John Apostolopoulos Anand Oswal & Anand Oswal, Cisco | Cisco Live US 2019
>> Live from San Diego, California It's the queue covering Sisqo live US 2019 Tio by Cisco and its ecosystem. Barker's >> Welcome back to San Diego. Everybody watching the Cube, the leader and live check coverage. My name is David Locke. I'm here with my co host student in recovering Day to hear Sisqo live. 2019 on. On On. On on. Oswald is here. Excuse me. Sees the senior vice president of enterprise networking Engineering at Cisco. And John A postal, a polis. Italians in the Greeks. We have a lot in common. He is the VP and CTO of Enterprise Network. And get Sisko. Gentlemen, welcome to the Cube. How'd I do? Do you know it? Also, that you're bad, right? Thank you. All right, Good. Deal it out. Let's start with you. You guys have had a bunch of news lately. Uh, you're really kind of rethinking access to the network. Can you explain what's behind that to our audience? >> Yeah, even think about it. The network is getting has running more and more critical. Infrastructure at the same time is increasing. Bottom scale and complexity. What? We expected that you'll only be obvious. Violence on workspace is on the move. Are you? You're working here in your office, in the cafe, The sock off everywhere you want. An uninterrupted unplugged experience for that is violence. First, it's cloud driven and is dead optimist. So we had to rethink our way to access. It's not just about your laptops and your fool on the wireless network. In the end of the digital management systems, Coyote devices, everything is going to provide us with means reaching the access on that. But >> so, John, this obviously ties into, you know, you hear all the buzz about five g and WiFi. Six. Can you explain the connection? And you know what? We need to know about that. >> Okay, it's so fine. Five. Jean WiFi 62 new wireless technologies coming about now, and they're really awesome. So y fi six is the new version. WiFi. It's available today, and it's going to be available for down predominately indoors as wi WiFi indoors and high density environments where you need a large number. Large data bait for square meter una WiFi. Once again, the new WiFi six fight in the coverage indoors uh, five is going to be used predominately outdoors in the cellular frequency. Replacing conventional for Geo lt will provide you The broad coverage is your roam around outdoors. And what happens, though, is we need both. You need great coverage indoors, which wife Isis can provide, and you need great coverage outdoors. Which five year cried >> for G explosion kind of coincided with mobile yet obviously, and that caused a huge social change. And, of course, social media took off. What should we expect with five G? Is it? You know, I know adoption is gonna take a while. I'll talk about that, but it feels like it's more sort of be to be driven, but but maybe not. Can you >> see why 5 65 gr actually billions Some similar fundamental technology building blocks? You know you will be in the ball game for the Warriors game like a few weeks ago when they were winning on DH. After a bit of time to send that message. Video your kid something on the WiFi slow laden Z with WiFi, 61 have a problem. The WiFi six has four times the late in C 14. The throughput and capacity has existing y find Lowell Agency and also the battery life. You know, people say that that is the most important thing today. Like in the mass Maharaj three times the battery life for WiFi, 16 points. So you're gonna see a lot of use cases where you have inter walking within 556 and five g WiFi six foot indoors and find you for outdoor and some small overlap. But the whole idea is how do you ensure that these two disparate access networks are talking to each other explaining security policy and it is invisibility. >> Okay, so first what? Your warriors fan, right? Yeah. Awesome way. Want to see the Siri's keep going, baby? That was really exciting. Because I'm a Bruins fan, sir, on the plane the other night and in the JetBlue TV. Shut down, you know, So I immediately went to the mobile, But it was terrible experience, and I was going crazy checks in my friends. What's happening? You say that won't happen? Yeah, with five Julia and WiFi sexy. Exactly. Awesome. >> So, John, help connect for us. Enterprise. Not working. We've been talking about the new re architectures. You know, there's a c I there now intent based networking. How does this play into the five G and WiFi six discussion that we're having today? >> So one of the things that really matters to our customers and for everybody, basically, they want these sort of entering capability. They had some device is they want to talk to applications. They want access to data. We want to talk with other people or try ot things. So you need this sort of end twin capability wherever the ends are. So one of the things I've been working on a number of years now it's first all intent Basin that working, which we announced two and 1/2 years ago. And then multi domain, we try to connect across the different domains. Okay, well across campus and when, and data center all the way to the cloud and across the Service Fighter network and trad security has foundational across all of these. This was something that David Buckler and Chuck Robbins talked about at their keynote yesterday, and this is a huge area for us because we're going to make this single orchestrated capability crop customers to connect and to and no matter where the end of ices are >> alright so sewn on I have to believe that it's not the port, you know, administrator saying, Oh my God, I have all these signs of them. Is this where machine learning in A I come in to help me with all these disparate system absolutely are going very simple. Any user on any device had access to any application. Sitting in a data center in a cloud of multiple clouds over any network, you want that securely and seamlessly. You also wanna have nature. Its whole network is orchestrator automated, and you're the right visibility's recipes for idea on with the business insights on the eye. An ML. What's happening is there for the next book is going in complexity and skill. The number of alerts are growing up, so you are not able to figure it out. That's where the power of a I and machine learning comes. Think about it in the industry revolution, the Industrial Revolution made sure that you are. You don't have limitations or what humans can do right, like machines. And now we want to make sure businesses can benefit in the digital revolution, you know, in limited by what I can pass through all the logs and scrolls on ornament. Everything and that's the power of air and machine learning >> are there use cases where you would want some human augmentation. We don't necessarily want the machine taking over for you or Or Do you see this as a fully automated type of scenario? >> Yeah, so what happens is first ball visibility is really, really important. The operator of an effort wants the visibility and they want entwined across all these domains. So the first thing we do is we apply a lot of machine learning to get to take that immense amount of data is an unmentioned and to translate it into piece of information to insights into what's happening so that we could share to the user. And they can have visibility in terms of what's happened, how well it's happening. Are they anomalies? Are is this security threat so forth? And then we can find them additional feedback. Hate. This is anomaly. This could be a problem. This is the root cause of the problem, and we believe these are the solutions for what do you want to do? You wantto Do you want actuate one of these solutions and then they get to choose. >> And if you think of any other way, our goal is really take the bits and bytes of data on a network. Convert that data into information that information into insights that inside that lead to outcomes. Now you want. Also make sure that you can augment the power of a machine. Learning on those insights, you can build on exactly what's happening. For example, you want first baseline, your network, what's normal for your environment and when you have deviations and that anomalies. Then, you know, I don't know exactly what the problem is. Anyone automated the mediation of the problem. That's the power of A and women you >> When you guys as engineers, when you think about, you know, applying machine intelligence, there's a lot of, you know, innovation going on there. Do you home grow that? Do you open source it? Do you borrow? Explain the philosophy there in terms of it. From a development standpoint, >> development point of it is a combination of off all the aspects, like we will not green when they leave it all the exists. But it's always a lot of secrets are that you need to apply because everything flows through the network, right? If everything first netbooks, this quarter of information is not just a data link, their data source as well. So taking this district's also information. Normalizing it, harmonizing it, getting a pretty language. Applying the Alberta and machine learning, for example. We do that model, model learning and training in the clouds. Way to infants in the cloud, and you pushed the rules down. There's a combination, all of all, of that >> right, and you use whatever cloud tooling is available. But it sounds like it's really from an interest from a Cisco engineering standpoint. It's how you apply the machine intelligence for the benefit of your customers and those outcomes versus us. Thinking of Sisko is this new way I company right. That's not the ladder. It's the former. Is that >> fair? One of the things that's really important is that, as you know, Cisco has been making, uh, we've been designing a six for many years with really, really rich telemetry and, as you know, Data's key to doing good machine learning and stuff. So I've been designing the A six to do really time at wire speed telemetry and also to do various sorts of algorithmic work on the A six. Figure out. Hey, what is the real data you want to send up? And then we have optimized the OS Iowa sexy to be able to perform various algorithms there and also post containers where you could do more more machine learning at the switch at the router, even in the future, maybe at the A P and then with DNA Center way, have been able to gather all the data together in a single data life where we could form a machine learning on top. >> That's important, Point John mentioned, because you want Leo want layers and analytics. And that's why the cattle's 91 191 20 access point we launch has Cisco are basic that provides things like cleaning for spectrum were also the analytic from layer one level are literally a seven. I really like the line, actually from Chuck Robbins, yesterday said. The network sees everything, and Cisco wants to give you that visibility. Can you walk us through some of the new pieces? What, what what people, Either things that they might not have been aware of our new announcements this week as part of the Sisko, a network analytics, announced three things. First thing is automated based lining. What it really means. Is that what's normal for your environment, right? Because what's normal for your own environment may not be the same for my environment. Once I understand what that normal baseline is, then, as I have deviations I canto anomaly detection, I can call it an aggregate issues I can really bring down. Apply here and machine learning and narrow down the issues that are most critical for you to look at right now. Once and Aragon exact issue. I wanted the next thing, and that is what we call machine. Reasoning on machine reasoning is all about ordering the workflow off what you need to do to debug and fix the problem. You want the network to become smarter and smarter, the more you use it on. All of this is done through model learning and putting in the clouds infants in the cloud and pushing it down the rules as way have devices on line on time. So, >> do you see the day? If you think about the roadmap for for machine intelligence, do you see the day where the machine will actually do the remediation of that workflow. >> Absolutely. That's what we need to get you >> when you talk about the automated base lining is obviously a security, you know, use case there. Uh, maybe talk about that a little bit. And are there others? It really depends on your objective, right? If my objective is to drive more efficiency, lower costs, I presume. A baseline is where you start, right? So >> when I say baseline what I mean really, like, say, if I tell you that from this laptop to connect on a WiFi network, it took you three seconds and ask, Is that good or bad? You know, I don't know what the baseline for his environment. What's normal next time? If you take eight seconds on your baseline street, something is wrong. But what is wrong isn't a laptop issue isn't a version on the on your device is an application issue on network issue and our issue I don't know. That's why I'm machine learning will do exactly what the problem is. And then you use machine reasoning to fix a problem. >> Sorry. This is probably a stupid question, but how much data do you actually need. And how much time do you need to actually do a good job in that? That type of use case? >> What happens is you need the right data, Okay? And you're not sure where the right data is originally, which we do a lot of our expertise. It's this grass for 20 years is figuring out what the right data is and also with a lot of machine learning. We've done as well as a machine reason where we put together templates and so forth. We've basically gathered the right made for the right cause for the customer. And we refined that over time. So over time, like this venue here, the way this venue network, what it is, how it operates and so forth varies with time. We need to weigh need to refine that over time, keep it up to date and so forth. >> And when we talk about data, we're talking about tons of metadata here, right? I mean, do you see the day where there'll be more metadata than data? Yeah, it's a rhetorical question. All right, so So it's true you were hearing >> the definite zone. Lots of people learning about a building infrastructure is code. Tell us how the developer angle fits into what we've been discussing. >> Here we ask. So what happens is is part of intent based on African key parts of automation, right? And another key parts. The assurance. Well, it's what Devon it's trying to do right now by working with engineering with us and various partners are customers is putting together one of the key use cases that people have and what is code that can help them get that done. And what they're also doing is trying to the looking through the code. They're improving it, trying to instill best practice and stuff. So it's recently good po'd people can use and start building off. So we think this could be very valuable for our customers to help move into this more advanced automation and so forth. >> So architecture matters. We've touched upon it. But I want you to talk more about multi domain architectures wear Chuck Robbins. You know, talk about it. What is it? Why is it such a big deal on DH? How does it give Sisko competitive advantage? >> Think about it. I mean, my dad go being architectures. Nothing but all the components of a modern enterprise that look behind the scenes from giving access to a user or device to access for application and everything in between. Traditionally, each of these domains, like an access domain, the land domain can have 100 thousands off network know that device is. Each of these are configured General Manual to see a live my domain architectures almost teaching these various domains into one cohesive, data driven, automated programmable network. Your campus, your branch, your ran. But he doesn't and cloud with security as an integral part of it if it all. >> So it's really a customer view of an architecture isn't? Yeah, absolutely. Okay, that's good. I like that answer. I thought you're going to come out with a bunch of Cisco No mumbo jumbo in secret sauce. Now it really is you guys thinking about Okay, how would our customers need to architect there? >> But if you think about it, it's all about customer use case, for example, like we talked earlier today, we were walking everywhere on the bull's eye, in the cafe, in office and always on the goal. You're accessing your business school applications, whether it's webex salesforce dot com, 40 65. At the same time you're doing Facebook and what's happened. YouTube and other applications. Cisco has the van Domain will talk to Sisko. The domains action escalates and policies. So now you can cry tears the application that you want, which is business critical and fixing the night watchers but miss experience for you. But you want the best experience for that matter, where you are well >> on the security implications to I mean, you're basically busting down the security silos. Sort of the intent here, right? Right. Last thoughts on the show. San Diego last year. Orlando. We're in Barcelona earlier this year. >> I think it's been great so far. If you think about it in the last two years, we fill out the entire portfolio for the new access network when the cattle is 90. 100. Access points with WiFi six Switches Makes emission Campus core. Waterston, Controller Eyes for Unified Policy Data Center for Automation Analytics. Delia Spaces Business Insights Whole Access Network has been reinvented on It's a great time. >> Nice, strong summary, but John will give you the last word. >> What happens here is also everything about It says that we have 5,000 engineers have been doing this a couple years and we have a lot more in the pipe. So you're going to Seymour in six months from now Morn. Nine months and so forth. It's a very exciting time. >> Excellent. Guys. It is clear you like you say, completing the portfolio positioning for the next wave of of access. So congratulations on all the hard work I know a lot goes into it is Thank you very much for coming. All right, Keep it right there. David. Dante was stupid. And Lisa Martin is also in the house. We'll get back with the Cube. Sisqo live 2019 from San Diego.
SUMMARY :
Live from San Diego, California It's the queue covering Do you know it? in the cafe, The sock off everywhere you want. so, John, this obviously ties into, you know, you hear all the buzz about five g and WiFi. and high density environments where you need a large number. Can you But the whole idea is how do you ensure that these two disparate access networks Shut down, you know, So I immediately went to the mobile, We've been talking about the new re architectures. So one of the things that really matters to our customers and for everybody, basically, they want these sort of entering capability. alright so sewn on I have to believe that it's not the port, you know, are there use cases where you would want some human augmentation. and we believe these are the solutions for what do you want to do? That's the power of A and women you there's a lot of, you know, innovation going on there. But it's always a lot of secrets are that you need to apply because everything flows through the network, It's how you apply the machine intelligence for the benefit of your customers and those outcomes One of the things that's really important is that, as you know, Cisco has been making, the workflow off what you need to do to debug and fix the problem. do you see the day where the machine will actually do the remediation of that workflow. That's what we need to get you A baseline is where you start, right? And then you use machine reasoning to fix a problem. And how much time do you need to actually do a good job in that? What happens is you need the right data, Okay? All right, so So it's true you were the definite zone. So what happens is is part of intent based on African key parts of automation, But I want you to talk more about multi domain architectures wear the scenes from giving access to a user or device to access for application and Now it really is you guys thinking about Okay, how would our customers need to architect there? So now you can cry tears the application that you want, which is business critical and fixing the night on the security implications to I mean, you're basically busting down the security silos. If you think about it in the last two years, What happens here is also everything about It says that we have 5,000 engineers have been doing this a couple years and So congratulations on all the hard work I know a lot goes into it is Thank you very much
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Lisa Martin | PERSON | 0.99+ |
David Locke | PERSON | 0.99+ |
David | PERSON | 0.99+ |
Cisco | ORGANIZATION | 0.99+ |
Barcelona | LOCATION | 0.99+ |
Dante | PERSON | 0.99+ |
San Diego | LOCATION | 0.99+ |
16 points | QUANTITY | 0.99+ |
John | PERSON | 0.99+ |
John Apostolopoulos | PERSON | 0.99+ |
Sisko | PERSON | 0.99+ |
90. 100 | QUANTITY | 0.99+ |
Chuck Robbins | PERSON | 0.99+ |
three seconds | QUANTITY | 0.99+ |
Siri | TITLE | 0.99+ |
eight seconds | QUANTITY | 0.99+ |
each | QUANTITY | 0.99+ |
yesterday | DATE | 0.99+ |
Anand Oswal | PERSON | 0.99+ |
Orlando | LOCATION | 0.99+ |
San Diego, California | LOCATION | 0.99+ |
last year | DATE | 0.99+ |
100 thousands | QUANTITY | 0.99+ |
Isis | PERSON | 0.99+ |
40 65 | OTHER | 0.99+ |
Each | QUANTITY | 0.99+ |
Oswald | PERSON | 0.99+ |
5,000 engineers | QUANTITY | 0.99+ |
First | QUANTITY | 0.99+ |
David Buckler | PERSON | 0.99+ |
six | QUANTITY | 0.99+ |
Seymour | PERSON | 0.99+ |
six Switches | QUANTITY | 0.99+ |
Leo | PERSON | 0.99+ |
Lowell Agency | ORGANIZATION | 0.98+ |
this week | DATE | 0.98+ |
One | QUANTITY | 0.98+ |
Sisko | ORGANIZATION | 0.98+ |
four times | QUANTITY | 0.98+ |
one | QUANTITY | 0.98+ |
both | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
ORGANIZATION | 0.98+ | |
three times | QUANTITY | 0.98+ |
Coyote | ORGANIZATION | 0.98+ |
Nine months | QUANTITY | 0.97+ |
Enterprise Network | ORGANIZATION | 0.97+ |
YouTube | ORGANIZATION | 0.97+ |
earlier this year | DATE | 0.96+ |
billions | QUANTITY | 0.96+ |
A six | COMMERCIAL_ITEM | 0.96+ |
first ball | QUANTITY | 0.96+ |
five g | QUANTITY | 0.96+ |
five year | QUANTITY | 0.96+ |
three things | QUANTITY | 0.95+ |
US | LOCATION | 0.95+ |
20 years | QUANTITY | 0.95+ |
2019 | DATE | 0.94+ |
six months | QUANTITY | 0.94+ |
First thing | QUANTITY | 0.93+ |
91 191 20 | OTHER | 0.93+ |
five | QUANTITY | 0.93+ |
first | QUANTITY | 0.93+ |
seven | QUANTITY | 0.92+ |
single | QUANTITY | 0.92+ |
1/2 years ago | DATE | 0.91+ |
Sisqo | PERSON | 0.91+ |
Service Fighter | ORGANIZATION | 0.9+ |
few weeks ago | DATE | 0.89+ |
last two years | DATE | 0.87+ |
first netbooks | QUANTITY | 0.87+ |
556 | QUANTITY | 0.87+ |
two disparate access networks | QUANTITY | 0.86+ |