? Multiple teams from within the organization. We're now starting to see a larger number of smaller clusters. And those clusters are in different locations. They might be, uh, customers are both deploying in public cloud, as well as private, you know, on premises, um, edge deployments, as you mentioned. And so we've invested in, uh, multi cluster management and, or, you know, sort of that orchestration for orchestrators, right? The, and because again of the declarative nature of Kubernetes, so we offer, uh, advanced cluster management, red hat, advanced cluster management, which we open sourced as the multi cluster engine CE. Um, so that component is now also freely available, open source. We do that with everything. So if you need a way to ensure that you have managed the configuration appropriately across all of these clusters in a declarative fashion, right. It's still YAML, it's written in YAML use ACM use CE in combination with a get ops approach, right. To manage that, uh, to ensure that you've got that environment consistent. And, and then, but then you have to monitor, right. You have to, I'm wearing >>All of these stack rocks >>Fits in. I mean, yeah, sure. >>Yeah. And so, um, you know, we took a Kubernetes native approach to securing all of this. Right. And there's kind of, uh, we have to say, there's like three major life cycles. You have the build life cycle, right. You're building these imutable images to go deployed to production. Right. That should never change that are, you know, locked at a point in time. And so you can do vulnerability scanning, you can do compliance checks at that point right. In the build phase. But then you put those in a registry, then those go and be deployed on top of Kubernetes. And you have the configuration of your application, you know, including any vulnerabilities that may exist in those images, you have the R back permissions, right. How much access does it have to the cluster? Is it exposed on the internet? Right. What can you do there? >>And then finally you have, the runtime perspective of is my pod is my container actually doing what I think it's supposed to do. Is it accessing all the right things? Is it running all the right processes? And then even taking that runtime information and influencing the configuration through things like network policies, where we have a feature called process baselining that you can say exactly what processes are supposed to run in this pod. Um, and then influencing configuration in that way to kind of be like, yeah, this is what it's doing. And let's go stamp this, you know, declaratively so that when you deploy it the next time you already have security built in at the Kubernetes level. >>So as we've talked about a couple of different topics, the abstraction layers, I have security around DevOps. So, you know, I have multi tendency, I have to deal with, think about how am I going to secure the, the, the Kubernetes infrastructure itself. Then I have what seems like you've been talking about here, Connor, which is dev SecOps mm-hmm <affirmative> and the practice of securing the application through policy. Right. Are customers really getting what's under the hood of dev SecOps? >>Do you wanna start or yeah. >>I mean, I think yes and no. I think, um, you know, we've, some organizations are definitely getting it right. And they have teams that are helping build things like network policies, which provide network segmentation. I think this is huge for compliance and multi-tenancy right. Just like containers, you know, one of the main benefits of containers, it provides this isolation between your applications, right? And then everyone's familiar with the network firewall, which is providing network segmentation, but now in between your applications inside Kubernetes, you can create, uh, network segmentation. Right. And so we have some folks that are super, super far along that path and, and creating those. And we have some folks who have no network policies except the ones that get installed with our products. Right. And then we say, okay, how can we help you guys start leveraging these things and, and creating maybe just basic name, space isolation, or things like that. And then trying to push that back into more the declarative approach. >>So some of what I think we hear from, from what Connor just te teed up is that real DevSecOps requires breaking down silos between developers, operations and security, including network security teams. And so the Kubernetes paradigm requires, uh, involvement actually, in some ways, it, it forces involvement of developers in things like network policy for the SDN layer, right? You need to, you know, the application developer knows which, what kinds of communication he or she, his app or her app needs to function. So they need to define, they need to figure out those network policies. Now, some network security teams, they're not familiar with YAML, they're not necessary familiar with software development, software defined networking. So there's this whole kind of, how do we do the network security in collaboration with the engineering team? And when people, one of the things I worry about, so DevSecOps it's technology, but it's people in process too. >>Right. And one of the things I think people are very comfortable adopting vulnerability scanning early on, but they haven't yet started to think about the network security angle. This is one area that not only do we have the ability in ACS stack rocks today to recommend a network policy based on a running deployment, and then make it easy to deploy that. But we're also working to shift that left so that you can actually analyze app deployment data prior to it being deployed, generate a network policy, tested out in staging and, and kind of go from the beginning. But again, people do vulnerability analysis shift left, but they kind of tend to stop there and you need to add app config analysis, network communication analysis, and then we need appropriate security gates at deployment time. We need the right automation that helps inform the developers. Not all developers have security expertise, not all security people understand a C I C D pipeline. Right. So, so how, you know, we need the right set of information to the right people in the place they're used to working in order to really do that infinity loop. >>Do you see this as a natural progression for developers? Do they really hit a wall before, you know, uh, finding out that they need to progress in, in this, uh, methodology? Or I know >>What else? Yeah. So I think, I think initially there's like a period of transition, right? Where there's sometimes there's opinion, oh, I, I ship my application. That's what I get paid for. That's what I do. Right. <laugh> um, and, and, but since, uh, Kubernetes has basically increased the velocity of developers on top, you know, of the platform in order to just deploy their own code. And, you know, we have every, some people have commits going to production, you know, every commitment on the repo goes to production. Right. Um, and so security is even more at the forefront there. So I think initially you hit a little bit of a wall security scans in CI. You could get some failures and some pushback, but as long as these are very informative and actionable, right. Then developers always wanna do the right thing. Right. I mean, we all want to ship secure code. >>Um, and so if you can inform you, Hey, this is why we do this. Or, or here's the information about this? I think it's really important because I'm like, right, okay. Now when I'm sending my next commits, I'm like, okay, these are some constraints that I'm thinking about, and it's sort of like a mindset shift, but I think through the tooling that we like know and love, and we use on top of Kubernetes, that's the best way to kind of convey that information of, you know, honestly significantly smaller security teams than the number of developers that are really pushing all of this code. >>So let's scale out what, talk to me about the larger landscape projects like prime cube, Litner, OPPI different areas of investment in, in, in security. Talk to me about where customers are making investments. >>You wanna start with coup linter. >>Sure. So coup linter was a open source project, uh, when we were still, uh, a private company and it was really around taking some of our functionality on our product and just making it available to everyone, to basically check configuration, um, both bridging DevOps and SecOps, right? There's some things around, uh, privileged containers, right? You usually don't wanna deploy those into your environment unless you really need to, but there's other things around, okay, do I have anti affinity rules, right. Am I running, you know, you can run 10 replicas of a pod on the same node, and now your failure domain is a single node. Now you want them on different nodes, right. And so you can do a bunch of checks just around the configuration DevOps best practices. And so we've actually seen quite a bit of adoption. I think we have like almost 2000 stars on, uh, and super happy to see people just really adopt that and integrate it into their pipelines. It's a single binary. So it's been super easy for people to take it into their C I C D and just, and start running three things through it and get, uh, you know, valuable insights into, to what configurations they should change. Right. >>And then if you're, if you were asking about things like, uh, OPPA, open policy agent and OPPA gatekeeper, so one of the things happening in the community about OPPA has been around for a while. Uh, they added, you know, the OPPA gatekeeper as an admission controller for Cobe. There's also veno another open source project that is doing, uh, admission as the Kubernetes community has, uh, kind of is decided to deprecate pod security policies, um, which had a level of complexity, but is one of the key security capabilities and gates built into Kubernetes itself. Um, OpenShift is gonna continue to have security context constraints, very similar, but it prevents by default on an OpenShift cluster. Uh, not a regular user cannot deploy a privileged pod or a pod that has access to the host network. Um, and there's se Linux configuration on by default also protects against container escapes to the file system or mitigates them. >>So pod security policies were one way to ensure that kind of constraint on what the developer did. Developers might not have had awareness of what was important in terms of the level of security. And so again, the cube and tools like that can help to inform the developer in the tools they use, and then a solution like OPPA, gatekeeper, or SCCs. That's something that runs on the cluster. So if something got through the pipeline or somebody's not using one of these tools, those gates can be leveraged to ensure that the security posture of the deployment is what the organization wants and OPPA gatekeeper. You can do very complex policies with that. And >>Lastly, talk to me about Falco and Claire, about what Falco >>Falco and yep, absolutely. So, um, Falco, great runtime analysis have been and something that stack rocks leveraged early on. So >>Yeah, so yeah, we leveraged, um, some libraries from Falco. Uh, we use either an EB P F pro or a kernel module to detect runtime events. Right. And we, we primarily focus on network and process activity as, um, as angles there. And then for Claire, um, it's, it's now within red hat again, <laugh>, uh, through the acquisition of cores, but, uh, we've forked in added a bunch of things around language vulnerabilities and, and different aspects that we wanted. And, uh, and you know, we're really interested in, I think, you know, the code bases have diversion a little bit Claire's on V4. We, we were based off V2, but I think we've both added a ton of really great features. And so I'm really looking forward to actually combining all of those features and kind of building, um, you know, we have two best of best of breed scanners right now. And I'm like, okay, what can we do when we put them together? And so that's something that, uh, I'm really excited about. >>So you, you somehow are aiming at, you know, your roadmap here now putting everything together. And again, orchestrated well integrated yeah. To, to get, you know, also a simplified experience, because that could be the >>Point. Yeah. And, and as you mentioned, you know, it's sort of that, that orchestration of orchestrators, like leveraging the Kubernetes operator principle to, to deliver an app, an opinionated Kubernetes platform has, has been one of the key things we've done. And we're doing that as well for security out of the box security policies, principles based on best practices with stack rocks that can be leveraged in the community or with red hat, advanced cluster security, combining our two scanners into one clear based scanner, contributing back, contributing back to Falco all of these things. >>Well, that speaks to the complexity of open source projects. There's a lot of overlap in reconciling. That is a very difficult thing. Kirsten Connor, thank you for joining the cube Connor. You're now a cube alone. Welcome to main elite group. Great. From Valencia Spain, I'm Keith Townsend, along with en Rico senior, and you're watching the cue, the leader in high tech coverage.
SUMMARY :
The cube presents, Coon and cloud native con Europe, 2022, brought to you by red hat, Talk to me about the flavor of the challenges they had, how they, you know, overcome some of them. we're gonna start with you security and Kubernetes, you know, is Kubernetes. And especially, you know, we've seen the adoption accelerate during And which is one of the reasons, you know, the acquisition of stack rocks was, was so important to than a data center or, or, or maybe, you know, the cloud. the Kubernetes orchestration all the services, you need to have a complete Kubernetes in, uh, multi cluster management and, or, you know, I mean, yeah, sure. And so you can do vulnerability scanning, And let's go stamp this, you know, declaratively so that when you So, you know, I have multi tendency, I mean, I think yes and no. I think, um, you know, we've, some organizations are definitely getting You need to, you know, So, so how, you know, we need the right set of information you know, we have every, some people have commits going to production, you know, every commitment on the repo goes to production. that's the best way to kind of convey that information of, you know, honestly significantly smaller security Talk to me about where customers And so you can do a bunch of checks just around the configuration DevOps best practices. Uh, they added, you know, the OPPA gatekeeper as an admission controller ensure that the security posture of the deployment is what the organization wants and So And, uh, and you know, we're really interested in, I think, you know, the code bases have diversion a little bit you know, also a simplified experience, because that could be the an opinionated Kubernetes platform has, has been one of the key things we've Kirsten Connor, thank you for joining the
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Keith Townsend | PERSON | 0.99+ |
Telco | ORGANIZATION | 0.99+ |
Kirsten Connor | PERSON | 0.99+ |
Connor Gorman | PERSON | 0.99+ |
Kirsten | PERSON | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
10 replicas | QUANTITY | 0.99+ |
ORGANIZATION | 0.99+ | |
Kristen Newcomer | PERSON | 0.99+ |
Connor | PERSON | 0.99+ |
red hat | ORGANIZATION | 0.99+ |
Valencia Spain | LOCATION | 0.99+ |
Red Hat | ORGANIZATION | 0.99+ |
one | QUANTITY | 0.99+ |
Rico | ORGANIZATION | 0.99+ |
Falco | ORGANIZATION | 0.99+ |
two | QUANTITY | 0.98+ |
anner | PERSON | 0.98+ |
Linux | TITLE | 0.98+ |
Kubernetes | TITLE | 0.98+ |
Claire | PERSON | 0.97+ |
two scanners | QUANTITY | 0.97+ |
OpenShift | TITLE | 0.97+ |
both | QUANTITY | 0.97+ |
Cloudnativecon | ORGANIZATION | 0.97+ |
Kubernetes 1.0 | TITLE | 0.97+ |
telco | ORGANIZATION | 0.97+ |
single node | QUANTITY | 0.95+ |
one way | QUANTITY | 0.95+ |
DevOps | TITLE | 0.94+ |
pandemic | EVENT | 0.94+ |
2022 | DATE | 0.94+ |
prime cube | COMMERCIAL_ITEM | 0.93+ |
SecOps | TITLE | 0.93+ |
OPPA | TITLE | 0.92+ |
one area | QUANTITY | 0.91+ |
Kirsten newcomer | PERSON | 0.9+ |
Kubecon | ORGANIZATION | 0.9+ |
almost 2000 stars | QUANTITY | 0.89+ |
Coon | ORGANIZATION | 0.87+ |
single binary | QUANTITY | 0.87+ |
today | DATE | 0.84+ |
Europe | LOCATION | 0.82+ |
three | QUANTITY | 0.77+ |
Cobe | PERSON | 0.75+ |
three major life | QUANTITY | 0.73+ |
5g | QUANTITY | 0.72+ |
coup linter | TITLE | 0.71+ |
Manish Devgan, Hazelcast | Kubecon + Cloudnativecon Europe 2022
>>The cube presents, Coon and cloud native con Europe, 2022. Brought to you by red hat, the cloud native computing foundation and its ecosystem partners. >>Welcome to Licia Spain and cube con cloud native con 2022 Europe. I'm Keith Townsend, along with Paul Gillon senior editor, enterprise architecture for Silicon angle. We're gonna talk to some amazing folks. Day two coverage of Q con cloud native con Paul. We did the wrap up yesterday. Great. A great back and forth about what en Rico about yesterday's, uh, session. What are you looking for to today? >>I'm looking for, uh, to understand better, uh, how Kubernetes is being put into production, the types of applications that are being built on top of it. Yesterday, we talked a lot about infrastructure today. I think we're gonna talk a little bit more about applications, including with our first guest. >>Yeah, I was speaking our first guest. We have ish Degan CPO chief product officer at Hazelcast Hazelcast has been on the program before, but you, this is your first time in the queue, correct? >>It, it is Keith. Yeah. Well, >>Welcome to been Cuban. So we're talking data, which is always a fascinating topic. Containers are, have been known for not being supportive of stateful applications. At least you shouldn't hold the traditional thought. You shouldn't hold stateful data in containers. Tell me about the relationship between Hazel cast and containers we're at Cuan. >>Yeah, so a little bit about, uh, Hazelcast. We are a real time data platform and, uh, we are not a database, but a data platform because we basically allow, uh, data at rest as well as data in motion. So you can imagine that if you're writing an application, you can basically query and join a data coming in events, as well as data, which might have been persisted. So you can do both stream processing as well as, you know, low latency data access. And, and this platform of course, is supported on all the clouds. And we kind of delegate the orchestration of this kind of scale out system to Kubernetes. Um, and you know, that provides a resiliency and many things which go along with that. >>So you say you don't, you're not a database platform. What are you used for to manage the data? >>So we are, uh, we are memory first. So we are, you know, we started with low latency applications, but then we realized that real time has really become a business term. It's it's more of a business SLA mm-hmm, <affirmative>, it's really the, we see the opportunity, the punctuated change, which is happening in the market today is about real time data access to real time. I mean, there are real time applications. Our customers are building around real time offers, um, realtime thread detection. I mean, just imagine, you know, one of our customers like B and P par bars, they have, they basically originate a loan while the customer is banking. So you are in an ATM machine and you swipe your card and you are asking for, you know, taking 50 euros out. And at that point they can actually originate a custom loan offer based on your existing balance you're existing request and your credit score in that moment. So that's a value moment for them and they actually saw 400% loan origination go up because of that, because nobody's gonna be thinking about a credit, uh, line of credit after they're done banking. So it's in that value moment and we allow basically our data platform allows you to have fast access to data and also process incoming streams. So not before they get stored, but as they're coming in. >>So if I'm a developer and cuon is definitely a conference for developer and I, I come to the booth and I hear <inaudible>, that's the end value. I, I hear what I can do with my application. I guess the question is, how do I get there? I mean, uh, if it's not a database, how do I make a call from a container to, from my microservice to Hazel cath? Like, do I think of this as a, uh, a CNI or, or C CSI? How do I access >>PA care? Yeah. So, so we, uh, you know, we are, our server is actually built in Java. So a lot of the application which get written on top of the data platform are basically accessing through Java APIs. Or as you have a.net shop, you can actually use.net API. So we are basically an API first platform and SQL is basically the polyglot way of accessing data, both streaming data, as well as it store data. So most of the application developers, a lot of it is run done in microservices, and they're doing these fast get inputs for data. So they, they have a key, they want to get to a customer, they give a customer ID. And the beauty is that, um, while they're processing the events, they can actually enrich it because you need contextual information as well. So going back to the ATM example, you know, at that event happened, somebody swiped the card and ask for 50 euros, and now you want more information like credit score information, all that needs to be combined in that, in that value moment. >>So we allow you to do those joins and, you know, the contextual information is very important. So you see a lot of streaming platform out there, which just do streaming, but if you're an application developer, like you asked, you have to basically do call out to a streaming platform to get, um, to do streaming analytics and then do another call to get the context of that. You know, what is the credit score for this customer? But whereas in our case, because the data platform supports both streaming as well as data at rest, you can do that in one call and, you know, you don't want to have the operational complexity to stand out. Two different scale out servers is, is, is, is humongous, right? I mean, you want to build your business application. So, >>So you are querying data streaming data and data rest yes. In the same query >>Yes. In the same query. And we are memory first. So what happens is that we store a lot of the hot data in memory. So we have a scale out Ram based server. So that's where you get the low latency from. In fact, last year we did a benchmark. We were able to process a billion events a second, uh, with 99% of the latency under 30 milliseconds. So that kind of processing and that kind of power is, and, and the most important thing is determinism. I mean, you know, there's a lot of, um, if you look at real time, what real time is, is about this predictable latency at scale, because ultimately your, your adhering to a business SLA is not about milliseconds or microsecond. It's what your business needs. If your business needs that you need to deny or, uh, approve a credit credit card transaction in 50 milliseconds, that's your business SLA, and you need that predictability for every transaction. >>So talk to us about how how's this packaged in consumed. Cause I'm hearing a, a bunch of server Ram I'm hearing numbers that we're trying to adapt away from at this conference. We don't wanna see the onlay. We just want to use it. >>Yeah. So, so we kind of take a bit that, that complexity of managing this scale out, um, uh, uh, cluster, which actually utilizes Rams from each server. And then, you know, if you, you can configure it so that the hard set of data is in Ram, but the data, which is, you know, not so hard can actually go into a tiered storage model. So we are memory first. So, but what you are doing is you're doing simple, it's an API. So you do basically a crud, right? You create records, you read them through SQL. So for you, it's, it's, it's kind of like how you access that database. And we also provide you, you know, real time is also a journey. I mean, a lot of customers, you know, you don't want to rip their existing system and deploy another kind of scale out platform. Right? So we, we see a lot of these use cases where they have a database and we can sit in between the database, a system of record and the application. So we are kind of in between there. So that's, that's the journey you can take to real time. >>How does Kubernetes, uh, containers and Kubernetes change the game for real time analytics? >>Yeah. So, uh, Kubernetes does change it because what's hap first of all, we service most of the operational workloads. So it's, it's more on the, a lot of our customers. We have most, most of the big banks credit card companies in financial services and retail. Those are the two big sectors for us. And first of all, you know, a lot of these operational workloads are moving to the cloud and with move to the cloud, they're actually taking their existing applications and, and moving to, you know, one of the providers and to kind of orchestrate this scale out platform, which does auto scaling, that's where the benefit comes from mm-hmm <affirmative>. And it also gives them the freedom of choice. So, you know, the Kubernetes is, you know, a standard which goes across cloud providers. So that gives them the benefit that they can actually take their application. And if they want, they can actually move it to a different, a different cloud provider because we take away the orchestration complexity, you know, in that abstraction layer. >>So what happens when I need to go really fast? I mean, I, I, I need, uh, I'm looking at bare metal and I'm looking at really scaling a, a, a homogeneous application in a single data center set of data centers. Is there a bare metal play here? >>Yes. There, there, there are some very, very, uh, like if you want microsecond latency, mm-hmm, <affirmative>, um, you know, we have customers who actually store two to four terabytes in Ram and, and they can actually stand up. Um, you know, again, it depends on what kind of deployment you want. You can either scale up or scale out, scaling up is expensive, you know, because those boxes are not cheap, but if you have a requirement like that, where there is sub millisecond or microphone latency requirement, you could actually store the entire data set. I mean, a lot of the operational data sets are under four terabytes. So it's not uncommon that you could actually take the entire operational transactional data set, actually move, move that to a pure Ram. But, uh, I think now we, we also see that these operational workloads are also, there's a need for analytics to be done on top as well. >>I mean, we, going back to the example I gave you, so this, this, uh, customer is not only doing stream crossing, they're also influencing a machine learning algorithm in that same, in the same kind of cycle in the life cycle. So they might have trained a machine learning or algorithm on a data lake somewhere, but once they're ready, they're actually influencing the ML algorithm in our kind of life cycle right there. So, you know, that that really brings analytics and transactions kind of together because after all transactions are where the real, you know, insights are. >>Yeah. I'm, I'm struggling a little bit with this, with these two different use cases where I have transactional basically a transactional database or transactional data platform alongside a analytics platform. Those are two, like they're two different things. I have a, you know, I, I have spinning rust for one, and then I have memory and, and MBME for another. Uh, and that requires tuning requires DBAs. It requires a lot of overhead, there seems to be some type of secret sauce going on here. >>Yeah. Yeah. So, I mean, you know, we, we basically say that if you are, if you have a business case where you want to make a decision, you know, you, the only chance to succeed is where you are not making a decision tomorrow based on today's data. Right? I mean, the only way to act on that data is today. So the act is a keyword here. We actually let you generate a realtime offer. We, we let you do credit card fraud detection. In that moment, the analytics is about knowing less about acting on it. Right? Most of our applications are machine critical. They're acting on real time. I think when you talk about like the data lakes there, there's actually a real time there as well, but it's about knowing, and we believe that the operational side is where, you know, that value moment is there, you know, what good is, is to know about something tomorrow, you know, if something wrong happened, I mean, it, yeah, so there's a latency squeeze there as well, but we are on, on more on the kind of transaction and operational side. >>I gotcha. Yeah. So help me understand, like integrations. A lot of the, the, when I think of transactions, I'm thinking of SAP, Oracle, where the process is done, or some legacy banking or not legacy or new modern banking app, how does the data get from one platform to a, to Hazel cast so I can make those >>Decisions? Yeah. So we have, uh, this, the streaming engine, we have has a whole bunch of connectors to a lot of data sources. So in fact, most of our use cases already have data sources underneath there, their databases there's KA connectors, you know, joining us because if you look at it, events is, are comprised of transactions. So something, a customer did, uh, a credit card swipe, right. And also events events could be machine or IOT. So it's really unique connectivity and data ingestion before you can process that. So we have, uh, a whole suite of connectors to kind of bring data in, in our platform. >>We've been talking a lot, these last couple of days about, uh, about the edge and about moving processing capability closer to the edge. How do you enable that? >>Yeah. So edge is actually very, very relevant because of what's happening is that, um, you know, if you, if you look at like a edge deployment use case, um, you know, we have a use case where data is being pushed from these different edge devices to cloud data warehouse. Right. But just imagine that you want to be filtering data at the, at, at where it is being originated from, and you wanna push only relevant data to, to maybe a central data lake where you might want to do, you know, train your machine learning models. Mm-hmm <affirmative> so that at the edge, we are actually able to process that data. So Hazel cast will allow you to actually write a data pipeline and do stream processing so that you might want to just push, you know, a part or a subset of data, which applies by the rules. Uh, so there's, there's a big, um, uh, I think edge is, you know, there's a lot of data being generated and you don't want like garbage and garbage out there's there's, there is there's filtration done at the edge. So that only the relevant data lands in a data, data lake or something like that. >>Well, Monash, we really appreciate you stopping by realtime data is an exciting area of coverage for the queue overall from Valencia Spain, I'm Keith Townsend, along with Paul Gillon, and you're watching the queue, the leader in high tech coverage.
SUMMARY :
Brought to you by red hat, What are you looking for to today? the types of applications that are being built on top of it. product officer at Hazelcast Hazelcast has been on the program before, It, it is Keith. At least you shouldn't hold the traditional thought. So you can imagine that if you're writing an application, So you say you don't, you're not a database platform. So we are, you know, we started with low So if I'm a developer and cuon is definitely a conference for developer So a lot of the application which get written on top of the data platform are basically accessing through Java So we allow you to do those joins and, you know, the contextual information is very important. So you are querying data streaming data and data rest yes. I mean, you know, So talk to us about how how's this packaged in consumed. I mean, a lot of customers, you know, you don't want to rip their existing system and deploy another a different cloud provider because we take away the orchestration complexity, you know, So what happens when I need to go really fast? So it's not uncommon that you could after all transactions are where the real, you know, insights are. I have a, you know, I, I have spinning rust for one, you know, that value moment is there, you know, what good is, is to know about something tomorrow, not legacy or new modern banking app, how does the data get from one platform to a, you know, joining us because if you look at it, events is, are comprised of transactions. How do you enable that? um, you know, if you, if you look at like a edge deployment use Well, Monash, we really appreciate you stopping by realtime data is an
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Keith Townsend | PERSON | 0.99+ |
Paul Gillon | PERSON | 0.99+ |
99% | QUANTITY | 0.99+ |
400% | QUANTITY | 0.99+ |
two | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
Hazel cast | ORGANIZATION | 0.99+ |
Java | TITLE | 0.99+ |
Hazelcast | ORGANIZATION | 0.99+ |
50 milliseconds | QUANTITY | 0.99+ |
50 euros | QUANTITY | 0.99+ |
Keith | PERSON | 0.99+ |
Manish Devgan | PERSON | 0.99+ |
yesterday | DATE | 0.99+ |
today | DATE | 0.99+ |
Yesterday | DATE | 0.99+ |
Oracle | ORGANIZATION | 0.99+ |
tomorrow | DATE | 0.99+ |
first guest | QUANTITY | 0.99+ |
first time | QUANTITY | 0.99+ |
Valencia Spain | LOCATION | 0.99+ |
50 euros | QUANTITY | 0.99+ |
SQL | TITLE | 0.99+ |
one call | QUANTITY | 0.99+ |
four terabytes | QUANTITY | 0.98+ |
both | QUANTITY | 0.98+ |
one | QUANTITY | 0.98+ |
each server | QUANTITY | 0.98+ |
one platform | QUANTITY | 0.98+ |
SAP | ORGANIZATION | 0.98+ |
first | QUANTITY | 0.97+ |
under 30 milliseconds | QUANTITY | 0.97+ |
first platform | QUANTITY | 0.97+ |
a billion events | QUANTITY | 0.95+ |
Coon | ORGANIZATION | 0.94+ |
2022 | DATE | 0.94+ |
single | QUANTITY | 0.94+ |
two different things | QUANTITY | 0.94+ |
Kubecon | ORGANIZATION | 0.93+ |
Cloudnativecon | ORGANIZATION | 0.93+ |
two different use cases | QUANTITY | 0.92+ |
Day two | QUANTITY | 0.92+ |
two big sectors | QUANTITY | 0.91+ |
red hat | ORGANIZATION | 0.87+ |
Europe | LOCATION | 0.84+ |
use.net | OTHER | 0.83+ |
under four terabytes | QUANTITY | 0.82+ |
Two different scale | QUANTITY | 0.78+ |
Kubernetes | ORGANIZATION | 0.75+ |
a second | QUANTITY | 0.72+ |
Kubernetes | TITLE | 0.71+ |
cube con cloud native con | ORGANIZATION | 0.7+ |
cloud native con | ORGANIZATION | 0.67+ |
Degan | PERSON | 0.66+ |
Silicon | LOCATION | 0.63+ |
Licia Spain | ORGANIZATION | 0.62+ |
Hazel cath | ORGANIZATION | 0.61+ |
con cloud native con | ORGANIZATION | 0.58+ |
Rico | LOCATION | 0.57+ |
Cuban | OTHER | 0.56+ |
Monash | ORGANIZATION | 0.55+ |
Hazel | TITLE | 0.53+ |
Cuan | LOCATION | 0.53+ |
foundation | ORGANIZATION | 0.52+ |
Q | EVENT | 0.51+ |
last couple | DATE | 0.5+ |
CNI | TITLE | 0.46+ |
C | TITLE | 0.45+ |
Paul | PERSON | 0.44+ |
2022 | EVENT | 0.33+ |
Day 1 Wrap Up | Kubecon + Cloudnativecon Europe 2022
>>The cube presents, Coon and cloud native con Europe 22, brought to you by the cloud native computing foundation. >>Welcome to Valencia Spain and coverage of Q con cloud native con Europe, 2022. I'm Keith Townsend. You're a host of the cube along with Paul Gillum, senior editor, enterprise architecture for Silicon angle, ENCO, senior ready, senior it analyst for giga own. Uh, this has been a full day, 7,500 attendees. I might have seen them run out of food. This is just unexpected. I mean, they, the, it escalated from what understand it went from four, capping it off to 4,000 gold, 5,000 gold in and off. Finally at 7,500 people. I'm super excited for, you know, today's been a great day of coverage. I'm super excited for tomorrow's coverage, uh, from the cube. But first off, we'll let the, the new person on stage take the, the first question of, of the wrap up of the day of coverage, UN Rico on Rico. What's different about this year versus other Q coupons or cloud native conversations. >>I, I think in general, it's the maturity. So we talk it a lot about day two operations, uh, observability monitoring, uh, going deeper and deeper in the security aspects of the application. So this means that for many enterprises, Kubernetes is becoming real critical. They want to, to get more control of it. And of course you have the discussion around Phen op around, you know, uh, cost control because we are deploying Kubernetes everywhere. And, and if you don't have everything optimized control, monitor it, you know, uh, cost to the roof and think about, uh, deploying the public cloud. If your application is not optimized, you're paying more, but also in the on premises, if you are not optimiz, you don't have the clear idea of what is going to happen. So capacity planning become the nightmare that we know from the past. So there is a lot of going on around these topics, uh, really exciting, actually less infrastructure, more replication. That is what Kubernetes is India. >>Paul help me separate some of the signal from the noise. Uh, there is a lot going on a lot of overlap. What are some of the big themes of takeaways for day one that enterprise architects executives need to take home and really chew >>On? Well, the Kubernetes was a turning point. You know, Docker was introduced nine years ago and for the first three or four years, it was an interesting technology that was not very widely adopted. Kubernetes came along and gave developers a reason to use containers. What strikes me about this conference is that this is a developer event, you know, ordinarily you go to conferences and it's geared toward it managers towards CIOs. This is very much geared toward developers when you have the hearts and minds of developers, the rest of the industry is sort of pulled along with it. So this is ground zero for the hottest, uh, the, the hottest area of the entire computing industry. Right now, I is in this area building distributed services, BA microservices based cloud native applications. And it's the developers who are leading the way. I think that's, that's a significant shift. I don't see the managers here, the CIOs here, these are the people who are, uh, who are pulling this industry into the next generation. >>Um, one of the interesting things that I've seen when we, you know, we've always said, Kubernetes is for the developers, but we talk with, uh, an icon from, uh, MoneyGram. Who's a end user, he's an enterprise architect. And he brought Kubernetes to his front end developers and they, they, they kind of rejected it. They said, what is this? I just wanna develop cold. So when we say Kubernetes is for developers, or the developers are here, where, how do we reconcile that mismatch of experience? We have enterprise architecture. I hear constantly that, that the, uh, Kubernetes is for developers, but is it a certain kind of developer that Kubernetes is for? >>Well, yes and no. I mean, so the paradigm is changing. Okay. So, and maybe a few years back, it was tough to understand how, you know, uh, uh, make your application different. So microservices, everything was new for everybody, but actually, so everything is changed to a point. Now, the developer understands, you know, it is neural. So, you know, going through the application APIs automation, because the complexity of this application is, is huge. And you have, you know, 7 24 kind of development, uh, sort of deployment. So you have to stay always on cetera, et cetera. And actually to the point of, you know, developers, uh, you know, bringing this new generation of, uh, decision makers in India. So they are actually decision, they are adopting technology. Maybe it's a sort of shadow it at the very beginning. So they're adopting it, they're using it. And they're starting to use a lot of open source stuff. And then somebody upper in the stack, the executive says, what are, yeah, they, they discover that the technology is already in place is, uh, is a critical component. And then it's, uh, you know, uh, transformed in something enterprise, meaning, you know, paying enterprise services on top of it to be sure con uh, contract and so on. So it's a real journey. And these are, these guys are the real decision makers. Oh, they are at the base of the decision making process. At least >>Cloud native is something we're gonna learn to take for granted. You know, when you remember back, remember the fail whale in the early days of Twitter, when periodically the service would just would just, uh, um, crash from, uh, from, uh, traffic or Amazon went through the same thing. Facebook went through the same thing. We don't see that anymore because we are now learning to take cloud native for granted. We assume applications are gonna be available. They're gonna be performant. They're gonna scale. They're gonna handle anything. We throw at them that is cloud native at work. And I think we, we forget sometimes how refreshing it is to have, uh, an internet that really works for you. >>Yeah. I, I think we're much earlier in the journey. You know, we have Microsoft, uh, on the Xbox team talked about 22,000 pods running ni D some of the initial problems and pain points of, uh, around those challenges. Uh, much of my hallway track conversation has been centered around as we talk about kind of the decision makers, the platform teams. And this is what I'm getting excited to talk about in tomorrow's coverage. Who's on the ground doing this stuff. Is it developers as we are, as, as we see or hear or told, or is it what we're seeing from the Microsoft example, the MoneyGram example where central it is kind of getting it, and not only are they getting it, they're enabling developers to, to simply write code, build it. And Kubernetes is invisible. It seems like that's become the holy grill to make Kubernetes invisible cloud native invisible, and the experience is much closer to cloud. >>So I, I think that, uh, um, it's an interesting, I mean, I had a lot of conversation in the past year is that it's not that the original, you know, traditional it operations are disappearing. So it's just that, uh, traditional it operation are giving resources to these new developers. Okay. So it's a, it's a sort of walled garden. You don't see the wall, but it's a walled garden. So they are giving you resources and you use these resources like an internal cloud. So a few years back, we were talking about private cloud, the private cloud, as, you know, as a, let's say, uh, the same identical paradigm of, of the public cloud. This is not possible because there are no infinite resources or, well, whatever we, we think are infinite resources. So what you're doing today is giving these developers enough resources to think that they are unlimited and they can, uh, do automatic provisioning and do all these kind of things. So they don't think about infrastructure at all, but actually it's there. So it operation are still there providing resources to let developers be more free and agile and everything. So we are still in a, I think in an interesting time for all of it, >>Kubernetes and cloud native in general, I think are blurring the lines, traditional lines development and operations always were separate entities, obviously through with DevOps. Those two are emerging, but now we're moving. When you add in shift left testing shift, right? Testing, uh, dev SecOps, you see the developers become much more involved in the infrastructure and they want to be involved in infrastructure because that's what makes their applications perform. So this is gonna, cause I think it organizations to have, do some rethinking about what those traditional lines are, maybe break down those walls and have these teams work, work much closer together. And that should be a good thing because the people who are developing applications should also have intimate knowledge of the infrastructure they're gonna run on. >>So Paul, another recurring theme that we've heard here is the impact of funding on resources. What have you, what have your discussions been around founders and creators when it comes to sourcing talent and the impact of the markets on just their day to day? >>Well, the sourcing talent has been a huge issue for the last year. Of course, really ever since the pandemic started interesting. We, uh, one of our, our guests earlier today said that with the meltdown in the tech stock market, actually talent has become more available because people who were tied to their companies because of their, their stock options are now seeing those options are underwater. And suddenly they're not as loyal to the companies they joined. So that's certainly for the, for the startups. Uh, there are many small startups here. Um, they're seeing a bit of a windfall now from the, uh, from the tech stock, uh, bust, um, nevertheless skills are a long term problem. The us, uh, educational system is turning out about 10% of the skilled people that the industry needs every year. And no one I know, sees an end to that issue anytime soon. >>So ENGO, last question to you, let's talk about what that means to the practitioner. There's a lot of opportunity out >>There. >>200 plus sponsors I hear here I think is, or the projects is 200 plus, where are the big opportunities as a practitioner, as I'm thinking about the next thing that I'm going to learn to help me survive the next 10 or 15 years of my career? Where, where do you think the focus should be? Should it be that low level, uh, cloud builder, or should it be at those Le levels of extraction that we're seeing and reading about? >>I, I think, I think that, uh, you know, it's, uh, it's a good question. The, the answer is not that easy. I mean, uh, being a developer today, for sure grants, you, you know, uh, a salary at the end of the month, I mean, there is high demand, but actually there are a lot of other technical, uh, figures in, in the, in, uh, in the data center in the cloud that could, you know, really find easily a job today. So developers is the first in my mind also because they are more, uh, they, they can serve multiple roles. It means you can be a developer, but actually you can be also, you know, with the new roles that we have, especially now with the DevOps, you can be, uh, somebody that supports operation because, you know, automation, you know, a few other things. So you can be a C admin of the next generation, even if you're a developer, even if when you start as a developer, >>Cuan 20, 22 is exciting. I don't care if you're a developer practitioner, a investor, a, uh, it decision maker is CIO CXO. They're so much to learn and absorb here and we're going to be covering it for the next two days. Me and Paul will be shoulder to shoulder. We will, you, I'm not gonna say you're gonna get sick of this because it's just, you know, it's all great information. We'll, we'll, we'll help sort all of this from Valencia Spain. I'm Keith Townsend, along with my host ENCO senior, the Paul Gillon. And you're watching the, you, the leader in high tech coverage.
SUMMARY :
brought to you by the cloud native computing foundation. You're a host of the cube along with Paul So capacity planning become the nightmare that we know from the past. Paul help me separate some of the signal from the noise. And it's the developers who are leading the way. Um, one of the interesting things that I've seen when we, you know, we've always said, Now, the developer understands, you know, it is the early days of Twitter, when periodically the service would just would just, uh, um, Who's on the ground doing this stuff. So they are giving you resources and you use these resources like an internal cloud. So this is gonna, cause I think it organizations to have, do some rethinking about what those traditional and the impact of the markets on just their day to day? 10% of the skilled people that the industry needs every year. So ENGO, last question to you, let's talk about what that means to the practitioner. is the first in my mind also because they are more, uh, they, they can serve multiple roles. the Paul Gillon.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Paul Gillum | PERSON | 0.99+ |
Keith Townsend | PERSON | 0.99+ |
Paul | PERSON | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
ENCO | ORGANIZATION | 0.99+ |
India | LOCATION | 0.99+ |
ORGANIZATION | 0.99+ | |
Microsoft | ORGANIZATION | 0.99+ |
5,000 gold | QUANTITY | 0.99+ |
4,000 gold | QUANTITY | 0.99+ |
Valencia Spain | LOCATION | 0.99+ |
7,500 people | QUANTITY | 0.99+ |
7,500 attendees | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
first | QUANTITY | 0.99+ |
two | QUANTITY | 0.99+ |
tomorrow | DATE | 0.99+ |
Kubernetes | TITLE | 0.99+ |
Paul Gillon | PERSON | 0.99+ |
today | DATE | 0.99+ |
first question | QUANTITY | 0.98+ |
nine years ago | DATE | 0.98+ |
Kubecon | ORGANIZATION | 0.98+ |
2022 | DATE | 0.98+ |
Silicon angle | ORGANIZATION | 0.98+ |
Valencia Spain | LOCATION | 0.98+ |
200 plus | QUANTITY | 0.97+ |
past year | DATE | 0.96+ |
Coon | ORGANIZATION | 0.96+ |
UN Rico | ORGANIZATION | 0.96+ |
pandemic | EVENT | 0.96+ |
15 years | QUANTITY | 0.95+ |
ORGANIZATION | 0.95+ | |
this year | DATE | 0.95+ |
200 plus sponsors | QUANTITY | 0.94+ |
Xbox | COMMERCIAL_ITEM | 0.94+ |
Cloudnativecon | ORGANIZATION | 0.93+ |
about 10% | QUANTITY | 0.93+ |
one | QUANTITY | 0.93+ |
first three | QUANTITY | 0.93+ |
earlier today | DATE | 0.91+ |
DevOps | TITLE | 0.9+ |
MoneyGram | ORGANIZATION | 0.89+ |
Docker | TITLE | 0.89+ |
Kubernetes | ORGANIZATION | 0.89+ |
Europe | LOCATION | 0.88+ |
four years | QUANTITY | 0.86+ |
day one | QUANTITY | 0.85+ |
next two days | DATE | 0.82+ |
10 | QUANTITY | 0.81+ |
few years back | DATE | 0.78+ |
about 22,000 pods | QUANTITY | 0.77+ |
Day | QUANTITY | 0.73+ |
ENGO | ORGANIZATION | 0.7+ |
cloud native con | ORGANIZATION | 0.68+ |
day two | QUANTITY | 0.68+ |
Cuan 20 | PERSON | 0.68+ |
cloud native computing | ORGANIZATION | 0.67+ |
Rico | LOCATION | 0.67+ |
CXO | ORGANIZATION | 0.67+ |
22 | EVENT | 0.62+ |
MoneyGram | TITLE | 0.57+ |
24 | OTHER | 0.53+ |
Q con cloud | ORGANIZATION | 0.52+ |
con | ORGANIZATION | 0.52+ |
four | QUANTITY | 0.51+ |
22 | QUANTITY | 0.43+ |
Matt Provo & Patrick Bergstrom, StormForge | Kubecon + Cloudnativecon Europe 2022
>>The cube presents, Coon and cloud native con Europe 22, brought to you by the cloud native computing foundation. >>Welcome to Melissa Spain. And we're at cuon cloud native con Europe, 2022. I'm Keith Townsend. And my co-host en Rico senior Etti en Rico's really proud of me. I've called him en Rico and said IK, every session, senior it analyst giga, O we're talking to fantastic builders at Cuban cloud native con about the projects and the efforts en Rico up to this point, it's been all about provisioning insecurity. What, what conversation have we been missing? >>Well, I mean, I, I think, I think that, uh, uh, we passed the point of having the conversation of deployment of provisioning. You know, everybody's very skilled, actually everything is done at day two. They are discovering that, well, there is a security problem. There is an observability problem. And in fact, we are meeting with a lot of people and there are a lot of conversation with people really needing to understand what is happening. I mean, in their classroom, what, why it is happening and all the, the questions that come with it. I mean, and, uh, the more I talk with, uh, people in the, in the show floor here, or even in the, you know, in the various sessions is about, you know, we are growing, the, our clusters are becoming bigger and bigger. Uh, applications are becoming, you know, bigger as well. So we need to know, understand better what is happening. It's not only, you know, about cost it's about everything at the >>End. So I think that's a great set up for our guests, max, Provo, founder, and CEO of storm for forge and Patrick Britton, Bergstrom, Brookstone. Yeah, I spelled it right. I didn't say it right. Berg storm CTO. We're at Q con cloud native con we're projects are discussed, built and storm forge. I I've heard the pitch before, so forgive me. And I'm, I'm, I'm, I'm, I'm, I'm kind of torn. I have service mesh. What do I need more like, what problem is storm for solving? >>You wanna take it? >>Sure, absolutely. So it it's interesting because, uh, my background is in the enterprise, right? I was an executive at United health group. Um, before that I worked at best buy. Um, and one of the issues that we always had was, especially as you migrate to the cloud, it seems like the CPU dial or the memory dial is your reliability dial. So it's like, oh, I just turned that all the way to the right and everything's hunky Dory. Right. Uh, but then we run into the issue like you and I were just talking about where it gets very, very expensive, very quickly. Uh, and so my first conversations with Matt and the storm forge group, and they were telling me about the product and, and what we're dealing with. I said, that is the problem statement that I have always struggled with. And I wish this existed 10 years ago when I was dealing with EC two costs, right? And now with Kubernetes, it's the same thing. It's so easy to provision. So realistically, what it is is we take your raw telemetry data and we essentially monitor the performance of your application. And then we can tell you using our machine learning algorithms, the exact configuration that you should be using for your application to achieve the results that you're looking for without over provisioning. So we reduce your consumption of CPU of memory and production, which ultimately nine times outta 10, actually I would say 10 out of 10 reduces your cost significantly without sacrificing reliability. >>So can your solution also help to optimize the application in the long run? Because yes, of course, yep. You know, the lowing fluid is, you know, optimize the deployment. Yeah. But actually the long term is optimizing the application. Yes. Which is the real problem. >>Yep. So we actually, um, we're fine with the, the former of what you just said, but we exist to do the latter. And so we're squarely and completely focused at the application layer. Um, we are, uh, as long as you can track or understand the metrics you care about for your application, uh, we can optimize against it. Um, we love that we don't know your application. We don't know what the SLA and SLO requirements are for your app. You do. And so in, in our world, it's about empowering the developer into the process, not automating them out of it. And I think sometimes AI and machine learning sort of gets a bad wrap from that standpoint. And so, uh, we've at this point, the company's been around, you know, since 2016, uh, kind of from the very early days of Kubernetes, we've always been, you know, squarely focused on Kubernetes using our core machine learning, uh, engine to optimize metrics at the application layer, uh, that people care about and, and need to need to go after. And the truth of the matter is today. And over time, you know, setting a cluster up on Kubernetes has largely been solved. Um, and yet the promise of, of Kubernetes around portability and flexibility, uh, downstream when you operationalize the complexity, smacks you in the face. And, uh, and that's where, where storm forge comes in. And so we're a vertical, you know, kind of vertically oriented solution. Um, that's, that's absolutely focused on solving that problem. >>Well, I don't want to play, actually. I want to play the, uh, devils advocate here and, you know, >>You wouldn't be a good analyst if you didn't. >>So the, the problem is when you talk with clients, users, they, there are many of them still working with Java with, you know, something that is really tough. Mm-hmm <affirmative>, I mean, we loved all of us loved Java. Yeah, absolutely. Maybe 20 years ago. Yeah. But not anymore, but still they have developers. They are porting applications, microservices. Yes. But not very optimized, etcetera. C cetera. So it's becoming tough. So how you can interact with these kind of yeah. Old hybrid or anyway, not well in generic applications. >>Yeah. We, we do that today. We actually, part of our platform is we offer performance testing in a lower environment and stage. And we like Matt was saying, we can use any metric that you care about and we can work with any configuration for that application. So the perfect example is Java, you know, you have to worry about your heap size, your garbage collection tuning. Um, and one of the things that really struck, struck me very early on about the storm forage product is because it is true machine learning. You remove the human bias from that. So like a lot of what I did in the past, especially around SRE and, and performance tuning, we were only as good as our humans were because of what they knew. And so we were, we kind of got stuck in these paths of making the same configuration adjustments, making the same changes to the application, hoping for different results. But then when you apply machine learning capability to that, the machine will recommend things you never would've dreamed of. And you get amazing results out of >>That. So both me and an Rico have been doing this for a long time. Like I have battled to my last breath, the, the argument when it's a bare metal or a VM. Yeah. Look, I cannot give you any more memory. Yeah. And the, the argument going all the way up to the CIO and the CIO basically saying, you know what, Keith you're cheap, my developer resources expensive, my bigger box. Yep. Uh, buying a bigger box in the cloud to your point is no longer a option because it's just expensive. Talk to me about the carrot or the stick as developers are realizing that they have to be more responsible. Where's the culture change coming from? So is it, that is that if it, is it the shift in responsibility? >>I think the center of the bullseye for us is within those sets of decisions, not in a static way, but in an ongoing way, especially, um, especially as the development of applications becomes more and more rapid. And the management of them, our, our charge and our belief wholeheartedly is that you shouldn't have to choose, you should not have to choose between costs or performance. You should not have to choose where your, you know, your applications live, uh, in a public private or, or hybrid cloud environment. And so we want to empower people to be able to sit in the middle of all of that chaos and for those trade-offs and those difficult interactions to no, no longer be a thing. You know, we're at, we're at a place now where we've done, you know, hundreds of deployments and never once have we met a developer who said, I'm really excited to get outta bed and come to work every day and manually tune my application. <laugh> One side, secondly, we've never met, uh, you know, uh, a manager or someone with budget that said, uh, please don't, you know, increase the value of my investment that I've made to lift and shift us over mm-hmm <affirmative>, you know, to the cloud or to Kubernetes or, or some combination of both. And so what we're seeing is the converging of these groups, um, at, you know, their happy place is the lack of needing to be able to, uh, make those trade offs. And that's been exciting for us. So, >>You know, I'm listening and looks like that your solution is right in the middle in application per performance management, observability. Yeah. And, uh, and monitoring. So it's a little bit of all of this. >>So we, we, we, we want to be, you know, the Intel inside of all of that, mm-hmm, <affirmative>, we don't, you know, we often get lumped into one of those categories. It used to be APM a lot. We sometimes get a, are you observability or, and we're really not any of those things in and of themselves, but we, instead of invested in deep integrations and partnerships with a lot of those, uh, with a lot of that tooling, cuz in a lot of ways, the, the tool chain is hardening, uh, in a cloud native and, and Kubernetes world. And so, you know, integrating in intelligently staying focused and great at what we solve for, but then seamlessly partnering and not requiring switching for, for our users who have already invested likely in a APM or observability. >>So to go a little bit deeper. Sure. What does it mean integration? I mean, do you provide data to this, you know, other applications in, in the environment or are they supporting you in the work that you >>Yeah, we're, we're a data consumer for the most part. Um, in fact, one of our big taglines is take your observability and turn it into actionability, right? Like how do you take the it's one thing to collect all of the data, but then how do you know what to do with it? Right. So to Matt's point, um, we integrate with folks like Datadog. Um, we integrate with Prometheus today. So we want to collect that telemetry data and then do something useful with it for you. >>But, but also we want Datadog customers. For example, we have a very close partnership with, with Datadog, so that in your existing data dog dashboard, now you have yeah. This, the storm for capability showing up in the same location. Yep. And so you don't have to switch out. >>So I was just gonna ask, is it a push pull? What is the developer experience? When you say you provide developer, this resolve ML, uh, learnings about performance mm-hmm <affirmative> how do they receive it? Like what, yeah, what's the, what's the, what's the developer experience >>They can receive it. So we have our own, we used to for a while we were CLI only like any good developer tool. Right. Uh, and you know, we have our own UI. And so it is a push in that, in, in a lot of cases where I can come to one spot, um, I've got my applications and every time I'm going to release or plan for a release or I have released, and I want to take, pull in, uh, observability data from a production standpoint, I can visualize all of that within the storm for UI and platform, make decisions. We allow you to, to set your, you know, kind of comfort level of automation that you're, you're okay with. You can be completely set and forget, or you can be somewhere along that spectrum. And you can say, as long as it's within, you know, these thresholds, go ahead and release the application or go ahead and apply the configuration. Um, but we also allow you to experience, uh, the same, a lot of the same functionality right now, you know, in Grafana in Datadog, uh, and a bunch of others that are coming. >>So I've talked to Tim Crawford who talks to a lot of CIOs and he's saying one of the biggest challenges, or if not, one of the biggest challenges CIOs are facing are resource constraints. Yeah. They cannot find the developers to begin with to get this feedback. How are you hoping to address this biggest pain point for CIOs? Yeah. >>Development? >>Just take that one. Yeah, absolutely. That's um, so like my background, like I said, at United health group, right. It's not always just about cost savings. In fact, um, the way that I look about at some of these tech challenges, especially when we talk about scalability, there's kind of three pillars that I consider, right? There's the tech scalability, how am I solving those challenges? There's the financial piece, cuz you can only throw money at a problem for so long. And it's the same thing with the human piece. I can only find so many bodies and right now that pool is very small. And so we are absolutely squarely in that footprint of, we enable your team to focus on the things that they matter, not manual tuning like Matt said. And then there are other resource constraints that I think that a lot of folks don't talk about too. >>Like we were, you were talking about private cloud for instance. And so having a physical data center, um, I've worked with physical data centers that companies I've worked for have owned where it is literally full wall to wall. You can't rack any more servers in it. And so their biggest option is, well, I could spend 1.2 billion to build a new one if I wanted to. Or if you had a capability to truly optimize your compute to what you needed and free up 30% of your capacity of that data center. So you can deploy additional name spaces into your cluster. Like that's a huge opportunity. >>So either out of question, I mean, may, maybe it, it doesn't sound very intelligent at this point, but so is it an ongoing process or is it something that you do at the very beginning mean you start deploying this. Yeah. And maybe as a service. Yep. Once in a year I say, okay, let's do it again and see if something changes. Sure. So one spot 1, 1, 1 single, you know? >>Yeah. Um, would you recommend somebody performance tests just once a year? >>Like, so that's my thing is, uh, previous at previous roles I had, uh, my role was you performance test, every single release. And that was at a minimum once a week. And if your thing did not get faster, you had to have an executive exception to get it into production. And that's the space that we wanna live in as well as part of your C I C D process. Like this should be continuous verification every time you deploy, we wanna make sure that we're recommending the perfect configuration for your application in the name space that you're deploying >>Into. And I would be as bold as to say that we believe that we can be a part of adding, actually adding a step in the C I C D process that's connected to optimization and that no application should be released monitored and sort of, uh, analyzed on an ongoing basis without optimization being a part of that. And again, not just from a cost perspective, yeah. Cost end performance, >>Almost a couple of hundred vendors on this floor. You know, you mentioned some of the big ones, data, dog, et cetera. But what happens when one of the up and comings out of nowhere, completely new data structure, some imaginable way to click to elementry data. Yeah. How do, how do you react to that? >>Yeah. To us it's zeros and ones. Yeah. Uh, and you know, we're, we're, we're really, we really are data agnostic from the standpoint of, um, we're not, we we're fortunate enough to, from the design of our algorithm standpoint, it doesn't get caught up on data structure issues. Um, you know, as long as you can capture it and make it available, uh, through, you know, one of a series of inputs, what one, one would be load or performance tests, uh, could be telemetry, could be observability if we have access to it. Um, honestly the messier, the, the better from time to time, uh, from a machine learning standpoint, um, it, it, it's pretty powerful to see we've, we've never had a deployment where we, uh, where we saved less than 30% while also improving performance by at least 10%. But the typical results for us are 40 to 60% savings and, you know, 30 to 40% improvement in performance. >>And what happens if the application is, I, I mean, yes, Kubernetes is the best thing of the world, but sometimes we have to, you know, external data sources or, or, you know, we have to connect with external services anyway. Mm-hmm <affirmative> yeah. So can you, you know, uh, can you provide an indication also on, on, on this particular application, like, you know, where the problem could >>Be? Yeah, yeah. And that, that's absolutely one of the things that we look at too, cuz it's um, especially when you talk about resource consumption, it's never a flat line, right? Like depending on your application, depending on the workloads that you're running, um, it varies from sometimes minute to minute, day to day, or it could be week to week even. Um, and so especially with some of the products that we have coming out with what we want to do, you know, partnering with, uh, you know, integrating heavily with the HPA and being able to handle some of those bumps and not necessarily bumps, but bursts and being able to do it in a way that's intelligent so that we can make sure that, like I said, it's the perfect configuration for the application regardless of the time of day that you're operating in or what your traffic patterns look like. Um, or you know, what your disc looks like, right? Like cuz with our, our low environment testing, any metric you throw at us, we can, we can optimize for. >>So Madden Patrick, thank you for stopping by. Yeah. Yes. We can go all day. Because day two is I think the biggest challenge right now. Yeah. Not just in Kubernetes, but application replatforming and re and transformation. Very, very difficult. Most CTOs and S that I talked to, this is the challenge space from Valencia Spain. I'm Keith Townsend, along with my host en Rico senior. And you're watching the queue, the leader in high tech coverage.
SUMMARY :
brought to you by the cloud native computing foundation. And we're at cuon cloud native you know, in the various sessions is about, you know, we are growing, I I've heard the pitch before, and one of the issues that we always had was, especially as you migrate to the cloud, You know, the lowing fluid is, you know, optimize the deployment. And so we're a vertical, you know, devils advocate here and, you know, So the, the problem is when you talk with clients, users, So the perfect example is Java, you know, you have to worry about your heap size, And the, the argument going all the way up to the CIO and the CIO basically saying, you know what, that I've made to lift and shift us over mm-hmm <affirmative>, you know, to the cloud or to Kubernetes or, You know, I'm listening and looks like that your solution is right in the middle in all of that, mm-hmm, <affirmative>, we don't, you know, we often get lumped into one of those categories. this, you know, other applications in, in the environment or are they supporting Like how do you take the it's one thing to collect all of the data, And so you don't have to switch out. Um, but we also allow you to experience, How are you hoping to address this And it's the same thing with the human piece. Like we were, you were talking about private cloud for instance. is it something that you do at the very beginning mean you start deploying this. And that's the space that we wanna live in as well as part of your C I C D process. actually adding a step in the C I C D process that's connected to optimization and that no application You know, you mentioned some of the big ones, data, dog, Um, you know, as long as you can capture it and make it available, or, you know, we have to connect with external services anyway. we want to do, you know, partnering with, uh, you know, integrating heavily with the HPA and being able to handle some So Madden Patrick, thank you for stopping by.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Tim Crawford | PERSON | 0.99+ |
Keith Townsend | PERSON | 0.99+ |
30 | QUANTITY | 0.99+ |
40 | QUANTITY | 0.99+ |
1.2 billion | QUANTITY | 0.99+ |
Matt | PERSON | 0.99+ |
Matt Provo | PERSON | 0.99+ |
Datadog | ORGANIZATION | 0.99+ |
storm for forge | ORGANIZATION | 0.99+ |
Patrick Bergstrom | PERSON | 0.99+ |
2016 | DATE | 0.99+ |
Java | TITLE | 0.99+ |
10 | QUANTITY | 0.99+ |
Melissa Spain | PERSON | 0.99+ |
nine times | QUANTITY | 0.99+ |
Valencia Spain | LOCATION | 0.99+ |
40% | QUANTITY | 0.99+ |
less than 30% | QUANTITY | 0.99+ |
10 years ago | DATE | 0.98+ |
United health group | ORGANIZATION | 0.98+ |
both | QUANTITY | 0.98+ |
20 years ago | DATE | 0.98+ |
one | QUANTITY | 0.98+ |
Keith | PERSON | 0.98+ |
once a year | QUANTITY | 0.98+ |
once a week | QUANTITY | 0.98+ |
HPA | ORGANIZATION | 0.98+ |
2022 | DATE | 0.98+ |
Coon | ORGANIZATION | 0.98+ |
30% | QUANTITY | 0.98+ |
first conversations | QUANTITY | 0.97+ |
Cloudnativecon | ORGANIZATION | 0.97+ |
60% | QUANTITY | 0.97+ |
Kubernetes | TITLE | 0.97+ |
Etti | PERSON | 0.97+ |
today | DATE | 0.96+ |
Patrick Britton | PERSON | 0.96+ |
Kubecon | ORGANIZATION | 0.96+ |
StormForge | ORGANIZATION | 0.95+ |
data dog | ORGANIZATION | 0.94+ |
Prometheus | TITLE | 0.94+ |
three pillars | QUANTITY | 0.94+ |
secondly | QUANTITY | 0.94+ |
Rico | ORGANIZATION | 0.93+ |
Q con cloud | ORGANIZATION | 0.93+ |
hundreds of deployments | QUANTITY | 0.92+ |
day two | QUANTITY | 0.92+ |
Europe | LOCATION | 0.92+ |
Kubernetes | ORGANIZATION | 0.92+ |
Intel | ORGANIZATION | 0.92+ |
one spot | QUANTITY | 0.89+ |
at least 10% | QUANTITY | 0.87+ |
one thing | QUANTITY | 0.85+ |
hundred vendors | QUANTITY | 0.83+ |
Once in a year | QUANTITY | 0.83+ |
cuon cloud native con | ORGANIZATION | 0.81+ |
Rico | LOCATION | 0.81+ |
Brookstone | ORGANIZATION | 0.8+ |
Grafana | ORGANIZATION | 0.8+ |
Berg storm CTO | ORGANIZATION | 0.8+ |
SRE | TITLE | 0.79+ |
SLA | TITLE | 0.79+ |
Bergstrom | ORGANIZATION | 0.79+ |
cloud native con | ORGANIZATION | 0.78+ |
single release | QUANTITY | 0.77+ |
storm forge group | ORGANIZATION | 0.75+ |
1 | QUANTITY | 0.75+ |
One side | QUANTITY | 0.74+ |
EC two | TITLE | 0.74+ |
1 single | QUANTITY | 0.74+ |
Patrick | PERSON | 0.74+ |
Christopher Voss, Microsoft | Kubecon + Cloudnativecon Europe 2022
>>The cube presents, Coon and cloud native con Europe 22, brought to you by the cloud native computing foundation. >>Welcome to Valencia Spain in co con cloud native con Europe, 2022. I'm Keith Townsend with my cohos on Rico senior. Etti senior it analyst at gig home. Exactly 7,500 people I'm told en Rico. What's the flavor of the show so far, >>It's a fantastic mood. I mean, I found a lot of people wanting to track talk about what they're doing with Kubernetes, sharing their, you know, stories, some word stories that meet tough. And you know, this is where you learn actually, because we had a lot of zoom calls, webinar and stuff, but it is when you talk a video, oh, I did it this way and it didn't work out very well. So, and, and you start a conversation like this that is really different from learning from zoom. When, you know, everybody talks about things that working well, they did it, right. No, it's here that you learn from other experiences. >>So we're talking to amazing people the whole week, talking about those experiences here on the queue, fresh on the queue for the first time, Chris Vos, senior software engineer at Microsoft Xbox, Chris, welcome to the queue. >>Thank you so much for having >>Me. So first off, give us a high level picture of the environment that you're running at Microsoft. >>Yeah. So, you know, we've got 20, well probably close to 30 clusters at this point around the globe, you know, 700 to a thousand pods per cluster, roughly. So about 22,000 pods total. So yeah, it's pretty pretty sizable footprint and yeah. So we've been running on Kubernetes since 2018 and well actually might be 2017, but anyways, so yeah, that, that's kind of our, our footprint. >>Yeah. So all of that, let's talk about the basics, which is security across multiple I'm assuming containers, work, microservices, et cetera. Why did you and the team settle on link or do >>Yeah, so previously we had our own kind of solution for managing TLS certs and things like that. And we found it to be pretty painful pretty quickly. And so we knew, you know, we wanted something that was a little bit more abstracted away from the developers and, and things like that that allowed us to move quickly. And so we began investigating, you know, solutions to that. And a few of our colleagues went to Cuban in San Diego in 2019 cloud native con as well. And basically they just, you know, sped it all up. And actually funny enough, my, my old manager was one of the people who was there and he went to the link D booth and they had a thing going that was like, Hey, get set up with MTLS in five minutes. And he was like, this is something we want to do, why not check this out? And he was able to do it. And so that, that put it on our radar. And so yeah, we investigated several others and Leer D just perfectly fit exactly what we needed. >>So, so in general, we are talking about, you know, security at scale. So how you manage security to scale and also flexibility, right. But you know, what is the you, this there, you told us about the five minutes to start using there, but you know, again, we are talking about word stories. We talk about, you know, all these. So what, what, what kind of challenges you found at the beginning when you start adopting this technology? >>So the biggest ones were around getting up and running with like a new service, especially in the beginning, right. We were, you know, adding a new service almost every day. It felt like. And so, you know, basically it took someone going through a whole bunch of different repos, getting approvals from everyone to get the SEARCHs minted, all that fun stuff, getting them put into the right environments and in the right clusters to make sure that, you know, everybody is talking appropriately. And just the amount of work that, that took alone was just a huge headache and a huge barrier to entry for us to, you know, quickly move up the number of services we have. So, >>So I'm, I'm trying to wrap my head around the scale of the challenge. When I think about certification or certificate management, I have to do it on a small scale and the, the, every now and again, when a certificate expires, it is just a troubleshooting pain. Yes. So as I think about that, it costs, it's not just certificates across 22,000 pods or it's certificates across 22,000 pods in multiple applications. How were you doing that before link D like, what was the, what and what were the pain points? Like? What happens when a certificate either fails or expired up not, not updated? >>So, I mean, to be completely honest, the biggest thing is we're just unable to make the calls, you know, out or, or in, based on yeah. What is failing basically. But, you know, we saw essentially an uptick in failures around a certain service and pretty quickly, I pretty quickly, we got used to the fact that it was like, oh, it's probably a cert expiration issue. And so we tried, you know, a few things in order to make that a little bit more automated and things like that, but we never came to a solution that like didn't require every engineer on the team to know essentially quite a bit about this, just to get into it, which was a huge issue. >>So talk about day two after you've deployed link D how did this alleviate software engineers and what was like the, the benefits of now having this automated way of managing >>Certs? So the biggest thing is like, there is no touch from developers, everyone on our team. Well, I mean, there are a lot of people who are familiar with security and certs and all of that stuff, but no one has to know it. Like it's not a requirement. Like for instance, I knew nothing about it when I joined the team. And even when I was setting up our newer clusters, I knew very little about it. And I was still able to really quickly set up blinker D, which was really nice. And, and it's been, you know, essentially we've been able to just kind of set it and not think about it too much. Obviously, you know, there are parts of it that you have to think about. We monitor it and all that fun stuff, but, but yeah, it's been pretty painless almost day one. It took a lot, a long time to trust it for developers. You know, anytime there was a failure, it's like, oh, could this be link or D you know, but after a while, like now we don't have that immediate assumption because people have built up that trust, but >>Also you have this massive infrastructure, I mean, 30 cluster. So I guess that it's quite different to manage a single cluster and 30. So what are the, you know, consideration that you have to do to install this software on, you know, 30 different cluster manage different, you know, versions probably etcetera, etcetera, et cetera. >>So, I mean, you know, the, the, as far as like, I guess, just to clarify, are you asking specifically with Linky or are you just asking in more in general? Well, >>I mean, you, you can take the, the question in the, in two ways, so, okay. Yeah. Yes. Link in particular, but the 30 cluster also quite interesting. >>Yeah. So, I mean, you know, more generally, you know, how we manage our clusters and things like that. We have, you know, a CLI tool that we use in order to like, change context very quickly and switch and communicate with whatever cluster we're trying to connect to and, you know, are we debugging or getting logs, whatever. And then, you know, with link D it's nice because again, you know, we, we, aren't having to worry about like, oh, how is this cert being inserted in the right node or, or not the right node, but in the right cluster or things like that. Whereas with link D we don't, we don't really have that concern when we spin up our, our clusters, essentially we get the root certificate and, and everything like that packaged up, passed along to link D on installation. And then essentially there's not much we have to do after that. >>So talk to me about your upcoming coming section here at Q con what's the, what's the high level talking points? Like what, what will attendees learn? >>Yeah. So it's, it's a journey. Those are the sorts of talks that I find useful. Having not been, you know, I, I'm not a deep Kubernetes expert from, you know, decades or whatever of experience, but I think >>Nobody is >>Also true. That's another story. That's a, that's, that's a job posting decades of requirements for >>Of course. Yeah. But so, you know, it, it's a journey it's really just like, Hey, what made us decide on a service mesh in the first place? What made us choose link D and then what are the ways in which, you know, we, we use link D so what are those, you know, we use some of the extra plugins and things like that. And then finally, a little bit about more, what we're gonna do in the future. >>Let's talk about not just necessarily the future as in two or three days from now, or two or three years from now. Well, the future after you immediately solve the, the low level problems with link D what were some of the, the surprises, because link D in service me in general has have side benefits. Do you experience any of those side benefits as well? >>Yeah, it's funny, you know, writing the, the blog post, you know, I hadn't really looked at a lot of the data in years on, you know, when we did our investigations and things like that. And we had seen that we like had very low latency and low CPU utilization and things like that. And looking at some of that, I found that we were actually saving time off of requests. And I couldn't really think of why that was, and I was talking with someone else and the biggest, unfortunately, all that data's gone now, like the source data. So I can't go back and verify this, but it, it makes sense, you know, there's the availability zone routing that linker D supports. And so I think that's actually doing it where, you know, essentially if a node is closer to another node, it's essentially, you know, routing to those ones. So when one service is talking to another service and maybe on they're on the same node, you know, it, it short circuits that, and allows us to gain some, some time there. It's not huge, but it adds up after, you know, 10, 20 calls down the line. Right. >>In general. So you are saying that it's smooth operations in, in ATS, very, you know, simplifying your life. >>And again, we didn't have to really do anything for that. It, it, it handled that for it was there. Yeah. Yep. Yeah, exactly. >>So we know one thing when I do it on my laptop, it works fine when I do it with across 22,000 pods, that's a different experience. What were some of the lessons learned coming out of KU con 2018 in San Diego was there? I wish I would've ran to the microphone folks, but what were some of the hard lessons learned scaling link D across the 22,000 nodes? >>So, you know, the, the first one, and this seems pretty obvious, but was just not something I knew about was the high availability mode of link D so obviously makes sense. You would want that in a, you know, a large scale environment. So like, that's one of the big lessons that like, we didn't ride away. No. Like one of the mistakes we made in, in one of our pre-production clusters was not turning that on. And we were kind of surprised. We were like, whoa, like all of these pods are spinning up, but they're having issues like actually getting injected and things like that. And we found, oh, okay. Yeah, you need to actually give it some, some more resources, but it's still very lightweight considering, you know, they have high availability mode, but it's just a few instances still. >>So from, even from a, you know, binary perspective and running link D how much overhead is it? >>That is a great question. So I don't remember off the top of my head, the numbers, but it's very lightweight. We, we evaluated a few different service missions and it was the lightest weight that we encountered at that point. >>And then from a resource perspective, is it a team of link D people? Is it a couple of people, like how >>To be completely honest for a long time, it was one person, Abraham who actually is the person who proposed this talk. He couldn't make it to Valencia, but he essentially did probably 95% of the work to get a into production. And then this was before we even had a team dedicated to our infrastructure. And so we have, now we have a team dedicated, we're all kind of Linky folks, if not Linky experts, we at least can troubleshoot basically. And things like that. So it's, I think a group of six people on our team, and then, you know, various people who've had experience with it >>On other teams, but I'm not dedicated just to that. >>I mean, >>No one is dedicated just to it. No, it's pretty like pretty light touch once it's, once it's up and running, it took a very long time for us to really understand it and, and to, you know, get like, not getting started, but like getting to where we really felt comfortable letting it go in production. But once it was there, like, it is very, very light touch. >>Well, I really appreciate you stopping by Chris. It's been an amazing conversation to hear how Microsoft is using a open source project. Exactly. At scale. It's just a few years ago, when you would've heard the concept of Microsoft and open source together and like, oh, that's just, you know, but >>They have changed a lot in the last few years now, there are huge contributors. And, you know, if you go to Azure, it's full of open source stuff, every >>So, yeah. Wow. The Cuban 2022, how the world has changed in so many ways from Licia Spain, I'm Keith Townsend, along with a Rico senior, you're watching the, the leader in high tech coverage.
SUMMARY :
brought to you by the cloud native computing foundation. What's the flavor of the show so far, And you know, on the queue, fresh on the queue for the first time, Chris Vos, Me. So first off, give us a high level picture of the environment that you're at this point around the globe, you know, 700 to a thousand pods per you and the team settle on link or do And so we began investigating, you know, solutions to that. So, so in general, we are talking about, you know, security at scale. And so, you know, basically it took someone going through a whole How were you doing that before link D like, what was the, what and what were the pain points? we tried, you know, a few things in order to make that a little bit more automated and things like that, You know, anytime there was a failure, it's like, oh, could this be link or D you know, but after a while, you know, consideration that you have to do to install this software on, Link in particular, but the 30 cluster also quite interesting. And then, you know, with link D it's nice Having not been, you know, I, I'm not a deep Kubernetes expert from, Also true. What made us choose link D and then what are the ways in which, you know, we, we use link D so what Well, the future after you immediately solve I hadn't really looked at a lot of the data in years on, you know, when we did our investigations and very, you know, simplifying your life. And again, we didn't have to really do anything for that. So we know one thing when I do it on my laptop, it works fine when I do it with across 22,000 So, you know, the, the first one, and this seems pretty obvious, but was just not something I knew about was So I don't remember our team, and then, you know, various people who've had experience with it you know, get like, not getting started, but like getting to where together and like, oh, that's just, you know, but you know, if you go to Azure, it's full of open source stuff, every how the world has changed in so many ways from Licia Spain,
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Keith Townsend | PERSON | 0.99+ |
Chris | PERSON | 0.99+ |
Christopher Voss | PERSON | 0.99+ |
2017 | DATE | 0.99+ |
Chris Vos | PERSON | 0.99+ |
Abraham | PERSON | 0.99+ |
20 | QUANTITY | 0.99+ |
95% | QUANTITY | 0.99+ |
700 | QUANTITY | 0.99+ |
San Diego | LOCATION | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
10 | QUANTITY | 0.99+ |
30 | QUANTITY | 0.99+ |
five minutes | QUANTITY | 0.99+ |
2019 | DATE | 0.99+ |
22,000 pods | QUANTITY | 0.99+ |
six people | QUANTITY | 0.99+ |
Valencia | LOCATION | 0.99+ |
two | QUANTITY | 0.99+ |
2018 | DATE | 0.99+ |
two ways | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
20 calls | QUANTITY | 0.99+ |
7,500 people | QUANTITY | 0.99+ |
22,000 pods | QUANTITY | 0.99+ |
first time | QUANTITY | 0.98+ |
Cuban | LOCATION | 0.98+ |
first | QUANTITY | 0.98+ |
one service | QUANTITY | 0.98+ |
Valencia Spain | LOCATION | 0.98+ |
Europe | LOCATION | 0.98+ |
Linky | ORGANIZATION | 0.97+ |
three days | QUANTITY | 0.97+ |
2022 | DATE | 0.97+ |
one person | QUANTITY | 0.97+ |
first one | QUANTITY | 0.97+ |
link D | ORGANIZATION | 0.96+ |
Kubecon | ORGANIZATION | 0.96+ |
30 cluster | QUANTITY | 0.96+ |
22,000 nodes | QUANTITY | 0.96+ |
KU con 2018 | EVENT | 0.95+ |
Coon | ORGANIZATION | 0.94+ |
Licia Spain | PERSON | 0.94+ |
30 clusters | QUANTITY | 0.94+ |
day two | QUANTITY | 0.92+ |
link D | OTHER | 0.92+ |
Xbox | COMMERCIAL_ITEM | 0.91+ |
Rico | ORGANIZATION | 0.91+ |
Q con | ORGANIZATION | 0.91+ |
about 22,000 pods | QUANTITY | 0.91+ |
Kubernetes | PERSON | 0.9+ |
few years ago | DATE | 0.9+ |
three years | QUANTITY | 0.89+ |
link | ORGANIZATION | 0.86+ |
single cluster | QUANTITY | 0.85+ |
one thing | QUANTITY | 0.82+ |
Leer D | ORGANIZATION | 0.79+ |
a thousand pods | QUANTITY | 0.77+ |
Cloudnativecon | ORGANIZATION | 0.75+ |
last | DATE | 0.74+ |
cluster | QUANTITY | 0.74+ |
MTLS | ORGANIZATION | 0.72+ |
Etti | ORGANIZATION | 0.72+ |
Azure | TITLE | 0.71+ |
Rico | LOCATION | 0.69+ |
ATS | ORGANIZATION | 0.68+ |
years | DATE | 0.64+ |
cloud native con | ORGANIZATION | 0.61+ |
Cuban | PERSON | 0.6+ |
day one | QUANTITY | 0.59+ |
decades | QUANTITY | 0.56+ |
link | OTHER | 0.56+ |
Kubernetes | ORGANIZATION | 0.53+ |
link | TITLE | 0.52+ |
22 | EVENT | 0.5+ |
William Morgan, Buoyant | Kubecon + Cloudnativecon Europe 2022
>>The cube presents, Coon and cloud native con Europe 22, brought to you by the cloud native computing foundation. >>Welcome to vincia Spain in Coon cloud native con Europe, 2022. I'm Keith towns alongside en Rico senior. Etti senior it analyst for giong welcome back to the show en >>Rico. Thank you again for having me here. >>First impressions of QAN. >>Well, great show. As, as I mentioned before, I think that we are really in this very positive mode of talking with each other and people wanting to see, you know, the projects, people that build the projects at it's amazing. I mean, a lot of interesting conversation in the show floor and in the various sessions, very positive move. >>So this is gonna be a fun one. We have some amazing builders on the show this week, and none other than William Morgan, CEO of buoyant. What's your role in the link D project? >>So I was one of the original creators of link D but at this point I'm just the, the beautiful face of the project. >>Speaking of beautiful face of the project, linker D just graduated from as a CNCF project. >>Yeah, that's right. So last year we, we became the first service mesh to graduate in the CNCF. Very proud of that. And that's thanks, you know, largely to the incredible community around Linky that is just excited about the project and, you know, wants to talk about it and wants to be involved. >>So let's talk about the significance of that link D not the only service mesh project out there. Talk to me about the level effort to get it to the point that it's graduated. That's you don't see too many projects graduating CNCF in general. So let's talk about kind of the work needed to get Nier D to this point. >>Yeah. So, you know, the, the, the bar is high and it's mostly a measure, not necessarily of like the, the project being technically good or bad or anything, but it's really a measure of maturity of the community around it. So is it being adopted by organizations that are really relying on it in a critical way? Is it, you know, being adopted across industries, you know, is it having kind of a significant impact on the cloud native community? And so for us, you know, there was the, the work involved in that was really not any different from the work involved in, in kind of maintaining ity and growing the community in the first place, which is you try and make it really useful. You try and make it really easy to get started with you, try and be supportive and to, you know, have a, a friendly and welcoming community. And if you do those things and, you know, you kind of naturally get yourself to the point where it's a, it's a really strong community full of people who are excited about it. >>So from the of view of, you know, users adopting the, this technology, so we are talking about everybody, or do you see really, you know, large organization, large Kubernetes yeah. Clusters infrastructure adopting it. >>Yeah. So that's the answer to that is changed a little bit over time. But at this point we see Linky adoption across industries, across verticals, and we see it from very small companies to very large ones. So, you know, one of the talks I'm really excited about at this conference is from the folks at Xbox cloud gaming, who talked about, who are gonna talk about how they deployed Linky across, you know, 22,000 pods around the world to serve, you know, basically on demand video games, never a use case I would ever have imagined for Linky. And at the previous Kuan, you know, virtually Kuan EU, we had a whole keynote about how Linky was used to combat COVID 19. So all sorts of uses. And it really doesn't, you know, whether, whether it's a small cluster or large cluster it's equally applicable. >>Wow. So as we talk about link D service match, we obviously are gonna talk about security application control, etcetera. But in this climate Software supply chain is critical, right. And as we think about open source software supply chain, talk to us about the recent security audit of link dealer. >>Yeah. So one of the things that we do as part of a CNCF project, and also as part of, I, I think our relationship with our community is we have regular security audits, you know, where we, we engage security professionals who are very thorough and, you know, dig into all the details. Of course the source code is all out there, you know, so anyone can read through the code, but they'll build threat model analyses and things like that. And then we take their, their report and we publish it. We say, Hey, look, here's, you know, here's the situation. So we have earlier reports online, and this newest one was done by a company called trail of bits. And they built a whole threat model and looked through all the different ways that Linky could go wrong. And they always find issues. Of course, you know, it's, it would be very scary, I think, to get a report that was like, no, we didn't find yeah. Earth clean, you know? Yeah. Everything's fine. You know, should be okay. I don't know. Right. But they, you know, they did not find anything critical. They found some issues that we rapidly addressed and then, you know, everything gets written up in the report and, and then we publish it, you know, as part of an open source artifact >>Are, you let's say, you know, do they give you and add something? So if something happens so that you can act on the code before, you know, somebody else discovers the >>Yeah, yeah. They'll give you a preview of what they found. And then often, you know, it's not like you're going before the judge and the judge makes a judgment and then like off the jail, right. It's, it's a dialogue because they don't necessarily understand the project. Well, they definitely don't understand it as well as you do. So you are helping them, you know, understand which parts and, and your, you know, are, are interesting to look at from the security perspective, which parts are not that interesting. They do their own investigation of course, but it's a dialogue the entire time. So you do have an opportunity to say, oh, you told me that was a, a, a minor issue. I actually think that's larger or, or vice versa. You know, you, you think that's a big problem. Actually, we thought about that, and it's not a big problem because of whatever. So it's a collaborative process. >>So link D been around, like, when I first learned about service me link D was the project that I learned about. Yeah. It's been there for a long time, but just mentioned 22,000 clusters. That's just mind boggling pod, 22,000 pods, the pods. Okay. >>Clusters would be >>Great. Yeah. Yeah. Clusters would be great too, but filled 22 thousands pods, big deployment. That's the big deployment of link D but all the way down to the small, smallest set of pods as well. What are some of the recent project updates from of the learnings you bought back from the community and updated the, the project as a result? >>Yeah. So a big one for us, you know, on the topic of security link, a big driver of link adoption is security and, and less on the supply chain side and more on the traffic, like live traffic security. So things like mutual TLS. So you can encrypt the communication between pods and make sure it's authenticated. One of the recent feature additions is authorization policy. So you can lock down connections between services and you can say service a is only allowed to talk to service B. And I wanna do that. Not based on network identity, you know, and not based on like IP addresses, cuz those are spoof. And you know, we've kind of like as an industry moved, moved, we've gotten a little more advanced from that, but actually based on the workload identity, you know, as captured by the mutual TLS certificate exchange. So we give you the ability now to, to, to restrict the types of communication that are allowed to happen on your cluster. >>So, okay. This is what happened. What about the future? Can you give us, you know, into suggestion of what is going to happen in the medium and long term? >>I think we're done, you know, we graduated, so we're just gonna >>Stop there's >>What else is there to do? There's no grad school, you know? No, no. So for us, there's a clear roadmap ahead, continuing down the, the security realm, for sure. We've given you kind of the very first building block, which at the service level, but coming up in, in the two point 12 release, we'll have route based policy as well, as you can say, this service is only allowed to call these three, you know, routes on this end point and we'll be working later to do things like mesh expansion so we can run the data plane outside of Kubernetes. You know, so the control plane will stay in in Kubernetes, but the data plane will, you'll be able to run that on VMs and, and, and things like that. And then of course in the, you know, we're also starting to look at things like I like to make a fun of WAM a lot, but we are actually starting to look at WAM in, in the ways that that might actually be useful for Linky users. >>So we talk a lot about the flexibility of a project, like link D you can do amazing things with it from a security perspective, but we're talking still to a DevOps type cloud of, of, of developers who are spread thin across their skillset. How do you help balance the need for the flexibility, which usually becomes more nerd knobs and servicing a crowd that wants even higher levels of abstraction and simplicity. >>Yeah. Yeah. That's a great question. And this is, this is what makes Linky so unique in the service mesh spaces. We have a laser focus on simplicity and especially on operational simplicity. So our audience, you know, we can make it easy to install Linky, but what we really care about is when you're running it and you're on call for it and it's sitting in this critical, vulnerable part of your infrastructure, do you feel confident in that? Do you feel like you understand it? Do you feel like you can observe it? Do you feel like you can predict what it's gonna do? And so every aspect of Linky is designed to be as operationally simple as possible. So when we deliver features, you know, that's always our, our primary consideration is, you know, we have to reject the urge. You know, we have an urge as, as engineers to like want to build everything, you know, it's an ultimate platform to solve all problems and we have to really be disciplined and say, we're not gonna do that. >>We're gonna look at solving the minimum possible problem with a minimum set of features because we need to keep things simple. And, and then we need to look at the human aspect to that. And I think that's been a part of, of Link's success. And then on the buoyant side, of course, you know, I don't just work on link day. I also work on, on buoyant, which helps organizations adopt Linky and, and increasingly large organizations that are not service mesh experts don't wanna be service mesh experts that, you know, they wanna spend their time and energy developing their business, right. And, and building the business logic that powers their company. So for them, we have actually re recently introduced, fully managed. Linky where we can take on, even though Linky has to run on your cluster, right? The, the, the, the sidecar proxies has to be alongside your application. We can actually take on the operational burden of, of upgrades and trust, anchor rotation, and installation. And you can effectively treat it as a utility, right. And, and, and have a, a hosted, like, experience, even though the, the actual bits, at least most of them, not all of them, most of 'em have to live on your cluster. >>I love the focus of most CNCF projects, you know, it's, it's peanut butter or jelly, not peanut butter. Yeah. Trying to be become jelly. Right. What's the, what's the, what's the peanut butter to link D's jelly. Like where does link D stop and some of the things that customers should really consider yeah. When looking at service mesh. >>Yeah. No, that's a great way of looking at it. And I, I actually think that that philosophy comes from Kubernetes. I think Kubernetes itself, one of the reasons it was so successful is because it had some clearly delineated, it said, this is what we're gonna do. Right. And this is what we're not gonna do. So we're gonna do layer three, four networking. Right. But we're gonna stop there. We're not gonna do anything with layer seven. And that allowed the service mesh. So I guess if I were to go down the, the bread, the bread of the sandwich has Kubernetes, and then Linky is the, is the peanut butter, I guess, and then the jelly, you know, so I think the jelly is every other aspect of, of building a platform. Right. So if you are the, the audience for Linky, most of the time, it's a platform owners, right. They're building a platform, an internal platform for their developers to write code. And so, as part of that, of course, you've got Kubernetes, you've got Linky, but you've also got a C I CD system. You've also got a, you know, a code repository, if it's GitLab or, or GitHub or wherever you've got, you know, other kind of tools that are enforcing various other constraints. All of that is the jelly, you know, in the, this is, analogy's getting complicated now. And like the, the platform sandwich that, you know, that you're serving. >>So talk to us about trans and service mesh from the, from the, as we think of the macro. >>Yeah. Yeah. So, you know, it's been an interesting space because we were talking a little bit about, you know, about this before the show, but the, there was so much buzz, you know, and then what we, what we saw was basically it took two years for that buzz to become actual adoption, you know, and now a lot of the buzz is off on other exciting things. And the people who remain in the Linky space are, are very focused on, oh, I actually have a, a real problem that I need to solve and I need to solve it now. So that's been great. So in terms of broader trends, you know, I think one thing we've seen for sure is the service mesh space is kind of notorious for complexity, you know, and a lot of what we've been doing on the Linky side has been trying to, to reverse that, that, that idea, you know, because it doesn't actually have to be complex. There's interesting stuff you can do, especially when you get into the way we handle the sidecar model. It's actually really, it's a wonderful model operationally. It's really, it feels weird at first. And then you're like, oh, actually this makes my operations a lot easier. So a lot of the trends that I see at least for Linky is doubling down on the sidecar model, trying to make side cards as small and as thin as possible and try and make them, you know, kind of transparent to the rest of the application. So >>Well, William Morgan, one of the coolest Twitter handles I've seen at WM on Twitter, that's actually a really cool Twitter handle. Thank you, CEO of buoyant. Thank you for joining the cube again. Cube alum from Valencia Spain. I'm Keith towns, along with en Rico, and you're watching the cube, the leader in high tech coverage.
SUMMARY :
brought to you by the cloud native computing foundation. the show en people wanting to see, you know, the projects, people that build the projects at We have some amazing builders on the show the beautiful face of the project. Speaking of beautiful face of the project, linker D just graduated from about the project and, you know, wants to talk about it and wants to be involved. So let's talk about the significance of that link D not the only service mesh project out there. And so for us, you know, there was the, the work involved in that was really not any different from the work involved So from the of view of, you know, users adopting the, this technology, 22,000 pods around the world to serve, you know, basically on demand video games, And as we think about open source software supply chain, talk to us about the recent security audit of Of course the source code is all out there, you know, so anyone can read through the code, And then often, you know, it's not like you're going before pod, 22,000 pods, the pods. What are some of the recent project updates from of the learnings you bought back from but actually based on the workload identity, you know, as captured by the mutual TLS Can you give us, you know, into suggestion of what is going to happen in the medium and you know, we're also starting to look at things like I like to make a fun of WAM a lot, but we are actually starting to look at WAM So we talk a lot about the flexibility of a project, like link D you can do amazing So our audience, you know, we can make it easy to install Linky, but what we really care about is when And then on the buoyant side, of course, you know, I love the focus of most CNCF projects, you know, it's, All of that is the jelly, you know, in the, this is, So in terms of broader trends, you know, Thank you for joining the cube
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
William Morgan | PERSON | 0.99+ |
Linky | ORGANIZATION | 0.99+ |
Valencia Spain | LOCATION | 0.99+ |
22,000 pods | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
first | QUANTITY | 0.99+ |
two years | QUANTITY | 0.99+ |
three | QUANTITY | 0.99+ |
Kubernetes | TITLE | 0.99+ |
22,000 clusters | QUANTITY | 0.98+ |
this week | DATE | 0.98+ |
22 thousands pods | QUANTITY | 0.98+ |
one | QUANTITY | 0.98+ |
Europe | LOCATION | 0.98+ |
CNCF | ORGANIZATION | 0.97+ |
2022 | DATE | 0.97+ |
One | QUANTITY | 0.96+ |
GitHub | ORGANIZATION | 0.94+ |
Xbox | COMMERCIAL_ITEM | 0.94+ |
buoyant | ORGANIZATION | 0.93+ |
Cloudnativecon | ORGANIZATION | 0.93+ |
link | ORGANIZATION | 0.91+ |
first service | QUANTITY | 0.9+ |
link D | ORGANIZATION | 0.9+ |
Link | ORGANIZATION | 0.9+ |
Coon | ORGANIZATION | 0.88+ |
WM | ORGANIZATION | 0.87+ |
GitLab | ORGANIZATION | 0.87+ |
Spain | LOCATION | 0.86+ |
layer three | QUANTITY | 0.86+ |
First impressions | QUANTITY | 0.86+ |
linker D | ORGANIZATION | 0.85+ |
ORGANIZATION | 0.84+ | |
Nier D | PERSON | 0.83+ |
Buoyant | PERSON | 0.83+ |
Earth | LOCATION | 0.82+ |
Keith | PERSON | 0.8+ |
COVID 19 | OTHER | 0.78+ |
Kubernetes | ORGANIZATION | 0.75+ |
Kuan | PERSON | 0.73+ |
QAN | ORGANIZATION | 0.72+ |
Rico | LOCATION | 0.7+ |
Kubernetes | PERSON | 0.7+ |
two point | QUANTITY | 0.7+ |
one thing | QUANTITY | 0.68+ |
cloud native con | ORGANIZATION | 0.68+ |
C I | TITLE | 0.67+ |
bits | ORGANIZATION | 0.65+ |
trail | ORGANIZATION | 0.65+ |
layer seven | QUANTITY | 0.65+ |
Kubecon | ORGANIZATION | 0.63+ |
22 | EVENT | 0.62+ |
cloud | ORGANIZATION | 0.61+ |
vincia | ORGANIZATION | 0.59+ |
12 | QUANTITY | 0.59+ |
Greg Muscarella, SUSE | Kubecon + Cloudnativecon Europe 2022
>>The cube presents, Coon and cloud native con Europe 22, brought to you by the cloud native computing foundation. >>Welcome to Valencia Spain and con cloud native con 20 Europe, 2022. I'm your host, Keith Townson alongside a new host en Rico senior reti, senior editor. I'm sorry, senior it analyst at giong Enrique. Welcome to the program. >>Thank you very much. And thank you for having me. It's exciting. >>So thoughts, high level thoughts of CU con first time in person again in couple years? >>Well, this is amazing for several reasons. And one of the reasons is that yeah, I had the chance to meet, uh, with, uh, you know, people like you again. I mean, we, we met several times over the internet, over zoom codes. I, I started to eat these zoom codes. <laugh> because they're very impersonal in the end. And like last night we, we are together group of friends, industry folks. It's just amazing. And a part of that, I mean, the event is, uh, is a really cool, it's really cool. There are a lot from people interviews and, you know, real people doing real stuff, not just, uh, you know, again, in personal calls, you don't even know if they're telling the truth, but when you can, you know, look in their eyes, what they're doing, I, I think that's makes a difference. >>So speaking about real people, meeting people for the first time, new jobs, new roles, Greg Moscarella enterprise container management in general manager at SUSE, welcome to the show, welcome back clue belong. >>Thank you very much. It's awesome to be here. It's awesome to be back in person. And I completely agree with you. Like there's a certain fidelity to the conversation and a certain, uh, ability to get to know people a lot more. So it's absolutely fantastic to be here. >>So Greg, tell us about your new role and what SUSE has gone on at KU con. >>Sure. So I joined SA about three months ago to lead the rancher business unit, right? So our container management pieces and, you know, it's a, it's a fantastic time. Cause if you look at the transition from virtual machines to containers and to moving to micro services, right alongside that transition from on-prem to cloud, like this is a very exciting time to be in this industry and rancher's been setting the stage. And again, I'm go back to being here. Rancher's all about the community, right? So this is a very open, independent, uh, community driven product and project. And so this, this is kinda like being back to our people, right. And being able to reconnect here. And so, you know, doing it, digital is great, but, but being here is changes the game for us. So we, we feed off that community. We feed off the energy. So, uh, and again, going back to the space and what's happening in it, great time to be in this space. And you guys have seen the transitions you've seen, I mean, we've seen just massive adoption, uh, of containers and Kubernetes overall, and rancher has been been right there with some amazing companies doing really interesting things that I'd never thought of before. Uh, so I'm, I'm still learning on this, but, um, but it's been great so far. >>Yeah. And you know, when we talk about strategy about Kubernetes today, we are talking about very broad strategies. I mean, not just the data center or the cloud with, you know, maybe smaller organization adopting Kubernetes in the cloud, but actually large organization thinking guide and more and more the edge. So what's your opinion on this, you know, expansion of Kubernetes towards the edge. >>So I think you're, I think you're exactly right. And that's actually a lot of meetings I've been having here right now is these are some of these interesting use cases. So people who, uh, whether it be, you know, ones that are easy to understand in the telco space, right? Especially the adoption of 5g and you have all these base stations, new towers, and they have not only the core radio functions or network functions that they're trying to do there, but they have other applications that wanna run on that same environment, uh, spoke recently with some of our, our good friends at a major automotive manufacturer, doing things in their factories, right. That can't take the latency of being somewhere else. Right? So they have robots on the factory floor, the latency that they would experience if they tried to run things in the cloud meant that robot would've moved 10 centimeters. >>By the time, you know, the signal got back, it may not seem like a lot to you, but if, if, if you're an employee, you know, there, you know, uh, a big 2000 pound robot being 10 centimeters closer to you may not be what you, you really want. Um, there's, there's just a tremendous amount of activity happening out there on the retail side as well. So it's, it's amazing how people are deploying containers in retail outlets. You know, whether it be fast food and predicting, what, what, how many French fries you need to have going at this time of day with this sort of weather. Right. So you can make sure those queues are actually moving through. It's, it's, it's really exciting and interesting to look at all the different applications that are happening. So yes, on the edge for sure, in the public cloud, for sure. In the data center and we're finding is people want to common platform across those as well. Right? So for the management piece too, but also for security and for policies around these things. So, uh, it really is going everywhere. >>So talk to me, how do, how are we managing that as we think about pushing stuff out of the data center, out of the cloud cloud, closer to the edge security and life cycle management becomes like top of mind thought as, as challenges, how is rancher and sushi addressing >>That? Yeah. So I, I think you're, again, spot on. So it's, it starts off with the think of it as simple, but it's, it's not simple. It's the provisioning piece. How do we just get it installed and running right then to what you just asked the management piece of it, everything from your firmware to your operating system, to the, the cluster, uh, the Kubernetes cluster, that's running on that. And then the workloads on top of that. So with rancher, uh, and with the rest of SUSE, we're actually tacking all those parts of the problems from bare metal on up. Uh, and so we have lots of ways for deploying that operating system. We have operating systems that are, uh, optimized for the edge, very secure and ephemeral container images that you can build on top of. And then we have rancher itself, which is not only managing your Kubernetes cluster, but can actually start to manage the operating system components, uh, as well as the workload components. >>So all from your single interface, um, we mentioned policy and security. So we, yeah, we'll probably talk about it more, um, uh, in a little bit, but, but new vector, right? So we acquired a company called new vector, just open sourced, uh, that here in January, that ability to run that level of, of security software everywhere again, is really important. Right? So again, whether I'm running it on, whatever my favorite public cloud providers, uh, managed Kubernetes is, or out at the edge, you still have to have security, you know, in there. And, and you want some consistency across that. If you have to have a different platform for each of your environments, that's just upping the complexity and the opportunity for error. So we really like to eliminate that and simplify our operators and developers lives as much as possible. >>Yeah. From this point of view, are you implying that even you, you are matching, you know, self, uh, let's say managed clusters at the, at the very edge now with, with, you know, added security, because these are the two big problems lately, you know, so having something that is autonomous somehow easier to manage, especially if you are deploying hundreds of these that's micro clusters. And on the other hand, you need to know a policy based security that is strong enough to be sure again, if you have these huge robots moving too close to you, because somebody act the class that is managing them, that could be a huge problem. So are you, you know, approaching this kind of problems? I mean, is it, uh, the technology that you are acquired, you know, ready to, to do this? >>Yeah. I, I mean, it, it really is. I mean, there's still a lot of innovation happening. Don't, don't get me wrong. We're gonna see a lot of, a lot more, not just from, from SA and rancher, but from the community, right. There's a lot happening there, but we've come a long way and we've solved a lot of problems. Uh, if I think about, you know, how do you have this distributed environment? Uh, well, some of it comes down to not just, you know, all the different environments, but it's also the applications, you know, with microservices, you have very dynamic environment now just with your application space as well. So when we think about security, we really have to evolve from a fairly static policy where like, you might even be able to set an IP address in a port and some configuration on that. It's like, well, your workload's now dynamically moving. >>So not only do you have to have that security capability, like the ability to like, look at a process or look at a network connection and stop it, you have to have that, uh, manageability, right? You can't expect an operator or someone to like go in and manually configure a YAML file, right? Because things are changing too fast. It needs to be that combination of convenient, easy to manage with full function and ability to protect your, your, uh, your resources. And I think that's really one of the key things that new vector really brings is because we have so much intelligence about what's going on there. Like the configuration is pretty high level, and then it just runs, right? So it's used to this dynamic environment. It can actually protect your workloads wherever it's going from pod to pod. Uh, and it's that, that combination, again, that manageability with that high functionality, um, that, that is what's making it so popular. And what brings that security to those edge locations or cloud locations or your data center >>Mm-hmm <affirmative> so one of the challenges you're kind of, uh, touching on is this abstraction on upon abstraction. When I, I ran my data center, I could put, uh, say this IP address, can't talk to this IP address on this port. Then I got next generation firewalls where I could actually do, uh, some analysis. Where are you seeing the ball moving to when it comes to customers, thinking about all these layers of abstraction I IP address doesn't mean anything anymore in cloud native it's yes, I need one, but I'm not, I'm not protecting based on IP address. How are customers approaching security from the name space perspective? >>Well, so it's, you're absolutely right. In fact, even when you go to I P six, like, I don't even recognize IP addresses anymore. <laugh> >>Yeah. Doesn't mean anything like, oh, just a bunch of, yes, those are numbers, ER, >>And colons. Right. You know, it's like, I don't even know anymore. Right. So, um, yeah, so it's, it comes back to that, moving from a static, you know, it's the pets versus cattle thing. Right? So this static thing that I can sort of know and, and love and touch and kind of protect to this almost living, breathing thing, which is moving all around, it's a swarm of, you know, pods moving all over the place. And so, uh, it, it is, I mean, that's what Kubernetes has done for the workload side of it is like, how do you get away from, from that, that pet to a declarative approach to, you know, identifying your workload and the components of that workload and what it should be doing. And so if we go on the security side some more like, yeah, it's actually not even namespace namespace. >>Isn't good enough. We wanna get, if we wanna get to zero trust, it's like, just cuz you're running in my namespace doesn't mean I trust you. Right. So, and that's one of the really cool things about new vectors because of the, you know, we're looking at protocol level stuff within the network. So it's pod to pod, every single connection we can look at and it's at the protocol layer. So if you say you're on my database and I have a mye request going into it, I can confirm that that's actually a mye protocol being spoken and it's well formed. Right. And I know that this endpoint, you know, which is a, uh, container image or a pod name or some, or a label, even if it's in the same name, space is allowed to talk to and use this protocol to this other pod that's running in my same name space. >>Right. So I can either allow or deny. And if I can, I can look into the content that request and make sure it's well formed. So I'll give you an example is, um, do you guys remember the log four J challenges from not too long ago, right. Was, was a huge deal. So if I'm doing something that's IP and port based and name space based, so what are my protections? What are my options for something that's got log four J embedded in like I either run the risk of it running or I shut it down. Those are my options. Like those neither one of those are very good. So we can do, because again, we're at the protocol layers like, ah, I can identify any log for J protocol. I can look at whether it's well formed, you know, or if it's malicious, if it's malicious, I can block it. If it's well formed, I can let it go through. So I can actually look at those, those, um, those vulnerabilities. I don't have to take my service down. I can run and still be protected. And so that, that extra level, that ability to kind of peek into things and also go pod to pod, you know, not just name space level is one of the key differences. So I talk about the evolution or how we're evolving with, um, with the security. Like we've grown a lot, we've got a lot more coming. >>So let's talk about that a lot more coming what's in the pipeline for SUSE. >>Well, how, before I get to that, we just announced new vector five. So maybe I can catch us up on what was released last week. Uh, and then we can talk a little bit about going, going forward. So new vector five, introduce something called um, well, several things, but one of the things I can talk in more detail about is something called zero drift. So I've been talking about the network security, but we also have run time security, right? So any, any container that's running within your environment has processes that are running that container. What we can do is actually comes back to that manageability and configuration. We can look at the root level of trust of any process that's running. And as long as it has an inheritance, we can let that process run without any extra configuration. If it doesn't have a root level of trust, like it didn't spawn from whatever the, a knit, um, function was and that container we're not gonna let it run. Uh, so the, the configuration that you have to put in there is, is a lot simpler. Um, so that's something that's in, in new vector five, um, the web application firewall. So this layer seven security inspection has gotten a lot more granular now. So it's that pod Topo security, um, both for ingress egress and internal on the cluster. Right. >>So before we get to what's in the pipeline, one question around new vector, how is that consumed and deployed? >>How is new vector consumed, >>Deployed? And yeah, >>Yeah, yeah. So, uh, again with new vector five and, and also rancher 2 65, which just were released, there's actually some nice integration between them. So if I'm a rancher customer and I'm using 2 65, I can actually just deploy that new vector with a couple clicks of the button in our, uh, in our marketplace. And we're actually tied into our role-based access control. So an administrator who has that has the rights can just click they're now in a new vector interface and they can start setting those policies and deploying those things out very easily. Of course, if you aren't using, uh, rancher, you're using some other, uh, container management platform, new vector still works. Awesome. You can deploy it there still in a few clicks. Um, you're just gonna get into, you have to log into your new vector, uh, interface and, and use it from there. >>So that's how it's deployed. It's, it's very, it's very simple to use. Um, I think what's actually really exciting about that too, is we've opensourced it? Um, so it's available for anyone to go download and try, and I would encourage people to give it a go. Uh, and I think there's some compelling reasons to do that now. Right? So we have pause security policies, you know, depreciated and going away, um, pretty soon in, in Kubernetes. And so there's a few things you might look at to make sure you're still able to run a secure environment within Kubernetes. So I think it's a great time to look at what's coming next, uh, for your security within your Kubernetes. >>So, Paul, we appreciate you stopping by from ity of Spain. I'm Keith Townsend, along with en Rico Sinte. Thank you. And you're watching the, the leader in high tech coverage.
SUMMARY :
brought to you by the cloud native computing foundation. Welcome to the program. And thank you for having me. I had the chance to meet, uh, with, uh, you know, people like you again. So speaking about real people, meeting people for the first time, new jobs, So it's absolutely fantastic to be here. So Greg, tell us about your new role and what SUSE has gone So our container management pieces and, you know, it's a, it's a fantastic time. you know, maybe smaller organization adopting Kubernetes in the cloud, So people who, uh, whether it be, you know, By the time, you know, the signal got back, it may not seem like a lot to you, to what you just asked the management piece of it, everything from your firmware to your operating system, If you have to have a different platform for each of your environments, And on the other hand, you need to know a policy based security that is strong have to evolve from a fairly static policy where like, you might even be able to set an IP address in a port and some So not only do you have to have that security capability, like the ability to like, Where are you seeing the In fact, even when you go to I P six, like, it comes back to that, moving from a static, you know, it's the pets versus cattle thing. And I know that this endpoint, you know, and also go pod to pod, you know, not just name space level is one of the key differences. the configuration that you have to put in there is, is a lot simpler. Of course, if you aren't using, uh, rancher, you're using some other, So I think it's a great time to look at what's coming next, uh, for your security within your So, Paul, we appreciate you stopping by from ity of Spain.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Keith Townson | PERSON | 0.99+ |
SUSE | ORGANIZATION | 0.99+ |
Greg Muscarella | PERSON | 0.99+ |
Paul | PERSON | 0.99+ |
10 centimeters | QUANTITY | 0.99+ |
Keith Townsend | PERSON | 0.99+ |
January | DATE | 0.99+ |
Greg Moscarella | PERSON | 0.99+ |
last week | DATE | 0.99+ |
Spain | LOCATION | 0.99+ |
Greg | PERSON | 0.99+ |
2000 pound | QUANTITY | 0.99+ |
one question | QUANTITY | 0.98+ |
Kubernetes | TITLE | 0.98+ |
one | QUANTITY | 0.98+ |
both | QUANTITY | 0.98+ |
Valencia Spain | LOCATION | 0.97+ |
today | DATE | 0.97+ |
Kubecon | ORGANIZATION | 0.97+ |
first time | QUANTITY | 0.95+ |
single interface | QUANTITY | 0.95+ |
two big problems | QUANTITY | 0.95+ |
each | QUANTITY | 0.94+ |
Coon | ORGANIZATION | 0.94+ |
ingress | ORGANIZATION | 0.94+ |
zero | QUANTITY | 0.9+ |
three months ago | DATE | 0.9+ |
Cloudnativecon | ORGANIZATION | 0.88+ |
22 | EVENT | 0.86+ |
SUSE | TITLE | 0.86+ |
five | TITLE | 0.85+ |
I P six | OTHER | 0.84+ |
Europe | LOCATION | 0.81+ |
giong Enrique | PERSON | 0.81+ |
log four | OTHER | 0.8+ |
2 65 | COMMERCIAL_ITEM | 0.79+ |
2022 | DATE | 0.78+ |
vector five | TITLE | 0.77+ |
couple years | QUANTITY | 0.75+ |
rancher | ORGANIZATION | 0.73+ |
French | OTHER | 0.73+ |
cloud native computing | ORGANIZATION | 0.73+ |
Kubernetes | ORGANIZATION | 0.72+ |
last night | DATE | 0.71+ |
single connection | QUANTITY | 0.71+ |
one of the reasons | QUANTITY | 0.69+ |
Rico | ORGANIZATION | 0.68+ |
Rico Sinte | PERSON | 0.67+ |
SA | ORGANIZATION | 0.66+ |
about | DATE | 0.66+ |
layer seven | OTHER | 0.65+ |
vector | OTHER | 0.64+ |
5g | QUANTITY | 0.64+ |
65 | COMMERCIAL_ITEM | 0.62+ |
cloud native con | ORGANIZATION | 0.55+ |
telco | ORGANIZATION | 0.55+ |
2 | TITLE | 0.54+ |
SA | LOCATION | 0.53+ |
egress | ORGANIZATION | 0.52+ |
hundreds | QUANTITY | 0.51+ |
CU con | EVENT | 0.46+ |
KU con. | ORGANIZATION | 0.44+ |
vector | COMMERCIAL_ITEM | 0.39+ |
20 | EVENT | 0.31+ |
Eric Herzog, Infinidat | CUBEconversations
(upbeat music) >> Despite its 70 to $80 billion total available market, computer storage is like a small town, everybody knows everybody else. We say in the storage world, there are a hundred people, and 99 seats. Infinidat is a company that was founded in 2011 by storage legend, Moshe Yanai. The company is known for building products with rock solid availability, simplicity, and a passion for white glove service, and client satisfaction. Company went through a leadership change recently, in early this year, appointed industry vet, Phil Bullinger, as CEO. It's making more moves, bringing on longtime storage sales exec, Richard Bradbury, to run EMEA, and APJ Go-To-Market. And just recently appointed marketing maven, Eric Hertzog to be CMO. Hertzog has worked at numerous companies, ranging from startups that were acquired, two stints at IBM, and is SVP of product marketing and management at Storage Powerhouse, EMC, among others. Hertzog has been named CMO of the year as an OnCon Icon, and top 100 influencer in big data, AI, and also hybrid cloud, along with yours truly, if I may say so. Joining me today, is the newly minted CMO of Infinidat, Mr.Eric Hertzog. Good to see you, Eric, thanks for coming on. >> Dave, thank you very much. You know, we love being on theCUBE, and I am of course sporting my Infinidat logo wear already, even though I've only been on the job for two weeks. >> Dude, no Hawaiian shirt, okay. That's a pretty buttoned up company. >> Well, next time, I'll have a Hawaiian shirt, don't worry. >> Okay, so give us the backstory, how did this all come about? you know Phil, my 99 seat joke, but, how did it come about? Tell us that story. >> So, I have known Phil since the late 90s, when he was a VP at LSA of Engineering, and he had... I was working at a company called Milax, which was acquired by IBM. And we were doing a product for HP, and he was providing the subsystem, and we were providing the fiber to fiber, and fiber to SCSI array controllers back in the day. So I met him then, we kept in touch for years. And then when I was a senior VP at EMC, he started originally as VP of engineering for the EMC Isilon team. And then he became the general manager. So, while I didn't work for him, I worked with him, A, at LSA, and then again at EMC. So I just happened to congratulate him about some award he won, and he said "Hey Herzog, "we should talk, I have a CMO opening". So literally happened over LinkedIn discussion, where I reached out to him, and congratulate him, he said "Hey, I need a CMO, let's talk". So, the whole thing took about three weeks in all honesty. And that included interviewing with other members of his exec staff. >> That's awesome, that's right, he was running the Isilon division for awhile at the EMC. >> Right. >> You guys were there, and of course, you talk about Milax, LSA, there was a period of time where, you guys were making subsystems for everybody. So, you sort of saw the whole landscape. So, you got some serious storage history and chops. So, I want to ask you what attracted you to Infinidat. I mean, obviously they're a leader in the magic quadrant. We know about InfiniBox, and the petabyte scale, and the low latency, what are the... When you look at the market, you obviously you see it, you talk to everybody. What were the trends that were driving your decision to join Infinidat? >> Well, a couple of things. First of all, as you know, and you guys have talked about it on theCUBE, most CIOs don't know anything about storage, other than they know a guy got to spend money on it. So the Infinidat message of optimizing applications, workloads, and use cases with 100% guaranteed availability, unmatched reliability, the set and forget ease of use, which obviously AIOps is driving that, and overall IT operations management was very attractive. And then on top of that, the reality is, when you do that consolidation, which Infinidat can do, because of the performance that it has, you can dramatically free up rack, stack, power, floor, and operational manpower by literally getting rid of, tons and tons of arrays. There's one customer that they have, you actually... I found out when I got here, they took out a hundred arrays from EMC Hitachi. And that company now has 20 InfiniBoxes, and InfiniBox SSAs running the exact same workloads that used to be, well over a hundred subsystems from the other players. So, that's got a performance angle, a CapEx and OPEX angle, and then even a clean energy angle because reducing Watson slots. So, lots of different advantages there. And then I think from just a pure marketing perspective, as someone has said, they're the best kept secret to the storage industry. And so you need to, if you will, amp up the message, get it out. They've expanded the portfolio with the InfiniBox SSA, the InfiniGuard product, which is really optimized, not only as the PBA for backup perspective, and it works with all the backup vendors, but also, has an incredible play on data and cyber resilience with their capability of local logical air gapping, remote logical air gapping, and creating a clean room, if you will, a vault, so that you can then recover their review for malware ransomware before you do a full recovery. So it's got the right solutions, just that most people didn't know who they were. So, between the relationship with Phil, and the real opportunity that this company could skyrocket. In fact, we have 35 job openings right now, right now. >> Wow, okay, so yeah, I think it was Duplessy called them the best kept secret, he's not the only one. And so that brings us to you, and your mission because it's true, it is the best kept secret. You're a leader in the Gartner magic quadrant, but I mean, if you're not a leader in a Gartner magic quadrant, you're kind of nobody in storage. And so, but you got chops and block storage. You talked about the consolidation story, and I've talked to many folks in Infinidat about that. Ken Steinhardt rest his soul, Dr. Rico, good business friend, about, you know... So, that play and how you handle the whole blast radius. And that's always a great discussion, and Infinidat has proven that it can operate at very very high performance, low latency, petabyte scale. So how do you get the word out? What's your mission? >> Well, so we're going to do a couple of things. We're going to be very, very tied to the channel as you know, EMC, Dell EMC, and these are articles that have been in CRN, and other channel publications is pulling back from the channel, letting go of channel managers, and there's been a lot of conflict. So, we're going to embrace the channel. We already do well over 90% of our business within general globally. So, we're doing that. In fact, I am meeting, personally, next week with five different CEOs of channel partners. Of which, only one of them is doing business with Infinidat now. So, we want to expand our channel, and leverage the channel, take advantage of these changes in the channel. We are going to be increasing our presence in the public relations area. The work we do with all the industry analysts, not just in North America, but in Europe as well, and Asia. We're going to amp up, of course, our social media effort, both of us, of course, having been named some of the best social media guys in the world the last couple of years. So, we're going to open that up. And then, obviously, increase our demand generation activities as well. So, we're going to make sure that we leverage what we do, and deliver that message to the world. Deliver it to the partner base, so the partners can take advantage, and make good margin and revenue, but delivering products that really meet the needs of the customers while saving them dramatically on CapEx and OPEX. So, the partner wins, and the end user wins. And that's the best scenario you can do when you're leveraging the channel to help you grow your business. >> So you're not only just the marketing guy, I mean, you know product, you ran product management at very senior levels. So, you could... You're like a walking spec sheet, John Farrier says you could just rattle it off. Already impressed that how much you know about Infinidat, but when you joined EMC, it was almost like, there was too many products, right? When you joined IBM, even though it had a big portfolio, it's like it didn't have enough relevant products. And you had to sort of deal with that. How do you feel about the product portfolio at Infinidat? >> Well, for us, it's right in the perfect niche. Enterprise class, AI based software defined storage technologies that happens run on a hybrid array, an all flash array, has a variant that's really tuned towards modern data protection, including data and cyber resilience. So, with those three elements of the portfolio, which by the way, all have a common architecture. So while there are three different solutions, all common architecture. So if you know how to use the InfiniBox, you can easily use an InfiniGuard. You got an InfiniGuard, you can easily use an InfiniBox SSA. So the capability of doing that, helps reduce operational manpower and hence, of course, OPEX. So the story is strong technically, the story has a strong business tie in. So part of the thing you have to do in marketing these days. Yeah, we both been around. So you could just talk about IOPS, and latency, and bandwidth. And if the people didn't... If the CIO didn't know what that meant, so what? But the world has changed on the expenditure of infrastructure. If you don't have seamless integration with hybrid cloud, virtual environments and containers, which Infinidat can do all that, then you're not relevant from a CIO perspective. And obviously with many workloads moving to the cloud, you've got to have this infrastructure that supports core edge and cloud, the virtualization layer, and of course, the container layer across a hybrid environment. And we can do that with all three of these solutions. Yet, with a common underlying software defined storage architecture. So it makes the technical story very powerful. Then you turn that into business benefit, CapEX, OPEX, the operational manpower, unmatched availability, which is obviously a big deal these days, unmatched performance, everybody wants their SAP workload or their Oracle or Mongo Cassandra to be, instantaneous from the app perspective. Excuse me. And we can do that. And that's the kind of thing that... My job is to translate that from that technical value into the business value, that can be appreciated by the CIO, by the CSO, by the VP of software development, who then says to VP of industry, that Infinidat stuff, we actually need that for our SAP workload, or wow, for our overall corporate cybersecurity strategy, the CSO says, the key element of the storage part of that overall corporate cybersecurity strategy are those Infinidat guys with their great cyber and data resilience. And that's the kind of thing that my job, and my team's job to work on to get the market to understand and appreciate that business value that the underlying technology delivers. >> So the other thing, the interesting thing about Infinidat. This was always a source of spirited discussions over the years with business friends from Infinidat was the company figured out a way, it was formed in 2011, and at the time the strategy perfectly reasonable to say, okay, let's build a better box. And the way they approached that from a cost standpoint was you were able to get the most out of spinning disk. Everybody else was moving to flash, of course, floyers work a big flash, all flash data center, etc, etc. But Infinidat with its memory cache and its architecture, and its algorithms was able to figure out how to magically get equivalent or better performance in an all flash array out of a system that had a lot of spinning disks, which is I think unique. I mean, I know it's unique, very rare anyway. And so that was kind of interesting, but at the time it made sense, to go after a big market with a better mouse trap. Now, if I were starting a company today, I might take a different approach, I might try to build, a storage cloud or something like that. Or if I had a huge install base that I was trying to protect, and maybe go into that. But so what's the strategy? You still got huge share gain potentials for on-prem is that the vector? You mentioned hybrid cloud, what's the cloud strategy? Maybe you could summarize your thoughts on that? >> Sure, so the cloud strategy, is first of all, seamless integration to hybrid cloud environments. For example, we support Outpost as an example. Second thing, you'd be surprised at the number of cloud providers that actually use us as their backend, either for their primary storage, or for their secondary storage. So, we've got some of the largest hyperscalers in the world. For example, one of the Telcos has 150 Infiniboxes, InfiniBox SSAS and InfiniGuards. 150 running one of the largest Telcos on the planet. And a huge percentage of that is their corporate cloud effort where they're going in and saying, don't use Amazon or Azure, why don't you use us the giant Telco? So we've got that angle. We've got a ton of mid-sized cloud providers all over the world that their backup is our servers, or their primary storage that they offer is built on top of Infiniboxes or InfiniBox SSA. So, the cloud strategy is one to arm the hyperscalers, both big, medium, and small with what they need to provide the right end user services with the right outside SLAs. And the second thing is to have that hybrid cloud integration capability. For example, when I talked about InfiniGuard, we can do air gapping locally to give almost instantaneous recovery, but at the same time, if there's an earthquake in California or a tornado in Kansas City, or a tsunami in Singapore, you've got to have that remote air gapping capability, which InfiniGuard can do. Which of course, is essentially that logical air gap remote is basically a cloud strategy. So, we can do all of that. That's why it has a cloud strategy play. And again we have a number of public references in the cloud, US signal and others, where they talk about why they use the InfiniBox, and our technologies to offer their storage cloud services based on our platform. >> Okay, so I got to ask you, so you've mentioned earthquakes, a lot of earthquakes in California, dangerous place to live, US headquarters is in Waltham, we're going to pry you out of the Golden State? >> Let's see, I was born at Stanford hospital where my parents met when they were going there. I've never lived anywhere, but here. And of course, remember when I was working for EMC, I flew out every week, and I sort of lived at that Milford Courtyard Marriott. So I'll be out a lot, but I will not be moving, I'm a Silicon Valley guy, just like that old book, the Silicon Valley Guy from the old days, that's me. >> Yeah, the hotels in Waltham are a little better, but... So, what's your priority? Last question. What's the priority first 100 days? Where's your focus? >> Number one priority is team assessment and integration of the team across the other teams. One of the things I noticed about Infinidat, which is a little unusual, is there sometimes are silos and having done seven other small companies and startups, in a startup or a small company, you usually don't see that silo-ness, So we have to break down those walls. And by the way, we've been incredibly successful, even with the silos, imagine if everybody realized that business is a team sport. And so, we're going to do that, and do heavy levels of integration. We've already started to do an incredible outreach program to the press and to partners. We won a couple awards recently, we're up for two more awards in Europe, the SDC Awards, and one of the channel publications is going to give us an award next week. So yeah, we're amping up that sort of thing that we can leverage and extend. Both in the short term, but also, of course, across a longer term strategy. So, those are the things we're going to do first, and yeah, we're going to be rolling into, of course, 2022. So we've got a lot of work we're doing, as I mentioned, I'm meeting, five partners, CEOs, and only one of them is doing business with us now. So we want to get those partners to kick off January with us presenting at their sales kickoff, going "We are going with Infinidat "as one of our strong storage providers". So, we're doing all that upfront work in the first 100 days, so we can kick off Q1 with a real bang. >> Love the channel story, and you're a good guy to do that. And you mentioned the silos, correct me if I'm wrong, but Infinidat does a lot of business in overseas. A lot of business in Europe, obviously the affinity to the engineering, a lot of the engineering work that's going on in Israel, but that's by its very nature, stovepipe. Most startups start in the US, big market NFL cities, and then sort of go overseas. It's almost like Infinidat sort of simultaneously grew it's overseas business, and it's US business. >> Well, and we've got customers everywhere. We've got them in South Africa, all over Europe, Middle East. We have six very large customers in India, and a number of large customers in Japan. So we have a sales team all over the world. As you mentioned, our white glove service includes not only our field systems engineers, but we have a professional services group. We've actually written custom software for several customers. In fact, I was on the forecast meeting earlier today, and one of the comments that was made for someone who's going to give us a PO. So, the sales guy was saying, part of the reason we're getting the PO is we did some professional services work last quarter, and the CIO called and said, I can't believe it. And what CIO calls up a storage company these days, but the CIO called him and said "I can't believe the work you did. We're going to buy some more stuff this quarter". So that white glove service, our technical account managers to go along with the field sales SEs and this professional service is pretty unusual in a small company to have that level of, as you mentioned yourself, white glove service, when the company is so small. And that's been a real hidden gem for this company, and will continue to be so. >> Well, Eric, congratulations on the appointment, the new role, excited to see what you do, and how you craft the story, the strategy. And we've been following Infinidat since, sort of day zero and I really wish you the best. >> Great, well, thank you very much. Always appreciate theCUBE. And trust me, Dave, next time I will have my famous Hawaiian shirt. >> Ah, I can't wait. All right, thanks to Eric, and thank you for watching everybody. This is Dave Vellante for theCUBE, and we'll see you next time. (bright upbeat music)
SUMMARY :
Hertzog has been named CMO of the year on the job for two weeks. That's a pretty buttoned up company. a Hawaiian shirt, don't worry. you know Phil, my 99 seat joke, So, the whole thing took about division for awhile at the EMC. and the low latency, what are the... the reality is, when you You're a leader in the And that's the best scenario you can do just the marketing guy, and of course, the container layer and at the time the strategy And the second thing the Silicon Valley Guy from Yeah, the hotels in Waltham and integration of the team a lot of the engineering work and one of the comments that was made the new role, excited to see what you do, Great, well, thank you very much. and thank you for watching everybody.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
IBM | ORGANIZATION | 0.99+ |
Phil Bullinger | PERSON | 0.99+ |
Eric | PERSON | 0.99+ |
Europe | LOCATION | 0.99+ |
2011 | DATE | 0.99+ |
India | LOCATION | 0.99+ |
Phil | PERSON | 0.99+ |
Telco | ORGANIZATION | 0.99+ |
EMC | ORGANIZATION | 0.99+ |
Ken Steinhardt | PERSON | 0.99+ |
California | LOCATION | 0.99+ |
Japan | LOCATION | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
HP | ORGANIZATION | 0.99+ |
Israel | LOCATION | 0.99+ |
Eric Hertzog | PERSON | 0.99+ |
Telcos | ORGANIZATION | 0.99+ |
Infinidat | ORGANIZATION | 0.99+ |
100% | QUANTITY | 0.99+ |
South Africa | LOCATION | 0.99+ |
US | LOCATION | 0.99+ |
Isilon | ORGANIZATION | 0.99+ |
70 | QUANTITY | 0.99+ |
John Farrier | PERSON | 0.99+ |
Eric Herzog | PERSON | 0.99+ |
Hertzog | PERSON | 0.99+ |
two weeks | QUANTITY | 0.99+ |
99 seats | QUANTITY | 0.99+ |
Asia | LOCATION | 0.99+ |
Herzog | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
Golden State | LOCATION | 0.99+ |
Waltham | LOCATION | 0.99+ |
Richard Bradbury | PERSON | 0.99+ |
Rico | PERSON | 0.99+ |
next week | DATE | 0.99+ |
one | QUANTITY | 0.99+ |
North America | LOCATION | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
January | DATE | 0.99+ |
Oracle | ORGANIZATION | 0.99+ |
both | QUANTITY | 0.99+ |
five partners | QUANTITY | 0.99+ |
LSA | ORGANIZATION | 0.99+ |
Kansas City | LOCATION | 0.99+ |
2022 | DATE | 0.99+ |
Milax | ORGANIZATION | 0.99+ |
Duplessy | PERSON | 0.99+ |
Middle East | LOCATION | 0.99+ |
EMEA | ORGANIZATION | 0.99+ |
CapEx | ORGANIZATION | 0.99+ |
seven | QUANTITY | 0.99+ |
Both | QUANTITY | 0.99+ |
OPEX | ORGANIZATION | 0.99+ |
last quarter | DATE | 0.99+ |
One | QUANTITY | 0.99+ |
one customer | QUANTITY | 0.99+ |
first | QUANTITY | 0.98+ |
Singapore | LOCATION | 0.98+ |
EMC Hitachi | ORGANIZATION | 0.98+ |
Storage Powerhouse | ORGANIZATION | 0.98+ |
Luke Hinds, Red Hat | KubeCon + CloudNativeCon NA 2021
>>Welcome to this cube conversation. I'm Dave Nicholson and we're having this conversation in advance of cube con cloud native con north America, 2021. Uh, we are going to be talking specifically about a subject near and dear to my heart, and that is security. We have a very special guest from red hat, the security lead from the office of the CTO. New kinds. Welcome. Welcome to the cube Luke. >>Oh, it's great to be here. Thank you, David. Really looking forward to this conversation. >>So you have a session, uh, at a CubeCon slash cloud native con this year. And, uh, frankly, I look at the title and based on everything that's going on in the world today, I'm going to accuse you of clickbait because the title of your session is a secure supply chain vision. Sure. What other than supply chain has is in the news today, all of these things going on, but you're talking about the software supply chain. Aren't you tell, tell us about, tell us about this vision, where it came from Phyllis in. >>Yes, very much. So I do agree. It is a bit of a buzzword at the moment, and there is a lot of attention. It is the hot topic, secure supply chains, thanks to things such as the executive order. And we're starting to see an increase in attacks as well. So there's a recent statistic came out that was 620%. I believe increase since last year of supply chain attacks involving the open source ecosystem. So things are certainly ramping up. And so there is a bit of clickbait. You got me there. And um, so supply chains, um, so it's predominantly let's consider what is a supply chain. Okay. And we'll, we'll do this within the context of cloud native technology. Okay. Cause there's many supply chains, you know, many, many different software supply chains. But if we look at a cloud native one predominantly it's a mix of people and machines. >>Okay. So you'll have your developers, uh, they will then write code. They will change code and they'll typically use our, a code revision control system, like get, okay, so they'll make their changes there. Then push those changes up to some sort of repository, typically a get Harbor or get level, something like that. Then another human will then engage and they will review the code. So somebody that's perhaps a maintain will look at the code and they'll improve that a code. And then at the same time, the machine start to get involved. So you have your build servers that run tests and integration tests and they check the code is linted correctly. Okay. And then you have this sort of chain of events that start to happen. These machines, these various actors that start to play their parts in the chain. Okay. So your build system might generate a container image is a very common thing within a cloud native supply chain. >>Okay. And then that image is typically deployed to production or it's hosted on a registry, a container registry, and then somebody else might utilize that container image because it has software that you've packaged within that container. Okay. And then this sort of prolific expansion of use of coasts where people start to rely on other software projects for their own dependencies within their code. Okay. And you've got this kind of a big spaghetti of actors that are dependent on each other and feed him from each other. Okay. And then eventually that is deployed into production. Okay. So these machines are a lot of them non open source code. Okay. Even if there is a commercial vendor that manages that as a service, it's all based on predominantly open source code. Okay. And the security aspects with the supply chain is there's many junctures where you can exploit that supply chain. >>So you can exploit the human, or you could be a net ferrous human in the first place you could steal somebody's identity. Okay. And then there's the build systems themselves where they generate these artifacts and they run jobs. Okay. And then there are the production system, which pulls these down. Okay. And then there's the element of which we touched upon around libraries and dependencies. So if you look at a lot of projects, they will have approximately around a hundred, perhaps 500 dependencies that they all pull in from. Okay. So then you have the supply chains within each one of those, they've got their own set of humans and machines. And so it's a very large spaghetti beast of, of, of sort of dependence and actors and various identities that make up. >>Yeah. You're, you're describing a nightmarish, uh, scenario here. So, uh, so, so I definitely appreciate the setup there. It's a chain of custody nightmare. Yeah. >>Yes. Yeah. But it's also a wonderful thing because it's allowed us to develop in the paradigms that we have now very fast, you know, you can, you can, you can prototype and design and build and ship very fast, thanks to these tools. So they're wonderful. It's not to say that they're, you know, that there is a gift there, but security has arguably been left as a bit of an afterthought essentially. Okay. So security is always trying to it's at the back of the race. It's always trying to catch up with you. See what I mean? So >>Well, so is there a specific reason why this is particularly timely? Um, in, you know, when we, when we talk about deployment of cloud native applications, uh, something like 75% of what we think of is it is still on premesis, but definitely moving in the direction of what we loosely call cloud. Um, is why is this particularly timely? >>I think really because of the rampant adoption that we see. So, I mean, as you rightly say, a lot of, uh, it companies are still running on a, sort of a, more of a legacy model okay. Where deployments are more monolithic and statics. I mean, we've both been around for a while when we started, you would, you know, somebody would rack a server, they plug a network cable and you'd spend a week deploying the app, getting it to run, and then you'd walk away and leave it to a degree. Whereas now obviously that's really been turned on its head. So there is a, an element of not everybody has adopted this new paradigm that we have in development, but it is increasing, there is rapid adoption here. And, and many that aren't many that rather haven't made that change yet to, to migrate to a sort of a cloud type infrastructure. >>They certainly intend to, well, they certainly wished to, I mean, there's challenges there in itself, but it, I would say it's a safe bet to say that the prolific use of cloud technologies is certainly increasing as we see in all the time. So that also means the attack vectors are increasing as we're starting to see different verticals come into this landscape that we have. So it's not just your kind of a sort of web developer that are running some sort of web two.site. We have telcos that are starting to utilize cloud technology with virtual network functions. Uh, we have, um, health banking, FinTech, all of these sort of large verticals are starting to come into cloud and to utilize the cloud infrastructure model that that can save them money, you know, and it can make them, can make their develop more agile and, you know, there's many benefits. So I guess that's the main thing is really, there's a convergence of industries coming into this space, which is starting to increase the security risks as well. Because I mean, the security risks to a telco are a very different group to somebody that's developing a web platform, for example. >>Yeah. Yeah. Now you, you, uh, you mentioned, um, the sort of obvious perspective from the open source perspective, which is that a lot of this code is open source code. Um, and then I also, I assume that it makes a lot of sense for the open source community to attack this problem, because you're talking about so many things in that chain of custody that you described where one individual private enterprise is not likely to be able to come up with something that handles all of it. So, so what's your, what's your vision for how we address this issue? I know I've seen in, um, uh, some of the content that you've produced an allusion to this idea that it's very similar to the concept of a secure HTTP. And, uh, and so, you know, imagine a world where HTTP is not secure at any time. It's something we can't imagine yet. We're living in this parallel world where, where code, which is one of the four CS and cloud security, uh, isn't secure. So what do we do about that? And, and, and as you share that with us, I want to dive in as much as we can on six store explain exactly what that is and, uh, how you came up with this. >>Yes, yes. So, so the HTTP story's incredibly apt for where we are. So around the open source ecosystem. Okay. We are at the HTTP stage. Okay. So a majority of code is pulled in on trusted. I'm not talking about so much here, somebody like a red hat or, or a large sort of distributor that has their own sign-in infrastructure, but more sort of in the, kind of the wide open source ecosystem. Okay. The, um, amount of code that's pulled in on tested is it's the majority. Okay. So, so it is like going to a website, which is HTTP. Okay. And we sort of use this as a vision related to six store and other projects that are operating in this space where what happened effectively was it was very common for sites to run on HTTP. So even the likes of Amazon and some of the e-commerce giants, they used to run on HTTP. >>Okay. And obviously they were some of the first to, to, uh, deploy TLS and to utilize TLS, but many sites got left behind. Okay. Because it was cumbersome to get the TLS certificate. I remember doing this myself, you would have to sort of, you'd have to generate some keys, the certificate signing request, you'd have to work out how to run open SSL. Okay. You would then go to an, uh, a commercial entity and you'd probably have to scan your passport and send it to them. And there'll be this kind of back and forth. Then you'll have to learn how to configure it on your machine. And it was cumbersome. Okay. So a majority just didn't bother. They just, you know, they continue to run their, their websites on protected. What effectively happened was let's encrypt came along. Okay. And they disrupted that whole paradigm okay. >>Where they made it free and easy to generate, procure, and set up TLS certificates. So what happened then was there was a, a very large change that the kind of the zeitgeists changed around TLS and the expectations of TLS. So it became common that most sites would run HTTPS. So that allowed the browsers to sort of ring fence effectively and start to have controls where if you're not running HTTPS, as it stands today, as it is today is kind of socially unacceptable to run a site on HTTP is a bit kind of, if you go to HTTP site, it feels a bit, yeah. You know, it's kind of, am I going to catch a virus here? It's kind of, it's not accepted anymore, you know, and, and it needed that disruptor to make that happen. So we want to kind of replicate that sort of change and movement and perception around software signing where a lot of software and code is, is not signed. And the reason it's not signed is because of the tools. It's the same story. Again, they're incredibly cumbersome to use. And the adoption is very poor as well. >>So SIG stores specifically, where did this, where did this come from? And, uh, and, uh, what's your vision for the future with six? >>Sure. So six door, six doors, a lockdown project. Okay. It started last year, July, 2020 approximately. And, uh, a few people have been looking at secure supply chain. Okay. Around that time, we really started to look at it. So there was various people looking at this. So it's been speaking to people, um, various people at Purdue university in Google and, and other, other sort of people trying to address this space. And I'd had this idea kicking around for quite a while about a transparency log. Okay. Now transparency logs are actually, we're going back to HTTPS again. They're heavily utilized there. Okay. So when somebody signs a HTTPS certificate as a root CA, that's captured in this thing called a transparency log. Okay. And a transparency log is effectively what we call an immutable tamper proof ledger. Okay. So it's, it's kind of like a blockchain, but it's different. >>Okay. And I had this idea of what, if we could leverage this technology okay. For secure supply chain so that we could capture the provenance of code and artifacts and containers, all of these actions, these actors that I described at the beginning in the supply chain, could we utilize that to provide a tamper resistant publicly or DePaul record of the supply chain? Okay. So I worked on a prototype wherever, uh, you know, some, uh, a week or two and got something basic happening. And it was a kind of a typical open source story there. So I wouldn't feel right to take all of the glory here. It was a bit like, kind of, you look at Linux when he created a Linux itself, Linus, Torvalds, he had an idea and he shared it out and then others started to jump in and collaborate. So it's a similar thing. >>I, um, shared it with an engineer from Google's open source security team called Dan Lawrence. Somebody that I know of been prolific in this space as well. And he said, I'd love to contribute to this, you know, so can I work this? And I was like, yeah, sure though, you know, the, the more, the better. And then there was also Santiago professor from Purdue university took an interest. So a small group of people started to work on this technology. So we built this project that's called Rico, and that was effectively the transparency log. So we started to approach projects to see if they would like to, to utilize this technology. Okay. And then we realized there was another problem. Okay. Which was, we now have a storage for signed artifacts. Okay. A signed record, a Providence record, but nobody's signing anything. So how are we going to get people to sign things so that we can then leverage this transparency log to fulfill its purpose of providing a public record? >>So then we had to look at the signing tools. Okay. So that's where we came up with this really sort of clever technology where we've managed to create something called ephemeral keys. Okay. So we're talking about a cryptographic key pair here. Okay. And what we could do we found was that we could utilize other technologies so that somebody wouldn't have to manage the private key and they could generate keys almost point and click. So it was an incredibly simple user experience. So then we realized, okay, now we've got an approach for getting people to sign things. And we've also got this immutable, publicly audited for record of people signing code and containers and artifacts. And that was the birth of six store. Then. So six store was created as this umbrella project of all of these different tools that were catering towards adoption of signing. And then being able to provide guarantees and protections by having this transparency log, this sort of blockchain type technology. So that was where we really sort of hit the killer application there. And things started to really lift off. And the adoption started to really gather steam then. >>So where are we now? And where does this go into the future? One of the, one of the wonderful things about the open source community is there's a sense of freedom in the creativity of coming up with a vision and then collaborating with others. Eventually you run headlong into expectations. So look, is this going to be available for purchase in Q1? What's the, >>Yeah, I, I will, uh, I will fill you in there. Okay. So, so with six door there's, um, there's several different models that are at play. Okay. I'll give you the, the two predominant ones. So one, we plan, we plan to run a public service. Okay. So this will be under the Linux foundation and it'll be very similar to let's encrypt. So you as a developer, if you want to sign your container, okay. And you want to use six door tooling that will be available to you. There'll be non-profit three to use. There's no specialties for anybody. It's, it's there for everybody to use. Okay. And that's to get everybody doing the right thing in signing things. Okay. The, the other model for six stories, this can be run behind a firewall as well. So an enterprise can stand up their own six store infrastructure. >>Okay. So the transparency log or code signing certificates, system, client tools, and then they can sign their own artifacts and secure, better materials, all of these sorts of things and have their own tamper-proof record of everything that's happened. So that if anything, untoward happens such as a key compromise or somebody's identity stolen, then you've got a credible source of truth because you've got that immutable record then. So we're seeing, um, adoption around both models. We've seen a lot of open source projects starting to utilize six store. So predominantly key, um, Kubernetes is a key one to mention here they are now using six store to sign and verify their release images. Okay. And, uh, there's many other open-source projects that are looking to leverage this as well. Okay. And then at the same time, various people are starting to consider six door as being a, sort of an enterprise signing solution. So within red hat, our expectations are that we're going to leverage this in open shift. So open shift customers who wish to sign their images. Okay. Uh, they want to sign their conflicts that they're using to deploy within Kubernetes and OpenShift. Rather they can start to leverage this technology as open shift customers. So we're looking to help the open source ecosystem here and also dog food, this, and make it available and useful to our own customers at red hat. >>Fantastic. You know, um, I noticed the red hat in the background and, uh, and, uh, you know, I just a little little historical note, um, red hat has been there from the beginning of cloud before, before cloud was cloud before there was anything credible from an enterprise perspective in cloud. Uh, I, I remember in the early two thousands, uh, doing work with tree AWS and, uh, there was a team of red hat folks who would work through the night to do kernel level changes for the, you know, for the Linux that was being used at the time. Uh, and so a lot of, a lot of what you and your collaborators do often falls into the category of, uh, toiling in obscurity, uh, to a certain degree. Uh, we hope to shine light on the amazing work that you're doing. And, um, and I, for one appreciate it, uh, I've uh, I've, I've suffered things like identity theft and, you know, we've all had brushes with experiences where compromise insecurity is not a good thing. So, um, this has been a very interesting conversation. And again, X for the work that you do, uh, do you have any other, do you have any other final thoughts or, or, uh, you know, points that we didn't cover on this subject that come to mind, >>There is something that you touched upon that I'd like to illustrate. Okay. You mentioned that, you know, identity theft and these things, well, the supply chain, this is critical infrastructure. Okay. So I like to think of this as you know, there's, sir, they're serving, you know, they're solving technical challenges and, you know, and the kind of that aspect of software development, but with the supply chain, we rely on these systems. When we wake up each morning, we rely on them to stay in touch with our loved ones. You know, we are our emergency services, our military, our police force, they rely on these supply chains, you know, so I sort of see this as there's a, there's a bigger vision here really in protecting the supply chain is, is for the good of our society, because, you know, a supply chain attack can go very much to the heart of our society. You know, it can, it can be an attack against our democracies. So I, you know, I see this as being something that's, there's a humanistic aspect to this as well. So that really gets me fired up to work on this technology., >>it's really important that we always keep that perspective. This isn't just about folks who will be attending CubeCon and, uh, uh, uh, cloud con uh, this is really something that's relevant to all of us. So, so with that, uh, fantastic conversation, Luke, it's been a pleasure to meet you. Pleasure to talk to you, David. I look forward to, uh, hanging out in person at some point, whatever that gets me. Uh, so with that, uh, we will sign off from this cube conversation in anticipation of cloud con cube con 2021, north America. I'm Dave Nicholson. Thanks for joining us.
SUMMARY :
Welcome to this cube conversation. Oh, it's great to be here. So you have a session, uh, at a CubeCon slash cloud So there's a recent statistic came out that was 620%. So you have your build servers that run tests and integration And the security aspects with the supply chain is there's many junctures So then you have the supply chains within each one of those, It's a chain of custody nightmare. in the paradigms that we have now very fast, you know, you can, you can, Um, in, you know, when we, when we talk about deployment of cloud native applications, So there is a, So that also means the I assume that it makes a lot of sense for the open source community to attack this problem, So around the open source ecosystem. I remember doing this myself, you would have to sort of, you'd have to generate some keys, So that allowed the browsers to sort So there was various people looking at this. uh, you know, some, uh, a week or two and got something basic happening. So a small group of people started to work on this technology. So that was where we really sort of hit So where are we now? So you as a developer, if you want to sign your container, okay. So that if anything, untoward happens such as And again, X for the work that you do, So I like to think of this as you know, it's really important that we always keep that perspective.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
David | PERSON | 0.99+ |
Dave Nicholson | PERSON | 0.99+ |
Luke Hinds | PERSON | 0.99+ |
Luke | PERSON | 0.99+ |
ORGANIZATION | 0.99+ | |
75% | QUANTITY | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
620% | QUANTITY | 0.99+ |
Dan Lawrence | PERSON | 0.99+ |
six stories | QUANTITY | 0.99+ |
KubeCon | EVENT | 0.99+ |
six doors | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
2021 | DATE | 0.99+ |
CubeCon | EVENT | 0.99+ |
a week | QUANTITY | 0.99+ |
two | QUANTITY | 0.99+ |
both models | QUANTITY | 0.98+ |
AWS | ORGANIZATION | 0.98+ |
one | QUANTITY | 0.98+ |
first | QUANTITY | 0.98+ |
six store | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
500 dependencies | QUANTITY | 0.98+ |
six | QUANTITY | 0.98+ |
north America | LOCATION | 0.98+ |
Linux | TITLE | 0.98+ |
three | QUANTITY | 0.97+ |
each morning | QUANTITY | 0.97+ |
cloud con cube con 2021 | EVENT | 0.97+ |
this year | DATE | 0.97+ |
six door | QUANTITY | 0.97+ |
both | QUANTITY | 0.97+ |
four | QUANTITY | 0.97+ |
around a hundred | QUANTITY | 0.97+ |
One | QUANTITY | 0.96+ |
last year, July, 2020 | DATE | 0.95+ |
Q1 | DATE | 0.94+ |
each one | QUANTITY | 0.94+ |
Rico | ORGANIZATION | 0.93+ |
Purdue university | ORGANIZATION | 0.93+ |
Red Hat | ORGANIZATION | 0.91+ |
one individual | QUANTITY | 0.91+ |
SIG | ORGANIZATION | 0.91+ |
Kubernetes | ORGANIZATION | 0.91+ |
cloud con | EVENT | 0.89+ |
CTO | ORGANIZATION | 0.88+ |
approximately | QUANTITY | 0.88+ |
CubeCon | ORGANIZATION | 0.86+ |
HTTPS | TITLE | 0.82+ |
red hat | ORGANIZATION | 0.82+ |
two thousands | QUANTITY | 0.8+ |
store | ORGANIZATION | 0.8+ |
CloudNativeCon NA 2021 | EVENT | 0.8+ |
Linus | ORGANIZATION | 0.77+ |
Providence | LOCATION | 0.76+ |
red hat | TITLE | 0.74+ |
Kubernetes | TITLE | 0.74+ |
six store | ORGANIZATION | 0.72+ |
cloud native con | ORGANIZATION | 0.71+ |
Santiago | PERSON | 0.69+ |
telco | ORGANIZATION | 0.67+ |
OpenShift | TITLE | 0.65+ |
Phyllis | ORGANIZATION | 0.62+ |
red | ORGANIZATION | 0.59+ |
HTTPS | OTHER | 0.55+ |
Torvalds | PERSON | 0.53+ |
kernel | TITLE | 0.5+ |
ones | QUANTITY | 0.48+ |
DePaul | ORGANIZATION | 0.48+ |
hat | ORGANIZATION | 0.47+ |
hat | TITLE | 0.41+ |
2021 035 Uma Lakshmipathy and Saju Sankarankutty V4
>>Welcome to the cubes coverage of HP discover 2021. I'm your host lisa martin. I've got a couple of guests with me here from emphasis. Alumni Yuma lacks empathy. Is back. Senior vice president and regional head of EMEA emphasis Yuma. It's great to see you welcome back to the program. >>Yeah. Hi Liza. It's great to be back for discover 2021. It's been a great opportunity to meet with a lot of our stakeholders and hp. >>Excellent. We're gonna dig into that. And so do Cutie is here as well. The CTO Cloud Advisory, VP hybrid cloud engineering platforms and automation at emphasis Sergey Welcome to the program. >>Thank you lisa. It's a pleasure to be in the program is my first time but I really enjoy it. Well >>Welcome. Welcome. So the next 15 minutes or so we're gonna unpack a survey that was just done as we know cloud has catalyzed a lot in the last year. One of those being cloud adoption. Talk to us about some of the things that you've seen as more and more enterprises are moving workloads to cloud. How is a hybrid cloud enabling businesses to grow, enabling them to actually have a competitive edge? >>Uh lisa if you uh if you look at the pre covid scenario and what there are many, many clients which actually made a significant move into cloud, but there were many few, a few of the companies who didn't really take a mature uh cloud adoption. But those companies which actually did the adoption, we see that have taken a big step with the help of the when the covid hit them because they were able to be very resilient, but at the same time they were able to the cloud adoption really help them to improve their business profits. Uh When we did this cloud reader survey across all the geography is we didn't get across the U. S. The latin, the issue pacific the email markets. And when we looked at uh what our clients and enterprises were able to recover and get all of this whole cloud adoption. We've got a number of 414 billions of profits that the enterprises can make by using this cloud adoption. And that's what we saw in this survey that we did with our clients. >>Yeah, that's huge. Enterprises the survey found can add up to you said 414 billion and that new profits annually through effective cloud adoption and sticking with you for a second. What does emphasis described as effective cloud adoption? >>When we look at cloud adoption, we have enterprises who started shifting workloads which are very comfortable for them. And then uh then they started to take the more mature understanding of moving workloads which were very critical to the business. So when we look at effective, it is a combination of both the ones that were very easy to go to the cloud, the ones that made business is able to bring in new applications and new, go to markets uh, to their segments to their clients. But then it is also about taking some of those legacy world clothes and making a choice the right choice to take it by transforming those applications and environments uh, into the cloud direction. And that's what we call as effective. It's just not the easy ones, but also those complex and legacy rebuild ones that that effectively goes on to transform itself into a new way for the for their clients and for the experience of the users. >>It's a big changes coming, big opportunities. We see, we've talked about this for many times more and more companies moving to multi cloud arrangements for a variety of reasons. What have been some of the things that emphasis has experienced and what are some of your viewpoints on a multi cloud? >>Thank you, lisa. So, um, if you look around right, you know, hybrid cloud has been the new normal. Right? And um and if you look at it, private cloud is becoming an essential component for hosting applications. You know, uh you know, when you look at it, it's more about applications which have low latency requirements, you know, it has regulatory requirements or it has a static demand of infrastructure. Now, what emphasis has done in this space is is that, you know, we have um we have developed a framework which we call it as a right loud solution framework and this is focused on implementing a hybrid multi cloud leveraging an in house developed tools and frameworks as well as platforms along with our strategic Puerto rico system, that is our biggest contribution onto the hybrid multi cloud world. Now, the foundation of our framework is emphasis Polly cloud platform. It's a unified multi cloud management platform. It can provision, it can orchestrate, it can also manage the cloud deployment across multiple of the environment. It can be a private, it can be public or it can be on the edge. Now, apart from all of these things, it also offers features and functionality is very similar to the hyper scholars and either it can be in terms of the user experience or it can be in a commercial model or a technology stack or it can be reports or it can be persona based user experience and integration with multiple systems. It brings all of these functionalities seamlessly across the multiple hybrid ecosystem. That's the biggest contribution from emphasis in this space. >>Got it. Okay. As we see the just clear growth of multi cloud in every industry. Talk to us about what the cloud radar survey uncovered with respective you mentioned that big number, the correlation between cloud transformation and profitable growth for enterprises across any industry. >>So I did mention about it uh lisa in in the previous question as well. When we looked at when we look at enterprises trying to take the cloud adoption, the big benefits for the enterprises do happen when they crossed that uh layer of moving a significant part of their existing legacy in a very transformed new world. And that brings in the new way of working for their customers for their end users and internally as well for their various stakeholders. And that I think is creating a cost structure for them, which is very, very optimal from where they were. But at the same time, it is enabling their ecosystem of of users and customers to come and operate in a very seamless fashion. And that is the biggest advantage of uh boosting profits for them at the same time, cutting costs within the, within the internal stakeholders. So at one stage you're optimizing your cost at another stage, you're bringing in the easiness for your clients to operate on, which is actually creating that enlarged profit boost. >>I'm sticking with you for a second. If we unpack that growth, that business profit growth opportunity that you the survey uncovered, Are we talking about things like faster time to market, increasing scale? What are some of the things underneath that hood? >>So, if you if you look at uh traditionally cloud was considered uh the enabler for quick, faster time to market. But now cloud has become the central theme for resilience. If you look at the covid pandemic, uh, those, those enterprises which were already cloud enabled, we're able to resiliently and sustain their business and grow their businesses. So as economy started opening up, if I can talk about an automotive client who is today enriching businesses out of china because they have the first economy that has opened up after the pandemic. So you see a lot of enablement for those enterprises which have already taken the cloud journey. And if you look at Today, enterprises are in somewhere around 17-18% of of cloud adopt mint and if they can take that to the 40%, that's when they will see that kind of boosted profits. And we can clearly see about $400 plus billion dollars of profits that enterprises can make. >>All right, so let's talk to you for a second. If we look at some of the survey results, the acceleration that is expected to be seen by in the next year of enterprises moving so many more workloads to cloud. You talked about hybrid cloud. Talk to me about how the experience of working with HP in creating joint solution suites is going to help the customers facilitate and drive that transformation. >>Thank you lisa. So if you look at H P E, H P E comes with a fine set of technology and commercial constructs, you know, that complements our right cloud framework and they offer the solutions. The whole sort of a lot of solutions offer private cloud as a service which is a major component of our right club framework. Either it is a continuous service with HP is is immoral data platform on HP hardware or video as a service based on a compose Herbal and Converse infrastructure or H. P. S cloud built on HPC cloud, build on Cray systems and all of them commercially supported with an H. P. S. Green leg offering makes it very attractive for our customers. Now, these integrations have helped us in providing a very similar metering and billing along with the chargeback solutions, very much in line with what is being provided by Hyper scholars. Apart from this, we also work very closely with H. P. E to create a very compelling sourcing strategy for driving hybrid cloud driven digital transformation while taking cost out and protecting the existing investments through various financial models for our customers, helping them in terms of transforming their digital estate in the, in the new cloud world. >>And um, I want to get your perspective as well. The HP emphasis partnership talk to me about that being a win win for your clients in every industry. >>So actually uh Visa is a great question and this probably is my third uh cube interview and I've told this previously as well in my previous interviews as well, the relationship between emphasis and hedge P is very very strategy and it's it's very very top down driven. And today we've seen very high transformative opportunities that two organizations have come together and we won't call it win win, but we call it a win win win, which is essentially win for HPV win for emphasis, but even for the clients as well. So if you look at some of the engagements that we have jointly done, everything has been transformative. I can talk about uh energy client where we've done a huge which will be D I uh engagement with them, where we have been able to take them very uh seamlessly when the covid pandemic hit them so that there are significant part of their right to users but be able to operate from their residences. I can talk about a great story about how we had enabled Green Lake for a wind energy company. Uh and how that Green Lake capability help the customer to migrate the application seamlessly uh to a hybrid cloud. And there are so many examples of similar scale and size when we look at clients in the manufacturing space and the automobile sector, where we've really done work very closely with HP across all regions and all geography is uh to make this what I would call a win win win partnership. >>I like that when when when who wouldn't want that. One more question for you talk to me about the next, as we talked about some of those survey results and I think folks can find that survey the cloud radar survey on the emphasis dot com website. I found it on the homepage there. But looking at how much Transformation is expected in the next 12 months or so, what are some of the things that we can expect from emphasis on H. P. E. to help drive and catalyze that growth that you expect to see in the next 12 months? >>Yeah. And I was talking to you before this interview and you said that yes, we gotta look at this. And I was feeling very happy that you have the opportunity to look at the side. And you said that look there's an opportunity to also make to continuously provide feedback. And we're very happy for clients to come in and look at it and do provide us the feedback. This is a constant learning for us. We have a big learning company Uh and when it comes to uh the next 12 months of agenda, I think the pipeline is very robust for both us and the hp. In terms of the way we want to take proactive transformational opportunities to the to our clients create a value differentiation on the hybrid cloud for them. And uh clearly uh this this survey clearly came back to reflect back to us that our strategy that we've done together as partners is the right strategy because there is a significant headroom for growth uh in the cloud space uh for both emphasis and H. B. >>Excellent. Well gentlemen, thank you for joining me today, talking to me about what emphasis and HP are doing together, unpacking some of the significant insights that the cloud radar survey has uncovered. We appreciate your time. >>Thank you lisa. Thank you. Thank you for giving us this opportunity. >>Absolutely. For election Soju. I'm lisa martin. You're watching the cubes coverage of HP discover 2021. Yeah, yeah.
SUMMARY :
It's great to see you welcome back to the program. It's been a great opportunity to meet with a lot of our stakeholders to the program. It's a pleasure to be in the program is my first time but I really enjoy it. So the next 15 minutes or so we're gonna unpack a survey the cloud adoption really help them to improve their business profits. Enterprises the survey found can add up to you said 414 and for the experience of the users. What have been some of the things that And um and if you look at it, private cloud is becoming an essential Talk to us about what the cloud radar survey uncovered with respective you mentioned that big number, And that is the biggest advantage of uh that you the survey uncovered, Are we talking about things like faster time to market, the enabler for quick, faster time to market. the acceleration that is expected to be seen by in the next year of enterprises moving So if you look at H P E, H P E comes with a fine The HP emphasis partnership talk to me about that that Green Lake capability help the customer to migrate the application that growth that you expect to see in the next 12 months? And I was feeling very happy that you have the opportunity to look at the side. Well gentlemen, thank you for joining me today, talking to me about what emphasis and HP are doing together, Thank you for giving us this opportunity. Yeah,
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Liza | PERSON | 0.99+ |
lisa martin | PERSON | 0.99+ |
Saju Sankarankutty | PERSON | 0.99+ |
Uma Lakshmipathy | PERSON | 0.99+ |
414 billion | QUANTITY | 0.99+ |
414 billions | QUANTITY | 0.99+ |
40% | QUANTITY | 0.99+ |
HP | ORGANIZATION | 0.99+ |
lisa | PERSON | 0.99+ |
china | LOCATION | 0.99+ |
today | DATE | 0.99+ |
third | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
Green Lake | ORGANIZATION | 0.99+ |
Sergey | PERSON | 0.99+ |
2021 | DATE | 0.99+ |
Yuma | PERSON | 0.99+ |
two organizations | QUANTITY | 0.99+ |
EMEA | ORGANIZATION | 0.99+ |
both | QUANTITY | 0.99+ |
Today | DATE | 0.98+ |
first economy | QUANTITY | 0.98+ |
U. S. | LOCATION | 0.98+ |
Cutie | PERSON | 0.98+ |
hp | ORGANIZATION | 0.98+ |
first time | QUANTITY | 0.97+ |
pandemic | EVENT | 0.97+ |
Puerto rico | LOCATION | 0.95+ |
One more question | QUANTITY | 0.95+ |
CTO Cloud Advisory | ORGANIZATION | 0.95+ |
H. P. S | TITLE | 0.94+ |
next year | DATE | 0.94+ |
Soju | PERSON | 0.93+ |
covid | EVENT | 0.92+ |
One | QUANTITY | 0.91+ |
one stage | QUANTITY | 0.91+ |
Herbal | ORGANIZATION | 0.9+ |
uh cube | ORGANIZATION | 0.9+ |
next 12 months | DATE | 0.9+ |
H. P. E | TITLE | 0.9+ |
dot com | ORGANIZATION | 0.89+ |
uh Visa | ORGANIZATION | 0.89+ |
second | QUANTITY | 0.87+ |
H P E | TITLE | 0.86+ |
around 17-18% | QUANTITY | 0.86+ |
about $400 plus | QUANTITY | 0.86+ |
Hyper | ORGANIZATION | 0.74+ |
HPV | ORGANIZATION | 0.73+ |
uh energy | ORGANIZATION | 0.71+ |
covid pandemic | EVENT | 0.68+ |
billion dollars | QUANTITY | 0.68+ |
Polly | ORGANIZATION | 0.63+ |
Converse | ORGANIZATION | 0.6+ |
15 minutes | DATE | 0.6+ |
H. | TITLE | 0.59+ |
couple | QUANTITY | 0.59+ |
P. | ORGANIZATION | 0.51+ |
latin | LOCATION | 0.48+ |
035 | OTHER | 0.32+ |
discover | EVENT | 0.28+ |
Brian Bouchard, Alacrinet Consulting Services | IBM Think 2021
>> From around the globe, It's theCUBE. With digital coverage of IBM Think 2021, brought to you by IBM. >> Hi, welcome back to theCUBE's coverage of IBM Think 2021 virtual. I'm John Furrier host of the CUBE. We got a great guest here. Brian Bouchard is the co-founder president and CEO of Alacrinet. Brian great to see you remoting in all the way from Puerto Rico to Palo Alto. >> That's right. >> Great to see you. >> Thanks for First of all, thanks John, for having me. I really appreciate the opportunity. >> Yeah, great to see you. Thanks for coming on. First of all, before we get into what you guys do and and how this all ties in to Think. What do you guys do at Alacrinet? Why the name? A it's good you're at the top of the list and alphabetically, but tell us the, the, the the secret behind the name and what you guys do. >> So, first of all Alacrinet is based on the root word alacrity which means a prompt and willing, a prompt a joyous prompt to, excuse me, to achieve a common goal. So we ultimately are a network of individuals with the traits of alacrity. So Alacrinet. So that's our name. >> Great. So what's your relationship with IBM and how you guys have been able to leverage the partnership program in the marketplace? Take us through the relationship. >> So, well, first of all Alacrinet is a platinum IBM business partner and it was awarded recently the 2020 IBM North American partner of the year award. And we were selected amongst 1600 other business partners across North America. We've been actually a consulting, an IT consulting company for almost 20 years now. And we were founded in 2002 in Palo Alto and we have focused specifically on cyber security since 2013. And then as part, go ahead. >> What are some of the things that you guys are working on? Because obviously, you know, the business is hot right now. Everyone's kind of looking at COVID saying we're going to double down on the most critical projects and no time for leisurely activities when it comes to IT. And cloud scale projects, you know mission critical stuff's happening what are you guys working on? >> So we're, we're focused on cybersecurity, our security services really compliment IBM's suite of security solutions and cover the full spectrum from our research and penetration testing, which helps identify vulnerabilities before a breach occurs. And we also have managed security services which helps prevent, detect and remediate attacks in real time. And then finally, we also have a security staffing division and a software resell division, which kind of rounds out the full amount of offerings that we have to provide protection for our clients. >> What are some of the biggest challenges you guys have as a business, and how's IBM helping you address those? >> Well, as you know, John, we all know the importance of cybersecurity in today's world, right? So it's increasing in both demand and importance and it's not expected to wane anytime soon. Cyber attacks are on the rise and there's no there's no expected end in sight to this. And in fact, just this week on 60 minutes, Jay Powell, the chairman of the federal reserve board he noted that cyber attacks were the number one threat to the stability of the US economy. Also this week, a public school in Buffalo New York was hacked with ransomware and the school you know, this, the school district is just contemplating you know, paying the ransom to the hackers. So there's literally thousands of these attacks happening every day, whether it's in local school district or a state government, or an enterprise even if you don't hear about them, they're happening In adding to the complexity that the cyber attackers pose is the complexity of the actual cybersecurity tools themselves. There isn't a single solution provider or a single technology, that can ensure a company's security. Our customers need to work with many different companies and disconnected tools and processes to build an individual strategy that can adequately protect their organizations. >> You know, I love this conversation whenever I talk to practitioners on cybersecurity, you know that first of all, they're super smart, usually cyber punks and they also have some kinds of eclectic backgrounds, but more importantly is that there's different approaches in terms of what you hear. Do you, do you put more if you add more firefighters, so to speak to put out the fires and solve the problems? Or do you spend your time preventing the fires from happening in the first place? You know, and you know, the buildings are burning down don't make fire fire, don't make wood make fire resistance, you know, more of a priority. So there's less fires needing firefighters So it's that balance. You throw more firefighters at the problem or do you make the supply or the material the business fireproof, what's your take on that? >> Yeah, well, it kind of works both ways. I mean, we've seen customers want it. They really want choice. They want to, in some cases they want to be the firefighter. And in some cases they want the firefighter to come in and solve their problems. So, the common problem set that we're seeing with our that our customers encounter is that they struggle one, with too many disparate tools. And then they also have too much data being collected by all these disparate tools. And then they have a lack of talent in their environment to manage their environments. So what we've done at Alacrinet is we've taken our cybersecurity practice and we've really specifically tailored our offerings to address these core challenges. So first, to address the too many disparate tools problem, we've been recommending that our clients look at security platforms like the IBM Cloud Pak for security the IBM Cloud Pak for security is built on a security platform that allows interoperability across various security tools using open standards. So our customers have been responding extremely positively to this approach and look at it as a way to future-proof their investments and begin taking advantage of interoperability with, and, tools integration. >> How about where you see your business going with this because, you know, there's not a shortage of need or demand How are you guys flexing with the market? What's the strategy? Are you going to use technology enablement? You're going to more human driven. Brian, how do you see your business unfolding? >> Well, actually really good. We're doing very well. I mean, obviously we made the, the top the business partner for IBM in 2020. They have some significant growth and a lot of interest. I think we really attack the market in a, in a with a good strategy which was to help defragment the market if you will. There's a lot of point solutions and a lot of point vendors that various, you know, they they spent specialized in one piece of the whole problem. And what we've decided to do is find them the highest priority list, every CSO and CIO has a tick list. So that how that, you know, first thing we need we need a SIM, we need an EDR, we need a managed service. We need, what's the third solution that we're doing? So we, we need some new talent in-house. So we actually have added that as well. So we added a security staffing division to help that piece of it as well. So to give you an idea of the cybersecurity market size it was valued at 150 billion in 2019 and that is expected to grow to 300 billion by 2027. And Alacrinet is well-positioned to consolidate the many fragmented aspects of the security marketplace and offer our customers more integrated and easier to manage solutions. And we will continue to help our customers select the best suite of solutions to address all types of cybersecurity, cybersecurity threats. >> You know, it's it's such a really important point you're making because you know, the tools just have piled up in the tool shed. I call it like that. It's like, it's like you don't even know what's in there anymore. And then you've got to support them. Then the world's changed. You get cloud native, the service areas increasing and then the CSOs are also challenged. Do I, how many CLAWs do I build on? Do I optimize my development teams for AWS or Azure? I mean, now that's kind of a factor. So, you have all this tooling going on they're building their own stuff they're building their own core competency. And yet the CSO still needs to be like maintaining kind of like a relevance list. That's almost like a a stock market for the for the products. You're providing that it sounds like you're providing that kind of service as well, right? >> Yeah, well, we, we distill all of the products that are out there. There's thousands of cybersecurity products out there in the marketplace and we kind of do all that distillation for the customer. We find using, you know, using a combination of things. We use Forrester and Gartner and all the market analysts to shortlist our proposed solutions that we offer customers. But then we also use our experience. And so since 2013, we've been deploying these solutions across organizations and corporations across America and we've, we've gained a large body of experience and we can take that experience and knowledge to our customers and help them, you know, make make some good decisions. So they don't have to, you know, make them go through the pitfalls that many companies do when selecting these types of solutions. >> Well congratulations, you've got a great business and you know, that's just a basic search making things easier for the CSO, more so they can be safe and secure in their environment. It's funny, you know, cyber warfare, you know the private companies have to fight their own battles got to build their own armies. Certainly the government's not helping them. And then they're confused even with how to handle all this stuff. So they need, they need your service. I'm just curious as this continues to unfold and you start to see much more of a holistic view, what's the IBM angle in here? How, why are you such a big partner of theirs? Is it because their customers are working with you they're bringing you into business? Is it because you have an affinity towards some of their products? What's the connection with IBM? >> All of the above. (chuckles) So I think it probably started with our affinity to IBM QRadar product. And we have, we have a lot of expertise in that and that solution. So that's, that's where it started. And then I think IBM's leadership in this space has been remarkable, really. So like what's happening now with the IBM Cloud Pak for security you know, building up a security platform to allow all these point solutions to work together. That's the roadmap we want to put our customers on because we believe that's the that's the future for this, this, this marketplace. >> Yeah. And the vision of hybrid cloud having that underpinning be with Red Hat it's a Linux kernel, model of all things >> Yeah. Super NetEase. >> Locked in >> It's portable, multiple, you can run it on Azure. IBM Cloud, AWS. It's portable. I mean, yeah, all this openness, as you probably know cyber security is really a laggard in the security in the information technology space as far as adopting open standards. And IBM is I think leading that charge and you'll be able to have a force multiplier with the open standards in this space. >> Open innovation with open source is incredible. I mean, if you, if, if if open source can embrace a common platform and build that kind of control plane and openness to allow thriving companies to just build out then you have an entire hybrid distributed architecture. >> Yeah. Well, I think companies want to use the best in breed. So when we, when we show these solutions to customers they want the best in breed. They always say, I don't, when it comes to security they don't want second best. They want the best it's out there because they're securing their crown jewels. So that makes sense. So the problem with, you know having all these different disparate solutions that are all top in their category none of them talk to each other. So we need to address that problem because without that being solved, this is just going to be more it's going to compound the complexity of the problems we solve day to day. >> Awesome. Congratulations, Brian, great story. You know entrepreneur built a great business over the years. I think the product's amazing. I think that's exactly what the market needs and just shows you what the ecosystem is all about. This is the power of the ecosystem. You know, a thousand flowers are blooming. You got a great product. IBM is helping as well. Good partnership, network effects built in and and still a lot more to do. Congratulations. >> Absolutely. >> Okay. >> Thank you very much >> Brian Bouchard >> Made my impression. I appreciate that >> Thanks for coming on theCUBE Appreciate it. I'm John Furrier with IBM thinks 2021 virtual coverage. Thanks for watching. (outro music plays)
SUMMARY :
brought to you by IBM. Brian great to see you remoting in I really appreciate the opportunity. of the list and alphabetically, the root word alacrity with IBM and how you partner of the year award. that you guys are working on? out the full amount of that the cyber attackers pose and solve the problems? So first, to address the too because, you know, there's So to give you an idea of because you know, the and Gartner and all the market analysts to and you know, that's just a basic search All of the above. having that underpinning be with Red Hat in the information and openness to allow thriving So the problem with, you know and just shows you what I appreciate that I'm John Furrier with IBM
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
IBM | ORGANIZATION | 0.99+ |
John | PERSON | 0.99+ |
Jay Powell | PERSON | 0.99+ |
Brian Bouchard | PERSON | 0.99+ |
Brian | PERSON | 0.99+ |
John Furrier | PERSON | 0.99+ |
Puerto Rico | LOCATION | 0.99+ |
Palo Alto | LOCATION | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
2002 | DATE | 0.99+ |
2020 | DATE | 0.99+ |
Alacrinet Consulting Services | ORGANIZATION | 0.99+ |
North America | LOCATION | 0.99+ |
America | LOCATION | 0.99+ |
2013 | DATE | 0.99+ |
2019 | DATE | 0.99+ |
Alacrinet | ORGANIZATION | 0.99+ |
first | QUANTITY | 0.99+ |
this week | DATE | 0.99+ |
thousands | QUANTITY | 0.99+ |
third solution | QUANTITY | 0.99+ |
60 minutes | QUANTITY | 0.99+ |
150 billion | QUANTITY | 0.99+ |
both ways | QUANTITY | 0.99+ |
one piece | QUANTITY | 0.99+ |
both | QUANTITY | 0.98+ |
Buffalo New York | LOCATION | 0.98+ |
1600 other business partners | QUANTITY | 0.98+ |
Forrester | ORGANIZATION | 0.98+ |
Gartner | ORGANIZATION | 0.98+ |
almost 20 years | QUANTITY | 0.97+ |
2027 | DATE | 0.97+ |
300 billion | QUANTITY | 0.97+ |
2021 | DATE | 0.97+ |
Think 2021 | COMMERCIAL_ITEM | 0.96+ |
Linux kernel | TITLE | 0.95+ |
second | QUANTITY | 0.93+ |
single technology | QUANTITY | 0.93+ |
Think | ORGANIZATION | 0.92+ |
a thousand flowers | QUANTITY | 0.92+ |
COVID | ORGANIZATION | 0.92+ |
First | QUANTITY | 0.9+ |
Azure | TITLE | 0.9+ |
CUBE | ORGANIZATION | 0.84+ |
one | QUANTITY | 0.83+ |
US | LOCATION | 0.83+ |
Red Hat | TITLE | 0.82+ |
IBM Cloud | ORGANIZATION | 0.81+ |
single solution provider | QUANTITY | 0.77+ |
cybersecurity products | QUANTITY | 0.75+ |
federal reserve board | ORGANIZATION | 0.74+ |
Pak | TITLE | 0.73+ |
QRadar | TITLE | 0.71+ |
theCUBE | ORGANIZATION | 0.64+ |
today | DATE | 0.63+ |
Cloud Pak | TITLE | 0.62+ |
NetEase | ORGANIZATION | 0.56+ |
these | QUANTITY | 0.53+ |
year | TITLE | 0.52+ |
IBM14 Brian Bouchard V2
>>From around the globe. It's the Cube with digital coverage of IBM think 2021 brought to you >>by IBM. Welcome back to the cubes coverage of IBM Think 2021 virtual. I'm john ferrier host of the Q. We've got a great guest here brian Bouchard, co founder president and ceo of Allah credit brian, great to see you um promoting it all the way from Puerto rico to Palo Alto. >>Great to >>see. First of all. Thanks for having me. I really appreciate the opportunity. >>Yeah great, Great to see you. Thanks for coming on. Um first of all, before we get into what you guys do and how this all ties in to think what do you guys do? It Alex Burnett, Why the name uh is good, you're at the top of the list and alphabetically, but tell us the secret behind the name and what you guys do. >>So first of all, a crochet is based on the root word alacrity, which means a prompt and will prompt a joyous prompt itude excuse me to achieve a common goal. So we ultimately our network of >>individuals with >>the traits of alacrity. So eloquent. So that's our name. >>Great. So what's your relation with IBM and how you guys been able to leverage the partnership program in the marketplace take us through the relationship >>so Well, first of all, L. A. Quartet is a platinum IBM business partner and was awarded recently the 2020 IBM north american Partner of the Year award. And we were selected among 1600 other business partners across North America. We've been actually a consulting an IT. consulting company for almost 20 years now and we were founded in 2002 in Palo Alto. And we have focused specifically on cybersecurity since 2013. What is >>Right, what are some of the things you guys are working on? Because obviously, you know, the business is hot right now, everyone's kind of looking at Covid saying we're gonna double down on the most critical projects and no time for leisurely activities when it comes to I T and cloud scale projects, you know, mission critical stuff is happening. What are you guys working on? >>So we're focused on cybersecurity. Our our security services really complement IBM suite of security solutions and cover the full spectrum from our research and penetration testing, which helps identify vulnerabilities before it reach occurs. And we also have managed security services which helps prevent detect and remediate attacks in real time. >>And then finally, we also have a security staffing division and a software resale division which kind of rounds out the full amount of offerings that we have to provide protection for our clients. >>What are some of the biggest challenges you guys have as a business and house IBM helping you address those? >>Well, as you know, john, we all know that the importance of cyber security in today's world, so it's increasing in both demand and importance and it's not expected to wait any time soon. Cyber attacks are on the rise and there's >>no >>Uh there's no expected end in sight to this and in fact just this week on 60 minutes, uh, the Jay Powell, the chairman of the Federal Reserve Board, he noted that cyber attacks were the number one threat to the stability of the US. economy. >>Also this week, >>a public school in Buffalo new york was hacked with ransomware >>and the school, this uh, >>the school district is just contemplating you're paying the ransom to the hackers. So there's literally thousands of these attacks happening every day, whether it's in a local school district or state government or an enterprise, even if you don't hear about them, they're happening. And adding to the complexity that the cyber Attackers pose is the complexity of the actual cybersecurity tools themselves. There isn't a single solution provider or single technology that could ensure a company security. Our customers need to work with many different companies and disconnected tools and processes to build an individual strategy that can adequately protect their organizations. >>You know, I love this conversation whenever I talked to practitioners, uh, cybersecurity, you know, first of all, they're super smart, usually cyber punks, and they also have some kind of eclectic background, but more importantly, is that there's different approaches in terms of what you hear. Do you do you put more if you add more firefighters so to speak, to put out the fires and solve the problems? Or do you spend your time preventing the fires from happening in the first place? You know, and you know, the buildings are burning down, Don't make a fire fire uh don't make would make fire resistance, you know, more of a priority. So there's less fires, not firefighters. So it's that balance. You throw more firefighters at the problem or do you make the supply or the material, the business fireproof? What's your take on that? >>Well, it kind of works >>both ways. I mean, we've seen customers want to, they really want choice. They >>wanna, in some >>cases they want to be the firefighter and in some cases they want the firefighter to come in and solve their problems. So >>the common problem set that we're seeing with our our customers encounter is that they struggle one with too many disparate tools and then they also have too much data being collected by all these disparate tools and then they have a lack of talent in their environment to manage their environment. So what we've done at Lacqua net is we've taken our cybersecurity practice and we've really uh specifically tailored our offerings to address these court challenges. So first to address the too many disparate tools problem, uh We've been recommending that our clients look at security platforms like the IBM cloud pack for security. The IBM cloud fax for security is built on a security platform that allows interoperability across various security tools using open standards. So our customers have been responding extremely positively to this approach and look at it as a way to future proof their investments >>and begin taking advantage of >>interoperability with >>hand tools integration. >>Talk about what you see your business going with with this because you know there's not a shortage of of need um demand. Um How are you guys flexing with the market? Uh What's the strategy are you going to use technology enablement? You're gonna more human driven brian how do you see your business of unfolding >>Well? Actually really good. We're doing very well. I mean obviously we've made the top business partner for IBM in 2020. Um we have some significant growth and a lot of interest I think we really attacked the market in a good strategy which was to help defragment the market if you will. There's a lot of point solutions and a lot of point vendors that you know they they spent uh specialize in one piece of the whole problem and what we've decided to do is find them the highest party list. Every see so and see IO has a tick list. So >>they have that >>you know uh first thing we need we need a sim we need a E. D. >>Are we need a >>managed service? We need um what's the third solution that we're doing? So we need some new talent in house. So we actually have the added that as well. So we added a security staffing uh division to help that piece of it as well. So to give you an idea of the cybersecurity market size, It was valued at 150 billion in 2019. And that is expected to grow to 300 billion by 2027. >>And Akron is well positioned to consolidate the many fragmented aspects of the security marketplace and offer our customers more integrated and easier to manage solutions. And we will continue to help our customers select the best suite of solutions to address all types of cyber security, cyber security threats. >>You know, it's such a really important point you're making because, you know, the tools just piled up in the tool shed, I call it like that, It's like, it's like you don't even know what's in there anymore and then you've got to support them, then the world's changed, get cloud native, the service area is increasing and then the CSOs are also challenged. Do I have any clouds? Do I build on? Do I optimize my development teams for AWS or Azure? Now, that's kind of a factor. So you have all this tooling going on? They're building their own stuff, they're building their own core competency. And yet the sea so still needs to be like maintaining kind of like a relevance list. That's almost like a stock market for the, for the products you're providing, that it sounds like you're providing that kind of service. >>Uh, yeah, as well. Right? We distill all of the products that are out there, there's thousands of cybersecurity products out there in the marketplace and we kind of do all that distillation for the customer we find using, you know, using a combination of things we use uh Forrester and Gartner and all the market analysts to shortlist are, are solutions that we offer customers. But then we also use our experience. And so through since 2013, we've been deploying these solutions across organizations and corporations across America and we've gained a large body of experience and we can take that experience and knowledge to our customers and help them make some good decisions. So they don't have to make them go through the pitfalls that many companies do when selecting these types of solutions. >>Well, congratulations, got a great business and uh you know, that's just a basic, starts making things easier for the sea. So more so they can be safe and secure in their environment. It's funny, you know, cyber warfare, you know the private company have to fight their own battles, going to build their own armies. Certainly the government's not helping them and they're confused even know how to handle all this stuff. So they didn't they need your service. I'm just curious as this continues to unfold and you start to see much more of a holistic view. What's the IBM angle in here? Why are you such a big partner of theirs? Is it because their customers are working with you? They're bringing you into business? Is it because you have an affinity towards some of their products? What's the connection with IBM, >>all of the above? So >>I think it probably started with our affinity to IBM P radar products and we have a we have a lot of expertise in that in that solution. Um, so >>that's that's where it >>started. And then I think I B. M. S leadership in this space has been, Yeah, >>remarkable. Really. So like what's happening now with the IBM compaq for security, building a security platform to allow all these points solutions to work together. Uh that's the road map we want to put our customers on because we believe that's the that's the future for this, this uh, this marketplace >>and the vision of hybrid cloud having that underpinning be with red hat, it's a Lennox Colonel model of >>all things you can you can run it on. Sure. I've been plowed uh aws it's portable. Yeah. All this openness, as you probably know, uh, cybersecurity is really a laggard in the security and the information technology space as far as adopting open standards and IBM is I think leading that charge and you'll be able to have a force multiplier >>uh >>with open standards in the space. >>Open innovation with open source is incredible. I mean if you if if open source can embrace a common platform and build that kind of control, playing and openness to allow thriving companies to just build out, then you have an entire hybrid distributed >>architecture. Yeah, well, I think companies want to use the best in breed. So when we, when we show these solutions to customers, they want the best in breed, they always say, I don't, when it comes to security, they don't want second best. They want the best that's out there because they're securing their crown jewels. So that makes sense. Um, so the problem is having all these different disparate solutions that are all top in their category, none of them talk to each other so we need to address that problem because without that being solved this is just going to be a more, it's going to compound the complexity of the problems we solve day to day, >>awesome, congratulations brian, great story. Um you know entrepreneur built a great business over the years um I think the products amazing, I think that's exactly what the market needs and it just shows you what the ecosystems all about. This is the power of the ecosystem. You know 1000 flowers are blooming, you got a great product. IBM is helping as well. Good partnership network effect builds in and and still a lot more to do. Congratulations. >>Absolutely. Okay thank you very much >>brian thanks >>for coming on the q appreciate it. I'm Sean Fourier with IBM thinks 2021 virtual coverage. Thanks for watching. Mhm.
SUMMARY :
of IBM think 2021 brought to you great to see you um promoting it all the way from Puerto rico to Palo Alto. I really appreciate the opportunity. Um first of all, before we get into what you guys do and So first of all, a crochet is based on the root word alacrity, which means a prompt the traits of alacrity. the marketplace take us through the relationship the 2020 IBM north american Partner of the Year award. Right, what are some of the things you guys are working on? And we also have managed security services which helps prevent detect and remediate out the full amount of offerings that we have to provide protection for our clients. Well, as you know, john, we all know that the importance of cyber security in today's Uh there's no expected end in sight to this and in fact just this week on 60 that the cyber Attackers pose is the complexity of the actual cybersecurity tools themselves. but more importantly, is that there's different approaches in terms of what you hear. I mean, we've seen customers want to, they really want choice. So So first to address the too many disparate Uh What's the strategy are you going to use technology enablement? to help defragment the market if you will. So to give you an idea of the cybersecurity select the best suite of solutions to address all types of cyber security, cyber security threats. the tools just piled up in the tool shed, I call it like that, It's like, it's like you don't even know what's in there anymore do all that distillation for the customer we find using, you know, using a combination of things we Certainly the government's not helping them and they're confused even know how to handle all a lot of expertise in that in that solution. And then I think I B. M. S leadership in this space has been, Uh that's the road map we want to put our customers on because we believe that's the All this openness, as you probably know, uh, cybersecurity build out, then you have an entire hybrid distributed none of them talk to each other so we need to address that problem because without that being solved this Um you know entrepreneur built a great Okay thank you very much for coming on the q appreciate it.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Alex Burnett | PERSON | 0.99+ |
IBM | ORGANIZATION | 0.99+ |
Jay Powell | PERSON | 0.99+ |
2002 | DATE | 0.99+ |
Palo Alto | LOCATION | 0.99+ |
brian Bouchard | PERSON | 0.99+ |
Puerto rico | LOCATION | 0.99+ |
Sean Fourier | PERSON | 0.99+ |
2019 | DATE | 0.99+ |
1000 flowers | QUANTITY | 0.99+ |
2020 | DATE | 0.99+ |
Federal Reserve Board | ORGANIZATION | 0.99+ |
Brian Bouchard | PERSON | 0.99+ |
America | LOCATION | 0.99+ |
brian | PERSON | 0.99+ |
john ferrier | PERSON | 0.99+ |
thousands | QUANTITY | 0.99+ |
North America | LOCATION | 0.99+ |
2021 | DATE | 0.99+ |
Gartner | ORGANIZATION | 0.99+ |
300 billion | QUANTITY | 0.99+ |
this week | DATE | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
60 minutes | QUANTITY | 0.99+ |
first | QUANTITY | 0.99+ |
150 billion | QUANTITY | 0.99+ |
Akron | ORGANIZATION | 0.99+ |
john | PERSON | 0.99+ |
2013 | DATE | 0.98+ |
both ways | QUANTITY | 0.98+ |
2027 | DATE | 0.98+ |
third solution | QUANTITY | 0.98+ |
Lacqua net | ORGANIZATION | 0.97+ |
1600 other business partners | QUANTITY | 0.97+ |
Forrester | ORGANIZATION | 0.97+ |
almost 20 years | QUANTITY | 0.96+ |
both | QUANTITY | 0.95+ |
second | QUANTITY | 0.95+ |
single technology | QUANTITY | 0.95+ |
Think 2021 | COMMERCIAL_ITEM | 0.92+ |
thousands of these attacks | QUANTITY | 0.91+ |
Lennox | ORGANIZATION | 0.88+ |
Azure | TITLE | 0.87+ |
First | QUANTITY | 0.87+ |
today | DATE | 0.87+ |
one piece | QUANTITY | 0.85+ |
single solution provider | QUANTITY | 0.83+ |
L. A. | ORGANIZATION | 0.82+ |
first thing | QUANTITY | 0.81+ |
Buffalo new york | LOCATION | 0.81+ |
think 2021 | COMMERCIAL_ITEM | 0.79+ |
north american Partner of the Year award | TITLE | 0.78+ |
cybersecurity products | QUANTITY | 0.75+ |
Quartet | PERSON | 0.74+ |
Covid | ORGANIZATION | 0.7+ |
2020 | TITLE | 0.69+ |
Cube | COMMERCIAL_ITEM | 0.61+ |
US | LOCATION | 0.59+ |
every day | QUANTITY | 0.59+ |
Allah | ORGANIZATION | 0.59+ |
M. | PERSON | 0.56+ |
IO | ORGANIZATION | 0.52+ |
one | QUANTITY | 0.5+ |
cloud | COMMERCIAL_ITEM | 0.38+ |
P | COMMERCIAL_ITEM | 0.32+ |
Doc D'Errico, Infinidat | CUBE Conversation, December 2020
>>From the cubes studios in Palo Alto, in Boston, connecting with thought leaders all around the world. This is a cute conversation. >>The external storage array business, as we know it has changed forever. You know, you can see that in the survey data that we do and the financial information from the largest public storage companies. And it's not just because of COVID, although that's clearly a factor which has accelerated the shifts that we see in the market, specifically, those CIO is, are rationalizing their infrastructure portfolios by consolidating workloads to simplify, reduce costs and minimize vendor sprawl. So they can shift resources toward digital initiatives that include cloud containers, machine intelligence, and automation all while reducing their risks. Hello everyone. This is Dave Vellante and welcome to this cube conversation where we're going to discuss strategies related to workload consolidation at petabyte scale. And with me is Dr. Rico. He's the vice president office of the CTO at INFINIDAT welcome back to the cube doc, always a pleasure to see you >>And great to be here. Always a pleasure to work with you, Dave. >>So doc, I just published a piece over the weekend and I pointed out that of the largest storage companies, only one showed revenue growth last quarter, and that was on a significantly reduced compare with last year. So my first question to you is, is INFINIDAT growing its business. >>Oh, absolutely. It's been a very interesting year all across as you can quite imagine. Um, but you know, our footprint is such that with our elastic pricing models and the, and the fact that we've got excess capacity, uh, in almost every single system that's out there, we were really given our customers a, an opportunity to take advantage of that, to increase their capacity levels while maintaining the same levels of performance and availability, but not have to have anybody on premises during this crazy, you know, COVID struck era. >>Yeah. So you're bringing that cloud model to the, to the data center, which has obviously been a challenge. I mean, you mentioned the subscription sort of like pricing, we're going to get into the cloud more, but I wonder if we could step back a little bit and look at some of the macro trends that you're seeing in the market and specifically as it relates to on-prem storage strategies that CEO's are taking. >>Yeah. You know, it's been interesting, we've seen over the course of the past five years or so, certainly a big uptick in people looking at next generation or what they believe in perceived to be next generation storage platforms, which are really just evolutions of media. They're not really taking advantage of any new innovations in storage and, you know, not withstanding our own products, which are all software driven. We've talked about that before, but what what's really happened in this past year, as you, as you said, CEOs and CTOs, they're always looking for that, that next point of leverage advantage. And they're looking for more agility in application deployment, they're looking in a way to rapidly respond to business requirements. So they're looking very much at those cloud-like requirements. They're looking at those capabilities to containerize applications. They're looking at how they can, um, you know, shift out virtual machines if they're not in a directly in a container, uh, and how the storage by the way, can, can have the same advantage and in order to do so, they really need to look at storage consolidation. You know, I think Dave, to, to sum it up from the storage perspective, you know, I love Ken Steinhardt was recently on a video and, you know, he was, he was challenged that, you know, people aren't looking at spinning rust, riff, you know, a derogatory wave of referring a disc and, and Ken, so rightly and accurately responded. Yeah. But people weren't really looking for QLC either. You know, what they're looking for is performance, scale availability and certainly cost effectiveness and price. >>Yeah. It was like, I set up front dock. I mean, if you're a C level executive today, you don't want to worry about your storage infrastructure. You've got bigger problems to worry about. You just want it to work. And so when you talk about consolidating workloads, people often talk about the so-called blast radiation. In other words, people who run data centers, they understand that things fail. And sometimes something as simple, it might be a power supply can have a catastrophic downstream effect on application availability. So my question is, how do you think about architecting systems? So as to minimize the effects of component failures on the business? >>Yeah. You know, it's a very interesting term, Dave blast radius, right? We've, we've heard this referred to storage over the last several decades. In fact, when it really should refer to the data center and the application infrastructure. Uh, but you know, if we're talking about just the storage footprint itself, one of the things that we really need to look, look at is the resilience and the reliability of the architecture. And when you look at something that is maybe dual controller single or double power supply, there are issues and concerns that take in, in, into, into play. And what we've done is we've designed something that's really triple redundant, which is typically only been applied to the very high end of the market before. And we do it in a very active, active, active manner. And naturally we have suggestions for best practices for deployment within a data center as well, you know, multiple sources of power coming into the array and things of that nature. But everything needs to be this active, active, active type of architecture in order to bring those reliability levels up to the point where as long as it's a component failure within the array, it's not going to cause an outage or data on availability event. >>Yeah. So imagine a heat map when people talk about the blast radius. So imagine the heat map is green. There's a big, you know, there's a yellow area and there's a, there's a red area. And what you're saying is, as far as the array goes, you're essentially eliminating the red area. Now, if you take it to the broader installation, you know, that red area, you have to deal with it in different ways, remote replication, then you can at the sink and in a sink. Uh, but, but essentially what I'm hearing you say, doc, is, is you're squeezing that red area out. So, so your customers could sleep at night. >>That absolutely sleep at night is so appropriate. And in fact, we've got a large portion of our customer base is, or they're running mission critical businesses. You know, we have some of the most mission critical companies in our, in our logo portfolio, in the world. We also have, by the way, some very significant service provider businesses who were we're providing, you know, mission critical capabilities to their customers in turn, and they need to sleep at night. And it it's, you know, availability is only one factor. Certainly manageability is another cause you know, not meeting a service level is just like data unavailability in some respects. So making manageability is automatic as it can be making sure that the, that the system is not only self-healing, but can re respond to variations in workload appropriately is very, very critically important as well. >>Yeah. So that, that you mentioned mission critical workloads, and those are the, those are the workloads that let's face it. They're not moving into the cloud, certainly not in any, any big way, you know, why would they generally are CIO CTO is they're putting a brick wall around that saying, Hey, it works. We don't want to migrate that piece, but I want to talk more about how your customers are thinking about workload consolidation and rationalizing their storage portfolios. What are those conversations like? Where do they start and what are some of the outcomes that you're seeing with your customers? >>Yeah, I think the funny thing about that point Dave, is that customers are really starting to think about a cloud in an entirely different way. You know, at one point cloud meant public cloud and men, this entity, uh, outside the walls of the data center and people were starting to use services without realizing that that was another type of cloud. And then they were starting to build their own versions of cloud. You know, we were referring to them as private clouds, but they were, you know, really spread beyond the walls of a single data center. So now it's a very hybrid world and there's lots of different ways to look at it, hybrid cloud multi-cloud, whatever moniker you want to put on it. It really comes down to a consistency in how you manage that infrastructure, how you interface with that infrastructure and then understanding what the practicality is of putting workloads in different places. >>And practicality means not only the, you know, the latency of access of the data, but the costs associated with it. And of course the other aspects that we talked about, like what the, the availability metrics, and as you increase the availability and performance metrics, those costs go up. And that's one of the reasons why some of these larger mission critical data centers are really, you know, repatriating their, their mission, critical workloads, at least the highest, highest levels of them and others are looking at other models, for example, AWS outposts, um, which, you know, talked about quite a bit recently in AWS reinvent. >>Yeah. I just wrote, again, this weekend that you guys were one of the, uh, partners that was qualified now, uh, to run on AWS outpost, it's interesting as Amazon moves, it's, you know, it's, it's it's model to the edge, which includes the data center to them. They need partners that can, that really understand how to operate in an on-premise world, how to service those customers. And so that's great to see you guys as part of that. >>Yeah. Thank you. And, you know, it was actually a very seamless integration because of the power and capability of all of the different interface models that we have is they all are fully and tightly integrated and work seamlessly. So if you want to use a, you know, a CSI type model, uh, you know, do you interface with your storage again, uh, with, with INFINIDAT and, you know, we work with all of the different flavors so that the qualification process, the certification process and the documentation process was actually quite easy. And now we're able to provide, you know, people who have particularly larger workloads that capability in the AWS on premises type environment. >>Yeah. Now I implied upfront that that cloud computing was the main factor, if not the primary factor, really driving some of the changes that we're seeing in the marketplace. Now, of course, it's all, not all pink roses with the cloud. We've seen numerous public cloud outages this year, certainly from Microsoft. We saw the AWS Kinesis outage in November. Google just had a major outage this month. Gmail was down G suite was down for an extended period of time. And that disrupted businesses, we rely on that schools, for example. So it's always caveat emptor as we know, but, but talk to INFINIDAT cloud strategy, you mentioned hybrid, uh, particularly interested in, in how you're dealing with things like orchestration and containers and Kubernetes. >>Yeah, well, of course we have a very feature rich set of interfaces for containers, Kubernetes interfaces, you know, downloadable through native, uh, native. So they're, they're very easy to integrate with, you know, but our cloud strategy is that, you know, we are a software centric model and we, you know, all of the, all of the value and feature function that we provide is through the software. The hardware of infiniboxes really a reference architecture that we, uh, we deliver to make it easier for customers to enjoy say 100% availability model. But if, if you want to run something in a traditional on premises data center, you know, straighten InfiniBox is fine, but we also give you the flexibility of cloud-like consumption through our pricing models, our, our elastic pricing models. So you don't need to consume an entire InfiniBox day one. You can grow and shrink that environment with, uh, with an OPEX model, or you can, um, buy it as you consume it in a, in a cap ex model. >>And you can switch, uh, from OPEX over to CapEx if it becomes more cost effective for you in time, which I think is, is what a lot of people are looking for. If you're looking for that public cloud, we, you know, we have our new tricks cloud offering, which is now being delivered more through partners, but you know, some businesses and especially the, the mid tier, um, you know, the SMB all the way through the mid enterprise are also now looking to cloud service providers, many of which use InfiniBox as, as their backend. And now with AWS outposts, of course, you know, we can give you that on premises, uh, uh, experience of the public cloud, >>You guys were early on. And obviously in that, that subscription-based model, and now everyone's doing it. I noticed in the latest Gartner magic quadrant on, on storage arrays, which you guys were named a leader, uh, they, I think they had a stat in there and said, I, I forget what the exact timeframe was that 50% of customers would be using that type of model. And again, I guarantee you by whatever time frame, that was a hundred percent of the vendor community is going to be delivering that type of model. So, so congratulations on being named a leader, I will say this there's there's there's consolidation happening in the market. So this, to me, this bodes well, to the extent that you can guarantee high availability and consistent performance, uh, at, at scale, that bodes well for, for you guys in a consolidating market. And I know IDC just released a paper, it was called, uh, I got, uh, I got a copy here. >>It's called a checklist for, uh, storage, workload consolidation at petabyte scale. It was written by Eric Bergner, who I've known for a number of years. He's the VP of infrastructure. Uh, he knows his stuff and the paper is very detailed. So I'm not going to go through the checklist items, but I, but I think if you don't mind, doc, I think it's worth reading an excerpt from this. If I can, as part of his conclusions, when workload consolidation, it organizations should carefully consider their performance availability, functionality, and affordability requirements. Of course, few storage systems in the market will be able to cost effectively consolidate different types of workloads with different IO profiles onto a single system. But that is in INFINIDAT forte. They're very good at it. So that's a, that's quite a testimonial, you know, why is that your thoughts on what Eric wrote? >>Well, you know, first of all, thank you for the kudos on the Gartner MQ, you know, being a leader on the second year in a row for primary storage, only because that documents only existed for two years, but, uh, you know, we were also a leader in hybrid storage arrays before that. And, you know, we, we love Gardner. We think they're, they're, you know, um, uh, real critical, you know, reliable source for, for a lot of large companies and, and IDC, you know, Eric of course is, uh, he's a name in the industry. So we, you know, we very much appreciate when he writes something, you know, that positive about us. But to answer your question, Dave, you know, there's, there's a lot that goes on inside InfiniBox and is the neural cash capabilities, the deep learning engine that is able to understand the different types of workloads, how they operate, uh, how to provide, you know, predictable performance. >>And that I think is ultimately key to an application. It's not just high performance. It's, it's predictable performance is making sure the application knows what to expect. And of course it has to be performant. It can't just be slow, but predictable. It has to be fast and predictable providing a multi-tenant infrastructure that is, that is native to the architecture, uh, so that these workloads can coexist whether they're truly just workloads from multiple applications or workloads from different business units, or potentially, as we mentioned with cloud service providers, workloads from different customers, you know, they, they need to be segmented in such a way so that they can be managed, operating and provide that performance and availability, you know, at scale because that's where data centers go. That's where data centers are. >>Great. Well, so we'll bring that graphic back up just to show you, obviously, this is available on your website. Uh, you can go download this paper from Erik, uh, from IDC, www infinidat.com/ian/resource. I would definitely recommend you check it out. Uh, as I say, Ericsson, you know, I've been in the business a long, long time, so, so that's great, doc, we'll give you the last word. Anything we didn't cover any big takeaways you want to, you want to share with the audience? >>Yeah. You know, I think I'll go back to that point. You know, consolidation is absolutely key for, uh, not just simplicity of management, but capability for you respond quickly to changing business requirements and or new business requirements, and also do it in a way that is cost-effective, you know, just buying the new shiny object is it's expensive and it's very limited in, in shelf life. You're just going to be looking for the next one the next year. You want to provide something that is going to provide you that predictable capability over time, because frankly, I have never met a C X O of anything that wasn't trying to increase their profit. >>You know, that's a great point. And I just, I would add, I mean, the shiny new object thing. Look, if you're in an experimental mode and playing around with, you know, artificial intelligence or automation thinking, you know, areas that you really don't know a lot about, you know, what, check out the shiny new objects, but I would argue you're on-prem storage. You don't want to be messing around with that. That's, it's not a shiny new objects business. It's really about, you know, making sure that that base is stable. And as you say, predictable and reliable. So doc Terico thanks so much for coming back into cube. Great to see you. >>Great to see you, David, and look forward to next time. >>And thank you for watching everybody. This is Dave Volante and we'll see you next time on the queue.
SUMMARY :
From the cubes studios in Palo Alto, in Boston, connecting with thought leaders all around the world. You know, you can see that in the survey And great to be here. So my first question to you is, is INFINIDAT growing Um, but you know, our footprint is such that I mean, you mentioned the subscription sort of like pricing, we're going to get into the cloud more, you know, he was, he was challenged that, you know, people aren't looking at spinning And so when you talk about Uh, but you know, if we're talking about you know, that red area, you have to deal with it in different ways, remote replication, And it it's, you know, availability is only one factor. They're not moving into the cloud, certainly not in any, any big way, you know, clouds, but they were, you know, really spread beyond the walls of a single data center. And practicality means not only the, you know, the latency of access of the And so that's great to see you guys as part And now we're able to provide, you know, people who have particularly larger you mentioned hybrid, uh, particularly interested in, in how you're dealing with things like orchestration you know, but our cloud strategy is that, you know, we are a software centric the, the mid tier, um, you know, the SMB all the way through the mid enterprise are also to the extent that you can guarantee high availability and consistent performance, you know, why is that your thoughts on what Eric wrote? We think they're, they're, you know, um, uh, real critical, you know, providers, workloads from different customers, you know, they, they need to be segmented in such Uh, as I say, Ericsson, you know, that is cost-effective, you know, just buying the new shiny object is thinking, you know, areas that you really don't know a lot about, you know, what, check out the shiny new objects, And thank you for watching everybody.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Dave Vellante | PERSON | 0.99+ |
Eric Bergner | PERSON | 0.99+ |
David | PERSON | 0.99+ |
Ken Steinhardt | PERSON | 0.99+ |
Dave Volante | PERSON | 0.99+ |
Eric | PERSON | 0.99+ |
December 2020 | DATE | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
INFINIDAT | ORGANIZATION | 0.99+ |
Palo Alto | LOCATION | 0.99+ |
Dave | PERSON | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
November | DATE | 0.99+ |
50% | QUANTITY | 0.99+ |
Ken | PERSON | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
two years | QUANTITY | 0.99+ |
second year | QUANTITY | 0.99+ |
100% | QUANTITY | 0.99+ |
Erik | PERSON | 0.99+ |
ORGANIZATION | 0.99+ | |
Boston | LOCATION | 0.99+ |
Rico | PERSON | 0.99+ |
IDC | ORGANIZATION | 0.99+ |
Ericsson | ORGANIZATION | 0.99+ |
first question | QUANTITY | 0.99+ |
Gmail | TITLE | 0.99+ |
last quarter | DATE | 0.99+ |
last year | DATE | 0.99+ |
today | DATE | 0.98+ |
one factor | QUANTITY | 0.98+ |
hundred percent | QUANTITY | 0.98+ |
next year | DATE | 0.98+ |
this year | DATE | 0.97+ |
OPEX | ORGANIZATION | 0.97+ |
single | QUANTITY | 0.97+ |
CapEx | ORGANIZATION | 0.97+ |
this month | DATE | 0.96+ |
double | QUANTITY | 0.96+ |
single system | QUANTITY | 0.95+ |
one | QUANTITY | 0.95+ |
Gardner | PERSON | 0.95+ |
G suite | TITLE | 0.95+ |
one point | QUANTITY | 0.94+ |
Doc D'Errico | PERSON | 0.93+ |
Gartner MQ | ORGANIZATION | 0.89+ |
doc | PERSON | 0.89+ |
CTO | ORGANIZATION | 0.89+ |
InfiniBox | COMMERCIAL_ITEM | 0.85+ |
single data center | QUANTITY | 0.84+ |
Gartner | ORGANIZATION | 0.84+ |
Kubernetes | TITLE | 0.8+ |
Terico | PERSON | 0.79+ |
first | QUANTITY | 0.77+ |
COVID | OTHER | 0.77+ |
past five years | DATE | 0.75+ |
last several decades | DATE | 0.73+ |
www infinidat.com/ian/resource | OTHER | 0.72+ |
Infinidat | PERSON | 0.7+ |
InfiniBox | ORGANIZATION | 0.7+ |
past year | DATE | 0.69+ |
Dr. | PERSON | 0.69+ |
this weekend | DATE | 0.67+ |
cap ex | ORGANIZATION | 0.66+ |
day one | QUANTITY | 0.62+ |
infiniboxes | ORGANIZATION | 0.6+ |
InfiniBox | TITLE | 0.58+ |
COVID | TITLE | 0.58+ |
dual | QUANTITY | 0.55+ |
Kinesis | COMMERCIAL_ITEM | 0.42+ |
4-video test
>>don't talk mhm, >>Okay, thing is my presentation on coherent nonlinear dynamics and combinatorial optimization. This is going to be a talk to introduce an approach we're taking to the analysis of the performance of coherent using machines. So let me start with a brief introduction to easing optimization. The easing model represents a set of interacting magnetic moments or spins the total energy given by the expression shown at the bottom left of this slide. Here, the signal variables are meditate binary values. The Matrix element J. I. J. Represents the interaction, strength and signed between any pair of spins. I. J and A Chive represents a possible local magnetic field acting on each thing. The easing ground state problem is to find an assignment of binary spin values that achieves the lowest possible value of total energy. And an instance of the easing problem is specified by giving numerical values for the Matrix J in Vector H. Although the easy model originates in physics, we understand the ground state problem to correspond to what would be called quadratic binary optimization in the field of operations research and in fact, in terms of computational complexity theory, it could be established that the easing ground state problem is np complete. Qualitatively speaking, this makes the easing problem a representative sort of hard optimization problem, for which it is expected that the runtime required by any computational algorithm to find exact solutions should, as anatomically scale exponentially with the number of spends and for worst case instances at each end. Of course, there's no reason to believe that the problem instances that actually arrives in practical optimization scenarios are going to be worst case instances. And it's also not generally the case in practical optimization scenarios that we demand absolute optimum solutions. Usually we're more interested in just getting the best solution we can within an affordable cost, where costs may be measured in terms of time, service fees and or energy required for a computation. This focuses great interest on so called heuristic algorithms for the easing problem in other NP complete problems which generally get very good but not guaranteed optimum solutions and run much faster than algorithms that are designed to find absolute Optima. To get some feeling for present day numbers, we can consider the famous traveling salesman problem for which extensive compilations of benchmarking data may be found online. A recent study found that the best known TSP solver required median run times across the Library of Problem instances That scaled is a very steep route exponential for end up to approximately 4500. This gives some indication of the change in runtime scaling for generic as opposed the worst case problem instances. Some of the instances considered in this study were taken from a public library of T SPS derived from real world Veil aside design data. This feels I TSP Library includes instances within ranging from 131 to 744,710 instances from this library with end between 6880 13,584 were first solved just a few years ago in 2017 requiring days of run time and a 48 core to King hurts cluster, while instances with and greater than or equal to 14,233 remain unsolved exactly by any means. Approximate solutions, however, have been found by heuristic methods for all instances in the VLS i TSP library with, for example, a solution within 0.14% of a no lower bound, having been discovered, for instance, with an equal 19,289 requiring approximately two days of run time on a single core of 2.4 gigahertz. Now, if we simple mindedly extrapolate the root exponential scaling from the study up to an equal 4500, we might expect that an exact solver would require something more like a year of run time on the 48 core cluster used for the N equals 13,580 for instance, which shows how much a very small concession on the quality of the solution makes it possible to tackle much larger instances with much lower cost. At the extreme end, the largest TSP ever solved exactly has an equal 85,900. This is an instance derived from 19 eighties VLSI design, and it's required 136 CPU. Years of computation normalized to a single cord, 2.4 gigahertz. But the 24 larger so called world TSP benchmark instance within equals 1,904,711 has been solved approximately within ophthalmology. Gap bounded below 0.474%. Coming back to the general. Practical concerns have applied optimization. We may note that a recent meta study analyzed the performance of no fewer than 37 heuristic algorithms for Max cut and quadratic pioneer optimization problems and found the performance sort and found that different heuristics work best for different problem instances selected from a large scale heterogeneous test bed with some evidence but cryptic structure in terms of what types of problem instances were best solved by any given heuristic. Indeed, their their reasons to believe that these results from Mexico and quadratic binary optimization reflected general principle of performance complementarity among heuristic optimization algorithms in the practice of solving heart optimization problems there. The cerise is a critical pre processing issue of trying to guess which of a number of available good heuristic algorithms should be chosen to tackle a given problem. Instance, assuming that any one of them would incur high costs to run on a large problem, instances incidence, making an astute choice of heuristic is a crucial part of maximizing overall performance. Unfortunately, we still have very little conceptual insight about what makes a specific problem instance, good or bad for any given heuristic optimization algorithm. This has certainly been pinpointed by researchers in the field is a circumstance that must be addressed. So adding this all up, we see that a critical frontier for cutting edge academic research involves both the development of novel heuristic algorithms that deliver better performance, with lower cost on classes of problem instances that are underserved by existing approaches, as well as fundamental research to provide deep conceptual insight into what makes a given problem in, since easy or hard for such algorithms. In fact, these days, as we talk about the end of Moore's law and speculate about a so called second quantum revolution, it's natural to talk not only about novel algorithms for conventional CPUs but also about highly customized special purpose hardware architectures on which we may run entirely unconventional algorithms for combinatorial optimization such as easing problem. So against that backdrop, I'd like to use my remaining time to introduce our work on analysis of coherent using machine architectures and associate ID optimization algorithms. These machines, in general, are a novel class of information processing architectures for solving combinatorial optimization problems by embedding them in the dynamics of analog, physical or cyber physical systems, in contrast to both MAWR traditional engineering approaches that build using machines using conventional electron ICS and more radical proposals that would require large scale quantum entanglement. The emerging paradigm of coherent easing machines leverages coherent nonlinear dynamics in photonic or Opto electronic platforms to enable near term construction of large scale prototypes that leverage post Simoes information dynamics, the general structure of of current CM systems has shown in the figure on the right. The role of the easing spins is played by a train of optical pulses circulating around a fiber optical storage ring. A beam splitter inserted in the ring is used to periodically sample the amplitude of every optical pulse, and the measurement results are continually read into a refugee A, which uses them to compute perturbations to be applied to each pulse by a synchronized optical injections. These perturbations, air engineered to implement the spin, spin coupling and local magnetic field terms of the easing Hamiltonian, corresponding to a linear part of the CME Dynamics, a synchronously pumped parametric amplifier denoted here as PPL and Wave Guide adds a crucial nonlinear component to the CIA and Dynamics as well. In the basic CM algorithm, the pump power starts very low and has gradually increased at low pump powers. The amplitude of the easing spin pulses behaviors continuous, complex variables. Who Israel parts which can be positive or negative, play the role of play the role of soft or perhaps mean field spins once the pump, our crosses the threshold for parametric self oscillation. In the optical fiber ring, however, the attitudes of the easing spin pulses become effectively Qantas ized into binary values while the pump power is being ramped up. The F P J subsystem continuously applies its measurement based feedback. Implementation of the using Hamiltonian terms, the interplay of the linear rised using dynamics implemented by the F P G A and the threshold conversation dynamics provided by the sink pumped Parametric amplifier result in the final state of the optical optical pulse amplitude at the end of the pump ramp that could be read as a binary strain, giving a proposed solution of the easing ground state problem. This method of solving easing problem seems quite different from a conventional algorithm that runs entirely on a digital computer as a crucial aspect of the computation is performed physically by the analog, continuous, coherent, nonlinear dynamics of the optical degrees of freedom. In our efforts to analyze CIA and performance, we have therefore turned to the tools of dynamical systems theory, namely, a study of modifications, the evolution of critical points and apologies of hetero clinic orbits and basins of attraction. We conjecture that such analysis can provide fundamental insight into what makes certain optimization instances hard or easy for coherent using machines and hope that our approach can lead to both improvements of the course, the AM algorithm and a pre processing rubric for rapidly assessing the CME suitability of new instances. Okay, to provide a bit of intuition about how this all works, it may help to consider the threshold dynamics of just one or two optical parametric oscillators in the CME architecture just described. We can think of each of the pulse time slots circulating around the fiber ring, as are presenting an independent Opio. We can think of a single Opio degree of freedom as a single, resonant optical node that experiences linear dissipation, do toe out coupling loss and gain in a pump. Nonlinear crystal has shown in the diagram on the upper left of this slide as the pump power is increased from zero. As in the CME algorithm, the non linear game is initially to low toe overcome linear dissipation, and the Opio field remains in a near vacuum state at a critical threshold. Value gain. Equal participation in the Popeo undergoes a sort of lazing transition, and the study states of the OPIO above this threshold are essentially coherent states. There are actually two possible values of the Opio career in amplitude and any given above threshold pump power which are equal in magnitude but opposite in phase when the OPI across the special diet basically chooses one of the two possible phases randomly, resulting in the generation of a single bit of information. If we consider to uncoupled, Opio has shown in the upper right diagram pumped it exactly the same power at all times. Then, as the pump power has increased through threshold, each Opio will independently choose the phase and thus to random bits are generated for any number of uncoupled. Oppose the threshold power per opio is unchanged from the single Opio case. Now, however, consider a scenario in which the two appeals air, coupled to each other by a mutual injection of their out coupled fields has shown in the diagram on the lower right. One can imagine that depending on the sign of the coupling parameter Alfa, when one Opio is lazing, it will inject a perturbation into the other that may interfere either constructively or destructively, with the feel that it is trying to generate by its own lazing process. As a result, when came easily showed that for Alfa positive, there's an effective ferro magnetic coupling between the two Opio fields and their collective oscillation threshold is lowered from that of the independent Opio case. But on Lee for the two collective oscillation modes in which the two Opio phases are the same for Alfa Negative, the collective oscillation threshold is lowered on Lee for the configurations in which the Opio phases air opposite. So then, looking at how Alfa is related to the J. I. J matrix of the easing spin coupling Hamiltonian, it follows that we could use this simplistic to a p o. C. I am to solve the ground state problem of a fair magnetic or anti ferro magnetic ankles to easing model simply by increasing the pump power from zero and observing what phase relation occurs as the two appeals first start delays. Clearly, we can imagine generalizing this story toe larger, and however the story doesn't stay is clean and simple for all larger problem instances. And to find a more complicated example, we only need to go to n equals four for some choices of J J for n equals, for the story remains simple. Like the n equals two case. The figure on the upper left of this slide shows the energy of various critical points for a non frustrated and equals, for instance, in which the first bifurcated critical point that is the one that I forget to the lowest pump value a. Uh, this first bifurcated critical point flows as symptomatically into the lowest energy easing solution and the figure on the upper right. However, the first bifurcated critical point flows to a very good but sub optimal minimum at large pump power. The global minimum is actually given by a distinct critical critical point that first appears at a higher pump power and is not automatically connected to the origin. The basic C am algorithm is thus not able to find this global minimum. Such non ideal behaviors needs to become more confident. Larger end for the n equals 20 instance, showing the lower plots where the lower right plot is just a zoom into a region of the lower left lot. It can be seen that the global minimum corresponds to a critical point that first appears out of pump parameter, a around 0.16 at some distance from the idiomatic trajectory of the origin. That's curious to note that in both of these small and examples, however, the critical point corresponding to the global minimum appears relatively close to the idiomatic projector of the origin as compared to the most of the other local minima that appear. We're currently working to characterize the face portrait topology between the global minimum in the antibiotic trajectory of the origin, taking clues as to how the basic C am algorithm could be generalized to search for non idiomatic trajectories that jump to the global minimum during the pump ramp. Of course, n equals 20 is still too small to be of interest for practical optimization applications. But the advantage of beginning with the study of small instances is that we're able reliably to determine their global minima and to see how they relate to the 80 about trajectory of the origin in the basic C am algorithm. In the smaller and limit, we can also analyze fully quantum mechanical models of Syrian dynamics. But that's a topic for future talks. Um, existing large scale prototypes are pushing into the range of in equals 10 to the 4 10 to 5 to six. So our ultimate objective in theoretical analysis really has to be to try to say something about CIA and dynamics and regime of much larger in our initial approach to characterizing CIA and behavior in the large in regime relies on the use of random matrix theory, and this connects to prior research on spin classes, SK models and the tap equations etcetera. At present, we're focusing on statistical characterization of the CIA ingredient descent landscape, including the evolution of critical points in their Eigen value spectra. As the pump power is gradually increased. We're investigating, for example, whether there could be some way to exploit differences in the relative stability of the global minimum versus other local minima. We're also working to understand the deleterious or potentially beneficial effects of non ideologies, such as a symmetry in the implemented these and couplings. Looking one step ahead, we plan to move next in the direction of considering more realistic classes of problem instances such as quadratic, binary optimization with constraints. Eso In closing, I should acknowledge people who did the hard work on these things that I've shown eso. My group, including graduate students Ed winning, Daniel Wennberg, Tatsuya Nagamoto and Atsushi Yamamura, have been working in close collaboration with Syria Ganguly, Marty Fair and Amir Safarini Nini, all of us within the Department of Applied Physics at Stanford University. On also in collaboration with the Oshima Moto over at NTT 55 research labs, Onda should acknowledge funding support from the NSF by the Coherent Easing Machines Expedition in computing, also from NTT five research labs, Army Research Office and Exxon Mobil. Uh, that's it. Thanks very much. >>Mhm e >>t research and the Oshie for putting together this program and also the opportunity to speak here. My name is Al Gore ism or Andy and I'm from Caltech, and today I'm going to tell you about the work that we have been doing on networks off optical parametric oscillators and how we have been using them for icing machines and how we're pushing them toward Cornum photonics to acknowledge my team at Caltech, which is now eight graduate students and five researcher and postdocs as well as collaborators from all over the world, including entity research and also the funding from different places, including entity. So this talk is primarily about networks of resonate er's, and these networks are everywhere from nature. For instance, the brain, which is a network of oscillators all the way to optics and photonics and some of the biggest examples or metal materials, which is an array of small resonate er's. And we're recently the field of technological photonics, which is trying thio implement a lot of the technological behaviors of models in the condensed matter, physics in photonics and if you want to extend it even further, some of the implementations off quantum computing are technically networks of quantum oscillators. So we started thinking about these things in the context of icing machines, which is based on the icing problem, which is based on the icing model, which is the simple summation over the spins and spins can be their upward down and the couplings is given by the JJ. And the icing problem is, if you know J I J. What is the spin configuration that gives you the ground state? And this problem is shown to be an MP high problem. So it's computational e important because it's a representative of the MP problems on NPR. Problems are important because first, their heart and standard computers if you use a brute force algorithm and they're everywhere on the application side. That's why there is this demand for making a machine that can target these problems, and hopefully it can provide some meaningful computational benefit compared to the standard digital computers. So I've been building these icing machines based on this building block, which is a degenerate optical parametric. Oscillator on what it is is resonator with non linearity in it, and we pump these resonate er's and we generate the signal at half the frequency of the pump. One vote on a pump splits into two identical photons of signal, and they have some very interesting phase of frequency locking behaviors. And if you look at the phase locking behavior, you realize that you can actually have two possible phase states as the escalation result of these Opio which are off by pie, and that's one of the important characteristics of them. So I want to emphasize a little more on that and I have this mechanical analogy which are basically two simple pendulum. But there are parametric oscillators because I'm going to modulate the parameter of them in this video, which is the length of the string on by that modulation, which is that will make a pump. I'm gonna make a muscular. That'll make a signal which is half the frequency of the pump. And I have two of them to show you that they can acquire these face states so they're still facing frequency lock to the pump. But it can also lead in either the zero pie face states on. The idea is to use this binary phase to represent the binary icing spin. So each opio is going to represent spin, which can be either is your pie or up or down. And to implement the network of these resonate er's, we use the time off blood scheme, and the idea is that we put impulses in the cavity. These pulses air separated by the repetition period that you put in or t r. And you can think about these pulses in one resonator, xaz and temporarily separated synthetic resonate Er's if you want a couple of these resonator is to each other, and now you can introduce these delays, each of which is a multiple of TR. If you look at the shortest delay it couples resonator wanted to 2 to 3 and so on. If you look at the second delay, which is two times a rotation period, the couple's 123 and so on. And if you have and minus one delay lines, then you can have any potential couplings among these synthetic resonate er's. And if I can introduce these modulators in those delay lines so that I can strength, I can control the strength and the phase of these couplings at the right time. Then I can have a program will all toe all connected network in this time off like scheme, and the whole physical size of the system scales linearly with the number of pulses. So the idea of opium based icing machine is didn't having these o pos, each of them can be either zero pie and I can arbitrarily connect them to each other. And then I start with programming this machine to a given icing problem by just setting the couplings and setting the controllers in each of those delight lines. So now I have a network which represents an icing problem. Then the icing problem maps to finding the face state that satisfy maximum number of coupling constraints. And the way it happens is that the icing Hamiltonian maps to the linear loss of the network. And if I start adding gain by just putting pump into the network, then the OPI ohs are expected to oscillate in the lowest, lowest lost state. And, uh and we have been doing these in the past, uh, six or seven years and I'm just going to quickly show you the transition, especially what happened in the first implementation, which was using a free space optical system and then the guided wave implementation in 2016 and the measurement feedback idea which led to increasing the size and doing actual computation with these machines. So I just want to make this distinction here that, um, the first implementation was an all optical interaction. We also had an unequal 16 implementation. And then we transition to this measurement feedback idea, which I'll tell you quickly what it iss on. There's still a lot of ongoing work, especially on the entity side, to make larger machines using the measurement feedback. But I'm gonna mostly focused on the all optical networks and how we're using all optical networks to go beyond simulation of icing Hamiltonian both in the linear and non linear side and also how we're working on miniaturization of these Opio networks. So the first experiment, which was the four opium machine, it was a free space implementation and this is the actual picture off the machine and we implemented a small and it calls for Mexico problem on the machine. So one problem for one experiment and we ran the machine 1000 times, we looked at the state and we always saw it oscillate in one of these, um, ground states of the icing laboratoria. So then the measurement feedback idea was to replace those couplings and the controller with the simulator. So we basically simulated all those coherent interactions on on FB g. A. And we replicated the coherent pulse with respect to all those measurements. And then we injected it back into the cavity and on the near to you still remain. So it still is a non. They're dynamical system, but the linear side is all simulated. So there are lots of questions about if this system is preserving important information or not, or if it's gonna behave better. Computational wars. And that's still ah, lot of ongoing studies. But nevertheless, the reason that this implementation was very interesting is that you don't need the end minus one delight lines so you can just use one. Then you can implement a large machine, and then you can run several thousands of problems in the machine, and then you can compare the performance from the computational perspective Looks so I'm gonna split this idea of opium based icing machine into two parts. One is the linear part, which is if you take out the non linearity out of the resonator and just think about the connections. You can think about this as a simple matrix multiplication scheme. And that's basically what gives you the icing Hambletonian modeling. So the optical laws of this network corresponds to the icing Hamiltonian. And if I just want to show you the example of the n equals for experiment on all those face states and the history Graham that we saw, you can actually calculate the laws of each of those states because all those interferences in the beam splitters and the delay lines are going to give you a different losses. And then you will see that the ground states corresponds to the lowest laws of the actual optical network. If you add the non linearity, the simple way of thinking about what the non linearity does is that it provides to gain, and then you start bringing up the gain so that it hits the loss. Then you go through the game saturation or the threshold which is going to give you this phase bifurcation. So you go either to zero the pie face state. And the expectation is that Theis, the network oscillates in the lowest possible state, the lowest possible loss state. There are some challenges associated with this intensity Durban face transition, which I'm going to briefly talk about. I'm also going to tell you about other types of non aerodynamics that we're looking at on the non air side of these networks. So if you just think about the linear network, we're actually interested in looking at some technological behaviors in these networks. And the difference between looking at the technological behaviors and the icing uh, machine is that now, First of all, we're looking at the type of Hamilton Ian's that are a little different than the icing Hamilton. And one of the biggest difference is is that most of these technological Hamilton Ian's that require breaking the time reversal symmetry, meaning that you go from one spin to in the one side to another side and you get one phase. And if you go back where you get a different phase, and the other thing is that we're not just interested in finding the ground state, we're actually now interesting and looking at all sorts of states and looking at the dynamics and the behaviors of all these states in the network. So we started with the simplest implementation, of course, which is a one d chain of thes resonate, er's, which corresponds to a so called ssh model. In the technological work, we get the similar energy to los mapping and now we can actually look at the band structure on. This is an actual measurement that we get with this associate model and you see how it reasonably how How? Well, it actually follows the prediction and the theory. One of the interesting things about the time multiplexing implementation is that now you have the flexibility of changing the network as you are running the machine. And that's something unique about this time multiplex implementation so that we can actually look at the dynamics. And one example that we have looked at is we can actually go through the transition off going from top A logical to the to the standard nontrivial. I'm sorry to the trivial behavior of the network. You can then look at the edge states and you can also see the trivial and states and the technological at states actually showing up in this network. We have just recently implement on a two D, uh, network with Harper Hofstadter model and when you don't have the results here. But we're one of the other important characteristic of time multiplexing is that you can go to higher and higher dimensions and keeping that flexibility and dynamics, and we can also think about adding non linearity both in a classical and quantum regimes, which is going to give us a lot of exotic, no classical and quantum, non innate behaviors in these networks. Yeah, So I told you about the linear side. Mostly let me just switch gears and talk about the nonlinear side of the network. And the biggest thing that I talked about so far in the icing machine is this face transition that threshold. So the low threshold we have squeezed state in these. Oh, pios, if you increase the pump, we go through this intensity driven phase transition and then we got the face stays above threshold. And this is basically the mechanism off the computation in these O pos, which is through this phase transition below to above threshold. So one of the characteristics of this phase transition is that below threshold, you expect to see quantum states above threshold. You expect to see more classical states or coherent states, and that's basically corresponding to the intensity off the driving pump. So it's really hard to imagine that it can go above threshold. Or you can have this friends transition happen in the all in the quantum regime. And there are also some challenges associated with the intensity homogeneity off the network, which, for example, is if one opioid starts oscillating and then its intensity goes really high. Then it's going to ruin this collective decision making off the network because of the intensity driven face transition nature. So So the question is, can we look at other phase transitions? Can we utilize them for both computing? And also can we bring them to the quantum regime on? I'm going to specifically talk about the face transition in the spectral domain, which is the transition from the so called degenerate regime, which is what I mostly talked about to the non degenerate regime, which happens by just tuning the phase of the cavity. And what is interesting is that this phase transition corresponds to a distinct phase noise behavior. So in the degenerate regime, which we call it the order state, you're gonna have the phase being locked to the phase of the pump. As I talked about non degenerate regime. However, the phase is the phase is mostly dominated by the quantum diffusion. Off the off the phase, which is limited by the so called shallow towns limit, and you can see that transition from the general to non degenerate, which also has distinct symmetry differences. And this transition corresponds to a symmetry breaking in the non degenerate case. The signal can acquire any of those phases on the circle, so it has a you one symmetry. Okay, and if you go to the degenerate case, then that symmetry is broken and you only have zero pie face days I will look at. So now the question is can utilize this phase transition, which is a face driven phase transition, and can we use it for similar computational scheme? So that's one of the questions that were also thinking about. And it's not just this face transition is not just important for computing. It's also interesting from the sensing potentials and this face transition, you can easily bring it below threshold and just operated in the quantum regime. Either Gaussian or non Gaussian. If you make a network of Opio is now, we can see all sorts off more complicated and more interesting phase transitions in the spectral domain. One of them is the first order phase transition, which you get by just coupling to Opio, and that's a very abrupt face transition and compared to the to the single Opio phase transition. And if you do the couplings right, you can actually get a lot of non her mission dynamics and exceptional points, which are actually very interesting to explore both in the classical and quantum regime. And I should also mention that you can think about the cup links to be also nonlinear couplings. And that's another behavior that you can see, especially in the nonlinear in the non degenerate regime. So with that, I basically told you about these Opio networks, how we can think about the linear scheme and the linear behaviors and how we can think about the rich, nonlinear dynamics and non linear behaviors both in the classical and quantum regime. I want to switch gear and tell you a little bit about the miniaturization of these Opio networks. And of course, the motivation is if you look at the electron ICS and what we had 60 or 70 years ago with vacuum tube and how we transition from relatively small scale computers in the order of thousands of nonlinear elements to billions of non elements where we are now with the optics is probably very similar to 70 years ago, which is a table talk implementation. And the question is, how can we utilize nano photonics? I'm gonna just briefly show you the two directions on that which we're working on. One is based on lithium Diabate, and the other is based on even a smaller resonate er's could you? So the work on Nana Photonic lithium naive. It was started in collaboration with Harvard Marko Loncar, and also might affair at Stanford. And, uh, we could show that you can do the periodic polling in the phenomenon of it and get all sorts of very highly nonlinear processes happening in this net. Photonic periodically polls if, um Diabate. And now we're working on building. Opio was based on that kind of photonic the film Diabate. And these air some some examples of the devices that we have been building in the past few months, which I'm not gonna tell you more about. But the O. P. O. S. And the Opio Networks are in the works. And that's not the only way of making large networks. Um, but also I want to point out that The reason that these Nana photonic goblins are actually exciting is not just because you can make a large networks and it can make him compact in a in a small footprint. They also provide some opportunities in terms of the operation regime. On one of them is about making cat states and Opio, which is, can we have the quantum superposition of the zero pie states that I talked about and the Net a photonic within? I've It provides some opportunities to actually get closer to that regime because of the spatial temporal confinement that you can get in these wave guides. So we're doing some theory on that. We're confident that the type of non linearity two losses that it can get with these platforms are actually much higher than what you can get with other platform their existing platforms and to go even smaller. We have been asking the question off. What is the smallest possible Opio that you can make? Then you can think about really wavelength scale type, resonate er's and adding the chi to non linearity and see how and when you can get the Opio to operate. And recently, in collaboration with us see, we have been actually USC and Creole. We have demonstrated that you can use nano lasers and get some spin Hamilton and implementations on those networks. So if you can build the a P. O s, we know that there is a path for implementing Opio Networks on on such a nano scale. So we have looked at these calculations and we try to estimate the threshold of a pos. Let's say for me resonator and it turns out that it can actually be even lower than the type of bulk Pip Llano Pos that we have been building in the past 50 years or so. So we're working on the experiments and we're hoping that we can actually make even larger and larger scale Opio networks. So let me summarize the talk I told you about the opium networks and our work that has been going on on icing machines and the measurement feedback. And I told you about the ongoing work on the all optical implementations both on the linear side and also on the nonlinear behaviors. And I also told you a little bit about the efforts on miniaturization and going to the to the Nano scale. So with that, I would like Thio >>three from the University of Tokyo. Before I thought that would like to thank you showing all the stuff of entity for the invitation and the organization of this online meeting and also would like to say that it has been very exciting to see the growth of this new film lab. And I'm happy to share with you today of some of the recent works that have been done either by me or by character of Hong Kong. Honest Group indicates the title of my talk is a neuro more fic in silica simulator for the communities in machine. And here is the outline I would like to make the case that the simulation in digital Tektronix of the CME can be useful for the better understanding or improving its function principles by new job introducing some ideas from neural networks. This is what I will discuss in the first part and then it will show some proof of concept of the game and performance that can be obtained using dissimulation in the second part and the protection of the performance that can be achieved using a very large chaos simulator in the third part and finally talk about future plans. So first, let me start by comparing recently proposed izing machines using this table there is elected from recent natural tronics paper from the village Park hard people, and this comparison shows that there's always a trade off between energy efficiency, speed and scalability that depends on the physical implementation. So in red, here are the limitation of each of the servers hardware on, interestingly, the F p G, a based systems such as a producer, digital, another uh Toshiba beautification machine or a recently proposed restricted Bozeman machine, FPD A by a group in Berkeley. They offer a good compromise between speed and scalability. And this is why, despite the unique advantage that some of these older hardware have trust as the currency proposition in Fox, CBS or the energy efficiency off memory Sisters uh P. J. O are still an attractive platform for building large organizing machines in the near future. The reason for the good performance of Refugee A is not so much that they operate at the high frequency. No, there are particular in use, efficient, but rather that the physical wiring off its elements can be reconfigured in a way that limits the funding human bottleneck, larger, funny and phenols and the long propagation video information within the system. In this respect, the LPGA is They are interesting from the perspective off the physics off complex systems, but then the physics of the actions on the photos. So to put the performance of these various hardware and perspective, we can look at the competition of bringing the brain the brain complete, using billions of neurons using only 20 watts of power and operates. It's a very theoretically slow, if we can see and so this impressive characteristic, they motivate us to try to investigate. What kind of new inspired principles be useful for designing better izing machines? The idea of this research project in the future collaboration it's to temporary alleviates the limitations that are intrinsic to the realization of an optical cortex in machine shown in the top panel here. By designing a large care simulator in silicone in the bottom here that can be used for digesting the better organization principles of the CIA and this talk, I will talk about three neuro inspired principles that are the symmetry of connections, neural dynamics orphan chaotic because of symmetry, is interconnectivity the infrastructure? No. Next talks are not composed of the reputation of always the same types of non environments of the neurons, but there is a local structure that is repeated. So here's the schematic of the micro column in the cortex. And lastly, the Iraqi co organization of connectivity connectivity is organizing a tree structure in the brain. So here you see a representation of the Iraqi and organization of the monkey cerebral cortex. So how can these principles we used to improve the performance of the icing machines? And it's in sequence stimulation. So, first about the two of principles of the estimate Trian Rico structure. We know that the classical approximation of the car testing machine, which is the ground toe, the rate based on your networks. So in the case of the icing machines, uh, the okay, Scott approximation can be obtained using the trump active in your position, for example, so the times of both of the system they are, they can be described by the following ordinary differential equations on in which, in case of see, I am the X, I represent the in phase component of one GOP Oh, Theo f represents the monitor optical parts, the district optical Parametric amplification and some of the good I JoJo extra represent the coupling, which is done in the case of the measure of feedback coupling cm using oh, more than detection and refugee A and then injection off the cooking time and eso this dynamics in both cases of CNN in your networks, they can be written as the grand set of a potential function V, and this written here, and this potential functionally includes the rising Maccagnan. So this is why it's natural to use this type of, uh, dynamics to solve the icing problem in which the Omega I J or the eyes in coping and the H is the extension of the icing and attorney in India and expect so. Not that this potential function can only be defined if the Omega I j. R. A. Symmetric. So the well known problem of this approach is that this potential function V that we obtain is very non convicts at low temperature, and also one strategy is to gradually deformed this landscape, using so many in process. But there is no theorem. Unfortunately, that granted conventions to the global minimum of There's even Tony and using this approach. And so this is why we propose, uh, to introduce a macro structures of the system where one analog spin or one D O. P. O is replaced by a pair off one another spin and one error, according viable. And the addition of this chemical structure introduces a symmetry in the system, which in terms induces chaotic dynamics, a chaotic search rather than a learning process for searching for the ground state of the icing. Every 20 within this massacre structure the role of the er variable eyes to control the amplitude off the analog spins toe force. The amplitude of the expense toe become equal to certain target amplitude a uh and, uh, and this is done by modulating the strength off the icing complaints or see the the error variable E I multiply the icing complaint here in the dynamics off air d o p. O. On then the dynamics. The whole dynamics described by this coupled equations because the e I do not necessarily take away the same value for the different. I thesis introduces a symmetry in the system, which in turn creates security dynamics, which I'm sure here for solving certain current size off, um, escape problem, Uh, in which the X I are shown here and the i r from here and the value of the icing energy showing the bottom plots. You see this Celtics search that visit various local minima of the as Newtonian and eventually finds the global minimum? Um, it can be shown that this modulation off the target opportunity can be used to destabilize all the local minima off the icing evertonians so that we're gonna do not get stuck in any of them. On more over the other types of attractors I can eventually appear, such as limits I contractors, Okot contractors. They can also be destabilized using the motivation of the target and Batuta. And so we have proposed in the past two different moderation of the target amateur. The first one is a modulation that ensure the uh 100 reproduction rate of the system to become positive on this forbids the creation off any nontrivial tractors. And but in this work, I will talk about another moderation or arrested moderation which is given here. That works, uh, as well as this first uh, moderation, but is easy to be implemented on refugee. So this couple of the question that represent becoming the stimulation of the cortex in machine with some error correction they can be implemented especially efficiently on an F B. G. And here I show the time that it takes to simulate three system and also in red. You see, at the time that it takes to simulate the X I term the EI term, the dot product and the rising Hamiltonian for a system with 500 spins and Iraq Spain's equivalent to 500 g. O. P. S. So >>in >>f b d a. The nonlinear dynamics which, according to the digital optical Parametric amplification that the Opa off the CME can be computed in only 13 clock cycles at 300 yards. So which corresponds to about 0.1 microseconds. And this is Toby, uh, compared to what can be achieved in the measurements back O C. M. In which, if we want to get 500 timer chip Xia Pios with the one she got repetition rate through the obstacle nine narrative. Uh, then way would require 0.5 microseconds toe do this so the submission in F B J can be at least as fast as ah one g repression. Uh, replicate pulsed laser CIA Um, then the DOT product that appears in this differential equation can be completed in 43 clock cycles. That's to say, one microseconds at 15 years. So I pieced for pouring sizes that are larger than 500 speeds. The dot product becomes clearly the bottleneck, and this can be seen by looking at the the skating off the time the numbers of clock cycles a text to compute either the non in your optical parts or the dog products, respect to the problem size. And And if we had infinite amount of resources and PGA to simulate the dynamics, then the non illogical post can could be done in the old one. On the mattress Vector product could be done in the low carrot off, located off scales as a look at it off and and while the guide off end. Because computing the dot product involves assuming all the terms in the product, which is done by a nephew, GE by another tree, which heights scarce logarithmic any with the size of the system. But This is in the case if we had an infinite amount of resources on the LPGA food, but for dealing for larger problems off more than 100 spins. Usually we need to decompose the metrics into ah, smaller blocks with the block side that are not you here. And then the scaling becomes funny, non inner parts linear in the end, over you and for the products in the end of EU square eso typically for low NF pdf cheap PGA you the block size off this matrix is typically about 100. So clearly way want to make you as large as possible in order to maintain this scanning in a log event for the numbers of clock cycles needed to compute the product rather than this and square that occurs if we decompose the metrics into smaller blocks. But the difficulty in, uh, having this larger blocks eyes that having another tree very large Haider tree introduces a large finding and finance and long distance start a path within the refugee. So the solution to get higher performance for a simulator of the contest in machine eyes to get rid of this bottleneck for the dot product by increasing the size of this at the tree. And this can be done by organizing your critique the electrical components within the LPGA in order which is shown here in this, uh, right panel here in order to minimize the finding finance of the system and to minimize the long distance that a path in the in the fpt So I'm not going to the details of how this is implemented LPGA. But just to give you a idea off why the Iraqi Yahiko organization off the system becomes the extremely important toe get good performance for similar organizing machine. So instead of instead of getting into the details of the mpg implementation, I would like to give some few benchmark results off this simulator, uh, off the that that was used as a proof of concept for this idea which is can be found in this archive paper here and here. I should results for solving escape problems. Free connected person, randomly person minus one spring last problems and we sure, as we use as a metric the numbers of the mattress Victor products since it's the bottleneck of the computation, uh, to get the optimal solution of this escape problem with the Nina successful BT against the problem size here and and in red here, this propose FDJ implementation and in ah blue is the numbers of retrospective product that are necessary for the C. I am without error correction to solve this escape programs and in green here for noisy means in an evening which is, uh, behavior with similar to the Cartesian mission. Uh, and so clearly you see that the scaring off the numbers of matrix vector product necessary to solve this problem scales with a better exponents than this other approaches. So So So that's interesting feature of the system and next we can see what is the real time to solution to solve this SK instances eso in the last six years, the time institution in seconds to find a grand state of risk. Instances remain answers probability for different state of the art hardware. So in red is the F B g. A presentation proposing this paper and then the other curve represent Ah, brick a local search in in orange and silver lining in purple, for example. And so you see that the scaring off this purpose simulator is is rather good, and that for larger plant sizes we can get orders of magnitude faster than the state of the art approaches. Moreover, the relatively good scanning off the time to search in respect to problem size uh, they indicate that the FPD implementation would be faster than risk. Other recently proposed izing machine, such as the hope you know, natural complimented on memories distance that is very fast for small problem size in blue here, which is very fast for small problem size. But which scanning is not good on the same thing for the restricted Bosman machine. Implementing a PGA proposed by some group in Broken Recently Again, which is very fast for small parliament sizes but which canning is bad so that a dis worse than the proposed approach so that we can expect that for programs size is larger than 1000 spins. The proposed, of course, would be the faster one. Let me jump toe this other slide and another confirmation that the scheme scales well that you can find the maximum cut values off benchmark sets. The G sets better candidates that have been previously found by any other algorithms, so they are the best known could values to best of our knowledge. And, um or so which is shown in this paper table here in particular, the instances, uh, 14 and 15 of this G set can be We can find better converse than previously known, and we can find this can vary is 100 times faster than the state of the art algorithm and CP to do this which is a very common Kasich. It s not that getting this a good result on the G sets, they do not require ah, particular hard tuning of the parameters. So the tuning issuing here is very simple. It it just depends on the degree off connectivity within each graph. And so this good results on the set indicate that the proposed approach would be a good not only at solving escape problems in this problems, but all the types off graph sizing problems on Mexican province in communities. So given that the performance off the design depends on the height of this other tree, we can try to maximize the height of this other tree on a large F p g a onda and carefully routing the components within the P G A and and we can draw some projections of what type of performance we can achieve in the near future based on the, uh, implementation that we are currently working. So here you see projection for the time to solution way, then next property for solving this escape programs respect to the prime assize. And here, compared to different with such publicizing machines, particularly the digital. And, you know, 42 is shown in the green here, the green line without that's and, uh and we should two different, uh, hypothesis for this productions either that the time to solution scales as exponential off n or that the time of social skills as expression of square root off. So it seems, according to the data, that time solution scares more as an expression of square root of and also we can be sure on this and this production show that we probably can solve prime escape problem of science 2000 spins, uh, to find the rial ground state of this problem with 99 success ability in about 10 seconds, which is much faster than all the other proposed approaches. So one of the future plans for this current is in machine simulator. So the first thing is that we would like to make dissimulation closer to the rial, uh, GOP oh, optical system in particular for a first step to get closer to the system of a measurement back. See, I am. And to do this what is, uh, simulate Herbal on the p a is this quantum, uh, condoms Goshen model that is proposed described in this paper and proposed by people in the in the Entity group. And so the idea of this model is that instead of having the very simple or these and have shown previously, it includes paired all these that take into account on me the mean off the awesome leverage off the, uh, European face component, but also their violence s so that we can take into account more quantum effects off the g o p. O, such as the squeezing. And then we plan toe, make the simulator open access for the members to run their instances on the system. There will be a first version in September that will be just based on the simple common line access for the simulator and in which will have just a classic or approximation of the system. We don't know Sturm, binary weights and museum in term, but then will propose a second version that would extend the current arising machine to Iraq off F p g. A, in which we will add the more refined models truncated, ignoring the bottom Goshen model they just talked about on the support in which he valued waits for the rising problems and support the cement. So we will announce later when this is available and and far right is working >>hard comes from Universal down today in physics department, and I'd like to thank the organizers for their kind invitation to participate in this very interesting and promising workshop. Also like to say that I look forward to collaborations with with a file lab and Yoshi and collaborators on the topics of this world. So today I'll briefly talk about our attempt to understand the fundamental limits off another continues time computing, at least from the point off you off bullion satisfy ability, problem solving, using ordinary differential equations. But I think the issues that we raise, um, during this occasion actually apply to other other approaches on a log approaches as well and into other problems as well. I think everyone here knows what Dorien satisfy ability. Problems are, um, you have boolean variables. You have em clauses. Each of disjunction of collaterals literally is a variable, or it's, uh, negation. And the goal is to find an assignment to the variable, such that order clauses are true. This is a decision type problem from the MP class, which means you can checking polynomial time for satisfy ability off any assignment. And the three set is empty, complete with K three a larger, which means an efficient trees. That's over, uh, implies an efficient source for all the problems in the empty class, because all the problems in the empty class can be reduced in Polian on real time to reset. As a matter of fact, you can reduce the NP complete problems into each other. You can go from three set to set backing or two maximum dependent set, which is a set packing in graph theoretic notions or terms toe the icing graphs. A problem decision version. This is useful, and you're comparing different approaches, working on different kinds of problems when not all the closest can be satisfied. You're looking at the accusation version offset, uh called Max Set. And the goal here is to find assignment that satisfies the maximum number of clauses. And this is from the NPR class. In terms of applications. If we had inefficient sets over or np complete problems over, it was literally, positively influenced. Thousands off problems and applications in industry and and science. I'm not going to read this, but this this, of course, gives a strong motivation toe work on this kind of problems. Now our approach to set solving involves embedding the problem in a continuous space, and you use all the east to do that. So instead of working zeros and ones, we work with minus one across once, and we allow the corresponding variables toe change continuously between the two bounds. We formulate the problem with the help of a close metrics. If if a if a close, uh, does not contain a variable or its negation. The corresponding matrix element is zero. If it contains the variable in positive, for which one contains the variable in a gated for Mitt's negative one, and then we use this to formulate this products caused quote, close violation functions one for every clause, Uh, which really, continuously between zero and one. And they're zero if and only if the clause itself is true. Uh, then we form the define in order to define a dynamic such dynamics in this and dimensional hyper cube where the search happens and if they exist, solutions. They're sitting in some of the corners of this hyper cube. So we define this, uh, energy potential or landscape function shown here in a way that this is zero if and only if all the clauses all the kmc zero or the clauses off satisfied keeping these auxiliary variables a EMS always positive. And therefore, what you do here is a dynamics that is a essentially ingredient descend on this potential energy landscape. If you were to keep all the M's constant that it would get stuck in some local minimum. However, what we do here is we couple it with the dynamics we cooperated the clothes violation functions as shown here. And if he didn't have this am here just just the chaos. For example, you have essentially what case you have positive feedback. You have increasing variable. Uh, but in that case, you still get stuck would still behave will still find. So she is better than the constant version but still would get stuck only when you put here this a m which makes the dynamics in in this variable exponential like uh, only then it keeps searching until he finds a solution on deer is a reason for that. I'm not going toe talk about here, but essentially boils down toe performing a Grady and descend on a globally time barren landscape. And this is what works. Now I'm gonna talk about good or bad and maybe the ugly. Uh, this is, uh, this is What's good is that it's a hyperbolic dynamical system, which means that if you take any domain in the search space that doesn't have a solution in it or any socially than the number of trajectories in it decays exponentially quickly. And the decay rate is a characteristic in variant characteristic off the dynamics itself. Dynamical systems called the escape right the inverse off that is the time scale in which you find solutions by this by this dynamical system, and you can see here some song trajectories that are Kelty because it's it's no linear, but it's transient, chaotic. Give their sources, of course, because eventually knowledge to the solution. Now, in terms of performance here, what you show for a bunch off, um, constraint densities defined by M overran the ratio between closes toe variables for random, said Problems is random. Chris had problems, and they as its function off n And we look at money toward the wartime, the wall clock time and it behaves quite value behaves Azat party nominally until you actually he to reach the set on set transition where the hardest problems are found. But what's more interesting is if you monitor the continuous time t the performance in terms off the A narrow, continuous Time t because that seems to be a polynomial. And the way we show that is, we consider, uh, random case that random three set for a fixed constraint density Onda. We hear what you show here. Is that the right of the trash hold that it's really hard and, uh, the money through the fraction of problems that we have not been able to solve it. We select thousands of problems at that constraint ratio and resolve them without algorithm, and we monitor the fractional problems that have not yet been solved by continuous 90. And this, as you see these decays exponentially different. Educate rates for different system sizes, and in this spot shows that is dedicated behaves polynomial, or actually as a power law. So if you combine these two, you find that the time needed to solve all problems except maybe appear traction off them scales foreign or merely with the problem size. So you have paranormal, continuous time complexity. And this is also true for other types of very hard constraints and sexual problems such as exact cover, because you can always transform them into three set as we discussed before, Ramsey coloring and and on these problems, even algorithms like survey propagation will will fail. But this doesn't mean that P equals NP because what you have first of all, if you were toe implement these equations in a device whose behavior is described by these, uh, the keys. Then, of course, T the continue style variable becomes a physical work off. Time on that will be polynomial is scaling, but you have another other variables. Oxidative variables, which structured in an exponential manner. So if they represent currents or voltages in your realization and it would be an exponential cost Al Qaeda. But this is some kind of trade between time and energy, while I know how toe generate energy or I don't know how to generate time. But I know how to generate energy so it could use for it. But there's other issues as well, especially if you're trying toe do this son and digital machine but also happens. Problems happen appear. Other problems appear on in physical devices as well as we discuss later. So if you implement this in GPU, you can. Then you can get in order off to magnitude. Speed up. And you can also modify this to solve Max sad problems. Uh, quite efficiently. You are competitive with the best heuristic solvers. This is a weather problems. In 2016 Max set competition eso so this this is this is definitely this seems like a good approach, but there's off course interesting limitations, I would say interesting, because it kind of makes you think about what it means and how you can exploit this thes observations in understanding better on a low continues time complexity. If you monitored the discrete number the number of discrete steps. Don't buy the room, Dakota integrator. When you solve this on a digital machine, you're using some kind of integrator. Um and you're using the same approach. But now you measure the number off problems you haven't sold by given number of this kid, uh, steps taken by the integrator. You find out you have exponential, discrete time, complexity and, of course, thistles. A problem. And if you look closely, what happens even though the analog mathematical trajectory, that's the record here. If you monitor what happens in discrete time, uh, the integrator frustrates very little. So this is like, you know, third or for the disposition, but fluctuates like crazy. So it really is like the intervention frees us out. And this is because of the phenomenon of stiffness that are I'll talk a little bit a more about little bit layer eso. >>You know, it might look >>like an integration issue on digital machines that you could improve and could definitely improve. But actually issues bigger than that. It's It's deeper than that, because on a digital machine there is no time energy conversion. So the outside variables are efficiently representing a digital machine. So there's no exponential fluctuating current of wattage in your computer when you do this. Eso If it is not equal NP then the exponential time, complexity or exponential costs complexity has to hit you somewhere. And this is how um, but, you know, one would be tempted to think maybe this wouldn't be an issue in a analog device, and to some extent is true on our devices can be ordered to maintain faster, but they also suffer from their own problems because he not gonna be affect. That classes soldiers as well. So, indeed, if you look at other systems like Mirandizing machine measurement feedback, probably talk on the grass or selected networks. They're all hinge on some kind off our ability to control your variables in arbitrary, high precision and a certain networks you want toe read out across frequencies in case off CM's. You required identical and program because which is hard to keep, and they kind of fluctuate away from one another, shift away from one another. And if you control that, of course that you can control the performance. So actually one can ask if whether or not this is a universal bottleneck and it seems so aside, I will argue next. Um, we can recall a fundamental result by by showing harder in reaction Target from 1978. Who says that it's a purely computer science proof that if you are able toe, compute the addition multiplication division off riel variables with infinite precision, then you could solve any complete problems in polynomial time. It doesn't actually proposals all where he just chose mathematically that this would be the case. Now, of course, in Real warned, you have also precision. So the next question is, how does that affect the competition about problems? This is what you're after. Lots of precision means information also, or entropy production. Eso what you're really looking at the relationship between hardness and cost of computing off a problem. Uh, and according to Sean Hagar, there's this left branch which in principle could be polynomial time. But the question whether or not this is achievable that is not achievable, but something more cheerful. That's on the right hand side. There's always going to be some information loss, so mental degeneration that could keep you away from possibly from point normal time. So this is what we like to understand, and this information laws the source off. This is not just always I will argue, uh, in any physical system, but it's also off algorithm nature, so that is a questionable area or approach. But China gets results. Security theoretical. No, actual solar is proposed. So we can ask, you know, just theoretically get out off. Curiosity would in principle be such soldiers because it is not proposing a soldier with such properties. In principle, if if you want to look mathematically precisely what the solar does would have the right properties on, I argue. Yes, I don't have a mathematical proof, but I have some arguments that that would be the case. And this is the case for actually our city there solver that if you could calculate its trajectory in a loss this way, then it would be, uh, would solve epic complete problems in polynomial continuous time. Now, as a matter of fact, this a bit more difficult question, because time in all these can be re scared however you want. So what? Burns says that you actually have to measure the length of the trajectory, which is a new variant off the dynamical system or property dynamical system, not off its parameters ization. And we did that. So Suba Corral, my student did that first, improving on the stiffness off the problem off the integrations, using implicit solvers and some smart tricks such that you actually are closer to the actual trajectory and using the same approach. You know what fraction off problems you can solve? We did not give the length of the trajectory. You find that it is putting on nearly scaling the problem sites we have putting on your skin complexity. That means that our solar is both Polly length and, as it is, defined it also poorly time analog solver. But if you look at as a discreet algorithm, if you measure the discrete steps on a digital machine, it is an exponential solver. And the reason is because off all these stiffness, every integrator has tow truck it digitizing truncate the equations, and what it has to do is to keep the integration between the so called stability region for for that scheme, and you have to keep this product within a grimace of Jacoby in and the step size read in this region. If you use explicit methods. You want to stay within this region? Uh, but what happens that some off the Eigen values grow fast for Steve problems, and then you're you're forced to reduce that t so the product stays in this bonded domain, which means that now you have to you're forced to take smaller and smaller times, So you're you're freezing out the integration and what I will show you. That's the case. Now you can move to increase its soldiers, which is which is a tree. In this case, you have to make domain is actually on the outside. But what happens in this case is some of the Eigen values of the Jacobean, also, for six systems, start to move to zero. As they're moving to zero, they're going to enter this instability region, so your soul is going to try to keep it out, so it's going to increase the data T. But if you increase that to increase the truncation hours, so you get randomized, uh, in the large search space, so it's it's really not, uh, not going to work out. Now, one can sort off introduce a theory or language to discuss computational and are computational complexity, using the language from dynamical systems theory. But basically I I don't have time to go into this, but you have for heart problems. Security object the chaotic satellite Ouch! In the middle of the search space somewhere, and that dictates how the dynamics happens and variant properties off the dynamics. Of course, off that saddle is what the targets performance and many things, so a new, important measure that we find that it's also helpful in describing thesis. Another complexity is the so called called Makarov, or metric entropy and basically what this does in an intuitive A eyes, uh, to describe the rate at which the uncertainty containing the insignificant digits off a trajectory in the back, the flow towards the significant ones as you lose information because off arrows being, uh grown or are developed in tow. Larger errors in an exponential at an exponential rate because you have positively up north spawning. But this is an in variant property. It's the property of the set of all. This is not how you compute them, and it's really the interesting create off accuracy philosopher dynamical system. A zay said that you have in such a high dimensional that I'm consistent were positive and negatively upon of exponents. Aziz Many The total is the dimension of space and user dimension, the number off unstable manifold dimensions and as Saddam was stable, manifold direction. And there's an interesting and I think, important passion, equality, equality called the passion, equality that connect the information theoretic aspect the rate off information loss with the geometric rate of which trajectory separate minus kappa, which is the escape rate that I already talked about. Now one can actually prove a simple theorems like back off the envelope calculation. The idea here is that you know the rate at which the largest rated, which closely started trajectory separate from one another. So now you can say that, uh, that is fine, as long as my trajectory finds the solution before the projective separate too quickly. In that case, I can have the hope that if I start from some region off the face base, several close early started trajectories, they kind of go into the same solution orphaned and and that's that's That's this upper bound of this limit, and it is really showing that it has to be. It's an exponentially small number. What? It depends on the end dependence off the exponents right here, which combines information loss rate and the social time performance. So these, if this exponents here or that has a large independence or river linear independence, then you then you really have to start, uh, trajectories exponentially closer to one another in orderto end up in the same order. So this is sort off like the direction that you're going in tow, and this formulation is applicable toe all dynamical systems, uh, deterministic dynamical systems. And I think we can We can expand this further because, uh, there is, ah, way off getting the expression for the escaped rate in terms off n the number of variables from cycle expansions that I don't have time to talk about. What? It's kind of like a program that you can try toe pursuit, and this is it. So the conclusions I think of self explanatory I think there is a lot of future in in, uh, in an allo. Continue start computing. Um, they can be efficient by orders of magnitude and digital ones in solving empty heart problems because, first of all, many of the systems you like the phone line and bottleneck. There's parallelism involved, and and you can also have a large spectrum or continues time, time dynamical algorithms than discrete ones. And you know. But we also have to be mindful off. What are the possibility of what are the limits? And 11 open question is very important. Open question is, you know, what are these limits? Is there some kind off no go theory? And that tells you that you can never perform better than this limit or that limit? And I think that's that's the exciting part toe to derive thes thes this levian 10.
SUMMARY :
bifurcated critical point that is the one that I forget to the lowest pump value a. the chi to non linearity and see how and when you can get the Opio know that the classical approximation of the car testing machine, which is the ground toe, than the state of the art algorithm and CP to do this which is a very common Kasich. right the inverse off that is the time scale in which you find solutions by first of all, many of the systems you like the phone line and bottleneck.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Exxon Mobil | ORGANIZATION | 0.99+ |
Andy | PERSON | 0.99+ |
Sean Hagar | PERSON | 0.99+ |
Daniel Wennberg | PERSON | 0.99+ |
Chris | PERSON | 0.99+ |
USC | ORGANIZATION | 0.99+ |
Caltech | ORGANIZATION | 0.99+ |
2016 | DATE | 0.99+ |
100 times | QUANTITY | 0.99+ |
Berkeley | LOCATION | 0.99+ |
Tatsuya Nagamoto | PERSON | 0.99+ |
two | QUANTITY | 0.99+ |
1978 | DATE | 0.99+ |
Fox | ORGANIZATION | 0.99+ |
six systems | QUANTITY | 0.99+ |
Harvard | ORGANIZATION | 0.99+ |
Al Qaeda | ORGANIZATION | 0.99+ |
September | DATE | 0.99+ |
second version | QUANTITY | 0.99+ |
CIA | ORGANIZATION | 0.99+ |
India | LOCATION | 0.99+ |
300 yards | QUANTITY | 0.99+ |
University of Tokyo | ORGANIZATION | 0.99+ |
today | DATE | 0.99+ |
Burns | PERSON | 0.99+ |
Atsushi Yamamura | PERSON | 0.99+ |
0.14% | QUANTITY | 0.99+ |
48 core | QUANTITY | 0.99+ |
0.5 microseconds | QUANTITY | 0.99+ |
NSF | ORGANIZATION | 0.99+ |
15 years | QUANTITY | 0.99+ |
CBS | ORGANIZATION | 0.99+ |
NTT | ORGANIZATION | 0.99+ |
first implementation | QUANTITY | 0.99+ |
first experiment | QUANTITY | 0.99+ |
123 | QUANTITY | 0.99+ |
Army Research Office | ORGANIZATION | 0.99+ |
first | QUANTITY | 0.99+ |
1,904,711 | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
six | QUANTITY | 0.99+ |
first version | QUANTITY | 0.99+ |
Steve | PERSON | 0.99+ |
2000 spins | QUANTITY | 0.99+ |
five researcher | QUANTITY | 0.99+ |
Creole | ORGANIZATION | 0.99+ |
three set | QUANTITY | 0.99+ |
second part | QUANTITY | 0.99+ |
third part | QUANTITY | 0.99+ |
Department of Applied Physics | ORGANIZATION | 0.99+ |
10 | QUANTITY | 0.99+ |
each | QUANTITY | 0.99+ |
85,900 | QUANTITY | 0.99+ |
One | QUANTITY | 0.99+ |
one problem | QUANTITY | 0.99+ |
136 CPU | QUANTITY | 0.99+ |
Toshiba | ORGANIZATION | 0.99+ |
Scott | PERSON | 0.99+ |
2.4 gigahertz | QUANTITY | 0.99+ |
1000 times | QUANTITY | 0.99+ |
two times | QUANTITY | 0.99+ |
two parts | QUANTITY | 0.99+ |
131 | QUANTITY | 0.99+ |
14,233 | QUANTITY | 0.99+ |
more than 100 spins | QUANTITY | 0.99+ |
two possible phases | QUANTITY | 0.99+ |
13,580 | QUANTITY | 0.99+ |
5 | QUANTITY | 0.99+ |
4 | QUANTITY | 0.99+ |
one microseconds | QUANTITY | 0.99+ |
first step | QUANTITY | 0.99+ |
first part | QUANTITY | 0.99+ |
500 spins | QUANTITY | 0.99+ |
two identical photons | QUANTITY | 0.99+ |
3 | QUANTITY | 0.99+ |
70 years ago | DATE | 0.99+ |
Iraq | LOCATION | 0.99+ |
one experiment | QUANTITY | 0.99+ |
zero | QUANTITY | 0.99+ |
Amir Safarini Nini | PERSON | 0.99+ |
Saddam | PERSON | 0.99+ |
Neuromorphic in Silico Simulator For the Coherent Ising Machine
>>Hi everyone, This system A fellow from the University of Tokyo before I thought that would like to thank you she and all the stuff of entity for the invitation and the organization of this online meeting and also would like to say that it has been very exciting to see the growth of this new film lab. And I'm happy to share with you today or some of the recent works that have been done either by me or by character of Hong Kong Noise Group indicating the title of my talk is a neuro more fic in silica simulator for the commenters in machine. And here is the outline I would like to make the case that the simulation in digital Tektronix of the CME can be useful for the better understanding or improving its function principles by new job introducing some ideas from neural networks. This is what I will discuss in the first part and then I will show some proof of concept of the game in performance that can be obtained using dissimulation in the second part and the production of the performance that can be achieved using a very large chaos simulator in the third part and finally talk about future plans. So first, let me start by comparing recently proposed izing machines using this table there is adapted from a recent natural tronics paper from the Village Back hard People. And this comparison shows that there's always a trade off between energy efficiency, speed and scalability that depends on the physical implementation. So in red, here are the limitation of each of the servers hardware on, Interestingly, the F p G, a based systems such as a producer, digital, another uh Toshiba purification machine, or a recently proposed restricted Bozeman machine, FPD eight, by a group in Berkeley. They offer a good compromise between speed and scalability. And this is why, despite the unique advantage that some of these older hardware have trust as the currency proposition influx you beat or the energy efficiency off memory sisters uh P. J. O are still an attractive platform for building large theorizing machines in the near future. The reason for the good performance of Refugee A is not so much that they operate at the high frequency. No, there are particle in use, efficient, but rather that the physical wiring off its elements can be reconfigured in a way that limits the funding human bottleneck, larger, funny and phenols and the long propagation video information within the system in this respect, the f. D. A s. They are interesting from the perspective, off the physics off complex systems, but then the physics of the actions on the photos. So to put the performance of these various hardware and perspective, we can look at the competition of bringing the brain the brain complete, using billions of neurons using only 20 watts of power and operates. It's a very theoretically slow, if we can see. And so this impressive characteristic, they motivate us to try to investigate. What kind of new inspired principles be useful for designing better izing machines? The idea of this research project in the future collaboration it's to temporary alleviates the limitations that are intrinsic to the realization of an optical cortex in machine shown in the top panel here. By designing a large care simulator in silicone in the bottom here that can be used for suggesting the better organization principles of the CIA and this talk, I will talk about three neuro inspired principles that are the symmetry of connections, neural dynamics. Orphan, chaotic because of symmetry, is interconnectivity. The infrastructure. No neck talks are not composed of the reputation of always the same types of non environments of the neurons, but there is a local structure that is repeated. So here's a schematic of the micro column in the cortex. And lastly, the Iraqi co organization of connectivity connectivity is organizing a tree structure in the brain. So here you see a representation of the Iraqi and organization of the monkey cerebral cortex. So how can these principles we used to improve the performance of the icing machines? And it's in sequence stimulation. So, first about the two of principles of the estimate Trian Rico structure. We know that the classical approximation of the Cortes in machine, which is a growing toe the rate based on your networks. So in the case of the icing machines, uh, the okay, Scott approximation can be obtained using the trump active in your position, for example, so the times of both of the system they are, they can be described by the following ordinary differential equations on in which, in case of see, I am the X, I represent the in phase component of one GOP Oh, Theo F represents the monitor optical parts, the district optical parametric amplification and some of the good I JoJo extra represent the coupling, which is done in the case of the measure of feedback cooking cm using oh, more than detection and refugee A then injection off the cooking time and eso this dynamics in both cases of CME in your networks, they can be written as the grand set of a potential function V, and this written here, and this potential functionally includes the rising Maccagnan. So this is why it's natural to use this type of, uh, dynamics to solve the icing problem in which the Omega I J or the Eyes in coping and the H is the extension of the rising and attorney in India and expect so. >>Not that this potential function can only be defined if the Omega I j. R. A. Symmetric. So the well known problem of >>this approach is that this potential function V that we obtain is very non convicts at low temperature, and also one strategy is to gradually deformed this landscape, using so many in process. But there is no theorem. Unfortunately, that granted convergence to the global minimum of there's even 20 and using this approach. And so this is >>why we propose toe introduce a macro structure the system or where one analog spin or one D o. P. O is replaced by a pair off one and knock spin and one error on cutting. Viable. And the addition of this chemical structure introduces a symmetry in the system, which in terms induces chaotic dynamics, a chaotic search rather than a >>learning process for searching for the ground state of the icing. Every 20 >>within this massacre structure the role of the ER variable eyes to control the amplitude off the analog spins to force the amplitude of the expense toe, become equal to certain target amplitude. A Andi. This is known by moderating the strength off the icing complaints or see the the error variable e I multiply the icing complain here in the dynamics off UH, D o p o on Then the dynamics. The whole dynamics described by this coupled equations because the e I do not necessarily take away the same value for the different, I think introduces a >>symmetry in the system, which in turn creates chaotic dynamics, which I'm showing here for solving certain current size off, um, escape problem, Uh, in which the exiled from here in the i r. From here and the value of the icing energy is shown in the bottom plots. And you see this Celtics search that visit various local minima of the as Newtonian and eventually finds the local minima Um, >>it can be shown that this modulation off the target opportunity can be used to destabilize all the local minima off the icing hamiltonian so that we're gonna do not get stuck in any of them. On more over the other types of attractors, I can eventually appear, such as the limits of contractors or quality contractors. They can also be destabilized using a moderation of the target amplitude. And so we have proposed in the past two different motivation of the target constitute the first one is a moderation that ensure the 100 >>reproduction rate of the system to become positive on this forbids the creation of any non tree retractors. And but in this work I will talk about another modulation or Uresti moderation, which is given here that works, uh, as well as this first, uh, moderation, but is easy to be implemented on refugee. >>So this couple of the question that represent the current the stimulation of the cortex in machine with some error correction, they can be implemented especially efficiently on an F B G. And here I show the time that it takes to simulate three system and eso in red. You see, at the time that it takes to simulate the X, I term the EI term, the dot product and the rising everything. Yet for a system with 500 spins analog Spain's equivalent to 500 g. O. P. S. So in f b d a. The nonlinear dynamics which, according to the digital optical Parametric amplification that the Opa off the CME can be computed in only 13 clock cycles at 300 yards. So which corresponds to about 0.1 microseconds. And this is Toby, uh, compared to what can be achieved in the measurements tobacco cm in which, if we want to get 500 timer chip Xia Pios with the one she got repetition rate through the obstacle nine narrative. Uh, then way would require 0.5 microseconds toe do this so the submission in F B J can be at least as fast as, ah one gear repression to replicate the post phaser CIA. Um, then the DOT product that appears in this differential equation can be completed in 43 clock cycles. That's to say, one microseconds at 15 years. So I pieced for pouring sizes that are larger than 500 speeds. The dot product becomes clearly the bottleneck, and this can be seen by looking at the the skating off the time the numbers of clock cycles a text to compute either the non in your optical parts, all the dog products, respect to the problem size. And and if we had a new infinite amount of resources and PGA to simulate the dynamics, then the non in optical post can could be done in the old one. On the mattress Vector product could be done in the low carrot off, located off scales as a low carrot off end and while the kite off end. Because computing the dot product involves the summing, all the terms in the products, which is done by a nephew, Jay by another tree, which heights scares a logarithmic any with the size of the system. But this is in the case if we had an infinite amount of resources on the LPGA food but for dealing for larger problems off more than 100 spins, usually we need to decompose the metrics into ah smaller blocks with the block side that are not you here. And then the scaling becomes funny non inner parts linear in the and over you and for the products in the end of you square eso typically for low NF pdf cheap P a. You know you the block size off this matrix is typically about 100. So clearly way want to make you as large as possible in order to maintain this scanning in a log event for the numbers of clock cycles needed to compute the product rather than this and square that occurs if we decompose the metrics into smaller blocks. But the difficulty in, uh, having this larger blocks eyes that having another tree very large Haider tree introduces a large finding and finance and long distance started path within the refugee. So the solution to get higher performance for a simulator of the contest in machine eyes to get rid of this bottleneck for the dot product. By increasing the size of this at the tree and this can be done by organizing Yeah, click the extra co components within the F p G A in order which is shown here in this right panel here in order to minimize the finding finance of the system and to minimize the long distance that the path in the in the fpt So I'm not going to the details of how this is implemented the PGA. But just to give you a new idea off why the Iraqi Yahiko organization off the system becomes extremely important toe get good performance for simulator organizing mission. So instead of instead of getting into the details of the mpg implementation, I would like to give some few benchmark results off this simulator, uh, off the that that was used as a proof of concept for this idea which is can be found in this archive paper here and here. I should result for solving escape problems, free connected person, randomly person minus one, spin last problems and we sure, as we use as a metric the numbers >>of the mattress Victor products since it's the bottleneck of the computation, uh, to get the optimal solution of this escape problem with Nina successful BT against the problem size here and and in red here there's propose F B J implementation and in ah blue is the numbers of retrospective product that are necessary for the C. I am without error correction to solve this escape programs and in green here for noisy means in an evening which is, uh, behavior. It's similar to the car testing machine >>and security. You see that the scaling off the numbers of metrics victor product necessary to solve this problem scales with a better exponents than this other approaches. So so So that's interesting feature of the system and next we can see what is the real time to solution. To solve this, SK instances eso in the last six years, the time institution in seconds >>to find a grand state of risk. Instances remain answers is possibility for different state of the art hardware. So in red is the F B G. A presentation proposing this paper and then the other curve represent ah, brick, a local search in in orange and center dining in purple, for example, and So you see that the scaring off this purpose simulator is is rather good and that for larger politicizes, we can get orders of magnitude faster than the state of the other approaches. >>Moreover, the relatively good scanning off the time to search in respect to problem size uh, they indicate that the FBT implementation would be faster than risk Other recently proposed izing machine, such as the Hope you know network implemented on Memory Sisters. That is very fast for small problem size in blue here, which is very fast for small problem size. But which scanning is not good on the same thing for the >>restricted Bosman machine implemented a PGA proposed by some group in Brooklyn recently again, which is very fast for small promise sizes. But which canning is bad So that, uh, this worse than the purpose approach so that we can expect that for promise sizes larger than, let's say, 1000 spins. The purpose, of course, would be the faster one. >>Let me jump toe this other slide and another confirmation that the scheme scales well that you can find the maximum cut values off benchmark sets. The G sets better cut values that have been previously found by any other >>algorithms. So they are the best known could values to best of our knowledge. And, um, or so which is shown in this paper table here in particular, the instances, Uh, 14 and 15 of this G set can be We can find better converse than previously >>known, and we can find this can vary is 100 times >>faster than the state of the art algorithm and cp to do this which is a recount. Kasich, it s not that getting this a good result on the G sets, they do not require ah, particular hard tuning of the parameters. So the tuning issuing here is very simple. It it just depends on the degree off connectivity within each graph. And so this good results on the set indicate that the proposed approach would be a good not only at solving escape problems in this problems, but all the types off graph sizing problems on Mexican province in communities. >>So given that the performance off the design depends on the height of this other tree, we can try to maximize the height of this other tree on a large F p g A onda and carefully routing the trickle components within the P G A. And and we can draw some projections of what type of performance we can achieve in >>the near future based on the, uh, implementation that we are currently working. So here you see projection for the time to solution way, then next property for solving this escape problems respect to the prime assize. And here, compared to different with such publicizing machines, particularly the digital and, you know, free to is shown in the green here, the green >>line without that's and, uh and we should two different, uh, prosthesis for this productions either that the time to solution scales as exponential off n or that >>the time of social skills as expression of square root off. So it seems according to the data, that time solution scares more as an expression of square root of and also we can be sure >>on this and this production showed that we probably can solve Prime Escape Program of Science 2000 spins to find the rial ground state of this problem with 99 success ability in about 10 seconds, which is much faster than all the other proposed approaches. So one of the future plans for this current is in machine simulator. So the first thing is that we would like to make dissimulation closer to the rial, uh, GOP or optical system in particular for a first step to get closer to the system of a measurement back. See, I am. And to do this, what is, uh, simulate Herbal on the p a is this quantum, uh, condoms Goshen model that is proposed described in this paper and proposed by people in the in the Entity group. And so the idea of this model is that instead of having the very simple or these and have shown previously, it includes paired all these that take into account out on me the mean off the awesome leverage off the, uh, European face component, but also their violence s so that we can take into account more quantum effects off the g o p. O, such as the squeezing. And then we plan toe, make the simulator open access for the members to run their instances on the system. There will be a first version in September that will >>be just based on the simple common line access for the simulator and in which will have just a classical approximation of the system. We don't know Sturm, binary weights and Museum in >>term, but then will propose a second version that would extend the current arising machine to Iraq off eight f p g. A. In which we will add the more refined models truncated bigger in the bottom question model that just talked about on the supports in which he valued waits for the rising problems and support the cement. So we will announce >>later when this is available, and Farah is working hard to get the first version available sometime in September. Thank you all, and we'll be happy to answer any questions that you have.
SUMMARY :
know that the classical approximation of the Cortes in machine, which is a growing toe So the well known problem of And so this is And the addition of this chemical structure introduces learning process for searching for the ground state of the icing. off the analog spins to force the amplitude of the expense toe, symmetry in the system, which in turn creates chaotic dynamics, which I'm showing here is a moderation that ensure the 100 reproduction rate of the system to become positive on this forbids the creation of any non tree in the in the fpt So I'm not going to the details of how this is implemented the PGA. of the mattress Victor products since it's the bottleneck of the computation, uh, You see that the scaling off the numbers of metrics victor product necessary to solve So in red is the F B G. A presentation proposing Moreover, the relatively good scanning off the But which canning is bad So that, scheme scales well that you can find the maximum cut values off benchmark the instances, Uh, 14 and 15 of this G set can be We can find better faster than the state of the art algorithm and cp to do this which is a recount. So given that the performance off the design depends on the height the near future based on the, uh, implementation that we are currently working. the time of social skills as expression of square root off. And so the idea of this model is that instead of having the very be just based on the simple common line access for the simulator and in which will have just a classical to Iraq off eight f p g. A. In which we will add the more refined models any questions that you have.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Brooklyn | LOCATION | 0.99+ |
September | DATE | 0.99+ |
100 times | QUANTITY | 0.99+ |
Berkeley | LOCATION | 0.99+ |
Hong Kong Noise Group | ORGANIZATION | 0.99+ |
CIA | ORGANIZATION | 0.99+ |
300 yards | QUANTITY | 0.99+ |
1000 spins | QUANTITY | 0.99+ |
India | LOCATION | 0.99+ |
15 years | QUANTITY | 0.99+ |
second version | QUANTITY | 0.99+ |
first version | QUANTITY | 0.99+ |
Farah | PERSON | 0.99+ |
second part | QUANTITY | 0.99+ |
first part | QUANTITY | 0.99+ |
two | QUANTITY | 0.99+ |
500 spins | QUANTITY | 0.99+ |
Toshiba | ORGANIZATION | 0.99+ |
first step | QUANTITY | 0.99+ |
20 | QUANTITY | 0.99+ |
more than 100 spins | QUANTITY | 0.99+ |
Scott | PERSON | 0.99+ |
University of Tokyo | ORGANIZATION | 0.99+ |
500 g. | QUANTITY | 0.98+ |
Mexican | LOCATION | 0.98+ |
both | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
Kasich | PERSON | 0.98+ |
first version | QUANTITY | 0.98+ |
first | QUANTITY | 0.98+ |
Iraq | LOCATION | 0.98+ |
third part | QUANTITY | 0.98+ |
13 clock cycles | QUANTITY | 0.98+ |
43 clock cycles | QUANTITY | 0.98+ |
first thing | QUANTITY | 0.98+ |
0.5 microseconds | QUANTITY | 0.97+ |
Jay | PERSON | 0.97+ |
Haider | LOCATION | 0.97+ |
15 | QUANTITY | 0.97+ |
one microseconds | QUANTITY | 0.97+ |
Spain | LOCATION | 0.97+ |
about 10 seconds | QUANTITY | 0.97+ |
LPGA | ORGANIZATION | 0.96+ |
each | QUANTITY | 0.96+ |
500 timer | QUANTITY | 0.96+ |
one strategy | QUANTITY | 0.96+ |
both cases | QUANTITY | 0.95+ |
one error | QUANTITY | 0.95+ |
20 watts | QUANTITY | 0.95+ |
Nina | PERSON | 0.95+ |
about 0.1 microseconds | QUANTITY | 0.95+ |
nine | QUANTITY | 0.95+ |
each graph | QUANTITY | 0.93+ |
14 | QUANTITY | 0.92+ |
CME | ORGANIZATION | 0.91+ |
Iraqi | OTHER | 0.91+ |
billions of neurons | QUANTITY | 0.91+ |
99 success | QUANTITY | 0.9+ |
about 100 | QUANTITY | 0.9+ |
larger than 500 speeds | QUANTITY | 0.9+ |
Vector | ORGANIZATION | 0.89+ |
spins | QUANTITY | 0.89+ |
Victor | ORGANIZATION | 0.89+ |
last six years | DATE | 0.86+ |
one | QUANTITY | 0.85+ |
one analog | QUANTITY | 0.82+ |
hamiltonian | OTHER | 0.82+ |
Simulator | TITLE | 0.8+ |
European | OTHER | 0.79+ |
three neuro inspired principles | QUANTITY | 0.78+ |
Bosman | PERSON | 0.75+ |
three system | QUANTITY | 0.75+ |
trump | PERSON | 0.74+ |
Xia Pios | COMMERCIAL_ITEM | 0.72+ |
100 | QUANTITY | 0.7+ |
one gear | QUANTITY | 0.7+ |
P. | QUANTITY | 0.68+ |
FPD eight | COMMERCIAL_ITEM | 0.66+ |
first one | QUANTITY | 0.64+ |
Escape Program of Science 2000 | TITLE | 0.6+ |
Celtics | OTHER | 0.58+ |
Toby | PERSON | 0.56+ |
Machine | TITLE | 0.54+ |
Refugee A | TITLE | 0.54+ |
couple | QUANTITY | 0.53+ |
Tektronix | ORGANIZATION | 0.51+ |
Opa | OTHER | 0.51+ |
P. J. O | ORGANIZATION | 0.51+ |
Bozeman | ORGANIZATION | 0.48+ |
Doc D'Errico & Ken Steinhardt, Infinidat | CUBE Conversation, September 2020
>> Narrator: From theCube studios in Palo Alto in Boston, connecting with thought leaders all around the world. This is theCube conversation. >> Hi everybody. Welcome to theCUBE, this is Dave Vellante, and we're here to talk about a very important topic around de-risking infrastructure with business continuity. This is critical, especially in the era of COVID. And with me, to really explore this issue is Dr. Rico, who's the vice president office of the CTO at INFINIDAT Doc. Good to see you. >> Good to see you again, Dave. >> And Ken Steinhardt, is also here as a field CTO at INFINIDAT and I got to tell the audience, Doc, you're also the chairman of the Mass Motorcycles Association. You're a very cool guy. You're a pilot, you're a firearms instructor, all about safety, and Ken and Doc you're both musicians, right? Doc, I think he played the drums, and Ken, I know when we first met, you're a music guy, so wow. Surrounded by talent so, thank you so much for coming on. >> Glad to be here. Great to see you. >> For the other thing too is that you guys are long time storage industry experts. I've known you both for many, many years. INFINIDAT deep engineering expertise of course, everybody knows about Moshay, he created the most successful product in the history of the storage industry. And we're going to talk about the importance of data, especially in this era of COVID, and how mission criticality has really become more and more important. So, I want to start Doc with you and this notion of business continuity. How are you thinking about, and INFINIDAT thinking about business continuity in this isolation era? >> Well, that's a really great question Dave, because it has changed quite a bit. And as you said, we've known each other a long time, all the way back to when I still had hair, that was how long ago it was. But, business continuity is something that every business constantly looks at throughout their evolution. And it's one of these things where certain applications are typically more mission critical than others. And lately, what we've seen is this genre of a lights out data center that has become absolutely critical operating a business today. People can't just be on site anymore. People need to be working remotely, and that includes data center personnel and in many respects. So, this whole concept of business continuity now encompasses not only the operation equipment that's on premises, or sometimes even off premises, but it also encompasses applications that people need access to that they may not have thought of mission critical before, because working from home was a convenience or working remotely was a convenience, not a requirement for that business. >> You, Ken, I know you talked to a lot of CIOs. I was sitting at a CIO round table with my friends down at ETR recently, and one of the CIO said, when COVID hit, we realized that our business quote unquote business continuity plans were just way too narrowly focused on DR. What do you see from the IT community? >> It's funny because I literally was on a CIO round table with the West Coast this morning. And there were a couple of interesting comments that really stuck out to me from some of the people there. One was commenting of just reaffirming, what Doc said, how much people are working from home now. They said, traditionally they'd had traditional offices and they've just recently hired in this company about 250 people. He said, all of them are going to be remote workers and their normal from here on out, for the next 150 they're looking to hire is just that business as usual will be remote work. And one of the other CIOs chimed in with a quote that really stuck out to me. He said, "Remote work requires always on infrastructure in this day and age." And it's just a whole new way of having to make sure that businesses are operational and their workers can do what they're supposed to do. >> Well, so let's stay on that. I mean, ransomware's on everybody's mind. I mean, all you have to do is look at the stock market, you see, what's happened with Zoom, it's exploded. All the end point securities, identity access management security companies are going crazy, because (chuckles) people are now so vulnerable. So, they're more exposed to ransomware, Ken, what do we really need to know about ransomware? First, the smart company, smart organization is the one that is prepared and assumes the worst. Which means don't think it can't happen to you, especially when you look at a couple of the more public examples in the last couple of years in particular. So, it means you must take steps to protect yourself, particularly for the sake of your company, your business, your employees, your shareholders, your customers, everyone else. And that means deploying technology that assumes that if the worst case scenario could happen to you, how do you make sure that you have taken the steps that you can avoid the worst possible scenarios that could happen? >> Well, you know, Doc, lot of times when you have this discussion on ransomware, people say, well, should I pay the ransom? And sometimes people say, well, yeah, maybe it should go. You hope you never get there, right? (chuckles) >> Right, you absolutely hope you never get there. There is such horrible examples of paying ransom that just don't work. Just look at the Somalia pirates as an example, right? It doesn't stop them at all, but, take a look at what the potential impact is, not the potential impact to your business and your employees, but the potential impact to society. A couple of years ago with Sony, was very notorious case. More recently, a couple of months ago, Garmin. As you mentioned, I'm a pilot, but I was very worried as what reservoir, a lot of people in the aircraft and in aviation industry. What's going to happen not only with our private information, the account information, but what's going to happen with avionics updates? If Garmin didn't have a fallback plan, a way to recover, then what was going to happen? And I'm sure they were going through the process and the thoughts of, should we pay this year? How else do we get out of this? But, fortunately they had a very good plan in place and it only took them a couple of days to restore back to normal operations. Arguably as far as avionics goes, they were lucky in the sense that this happened to them right in the middle of an update cycle, which is 28 day cycle. But the fact that it only took them a couple of days, congratulations to them. I'm sure that with even better plans and a little bit of extra effort, it could have been a matter of hours instead of days. >> Well, let's come back to business continuity. Ken, do you feel as though businesses are not prepared based on the conversation we were having earlier? >> Some are, some aren't. It will be getting into that, I think in a little bit more detail as well, but historically, organizations I think have focused far too much just on traditional disaster recovery, usually with things like some of the technologies that have been around a long while like backup, and onto often having focused towards the technologies that really do keep the business running without human intervention if something were to ever go wrong. >> So, Doc, anything you'd add to that? I mean, what's the state of business continuity from your perspective? Are people having to really starting to accelerate a journey because of this COVID? >> I absolutely think they're accelerating a journey. They're also looking now at, this concept of multiple active sites. The concept of active sites is not something new, it's something that dates back a couple of decades and a lot of the financial industry. When they were struck, they were looking at some very significant changes in their operational paradigm because they realized that the system is going down and is only a small percentage of the problem that people impact is far worse. The operational procedures, the human intervention. So, what they would do is typically build out multiple sites and rotate the applications between them. What they really haven't done yet, at least not on a broad scale and certainly not in the U.S and some cases in Europe, they started this journey, having applications running simultaneously in multiple sites accessing the same data sets. It's not a brand new concept, but it's something that has improved significantly. The technologies have improved significantly over the course of the past decade. And with the introduction of our active backend solution, a couple of years ago, even brought it to an entirely new level. >> The people aspect that Doc mentioned is so critical. And that's certainly been one of the key lessons learned when real disasters have occurred is that the systems have to be, if you really want to keep your business operating making an assumption that people are going to have depending upon the nature of the disaster. Very different priorities and one of them is not, Gee, do I keep these ITs systems running or not? They're going to be worried about their co-workers, their families, other things, et cetera. So, the ultimate has to be systems that are capable of continuing the operation of the business in the face of a site failure, a metropolitan area failure or whatever it takes without the requirement necessarily for human intervention. >> So, I want to get into active-active. But before we do, I wonder if we could do a little sort of data protection one on one, a back up, a replication, you got snapshots, Doc, what do we need to know about each in the context of this discussion? >> I think the important thing to look at when you think about the different types of technologies and say you apply the solutions is that some of them apply to specific equipment failures, and some of them apply to data failure. And I separate equipment from data in the sense that data can be corrupted in some shape or form. It can be through malicious attack, like ransomware as an example, only one example, other types of malware can play a factor as well, or it can be incidental. Somebody pressing the wrong button, it can be an operational procedure, perhaps another system failure that causes a change in the data or corruption in the data that makes it essentially unusable. So, whenever we're looking at this, we have to start with what is the recovery point objective. The RPO that's where most people start with. And in the RPO, in essence, if you think of time zero, right now, it's where the failure occurs. Walk backwards. How far back can I go and still sustain my business? Now, there may be other procedural things you can do to catch up as close to that RPO and zero as you can, but each of these technologies that we're talking about give you a different RPOs, like rewinding a tape back to a point in time. So, that's the first place to start. >> Okay. So, let's bring up that slide actually. I actually liked this as the fireball slide I call it, but this is how people measure sort of the business impact, if you will, RPO and RTO. And what I like about this is in this digital world, it's kind of a cliche, but everything's getting more intense. People want, they don't want to lose data when you ask a customer, how much data are you willing to lose? They say none. >> None. >> And you say, well, how much are you willing to pay? So, Ken, I wonder if you could sort of describe that tension and that dynamic that's really underscored in this slide. >> Yeah. Oh, yeah, you hit it on the head David. It's the traditional trade off between RPO, RTO and cost. As Doc described with RPO, the objective would be to get as close to zero data loss as you could possibly get, with RTO which measures the time associated with how long will it take you to get back to your acceptable level of RPO. That is a time factor where for every minute or second, that goes by that you're not in business, that's the extension of the RTO. And historically, the closer you get as you approach zero RPO and zero RTO, usually the greater the cost goes up. And it's always been the eternal trade off, is a great analogy. It's sort of like if you want to buy a car. RPO equates for the quality of the solution, RTO is time or speed and cost is cost. If you buy a car, if it's good and it's fast, it won't be cheap. If it's good, and it's cheap, it won't be fast. And if it's fast, and it's cheap, it won't be good. So, usually that's the kind of tradeoff we will have to deal with there. And, the factors that will impact that, as Doc alluded to can be many. There's many aspects that you have to consider in terms of what is the service level that the business requires, and do we have solutions in place that can actually give us what is the real service level of the business requires if something were to go bad. >> Because, customers have gone through, unnatural acts, and Doc before you were kind of describing what some people would refer to as, as a three site, data centers and all kinds of things that people will do, but that brings us to active-active, Doc, what is active-active? >> Yeah, let me interject a point there, and then I'll get to your question about active-active. First is the question I can raise about service level, that's absolutely critical. And business may have different service levels for different applications. >> Dave: Right. >> And you never really know what that is. For example, I was working with a university a few years back, you normally think, well, universities is where they worried about, they're worried about their grading systems. Everybody's always worried about their financial systems. This particular university was worried about their golf course reservations system. (laughs) And their number one mission critical application, and I'm sure there was a little chunk tongue and cheek there as well, was the golf course reservation system because that directly impacted, there were alumni and had a direct correlation to the incoming donations for the following year. So, you never know what's going to be mission critical. Closer to home working very recently, there's a great case study from Aultman Hospital on a website. One of the things that they did, which I thought was absolutely astounding, was they took advantage of our offer to loan them free storage for a while, leveraging some of the COD that they're passing on demand that they weren't using. One of the reasons that they wanted this extra capacity was so that they can make telepresence available to their patients to visit with their families. At a time when families can't go into the hospital visit, when people are ill, what a great comfort to their family. So, this is a great way to look at it. When you think about these different service levels now, and you think about the different types of replication technologies that are available. Look at the multisite, what is multisite really doing for you? Multisite is giving you some level of synchronous replication so that you have an RPO of zero recovery point objective. It still may not be an RTO or zero, but it will be darn close to it. But more importantly, it's giving you an additional site to really maintain that RPO of zero in case the disaster radius, the blast area, the impact zone is even further away. Now, this isn't going to prevent any type of malicious intent, it's not going to prevent the ransomware case, and things like that, but it'll certainly prevent the catastrophic failure of the data center. What does active-active do? Well, active-active now, gives you the read write capability. And now our multisite implementation by the way, leverages our active-active. So, gives you the ability now to have the simultaneously running instance of an application in multiple data centers, reading and writing from the same dataset. And what that gives you, is not only an RPO of zero, but an RTO of zero, because now you can have an application in another data center stand in and take over for it. Naturally, the application needs to be able to do that. There are a lot of applications that are capable of it. The Oracle parallel server or rack technology, gives you that capability. There are other types of clustering technologies that will fail almost instantaneously, that will give you that capability. So, that's where really active-active comes into play. >> Yeah, makes sense for me. When I started the industry, the VAX clusters were sort of the now thing, right? >> Yup. >> (indistinct) (Dave chuckles) >> All right. So, what are you seeing in the marketplace? Are you seeing... What's the adoption look like? Are there any differences that you see by region? What can you tell us there? >> Yeah, it's interesting. Some of the first organizations that obviously jumped on to active-active type solutions, were those where there were in particularly, in things like financial services, some compliance requirements or financial incentives or motivation to make sure that the business was always operational. And it's interesting because there was a study that was done all the way back in 2003, by Roper, that asked business executives and IT executives the same questions relative to their perceptions of their companies or organizations ability to meet RPO or RTO service level agreements. >> Right. And we have some data on this that I want to bring up. So, this is the RPO data but please carry on. >> Ken: Exactly, and so they asked questions that really were about RPO or RTO. Hey, if a disaster hit, would you lose data and how much? And what the data showed was that the business executives and IT executives in Europe, were actually pretty much on the same page. They both said, yeah, we probably would lose some data or a reasonable amounts associated with it. But what was a little frightening, was there appeared to be a chasm of disconnect between the business executives, from the IT executives in the U.S. And what it showed was that the IT executives were on the same page as the European IT executives and the business executives from Europe, saying that, yeah, we'd probably lose some data. But it showed that very few of the business executives thought that they would. And then similarly, when they were asked the question about RTO, how long would it take? In terms of days, hours, et cetera, for your full operation to be back in operational and granted they were talking in 2003 terms back then, which was a little longer than where the technology can now address it now. There was, again, this consistency between the IT executives in both continents and countries, as well as the European business executives, but again, a disconnect where the business executives in the U.S thought, oh, no, we'll be fine. We'll have everything back in a couple of days or less than, it won't be an issue. In my opinion, in looking at that data, when it first came out, my impression was, well, now I understand why a lot of business continuity projects don't get approved because the IT people know that they need it, but the business executives have, if I could be so bold, an unrealistically optimistic view of their ability to achieve RPO and RTO, I'll give you a great example. There was a major high tech company around that timeframe that actually had a major outage in their email system. And email was not perceived to be at the time, ultra mission critical application for them. I know it seems strange in this day and age, but back then it was considered sort of an afterthought and they had a four hour SLA in case something went down where, hey, if we're down for four hours, we get it back and four hours, we're fine. And so, IT thought, they were doing a great job, 'cause they got it back in less than four. It was about three point something. And it turned out that the real impact of the business was so overwhelming, they had to completely overhaul the IT infrastructure that they've put in place to deliver that. So, it's an interesting issue, and it's the kind of thing where, as a result, I believe that as we sit here today in 2020, the disconnect in the U.S still exists. If you look across Europe, you tend to find a lot of deployments of active-active. The first country that probably did a ton of it was Germany, and then, lot of the other European countries did as well. For a multitude of reasons, you tend to see a lot of active-active deployments in Europe, but you don't see anywhere near as many as if I could be so bold, we probably should be seeing in the U.S, and I believe a major contributing factor to that is that there is still this disconnect, between business executives having a false sense of security that is unfounded by the infrastructures that they have in place. And if they were to ask their IT people, and maybe that's a good idea for them to talk more, they'd probably find that they're more exposed than they ever realized. >> Right. And of course in Europe, you've got, much tighter proximity, and you're up against borders of a 200 mile or a 200 kilometer roll, governments have tried to impose here, really can't be imposed in a lot of cases. Okay. Let's get into what you guys are doing here in the space. So, Doc, how do you approach ensuring access to mission critical data? What's INFINIDAT's angle? >> Yeah, I think it's several different layers that need to be applied here. The first INFINIDAT angle starts with the fact that our storage is a hundred percent data availability guarantee. It's simple enough. It's triple redundant architecture, seven nines reliability design, which equates to 3.16 seconds per year of downtime, which is less than a scuzzy time (laughs) I bet you know. Let's start with just, right, forget the nonsense, the system's are a hundred percent available guaranteed. We put some teeth behind that, and that's a great way to start. It's not necessarily going to fundamentally protect your data from site outages and network outages and server outages and things like that, so, let's be fed up and can go to in active-active infrastructure. And now you can take the system and put it either elsewhere behind a firewall on the same data center floor, or in a metropolitan area. Wherever you need it to be, separate power zones, separate networks zones, make it even more available. And then if you really want to go that next level of protection because you're worried about regional outages and things of that nature, multisite replication. But now it's up the ante even further. Let's look at the malicious intent, let's look at the data corruption. Let's look at all of the other possibilities of things that can happen to your data. So, implement snapshotting technology, in this snapshot technology, and InfiniBox is essentially free. There's no cost for the software, there is no performance impact because it's part of metadata updates that are happening all the time anyway. So, there's zero additional overhead of that. There's no additional, there's no copying of data going on with a snapshot, so there's no additional cost penalty associated with it. And you can snapshot this frequently for a Snapshot any of your data frequently to protect against data corruption. And if you're worried about some sort of malicious aspect, that's going to engage and perhaps gain access to the snapshots, we have immutable technology, and that is also free. It's there, it doesn't cost you anything other than the time it takes for the administrator to determine what the policy is. And now that can not be modified. It can't be deleted, it can't be modified, it can't be updated, can't be written to your inside whatever the polyp the defined policy is. So, now you're protected, you're a hundred percent availability, increase data hundred percent availability with active-active, and then increase your RPO capability with dissonance and protect yourself against data corruption with immutable snapshots. Or some combination of standard snapshots and immutable snapshots. >> Yeah, so, I was going to ask Ken, if this is a cost effective approach, but, I mean, it's free, it comes in the stack. >> That is the key word, and you both just said it. Standard and included functionality all based on that great snapshot technology, which was the foundation for it that Doc described. Active-active, standard and included, the ability to go to a third site for disaster recovery at the industry's lowest asynchronous RPO with a remote site. Standard and included, immutable snaps, standard and included. So, compared to traditional views of what most people had back to our illustrious triangle earlier of RPO versus RTO versus cost, you're still going to have the additional cost of media and remote site for protecting your data, obviously, but in terms of software license costs, we're making it simpler, we're making it easier, we're making it standard and included, and we're just making it so much more readily available for organizations to be able to achieve superior RTO and RPO at a cost point that maybe certainly is a little bit higher than just having that single system that Doc alluded to, it's still a hundred percent available, but it's way below what the expectations of this industry have been over the last 20 years. >> Yeah, which is double, triple, I mean easily. Well, can I understand you for a second. You've worked for a lot of different storage companies, Doc you as well, but how different is this? How unique is this? >> There are surprisingly few vendors that can offer true zero RPO at two zero RTO. There's really only a handful. We're one of them. And by handful, I mean about three in the industry, including ourselves, and where I think we differentiate is fundamentally to a lot of those points we just mentioned. The software standard and included so we're not going to charge you extra for it. It's going to be relatively simple to deploy and integrate a stock alluded to earlier with server cluster software and the key components that people would use there in terms of databases and in terms of operating systems. And it's fundamentally going to be able to offer not just that zero RPO, zero RTO active-active environment, but if you do, and when you do need to go to a third site at distance for the true disaster recovery, if you ever lost a metropolitan area, we're going to be able to do it at an RPO that is lower than anything else on the market. >> Doc, are there complexities associated with doing this at petabyte scale? I mean, you guys make a big deal out of that, and you're clearly excited about it, but, is it extra hard to do at that kind of volume at scale? >> I'm going to give you two answers, and say, yes, it's incredibly difficult to do, but then I'm going to say it's incredibly easy for the customer to do because we've made it easy. There a lot of ramifications to doing things at petabyte scale. There's the size of the caching cables that you don't have to worry about. There's the numbers of things that need to be checked, and counter checked and constantly crosscheck for validity. There's also the scale of things that happen like silent data corruption that need to be factored in. All of those things are being done by InfiniBox, on a constant basis with no impact to the customer, no impact to the administrator, no impact to the running application. And I think that's a frankly, another differentiator as well. Ken and I have some common history as well. (chuckles) Used to constantly talk about internally, what happens as things get larger, systems slow down. That simply doesn't happen with InfiniBox. And that's why service providers use us as well. Cloud service providers managed service providers are some of our biggest customers. Because they know they can have these large scale systems running with all these different workloads, all these different functions, be they snapshots, clones, whatever they are, with no impact and very easy and rapid to deploy. >> Yeah, I set up top, you got to be storage hardos to make this stuff work. (laughs) It's very complicated and we've seen it for years and years. Last question. Again, huge changes in the last 150 days where people are just really tuned in to things like digital transformation, I talked about security, business resiliency, business continuity. Where... I'll start with you Ken, how should users be thinking about this? What steps should they be taking like now? >> What a great question. And back to sort of where we started, because of the nature of how things have changed, more applications are mission critical than they've ever been before. And providing, and always on infrastructure to make sure that you can give your users and your customers and your business, the opportunity to stay alive in the face of just about anything that could happen has never been more important in the history of this industry. >> Doc, I'll give you the final word, you can pile on that. >> I think Ken summed it up really well, but I'm going to take a different twist on it. It's all about de-risking, and a lot of the CIOs and CTOs of companies that I've been talking to over the course of the past couple of months, have basically said, hey, my digital transformation initiatives are on hold right now because I've got to keep the lights on, I've got to keep my business running. In some cases, maybe I've had to sadly pare down my staff, but I've got, remote workers have got to worry about. So, find a partner that's going to de-risk your infrastructure for you. Take a look at some of the things that we've announced in the past few months as well. We'll take a lot of that risk way, not only from the availability perspective, but we're going to take the risk away from a cost perspective. If you want to talk about INFINIDAT, don't worry about things like, how am I going to migrate over to it? We're going to do that for you. We're going to work with you, we're going to come up with a plan, we're going to make as much of it non-disruptive as we can, and we're going to assume the cost of doing it. We're going to take away all the risk of availability. We just talked about all of that. We're going to give you guarantees, that are a hundred percent availability. We'll help you architect the right solution for you and we'll protect you moving forward. You might need some flex area of capacity as you work through some of these new applications and new initiatives, so, you've got to be willing to take the risk away with our elastic pricing models. Use the storage when you need it, return it when you don't, and you don't have to pay for it anymore. We'll make it that simple for you. We'll give you that cloud operating paradigm on premises, and by the way, no egress costs. (Dave laughs) >> Well, this is a hard problem for people because they've had to do the work from home pivot, IT people, specifically, I mean, they've had to spend to shore up that infrastructure and of course, organizations just saying, well, we're going to pull from other places, but, look, if you're not digital today, you're not being able to transact business. And so, you can't relax your business continuity plans, in fact, you have to evolve them. Guys, thanks very much for sharing your perspectives and insights on this whole notion of de-risking infrastructure with business continuity. Thanks for coming on. >> Thank you, Dave. >> Dave, is always a pleasure. Thank you. >> Cheers, and thank you everybody for watching, this is Dave Vallante for theCube, and we'll see you next time. (upbeat music)
SUMMARY :
leaders all around the world. of the CTO at INFINIDAT Doc. of the Mass Motorcycles Association. Glad to be here. in the history of the storage industry. that people need access to and one of the CIO said, for the next 150 they're looking to hire at a couple of the more public examples lot of times when you have not the potential impact to your business based on the conversation that really do keep the business running and a lot of the financial industry. is that the systems have to be, in the context of this discussion? So, that's the first place to start. sort of the business impact, and that dynamic that's really And historically, the closer you get and then I'll get to your One of the reasons that they of the now thing, right? that you see by region? that the business was always operational. And we have some data and it's the kind of are doing here in the space. that can happen to your data. but, I mean, it's free, it comes in the stack. the ability to go to a third Well, can I understand you for a second. and the key components for the customer to do Again, huge changes in the last 150 days the opportunity to stay alive Doc, I'll give you the final word, and a lot of the CIOs And so, you can't relax your Dave, is always a pleasure. and we'll see you next time.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Ken Steinhardt | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
Dave Vallante | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
Europe | LOCATION | 0.99+ |
Garmin | ORGANIZATION | 0.99+ |
Mass Motorcycles Association | ORGANIZATION | 0.99+ |
Ken | PERSON | 0.99+ |
2003 | DATE | 0.99+ |
David | PERSON | 0.99+ |
Palo Alto | LOCATION | 0.99+ |
Doc | PERSON | 0.99+ |
Doc D'Errico | PERSON | 0.99+ |
September 2020 | DATE | 0.99+ |
Rico | PERSON | 0.99+ |
U.S | LOCATION | 0.99+ |
hundred percent | QUANTITY | 0.99+ |
four hours | QUANTITY | 0.99+ |
28 day | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
First | QUANTITY | 0.99+ |
Aultman Hospital | ORGANIZATION | 0.99+ |
two answers | QUANTITY | 0.99+ |
INFINIDAT | ORGANIZATION | 0.99+ |
four hour | QUANTITY | 0.99+ |
Sony | ORGANIZATION | 0.99+ |
Oracle | ORGANIZATION | 0.99+ |
both | QUANTITY | 0.99+ |
200 mile | QUANTITY | 0.99+ |
first | QUANTITY | 0.99+ |
less than four | QUANTITY | 0.99+ |
each | QUANTITY | 0.99+ |
U.S. | LOCATION | 0.98+ |
200 kilometer | QUANTITY | 0.98+ |
Boston | LOCATION | 0.98+ |
InfiniBox | ORGANIZATION | 0.98+ |
2020 | DATE | 0.98+ |
One | QUANTITY | 0.98+ |
one example | QUANTITY | 0.98+ |
Zoom | ORGANIZATION | 0.97+ |
Somalia | LOCATION | 0.97+ |
single system | QUANTITY | 0.97+ |
about 250 people | QUANTITY | 0.96+ |
zero | QUANTITY | 0.96+ |
ETR | ORGANIZATION | 0.96+ |
this year | DATE | 0.96+ |
today | DATE | 0.96+ |
European | OTHER | 0.96+ |
Moshay | PERSON | 0.95+ |
Doc D'Errico & Ken Steinhardt, Infinidat | CUBE Conversation September, 2020 - V2 FOR REVIEW
>> Narrator: From theCube studios in Palo Alto in Boston, connecting with thought leaders all around the world. This is theCube conversation. >> Hi everybody. Welcome to theCUBE, this is Dave Vellante, and we're here to talk about a very important topic around de-risking infrastructure with business continuity. This is critical, especially in the era of COVID. And with me, to really explore this issue is Dr. Rico, who's the vice president office of the CTO at INFINIDAT Doc. Good to see you. >> Good to see you again, Dave. >> And Ken Steinhardt, is also here as a field CTO at INFINIDAT and I got to tell the audience, Doc, you're also the chairman of the Mass Motorcycles Association. You're a very cool guy. You're a pilot, you're a firearms instructor, all about safety, and Ken and Doc you're both musicians, right? Doc, I think he played the drums, and Ken, I know when we first met, you're a music guy, so wow. Surrounded by talent so, thank you so much for coming on. >> Glad to be here. Great to see you. >> For the other thing too is that you guys are long time storage industry experts. I've known you both for many, many years. INFINIDAT deep engineering expertise of course, everybody knows about Moshay, he created the most successful product in the history of the storage industry. And we're going to talk about the importance of data, especially in this era of COVID, and how mission criticality has really become more and more important. So, I want to start Doc with you and this notion of business continuity. How are you thinking about, and INFINIDAT thinking about business continuity in this isolation era? >> Well, that's a really great question Dave, because it has changed quite a bit. And as you said, we've known each other a long time, all the way back to when I still had hair, that was (indistinct). But, business continuity is something that every business constantly looks at throughout their evolution. And it's one of these things where certain applications are typically more mission critical than others. And lately, what we've seen is this genre of a lights out data center that has become absolutely critical operating a business today. People can't just be on site anymore. People need to be working remotely, and that includes data center personnel and in many respects. So, this whole concept of business continuity now encompasses not only the operation equipment that's on premises, or sometimes even off premises, but it also encompasses applications that people need access to that they may not have thought of mission critical before, because working from home was a convenience or working remotely was a convenience, not a requirement for that business. >> You, Ken, I know you talked to a lot of CIOs. I was sitting at a CIO round table with my friends down at ETR recently, and one of the CIO said, when COVID hit, we realized that our business quote unquote business continuity plans were just way too narrowly focused on DR. What do you see from the IT community? >> It's funny because I literally was on a CIO round table with the West Coast this morning. And there were a couple of interesting comments that really stuck out to me from some of the people there. One was commenting of just reaffirming, what Doc said, how much people are working from home now. They said, traditionally they'd had traditional offices and they've just recently hired in this company about 250 people. He said, all of them are going to be remote workers and their normal from here on out, for the next 150 they're looking to hire is just that business as usual will be remote work. And one of the other CIOs chimed in with a quote that really stuck out to me. He said, "Remote work requires always on infrastructure in this day and age." And it's just a whole new way of having to make sure that businesses are operational and their workers can do what they're supposed to do. >> Well, so let's stay on that. I mean, ransomware's on everybody's mind. I mean, all you have to do is look at the stock market, you see, what's happened with Zoom, it's exploded. All the end point securities, identity access management security companies are going crazy, because (chuckles) people are now so vulnerable. So, they're more exposed to ransomware, Ken, what do we really need to know about ransomware? First, the smart company, smart organization is the one that is prepared and assumes the worst. Which means don't think it can't happen to you, especially when you look at a couple of the more public examples in the last couple of years in particular. So, it means you must take steps to protect yourself, particularly for the sake of your company, your business, your employees, your shareholders, your customers, everyone else. And that means deploying technology that assumes that if the worst case scenario could happen to you, how do you make sure that you have taken the steps that you can avoid the worst possible scenarios that could happen? >> Well, you know, Doc, lot of times when you have this discussion on ransomware, people say, well, should I pay the ransom? And sometimes people say, well, yeah, maybe it should go. You hope you never get there, right? (chuckles) >> Right, you absolutely hope you never get there. There is such horrible examples of paying ransom that just don't work. Just look at the Somalia pirates as an example, right? It doesn't stop them at all, but, take a look at what the potential impact is, not the potential impact to your business and your employees, but the potential impact to society. A couple of years ago with Sony, was very notorious case. More recently, a couple of months ago, Garmin. As you mentioned, I'm a pilot, but I was very worried as what reservoir, a lot of people in the aircraft and in aviation industry. What's going to happen not only with our private information, the account information, but what's going to happen with avionics updates? If Garmin didn't have a fallback plan, a way to recover, then what was going to happen? And I'm sure they were going through the process and the thoughts of, should we pay this year? How else do we get out of this? But, fortunately they had a very good plan in place and it only took them a couple of days to restore back to normal operations. Arguably as far as avionics goes, they were lucky in the sense that this happened to them right in the middle of an update cycle, which is 28 day cycle. But the fact that it only took them a couple of days, congratulations to them. I'm sure that with even better plans and a little bit of extra effort, it could have been a matter of hours instead of days. >> Well, let's come back to business continuity. Ken, do you feel as though businesses are not prepared based on the conversation we were having earlier? >> Some are, some aren't. It will be getting into that, I think in a little bit more detail as well, but historically, organizations I think have focused far too much just on traditional disaster recovery, usually with things like some of the technologies that have been around a long while like backup, and onto often having focused towards the technologies that really do keep the business running without human intervention if something were to ever go wrong. >> So, Doc, anything you'd add to that? I mean, what's the state of business continuity from your perspective? Are people having to really starting to accelerate a journey because of this COVID? >> I absolutely think they're accelerating a journey. They're also looking now at, this concept of multiple active sites. The concept of active sites is not something new, it's something that dates back a couple of decades and a lot of the financial industry. When they were struck, they were looking at some very significant changes in their operational paradigm because they realized that the system is going down and is only a small percentage of the problem that people impact is far worse. The operational procedures, the human intervention. So, what they would do is typically build out multiple sites and rotate the applications between them. What they really haven't done yet, at least not on a broad scale and certainly not in the U.S and some cases in Europe, they started this journey, having applications running simultaneously in multiple sites accessing the same data sets. It's not a brand new concept, but it's something that has improved significantly. The technologies have improved significantly over the course of the past decade. And with the introduction of our active backend solution, a couple of years ago, even brought it to an entirely new level. >> The people aspect that Doc mentioned is so critical. And that's certainly been one of the key lessons learned when real disasters have occurred is that the systems have to be, if you really want to keep your business operating making an assumption that people are going to have depending upon the nature of the disaster. Very different priorities and one of them is not, Gee, do I keep these ITs systems running or not? They're going to be worried about their co-workers, their families, other things, et cetera. So, the ultimate has to be systems that are capable of continuing the operation of the business in the face of a site failure, a metropolitan area failure or whatever it takes without the requirement necessarily for human intervention. >> So, I want to get into active-active. But before we do, I wonder if we could do a little sort of data protection one on one, a back up, a replication, you got snapshots, Doc, what do we need to know about each in the context of this discussion? >> I think the important thing to look at when you think about the different types of technologies and say you apply the solutions is that some of them apply to specific equipment failures, and some of them apply to data failure. And I separate equipment from data in the sense that data can be corrupted in some shape or form. It can be through malicious attack, like ransomware as an example, only one example, other types of malware can play a factor as well, or it can be incidental. Somebody pressing the wrong button, it can be an operational procedure, perhaps another system failure that causes a change in the data or corruption in the data that makes it essentially unusable. So, whenever we're looking at this, we have to start with what is the recovery point objective. The RPO that's where most people start with. And in the RPO, in essence, if you think of time zero, right now, it's where the failure occurs. Walk backwards. How far back can I go and still sustain my business? Now, there may be other procedural things you can do to catch up as close to that RPO and zero as you can, but each of these technologies that we're talking about give you a different RPOs, like rewinding a tape back to a point in time. So, that's the first place to start. >> Okay. So, let's bring up that slide actually. I actually liked this as the fireball slide I call it, but this is how people measure sort of the business impact, if you will, RPO and RTO. And what I like about this is in this digital world, it's kind of a cliche, but everything's getting more intense. People want, they don't want to lose data when you ask a customer, how much data are you willing to lose? They say none. >> None. >> And you say, well, how much are you willing to pay? So, Ken, I wonder if you could sort of describe that tension and that dynamic that's really underscored in this slide. >> Yeah. Oh, yeah, you hit it on the head David. It's the traditional trade off between RPO, RTO and cost. As Doc described with RPO, the objective would be to get as close to zero data loss as you could possibly get, with RTO which measures the time associated with how long will it take you to get back to your acceptable level of RPO. That is a time factor where for every minute or second, that goes by that you're not in business, that's the extension of the RTO. And historically, the closer you get as you approach zero RPO and zero RTO, usually the greater the cost goes up. And it's always been the eternal trade off, is a great analogy. It's sort of like if you want to buy a car. RPO equates for the quality of the solution, RTO is time or speed and cost is cost. If you buy a car, if it's good and it's fast, it won't be cheap. If it's good, and it's cheap, it won't be fast. And if it's fast, and it's cheap, it won't be good. So, usually that's the kind of tradeoff we will have to deal with there. And, the factors that will impact that, as Doc alluded to can be many. There's many aspects that you have to consider in terms of what is the service level that the business requires, and do we have solutions in place that can actually give us what is the real service level of the business requires if something were to go back? >> Because, customers have gone through, unnatural acts, and Doc before you were kind of describing what some people would refer to as, as a three site, data centers and all kinds of things that people will do, but that brings us to active-active, Doc, what is active-active? >> Yeah, let me interject a point there, and then I'll get to your question about active-active. First is the question I can raise about service level, that's absolutely critical. And business may have different service levels for different applications. >> Dave: Right. >> And you never really know what that is. For example, I was working with a university a few years back, you normally think, well, universities is where they worried about, they're worried about their grading systems. Everybody's always worried about their financial systems. This particular university was worried about their golf course reservations system. (laughs) And their number one mission critical application, and I'm sure there was a little chunk tongue and cheek there as well, was the golf course reservation system because that directly impacted, there were alumni and had a direct correlation to the incoming donations for the following year. So, you never know what's going to be mission critical. Closer to home working very recently, there's a great case study from Aultman Hospital on a website. One of the things that they did, which I thought was absolutely astounding, was they took advantage of our offer to loan them free storage for a while, leveraging some of the COD that they're passing on demand that they weren't using. One of the reasons that they wanted this extra capacity was so that they can make telepresence available to their patients to visit with their families. At a time when families can't go into the hospital visit, when people are ill, what a great comfort to their family. So, this is a great way to look at it. When you think about these different service levels now, and you think about the different types of replication technologies that are available. Look at the multisite, what is multisite really doing for you? Multisite is giving you some level of synchronous replication so that you have an RPO of zero recovery point objective. It still may not be an RTO or zero, but it will be darn close to it. But more importantly, it's giving you an additional site to really maintain that RPO of zero in case the disaster radius, the blast area, the impact zone is even further away. Now, this isn't going to prevent any type of malicious intent, it's not going to prevent the ransomware case, and things like that, but it'll certainly prevent the catastrophic failure of the data center. What does active-active do? Well, active-active now, gives you the read write capability. And now our multisite implementation by the way, leverages our active-active. So, gives you the ability now to have the simultaneously running instance of an application in multiple data centers, reading and writing from the same dataset. And what that gives you, is not only an RPO of zero, but an RTO of zero, because now you can have an application in another data center stand in and take over for it. Naturally, the application needs to be able to do that. There are a lot of applications that are capable of it. The Oracle parallel server or rack technology, gives you that capability. There are other types of clustering technologies that will fail almost instantaneously, that will give you that capability. So, that's where really active-active comes into play. >> Yeah, makes sense for me. When I started the industry, the VAX clusters were sort of the now thing, right? >> Yup. >> (indistinct) (Dave chuckles) >> All right. So, what are you seeing in the marketplace? Are you seeing... What's the adoption look like? Are there any differences that you see by region? What can you tell us there? >> Yeah, it's interesting. Some of the first organizations that obviously jumped on to active-active type solutions, were those where there were in particularly, in things like financial services, some compliance requirements or financial incentives or motivation to make sure that the business was always operational. And it's interesting because there was a study that was done all the way back in 2003, by Roper, that asked business executives and IT executives the same questions relative to their perceptions of their companies or organizations ability to meet RPO or RTO service level agreements. >> Right. And we have some data on this that I want to bring up. So, this is the RPO data but please carry on. >> Ken: Exactly, and so they asked questions that really were about RPO or RTO. Hey, if a disaster hit, would you lose data and how much? And what the data showed was that the business executives and IT executives in Europe, were actually pretty much on the same page. They both said, yeah, we probably would lose some data or a reasonable amounts associated with it. But what was a little frightening, was there appeared to be a chasm of disconnect between the business executives, from the IT executives in the U.S. And what it showed was that the IT executives were on the same page as the European IT executives and the business executives from Europe, saying that, yeah, we'd probably lose some data. But it showed that very few of the business executives thought that they would. And then similarly, when they were asked the question about RTO, how long would it take? In terms of days, hours, et cetera, for your full operation to be back in operational and granted they were talking in 2003 terms back then, which was a little longer than where the technology can now address it now. There was, again, this consistency between the IT executives in both continents and countries, as well as the European business executives, but again, a disconnect where the business executives in the U.S thought, oh, no, we'll be fine. We'll have everything back in a couple of days or less than, it won't be an issue. In my opinion, in looking at that data, when it first came out, my impression was, well, now I understand why a lot of business continuity projects don't get approved because the IT people know that they need it, but the business executives have, if I could be so bold and unrealistically optimistic view of their ability to achieve RPO and RTO, I'll give you a great example. There was a major high tech company around that timeframe that actually had a major outage in their email system. And email was not perceived to be at the time, ultra mission critical application for them. I know it seems strange in this day and age, but back then it was considered sort of an afterthought and they had a four hour SLA in case something went down where, hey, if we're down for four hours, we get it back and four hours, we're fine. And so, IT thought, they were doing a great job, 'cause they got it back in less than four. It was about three point something. And it turned out that the real impact of the business was so overwhelming, they had to completely overhaul the IT infrastructure that they've put in place to deliver that. So, it's an interesting issue, and it's the kind of thing where, as a result, I believe that as we sit here today in 2020, the disconnect in the U.S still exists. If you look across Europe, you tend to find a lot of deployments of active-active. The first country that probably did a ton of it was Germany, and then, lot of the other European countries did as well. For a multitude of reasons, you tend to see a lot of active-active deployments in Europe, but you don't see anywhere near as many as if I could be so bold, we probably should be seeing in the U.S, and I believe a major contributing factor to that is that there is still this disconnect, between business executives having a false sense of security that is unfounded by the infrastructures that they have in place. And if they were to ask their IT people, and maybe that's a good idea for them to talk more, they'd probably find that they're more exposed than they ever realized. >> Right. And of course in Europe, you've got, much tighter proximity, and you're up against borders of a 200 mile or a 200 kilometer roll, governments have tried to impose here, really can't be imposed in a lot of cases. Okay. Let's get into what you guys are doing here in the space. So, Doc, how do you approach ensuring access to mission critical data? What's INFINIDAT's angle? >> Yeah, I think it's several different layers that need to be applied here. The first INFINIDAT angle starts with the fact that our storage is a hundred percent data availability guarantee. It's simple enough. It's triple redundant architecture, seven nines reliability design, which equates to 3.16 seconds per year of downtime, which is less than a scuzzy time (laughs) I bet you know. Let's start with just, right, forget the nonsense, the system's are a hundred percent available guaranteed. We put some teeth behind that, and that's a great way to start. It's not necessarily going to fundamentally protect your data from site outages and network outages and server outages and things like that, so, let's be fed up and can go to in active-active infrastructure. And now you can take the system and put it either elsewhere behind a firewall on the same data center floor, or in a metropolitan area. Wherever you need it to be, separate power zones, separate networks zones, make it even more available. And then if you really want to go that next level of protection because you're worried about regional outages and things of that nature, multisite replication. But now it's up the ante even further. Let's look at the malicious intent, let's look at the data corruption. Let's look at all of the other possibilities of things that can happen to your data. So, implement snapshotting technology, in this snapshot technology, and InfiniBox is essentially free. There's no cost for the software, there is no performance impact because it's part of metadata updates that are happening all the time anyway. So, there's zero additional overhead of that. There's no additional, there's no copying of data going on with a snapshot, so there's no additional cost penalty associated with it. And you can snapshot this frequently for a Snapshot any of your data frequently to protect against data corruption. And if you're worried about some sort of malicious aspect, that's going to engage and perhaps gain access to the snapshots, we have immutable technology, and that is also free. It's there, it doesn't cost you anything other than the time it takes for the administrator to determine what the policy is. And now that can not be modified. It can't be deleted, it can't be modified, it can't be updated, can't be written to your inside whatever the polyp the defined policy is. So, now you're protected, you're a hundred percent availability, increase data hundred percent availability with active-active, and then increase your RPO capability with dissonance and protect yourself against data corruption with immutable snapshots. Or some combination of standard snapshots and immutable snapshots. >> Yeah, so, I was going to ask Ken, if this is a cost effective approach, but, I mean, it's free, it comes in the stuff. >> That is the key word, and you both just said it. Standard and included functionality all based on that great snapshot technology, which was the foundation for it that Doc described. Active-active, standard and included, the ability to go to a third site for disaster recovery at the industry's lowest asynchronous RPO with a remote site. Standard and included, immutable snaps, standard and included. So, compared to traditional views of what most people had back to our illustrious triangle earlier of RPO versus RTO versus cost, you're still going to have the additional cost of media and remote site for protecting your data, obviously, but in terms of software license costs, we're making it simpler, we're making it easier, we're making it standard and included, and we're just making it so much more readily available for organizations to be able to achieve superior RTO and RPO at a cost point that maybe certainly is a little bit higher than just having that single system that Doc alluded to, it's still a hundred percent available, but it's way below what the expectations of this industry have been over the last 20 years. >> Yeah, which is double, triple, I mean easily. Well, can I understand you for a second. You've worked for a lot of different storage companies, Doc you as well, but how different is this? How unique is this? >> There are surprisingly few vendors that can offer true zero RPO at two zero RTO. There's really only a handful. We're one of them. And by handful, I mean about three in the industry, including ourselves, and where I think we differentiate is fundamentally to a lot of those points we just mentioned. The software standard and included so we're not going to charge you extra for it. It's going to be relatively simple to deploy and integrate a stock alluded to earlier with server cluster software and the key components that people would use there in terms of databases and in terms of operating systems. And it's fundamentally going to be able to offer not just that zero RPO, zero RTO active-active environment, but if you do, and when you do need to go to a third site at distance for the true disaster recovery, if you ever lost a metropolitan area, we're going to be able to do it at an RPO that is lower than anything else on the market. >> Doc, are there complexities associated with doing this at petabyte scale? I mean, you guys make a big deal out of that, and you're clearly excited about it, but, is it extra hard to do at that kind of volume at scale? >> I'm going to give you two answers, and say, yes, it's incredibly difficult to do, but then I'm going to say it's incredibly easy for the customer to do because we've made it easy. There a lot of ramifications to doing things at petabyte scale. There's the size of the caching cables that you don't have to worry about. There's the numbers of things that need to be checked, and counter checked and constantly crosscheck for validity. There's also the scale of things that happen like silent data corruption that need to be factored in. All of those things are being done by InfiniBox, on a constant basis with no impact to the customer, no impact to the administrator, no impact to the running application. And I think that's a frankly, another differentiator as well. Ken and I have some common history as well. (chuckles) Used to constantly talk about internally, what happens as things get larger, systems slow down. That simply doesn't happen with InfiniBox. And that's why service providers use us as well. Cloud service providers managed service providers are some of our biggest customers. Because they know they can have these large scale systems running with all these different workloads, all these different functions, be they snapshots, clones, whatever they are, with no impact and very easy and rapid to deploy. >> Yeah, I set up top, you got to be storage hardos to make this stuff work. (laughs) It's very complicated and we've seen it for years and years. Last question. Again, huge changes in the last 150 days where people are just really tuned in to things like digital transformation, I talked about security, business resiliency, business continuity. Where... I'll start with you Ken, how should users be thinking about this? What steps should they be taking like now? >> What a great question. And back to sort of where we started, because of the nature of how things have changed, more applications are mission critical than they've ever been before. And providing, and always on infrastructure to make sure that you can give your users and your customers and your business, the opportunity to stay alive in the face of just about anything that could happen has never been more important in the history of this industry. >> Doc, I'll give you the final word, you can pile on that. >> I think Ken summed it up really well, but I'm going to take a different twist on it. It's all about de-risking, and a lot of the CIOs and CTOs of companies that I've been talking to over the course of the past couple of months, have basically said, hey, my digital transformation initiatives are on hold right now because I've got to keep the lights on, I've got to keep my business running. In some cases, maybe I've had to sadly pare down my staff, but I've got, remote workers have got to worry about. So, find a partner that's going to de-risk your infrastructure for you. Take a look at some of the things that we've announced in the past few months as well. We'll take a lot of that risk way, not only from the availability perspective, but we're going to take the risk away from a cost perspective. If you want to talk about INFINIDAT, don't worry about things like, how am I going to migrate over to it? We're going to do that for you. We're going to work with you, we're going to come up with a plan, we're going to make as much of it non-disruptive as we can, and we're going to assume the cost of doing it. We're going to take away all the risk of availability. We just talked about all of that. We're going to give you guarantees, that are a hundred percent availability. We'll help you architect the right solution for you and we'll protect you moving forward. You might need some flex area of capacity as you work through some of these new applications and new initiatives, so, you've got to be willing to take the risk away with our elastic pricing models. Use the storage when you need it, return it when you don't, and you don't have to pay for it anymore. We'll make it that simple for you. We'll give you that cloud operating paradigm on premises, and by the way, no egress costs. (Dave laughs) >> Well, this is a hard problem for people because they've had to do the work from home pivot, IT people, specifically, I mean, they've had to spend to shore up that infrastructure and of course, organizations just saying, well, we're going to pull from other places, but, look, if you're not digital today, you're not being able to transact business. And so, you can't relax your business continuity plans, in fact, you have to evolve them. Guys, thanks very much for sharing your perspectives and insights on this whole notion of de-risking infrastructure with business continuity. Thanks for coming on. >> Thank you, Dave. >> Dave, is always a pleasure. Thank you. >> Cheers, and thank you everybody for watching, this is Dave Vallante for theCube, and we'll see you next time. (upbeat music)
SUMMARY :
leaders all around the world. of the CTO at INFINIDAT Doc. of the Mass Motorcycles Association. Glad to be here. in the history of the storage industry. that people need access to and one of the CIO said, for the next 150 they're looking to hire at a couple of the more public examples lot of times when you have not the potential impact to your business based on the conversation that really do keep the business running and a lot of the financial industry. is that the systems have to be, in the context of this discussion? So, that's the first place to start. sort of the business impact, and that dynamic that's really And historically, the closer you get and then I'll get to your One of the reasons that they of the now thing, right? that you see by region? that the business was always operational. And we have some data and it's the kind of are doing here in the space. that can happen to your data. it comes in the stuff. the ability to go to a third Well, can I understand you for a second. and the key components for the customer to do Again, huge changes in the last 150 days the opportunity to stay alive Doc, I'll give you the final word, and a lot of the CIOs And so, you can't relax your Dave, is always a pleasure. and we'll see you next time.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Ken Steinhardt | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
Garmin | ORGANIZATION | 0.99+ |
Ken | PERSON | 0.99+ |
Europe | LOCATION | 0.99+ |
Mass Motorcycles Association | ORGANIZATION | 0.99+ |
September, 2020 | DATE | 0.99+ |
David | PERSON | 0.99+ |
Palo Alto | LOCATION | 0.99+ |
four hours | QUANTITY | 0.99+ |
2003 | DATE | 0.99+ |
Doc | PERSON | 0.99+ |
Doc D'Errico | PERSON | 0.99+ |
U.S | LOCATION | 0.99+ |
Rico | PERSON | 0.99+ |
hundred percent | QUANTITY | 0.99+ |
28 day | QUANTITY | 0.99+ |
Oracle | ORGANIZATION | 0.99+ |
First | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
Sony | ORGANIZATION | 0.99+ |
INFINIDAT | ORGANIZATION | 0.99+ |
Aultman Hospital | ORGANIZATION | 0.99+ |
2020 | DATE | 0.99+ |
less than four | QUANTITY | 0.99+ |
two answers | QUANTITY | 0.99+ |
both | QUANTITY | 0.99+ |
four hour | QUANTITY | 0.99+ |
200 kilometer | QUANTITY | 0.99+ |
first | QUANTITY | 0.99+ |
200 mile | QUANTITY | 0.98+ |
Boston | LOCATION | 0.98+ |
U.S. | LOCATION | 0.98+ |
each | QUANTITY | 0.98+ |
InfiniBox | ORGANIZATION | 0.97+ |
single system | QUANTITY | 0.97+ |
zero | QUANTITY | 0.97+ |
Somalia | LOCATION | 0.97+ |
Zoom | ORGANIZATION | 0.97+ |
about 250 people | QUANTITY | 0.96+ |
One | QUANTITY | 0.96+ |
ETR | ORGANIZATION | 0.96+ |
this year | DATE | 0.96+ |
third site | QUANTITY | 0.95+ |
today | DATE | 0.95+ |
triple | QUANTITY | 0.95+ |
Moshay | PERSON | 0.95+ |
Harshul Asnani, Tech Mahindra | HPE Discover 2020
>> Narrator: From around the globe, it's theCUBE covering HPE Discover Virtual Experience, brought to you by HPE. >> Welcome to theCUBE's coverage of HPE's Discover 2020, the Virtual Experience. I'm Lisa Martin and I'm pleased to be joined by Harshul Asnani, the Global Head of the Technology Business at HPE partner, Tech Mahindra. Harshul, great to have you on the program. >> Glad to be here. Thanks for having me. >> So, tell me about Tech Mahindra. I see on the website abbreviated as Tech M, give our audience an overview of Tech Mahindra, what you guys do. >> Sure. So Tech Mahindra is digital transformation consulting and technology services company operating at the intersection of IT engineering networks and BPO services. We have about 125,000 people operating in our 90 countries with about 5.2 billion in revenue, and have about 1,000 customers across key strategic verticles our largest being communications, media, and entertainment. And then we have other strong word because like technology, manufacturing, HLS, BFSI, the retail, and energy, and utilities. So that's broadly what we do, being in existence for well over 30 years now. >> And tell me about your role as the Head of the Global Technology Business. What have you seen transpire and evolve over the last few years, and especially the last three months with COVID? >> Sure. No, absolutely. I think, you see, we have organized a company around six strategic business units. They are these customer facing business units and I lead the one that focuses on technology and the high tech industry, if you will. I'm based in the Bay Area. And in this business unit, a large part of our business is, in some sense, 360 degree relationship with our customers, where not only do we sell into our customers, we also sell with and sell through our customers and also buy from them. So in that sense, it's a little different model in which we operate as compared to, say, other verticals that we have like manufacturing or BFSI or healthcare, but the relationship is largely customer and a supplier relationship. We have a full blown 360 degree relationship. It's very unique from that standpoint. And things have, you know, in some sense, dramatically shifted in the last three years, rather three months where we are seeing that, you know, amount of digital transformation, which was to happen over the next two years, has kind of happened in the last two months. So this is kind of pivoting a lot of enterprises, and including the tech sector, into an era where we are saying, how do we reposition ourselves to bring in more COVID-related solutions, both from a commercial standpoint, as well as a humanitarian standpoint, to deal with this crisis. So that it does in terms of changes that are happening out there in the industry, as well as in Tech Mahindra, as we can't forget ready fore-global and post -lobal. >> If you look at some of the specific trends that you're seeing during the COVID crisis, in the high tech segment, what are they? >> So, a couple of things have, we've looked at very differently. Supply chain for example, which is very crucial to high tech, is undergoing, in some sense, a metamorphoses shift. It's undergoing a seismic shift in the way supply chains are kind of reconfiguring themselves. You're also seeing customer experience kind of dramatically changing. Another thing that is coming in very, very strongly from a change perspective, it's kind of a storm that is brewing out there is, is how do we enable people to work remotely? We at Tech Mahindra, ourselves, had to enable 80,000 people in India who work remotely in a matter of weeks. And it's by no means an easy task to do which in a country where working from home is not really a culture. And also where we work, out of secure customer premises, even in India, our secure offshore locations in India, and all those people have now moved to their homes, and work out with their living rooms and bedrooms. And that was a sizable shift in the way we had to deal with our engagements, and with our customers. And so far so good, knock on wood, We have not had any issues. >> So Harshul, pivoting so quickly, as Tech M did to get your 80,000 employees in India to be able to work from home connectivity, all the challenges associated with that, goes hand in hand with your business, being able to deliver an exceptional customer experience, customer experience being an issue that you say is a rising trend amongst your customers. Customer experience and work from home these days go hand in hand, right? >> Absolutely. No, I think we also surprised ourselves with the pace at which we could move these 80,000 people to work from home in a matter of days, as I was saying, and as without missing customers. Our task was unimaginable in the pre-COVID era. And we will also surprised ourselves at the pace at which we could turn around COVID-related solutions so quickly with the help of partners like HPE that are today helping us pivot ourselves from one kind of old age solutions to the new age solutions, to the new normal today. And yeah, of course, and at the same time, we are to ensure that we enable the customer experience, and doing this on that while we repurpose our people to work from home. It was a challenge, and frankly, we surprised ourselves the way we did. >> So Harshul, talk to me about what, in these COVID crisis times, HPE and Tech Mahindra are doing together to help your customers accelerate, maybe adoption of new technologies that they need to for their businesses to thrive. >> Yeah, sure. No, that's a great question, Lisa. Let me start by saying that HPE is a very strategic partnership for us, and we see it as a coming together of two market leaders to deliver a very differentiated playbook of solutions for our customers. There is a robust set of products and solutions and edge offerings, edge gateways, converged edge systems, and clear analytics, combined with HPE's great GreenLake offers, which is around flexible consumption-based services, which helps align our customers' IT spend to deliver pretty much everything as a service. We kind of have already robust partner in HPE. And when you combine this with a Tech Mahindra's industry domain and technology depth, and the systems integration wherewithal that we bring in, it makes form, I believe, a very potent combination to drive, serious value to our customers, right? And given the COVID situation, we have kind of defined our relationship along three broad vectors based on the mutual synergies and where we believe we can quickly drive value. Firstly, what the solution white spaces that we want to address together? Secondly, what are the geographies that you want to operate in and third is, what are the industry verticals that we believe we can quickly focus on? So from a solutioning standpoint, there are four broad trust areas that we want to sharply focus on. Firstly IoT. It's been a strong partnership with HP with IoT. And we would like to continue that followed. With HBE's edge offerings, and converged edge systems, we have kind of demonstrated the possibilities of IoT solutions across smart cities, factories of the future, of energy and utilities and of Costa Rico. And we have some good success stories we already have with HPE that would like to build on, we have won some for significant smart city projects in India, in four different cities of India. And we also, by the way, won the Systems Integrator Award for Edge and IoT from HPE last year, and also the SI Partner of the Year for HPE last year. So we would like to continue to build on that. We all see already have a COE on IoT set up in Bangalore. It's a very unique COE that we're built up where we have showcasing solutions around a smart city or IoT, and also brought in Aruba gear as well, but solutions that are smart campuses, so on and so forth. So, that's number one. Number two is data center transformation. As hybrid cloud kind of takes root through our customers are now looking at transforming their data centers as well. And particularly with HPE's GreenLake, it becomes a very strategic commercial tool for us to bring on demand paper, use models, elasticity, kind of the, as I was talking about, the flexible consumption services model, which is so unique today, as we help customers reduce their capex and get them to pay by the drink, if you will. Now that becomes very, very relevant in the COVID times. And last but not the least, our focus is also on network of the future. When I say that our partnership with HPE is really pivoted around 5G, as DNFE and private LTE solutions. For example, you know, HPE's private LTE network, which is essentially powered by HPE's EL300 and EL4000 converged edge systems. It's kind augmented by our industrial IoT expertise. And it includes a reintegrated, off the shelf, industrial IoT application from Tech Manhira. It's a kind of an end to end solution that uses the breakthrough innovation such as small sales EPC, and smart multi-access edge compute. So, we are staying sharply focused on these areas. And we started seeing the results, and given the goals in this scenario, we have evolved a bunch of use cases very quickly in multiple industry areas. And bought from a commercial library standpoint, and also importantly, on a humanitarian level, what we can do together. For example, in Italy, as the pandemic was raging. As many of you will know, a ship force can order into a hospital, probably 1,000 bed hospital, and HPE stepped in, and they brought in the Aruba gear to put up network together, the infrastructure and the connectivity to bring together, and take Manhira, which has a rapid response healthcare solution who help with remote patient diagnostics and monitoring. Kind of brought in that solution along with HPE, to bear in Italy as the pandemic was raging. So that's just an example of how we are partnering at multiple levels. You know, created a solution around workspace as a service, as an remote working becomes a new normal. >> Right. >> With HPE on that. So a bunch of other solutions as well, Lisa. >> Sounds like you guys have done a great job of, as you mentioned in the beginning of our time here, rapidly pivoting within Tech Mahindra, as you said, it actually kind of surprised ourselves to what you were doing with HPE to deploy rapidly in Italy, to I can only imagine helping customers accelerate projects like smart cities and smart factories where suddenly we need sensors on more things. Harshul, I thank you so much for spending time with us on theCUBE today. Exciting topics. We can't wait to see where this goes. >> Well, thank you so much, Lisa, for your time. It was great talking to you. >> Excellent. My pleasure. For Harshul, I'm Lisa Martin, and you're watching theCUBE's coverage of HPE Discover 2020. Thanks for watching. (gentle music)
SUMMARY :
brought to you by HPE. Harshul, great to have you on the program. Glad to be here. of Tech Mahindra, what you guys do. And then we have other strong word and evolve over the last and the high tech industry, if you will. shift in the way we had all the challenges associated with that, from home in a matter of of new technologies that they need and the connectivity to So a bunch of other to what you were doing with HPE to deploy Well, thank you so Martin, and you're watching
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Lisa Martin | PERSON | 0.99+ |
India | LOCATION | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
HPE | ORGANIZATION | 0.99+ |
Lisa | PERSON | 0.99+ |
Italy | LOCATION | 0.99+ |
Bangalore | LOCATION | 0.99+ |
HP | ORGANIZATION | 0.99+ |
Tech Mahindra | ORGANIZATION | 0.99+ |
80,000 people | QUANTITY | 0.99+ |
Bay Area | LOCATION | 0.99+ |
Harshul Asnani | PERSON | 0.99+ |
last year | DATE | 0.99+ |
third | QUANTITY | 0.99+ |
Tech Manhira | ORGANIZATION | 0.99+ |
Aruba | LOCATION | 0.99+ |
80,000 employees | QUANTITY | 0.99+ |
Harshul | PERSON | 0.99+ |
about 1,000 customers | QUANTITY | 0.98+ |
HBE | ORGANIZATION | 0.98+ |
Tech M | ORGANIZATION | 0.98+ |
Costa Rico | LOCATION | 0.98+ |
360 degree | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
Firstly | QUANTITY | 0.98+ |
90 countries | QUANTITY | 0.98+ |
about 5.2 billion | QUANTITY | 0.98+ |
about 125,000 people | QUANTITY | 0.98+ |
two market leaders | QUANTITY | 0.97+ |
three months | QUANTITY | 0.97+ |
both | QUANTITY | 0.97+ |
EL300 | COMMERCIAL_ITEM | 0.97+ |
EL4000 | COMMERCIAL_ITEM | 0.95+ |
BFSI | ORGANIZATION | 0.95+ |
Systems Integrator Award | TITLE | 0.94+ |
Manhira | ORGANIZATION | 0.93+ |
Secondly | QUANTITY | 0.93+ |
HLS | ORGANIZATION | 0.92+ |
theCUBE | ORGANIZATION | 0.91+ |
pandemic | EVENT | 0.91+ |
last two months | DATE | 0.9+ |
Number two | QUANTITY | 0.9+ |
last three months | DATE | 0.88+ |
over 30 years | QUANTITY | 0.88+ |
COVID | OTHER | 0.87+ |
around six strategic business units | QUANTITY | 0.85+ |
1,000 bed hospital | QUANTITY | 0.85+ |
2020 | TITLE | 0.83+ |
last three years | DATE | 0.81+ |
COVID | ORGANIZATION | 0.79+ |
Michael Jordan & Matt Whitbourne, IBM | IBM Think 2020
>>Yeah. >>From the Cube Studios in Palo Alto and Boston. It's the Cube covering IBM. Think brought to you by IBM. >>Welcome back to IBM. Think Digital 2020. This is the Cube, and we're really excited to have two great guests on Michael Jordan is the distinguished engineer with IBM Z Security. Michael, good to see you again. Welcome back. >>Thank you. It's good to be back. >>And, Matt, what Born is the program director and offering lead for Z 15. Good to see that. >>Thank you for having me, >>guys. Easy. Easy is a good place to be. Great corner, 61% growth. You got to love it. Regulations. It'll be feeling pretty good. I mean, other than what we're going through. But from a business standpoint, Z powered through, didn't it? >>It did. I mean, we're really pleased with the contribution that Z continues to make for our clients. Especially right now, given everything that's going on, business continuity, scale, resilient security. They're just so important for our clients in the platform. >>Yes. So we're gonna We're gonna talk a lot about this. Maybe Matt could start with you just in terms of, you know, you talk about. Ah, cyber resiliency. Hear that a lot? Um, e I think it may be. Means a lot of different things to a lot of different people. What does it mean? Busy? >>Yeah, for us. I mean, you know, we kind of start in many ways with, like that, this definition on that which talks about the ability to anticipate, withstand, recover, adapt all of these adverse conditions, might face or stresses compromises in attacks in your systems and your just cyber results. It's so it's a really important top of mind talking point from other clients who are thinking about this both from, I guess, the resilience when it comes to the systems and also the data as well. From our standpoint, you know, Z has been at the forefront of resilience for many, many generations. Now, whether that's the scale that systems we're able to provide, the ability to tap into more capacity is needed, whether on a temporary or permanent basis, cause you never know when a when a spike might be occurring on day, especially with clients going through digital transformation as well. The fact that we can talk about solutions being designed for seven nines of availability on. But the reason why clients like Tesco or alliances for their resilient banking platform or Department of Treasury in Puerto Rico depend on us or for a highly available solution. So it's never been more important for by us. >>So, Michael, from a technical standpoint, um, I mean, I go back to the rack f days and and I I used to ask, why is it that, you know, the mainframe had, you know, such good security, and it was explained to me years ago? Well, cause you knew everything that went on who touched what? You know, there was a clear understanding of that clear visibility of that. Um, but maybe you could explain just for laypeople from just from a technical standpoint. Why is it that Z has such strong cyber resiliency? >>Sure. So So some of it, I think, is there's 22 aspects that I want to mention first is, you know, culture, right? You know, the IBM Z, you know, development team and broader, you know, design team. We have in our culture to build systems that are secure and robust, that that's kind of part of our DNA. And so it's that mindset when you look at, you know, technologies like parallel system, flex and geographic geographically dispersed, parallel, parallel suspects, GPS. You know, those are ingrained in those technologies, but the other capability that we have or I should say, um, you know, benefit that we we have is we own the whole stack, right? We own, you know, the hardware we own the firmware, um, and we own the software that sits on top of there in the middle, where and so whether it's resiliency or whether it's security when we want to design and build solutions, you know, to make optimal solutions, you know any of those spaces we can actually design and architect the solutions, you know, both at the right point in the stack and across the stack as needed to really deliver on these capabilities. >>So, Matt, one of our partners, ET are holds these CEO roundtables, and one of the CEO said we really weren't ready from a resiliency standpoint. We're too focused on on er and kind of missed the boat on business continuity to narrow focus. I presume you're hearing a lot of that these days. I wonder if you could just tell us about some of the things that you're seeing with clients, Maybe the conversations you're having and how you're helping Sort of broaden that capability. >>Yeah, sure. I mean, to your point. I mean, nobody really could have quite predicted. You know what we're dealing with right now, but, you know, we have had over many generations of the Z platform, you know, clients deeply partnered with us to try and make sure they have a a highly available environment for business continuity. And, you know, just thinking about things from a Dell perspective. You know what they can do to fortify and make their solution sort of more resilient on the day by day basis. I mean, one of the things you might be talking about, some of the inherent capabilities we have a hassle. The fact that we build, you know, our systems with the additional capacity kind of baked in. Which means that for so many of our clients, you know, in the first in the first quarter, where they were seeing the huge amounts of peak workload kind of coming in, that they needed to be able to deal with the fact that we design our systems to be able to just kind of gobble up that work. With that we call dark capacity to be turned on at the drop of a hat. It's tremendously important because not only need to be offsite, just resilient in terms of the applications, but you need to get a deal with growth. You're going through that. The other aspect, which is a new capability with the 15 that kind of builds on what we could do with that dark past thing is this concept of instant recovery. But what we're actually helping clients do there in terms of fortifying and making their environment more resilient, is letting them attack into that dark capacity when they're going through restart activities of partitions, not just thinking about unplanned scenarios, but actually planned out just as well. So what that really helps with is because you always have to do planned maintenance. You know, when your systems, you know when you're partitions your your system because the environment. So what we're doing is saying when you're going through that restart sort of process, whether it's the shutdown, whether it's to bring up of the partition or the middleware or even in fact, actually helping you catch up. Kind of for what? You what you lost one weren't sort of processing workflow. We turn on that extra capacity in the system automatically for this boost window that were that we're helping our clients with. Not only we do that. Mike's point about owning a stack means that we can deliver that in a way that there's no increase in IBM software cost a reliever. So we're always kind of looking about what we can do to kind of move the ball forward to make a client's environment even more resilient as well. >>I've always, I learned from my mainframe days many, many years ago. And what when a vendor comes in and shows a new product, they always ask you what happens when something goes wrong? It's all about recovery that's always been one of the main frame strength. Mike, I want to ask you about data protection. I mean, it's a topic that again means a lot of things to a lot of people you know doesn't mean backup. There's data privacy. There's data Providence. There's data sovereignty. We talk about data protection from a Z prism. >>Sure, so So our point of view on data protection is is we view it as a as a multi layered proposition. It's not. It's not just one thing. In effect, we viewed the lens of a broader, you know, layered cybersecurity strategy where you know, data protection. And, you know, in this case, you know, talking about encryption and being another encrypt data on a massive scale is the foundation for, you know, a layered cyber security strategy, um, and providing capabilities for appliance. Do you protect data at the disk level with the 15? We also introduced the ability of actually being able to protect the data as it flows through their storage area network through something we call fibre channel endpoint security and then layering on top of that, you know, host based encryption capabilities, you know, in the operating system, whether it's, you know, buy or or data set level encryption and you know, then on top of that, they can layer additional capabilities for things like multi factor authentication to protect your privileged identities from being compromised or being able to do damage to your system and then, you know, building and layering. On top of that things like security, intelligence and being able to monitor and understand You know what, what's happening across the system. >>So I was talking with Developer the other day in cloud app pretty, you know, non mission critical. But ask them to use encryption and he said, Yeah, we could, but we don't cause it slows us down a little bit. So I'm wondering how you deal with that trade off performance versus Protection Z. How does he deal with that? >>Sure, So that's that. That's a great That's a great question. And that actually goes back to you know what we did with with our Z 14 so that the generation before and I think we've we've improved that with with the 15 and then I'll get to that in a bit. But one of the barriers that we recognized is exactly what you said is the You know, the cost of doing encryption is prohibitive, Um, and what we did is we have, ah, a cryptographic accelerator that's integrated into our micro processor that's capable of encrypting so each or it's capable of encrypting up to 14 gigabytes of data per second. And if you multiply that by the number of cores that you have. You know, a fully configured you nosy 15 met. What does it have any cores? Do we have in that 100 >>90 with >>190 So So do the math right? 190 times, you know, 14 gigabytes per second. It's an encryption powerhouse, and that can all be done synchronously with extremely low latency. So we have the horsepower to do encryption on a very broad scale with very, very low overhead. And that's what our clients are leveraging and taking advantage of. And with the Zy 15. That being we announced it and made available last year. We actually have now compression that's built into the micro processor so you can actually compress the data, Um, first and then encrypted. And there's a twofold benefits that first is now. I have less data to encrypt, so I have lowered my encryption overhead, and at the same time I've managed to preserve my storage efficiency. So it's a It's a twofold benefit there, >>you know. People talk off about Z, they talk about it, it's open. It's kind of all started back when you guys brought in Lennox. And now, of course, it's It's much more than that. Um, but I'm wondering how open plays into this notion of cyber resiliency in some respects there. Counter poised. But But how do you sort of square that circle for me? >>Yeah, I mean, it's kind of look at it is when it comes to openness and digital transformation, it's kind of doing it without compromise on. That's kind of the way I look at the Z platform because you're right. I mean the fact that we have the likes of open shift support on the seat platform or you can use, you know, answerable for for doing automation. I mean, were always looking to try and make sure that we support from A from a management standpoint or development standpoint. We'll use whichever tool frameworks languages are appropriate on the platform and integrated to a hyper cloud wherever you want to go. That's why when we look at it from the perspective of what it really means to have mission critical applications and why, it's why that is the key point about banks. Insurance companies, etcetera continue to trust. Z is there is the home for their system of record because they want to get the benefits. You know, the best of both worlds. So they want to be able to have the security, the resilience and the scale of the platform. But the same time they want to have flexibility to be able to use cloud native technologies to be able to deploy them on our platform. And then this micro sort of talking about the exciting thing for us is even going one step further. That says, if you do want your data to move around your hybrid cloud for very good reasons for certain scenarios, being able to have that capability to protect the data, not just encrypted that manage the privacy over the data as it flows out and see to kind of take those characteristics into the hybrid cloud is something that a lot of that clients been really, really excited to take advantage of it. It's >>about this conference. You might get certain >>charting Matt into a security guide. You see that? >>Yeah, >>I think everybody's got to be a security person these days. I want to ask about zero trust. You know, that term is thrown around a lot of, uh, you know, you can get kind of buzz, wordy. You see, people always have substance. I want to ask you guys what zero trust means the Io. >>So So I think there's, you know, my view of zeros where we're at from an industry from from zero. Trust is is very similar to where we're at with cloud, you know, going back a handful of years where if you ask 10 different people what you know, cloud was you get 10 different answers. Um, and none of them were probably wrong. And so I think, you know, we're very similar state in terms of our understanding and, you know, market maturity around zero trust. But there's, you know, at its for, you know, the the the The idea is, you know, we've been focused on protecting, you know, our environments using a castle and moat of approach. Um, and, you know, you know, protecting the perimeter. Yeah, and then trusting everything inside of inside of that. You know that that mode, if you will, um and what the zero trust is a recognition that that's not sufficient. And, you know, and then if you look at that in the context of our evolving and changing in environment and moving to hybrid multi clouds where, um, the notion of a perimeter is gone. You know that that strategy and approach for protection, it doesn't hold up. And so we need to evolve that, um And we need to have, you know, you know, move from the notion of, um, operational trust to a notion of technical trust and building, you know, building more sophisticated mechanisms for doing authentication, understanding broader what's happening across the environment and feeding that into, you know, decisions that are made in terms of who gets to access. What data. So, >>yeah, good, Matt, bring us home overnight. You know, this pandemic has really heightened our awareness of cyber resiliency. Business continuity have changed our our mindset and definition of those two things. But give us your final thoughts on this top. >>I think it's probably just been into sharp focus, really what? It what it means to have mission critical applications that are right at the heart of your of your business. And, you know, you come to realize very quickly. But if those services are not available to your clients, I mean it can have such a long lasting implications So I think people embittering you know their strategy when it comes to, you know, millions off applications with infrastructure and all of that in the context of business continuity, I think people are gonna gonna have a much sharper focus in the future to really see, you know, what is what does it mean? And it's the lifeblood of their business is not able todo operate and serve their clients. And probably as well, more and more applications that maybe weren't considered mission critical in the past will be considered mission critical now because it's not just the back end services, but it's the way the community a reply. It's so a lot of that, I think, is going to play out the way that people think about their business continuity strategy in the future. >>Yeah, you're right. Video conferencing has become mission critical, isn't it? Guys, thanks so much for coming on the Cube again. You know, keep up the good work. Uh, I really appreciate your time and your insights. Always, always great talking, talking Z. So thanks again. >>Thank you. >>All right. Thank you for watching. Everybody. This is Dave Volante for the Cube. Our wall to wall coverage of the think 2020 digital event experience. Keep right there. Right back after this short break. >>Yeah, yeah, yeah.
SUMMARY :
Think brought to you by IBM. Michael, good to see you again. It's good to be back. Good to see that. You got to love it. I mean, we're really pleased with the contribution that Z continues of, you know, you talk about. I mean, you know, we kind of start in many ways with, like that, this definition on that which talks about the you know, the mainframe had, you know, such good security, and it was explained to me years ago? design and architect the solutions, you know, both at the right point in the stack and of missed the boat on business continuity to narrow focus. generations of the Z platform, you know, clients deeply partnered with us lot of people you know doesn't mean backup. of a broader, you know, layered cybersecurity strategy where you know, you know, non mission critical. that we recognized is exactly what you said is the You know, the cost of doing encryption 190 times, you know, It's kind of all started back when you guys brought in Lennox. are appropriate on the platform and integrated to a hyper cloud wherever you want to You might get certain You see that? You know, that term is thrown around a lot of, uh, you know, you can get kind of buzz, um And we need to have, you know, you know, move from the notion of, You know, have a much sharper focus in the future to really see, you know, what is what does it mean? thanks so much for coming on the Cube again. Thank you for watching.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Michael | PERSON | 0.99+ |
Michael Jordan | PERSON | 0.99+ |
Matt | PERSON | 0.99+ |
IBM | ORGANIZATION | 0.99+ |
Tesco | ORGANIZATION | 0.99+ |
Dave Volante | PERSON | 0.99+ |
Palo Alto | LOCATION | 0.99+ |
Mike | PERSON | 0.99+ |
Matt Whitbourne | PERSON | 0.99+ |
last year | DATE | 0.99+ |
22 aspects | QUANTITY | 0.99+ |
Boston | LOCATION | 0.99+ |
Z 14 | COMMERCIAL_ITEM | 0.99+ |
61% | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
first | QUANTITY | 0.99+ |
190 times | QUANTITY | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
15 | QUANTITY | 0.99+ |
Puerto Rico | LOCATION | 0.99+ |
100 | QUANTITY | 0.98+ |
both | QUANTITY | 0.98+ |
two things | QUANTITY | 0.98+ |
each | QUANTITY | 0.97+ |
seven nines | QUANTITY | 0.97+ |
millions | QUANTITY | 0.97+ |
Department of Treasury | ORGANIZATION | 0.97+ |
two great guests | QUANTITY | 0.95+ |
10 different people | QUANTITY | 0.94+ |
both worlds | QUANTITY | 0.94+ |
think 2020 | EVENT | 0.93+ |
Lennox | ORGANIZATION | 0.92+ |
15 | COMMERCIAL_ITEM | 0.92+ |
ET | ORGANIZATION | 0.92+ |
zero | QUANTITY | 0.92+ |
one thing | QUANTITY | 0.91+ |
years | DATE | 0.91+ |
zeros | QUANTITY | 0.9+ |
10 different answers | QUANTITY | 0.89+ |
Z | TITLE | 0.88+ |
14 gigabytes per second | QUANTITY | 0.88+ |
twofold | QUANTITY | 0.85+ |
one step | QUANTITY | 0.84+ |
190 | QUANTITY | 0.84+ |
Zy 15 | COMMERCIAL_ITEM | 0.84+ |
Z | PERSON | 0.82+ |
zero trust | QUANTITY | 0.81+ |
Cube Studios | ORGANIZATION | 0.79+ |
IBM Z | ORGANIZATION | 0.78+ |
Z 15 | TITLE | 0.78+ |
Security | ORGANIZATION | 0.74+ |
Cube | COMMERCIAL_ITEM | 0.72+ |
up to 14 gigabytes of data per second | QUANTITY | 0.72+ |
many years ago | DATE | 0.72+ |
pandemic | EVENT | 0.63+ |
first quarter | QUANTITY | 0.62+ |
twofold benefits | QUANTITY | 0.61+ |
Think 2020 | EVENT | 0.57+ |
around | QUANTITY | 0.53+ |
Think Digital 2020 | ORGANIZATION | 0.53+ |
Born | PERSON | 0.49+ |
>90 | QUANTITY | 0.49+ |
Cube | ORGANIZATION | 0.46+ |
Think | ORGANIZATION | 0.46+ |
Providence | ORGANIZATION | 0.45+ |
Z | COMMERCIAL_ITEM | 0.36+ |
Willie Tejada, IBM | IBM Think 2020
>> Announcer: From theCUBE Studios in Palo Alto and Boston, it's theCUBE, covering IBM Think, brought to you by IBM. >> Welcome back, I'm Stu Miniman and this is theCUBE's coverage of IBM Think 2020. It is the digital experience online so rather than all gathering together in San Francisco we're getting to talk to everybody where they are and we're happy to bring back one of our CUBE alums, it's actually been a little while since we've had them on the program. Willie Tejada, who is the general manager and Chief Developer Advocate with IBM. Willie, so great to see you, thanks for joining us. >> Hey Stu, thanks for having me, it's good to be back, it's been too long. >> So, first thing, obviously we're all together while we're apart, because of the global pandemic, developers, I've had so many interviews I've done over the years talking about dispersed development, around the clock development, I had a great interview with a head of remote work in the developer community at the beginning of the year before everything happened, so, how's the community doing overall and how are you seeing them react to what's happening? >> In the developer community, I think one of the interesting parts is one, developers feel oftentimes that they can actually make a difference. Two, their work oftentimes happens remotely. And so, one of the things that we've seen is a lot of the interaction that we have when we're doing our developer advocacy work has just converted to digital. And there's some interesting dynamics that come about, just even in that, where if you were doing something like a meetup in New York that was attracting something like 50 people, to maybe 100, maybe the venue was limiting the number of people that you would actually have there if you had a popular topic or speaker. We've had meetups basically be as large as 500 plus people when we went to digital. So definitely some different dynamics as we actually talk about this new normal that we're in, and everybody utilizing digital vehicles to reach the people that they want to talk to. >> All right. So I know last time we talked with you a big topic we talked about was Call for Code, and something that IBM has done different initiatives there, and you've got a very relevant one so bring our audience up to speed, this year's Call for Code, what that would involve. >> Yeah Stu, thanks very much. The Call for Code initiative inside of IBM is now in its third year. We did it in 2018, the concept was fairly simple, developers always love to solve problems and we said what if we challenge the 24 million developers to come and take a crack at society's most pressing issues? And in the first two years we focused on natural disasters, all you had to do was take a look at the coverage prior to the COVID-19 pandemic and you had wildfires in Australia and in Northern California where my home actually is based, and you had tsunamis and hurricanes and floodings. And so the ability for us to actually bring the developer community to bear on some of society's most pressing issues was really kind of the concept upfront, and IBM would help by bringing subject matter experts together, making available tools, because we're thinking let's solve the problem exactly how we solve it when we apply business. You get an expert on supply chain, you get a user of supply chain, you bring them together, developer builds these things. Well, not all the time can you get an expert in disaster, a first responder, so we actually created a lot of that fusion from there. Then, over the course of the first two years, we've had over 210,000 developers participate over across 168 nations with over 8,000 applications submitted. So, wildly successful. Now this year, Stu to your point, we had something that we could really bear down on very heavily. We announced that we were taking on climate change kind of laddering up natural disasters was let's look at the root, climate change, and then the COVID pandemic came about. We said let's tilt people towards that and it's been a tremendous outcoming for it. We've asked the developers to focus on three areas: crisis communications, you may have been one of those folks that's on a conference call or emails that haven't been responded to, on wait times forever, so those communications systems how do we fortify them get them to scale? The second area is remote learning, really look at where all the students are actually these days and what they're doing there, not just teaching but basically how do you give them entertainment, how do you actually provide them some level of social interaction. And the third area with the COVID focus is community collaboration. We really want to try to make sure people's spirits are up and that really does require everybody leaning in, and again you look at the news and tremendous examples of community collaboration and where technology can help scale or broaden that, that's really where Call for Code actually comes into play. >> Yeah, maybe it would be helpful, tell us a little bit about some of the previous winners, what have been some of the outcomes, more than just rallying the community, what resources is IBM putting into this? >> So one of the things that makes it different is rather than it just being a regular hack, this is really a processing side of IBM that we've developed over the course of this last three years. Where the challenge is one piece, the Call for Code challenge, we also developed and rolled out and committed another 25 million, with Call for Code we committed 30 million over that five years and in the following year we recognized the need to see the solutions actually get deployed. And so we committed another $25 million for the fortification, testing, scaling and deployment. So when you win a Call for Code Global Challenge, you also get IBM's support around deployment, fortification, some counseling and relation basically from development, to architecture, to even the business side of it. In our first year, we had a team called Project Owl actually come out and win, and one of the first things that happens especially in hurricanes or these natural disasters, communication grids go down. So they developed a solution that could quickly establish an ad hoc communication grid, and anybody that had a typical cell phone could connect up to that Wi-Fi grid or that grid very similar to the way they actually connect into a Starbucks Wi-Fi system. And it would allow both the first responders to understand where folks were at, and then establish communications. So that was in the first year. The second year was a team called Prometeo, and in October we selected them as the Global Challenge winner, and they were a solution that was built by a firefighter, a nurse and a developer with this concept roughly of how do they monitor essentially a firefighter's situation when they're actually in the heat of battle to best allocate the resources to the people who need them most. Understanding a little bit about their environment, understanding a little bit about the health that's actually happening with the firefighter, and again it's one of those scenarios where you couldn't just build it from the firefighter's side, you couldn't just build it from the nurse's side, and a developer would have a difficult time building it just by themselves. So bringing those people together, a nurse, a firefighter and a developer, and creating a system like this is really really what we're aspiring to do. Now, they won in October, and in February, they're in a field deployment actually doing real testing in the field in some of the fields at Catalonia, Spain. So, we've seen it first-hand exactly what happens when they win, the Project Owl team actually did some hurricane deployment testing in Puerto Rico, that of course IBM helped fortify and build connections between the Puerto Rico government so that we're really seeing essentially the challenge winner see this type of deployment. >> Willie, I love it, it's even better than a punch line I could do, what do you get when you combine a firefighter, a nurse and a developer? The answer is you can positively impact the world so phenomenal there. >> Absolutely. >> I'm curious, where does open source play into this activity? We were just covering Red Hat Summit last week, of course, lots of open source, lots of community engagement in hearing how they are helping communities engage and of course open source has been a big rallying point, everything from 3D printing to other projects in the community. So where does open source fit into this initiative? >> 100%. The amazing part about activating developers these days is just the broad availability of the technologies. And it's certainly stimulated by the community aspect of open source, this idea that they democratize access to technology, and it's really community-centric, and folks can start building very quickly on open source technologies that are material. So number one, all the things that is part of Call for Code and what we actually deployed are based on open source technologies. Now, again one of the differences is how do we actually make those winners and those technology sets become real? And becoming real requires this idea of how do you actually build durable sustainable solutions. So each five of the winners every year have the opportunity essentially to go through the Linux Foundation and have their solutions established as a project with the idea of roughly that people can download it and fork it, people can actually fortify it, but it's available to the whole globe, everybody in the world, to help build upon and fortify and continue to innovate on. So open source is right at the root of it, not just from the technology side, but from the ecosystem and community side that open source was for. And so we've seen as an example the formal establishment of Project Owl's software being open sourced by the Linux Foundation. And it's been fantastic to see both the participation actually there and see how people are basically deriving it and using it exactly what we intended to see in the vision of Call for Code, and Code and Response. >> Well, that's phenomenal. We're huge fans of the community activity, of course open source is a great driver of everything you were talking about. So I'm curious, one of the things we're all looking at is where people are spending their time, how this global pandemic is impacting what people are doing. There's plenty of memes out there on social media, it doesn't mean that you all of a sudden are going to learn a new language, or learn to play an instrument because you have lots of time at home, but I'm curious from what you've seen so far, compared to previous years, how's the engagement? What's the numbers? What can you share? Is there a significant difference or change from previous years? >> Yeah, there's so much good will, I would say, that's been brought about around the world in what we're seeing around the COVID-19 pandemic. That the way I would describe it is the rate of submissions and interest that we've seen is 3x above what we've seen in the prior years. Now keep in mind, we're not even actually at the area where we see the most. So keep in mind, right now we tried to accelerate the time to highlight some of these solutions. So April 27th will be the first deadline for COVID-19 challenge, and we'll highlight some of the solutions on May 5th. Now, when we think about it basically from that standpoint we typically actually see people waiting until that submission timeframe. And so when you think of it from that standpoint you really oftentimes see this acceleration, right? At that submission deadline. But we're already seeing 3x what we've seen in the past in terms of participation just because of the amount of good will that's actually out there, and what people are trying to do in solving these problems. And developers, they're problem solvers overall, and putting out those three areas, community crisis communications, remote learning, and community collaboration, they'll see examples of what they see on the news and think they can actually do something better, and then express that in software. >> That's excellent. So, Willie, one of the things, we've been talking to leaders across the industry and one of things we don't know is how much of what we are going through is temporary, and how much will actually be long term. I'm curious if there's any patterns you're seeing out there, discussions you're having with developers, you talk about remote work, you talk about communication. Are there anything that you've seen so far that you think that this will fundamentally just alter the way things might've been in the past going forward? >> Developers are always actually looking for this idea of how they actually sharpen their skills, their craft, new languages that they actually know, new platforms, whatever it actually might be. And I think in the past there was probably, even from our perspective, this balance of face-to-face versus digital, and a mix of both, but I think what we'll find going forward is a more robust mix of that. Because you can't deny the power of reach that actually happens when you actually move something digital. And then I would say that think about how you at theCUBE have refined your studios in dealing with an interview like mine, it gets better and better, you refine it. How you do an online workshop and how you do a workshop on a steel service mesh, you get better and better about how you engage from real time, hands-on keyboard experience in what information, what chat, what community pieces do you put on the screen to stimulate these pieces, I think in general the industry and our company and our teams have gotten better even in this short amount of time. I think those things will be long-lasting. I think we're all humans, so I think they still want the physical face-to-face and community interaction and camaraderie that comes from being in that physical energy, but I do think it'll be complemented by the things that we refined through the digital delivery that's been refined during this situation. >> All right, so Willie, final thing of course, this week, the winners are all being announced, how about people that are watching this and say this sounds phenomenal, how do I learn more, if I didn't get to participate in some of the initial pieces what should I be looking for? And how can I contribute and participate even after Think? >> Well, number one keep in mind that the challenge for the year will still actually go all the way to October, and submissions for that whole Challenger Watch will go to February first. So that's number one. But number two, going to developer.ibm.com/callforcode you'll find all the resources, we have these things called starter kits that help developers actually get up and going very quickly, finding out more information about both the competition structure, and really how you become part of the movement, go there basically and answer the call. >> Awesome. Love it, Willie, thanks so much, pleasure to catch up with you and definitely looking forward to seeing all the outcome that the community is putting forth to focus on this really important challenge. >> Hey Stu, thanks for having me, I really appreciate it. >> All right, be sure to check out thecube.net for all the coverage from IBM Think, all the backlog we had to see Willie a couple years ago when he was on the program, and check out where we will be later in the year. I'm Stu Miniman, and as always, thanks for watching. (gentle music)
SUMMARY :
IBM Think, brought to you by IBM. It is the digital experience me, it's good to be back, of the interaction that talked with you a big topic at the coverage prior to the and one of the first things positively impact the world and of course open source has So each five of the We're huge fans of the community just because of the amount of good will So, Willie, one of the things, complemented by the things in mind that the challenge outcome that the community is Hey Stu, thanks for having from IBM Think, all the
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
2018 | DATE | 0.99+ |
February | DATE | 0.99+ |
May 5th | DATE | 0.99+ |
IBM | ORGANIZATION | 0.99+ |
October | DATE | 0.99+ |
Willie | PERSON | 0.99+ |
Willie Tejada | PERSON | 0.99+ |
Puerto Rico | LOCATION | 0.99+ |
San Francisco | LOCATION | 0.99+ |
Palo Alto | LOCATION | 0.99+ |
Stu | PERSON | 0.99+ |
Stu Miniman | PERSON | 0.99+ |
Australia | LOCATION | 0.99+ |
April 27th | DATE | 0.99+ |
New York | LOCATION | 0.99+ |
3x | QUANTITY | 0.99+ |
Linux Foundation | ORGANIZATION | 0.99+ |
Northern California | LOCATION | 0.99+ |
Boston | LOCATION | 0.99+ |
30 million | QUANTITY | 0.99+ |
50 people | QUANTITY | 0.99+ |
100 | QUANTITY | 0.99+ |
500 plus people | QUANTITY | 0.99+ |
$25 million | QUANTITY | 0.99+ |
developer.ibm.com/callforcode | OTHER | 0.99+ |
25 million | QUANTITY | 0.99+ |
Two | QUANTITY | 0.99+ |
Starbucks | ORGANIZATION | 0.99+ |
this year | DATE | 0.99+ |
first two years | QUANTITY | 0.99+ |
Red Hat Summit | EVENT | 0.99+ |
over 8,000 applications | QUANTITY | 0.98+ |
over 210,000 developers | QUANTITY | 0.98+ |
both | QUANTITY | 0.98+ |
this week | DATE | 0.98+ |
Project Owl | ORGANIZATION | 0.98+ |
thecube.net | OTHER | 0.98+ |
one | QUANTITY | 0.98+ |
second area | QUANTITY | 0.98+ |
COVID-19 pandemic | EVENT | 0.98+ |
COVID-19 | OTHER | 0.98+ |
one piece | QUANTITY | 0.97+ |
24 million developers | QUANTITY | 0.97+ |
second year | QUANTITY | 0.97+ |
Catalonia, Spain | LOCATION | 0.97+ |
Prometeo | ORGANIZATION | 0.97+ |
third year | QUANTITY | 0.96+ |
five years | QUANTITY | 0.96+ |
third area | QUANTITY | 0.96+ |
first responders | QUANTITY | 0.96+ |
first thing | QUANTITY | 0.96+ |
last week | DATE | 0.95+ |
theCUBE | ORGANIZATION | 0.93+ |
COVID pandemic | EVENT | 0.92+ |
first year | QUANTITY | 0.91+ |
100% | QUANTITY | 0.91+ |
couple years ago | DATE | 0.91+ |
first things | QUANTITY | 0.9+ |
168 nations | QUANTITY | 0.9+ |
CUBE | ORGANIZATION | 0.9+ |
first responder | QUANTITY | 0.88+ |