Image Title

Search Results for University of Colorado:

Paul Grist, AWS | AWS Public Sector Summit Online


 

(upbeat music) >> Narrator: From around the globe, it's theCUBE with digital coverage of AWS Public Sector Online brought to you by Amazon Web Services. >> Welcome back to theCUBE's coverage of AWS Public Sector Summit Online. I'm John Furrier, your host of theCUBE. I wish we could be there in person, but we're doing remote because of the COVID and the pandemic. We've got a great guest, Paul Grist. Worldwide Public Sector, Head of Education International for AWS. Paul, thank you for coming on remotely. >> Great to be here, John. >> There's a lot of disruption in the education space this year with universities and schools still uncertain about what the future will look like. What are some of the biggest trends you're seeing? >> John, what we've seen is the rapid adoption of technology and the growth of flexible online learning, learning that can take place anytime, anywhere. What we've seen is universities, national education systems, and schools rapidly migrating systems and content to the cloud, spinning up new applications. And we've seen companies that provide technology and content and platforms, the ed techs and publishers of the world, increasing their capacity, increasing their capability to deliver new applications to education. >> What is some of this research that you're finding out there? >> Yeah. You know, a time of much change and things happening very, very fast. We responded fast to the changes, John. Got a load of customer conversations together, looking at speeches by educationalists who were responding to the changes at some of the online events that spun up very quickly at places like the University of Buckingham, ASU, JSV, Inside Higher Education, places like Blackboard World. And really just talked to those leaders about their responses to the change, what kinds of things they were doing, and brought that together into the research. It's underpinned by some in-depth research and insights from education reports and articles too. >> Thanks Paul, really appreciate it. Having that research is critical. I know you guys do a lot of work on that. I know you got some news, take a quick plug for the new research that's coming out. You guys just put out today, just take a minute to quickly explain what it's about and how to find it. >> We're publishing today some new research that shows the seven key emerging trends in this new world of education. Check it out on the AWS website. Two key trends, flexible learning and the new world of employability. >> So you guys got a lot of data. It's great with Amazon, got a lot of customers. Good to see you guys getting that research. The question I have for you Paul is, what amount of the research shows really the COVID situation? Because there's before COVID, there's kind of during, and then there's going to be a post-COVID mode. Was that prior research in place with COVID or after COVID? Can you share kind of the update on the relevance of your research? >> Yeah, I think the sector has changed. The sector has gone through the fastest change it's ever gone through. And undoubtedly most of the issues, most of the challenges and opportunities in the sector, predate the pandemic. But what we've seen is COVID accelerate many of the challenges and the opportunities, but also bring new opportunities. >> Yeah, one of the things we've seen with education is the disruption, and the forcing function with COVID. There's a problem, we all know what it is. It's important, there's consequences for those. And you can quantify the disruption with real business value and certainly student impact. There's been downsides with remote education. More teacher-parent involvement and students having to deal with isolation, less social interaction. How do you guys see that? Or what is Amazon doing to solve these problems? Can you talk about that? >> Yeah. I think you know, education is very much a people business. And what we've been trying to do is partner with organizations to ensure that the people are kept at the center of the business. So working with organizations such as LS, sorry, Los Angeles United School District in the US to spin up a call center to allow students to contact their tutors. And parents to interact with tutors, to get questions answered. >> So one of the challenges these academic institutions are facing is speed, it's pace of change. What's going on with competition? How are they competing? How are universities and colleges staying relevant? Obviously there's a financial crisis involved. There's also the actual delivery aspect of it. More and more mergers. You're starting to see ecosystem changes. Can you talk about what's going on in the educational ecosystem? >> Yeah I mean, educational institutions are being forced to rethink their business models. It's an international marketplace in higher education. It's been a growing marketplace for many, many years. That suddenly stopped overnight, so every university has had to rethink about where their revenues are coming from, where the students are coming from. There's been some surprises too. I mean in the UK, actually international enrollments are up post-COVID because one of the strange side effects of COVID is without being able to travel, there's actually a cost saving for students. And so we've seen universities in the UK benefit from students who want to study, perhaps travel and the cost of study was too high previously. Now being able to study remotely. It's an unexpected and unintended consequence. But it kind of shows how there are opportunities for all organizations during this time. >> Many countries had to cancel exams altogether this year, which has been a big, huge problem. I mean people are outraged and people want to learn. It's been, you know, the silver lining in all this is that you have the internet (laughs). You have the cloud. I want to get your thoughts. How are universities and schools dealing with this challenge? Because you have a multi-sided marketplace. You've got the institutions, you've got the students, you got the educators, they all have to be successful. How are universities dealing with this challenge? >> Yeah I think, you know, teaching and learning has been online for 20, 30 years. And I think a lot of organizations have adopted online teaching and learning. But I think assessment is the one big area of education that remains to be made available at scale at low cost. So most assessment is still a pen-and-paper-based. There's big trust and identity issues. And what we're seeing through this COVID change is organizations really getting to grip with both of those issues. So, having the confidence to put assessment online, to make it available at scale, and then also having the confidence to tackle trust and identity questions. So who is taking the exam, where are they sitting? Can we be sure that it's actually that person taking that exam? So you know, the rise of things like proctoring technologies giving organizations the opportunity to assess remotely. >> How has this crisis affected research at academic institutions? Because certainly we know that if you need a lab or something, certainly we're seeing students need to be physically in person. But with remote and all those changes going on with the scale and the pace of change, how has research at academic institutions been impacted? >> Yeah I mean, research has always been a really collaborative activity, but we've seen that collaboration increase. It's had to increase. Researchers have had to go remote. Many of them work in labs. They haven't been able to do that. They've needed to spin up applications and new technologies in the cloud to continue working. But what we're seeing is governments taking an increased interest in the research being applicable, making sure that it leads to innovation which is meaningful. Getting much more involved and insisting that the research is made available now. And of course there's no place that that's clearer than in health research and trying to find a cure for COVID. And then secondly, we're seeing that research is becoming much more collaborative not just across institutions but also countries. So one of the great projects we're involved in at the moment is with the University of Adelaide who are collaborating with researchers from the Breeding and Acclimatization Institute in Poland on a project to study the increase in crop yield of wheat. >> One of the things that's coming out of this, whether it's research or students is open online courses, virtual capabilities. But a concept called stackable learning. Can you explain what that is? >> Yeah. We're in a global marketplace in education and there's increased competition between universities and education providers to make new types of certificates and online badges available. We know that employers are looking for ever more agile methods of scaling and upskilling. And stackable learning is a concept that's been around for a couple of decades now, where learning is broken down into smaller chunks, put together in a more personalized way from a number of different providers. Spun up very, very quickly to respond to need and then delivered to students. We're seeing some of the big providers like edX and Coursera who, again have been around for over a decade become really prominent in the provision of some of these stackable credentials. Their systems run on the cloud. They're easy to access, in many, many cases they're free. We're seeing an increasing number of employers and education institutions adopt and embed these types of delivery systems into their curriculum. >> Totally a fan of stackable learning, it's called the Lego model, whatever I call it. But also online brings the nonlinear progressions. The role of data is super important. So I'm very bullish on education being disrupted by cloud providers and new apps. So you know, I wanted to call that out because I think it's super important. Let me get to a really important piece that it has to be addressed, and I want to get your thoughts on. Cyber security. Okay, cyber attacks and privacy of students are two areas that are super important for institutions to address. What's your reaction to that? >> Yeah, I mean the use of more technology becomes, you know again, a target for cyber attack and unfortunately it's an increasing phenomenon. Simply put, every organization needs to put security first. Needs to operate as a security-first organization. They need to adopt technologies, people and processes that can protect their investments. And work with data management vendors, cloud vendors who've got the compliances and the common privacy and security frameworks such as GDPR in place to make sure that they provide secure services. AWS's security offerings include auditing, login and identity management, data encryption capabilities that offer more transparency and control, to allow institutions protect student data. >> Super important, thanks for sharing. Finally, what's the steps institutions can take to close the digital divide because now some people are taking gap years. Research is changing. People might not even have PCs or internet connections. There's still, this exposes the haves and have nots. What steps can institutions take to do their part? >> Yeah, digital learning is here to stay, John. We've learned that many learners do not have access to technology necessary for online learning. Whether those are devices or a reliable internet connection. But again, you know governments, states, educational authorities have all turned their attention to these issues over the last few months. And we're seeing organizations partner with technology providers that can provide internet connections. Partners in AWS, such as Kajeet who've installed hotspot devices on buses to deploy in areas with no connectivity. You know whether that's a place like Denver, Colorado or whether it's a place, you know, in Nigeria in Africa, remote connection remains a problem everywhere. And we're seeing everybody addressing that issue now. >> Paul, great to have you on theCUBE and sharing your insights on what's going on in international education. Final question for you. In your own words, why is this year at the AWS Public Sector Summit Online important? What's the most important story that people should walk away in this educational industry? >> The most important story, John, is it's a time of incredible change but also incredible opportunity. And we're seeing organizations who have wanted to change, who've wanted to deliver more to their students, who want to deliver a greater experience, who want to access more students and have much greater reach. Now with the appetite to do that. re:Invent is a great opportunity to work with AWS, to understand what's going on with our partners, with our customers. And look at some of the common solutions for the challenges that they're looking to solve. >> Paul Grist, thank you for coming on theCUBE. Really appreciate it. Worldwide Head of Education for International AWS. Thank you for sharing. >> Thanks John, great to be here. >> Okay, this is theCUBE's coverage of AWS Public Sector Online Summit. Remote, virtual, this is theCUBE virtual. I'm John Furrier, your host. Thanks for watching. (upbeat music)

Published Date : Oct 20 2020

SUMMARY :

brought to you by Amazon Web Services. of the COVID and the pandemic. What are some of the biggest and content to the cloud, of the online events and how to find it. and the new world of employability. Good to see you guys of the challenges and the opportunities, and the forcing function with COVID. And parents to interact with tutors, So one of the challenges of the strange side effects all have to be successful. the opportunity to assess remotely. to be physically in person. in the cloud to continue working. One of the things and education providers to make new types that it has to be addressed, and I want as GDPR in place to make sure take to do their part? to deploy in areas with no connectivity. Paul, great to have you on theCUBE And look at some of the common solutions Worldwide Head of Education of AWS Public Sector Online Summit.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
PaulPERSON

0.99+

Paul GristPERSON

0.99+

JohnPERSON

0.99+

John FurrierPERSON

0.99+

NigeriaLOCATION

0.99+

DenverLOCATION

0.99+

Amazon Web ServicesORGANIZATION

0.99+

AmazonORGANIZATION

0.99+

AWSORGANIZATION

0.99+

University of AdelaideORGANIZATION

0.99+

UKLOCATION

0.99+

PolandLOCATION

0.99+

20QUANTITY

0.99+

USLOCATION

0.99+

bothQUANTITY

0.99+

GDPRTITLE

0.99+

todayDATE

0.99+

LSORGANIZATION

0.99+

University of BuckinghamORGANIZATION

0.98+

oneQUANTITY

0.98+

ASUORGANIZATION

0.98+

COVIDEVENT

0.98+

ColoradoLOCATION

0.98+

this yearDATE

0.97+

COVIDOTHER

0.97+

30 yearsQUANTITY

0.97+

pandemicEVENT

0.96+

AfricaLOCATION

0.95+

OneQUANTITY

0.95+

two areasQUANTITY

0.94+

edXORGANIZATION

0.93+

KajeetPERSON

0.93+

CourseraORGANIZATION

0.93+

firstQUANTITY

0.93+

LegoORGANIZATION

0.92+

Breeding and Acclimatization InstituteORGANIZATION

0.92+

secondlyQUANTITY

0.9+

Public Sector SummitEVENT

0.88+

Public Sector Online SummitEVENT

0.88+

over a decadeQUANTITY

0.88+

JSVORGANIZATION

0.87+

seven key emerging trendsQUANTITY

0.85+

Two key trendsQUANTITY

0.83+

InternationalORGANIZATION

0.81+

Public Sector SummitEVENT

0.8+

Blackboard WorldLOCATION

0.8+

theCUBEORGANIZATION

0.79+

Angeles United School DistrictORGANIZATION

0.79+

theCUBETITLE

0.75+

AWSEVENT

0.73+

lastDATE

0.7+

Public Sector Summit OnlineEVENT

0.69+

OnlineTITLE

0.64+

AWS Public SectorORGANIZATION

0.63+

LosLOCATION

0.61+

Inside Higher EducationORGANIZATION

0.54+

Pham and Britton and Fleischer V1


 

>>covering the space and cybersecurity symposium 2020 hosted by Cal poly. Hold on. Welcome to this special presentation with Cal poly hosting the space and cybersecurity symposium, 2020 virtual, um, John for your host with the cube and Silicon angle here in our Palo Alto studios with our remote guests, we couldn't be there in person, but we're going to be here remotely. Got a great session and a panel for one hour topic preparing students for the jobs of today and tomorrow, but a great lineup. Bill Britain, Lieutenant Colonel from the us air force, retired vice president for information technology and CIO and the director of the California cyber security Institute for Cal poly bill. Thanks for joining us, dr. Amy Fisher, who's the Dean of the college of engineering at Cal poly and trunk fam professor and researcher at the U S air force Academy. Folks, thanks for joining me today. >>Our pleasure got a great, great panel. This is one of my favorite topics preparing students for the next generation, the jobs for today and tomorrow. We've got an hour. I'd love you guys to start with an opening statement, to kick things off a bill. We'll start with you. Well, I'm really pleased to be, to start on this. Um, as the director for the cybersecurity Institute and the CIO at Cal poly, it's really a fun, exciting job because as a Polytechnic technology, as such a forefront in what we're doing, and we've had a, a wonderful opportunity being 40 miles from Vandenberg air force base to really look at the nexus of space and cyber security. And if you add into that, uh, both commercial government and civil space and cybersecurity, this is an expanding wide open time for cyber and space. In that role that we have with the cyber security Institute, we partner with elements of the state and the university. >>And we try to really add value above our academic level, which is some of the highest in the nation and to really merge down and go a little lower and start younger. So we actually are running the week prior to this showing a cybersecurity competition for high schools or middle schools in the state of California, that competition this year is based on a scenario around hacking of a commercial satellite and the forensics of the payload that was hacked and the networks associated with it. This is going to be done using products like Wireshark autopsy and other tools that will give those high school students. What we hope is a huge desire to follow up and go into cyber and cyber space and space and follow that career path. And either come to Cal poly or some other institution that's going to let them really expand their horizons in cybersecurity and space for the future >>Of our nation. >>Bill, thanks for that intro, by the way, it's gonna give you props for an amazing team and job you guys are doing at Cal poly, that Dex hub and the efforts you guys are having with your challenge. Congratulations on that great work. Thank you >>Star team. It's absolutely amazing. You find that much talent in one location. And I think Amy is going to tell you she's got the same amount of talent in her staff. So it's, it's a great place to be. >>Amy flasher. You guys have a great organization down there, amazing curriculum, grazing people, great community, your opening statement. >>Hello everybody. It's really great to be a part of this panel on behalf of the Cal poly college of engineering here at Cal poly, we really take preparing students for the jobs of today and tomorrow completely seriously. And we claim that our students really graduate. So they're ready day one for their first real job, but that means that in getting them to that point, we have to help them get valuable and meaningful job experience before they graduate, but through our curriculum and through multiple internship or summer research opportunities. So we focus our curriculum on what we call a learn by doing philosophy. And this means that we have a combination of practical experience and learn by doing both in and out of the classroom. And we find that to be really critical for preparing students for the workforce here at Cal poly, we have more than 6,000 engineering students. >>We're one of the largest undergraduate engineering schools in the country. Um, and us news ranks us the eighth best undergraduate engineering program in the, in the country and the top ranked state school. We're really, really proud that we offer this impactful hands on engineering education that really exceeds that of virtually all private universities while reaching a wider audience of students. We offer 14 degree programs and really we're talking today about cyber and space. And I think most of those degree programs can really make an impact in the space and cybersecurity economy. And this includes not only things like Aero and cyber directly, but also electrical engineering, mechanical engineering, computer engineering, materials, engineering, even manufacturing, civil and biomedical engineering. As there's a lot of infrastructure needs that go into supporting launch capabilities. Our aerospace program graduates hundreds of aerospace engineers, and most of them are working right here in California. >>I'm with many of our corporate partners, including Northrop Grumman, Lockheed, Boeing, Raytheon space, X, Virgin, galactic JPL, and so many other places where we have Cal poly engineer's impacting the space economy. Our cybersecurity focus is found mainly in our computer science and software engineering programs. And it's really a rapidly growing interest among our students. Computer science is our most popular major and industry interest and partnerships are integrated into our curriculum. And we do that oftentimes through support from industry. So we have partnerships with Northrop Grumman for professorship and a cyber lab and from PG and E for critical infrastructure, cybersecurity lab, and professorship. And we think that industry partnerships like these are really critical to preparing students for the future as the field's evolving so quickly and making sure we adapt our facilities and our curriculum to stay in line with what we're seeing in industry is incredibly important. >>In our aerospace program, we have an educational partnership with the air force research labs. That's allowing us to install new high performance computing capabilities and a space environments lab. That's going to enhance our satellite design capabilities. And if we talk about satellite design, Cal poly is the founding home of the cube sat program, which pioneered small satellite capabilities. And we remain the worldwide leader in maintaining the cube set standard. And our student program has launched more cube sets than any other program. So here again, we have this learn by doing experience every year for dozens of aerospace, electrical, computer science, mechanical engineering students, and other student activities that we think are just as important include ethical hacking through our white hat club, Cal poly space systems, which does really, really big rocket launches and our support program for women in both of these fields like wish, which is women in software and hardware. >>Now, you know, really trying to bring in a wide variety of people into these fields is incredibly important and outreach and support to those demographics. Traditionally underrepresented in these fields is going to be really critical to future success. So by drawing on the lived experiences by people with different types of backgrounds, while we develop the type of culture and environment where all of us can get to the best solution. So in terms of bringing people into the field, we see that research shows, we need to reach kids when they're in late elementary and middle schools to really overcome that cultural bias that works against diversity in our fields. And you heard bill talking about the cyber cybersec, the California cybersecurity institutes a year late cyber challenge. There's a lot of other people who are working to bring in a wider variety of, uh, of people into the field, like girl Scouts, which has introduced dozens of new badges over the past few years, including a whole cybersecurity series of badges and a concert with Palo Alto networks. So we have our work cut out for us, but we know what we need to do. And if we're really committed to prep properly preparing the workforce for today and tomorrow, I think our future is going to be bright. I'm looking forward to our discussion today. >>Yeah, you got a flashy for great, great comment, opening statement and congratulations. You got the right formula down there, the right mindset, and you got a lot of talent and community as well. Thank thank you for that opening statement. Next step from Colorado Springs, trunk fam, who's a professor and researcher. The us air force Academy is doing a lot of research around the areas that are most important for the intersection of space and technology trunk. >>Good afternoon, first electric and Cal poli for the opportunity. And today I want to go briefly about cyber security in S application. Whenever we talk about cyber security, the impression is got yes, a new phew that is really highly complex involving a lot of technical area. But in reality, in my personal opinion, it is in be complex because involve many disciplines. The first thing we think about is computer engineering and computer networking, but it's also involving communication sociology, law practice. And this practice of cyber security goes in on the info computer expert, but it's also info everybody else who has a computing device that is connected to the internet. And this participation is obviously every body in today's environment. When we think about the internet, we know that is a good source of information, but come with the convenience of information that we can access. >>We are constantly faced in being from the internet. Some of them, we might be aware of some of them we might not be aware of. For example, when we search on the internet, a lot of time, our browser will be saved and gotten this site is not trusted. So we will be more careful. What about the sites that we trusted? We know getting those salad chicken sites, but they're not a hundred percent good at proof. What happened? It was all side, uh, attack by hacker. And then they will be a silent source that we might not be aware of. So in the reality, we need to be more practicing the, um, cyber security from our SIBO point of view and not from a technical point of view. When we talk about space application, we should know that all the hardware, a computer based tool by computer system and therefore the hardware and the software must go through some certification process so that they can be record that air with the flight. >>What the, when we know that in the certification process is focusing on the functionality of the hardware and software, but one aspect that is explicitly and implicitly required is the security of those components. And we know that those components have to be connected with the ground control station and be communication is through the air, through the layby or signal. So anybody who has access to those communication regular signal will be able to control the space system that we put up there. And we certainly do not want our system to be hijacked by a third party. >>I'm not going to aspect of cybersecurity is we try to design the space system in a very strong manner. So it's almost impossible to hack in, but what about some August week system that might be connected to so strong system? For example, the spare system will be connected to the ground control station and on the ground control station, we have the human controller in those people have cell phone. They are allowed to use cell phones for communication, but at the same time, they are connected to the internet, to the cell phone and their cell phone might be connected to the computer that control the flight software and hardware. So what I want to say is that we try to build strong system and we protected them, but there will be some weaker system that we could not intended, but exists to be connected to our strong system. And those are the points that hacker will be trying to attack. If we know how to control the access to those points, we will be having a much better system for the space system. And when we see the cybersecurity that is requiring the participation everywhere, it's important to Merck that there is a source of opportunity for students to engage the workforce. To concede the obviously student in engineering can focus their knowledge and expertise to provide technological solution, to protect the system that we view. But we also >>Have students in business who can focus to write a business plan to reach the market. We also have student in law who can focus policy governing the cyber security. And we also have student in education who can focus the expert. She should be saying how to teach cyber security practice and students can focus the effort to implement security measures and it implies job opportunity. >>Thank you trunk for those great comments, great technology opportunities, but interesting as well as the theme that we're seeing across the entire symposium and in the virtual hallways that we're hearing conversations and you pointed out some of them, dr. Fleischer did as well. And bill, you mentioned it. It's not one thing. It's not just technology, it's different skills. And, um, Amy, you mentioned that computer science is the hottest degree, but you have the hottest aerospace program in the world. I mean, so all of this is kind of balancing it's interdisciplinary. It's a structural change before we get into some of the, um, how they prepare the students. Can you guys talk about some of the structural changes that are modern now in preparing, um, in these opportunities because societal impact is a law potentially impact it's, it's how we educate there's no cross-discipline skillsets. It's not just get the degree, see out in the field bill, you want to start. >>Well, what's really fun about this job is, is that in the air force, uh, I worked in the space and missile business and what we saw was a heavy reliance on checklist format, security procedures, analog systems, and what we're seeing now in our world, both in the government and the commercial side, uh, is a move to a digital environment. And the digital environment is a very quick and adaptive environment. And it's going to require a digital understanding. Matter of fact, um, the, uh, under secretary of the air force for acquisition, uh, rev recently referenced the need to understand the digital environment and how that's affecting acquisition. So as, as both Amy, um, and trunk said, even business students are now in the >>Cybersecurity business. And, and so, again, what we're seeing is, is the change. Now, another phenomenon that we're seeing in the space world is there's just so much data. Uh, one of the ways that we addressed that in the past was to look at high performance computing. It was a lot stricter control over how that worked, but now what we're seeing these adaptation of cloud cloud technologies in space support, space, data, command, and control. Uh, and so what we see is a modern space engineer who asked to understand digital, has to understand cloud and has to understand the context of all those with a cyber environment. That's really changing the forefront of what is a space engineer, what is a digital engineer and what does a future engineer, both commercial or government? So I think the opportunity for all of these things is really good, particularly for a Polytechnic air force Academy and others that are focusing on a more, uh, widened experiential level of cloud and engineering and other capabilities. >>And I'll tell you the part that as the CIO, I have to remind everybody, all this stuff works for the it stuff. So you've got to understand how your it infrastructures are tied and working together. Um, as we noted earlier, one of the things is, is that these are all relays from point the point, and that architecture is part of your cybersecurity architecture. So again, every component has now become a cyber aware cyber knowledgeable, and in what we'd like to call as a cyber cognizant citizen, where they have to understand the context, patients chip software, that the Fleischer talk about your perspective, because you mentioned some of the things that computer science. Remember when I'm in the eighties, when I got my computer science degree, they call the software engineers, and then you became software developers. And then, so again, engineering is the theme. If you're engineering a system, there's now software involved, um, and there's also business engineering business models. So talk about some of your comments was, you mentioned, computer science is hot. You got the aerospace, you've got these multidisciplines you got definitely diversity as well. It brings more perspectives in as well. Your thoughts on these structural interdisciplinary things. >>I think this is, this is really key to making sure that students are prepared to work in the workforce is looking at the, the blurring between fields no longer are you just a computer scientist, no longer are you just an aerospace engineer? You really have to have an expertise where you can work with people across disciplines. All of these, all of these fields are just working with each other in ways we haven't seen before. And bill brought up data, you know, data science is something that's cross cutting across all of our fields. So we want engineers that have the disciplinary expertise so that they can go deep into these fields, but we want them to be able to communicate with each and to be able to communicate across disciplines and to be able to work in teams that are across disciplines. You can no longer just work with other computer scientists or just work with other aerospace engineers. >>There's no part of engineering that is siloed anymore. So that's how we're changing. You have to be able to work across those, those disciplines. And as you, as Tron pointed out, you know, ethics has to come into this. So you can no longer try to fully separate what we would traditionally have called the, the liberal arts and say, well, that's over there in general education. No ethics is an important part of what we're doing and how we integrate that into our curriculum. So it was communication. So is working on public policy and seeing where all of these different aspects tied together to make the impact that we want to have in the world. So it, you no longer can work solo in these fields. >>Great point. And bill also mentioned the cloud. One thing about the cloud that showed us as horizontal scalability has created a lot of value and certainly data is now horizontal Trung. You mentioned some of the things about cryptography for the kids out there. I mean, you can look at the pathway for career. You can do a lot of tech and, but you don't have to go deep. Sometimes you can go, you can go as deep as you want, but there's so much more there. Um, what technology do you see, how it's going to help students in your opinion? >>Well, I'm a professor in computer science, so I'd like to talk out a little bit about computer programming. Now we, uh, working in complex project. So most of the time we design a system from scratch. We view it from different components and the components that we have either we get it from or some time we get it from the internet in the open source environment, it's fun to get the source code and then work to our own application. So now when we are looking at a Logie, when we talk about encryption, for example, we can easily get the source code from the internet. And the question is, is safe to use those source code. And my, my, my question is maybe not. So I always encourage my students to learn how to write source score distribution, where that I learned a long time ago before I allow them to use the open source environment. And one of the things that they have to be careful, especially with encryption is be quote that might be hidden in the, in the source, get the download here, some of the source. >>So open source, it's a wonderful place to be, but it's also that we have to be aware of >>Great point before we get into some of the common one quick thing for each of you like to get your comments on, you know, the there's been a big movement on growth mindset, which has been a great, I'm a big believer in having a growth mindset and learning and all that good stuff. But now that when you talk about some of these things that we're mentioning about systems, there's, there's an, there's a new trend around a systems mindset, because if everything's now a system distributed systems, now you have space in cyber security, you have to understand the consequences of changes. And you mentioned some of that Trung in changes in the source code. Could you guys share your quick opinions on the, the idea of systems thinking, is that a mindset that people should be looking at? Because it used to be just one thing, Oh, you're a systems guy or galley. There you go. You're done. Now. It seems to be in social media and data. Everything seems to be systems. What's your take dr. Fleischer, we'll start with you. >>Uh, I'd say it's a, it's another way of looking at, um, not being just so deep in your discipline. You have to understand what the impact of the decisions that you're making have on a much broader, uh, system. And so I think it's important for all of our students to get some exposure to that systems level thinking and looking at the greater impact of the decision that they're making. Now, the issue is where do you set the systems boundary, right? And you can set the systems boundary very close in and concentrate on an aspect of a design, or you can continually move that system boundary out and see, where do you hit the intersections of engineering and science along with ethics and public policy and the greater society. And I think that's where some of the interesting work is going to be. And I think at least exposing students and letting them know that they're going to have to make some of these considerations as they move throughout their career is going to be vital as we move into the future. Bill. What's your thoughts? >>Um, I absolutely agree with Amy and I think there's a context here that reverse engineering, um, and forensics analysis and forensics engineering are becoming more critical than ever, uh, the ability to look at what you have designed in a system and then tear it apart and look at it for gaps and holes and problem sets, or when you're given some software that's already been pre developed, checking it to make sure it is, is really going to do what it says it's going to do. That forensics ability becomes more and more a skillset that also you need the verbal skills to explain what it is you're doing and what you found. So the communication side, the systems analysis, >>The forensics analysis side, >>These are all things that are part of that system >>Approach that I think you could spend hours on. And we still haven't really done great job on it. So it's a, it's. One of my fortes is the really the whole analysis side of forensics and it reverse engineering >>Try and real quick systems thinking. >>Well, I'd like to share with you my experience. When I worked in the space patient program at NASA, we had two different approaches. One is a down approach where we design it from the system general point of view, where we put components to complex system. But at the same time, we have the bottom up approach where we have Ken Chile who spent time and effort the individual component. And they have to be expert in those Chinese component. That might be general component the gallery. And in the space station program, we bring together the welcome up engineer, who designed everything in detail in the system manager who manage the system design from the top down. And we meet in the middle and took the idea with compromise a lot of differences. Then we can leave a display station that we are operating to be okay, >>Great insight. And that's the whole teamwork collaboration that, that was mentioning. Thanks so much for that insight. I wanted to get that out there because I know myself as a, as a parent, I'm always trying to think about what's best for my kids in their friends, as they grow up into the workforce. I know educators and leaders in industry would love to know some of the best practices around some of the structural changes. So thanks for that insight, but this topics about students and helping them prepare. Uh, so we heard, you know, be, be multiple discipline, broaden your horizons, think like systems top down, bottom up, work together as a team and follow the data. So I got to ask you guys, there's a huge amount of job openings in cybersecurity. It's well documented and certainly at the intersection of space and cyber, it's only gonna get bigger, right? You're going to see more and more demand for new types of jobs. How do we get high school and college students interested in security as a career at the flagship? We'll start with you in this one. >>I would say really one of the best ways to get students interested in the career is to show them the impact that it's going to have. There's definitely always going to be students who are going to want to do the technology for the technology sake, but that will limit you to a narrow set of students. And by showing that the greater impact that these types of careers are going to have on the types of problems that you're going to be able to solve and the impact you're going to be able to have on the world, around you, that's the word that we really need to get out. And a wide variety of students really respond to these messages. So I think it's really kind of reaching out at the, uh, the elementary, the middle school level, and really kind of getting this idea that you can make a big difference, a big positive difference in the field with some of these careers is going to be really critical. >>Real question, follow up. What do you think is the best entry point? You mentioned middle squad in here, elementary school. This comes, there's a lot of discussions around pipelining and we're going to get into women in tech and under-represented matters later, but you know, is it too early or what's the, what's your feeling on this? >>My feeling is the earlier we can normalize it the better the, uh, if you can normalize an interest in, in computers and technology and building an elementary school, that's absolutely critical. But the dropoff point that we're seeing is between what I would call like late elementary and early middle school. Um, and just kind of as an anecdote, I, for years ran an outreach program for girl Scouts in grades four and five and grade six, seven, and eight. And we had a hundred slots in each program. And every year the program would sell out for girls in grades four and five, and every year we'd have spots remaining in grades six, seven, and eight. And that's literally where the drop-off is occurring between that late elementary and that middle school range. So that's the area that we need to target to make sure we keep those young women involved and interested as we move forward. >>Bill, how are we going to get these kids interested in security? You mentioned a few programs you got. Yeah. I mean, who wants to, who wouldn't want to be a white hat hacker? I mean, yeah, that sounds exciting. Yeah. Great questions. Let's start with some basic principles though. Is let me ask you a question, John, a name for me, one white hat, good person hacker. The name who works in the space industry and is an exemplar for students to look up to, um, you, um, Oh man. I'm hearing really. I can't, I can't, I can't, I can't imagine because the answer we normally get is the cricket sound. So we don't have individuals we've identified in those areas for them to look up to. I was going to be snarky and say, most white hackers won't even use their real name, but, um, there's a, there's an aura around their anonymity here. >>So, so again, the real question is, is how do we get them engaged and keep them engaged? And that's what Amy was pointing out too. Exactly the engagement and sticking with it. So one of the things that we're trying to do through our competition on the state level and other elements is providing connections. We call them ambassadors. These are people in the business who can contact the students that are in the game or in that, uh, challenge environment and let them interact and let them talk about what they do and what they're doing in life would give them a challenging game format. Um, a lot of computer based training, um, capture the flag stuff is great, but if you can make it hands on, if you can make it a learn by doing experiment, if you can make it am personally involved and see the benefit as a result of doing that challenge and then talk to the people who do that on a daily basis, that's how you get them involved. >>The second part is as part of what we're doing is, is we're involving partnership companies in the development of the teams. So this year's competition that we're running has 82 teams from across the state of California, uh, of those 82 teams at six students team, middle school, high school, and many of those have company partners. And these are practitioners in cybersecurity who are working with those students to participate. It's it's that adult connectivity, it's that visualization. Um, so at the competition this year, um, we have the founder of Def con red flag is a participant to talk to the students. We have Vince surf as who is of course, very well known for something called the internet to participate. It's really getting the students to understand who's in this. Who can I look up to and how do I stay engaged with them? >>There's definitely a celebrity aspect of it. I will agree. I mean, the influencer aspect here with knowledge is key. Can you talk about, um, these ambassadors and, and, and how far along are you on that program? First of all, the challenge stuff is anything gamification wise. We've seen that with hackathons is just really works well. Grades, bonding, people who create together kinda get sticky and get very high community aspect to it. Talking about this ambassador thing. What does that industry is that academic >>Absolutely partners that we've identified? Um, some of which, and I won't hit all of them. So I'm sure I'll short changes, but, uh, Palo Alto, Cisco, um, Splunk, um, many of the companies in California and what we've done is identified, uh, schools, uh, to participate in the challenge that may not have a strong STEM program or have any cyber program. And the idea of the company is they look for their employees who are in those school districts to partner with the schools to help provide outreach. It could be as simple as a couple hours a week, or it's a team support captain or it's providing computers and other devices to use. Uh, and so again, it's really about a constant connectivity and, uh, trying to help where some schools may not have the staff or support units in an area to really provide them what they need for connectivity. What that does gives us an opportunity to not just focus on it once a year, but throughout the year. So for the competition, all the teams that are participating have been receiving, um, training and educational opportunities in the game of education side, since they signed up to participate. So there's a website, there's learning materials, there's materials provided by certain vendor companies like Wireshark and others. So it's a continuum of opportunity for the, >>You know, I've seen just the re randomly, just going to random thought, you know, robotics clubs are moving den closer into that middle school area, in fact Fleischer. And certainly in high schools, it's almost like a varsity sport. E-sports is another one. My son just combined made the JV at the college Dean, you know, it's big and it's up and serious. Right. And, um, it's fun. This is the aspect of fun. It's hands on. This is part of the culture down there you learn by doing, is there like a group? Is it like, um, is it like a club? I mean, how do you guys organize these bottoms up organically interest topics? >>So, so here in the college of engineering, uh, when we talk about learning by doing, we have learned by doing both in the classroom and out of the classroom. And if we look at the, these types of, out of the classroom activities, we have over 80 clubs working on all different aspects of many of these are bottom up. The students have decided what they want to work on and have organized themselves around that. And then they get the leadership opportunities. The more experienced students train in the less experienced students. And it continues to build from year after year after year with them even doing aspects of strategic planning from year to year for some of these competitions. So, yeah, it's an absolutely great experience. And we don't define for them how their learned by doing experiences should be, we want them to define it. And I think the really cool thing about that is they have the ownership and they have the interest and they can come up with new clubs year after year to see which direction they want to take it. And, you know, we will help support those clubs as old clubs fade out and new clubs come in >>Trunk real quick. Before we go on the next, uh, talk track, what, what do you recommend for, um, middle school, high school or even elementary? Um, a little bit of coding Minecraft. I mean, what, how do you get them hooked on the fun and the dopamine of, uh, technology and cybersecurity? What's your, what's your take on that? >>On, on this aspect, I like to share with you my experience as a junior high and high school student in Texas, the university of Texas in Austin organized a competition for every high school in Texas. If we phew from poetry to mathematics, to science, computer engineering, but it's not about with university of Texas. The university of Texas is on the serving SSN for the final competition that we divide the competition to be strict and then regional, and then spit at each level, we have local university and colleges volunteering to host it competition and make it fun. >>Also students with private enterprises to raise funding for scholarship. So students who see the competition they get exposed to so they can see different option. They also get a scholarship when they attend university in college. So I've seen the combination in competition aspect would be a good thing to be >>Got the engagement, the aspiration scholarship, you know, and you mentioned a volunteer. I think one of the things I'll observe is you guys are kind of hitting this as community. I mean, the story of Steve jobs and was, was building the Mac, they call it bill Hewlett up in Palo Alto. It was in the phone book and they scoured some parts from them. That's community. This is kind of what you're getting at. So this is kind of the formula we're seeing. So the next question I really want to get into is the women in technology, STEM, underrepresented minorities, how do we get them on cybersecurity career path? Is there a best practices there, bill, we'll start with you? >>Well, I think it's really interesting. First thing I want to add is if I could have just a clarification, what's really cool that the competition that we have and we're running, it's run by student from Cal poly. Uh, so, you know, Amy referenced the clubs and other activities. So many of the, uh, organizers and developers of the competition that we're running are the students, but not just from engineering. So we actually have theater and liberal arts majors and technology for liberal arts majors who are part of the competition. And we use their areas of expertise, set design, and other things, uh, visualization of virtualization. Those are all part of how we then teach and educate cyber in our game effication and other areas. So they're all involved in their learning as well. So we have our students teaching other students. So we're really excited about that. And I think that's part of what leads to a mentoring aspect of what we're providing, where our students are mentoring the other students. And I think it's also something that's really important in the game. Um, the first year we held the game, we had several all girl teams and it was really interesting because a, they, they didn't really know if they could compete. I mean, this is their, their reference point. We don't know if they did better than anybody. I mean, they, they knocked the ball out >>Of the park. The second part then is building that confidence level that they can going back and telling their cohorts that, Hey, it's not this thing you can't do. It's something real that you can compete and win. And so again, it's building that comradery, that spirit, that knowledge that they can succeed. And I think that goes a long way and an Amy's programs and the reach out and the reach out that Cal poly does to schools to develop. Uh, I think that's what it really is going to take. It. It is going to take that village approach to really increase diversity and inclusivity for the community. >>That's the flusher. I'd love to get your thoughts. You mentioned, um, your, your outreach program and the dropoff, some of those data, uh, you're deeply involved in this. You're passionate about it. What's your thoughts on this career path opportunity for STEM? >>Yeah, I think STEM is an incredible career path opportunity for so many people. There's so many interesting problems that we can solve, particularly in cyber and in space systems. And I think we have to meet the kids where they are and kind of show them, you know, what the exciting part is about it, right. But, you know, bill was, was alluding to this. And when he was talking about, you know, trying to name somebody that you can can point to. And I think having those visible people where you can see yourself in that is, is absolutely critical and those mentors and that mentorship program. So we use a lot of our students going out into California, middle schools and elementary schools. And you want to see somebody that's like you, somebody that came from your background and was able to do this. So a lot of times we have students from our national society of black engineers or a society of Hispanic professional engineers or our society of women engineers. >>We have over a thousand members, a thousand student members in our society of women engineers who were doing these outreach programs. But like I also said, it's hitting them at the lower levels too. And girl Scouts is actually distinguishing themselves as one of the leading STEM advocates in the country. And like I said, they developed all these cybersecurity badges, starting in kindergarten. There's a cybersecurity badge for kindergarten and first graders. And it goes all the way up through late high school, the same thing with space systems. And they did the space systems in partnership with NASA. They did the cybersecurity and partnership with Palo Alto networks. And what you do is you want to build these, these skills that the girls are developing. And like bill said, work in and girl led teams where they can do it. And if they're doing it from kindergarten on, it just becomes normal. And they never think, well, this is not for me. And they see the older girls who are doing it and they see a very clear path leading them into these careers. >>Yeah. It's interesting. You used the word normalization earlier. That's exactly what it is. It's life, you get life skills and a new kind of badge. Why wouldn't learn how to be a white, white hat hacker, or have fun or learn new skills just in, in the, in the grind of your fun day. Super exciting. Okay. Trung your thoughts on this. I mean, you have a diverse diversity. It brings perspective to the table in cybersecurity because you have to think like the other, the adversary, you got to be the white headed hippie, a white hat, unless you know how black hat thinks. So there's a lot of needs here for more, more, more points of view. How are we going to get people trained on this from under represented minorities and women? What's your thoughts? >>Well, as a member of, I took a professional society of directed pool in the electronic engineer. You have the, uh, we participate in the engineering week. We'll be ploy our members to local junior high school and high school to talk about our project, to promote the discovery of engineering. But at the same time, we also participate in the science fair that we scaled up flex. As the squad organizing our engineer will be mentoring students, number one, to help them with the part check, but number two, to help us identify talents so that we can recruit them further into the field of STEM. One of the participation that week was the competition of the, what they call future CV. We're still going, we'll be doing a CT on a computer simulation. And in recent year we promote ops smart CV where CT will be connected the individual houses to be added in through the internet. >>And we want to bring awareness of cybersecurity into competition. So we deploy engineer to supervise the people, the students who participate in the competition, we bring awareness, not in the technical be challenged level, but in what we've called the compound level. So speargun will be able to know what is, why to provide cyber security for the smart city that they are building. And at the same time, we were able to identify talent, especially talent in the minority and in the room. And so that we can recruit them more actively. And we also raise money for scholarship. We believe that scholarship is the best way to get students to continue education in Epic college level. So with scholarship, it's very easy to recruit them, to give you and then push them to go further into the cyber security Eylea. >>Yeah. I mean, you know, I see a lot of the parents like, Oh, my kid's going to go join the soccer team, >>Private lessons, and maybe look at a scholarship >>Someday. Well, they only do have scholarships anyway. I mean, this is if they spent that time doing other things, it's just, again, this is a new lifestyle, like the girl Scouts. And this is where I want to get into this whole silo breaking down because Amy, you brought this up and bill, you were talking about as well, you've got multiple stakeholders here with this event. You got, you know, public, you got private and you've got educators. It's the intersection of all of them. It's again, that those, if those silos break down the confluence of those three stakeholders have to work together. So let's, let's talk about that. Educators. You guys are educating young minds, you're interfacing with private institutions and now the public. What about educators? What can they do to make cyber better? Cause there's no real manual. I mean, it's not like this court is a body of work of how to educate cybersecurity is maybe it's more recent, it's cutting edge, best practices, but still it's an, it's an evolving playbook. What's your thoughts for educators, bill? We'll start with you. >>Well, I don't really, I'm going to turn it off. >>I would say, I would say as, as educators, it's really important for us to stay on top of how the field is evolving, right? So what we want to do is we want to promote these tight connections between educators and our faculty and, um, applied research in industry and with industry partnerships. And I think that's how we're going to make sure that we're educating students in the best way. And you're talking about that inner, that confluence of the three different areas. And I think you have to keep those communication lines open to make sure that the information on where the field is going and what we need to concentrate on is flowing down into our educational process. And that, that works in both ways that, you know, we can talk as educators and we can be telling industry what we're working on and what are types of skills our students have and working with them to get the opportunities for our students to work in industry and develop those skills along the way as well. >>And I think it's just all part of this is really looking at, at what's going to be happening and how do we get people talking to each other and the same thing with looking at public policy and bringing that into our education and into these real hands on experiences. And that's how you really cement this type of knowledge with students, not by not by talking to them and not by showing them, but letting them do it. It's this learn by doing and building the resiliency that it takes when you learn by doing. And sometimes you learn by failing, but you just up and you keep going. >>And these are important skills that you develop along the way >>You mentioned, um, um, sharing too. That's the key collaborating and sharing knowledge. It's an open, open world and everyone's collaborating feel private public partnerships. I mean, there's a real private companies. You mentioned Palo Alto networks and others. There's a real intersection there there's, they're motivated. They could, the scholarship opportunities, trunk points to that. What is the public private educator view there? How do companies get involved? What's the benefit for them? >>Well, that's what a lot of the universities are doing is to bring in as part of either their cyber centers or institutes, people who are really focused on developing and furthering those public private partnerships. That's really what my role is in all these things is to take us to a different level in those areas, uh, not to take away from the academic side, but to add additional opportunities for both sides. Remember in a public private partnership, all entities have to have some gain in the process. Now, what I think is really interesting is the timing on particularly this subject space and cyber security. This has been an absolute banner year for space. The Stanhope of space force, the launch of commercial partnership, leaving commercial platforms, delivering astronauts to the space station, recovering them and bringing back the ability of a commercial satellite platform to be launched a commercial platforms that not only launch, but return back to where they're launched from. >>These are things that are stirring the hearts of the American citizens, the kids, again, they're getting interested, they're seeing this and getting enthused. So we have to seize upon that and we have to find a way to connect that public private partnerships is the answer for that. It's not one segment that can handle it all. It's all of them combined together. If you look at space, space is going to be about commercial. It's going to be about civil moving from one side of the earth, to the other via space. And it's about government. And what's really cool for us. All those things are in our backyard. Yeah. That's where that public private comes together. The government's involved, the private sector is involved. The educators are involved and we're all looking at the same things and trying to figure out like this forum, what works best to go to the future. >>You know, if people are bored and they want to look for an exciting challenge, he couldn't have laid it out any clearer. It's the most exciting discipline. It hits everything. I mean, we just talk about space. GPS is everything we do is well tested. Do with satellites. >>I have to tell you a story on that, right? We have a very unique GPS story right in our backyard. So our sheriff is the son of the father of GPS for the air force. So you can't get better than that when it comes to being connected to all those platforms. So we, we really want to say, you know, this is so exciting for all of us because >>It gives everybody a job for a long time. >>You know, the kids that don't think tick toxic, exciting, wait til they see what's going on here with you guys, this program, trunk final word on this from the public side, you're at the air force. You're doing research. Are you guys opening it up? Are you integrating into the private and educational sectors? How do you see that formula playing out? And what's the best practice for students and preparing them? >>I think it's the same in athlete university CP in the engineering program will require our students to be final project before graduation. And in this kind of project, we send them out to work in the private industry. The private company got sponsor. Then they get the benefit of having an intern working for them and they get the benefit of reviewing the students as the prospective employee in the future. So it's good for the student to gain practical experience working in this program. Some, some kind of, we call that a core program, some kind, we call that a capstone program and the company will accept the students on a trial PRCS, giving them some assignment and then pay them a little bit of money. So it's good for the student to earn some extra money, to have some experience that they can put on their resume when they apply for the final of the job. >>So the collaboration between university and private sector is really important. We, when I joined a faculty, normally they already exist that connection. It came from. Normally it came from the Dean of engineering who would whine and dine with companies. We work relationship and sign up women, but it's approach to do a good performance so that we can be credibility to continue the relationship with those company and the students that we selected to send to those company. We have to make sure that they will represent the university. Well, they will go a good job and they will make a good impression. >>Thank you very much for great insight, trunk, bill, Amy, amazing topic. I'd like to end this session with each of you to make a statement on the importance of cybersecurity to space. We'll go Trung bill and Amy Truong, the importance of cybersecurity space statement. >>We know that it's affecting components that we are using and we are connecting to. And normally we use them for personal purpose. But when we connect to the important system that the government public company put into space, so it's really important to practice cyber security and a lot of time, it's very easy to know concept. We have to be careful, but in reality, we tend to forget to partnership the way we forget how to ride safely. And with driving a car, we have a program called defensive driving that requires every two or three years to get. We can get discount. >>We are providing the cyber security practice, not to tell people about the technology, but to remind them not practicing cybersecurity. And it's a requirement for every one of us, bill, the importance of cyber security to space. It's not just about young people. It's about all of us as we grow and we change as I referenced it, you know, we're changing from an analog world to a digital world. Those of us who have been in the business and have hair that looks like mine. We need to be just as cognizant about cybersecurity practice as the young people, we need to understand how it affects our lives and particularly in space, because we're going to be talking about people, moving people to space, moving payloads, data, transfer all of those things. And so there's a whole workforce that needs to be retrained or upskilled in cyber that's out there. So the opportunity is ever expensive for all of us, Amy, the importance of cybersecurity space, >>Uh, and the, the emphasis of cybersecurity is space. Just simply, can't be over emphasized. There are so many aspects that are going to have to be considered as systems get ever more complex. And as we pointed out, we're putting people's lives at stake here. This is incredibly, incredibly complicated and incredibly impactful, and actually really exciting the opportunities that are here for students and the workforce of the future to really make an enormous impact on the world around us. And I hope we're able to get that message out to students, to children >>Today. But these are my really interesting fields that you need to consider. >>Thank you very much. I'm John foray with the cube and the importance of cybersecurity and space is the future of the world's all going to happen in and around space with technology, people and society. Thank you to Cal poly. And thank you for watching the Cypress of computer security and space symposium 2020.

Published Date : Oct 1 2020

SUMMARY :

Bill Britain, Lieutenant Colonel from the us air force, In that role that we have with the cyber security Institute, we partner with elements of the state And either come to Cal poly or some other institution that's going to let them Cal poly, that Dex hub and the efforts you guys are having with your challenge. And I think Amy is going to tell You guys have a great organization down there, amazing curriculum, grazing people, And this means that we have a combination of practical experience and learn by doing both in the country and the top ranked state school. So we have partnerships with Northrop Grumman And we remain the worldwide leader in maintaining the cube So in terms of bringing people into the field, that are most important for the intersection of space and technology trunk. the internet, we know that is a good source of information, So in the reality, we need to be more practicing the, able to control the space system that we put up there. and on the ground control station, we have the human controller And we also have student in education who can focus the expert. It's not just get the degree, see out in the field And the digital environment is a very quick and adaptive environment. Uh, one of the ways that we addressed that in the past was to look patients chip software, that the Fleischer talk about your perspective, because you mentioned some of the things that computer science. expertise so that they can go deep into these fields, but we want them to be able to communicate with each and to make the impact that we want to have in the world. And bill also mentioned the cloud. And the question is, is safe to use Great point before we get into some of the common one quick thing for each of you like to get your comments on, you know, Now, the issue is where do you set the systems boundary, right? So the communication side, the systems analysis, One of my fortes is the really the whole analysis side of forensics But at the same time, we have the bottom up approach So I got to ask you guys, And by showing that the greater impact in tech and under-represented matters later, but you know, is it too early or what's the, what's your feeling on this? So that's the area that we need to target to make sure we keep those young women I can't, I can't, I can't, I can't imagine because the answer that challenge and then talk to the people who do that on a daily basis, that's how you get It's really getting the students to understand who's in this. I mean, the influencer aspect here with knowledge is key. And the idea of the company is they You know, I've seen just the re randomly, just going to random thought, you know, robotics clubs are moving den closer So, so here in the college of engineering, uh, when we talk about learning by doing, Before we go on the next, uh, talk track, what, what do you recommend for, On, on this aspect, I like to share with you my experience as So I've seen the combination Got the engagement, the aspiration scholarship, you know, and you mentioned a volunteer. And we use their areas of expertise, set design, and other things, uh, It's something real that you can compete and win. That's the flusher. And I think we have to meet the kids where they are and kind of show them, And it goes all the way up through late high school, the same thing with space systems. I mean, you have a diverse diversity. But at the same time, we also participate in the science And at the same time, we were able to identify talent, especially talent It's the intersection of all of them. And I think you have to keep those communication lines open to make sure that the information And sometimes you learn by failing, but you just up and What is the public private educator view there? The Stanhope of space force, the launch of commercial partnership, So we have to seize upon that and we have to find a way to connect that public private partnerships It's the most exciting discipline. I have to tell you a story on that, right? You know, the kids that don't think tick toxic, exciting, wait til they see what's going on here with you guys, So it's good for the student to earn a good performance so that we can be credibility to continue the on the importance of cybersecurity to space. the way we forget how to ride safely. we grow and we change as I referenced it, you know, we're changing from an analog world to a digital And as we pointed out, we're putting people's lives at stake here. But these are my really interesting fields that you need to consider. is the future of the world's all going to happen in and around space with technology, people and society.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
AmyPERSON

0.99+

BoeingORGANIZATION

0.99+

NASAORGANIZATION

0.99+

Northrop GrummanORGANIZATION

0.99+

LockheedORGANIZATION

0.99+

CiscoORGANIZATION

0.99+

TexasLOCATION

0.99+

CaliforniaLOCATION

0.99+

VirginORGANIZATION

0.99+

Cal polyORGANIZATION

0.99+

Amy TruongPERSON

0.99+

Palo AltoLOCATION

0.99+

firstQUANTITY

0.99+

82 teamsQUANTITY

0.99+

U S air force AcademyORGANIZATION

0.99+

Ken ChilePERSON

0.99+

Bill BritainPERSON

0.99+

six studentsQUANTITY

0.99+

California cyber security InstituteORGANIZATION

0.99+

JohnPERSON

0.99+

XORGANIZATION

0.99+

hundredsQUANTITY

0.99+

MinecraftTITLE

0.99+

one hourQUANTITY

0.99+

StevePERSON

0.99+

tomorrowDATE

0.99+

40 milesQUANTITY

0.99+

OneQUANTITY

0.99+

Colorado SpringsLOCATION

0.99+

todayDATE

0.99+

second partQUANTITY

0.99+

SplunkORGANIZATION

0.99+

more than 6,000 engineering studentsQUANTITY

0.99+

14 degree programsQUANTITY

0.99+

each programQUANTITY

0.99+

FleischerPERSON

0.99+

both sidesQUANTITY

0.99+

dozensQUANTITY

0.99+

MerckORGANIZATION

0.99+

bothQUANTITY

0.99+

AustinLOCATION

0.99+

oneQUANTITY

0.98+

Vince surfPERSON

0.98+

eachQUANTITY

0.98+

BillPERSON

0.98+

over 80 clubsQUANTITY

0.98+

each levelQUANTITY

0.98+

AugustDATE

0.98+

earthLOCATION

0.98+

three yearsQUANTITY

0.98+

John forayPERSON

0.98+

Polytechnic air force AcademyORGANIZATION

0.97+

dr.PERSON

0.97+

Amy flasherPERSON

0.97+

TodayDATE

0.97+

one aspectQUANTITY

0.96+

Pham and Britton and Fleischer V1


 

>> Announcer: From around the globe, it's theCUBE, covering Space and Cybersecurity Symposium 2020, hosted by Cal Poly. >> Everyone, welcome to this special presentation with Cal Poly hosting the Space and Cybersecurity Symposium 2020 virtual. I'm John Furrier, your host with theCUBE and SiliconANGLE here in our Palo Alto studios with our remote guests. We couldn't be there in person, but we're going to be here remote. We got a great session and a panel for one hour, topic preparing students for the jobs of today and tomorrow. Got a great lineup. Bill Britton, Lieutenant Colonel from the US Air Force, retired vice president for information technology and CIO and the director of the California Cybersecurity Institute for Cal Poly. Bill, thanks for joining us. Dr. Amy Fleischer, who's the dean of the College of Engineering at Cal Poly, and Trung Pham, professor and researcher at the US Air Force Academy. Folks, thanks for joining me today. >> Our pleasure. >> Got a great- >> Great to be here. >> Great panel. This is one of my favorite topics. >> Thank you for the opportunity. >> Preparing students for the next generation, the jobs for today and tomorrow. We got an hour. I'd love you guys to start with an opening statement to kick things off. Bill, we'll start with you. >> Well, I'm really pleased to be, to start on this as the director for the Cybersecurity Institute and the CIO at Cal Poly, it's really a fun, exciting job, because as a polytechnic, technology has such a forefront in what we're doing, and we've had a wonderful opportunity being 40 miles from Vandenberg Air Force Base to really look at the nexus of space and cybersecurity. And if you add into that both commercial, government, and civil space and cybersecurity, this is an expanding wide open time for cyber and space. In that role that we have with the Cybersecurity Institute, we partner with elements of the state and the university, and we try to really add value above our academic level, which is some of the highest in the nation, and to really merge down and go a little lower and start younger. So we actually are running the week prior to this showing a cybersecurity competition for high schools and middle schools in the state of California. That competition this year is based on a scenario around hacking of a commercial satellite and the forensics of the payload that was hacked and the networks associated with it. This is going to be done using products like Wireshark, Autopsy, and other tools that will give those high school students what we hope is a huge desire to follow up and go into cyber and cyberspace and space and follow that career path and either come to Cal Poly or some other institution that's going to let them really expand their horizons in cybersecurity and space for the future of our nation. >> Bill, thanks for that intro. By the way, I just want to give you props for an amazing team and job you guys are doing at Cal Poly, the DxHub and the efforts you guys are having with your challenge. Congratulations on that great work. >> Thank you. It's a rock star team. It's absolutely amazing to find that much talent at one location. And I think Amy's going to tell you, she's got the same amount of talent in her staff, so it's a great place to be. >> Dr. Amy Fleischer. You guys have a great organization down there, amazing curriculum, amazing people, great community. Your opening statement. >> Hello everybody. It's really great to be a part of this panel on behalf of the Cal Poly College of Engineering. Here at Cal Poly, we really take preparing students for the jobs of today and tomorrow completely seriously, and we can claim that our students really graduate so they're ready day one for their first real job. But that means that in getting them to that point, we have to help them get valuable and meaningful job experience before they graduate, both through our curriculum and through multiple internship or summer research opportunities. So we focus our curriculum on what we call a learn by doing philosophy. And this means that we have a combination of practical experience and learn by doing both in and out of the classroom. And we find that to be really critical for preparing students for the workforce. Here at Cal Poly, we have more than 6,000 engineering students. We're one of the largest undergraduate engineering schools in the country. And US News ranks us the eighth best undergraduate engineering program in the country and the top ranked state school. We're really, really proud that we offer this impactful hands-on engineering education that really exceeds that of virtually all private universities while reaching a wider audience of students. We offer 14 degree programs, and really, we're talking today about cyber and space, and I think most of those degree programs can really make an impact in the space and cybersecurity economy. And this includes not only things like aero and cyber directly, but also electrical engineering, mechanical engineering, computer engineering, materials engineering, even manufacturing, civil, and biomedical engineering, as there's a lot of infrastructure needs that go into supporting launch capabilities. Our aerospace program graduates hundreds of aerospace engineers and most of them are working right here in California with many of our corporate partners, including Northrop Grumman, Lockheed, Boeing, Raytheon, SpaceX, Virgin Galactic, JPL, and so many other places where we have Cal Poly engineers impacting the space economy. Our cybersecurity focus is found mainly in our computer science and software engineering programs, and it's really a rapidly growing interest among our students. Computer science is our most popular major, and industry interests and partnerships are integrated into our cyber curriculum, and we do that oftentimes through support from industry. So we have partnerships with Northrop Grumman for professorship in a cyber lab and from PG&E for critical infrastructure cybersecurity lab and professorship. And we think that industry partnerships like these are really critical to preparing students for the future as the field is evolving so quickly and making sure we adapt our facilities and our curriculum to stay in line with what we're seeing in industry is incredibly important. In our aerospace program, we have an educational partnership with the Air Force Research Labs that's allowing us to install new high-performance computing capabilities and a space environments lab that's going to enhance our satellite design capabilities. And if we talk about satellite design, Cal Poly is the founding home of the CubeSat program, which pioneered small satellite capabilities, And we remain the worldwide leader in maintaining the CubeSat standard, and our student program has launched more CubeSats than any other program. So here again we have this learn by doing experience every year for dozens of aerospace, electrical, computer science, mechanical engineering students, and other student activities that we think are just as important include ethical hacking through our white hat club, Cal Poly Space Systems, which does really, really big rocket launches, and our support program for women in both of these fields, like WISH, which is Women In Software and Hardware. Now, you know, really trying to bring in a wide variety of people into these fields is incredibly important, and outreach and support to those demographics traditionally underrepresented in these fields is going to be really critical to future success. So by drawing on the lived experiences by people with different types of backgrounds will we develop the type of culture and environment where all of us can get to the best solution. So in terms of bringing people into the field, we see that research shows we need to reach kids when they're in late elementary and middle schools to really overcome that cultural bias that works against diversity in our fields. And you heard Bill talking about the California Cybersecurity Institute's yearly cyber challenge, and there's a lot of other people who are working to bring in a wider variety of people into the field, like Girl Scouts, which has introduced dozens of new badges over the past few years, including a whole cybersecurity series of badges in concert with Palo Alto Networks. So we have our work cut out for us, but we know what we need to do, and if we're really committed to properly preparing the workforce for today and tomorrow, I think our future is going to be bright. I'm looking forward to our discussion today. >> Thank you, Dr. Fleischer, for a great comment, opening statement, and congratulations. You got the right formula down there, the right mindset, and you got a lot of talent, and community, as well. Thank you for that opening statement. Next up, from Colorado Springs, Trung Pham, who's a professor and researcher at the US Air Force Academy. He's doing a lot of research around the areas that are most important for the intersection of space and technology. Trung. >> Good afternoon. First I'd like to thank Cal Poly for the opportunity. And today I want to go briefly about cybersecurity in space application. Whenever we talk about cybersecurity, the impression is that it's a new field that is really highly complex involving a lot of technical area. But in reality, in my personal opinion, it is indeed a complex field because it involves many disciplines. The first thing we think about is computer engineering and computer networking, but it's also involving communication, sociology, law practice. And this practice of cybersecurity doesn't only involve computer expert, but it's also involve everybody else who has a computing device that is connected to the internet, and this participation is obviously everybody in today's environment. When we think about the internet, we know that it's a good source of information but come with the convenience of information that we can access, we are constantly facing danger from the internet. Some of them we might be aware of. Some of them we might not be aware of. For example, when we search on the internet, a lot of time our browser will be saying that this site is not trusted, so we will be more careful. But what about the sites that we trusted? We know that those are legitimate sites, but they're not 100% bulletproof. What happen if those site are attacked by a hacker and then they will be a silent source of danger that we might not be aware of. So in the reality, we need to be more practicing the cybersecurity from our civil point of view and not from a technical point of view. When we talk about space application, we should know that all the hardware are computer-based or controlled by by computer system, and therefore the hardware and the software must go through some certification process so that they can be rated as airworthy or flightworthy. When we know that in the certification process is focusing on the functionality of the hardware and software, but one aspect that is explicitly and implicitly required is the security of those components. And we know that those components have to be connected with the ground control station, and the communication is through the air, through the radio signal, so anybody who has access to those communication radio signal will be able to control the space system that we put up there. And we certainly do not want our system to be hijacked by a third party. Another aspect of cybersecurity is that we try to design the space system in a very strong manner so it's almost impossible to hack in. But what about some other weak system that might be connected to the strong system? For example, the space system will be connected to the ground control station, and on the ground control station, we have the human controller, and those people have cell phone. They are allowed to use cell phone for communication. But at the same time, they are connected to the internet through the cell phone, and their cell phone might be connected to the computer that control the flight software and hardware. So what I want to say is we try to build strong system and we've protected them, but there will be some weaker system that we could not intended but exists to be connected to our strong system, and those are the points the hacker will be trying to attack. If we know how to control the access to those weak points, we will be having a much better system for the space system. And when we see the cybersecurity that is requiring the participation everywhere it's important to notice that there is a source of opportunity for students who enter the workforce to consider. Obviously students in engineering can focus their knowledge and expertise to provide technological solution to protect the system that we view. But we also have students in business who can focus their expertise to write business plan so that they can provide a pathway for the engineering advances to reach the market. We also have student in law who can focus their expertise in policy governing the internet, governing the cybersecurity practice. And we also have student in education who can focus their expertise to design how to teach cybersecurity practice, and student in every other discipline can focus their effort to implement security measure to protect the system that they are using in their field. So it's obvious that cybersecurity is everywhere and it implies job opportunity everywhere for everybody in every discipline of study. Thank you. >> Thank you, Trung, for those great comments. Great technology opportunities. But interesting, as well, is the theme that we're seeing across the entire symposium and in the virtual hallways that we're hearing conversations, and you pointed out some of them. Dr. Fleischer did, as well. And Bill, you mentioned it. It's not one thing. It's not just technology. It's different skills. And Amy, you mentioned that computer science is the hottest degree, but you have the hottest aerospace program in the world. I mean, so all this is kind of balancing. It's interdisciplinary. It's a structural change. Before we get into some of the, how they prepare the students, can you guys talk about some of the structural changes that are modern now in preparing in these opportunities, because societal impact is a, law potentially impact, it's how we educate. There's now cross-discipline skill sets. It's not just get the degree, see you out in the field. Bill, you want to start? >> Well, what's really fun about this job is that in the Air Force, I worked in the space and missile business, and what we saw was a heavy reliance on checklist format, security procedures, analog systems, and what we're seeing now in our world, both in the government and the commercial side, is a move to a digital environment, and the digital environment is a very quick and adaptive environment, and it's going to require a digital understanding. Matter of fact, the undersecretary of Air Force for acquisition recently referenced the need to understand the digital environment and how that's affecting acquisition. So as both Amy and Trung said, even business students are now in the cybersecurity business. And so again, what we're seeing is the change. Now, another phenomenon that we're seeing in the space world is there's just so much data. One of the ways that we addressed that in the past was to look at high-performance computing. There was a lot stricter control over how that worked. But now what we're seeing is adaptation of cloud, cloud technologies in space support, space data, command and control. And so what we see is a modern space engineer who has to understand digital, has to understand cloud, and has to understand the context of all those with a cyber environment. That's really changing the forefront of what is a space engineer, what is a digital engineer, and what is a future engineer, both commercial or government. So I think the opportunity for all of these things is really good, particularly for a polytechnic, Air Force Academy, and others that are focusing on a more widened experiential level of cloud and engineering and other capabilities. And I'll tell you the part that as the CIO I have to remind everybody, all this stuff works with the IT stuff. So you've got to understand how your IT infrastructures are tied and working together. As we noted earlier, one of the things is that these are all relays from point to point, and that architecture is part of your cybersecurity architecture. So again, every component has now become a cyber aware, cyber knowledgeable, and what we like to call as a cyber cognizant citizen where they have to understand the context. (speaking on mute) >> (indistinct) software Dr. Fleischer, talk about your perspective, 'cause you mentioned some of the things about computer science. I remember in the '80s when I got my computer science degree, they called us software engineers and then you became software developers. And then, so again, engineering is the theme. If you're engineering a system, there's now software involved, and there's also business engineering, business models. So talk about some of your comments, 'cause you mentioned computer science is hot. You got the aerospace. You got these multi-disciplines. You got definitely diversity, as well, brings more perspectives in, as well. Your thoughts on these structural interdisciplinary things? >> I think this is really key to making sure that students are prepared to work in the workforce is looking at the blurring between fields. No longer are you just a computer scientist. No longer are you just an aerospace engineer. You really have to have an expertise where you can work with people across disciplines. All of these fields are just working with each other in ways we haven't seen before. And Bill brought up data. You know, data science is something that's cross-cutting across all of our fields. So we want engineers that have the disciplinary expertise that they can go deep into these fields, but we want them to be able to communicate with each other and to be able to communicate across disciplines and to be able to work in teams that are across disciplines. You can no longer just work with other computer scientists or just work with other aerospace engineers. There's no part of engineering that is siloed anymore. So that's how we're changing. You have to be able to work across those disciplines. And as you, as Trung pointed out, ethics has to come into this. So you can no longer try to fully separate what we would traditionally have called the liberal arts and say, well, that's over there in general education. No, ethics is an important part of what we're doing and how we integrate that into our curriculum. So is communication. So is working on public policy and seeing where all these different aspects tie together to make the impact that we want to have in the world. So you no longer can work solo in these fields. >> That's great point. And Bill also mentioned the cloud. One thing about the cloud that's showed us is horizontal scalability has created a lot of value, and certainly data is now horizontal. Trung, you mentioned some of the things about cryptography for the kids out there, I mean, you can look at the pathway for career. You can do a lot of tech, but you don't have to go deep sometimes. You can as deep as you want, but there's so much more there. What technology do you see that's going to help students, in your opinion? >> Well, I'm a professor in computer science, so I like to talk a little bit about computer programming. Now we are working in complex projects. So most of the time we don't design a system from scratch. We build it from different components, and the components that we have, either we get it from vendors or sometimes we get it from the internet in the open source environment. It's fun to get the source code and then make it work to our own application. So now when we are looking at cryptology, when we talk about encryption, for example, we can easily get the source code from the internet. And the question, is it safe to use those source code? And my question is maybe not. So I always encourage my students to learn how to write source code the traditional way that I learned a long time ago before I allow them to use the open source environment. And one of the things that they have to be careful especially with encryption is the code that might be hidden in the source that they downloaded. Some of the source might be harmful. It might open up back gate for a hacker to get in later. We've heard about these back gates back then when Microsoft designed the operating system with the protection of encryption, and it is true that is existing. So while open source code is a wonderful place to develop complex system, but it's also a dangerous place that we have to be aware of. >> Great point. Before we get into the comments, one quick thing for each of you I'd like to get your comments on. There's been a big movement on growth mindset, which has been a great big believer in having a growth mindset and learning and all that good stuff. But now when you talk about some of these things we're mentioning about systems, there's a new trend around a systems mindset, because if everything's now a system, distributed systems now you have space and cybersecurity, you have to understand the consequences of changes. And you mention some of that, Trung, in changes in the source code. Could you guys share your quick opinions on the of systems thinking? Is that a mindset that people should be looking at? Because it used to be just one thing. Oh, you're a systems guy or gal. There you go. You're done. Now it seems to be in social media and data, everything seems to be systems. What's your take? Dr. Fleischer, we'll start with you. >> I'd say it's another way of looking at not being just so deep in your discipline. You have to understand what the impact of the decisions that you're making have on a much broader system. And so I think it's important for all of our students to get some exposure to that systems level thinking and looking at the greater impact of the decision that they're making. Now, the issue is where do you set the systems boundary, right? And you can set the systems boundary very close in and concentrate on an aspect of a design, or you can continually move that system boundary out and see where do you hit the intersections of engineering and science along with ethics and public policy and the greater society. And I think that's where some of the interesting work is going to be. And I think at least exposing students and letting them know that they're going to have to make some of these considerations as they move throughout their career is going to be vital as we move into the future. >> Bill, what's your thoughts? >> I absolutely agree with Amy. And I think there's a context here that reverse engineering and forensics analysis and forensics engineering are becoming more critical than ever. The ability to look at what you have designed in a system and then tear it apart and look at it for gaps and holes and problem sets. Or when you're given some software that's already been pre-developed, checking it to make sure it is really going to do what it says it's going to do. That forensics ability becomes more and more a skillset that also you need the verbal skills to explain what it is you're doing and what you found. So the communication side, the systems analysis side, the forensics analysis side, these are all things that are part of system approach that I think you could spend hours on and we still haven't really done a great job on it. So it's one of my fortes is really the whole analysis side of forensics and reverse engineering. >> Trung, real quick, systems thinking, your thoughts. >> Well, I'd like to share with you my experience when I worked in the space station program at NASA. We had two different approaches. One is a compound approach where we design it from the system general point of view where we put components together to be a complex system. But at the same time, we have the (indistinct) approach where we have an engineer who spent time and effort building individual component and they have to be expert in those tiny component that general component they deliver. And in the space station program, we bring together the (indistinct) engineer who designed everything in detail and the system manager who managed the system design from the top down, and we meet in the middle, and together we compromised a lot of differences and we delivered the space station that we are operating today. >> Great insight. And that's the whole teamwork collaboration that Dr. Fleischer was mentioning. Thanks so much for that insight. I wanted to get that out there because I know myself as a parent, I'm always trying to think about what's best for my kids and their friends as they grow up into the workforce. I know educators and leaders in industry would love to know some of the best practices around some of the structural changes. So thanks for that insight. But this topic's about students and helping them prepare. So we heard be multiple discipline, broaden your horizons, think like systems, top down, bottom up, work together as a team, and follow the data. So I got to ask you guys, there's a huge amount of job openings in cybersecurity. It's well-documented. And certainly with the intersection of space and cyber, it's only going to get bigger, right? You're going to see more and more demand for new types of jobs. How do we get high school and college students interested in security as a career? Dr. Fleischer, we'll start with you on this one. I would say really one of the best ways to get students interested in a career is to show them the impact that it's going to have. There's definitely always going to be students who are going to want to do the technology for the technology's sake, but that will limit you to a narrow set of students, and by showing the greater impact that these types of careers are going to have on the types of problems that you're going to be able to solve and the impact you're going to be able to have on the world around you, that's the word that we really need to get out. And a wide variety of students really respond to these messages. So I think it's really kind of reaching out at the elementary, the middle school level, and really kind of getting this idea that you can make a big difference, a big positive difference in the field with some of these careers, is going to be really critical. >> Real question to follow up. What do you think is the best entry point? You mentioned middle. I didn't hear elementary school. There's a lot of discussions around pipelining, and we're going to get into women in tech and underrepresented minorities later. But is it too early, or what's your feeling on this? >> My feeling is the earlier we can normalize it, the better. If you can normalize an interest in computers and technology and building in elementary school, that's absolutely critical. But the drop-off point that we're seeing is between what I would call late elementary and early middle school. And just kind of as an anecdote, I for years ran an outreach program for Girl Scouts in grades four and five and grade six, seven, and eight. And we had 100 slots in each program. And every year the program would sell out for girls in grades four and five, and every year we'd have spots remaining in grades six, seven, and eight. And that's literally where the drop-off is occurring between that late elementary and that middle school range. So that's the area that we need to target to make sure we keep those young women involved and interested as we move forward. >> Bill, how are we going to get these kids interested in security? You mentioned a few programs you got. >> Yeah. >> I mean, who wouldn't want to be a white hat hacker? I mean, that sounds exciting. >> So yeah, great questions. Let's start with some basic principles, though, is let me ask you a question, John. Name for me one white hat, good person hacker, the name, who works in the space industry and is an exemplar for students to look up to. >> You? >> Oh man, I'm feeling really... >> I'm only, I can't imagine a figure- >> (indistinct) the answer because the answer we normally get is the cricket sound. So we don't have individuals we've identified in those areas for them to look up to. >> I was going to be snarky and say most white hackers won't even use their real name, but... >> Right, so there's an aura around their anonymity here. So again, the real question is how do we get them engaged and keep them engaged? And that's what Amy was pointing out to exactly, the engagement and sticking with it. So one of the things that we're trying to do through our competition on the state level and other elements is providing connections. We call them ambassadors. These are people in the business who can contact the students that are in the game or in that challenge environment and let 'em interact and let 'em talk about what they do and what they're doing in life. But give them a challenging game format. A lot of computer-based training, capture the flag stuff is great, but if you can make it hands-on, if you can make it a learn by doing experiment, if you can make it personally involved and see the benefit as a result of doing that challenge and then talk to the people who do that on a daily basis, that's how you get them involved. The second part is part of what we're doing is we're involving partnership companies in the development of the teams. So this year's competition that we're running has 82 teams from across the state of California. Of those 82 teams at six students a team, middle school, high school, and many of those have company partners, and these are practitioners in cybersecurity who are working with those students to participate. It's that adult connectivity. It's that visualization. So at the competition this year, we have the founder of Defcon Red Flag is a participant to talk to the students. We have Vint Cerf, who is, of course, very well-known for something called the internet, to participate. It's really getting the students to understand who's in this, who can I look up to, and how do I stay engaged with them? >> There's definitely a celebrity aspect of it, I will agree. I mean, the influencer aspect here with knowledge is key. Can you talk about these ambassadors, and how far along are you on that program? First of all, the challenge stuff is, anything gamification-wise, we've seen that with hackathons, it just really works well. Creates bonding. People who create together can get sticky and get very high community aspect to it. Talk about this ambassador thing. What is that, industry, is that academic? >> Yeah, absolutely. >> What is this ambassador thing? >> Industry partners that we've identified, some of which, and I won't hit all of 'em, so I'm sure I'll short change this, but Palo Alto, Cisco, Splunk, many of the companies in California, and what we've done is identified schools to participate in the challenge that may not have a strong STEM program or have any cyber program. And the idea of the company is they look for their employees who are in those school districts to partner with the schools to help provide outreach. It could be as simple as a couple hours a week, or it's a team support captain or it's providing computers and other devices to use. And so again, it's really about a constant connectivity and trying to help where some schools may not have the staff or support units in an area to really provide them what they need for connectivity. What that does is it gives us an opportunity to not just focus on it once a year, but throughout the year. So for the competition, all the teams that are participating have been receiving training and educational opportunities in the gamification side since they signed up to participate. So there's a website, there's learning materials, there's materials provided by certain vendor companies like Wireshark and others. So it's a continuum of opportunity for the students. >> You know, I've seen, just randomly, just got a random thought. Robotics clubs are moving then closer into that middle school area, Dr. Fleischer, and in certainly in high schools, it's almost like a varsity sport. E-sports is another one. My son just called me. "I made the JV at the college team." It's big and serious, right? And it's fun. This is the aspect of fun. It's hands-on. This is part of the culture down there. Learn by doing. Is there, like, a group? Is it, like, a club? I mean, how do you guys organize these bottoms-up organically interest topics? >> So here in the college of engineering, when we talk about learn by doing, we have learned by doing both in the classroom and out of the classroom. And if we look at these types of out of the classroom activities, we have over 80 clubs working on all different aspects, and many of these are bottom-up. The students have decided what they want to work on and have organized themselves around that. And then they get the leadership opportunities. The more experienced students train the less experienced students. And it continues to build from year after year after year with them even doing aspects of strategic planning from year to year for some of these competitions. Yeah, it's an absolutely great experience. And we don't define for them how their learn by doing experiences should be. We want them to define it. And I think the really cool thing about that is they have the ownership and they have the interest and they can come up with new clubs year after year to see which direction they want to take it, and we will help support those clubs as old clubs fade out and new clubs come in. >> Trung, real quick, before we go on the next talk track, what do you recommend for middle school, high school, or even elementary? A little bit of coding, Minecraft? I mean, how do you get 'em hooked on the fun and the dopamine of technology and cybersecurity? What's your take on that? >> On this aspect, I'd like to share with you my experience as a junior high and high school student in Texas. The university of Texas in Austin organized a competition for every high school in Texas in every field from poetry to mathematics to science, computer engineering. But it's not about the University of Texas. The University of Texas is only serving as a center for the final competition. They divide the competition to district and then regional and then state. At each level, we have local university and colleges volunteering to host the competition and make it fun for the student to participate. And also they connected the students with private enterprises to raise fund for scholarship. So student who see the competition is a fun event for them, they get exposed to different university hosting the event so that they can see different option for them to consider college. They also get a promise that if they participate, they will be considered for scholarship when they attend university and college. So I think the combination of fun and competition and the scholarship aspect will be a good thing to entice the student to commit to the area of cybersecurity. >> Got the engagement, the aspiration, scholarship, and you mentioned a volunteer. I think one of the things I'll observe is you guys are kind of hitting this as community. I mean, the story of Steve Jobs and Woz building the Mac, they called Bill Hewlett up in Palo Alto. He was in the phone book. And they scoured some parts from him. That's community. This is kind of what you're getting at. So this is kind of the formula we're seeing. So the next question I really want to get into is the women in technology, STEM, underrepresented minorities, how do we get them on cybersecurity career path? Is there a best practices there? Bill, we'll start with you. >> Well, I think it's really interesting. First thing I want to add is, if I could, just a clarification. What's really cool, the competition that we have and we're running, it's run by students from Cal Poly. So Amy referenced the clubs and other activities. So many of the organizers and developers of the competition that we're running are the students, but not just from engineering. So we actually have theater and liberal arts majors and technology for liberal arts majors who are part of the competition, and we use their areas of expertise, set design and other things, visualization, virtualization. Those are all part of how we then teach and educate cyber in our gamification and other areas. So they're all involved and they're learning, as well. So we have our students teaching other students. So we're really excited about that. And I think that's part of what leads to a mentoring aspect of what we're providing where our students are mentoring the other students. And I think it's also something that's really important in the game. The first year we held the game, we had several all-girl teams, and it was really interesting because A, they didn't really know if they could compete. I mean, this is their reference point. We don't know if. They did better than anybody. I mean, they just, they knocked the ball out of the park. The second part, then, is building that confidence level that can, going back and telling their cohorts that, hey, it's not this obtuse thing you can't do. It's something real that you can compete and win. And so again, it's building that camaraderie, that spirit, that knowledge that they can succeed. And I think that goes a long way. And Amy's programs and the reach out and the reach out that Cal Poly does to schools to develop, I think that's what it really is going to take. It is going to take that village approach to really increase diversity and inclusivity for the community. >> Dr. Fleischer, I'd love to get your thoughts. You mentioned your outreach program and the drop-off, some of those data. You're deeply involved in this. You're passionate about it. What's your thoughts on this career path opportunity for STEM? >> Yeah, I think STEM is an incredible career path opportunity for so many people. There's so many interesting problems that we can solve, particularly in cyber and in space systems. And I think we have to meet the kids where they are and kind of show them what the exciting part is about it, right? But Bill was alluding to this when he was talking about trying to name somebody that you can point to. And I think having those visible people where you can see yourself in that is absolutely critical, and those mentors and that mentorship program. So we use a lot of our students going out into California middle schools and elementary schools. And you want to see somebody that's like you, somebody that came from your background and was able to do this. So a lot of times we have students from our National Society of Black Engineers or our Society of Hispanic Professional Engineers or our Society of Women Engineers, which we have over 1,000 members, 1,000 student members in our Society of Women Engineers who are doing these outreach programs. But like I also said, it's hitting them at the lower levels, too, and Girl Scouts is actually distinguishing themselves as one of the leading STEM advocates in the country. And like I said, they developed all these cybersecurity badges starting in kindergarten. There's a cybersecurity badge for kindergartener and first graders. And it goes all the way up through late high school. The same thing with space systems. And they did the space systems in partnership with NASA. They did the cybersecurity in partnership with Palo Alto Networks. And what you do is you want to build these skills that the girls are developing, and like Bill said, work in girl-led teams where they can do it, and if they're doing it from kindergarten on, it just becomes normal, and they never think, well, this is not for me. And they see the older girls who are doing it and they see a very clear path leading them into these careers. >> Yeah, it's interesting, you used the word normalization earlier. That's exactly what it is. It's life, you get life skills and a new kind of badge. Why wouldn't you learn how to be a white hat hacker or have some fun or learn some skills? >> Amy: Absolutely. >> Just in the grind of your fun day. Super exciting. Okay, Trung, your thoughts on this. I mean, you have a diverse, diversity brings perspective to the table in cybersecurity because you have to think like the other guy, the adversary. You got to be the white hat. You can't be a white hat unless you know how black hat thinks. So there's a lot of needs here for more points of view. How are we going to get people trained on this from underrepresented minorities and women? What's your thoughts? >> Well, as a member of the IEEE Professional Society of Electrical and Electronic Engineers, every year we participate in the engineering week. We deploy our members to local junior high school and high school to talk about our project to promote the study of engineering. But at the same time, we also participate in the science fair that the state of Texas is organizing. Our engineer will be mentoring students, number one, to help them with the project, but number two, to help us identify talent so that we can recruit them further into the field of STEM. One of the participation that we did was the competition of the, what they call Future City, where students will be building a city on a computer simulation. And in recent year, we promote the theme of smart city where city will be connected the individual houses and together into the internet. And we want to bring awareness of cybersecurity into that competition. So we deploy engineer to supervise the people, the students who participate in the competition. We bring awareness not in the technical detail level, but in what we've call the compound level so student will be able to know what required to provide cybersecurity for the smart city that they are building. And at the same time, we were able to identify talent, especially talent in the minority and in the woman, so that we can recruit them more actively. And we also raise money for scholarship. We believe that scholarship is the best way to entice student to continue education at the college level. So with scholarship, it's very easy to recruit them to the field and then push them to go further into the cybersecurity area. >> Yeah, I mean, I see a lot of the parents like, oh, my kid's going to go join the soccer team, we get private lessons, and maybe they'll get a scholarship someday. Well, they only do half scholarships. Anyway. I mean, if they spent that time doing these other things, it's just, again, this is a new life skill, like the Girl Scouts. And this is where I want to get into this whole silo breaking down, because Amy, you brought this up, and Bill, you were talking about it, as well. You got multiple stakeholders here with this event. You've got public, you've got private, and you've got educators. It's the intersection of all of them. It's, again, if those silos break down, the confluence of those three stakeholders have to work together. So let's talk about that. Educators. You guys are educating young minds. You're interfacing with private institutions and now the public. What about educators? What can they do to make cyber better? 'Cause there's no real manual. I mean, it's not like this court is a body of work of how to educate cybersecurity. Maybe it's more recent. There's cutting edge best practices. But still, it's an evolving playbook. What's your thoughts for educators? Bill, we'll start with you. >> Well, I'm going to turn to Amy and let her go first. >> Let you go. >> That's fine. >> I would say as educators, it's really important for us to stay on top of how the field is evolving, right? So what we want to do is we want to promote these tight connections between educators and our faculty and applied research in industry and with industry partnerships. And I think that's how we're going to make sure that we're educating students in the best way. And you're talking about that inner, that confluence of the three different areas. And I think you have to keep those communication lines open to make sure that the information on where the field is going and what we need to concentrate on is flowing down into our educational process. And that works in both ways, that we can talk as educators and we can be telling industry what we're working on and what types of skills our students have and working with them to get the opportunities for our students to work in industry and develop those skills along the way, as well. And I think it's just all part of this really looking at what's going to be happening and how do we get people talking to each other? And the same thing with looking at public policy and bringing that into our education and into these real hands-on experiences. And that's how you really cement this type of knowledge with students, not by talking to them and not by showing them, but letting them do it. It's this learn by doing and building the resiliency that it takes when you learn by doing. And sometimes you learn by failing, but you just pick up and you keep going. And these are important skills that you develop along the way. >> You mentioned sharing, too. That's the key. Collaborating and sharing knowledge. It's an open world and everyone's collaborating. Bill, private-public partnerships. I mean, there's a real, private companies, you mentioned Palo Alto Networks and others. There's a real intersection there. They're motivated. They could, there's scholarship opportunities. Trung points to that. What is the public-private educator view there? How do companies get involved and what's the benefit for them? >> Well, that's what a lot of the universities are doing is to bring in as part of either their cyber centers or institutes people who are really focused on developing and furthering those public-private partnerships. That's really what my role is in all these things is to take us to a different level in those areas, not to take away from the academic side, but to add additional opportunities for both sides. Remember, in a public-private partnership, all entities have to have some gain in the process. Now, what I think is really interesting is the timing on particularly this subject, space and cybersecurity. This has been an absolute banner year for space. The standup of Space Force, the launch of commercial partnership, you know, commercial platforms delivering astronauts to the space station, recovering them, and bringing them back. The ability of a commercial satellite platform to be launched. Commercial platforms that not only launch but return back to where they're launched from. These are things that are stirring the hearts of the American citizens, the kids, again, they're getting interested. They're seeing this and getting enthused. So we have to seize upon that and we have to find a way to connect that. Public-private partnerships is the answer for that. It's not one segment that can handle it all. It's all of them combined together. If you look at space, space is going to be about commercial. It's going to be about civil. Moving from one side of the Earth to the other via space. And it's about government. And what's really cool for us, all those things are in our backyard. That's where that public-private comes together. The government's involved. The private sector's involved. The educators are involved. And we're all looking at the same things and trying to figure out, like this forum, what works best to go to the future. >> You know, if people are bored and they want to look for an exciting challenge, you couldn't have laid it out any clearer. It's the most exciting discipline. It's everything. I mean, we just talk about space. GPS is, everything we do is involved, has to do with satellites. (laughs) >> I have to tell you a story on that right? We have a very unique GPS story right in our backyard. So our sheriff is the son of the father of GPS for the Air Force. So you can't get better than that when it comes to being connected to all those platforms. So we really want to say, you know, this is so exciting for all of us because it gives everybody a job for a long time. >> You know, the kids that think TikTok's exciting, wait till they see what's going on here with you guys, this program. Trung, final word on this from the public side. You're at the Air Force. You're doing research. Are you guys opening it up? Are you integrating into the private and educational sectors? How do you see that formula playing out? And what's the best practice for students and preparing them? >> I think it's the same in every university in the engineering program will require our students to do the final project before graduation. And in this kind of project, we send them out to work in the private industry, the private company that sponsor them. They get the benefit of having an intern working for them and they get the benefit of reviewing the students as the prospective employee in the future. So it's good for the student to gain practical experience working in this program. Sometimes we call that a co-op program. Sometimes we call that a capstone program. And the company will accept the student on a trial basis, giving them some assignment and then pay them a little bit of money. So it's good for the student to earn some extra money, to have some experience that they can put on their resume when they apply for the final, for the job. So the collaboration between university and private sector is really important. When I join a faculty normally there already exist that connection. It came from normally, again, from the dean of engineering, who would wine and dine with companies, build up relationship, and sign up agreement. But it's us professor who have to do the (indistinct) approach to do a good performance so that we can build up credibility to continue the relationship with those company and the student that we selected to send to those company. We have to make sure that they will represent the university well, they will do a good job, and they will make a good impression. >> Thank you very much for a great insight, Trung, Bill, Amy. Amazing topic. I'd like to end this session with each of you to make a statement on the importance of cybersecurity to space. We'll go Trung, Bill, and Amy. Trung, the importance of cybersecurity to space, brief statement. >> The importance of cybersecurity, we know that it's affecting every component that we are using and we are connecting to, and those component, normally we use them for personal purpose, but when we enter the workforce, sometimes we connect them to the important system that the government or the company are investing to be put into space. So it's really important to practice cybersecurity, and a lot of time, it's very easy to know the concept. We have to be careful. But in reality, we tend to forget to to practice it the way we forget how to drive a car safely. And with driving a car, we have a program called defensive driving that requires us to go through training every two or three years so that we can get discount. Every organization we are providing the annual cybersecurity practice not to tell people about the technology, but to remind them about the danger of not practicing cybersecurity and it's a requirement for every one of us. >> Bill, the importance of cybersecurity to space. >> It's not just about young people. It's about all of us. As we grow and we change, as I referenced it, we're changing from an analog world to a digital world. Those of us who have been in the business and have hair that looks like mine, we need to be just as cognizant about cybersecurity practice as the young people. We need to understand how it affects our lives, and particularly in space, because we're going to be talking about people, moving people to space, moving payloads, data transfer, all of those things. And so there's a whole workforce that needs to be retrained or upskilled in cyber that's out there. So the opportunity is ever expansive for all of us. >> Amy, the importance of cybersecurity in space. >> I mean the emphasis of cybersecurity is space just simply can't be over emphasized. There are so many aspects that are going to have to be considered as systems get ever more complex. And as we pointed out, we're putting people's lives at stake here. This is incredibly, incredibly complicated and incredibly impactful, and actually really exciting, the opportunities that are here for students and the workforce of the future to really make an enormous impact on the world around us. And I hope we're able to get that message out to students and to children today, that these are really interesting fields that you need to consider. >> Thank you very much. I'm John Furrier with theCUBE, and the importance of cybersecurity and space is the future of the world's all going to happen in and around space with technology, people, and society. Thank you to Cal Poly, and thank you for watching the Cybersecurity and Space Symposium 2020. (bright music)

Published Date : Sep 24 2020

SUMMARY :

the globe, it's theCUBE, and the director of the This is for the next generation, and the networks associated with it. By the way, I just want to give you props And I think Amy's going to tell you, You guys have a great and out of the classroom. and you got a lot of talent, and on the ground control station, and in the virtual hallways One of the ways that we engineering is the theme. and to be able to work in teams And Bill also mentioned the cloud. and the components that we have, in changes in the source code. and looking at the greater impact and what you found. thinking, your thoughts. and the system manager who and by showing the greater impact and we're going to get into women in tech So that's the area that we need to target going to get these kids to be a white hat hacker? the name, who works in the space industry because the answer we normally get and say most white hackers and see the benefit as a First of all, the challenge stuff is, and other devices to use. This is the aspect of fun. and out of the classroom. and make it fun for the Jobs and Woz building the Mac, and developers of the program and the drop-off, that the girls are developing, and a new kind of badge. Just in the grind of your fun day. and then push them to go further and now the public. Well, I'm going to turn and building the resiliency that it takes What is the public-private and we have to find a way to connect that. It's the most exciting discipline. So our sheriff is the You know, the kids that and the student that we selected on the importance of the way we forget how Bill, the importance and have hair that looks like mine, Amy, the importance of of the future to really and the importance of

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
AmyPERSON

0.99+

SpaceXORGANIZATION

0.99+

BoeingORGANIZATION

0.99+

Society of Hispanic Professional EngineersORGANIZATION

0.99+

JPLORGANIZATION

0.99+

NASAORGANIZATION

0.99+

TexasLOCATION

0.99+

PG&EORGANIZATION

0.99+

LockheedORGANIZATION

0.99+

Bill BrittonPERSON

0.99+

Society of Women EngineersORGANIZATION

0.99+

CaliforniaLOCATION

0.99+

CiscoORGANIZATION

0.99+

Cal PolyORGANIZATION

0.99+

BillPERSON

0.99+

FleischerPERSON

0.99+

RaytheonORGANIZATION

0.99+

Amy FleischerPERSON

0.99+

JohnPERSON

0.99+

John FurrierPERSON

0.99+

California Cybersecurity InstituteORGANIZATION

0.99+

TrungPERSON

0.99+

Palo AltoLOCATION

0.99+

Northrop GrummanORGANIZATION

0.99+

IEEE Professional Society of Electrical and Electronic EngineersORGANIZATION

0.99+

Air Force Research LabsORGANIZATION

0.99+

National Society of Black EngineersORGANIZATION

0.99+

Palo Alto NetworksORGANIZATION

0.99+

firstQUANTITY

0.99+

82 teamsQUANTITY

0.99+

40 milesQUANTITY

0.99+

six studentsQUANTITY

0.99+

Virgin GalacticORGANIZATION

0.99+

hundredsQUANTITY

0.99+

US Air Force AcademyORGANIZATION

0.99+

OneQUANTITY

0.99+

one hourQUANTITY

0.99+

tomorrowDATE

0.99+

Northrop GrummanORGANIZATION

0.99+

Cal Poly Space SystemsORGANIZATION

0.99+

SplunkORGANIZATION

0.99+

100%QUANTITY

0.99+

US Air ForceORGANIZATION

0.99+

Palo Alto NetworksORGANIZATION

0.99+

100 slotsQUANTITY

0.99+

EarthLOCATION

0.99+

University of TexasORGANIZATION

0.99+

Cybersecurity InstituteORGANIZATION

0.99+

todayDATE

0.99+

FirstQUANTITY

0.99+

second partQUANTITY

0.99+

bothQUANTITY

0.99+

Power Panel | Commvault FutureReady


 

>>from around the globe. It's the Cube with digital coverage of CONMEBOL. Future ready 2020. Brought to you by combo. >>Hi and welcome back. I'm Stew Minuteman, and we're at the Cube's coverage of Con Volt Future Ready. You've got the power panel to really dig in on the product announcements that happened at the event today. Joining me? We have three guests. First of all, we have Brenda Rajagopalan. He's the vice president of products. Sitting next to him is Don Foster, vice president of Storage Solutions. And in the far piece of the panel Mersereau, vice president of Global Channels and Alliances. All three of them with Conn Volt. Gentlemen, thanks all three of you for joining us. Exactly. All right, so first of all, great job on the launch. You know, these days with a virtual event doing, you know, the announcements, the engagement with the press and analyst, you know, having demos, customer discussions. It's a challenge to put all those together. And it has been, you know, engaging in interesting watch today. So we're going to start with you. You've been quite busy today explaining all the pieces, so just at a very high level if you put this really looks like the culmination of the update with Conn Volt portfolio new team new products compared to kind of a year, year and 1/2 ago. So just if you could start us off with kind of the high points, >>thank you still, yeah, absolutely exciting day for us today. You did comrade multiple reasons for that excitement and go through that we announced an exciting new portfolio today knows to not the culmination. It's a continuation off our journey, a bunch of new products that we launched today Hyper scaler X as a new integrated data protection appliance. We've also announced new offerings in data protection, backup and recovery, disaster recovery and complete data protection and lots of exciting updates for Hedwig and a couple of weeks like we introduced updates for metallic. So, yes, it's been a really exciting pain. Also, today happens to be the data, and we got to know that we are the leader in Gartner Magic Quadrant for the ninth consecutive. I am so a lot of goodness today for us. >>Excellent. Lots of areas that we definitely want to dig deep in to the pieces done. You know, we just heard a little bit about Hedvig was an acquisition a year ago that everybody's kind of looking at and saying Okay, you know, will this make them compete against some of their traditional partners? How we get integrated in So, baby, just give us one level deeper on the Hedvig piece on what that means to the portfolio? Yeah, sure, So I >>guess I mean, one of the key things that the random mentioned was the fact that had hyper scale that's is built off the head Day files. So that's a huge milestone for us. As we teased out maybe 10 months ago. Remember, Tomball, Go on the Cube and talking about, you know, kind of what our vision and strategy was of unifying data and storage management. Those hyper hyper scale X applying is a definite milestone improving out that direction. But beyond just the hyper scale ECs, we've also been driving on some of the more primary or modern workloads such as containers and the really interesting stuff we've come out with your recently is the kubernetes native integration that ties in all of the advanced component of the head to distribute storage architecture on the platform itself across multi cloud and on premise environments, making it really easy and policy driven. Um, for Dev, ops users and infrastructure users, the tie ins applications from a group, Friction >>Great and Mercer. There's some updates to the partner program and help us understand how all of these product updates they're gonna affect the kind of the partnerships and alliances beasts that you want. >>Absolutely. So in the time since our last meeting that go in the fall, which is actually right after I had just doing combo, we spent a good portion of the following six months really talking with partners, understanding the understand the impact of the partner program that we introduced last summer, looking at the data and really looking at barriers to evolve the program, which fell around three difference specific. Once you bet one was simplicity of the simplicity of the program, simplicity of understanding, rewards, levers and so forth. The second was paying for value was really helping, helping our partners to be profitable around things like deal registration on other benefits and then third was around co investment. So making sure that we get the right members in place to support our partners and investing in practices. Another training, another enablement around combo and we launched in over these things last week is a part of an evolution of that program. Today is a great follow on because in addition to all of the program evolutions that we we launched last week now we have an opportunity with our partners to have many more opportunities or kind of a thin into the wedge to open up new discussions with our customers now around all of these different use cases and capabilities. So back to that simplification angle, really driving more and more opportunities for those partners toe specific conversations around use cases. >>Okay, for this next question, I think it makes sense for you to start. Maybe maybe Don, you can get some commentary in two. But when he's firstly the announcements, there are some new products in the piece that you discuss but trying to understand, you know, when you position it, you know, do you call the portfolio? Is it a platform? You know, if I'm an existing Conn Volt customer, you know, how do I approach this? If I use something like metallic, how does that interplay with some of the new pieces that were discussed today. >>Sure, I can take the business. I'm sure Don and mostly will have more data to it. The simplest way to think about it is as a port for you. But contrary to how you would think about portfolio as independent products, what we have is a set off data management services granular. We're very aligned to the use case, which can all inter operate with each other. So maybe launched backup and recovery and disaster recovery. These can be handled separately, purchased separately and deployed standalone or for customers who want a combination of those capabilities. We also have a complete data protection are fine storage optimization, data governance E discovery in complaints are data management services that build on top off any of these capabilities now a very differentiating factor in our platform owners. All the services that you're talking about are delivered off the same software to make it simpler to manage to the same year. So it's very easy to start with one service and then just turn on the license and go to other services so I can understand the confusion is coming from but it's all the same. The customer simplicity and flexibility in mind, and it's all delivered off the same platform. So it is a portfolio built on a single Don. Would you like to add more to it? >>Yeah, I think the interesting thing due to add on top of that is where we're going with Hedvig Infrastructure, the head of distributed storage platform, uh, to to run this point, how everything is integrated and feed and work off of one another. That's the same idea that we have. We talked about unifying data and storage manager. So the intricate storage architecture components the way data might be maneuvered, whether it's for kubernetes for virtual machines, database environments, secondary storage, you name it, um, we are. We're quickly working to continue driving that level of of unification and integration between the portfolio and heads storage, distribute storage platforms and also deliver. So what you're seeing today going back to, I think wrong his first point. It's definitely not the culmination. It's just another step in the direction as we continue to innovate and integrate this >>product, and I think for our partners what this really does, it allows them to sell around customer use cases because it'll ask now if I have a d. Our use case. I can go after just PR. If I have a backup use case, I can just go after backup, and I don't have to try to sell more than that. Could be on what the customer is looking for in parallel that we can steal these things in line with the customer use case. So the customer has a lot of remote offices. They want to scale Hedvig across those they want to use the art of the cloud. They can scale these things independently, and it really gives us a lot of optionality that we didn't have before when we had a few monolithic products. >>Excellent. Really reminds me more of how I look at products if I was gonna go buy it from some of the public cloud providers living in a hybrid cloud. World, of course, is what your customers are doing. Help us understand a little bit, you know, Mercer talked about metallic and the azure partnership, but for the rest of the products, the portfolio that we're talking about, you know, does this >>kind >>of work seamlessly across my own data center hosting providers Public Cloud, you know, how does this fit into the cloud environment for your customer? >>Yes, it does. And I can start with this one goes to, um it's our strategy is cloud first, right? And you see it in every aspect of our product portfolio. In fact, I don't know if you got to see a keynote today, but Ron from Johns Hopkins University was remarking that comment has the best cloud native architectures. And that's primarily because of the innovation that we drive into the multi cloud reality. We have very deep partnerships with pretty much all the cloud vendors, and we use that for delivering joint innovation, a few things that when you think of it from a hybrid customers perspective, the most important need for them is to continue working on pram while still leveraging the cloud. And we have a lot of optimization is built into that, and then the next step of the journey is of course, making sure that you can recover to the cloud would be it work load. Typically your data quality and there's a lot of automation that we provide to our solutions and finally, Of course, if you're already in the cloud, whether you're running a science parents or cloud native, our software protects across all those use cases, either true sass with metallic auto downloadable software, backup and recovery so we can cover the interest victims of actual presence. You. We do definitely help customers in every stage of their hybrid cloud acceleration journey. >>And if you take a look at the Hedvig protect if you take a look at the head back to, um, the ability to work in a cloud native fast, it is essentially a part of the DNA of that storage of the storage, right? So whether you're running on Prem, whether you're running it about adjacent, set up inside the cloud head, that can work with any compute environment and any storage environment that you went to essentially then feed, we build this distributed storage, and the reason that becomes important. It's pretty much highlighted with our announcement around the kubernetes and container support is that it makes it really easy to start maneuvering data from on Prem to the cloud, um, from cloud to cloud region to region, sort of that high availability that you know as customers make cloud first a reality and their organizations starts to become a critical requirement or ensuring the application of and some of the things that we've done now with kubernetes in making all of our integration for how we deliver storage for the kubernetes and container environments and being that they're completely kubernetes native and that they can support a Google in AWS and Azure. And of course, any on premises community set up just showcases the value that we can provide in giving them that level of data portability. And it basically provides a common foundation layer, or how any sort of the Dev ops teams will be operating in the way that those state full container state workloads. Donna Oh, sorry. Go >>ahead, mark area >>because you mentioned the metallic and azure partnership announcement and I just want to get on that. And one thing that run dimension, which is we are really excited about the announcement of partnership with Microsoft and all the different news cases that opens up that are SAS platform with Azure with office 3 65 and all of the great application stack it's on. If you're at the same time, to run this point. We are a multi cloud company. And whether that is other of the hyper scale clouds Mess GC, P. Ali at Oracle and IBM, etcetera, or Oliver, Great service writer burners. We continue to believe in customer choice, and we'll continue to drive unique event innovations across all of those platforms. >>All right, Don, I was wondering if we could just dig in a little bit more on some other kubernetes pieces you were talking about. Let me look at just the maturation of storage in general. You know, how do we had state back into containers in kubernetes environments? Help us see, You know what you're hearing from your customers. And you know how you how you're ready to meet their needs toe not only deliver storage, but as you say, Really? You know, full data protection in that environment? >>Certainly it So I mean, there's been a number of enhancements that happened in the kubernetes environment General over the last two years. One of the big ones was the creation of what the visit environment calls a persistent volume. And what that allows you to do is to really present storage to a a communities application. Do it be typically through what's called a CSR container storage interface that allows for state full data to be written, storage and be handled and reattached applications as you leverage them about that kubernetes. Um, as you can probably imagine that with the addition of the additional state full applications, some of the overall management now of stateless and state collapse become very talent. And that's primarily because many customers have been using some of the more traditional storage solutions to try to map that into these new state. Full scenario. And as you start to think about Dev ops organization, most Dev ops organizations want to work in the environment of their choice. Whether that's Google, whether that's AWS, Microsoft, uh, something that might be on Prem or a mix of different on Prem environments. What you typically find, at least in the kubernetes world, is there's seldom ever one single, very large kubernetes infrastructure cluster that's set to run, Dev asked. The way and production all at once. You usually have this spread out across a fairly global configuration, and so that's where some of these traditional mechanisms from traditional storage vendors really start to fall down because you can apply the same level of automation and controls in every single one of those environments. When you don't control the storage, let's say and that's really where interfacing Hedvig and allowing that sort of extension distribute storage platform brings about all of this automation policy control and really storage execution definition for the state. Full statehood workloads so that now managing the stateless and the state full becomes pretty easy and pretty easy to maintain when it comes to developing another Dev branch or simply trying to do disaster recovery or a J for production, >>any family actively do. That's a very interesting response, and the reality is customers are beginning to experiment with business. Very often they only have a virtual environment, and now they're also trying to expand into continuous. So Hedwig's ability to service primary storage for virtualization as well as containers actually gives their degree of flexibility and freedom for customers to try out containers and to start their contingent. Thank you familiar constructs. Everything is mellow where you just need to great with continuous >>Alright, bring a flexibility is something that I heard when you talk about the portfolio and the pricing as to how you put these pieces together. You actually talked about in the presentation this morning? Aggressive pricing. If you talk about, you know, kind of backup and recovery, help us understand, You know, convo 2020 how you're looking at your customers and you know how you put together your products, that to meet what they need at that. As you said, aggressive pricing? >>Absolutely. And you use this phrase a little bit earlier is to blow like flexibility. That's exactly what we're trying to get to the reason why we are reconstructing our portfolio so that we have these very granular use case aligned data management services to provide the cloud like flexibility. Customers don't have the same data management needs all the time. Great. So they can pick and choose the exact solution that need because there are delivered on the same platform that can enable out the solution investment, you know, And that's the reality. We know that many of our customers are going to start with one and keep adding more and more services, because that's what we see as ongoing conversations that gives us the ability to really praise the entry products very aggressively when compared to competition, especially when we go against single product windows. This uses a lot of slammed where we can start with a really aggressively priced product and enable more capabilities as we move forward to give you an idea, we launched disaster recovery today. I would say that compared to the so the established vendors India, we would probably come in at about 25 to 40% of the Priceline because it depends on the environment and what not. But you're going to see that that's the power of bringing to the table. You start small and then depending on what your needs are, you have the flexibility to run on either. More data management capabilities are more workloads, depending on what your needs will be. I think it's been a drag from a partner perspective, less with muscle. If you want a little bit more than that, >>yes, I mean, that goes back to the idea of being ableto simply scale across government use functionality. For example, things like the fact that our disaster recovery offering the Newman doesn't require backup really allows us to have those Taylor conversations around use cases, applications >>a >>zealous platforms. You think about one of the the big demands that we've had coming in from customers and partners, which is help me have a D R scenario or a VR set up in my environment that doesn't require people to go put their hands on boxes and cables, which was one of those things that a year ago we were having. This conversation would not necessarily have been as important as it is now, but that ability to target those specific, urgent use cases without having to go across on sort of sell things that aren't necessarily associated with the immediate pain points really makes those just makes us ineffective. Offer. >>Yeah, you bring up some changing priorities. I think almost everybody will agree that the number one priority we're hearing from customers is around security. So whether I'm adopting more cloud, I'm looking at different solutions out there. Security has to be front and center. Could we just kind of go down the line and give us the update as to how security fits and all the pieces we've been discussing? >>I guess I'm talking about change, right, so I'll start. The security for us is built into everything that we do the same view you're probably going to get from each of us because security is burden. It's not a board on, and you would see it across a lot of different images. If you take our backup and recovery and disaster recovery, for instance, a lot of ransomware protection capabilities built into the solution. For instance, we have anomaly detection that is built into the platform. If we see any kind of spurious activity happening all of a sudden, we know that that might be a potential and be reported so that the customer can take a quick look at air Gap isolation, encryption by default. So many features building. And when you come to disaster recovery, encryption on the wire, a lot of security aspects we've been to every part of the portfolio don't. >>Consequently, with Hedvig, it's probably no surprise that when that this platform was developed and as we've continued development, security has always been at the core of what we're doing is stored. So what? It's for something as simple as encryption on different volume, ensuring the communication between applications and the storage platform itself, and the way the distributors towards platform indicates those are all incredibly secured. Lock down almost such for our own our own protocols for ensuring that, um, you know, only we're able to talk within our own, our own system. Beyond that, though, I mean it comes down to ensure that data in rest data in transit. It's always it's always secure. It's also encrypted based upon the level of control that using any is there one. And then beyond just the fact of keeping the data secure. You have things like immutable snapshots. You have declared of data sovereignty to ensure that you can put essentially virtual fence barriers for where data can be transported in this highly distributed platform. Ah, and then, from a user perspective, there's always level security for providing all seeking roll on what groups organization and consume storage or leverage. Different resource is the storage platform and then, of course, from a service provider's perspective as well, providing that multi tenanted access s so that users can have access to what they want when they want it. It's all about self service, >>and the idea there is that obviously, we're all familiar with the reports of increased bad actors in the current environment to increased ransomware attacks and so forth. And be a part of that is addressed by what wrong and done said in terms of our core technology. Part of that also, though, is addressed by being able to work across platforms and environments because, you know, as we see the acceleration of state tier one applications or entire data center, evacuations into service provider or cloud environments has happened. You know, this could have taken 5 10 years in a in a normal cycle. But we've seen this happen overnight has cut this. Companies have needed to move those I T environments off science into managed environments and our ability to protect the applications, whether they're on premises, whether they're in the cloud or in the most difficult near where they live. In both cases, in both places at once, is something that it's really important to our customers to be able to ensure that in the end, security posture >>great Well, final thing I have for all three of you is you correctly noted that this is not the end, but along the journey that you're going along with your customers. So you know, with all three of you would like to get a little bit. Give us directionally. What should we be looking at? A convo. Take what was announced today and a little bit of look forward towards future. >>Directionally we should be looking at a place where we're delivering even greater simplicity to our customers. And that's gonna be achieved through multiple aspects. 1st 1 it's more technologies coming together. Integrating. We announced three important integration story. We announced the Microsoft partnership a couple of weeks back. You're gonna see us more longer direction. The second piece is technology innovation. We believe in it. That's what Differentiators has a very different company and we'll continue building it along the dimensions off data awareness, data, automation and agility. And the last one continued obsession with data. What more can we do with it? How can we drive more insights for our customers We're going to see is introducing more capabilities along those dimensions? No. >>And I think Rhonda tying directly into what you're highlighting there. I'm gonna go back to what we teased out 10 months ago at calm Bolt. Go there in Colorado in this very on this very program and talk about how, in the unification of ah ah, data and storage management, that vision, we're going to make more and more reality. I think the, uh, the announcements we've made here today let some of the things that we've done in between the lead up to this point is just proof of our execution. And ah, I can happily and excitedly tell you, we're just getting warmed up. It's going to be, ah, gonna be some fun future ahead. >>And I think studio in the running that out with the partner angle. Obviously, we're going to continue to produce great products and solutions that we're going to make our partners relevant. In those conversations with customers, I think we're also going to continue to invest in alternative business models, services, things like migration services, audit services, other things that build on top of this core technology to provide value for customers and additional opportunities for our partners >>to >>build out their their offerings around combo technologies. >>All right, well, thank you. All three of you for joining us. It was great to be able to dig in, understand those pieces. I know you've got lots of resources online for people to learn more. So thank you so much for joining us. Thank you too. Thank you. Alright, and stay with us. So we've got one more interview left for the Cube's coverage of con vault. Future Ready, students. Mannan. Thanks. As always for watching the Cube. Yeah, Yeah, yeah, yeah, yeah, yeah

Published Date : Jul 21 2020

SUMMARY :

Brought to you by combo. You've got the power panel to really dig in on the product announcements that happened a bunch of new products that we launched today Hyper scaler X as a new integrated ago that everybody's kind of looking at and saying Okay, you know, will this make them compete against guess I mean, one of the key things that the random mentioned was the fact that had hyper how all of these product updates they're gonna affect the kind of the partnerships and alliances beasts that you So making sure that we get the right members in place to support our partners and investing in products in the piece that you discuss but But contrary to how you would think about portfolio as It's just another step in the direction as we continue to innovate So the customer has a lot of remote offices. but for the rest of the products, the portfolio that we're talking about, you know, And that's primarily because of the innovation that we drive into the multi cloud reality. critical requirement or ensuring the application of and some of the things that we've done now with kubernetes about the announcement of partnership with Microsoft and all the different news cases ready to meet their needs toe not only deliver storage, but as you say, Really? One of the big ones was the creation of what the visit environment and the reality is customers are beginning to experiment with business. the pricing as to how you put these pieces together. the same platform that can enable out the solution investment, you know, And that's the reality. offering the Newman doesn't require backup really allows us to have those Taylor conversations around use cases, have been as important as it is now, but that ability to target those specific, all the pieces we've been discussing? And when you come to disaster recovery, encryption on the wire, a lot of security aspects we've You have declared of data sovereignty to ensure that you can put essentially virtual fence barriers for where and the idea there is that obviously, we're all familiar with the reports of increased So you know, with all three of you would like to get a little bit. And the last one continued obsession with data. I'm gonna go back to what we And I think studio in the running that out with the partner angle. So thank you so much for joining us.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Brenda RajagopalanPERSON

0.99+

MicrosoftORGANIZATION

0.99+

IBMORGANIZATION

0.99+

OracleORGANIZATION

0.99+

Stew MinutemanPERSON

0.99+

Don FosterPERSON

0.99+

last weekDATE

0.99+

AWSORGANIZATION

0.99+

ColoradoLOCATION

0.99+

RonPERSON

0.99+

DonnaPERSON

0.99+

second pieceQUANTITY

0.99+

Conn VoltORGANIZATION

0.99+

twoQUANTITY

0.99+

six monthsQUANTITY

0.99+

MannanPERSON

0.99+

TodayDATE

0.99+

thirdQUANTITY

0.99+

GoogleORGANIZATION

0.99+

three guestsQUANTITY

0.99+

Johns Hopkins UniversityORGANIZATION

0.99+

a year agoDATE

0.99+

5 10 yearsQUANTITY

0.99+

todayDATE

0.99+

10 months agoDATE

0.99+

one serviceQUANTITY

0.99+

RhondaPERSON

0.98+

a year agoDATE

0.98+

MercerORGANIZATION

0.98+

secondQUANTITY

0.98+

FrictionORGANIZATION

0.98+

threeQUANTITY

0.98+

HedvigORGANIZATION

0.98+

office 3 65TITLE

0.98+

HedwigORGANIZATION

0.98+

2020DATE

0.98+

DonPERSON

0.97+

OneQUANTITY

0.97+

last summerDATE

0.97+

first pointQUANTITY

0.97+

oneQUANTITY

0.97+

eachQUANTITY

0.97+

Global Channels and AlliancesORGANIZATION

0.97+

singleQUANTITY

0.96+

both casesQUANTITY

0.96+

Hedvig InfrastructureORGANIZATION

0.96+

Storage SolutionsORGANIZATION

0.96+

both placesQUANTITY

0.95+

Future ReadyORGANIZATION

0.95+

IndiaLOCATION

0.94+

40%QUANTITY

0.93+

about 25QUANTITY

0.92+

MersereauPERSON

0.91+

FirstQUANTITY

0.91+

Mess GCORGANIZATION

0.9+

CONMEBOLORGANIZATION

0.88+

PricelineORGANIZATION

0.88+

firstQUANTITY

0.87+

this morningDATE

0.87+

P. AliPERSON

0.86+

single productQUANTITY

0.85+

CubeCOMMERCIAL_ITEM

0.84+

last two yearsDATE

0.83+

PremORGANIZATION

0.83+

OliverORGANIZATION

0.83+

Mark Penny, University of Leicester | Commvault GO 2019


 

>>live >>from Denver, Colorado. It's the Q covering com vault Go 2019. Brought to you by combo. >>Hey, welcome to the Cube. Lisa Martin in Colorado for CONMEBOL Go 19. Statement. A man is with me this week, and we are pleased to welcome one of combos, longtime customers from the University of Leicester. We have Mark Penny, the systems specialist in infrastructure. Mark. Welcome to the Cube. >>Hi. It's good to be here. >>So you have been a convo customer at the UNI for nearly 10 years now, just giving folks an idea of about the union got 51 different academic departments about five research institutes. Cool research going on, by the way and between staff and students. About 20,000 folks, I'm sure all bringing multiple devices onto the campus. So talk to us about you came on board in 20 ton. It's hard to believe that was almost 10 years ago and said, All right, guys, we really got to get a strategy around back up, talk to us about way back then what? You guys were doing what you saw as an opportunity. What you're doing with combo today, a >>time and the There's a wide range of backup for us. There was no really assurance that we were getting back up. So we had a bit of convert seven that was backing up the Windows infrastructure. There was tyranny storage manager backing up a lot of Linux. And there was Amanda and open source thing. And then there was a LL sorts of scripts and things. So, for instance, of'em where backups were done by creating an array snapshot with the script, then mounting that script into that snapshot into another server backing up the server with calm bolt on the restore process is an absolute takes here. It was very, very difficult, long winded, required a lot of time on the checks. For this, it really was quite quite difficult to run it. Use a lot of stuff. Time we were, as far as the corporate side was concerned it exclusively on tape resource manager, we're using disc. Amanda was again for tape in a different, completely isolated system. Coupled with this, there had been a lack of investment in the data centers themselves, so the network hadn't really got a lot of throughput. This men that way were using data private backup networks in order to keep back up data off the production networks because there was really challenges over bandwidth contention backups on. So consider it over around and so on. If you got a back up coming into the working day defect student So Way started with a blank sheet of paper in many respects on went out to see what was available on Dhe. There was the usual ones it with the net back up, typically obviously again on convert Arc Serve has. But what was really interesting was deed Implication was starting to come in, But at the time, convo tonight just be released, and it had an absolutely killer feature for us, which was client side duplication. This men that we could now get rid of most of this private backup network that was making a lot of complex ISI. So it also did backup disk on back up to tape. So at that point, way went in with six Media agents. Way had a few 100 terabytes of disk storage. The strategy was to keep 28 days on disk and then the long term retention on tape into a tape library. WeII kept back through it about 2013 then took the decision. Disc was working, so let's just do disco only on save a whole load of effort. In even with a take life, you've got to refresh the tapes and things. So give it all on disk with D Duplication way, basically getting a 1 to 1. So if we had take my current figures about 1.5 petabytes of front side protected data, we've got about 1.5 petabytes in the back up system, which, because of all the synthetic fools and everything, we've got 12 months retention. We've got 28 days retention. It works really, really well in that and that that relationship, almost 1 to 1 with what's in the back up with all the attention with plants like data, has been fairly consistent since we went all disc >>mark. I wonder if you'd actually step back a second and talks about the role in importance of data in your organization because way went through a lot of the bits and bytes in that is there. But as a research organization, you know, I expect that data is, you know, quite a strategic component of the data >>forms your intellectual property. It's what is caught your research. It's the output of your investigations. So where were doing Earth Operational science. So we get data from satellites and that is then brought down roars time, little files. They then get a data set, which will consist of multiple packages of these, these vials and maybe even different measurements from different satellites that then combined and could be used to model scenarios climate change, temperature or pollution. All these types of things coming in. It's how you then take that raw data work with it. In our case, we use a lot of HPC haIf of computing to manipulate that data. And a lot of it is how smart researchers are in getting their code getting the maximum out of that data on. Then the output of that becomes a paper project on dhe finalized final set of of date, which is the results, which all goes with paper. We've also done the a lot of genetics and things like that because the DNA fingerprinting with Alec Jeffrey on what was very interesting with that one is how it was those techniques which then identified the bones that were dug up under the car park in Leicester, which is Richard >>Wright documentary. >>Yeah, on that really was quite exciting. The way that well do you really was quite. It's quite fitting, really, techniques that the university has discovered, which were then instrumental in identifying that. >>What? One of the interesting things I found in this part of the market is used to talk about just protecting my data. Yeah, a lot of times now it's about howto. Why leverage my data even Maur. How do I share my data? How do I extract more value out of the data in the 10 years you've been working with calm Boulder? Are you seeing that journey? Is that yes, the organization's going down. >>There's almost there's actually two conflicting things here because researchers love to share their data. But some of the data sets is so big that can be quite challenging. Some of the data sets. We take other people's Day to bring it in, combining with our own to do our own modeling. Then that goes out to provide some more for somebody else on. There's also issues about where data could exist, so there's a lot of very strict controls about the N. H s data. So health data, which so n hs England that can't then go out to Scotland on Booth. Sometimes the regulatory compliance almost gets sidelines with the excitement about research on way have quite a dichotomy of making sure that where we know about the data, that the appropriate controls are there and we understand it on Hopefully, people just don't go on, put it somewhere. It's not because some of the data sets for medical research, given the data which has got personal, identifiable information in it, that then has to be stripped out. So you've got an anonymous data set which they can then work with it Z assuring that the right data used the right information to remove so that you don't inadvertently go and then expose stuff s. So it's not just pure research on it going in this silo and in this silo it's actually ensuring that you've got the right bits in the right place, and it's being handled correctly >>to talk to us about has you know, as you pointed out, this massive growth and data volumes from a university perspective, health data perspective research perspective, the files are getting bigger and bigger In the time that you've started this foundation with combo in the last 9 10 years. Tremendous changes not just and data, but talking about complaints you've now got GDP are to deal with. Give us a perspective and snapshot of your of your con vault implementation and how you've evolved that as all the data changes, compliance changes and converts, technology has evolved. So if you take >>where we started off, we had a few 100 petabytes of disk. It's just before we migrated. Thio on Premise three Cloud Libraries That point. I think I got 2.1 petabytes of backup. Storage on the volume of data is exponentially growing covers the resolution of the instruments increases, so you can certainly have a four fold growth data that some of those are quite interesting things. They when I first joined the great excitement with a project which has just noticed Betty Colombo, which is the Mercury a year for in space agency to Demeter Mercury and they wanted 50 terabytes and way at that time, that was actually quite a big number way. We're thinking, well, we make the split. What? We need to be careful. Yes. Okay. 50 terrorizes that over the life of project. And now that's probably just to get us going. Not much actually happened with it. And then storage system changed and they still had their 50 terabytes with almost nothing in it way then understood that the spacecraft being launched and that once it had been launched, which was earlier this year, it was going to take a couple of years before the first data came back. Because it has to go to Venus. It has to go around Venus in the wrong direction, against gravity to slow it down. Then it goes to Mercury and the rial bolt data then starts coming back in. You'd have thought going to Mercury was dead easy. You just go boom straight in. But actually, if you did that because of gravity of the sun, it would just go in. You'd never stop. Just go straight into the sun. You lose your spacecraft. >>Nobody wants >>another. Eggs are really interesting. Is artfully Have you heard of the guy? A satellite? >>Yes. >>This is the one which is mapping a 1,000,000,000 stars in the Milky Way. It's now gone past its primary mission, and it's got most of that data. Huge data sets on DDE That data, there's, ah, it's already being worked on, but they are the university Thio task, packaging it and cleansing it. We're going to get a set of that data we're going to host. We're currently hosting a national HPC facility, which is for space research that's being replaced with an even bigger, more powerful one. Little probably fill one of our data centers completely. It's about 40 racks worth, and that's just to process that data because there's so much information that's come from it. And it's It's the resolution. It's the speed with which it can be computed on holding so much in memory. I mean, if you take across our current HPC systems, we've got 100 terabytes of memory across two systems, and those numbers were just unthinkable even 10 years ago, a terrible of memory. >>So Mark Lease and I would like to keep you here all way to talk about space, Mark todo of our favorite topics. But before we get towards the end, but a lot of changes, that combo, it's the whole new executive team they bought Hedvig. They land lost this metallic dot io. They've got new things. It's a longtime customer. What your viewpoint on com bold today and what what you've been seeing quite interesting to >>see how convoy has evolved on dhe. These change, which should have happened between 10 and 11 when they took the decision on the next generation platform that it would be this by industry. Sand is quite an aggressive pace of service packs, which are then come out onto this schedule. And to be fair, that schedule is being stuck to waken plan ahead. We know what's happening on Dhe. It's interesting that they're both patches and the new features and stuff, and it's really great to have that line to work, too. Now, Andi way with platform now supports natively stone Much stuff. And this was actually one of the decisions which took us around using our own on Prem Estimate Cloud Library. We were using as you to put a tear on data off site on with All is working Great. That can we do s3 on friend on. It's supported by convoy is just a cloud library. Now, When we first started that didn't exist. Way took the decision. It will proof of concept and so on, and it all worked, and we then got high for scale as well. It's interesting to see how convoy has gone down into the appliance 11 to, because people want to have to just have a box unpack it. Implicated. If you haven't got a technical team or strong yo skills in those area, why worry about putting your own system together? Haifa scale give you back up in a vault on the partnerships with were in HP customer So way we're using Apollo's RS in storage. Andi Yeah, the Apollo is actually the platform. If we bought Heifer Scale, it would have gone on an HP Apollo as well, because of the way with agreements, we've got invited. Actually, it's quite interesting how they've gone from software. Hardware is now come in, and it's evolving into this platform with Hedvig. I mean, there was a convoy object store buried in it, but it was very discreet. No one really knew about it. You occasionally could see a term on it would appear, but it it wasn't something which they published their butt object store with the increasing data volumes. Object Store is the only way to store. There's these volumes of data in a resilient and durable way. Eso Hedvig buying that and integrating in providing a really interesting way forward. And yet, for my perspective, I'm using three. So if we had gone down the Hedvig route from my perspective, what I would like to see is I have a story policy. I click on going to point it to s three, and it goes out it provision. The bucket does the whole lot in one a couple of clicks and that's it. Job done. I don't need to go out, create the use of create the bucket, and then get one out of every little written piece in there. And it's that tight integration, which is where I see benefits coming in you. It's giving value to the platform and giving the customer the assurance that you've configured correctly because the process is an automated in convoy has ensured that every step of the way the right decisions being made on that. Yet with metallic, that's everything is about it's actually tried and tested products with a very, very smart work for a process put round to ensure that the decisions you make. You don't need to be a convoy expert to get the outcome and get the backups. >>Excellent. Well, Mark, thank you for joining Student on the Cape Talking about tthe e evolution that the University of Leicester has gone through and your thoughts on com bolts evolution in parallel. We appreciate your time first to Minutemen. I'm Lisa Martin. You're watching the cue from combo go 19.

Published Date : Oct 15 2019

SUMMARY :

It's the Q covering com vault We have Mark Penny, the systems So talk to us about you came on board in 20 ton. So at that point, way went in with six Media agents. quite a strategic component of the data It's the output of your investigations. It's quite fitting, really, techniques that the university has discovered, the data in the 10 years you've been working with calm Boulder? it Z assuring that the right data used the right information to remove so to talk to us about has you know, as you pointed out, this massive growth and data volumes the great excitement with a project which has just noticed Betty Colombo, Is artfully Have you heard of the guy? It's the speed with which it can be computed on but a lot of changes, that combo, it's the whole new executive team they bought Hedvig. that the decisions you make. We appreciate your time first to Minutemen.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Lisa MartinPERSON

0.99+

Mark PennyPERSON

0.99+

28 daysQUANTITY

0.99+

VenusLOCATION

0.99+

ColoradoLOCATION

0.99+

20 tonQUANTITY

0.99+

MarkPERSON

0.99+

University of LeicesterORGANIZATION

0.99+

100 terabytesQUANTITY

0.99+

50 terabytesQUANTITY

0.99+

2.1 petabytesQUANTITY

0.99+

LeicesterLOCATION

0.99+

Milky WayLOCATION

0.99+

Mark LeasePERSON

0.99+

12 monthsQUANTITY

0.99+

HPORGANIZATION

0.99+

Alec JeffreyPERSON

0.99+

50 terabytesQUANTITY

0.99+

Denver, ColoradoLOCATION

0.99+

University of LeicesterORGANIZATION

0.99+

EarthLOCATION

0.99+

51 different academic departmentsQUANTITY

0.99+

100 petabytesQUANTITY

0.99+

10 yearsQUANTITY

0.99+

two systemsQUANTITY

0.99+

1QUANTITY

0.99+

ScotlandLOCATION

0.99+

1,000,000,000 starsQUANTITY

0.99+

MercuryLOCATION

0.99+

first dataQUANTITY

0.99+

ApolloORGANIZATION

0.99+

50QUANTITY

0.98+

MaurPERSON

0.98+

threeQUANTITY

0.98+

oneQUANTITY

0.98+

10 years agoDATE

0.98+

tonightDATE

0.97+

todayDATE

0.97+

AmandaPERSON

0.97+

About 20,000 folksQUANTITY

0.97+

OneQUANTITY

0.97+

LinuxTITLE

0.97+

firstQUANTITY

0.97+

bothQUANTITY

0.96+

EnglandLOCATION

0.96+

2019DATE

0.96+

WindowsTITLE

0.96+

WrightPERSON

0.96+

Betty ColomboPERSON

0.96+

this weekDATE

0.95+

ThioPERSON

0.95+

N. HLOCATION

0.93+

earlier this yearDATE

0.93+

RichardPERSON

0.93+

nearly 10 yearsQUANTITY

0.93+

ThioORGANIZATION

0.92+

six Media agentsQUANTITY

0.9+

sunLOCATION

0.89+

about 1.5 petabytesQUANTITY

0.87+

HedvigORGANIZATION

0.87+

about 40 racksQUANTITY

0.87+

a yearQUANTITY

0.85+

four foldQUANTITY

0.84+

2013DATE

0.83+

10QUANTITY

0.82+

about five research institutesQUANTITY

0.79+

clicksQUANTITY

0.78+

two conflicting thingsQUANTITY

0.78+

Prem EstimateORGANIZATION

0.76+

Eso HedvigORGANIZATION

0.75+

AndiPERSON

0.74+

ApolloCOMMERCIAL_ITEM

0.73+

Object StoreTITLE

0.68+

Keren Elazari, Author & TED Speaker | Acronis Global Cyber Summit 2019


 

>>From Miami beach, Florida. It's the queue covering a Chronis global cyber summit 2019. Brought to you by Acronis. >>Okay. Welcome back. Everyone's cubes coverage here and the Kronos is global cyber summit 2019 and Sarah inaugural event around cyber protection. I'm John Forrey hosted the cube. We're talking to all the thought leaders, experts talking about the platforms. We've got a great guest here, security analyst, author and Ted speaker. Karen Ellis, Zari who runs the besides Tel Aviv. Um, she gave a keynote here. Welcome to the queue. Thanks for coming on. >>Oh, thanks for having me. It's a pleasure. >>Love to have you on. Security obviously is hot. You've been on that wave. Even talking a lot about it. You had talked here and opposed the conference. But for us, before we get into that, I want to get in and explore what you've been doing that besides Tel Aviv, this is the global community that would be runs a cyber week. He wrote a big thing there. >>So that's something that's really important to me. So 10 years ago, hackers and security researchers thing start that somebody called security besides which was an alternative community event for hackers that couldn't find their voice in their space. In the more mainstream events like RSA conference or black hat for example. That's when security besides was born 10 years ago. Now it's a global movement and there's been more than a hundred besides events. Just this year alone, just in 2019 anywhere from Sao Paolo to Cairo, Mexico city, Athens, Colorado, Zurich, London, and in my hometown of Tel Aviv. I was very proud to bring the besides idea and the concept to Tel Aviv five years ago. This year, 2020 will be our fifth year and we'll be, I hope our biggest year yet last summer we had more than 1200 participants. We take place during something called Telaviv cyber week, which if you've never visited Tel Aviv, that's your opportunity next year of Bellevue cyber Wade brings 9,000 people to Israel. >>It's hosted by Tel Aviv university where I'm also a researcher and all of these events are free. They're in English, they are welcoming to people from all sorts of places in all walks of life. We bring people from more than 70 countries and I think it's great that we can have that platform in Israel, in Tel Aviv to share not just our knowledge but also our points of view, our different opinions about the future of cyber security. Tel Aviv university. Yeah. So Tel Aviv university hosts me cyber week and they're also the gracious hosts for the sites televi which runs as a nonprofit separate from the university. >>You know, I love these movements where you have organic, just organic growth. And then we saw that with the unconference wave couple years ago where you know, the fancy conferences got too stuffy to sponsor oriented, right? That's >>right. Yeah. Up there too. They want to have more face to face, more community oriented conversations, more or, yeah. So besides actually the first one was absolutely an unconference and to this day we maintain some of that vibe, that important community aspect of providing a stage for people that really may not have the opportunity to speak at Blackhat or here or there. They may not feel comfortable on a huge with all those lights on them. So we really need to have that community aspect of them and believe it or not. And unconference is how I got on the Ted stage because a producer from Ted actually came all the way to Israel to an unconference in the Northern city of Nazareth in Israel, and she was sitting in the room while I was giving a talk to 15 people in the lobby of a hotel. And it wasn't that, it wasn't, you know, I didn't have a big projector. >>It wasn't a fancy production on any scale, but that's where that took for loser found me and my perspective and decided that this was this sort of point of view deserves to have a bigger stage. Now with digital technologies, the lobby conference, we call it the lobby copy, cons, actions in the hallway, just always kind of cause do you have a programs? It's not about learning anymore at these events because if all you can learn online, it's a face to face communal activity. I think it's a difference between people talking at you. Two people talking with you and that's why I'm very happy to give talks and I'm here focused on sharing my point of view. But I also want to focus on having conversations with people and that's what I've been doing this morning, sharing my points of view, teaching people about how I think the security worlds could look like, learning from them, listening to them. >>And it's really about creating that sort of an atmosphere and there's a lot of tension right now in the security space. I want to get your thoughts on this because you know, I have my personal passion is I really believe that communities is where the action is in a lot of problems can be solved if tapped properly, if they want, if they're not used or if they're, if the collective intelligence of a community can be harnessed. Yes, absolutely. Purity community right now has a imperative mandate, which is there's a lot of to do better. I think good that could be happening. The adversaries are at scale. You seeing, um, you know, zero day out there yet digital warfare going on, you got all kinds of things on a national global scale happening and people are worried. Absolutely. So there's directions, there's a lot of fear, there's a lot of panic going on these days. >>If you're an average individual, you hear about cybersecurity, you're of all hackers, you're thinking, Oh my God, they should turn all of my devices off, go live in the woods with some sheep and that's going to be my future. Otherwise I'm a twist and I agree with you. It's the responsibility, all the security industry and the security community to come together and also harness the power and the potential of the many friendly hackers out there. Friendly hackers such as myself, security researchers and not all security researchers are working in a lab at the university or in the big company and they might want to, you know, be wherever they are in the world, but still contributing. This is why I talk about the hackers immune system, how hackers can actually contribute to an immune system helping us identify vulnerabilities and fix them. And in many cases I found that it's not just a friendly hackers, even the unfriendly ones, even the criminals have a lot to teach us and we can actually not afford not to pay attention, not to be really more immersed, more closely connected with what is happening in the hacker's world, whether it's criminal hackers underground or the friendly hackers who get together at community events, who share their work, who participate on bug bounty platforms, which is a big part of my personal work and my passion bug bounty programs for the viewers who are not familiar with it are frameworks that will help companies that you might rely on like Google or Facebook, United airlines or Starbucks or any company that you can imagine. >>So many big companies now have bug bounty programs in place, allowing them to actively reward individual hackers that are identifying vulnerabilities. Yeah. And they pay him a lot of money to up to millions of dollars. Yes, they do, but it's not just about the money, you know, don't, it's not just amount of money. There's all kinds of other rewards that place as well. Whether it's a fancy, you know, a tee shirt or a sticker, or in the case of Tesla for example, they give out challenge coins, the challenge coins that only go out to the top hackers. I've worked with them now you can't find anything with these challenge coins. You keep the tray, you can trade them in in the store for money. But what you can do is that you get a lot of reputational and you know, unmonitored value out of that as well. Additionally, you know another organization that's called them, the Pentagon has a similar program, so depending on his giving out, not just monetary rewards but challenge coins for hackers that are working with them. >>This reputation kind of system is really cutting edge and I think that's a great point. I personally believe that that will be a big movement in all community behavior because when you start getting into having people arbitrator who's reputable, that's an incentive beyond money. Well, what I've found great I guess, but like reputation also is important. I can tell you this because I've, I've this, I've really dissected and researched this in my academic work and the look at the data from several bug bounty programs and the data that was available. There's all kinds of value on the table. Some of the value is money and you get paid. And you know, last month I heard about the first bug bounty millionaire and he's a guy from Argentina. But the value is not just in the money, it's also reputational value. It's also work value. So some hackers, some security researchers just want to build up their resume and then they get job offers and they start working for companies that may have never looked at them before because they're not graduates of this and that school didn't have this or that upbringing. >>We have to remember that from, from the global perspective, not everybody has access to, you know, the American school system or the Israeli school system. They can't just sign up for a college degree in cybersecurity or engineering if they live in parts of the world where that's not accessible to them. But through being a researcher on the bug bounty platform, they gain up their experience, they gain up their knowhow, and then companies want to work with them and want to hire them. So that's contributing to the, you've seen this really? Yeah. We've seen this and the reports are showing this. The data is showing this, all of the bug bounty programs that ha have reports that come out that show this information as well. Do you see that the hackers on bug bounty pack platforms that usually under 30 a lot of them are. They're 30 they're young people. >>They're making their way into this industry. Now, let me tell you something. When I was growing up in Israel, that was a young hacker. I didn't know any bug bounty programs. None of that stuff was around. Granted, we also didn't have a cyber crime law, so anything I did wasn't officially illegal because we didn't have, yeah, it wouldn't necessarily. Fermentation is good. It certainly was and I was very driven by curiosity, but the point I'm trying to make is that I didn't actually have a legal, legitimate alternative to, you know, the type of hacking that I was doing. There wasn't any other option for me until it was time for me to serve in the Israeli military, which is where I really got my chops. But for people living in parts of the world where they don't have any legitimate legal way to work in cybersecurity, previously, they would have turned to criminal activities to using their knowhow to make money as a cybercriminal. >>Now that alternative of being part of a global immune system is available to them on a legitimate legal pathway, and that's really important for our workforce as well. A lot of people will tell you that cybersecurity workforce needs all the help it can get. There's a shortage of talent gap. A lot of people talk about the talent gap. I believe a big part of the solution is going to come from all of these hackers all over the world that are now accessing the legitimate legal world of cybersecurity or something. I want to amplify that. Certainly after this interview, I'd love to follow up with you. Really, we will come to Tel Aviv. It's on our list for the cube stuff. We'll be there. We'd love to launch loving mutation. What you're talking about is an unforeseen democratization, the positive impact of the world. I want you to just take a minute to explain how this all came together for this. >>With your view on this reputational thing. I talk about the impact. Where does it go beyond just reputational for jobs? What? How does a community flex and organically grow from this and so one thing that I'm very happy to see, I think in the past couple of years, the reputations generally of hackers have become important and that the concept of a hacker is not what we used to think about in the past where we would automatically go to somebody who was a criminal or a bad guy. Did you know that the girl Scouts organization, the U S girl Scouts are now teaching girls Scouts to be hackers. They're teaching them cybersecurity skills. Arguably, I would claim this is a more important skill than making cookies or you know, selling cookies. Certainly a more money to survive in the wilderness. Why not in the digital wilderness? Yes, in a fire counter than that. >>More than that, it's about service. So the girl Scouts organization's always been very dedicated to values of service. Imagine these girls, they're now becoming very knowledgeable about cybersecurity. They can teach their peers, their families, so they can actually help spread. The more you build a more secure world, certainly they could probably start the fire or track a rapid in the forest or whatever it is that girl Scouts used to do that digitally too. That's called tracing. Really motivating that person. I think that's aspiring to many young women. That's very kind of, you actually have to have more voices out there. What can we do differently? What help? What can I do as a guy, as in the industry, I have two daughters. Everyone has, as I get older, I have daughters because they care now, but most men want to help. What can we do as a group? >>So I think you're absolutely right that diversity and inclusivity within the technology workforce is not a problem there. Just the underrepresented groups need to solve by. It's actually an issue for the entire group to solve. It's men or women or any underrepresented minority and overrepresented groups as well because diversity of the workforce will actually help build a more resilient, sustainable workforce and will help with that talent gap, that shortage of people of skilled employees that we mentioned. Others, a few things that you can do. I personally decided to do what I can, so I contributed to a book called women in tech at practical guide and in that book there's also a chapter for allies. So if you're a person that wants to help a woman or women in tech in your community, you are very welcome to check out the book. It's on Amazon, women in tech, a practical guide. >>I'm a contributor to that and myself. I also started a group called leading cyber ladies, which is a global meetup for women in cyber security and we have chapters on events in Israel, in New York city, in Canada, and soon I believe in United Kingdom and Silicon Valley and perhaps in your company or in your community, you could help start a similar group or maybe encourage some of the ladies that you know to start a group, help them by finding a space, creating a safe environment for them to create meetups like that by providing resources, by sponsoring events, by mentoring does a few, a lot of things. Yeah, there's a lot of things that you can do and it's certainly most important to consider that diversity in the workforce is everybody's issue with Cod. Something just one gender or one group needs to figure out how to be a big bang theory. >>You can share with three people, two people, absolutely organic growth or conditional. Yes, certainly. And as men, if you don't want to, you know, start them an event for women because that may seem disingenuous, but you can do certainly encourage the women that you find around you. In your workforce to see if they want to maybe have a meetup and if they do, what kind of help you can offer? Can you run the AB for them? Can you as sponsored lacrosse songs, whatever kind of help that you can offer to create that sort of a space. The reason we we started cyber ladies is because I didn't see enough women speaking at security events, so I wanted to fray the meet up where the women in cybersecurity could share their work network with one another and really build up also their speaking port portfolio, their speaking powers so that they can really feel more comfortable speaking and sharing their work on other events as well. >>Camaraderie there too. Yes, it very important. Thank you so much to you now, what is your, your professional and personal interests these days? What's getting you excited? So there's some of the cool things. That's a fantastic question. So one thing I'm super excited about is that I'm actually collaborating with my sister. So my sister, believe it or not is a lawyer and she's a lawyer who specializing in cyber line, intellectual property privacy, security policy work, and I'm collaborating with her to create a new book which would be a guide to the future of cybersecurity from the hacker's perspective and the lawyers perspective because we are seeing a lot of regulators, a lot of companies that are now really having to follow laws and guidelines and regulations around cybersecurity and we really want to bring these two points of view together. We've already collaborated in the past and in fact my sister has worked on the legal terms of many of the bug bounty programs that I mentioned earlier, including the Tesla program. >>So it's very exciting. I'm very proud to be able to work with my younger sister who followed me into the cyber world. I'm the hacker, she's the lawyer and we are creating something together. Dynamic duo that's going to be, I'm excited to interview her. Yeah, so in my family we call her the tour Vogue version. Can you imagine that together? It's really unstoppable. We didn't have a chance to speak together at the RSA conference earlier this year and that was really unique. Am I going to fall off on that with the book? Well, our platform is your platform. Anything we can do to help you get the word out, super exciting work that you're doing. We think cyber community will be one of the big answers to some of the challenges out there. And we need more education. Law makers and global politicians have to get more tech savvy. Yes, this is a big, everybody, it's everybody's issue. Like I said in this morning speech, everybody's on the front lines. It's not the cyber generals or you know, the hackers in the basements that are fighting. We are on that digital Battlefront and we all have to be safer together. Karen, thanks for your great insights here in energy. Bug bounties are hot. The community is growing. This is the cyber conference here that, uh, Acronis global cyber summit 2019. I'm John Barry here to be back with more coverage after this short break.

Published Date : Oct 15 2019

SUMMARY :

Brought to you by Acronis. I'm John Forrey hosted the cube. It's a pleasure. Love to have you on. So that's something that's really important to me. in Tel Aviv to share not just our knowledge but also our points of view, our different opinions about the the unconference wave couple years ago where you know, the fancy conferences got too not have the opportunity to speak at Blackhat or here or there. It's not about learning anymore at these events because if all you can learn online, You seeing, um, you know, zero day out there yet digital warfare going on, the hackers immune system, how hackers can actually contribute to an immune system helping You keep the tray, you can trade them in in the store for money. Some of the value is money and you get paid. you know, the American school system or the Israeli school system. legitimate alternative to, you know, the type of hacking that I was doing. I believe a big part of the solution is going to come from all I would claim this is a more important skill than making cookies or you know, selling cookies. I think that's aspiring to many young women. It's actually an issue for the entire group to solve. some of the ladies that you know to start a group, help them by finding a space, have a meetup and if they do, what kind of help you can offer? and the lawyers perspective because we are seeing a lot of regulators, a lot of companies that are now really It's not the cyber generals or you know,

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
KarenPERSON

0.99+

John BarryPERSON

0.99+

Karen EllisPERSON

0.99+

IsraelLOCATION

0.99+

AthensLOCATION

0.99+

ColoradoLOCATION

0.99+

Keren ElazariPERSON

0.99+

CairoLOCATION

0.99+

United KingdomLOCATION

0.99+

ZurichLOCATION

0.99+

LondonLOCATION

0.99+

ArgentinaLOCATION

0.99+

StarbucksORGANIZATION

0.99+

MexicoLOCATION

0.99+

FacebookORGANIZATION

0.99+

Sao PaoloLOCATION

0.99+

John ForreyPERSON

0.99+

GoogleORGANIZATION

0.99+

Silicon ValleyLOCATION

0.99+

two peopleQUANTITY

0.99+

PentagonORGANIZATION

0.99+

Tel AvivLOCATION

0.99+

CanadaLOCATION

0.99+

TeslaORGANIZATION

0.99+

15 peopleQUANTITY

0.99+

2019DATE

0.99+

30QUANTITY

0.99+

three peopleQUANTITY

0.99+

9,000 peopleQUANTITY

0.99+

last monthDATE

0.99+

fifth yearQUANTITY

0.99+

Two peopleQUANTITY

0.99+

more than 70 countriesQUANTITY

0.99+

last summerDATE

0.99+

five years agoDATE

0.99+

more than 1200 participantsQUANTITY

0.99+

2020DATE

0.99+

one genderQUANTITY

0.99+

10 years agoDATE

0.98+

two pointsQUANTITY

0.98+

ZariPERSON

0.98+

twoQUANTITY

0.98+

U S girl ScoutsORGANIZATION

0.98+

couple years agoDATE

0.98+

more than a hundredQUANTITY

0.98+

RSAEVENT

0.97+

AmazonORGANIZATION

0.97+

first oneQUANTITY

0.97+

Tel Aviv universityORGANIZATION

0.97+

this yearDATE

0.96+

TedPERSON

0.96+

AcronisORGANIZATION

0.96+

Chronis global cyber summit 2019EVENT

0.96+

New York cityLOCATION

0.96+

one groupQUANTITY

0.96+

under 30QUANTITY

0.95+

Miami beach, FloridaLOCATION

0.95+

United airlinesORGANIZATION

0.95+

Acronis Global Cyber Summit 2019EVENT

0.95+

Acronis global cyber summit 2019EVENT

0.95+

RSA conferenceEVENT

0.94+

This yearDATE

0.93+

next yearDATE

0.93+

first bugQUANTITY

0.92+

SarahPERSON

0.92+

earlier this yearDATE

0.91+

cyber summit 2019EVENT

0.91+

girl ScoutsORGANIZATION

0.9+

Telaviv cyber weekEVENT

0.9+

one thingQUANTITY

0.9+

up to millions of dollarsQUANTITY

0.89+

Bellevue cyber WadeEVENT

0.87+

NorthernLOCATION

0.86+

TEDORGANIZATION

0.85+

oneQUANTITY

0.85+

CodORGANIZATION

0.82+

waveEVENT

0.79+

girl ScoutsORGANIZATION

0.76+

this morningDATE

0.75+

zero dayQUANTITY

0.75+

EnglishOTHER

0.75+

televiORGANIZATION

0.74+

IsraeliOTHER

0.74+

Rajesh Nambiar, IBM | IBM Think 2018


 

>> Narrator: Live from Las Vegas, it's theCUBE covering IBM Think 2018 brought to you by IBM. >> We're back at IBM Think 2018. This is theCUBE the leader and live tech coverage. My name is Dave Vellante and I'm here with my cohost Peter Burst. Day two of our wall to wall coverage of IBM's inaugural Think conference. Rajesh Nambiar is here, he's the general manager of global business services for application services within IBM. Thanks for coming on theCUBE. >> Thank you for having me here. >> So how's this event going for you? You're in from Singapore. We were saying you must love the fact that IBM's consolidated a lot of it's major events in one place. You get a lot done in a week. >> Absolutely, I think this is four or five days that we're going to be here. Phenomenal amount of energy, I mean when you go around you can see that. I think as you said, combining some of the events it's made it even more interesting for us. I'll be meeting more people, more clients, more productive session for sure. >> So let's talk about what you do with application services and then we really want to get in to one of the themes that Jenny hit on today which is incumbent disruptors and competing from the core of your proprietary data. So let's get in to it. Start with your organization and what you guys do. >> Absolutely, so as you mentioned and I do the application services for GBS in IBM. Within application services I think we focus on application development and management which is a large area for us and as you know that IBM has been managing applications for many, many large clients over the period of time and it's a very large portfolio for IBM. What we see truly is enterprises as you saw and they are going to have enormous amount of issues with the new age companies if you may, all of the new companies which are sort of coming out. You can call them bond digital or bond in cloud or uberization of the organizations, whatever. So you'd find that the enterprises are going to have significant issues maintaining the company advantage over a period of time. And one of the ways they could sort of regain the leadership or company advantage would be by ensuring that they are digitally reinventing themselves. The problem is, I think as Forbes said recently in an article around saying that, about 80 percent of the digital transformation projects really fail with multiple reasons as to why they fail. I want to argue saying that one of the, and you heard from Jenny this morning, that you know you have the business architecture and the technology architecture. If we focus on the technology for second, you would find that many of these new incumbents that you mentioned will, they try to compete purely on the digital side of the equation. They will have a harder chance or they might not even get where they want to go. And we want to argue saying that if they kind of pay attention to the core they have, and I want to sort of define what this core and digital is going to be, so think of it this way, I mean core is what, if any company has been around for awhile, then they would of had a significant amount of core systems, systems of records if you want to call it where they have the business process embedded into that. They have the customer data embedded into that. Now what's happening on the other side, of course everybody wants to get there, the whole digital dimension, on the digital side of the equation you do have systems of engagement, where you truly understand and engage, I want to say customers but then again also have employees of your organization. So you're going to engage them in the last mile if you may. What touches the customer, touches your employees, that's what we call systems of engagement in the digital. Now, organizations tend to see these two as two different things and if you do not build your digital eco system, leveraging what you have in core, I believe that the chances of you failing in your digital transformation are very, very high. Why is that? Because I believe the intersection of these two worlds if you may, the core and the digital, is not that easy for people to leverage and I believe that we as a company, we help our clients sort of leverage that intersection if you may. >> Okay so, where do you start? Is it application modernization? Is it allowing them to develop applications that are more sort of more native as you say? When you talk to customers where do you see the starting point? >> Okay so, when you look at these two fundamentally there are synergies between these two worlds and they are discouraged. Synergies are natural why? Because as I mentioned before, in the core or in the systems of records you'll find business processes getting embedded, customers data getting embedded. And then on the other side of the digital system, you always have the user experience which is what we all want to try. I mean the user experience is all about everything. I was talking to a bank recently (foreign name). So they said, we built this phenomenally wonderful user friendly mobile app for our customers and what happened was the app was fantastic and it was great user experience and everything was fine, he just add for every transaction it took like a minute for the balance to show up on the mobile app. That's not what he wanted because why is that? Because your focusing on the digital only. The fact that it just go to your core systems, get the customer data and bring it back to the watch app or the mobile app or whatever, that wasn't the plan that I weighed and hence my point being that if you look at the synergies which is great, there are a lot of discordance because the way that all systems are being built is very different. Maybe you're using a waterfall. The new systems are getting built in a different way. If you leverage the synergies, manage the discordant in a nicer way. A great example would be, so do you have micro services coming out of your core systems to enable your digital systems. You have the right API's getting built from the core systems to enable your digital systems. If you're able to manage this intersection well, then I think you have a play and that's how I believe that we should. So again to your point, do you modernize? I believe you do the three things to get the synergy right. One would be you are to optimize your core systems for efficiency because more and more the systems get older and older. You're going to have challenges in maintaining them, more expensive to maintain them, so you optimize those systems for efficiency. Then you modernize them to build in or enable new capability. So second, as I said modernize, what you really do, you're making sure that it is easier for the digital systems to get to you, to understand what you're doing, to get the customer data, so that is a modernized space. The third is that you have to innovate sort of co create if you may and make sure that you're able to build those newer systems, digital systems using the core and enabling the core for growth. So if you had an organization, if you want growth, you're not going to get it if you don't do these three things in my opinion. >> So Rajesh, many years ago I did a research project for a client and we looked very closely at the consequences of increasing the functionality and automation in systems of engagement and how that drove work back in the core and we found that every success of generation of enhancement on the systems of engagement, drove the number of transactions back at the core sevenfold. Are you seeing relationships like that? Is there rules of thumbs that people should use now as their systems of engagement get even more powerful, more human friendly? What is the new kind of expectation these days? >> So the issue is definitely what you said. I mean for every about seven or eight times is what you want to drive the, for every single transaction which is rising out systems of engagement. However, one of the way to make it more efficient when the systems of records, which is the core systems if you may, is by using the modern, stuff we'll be talking about, if you have designed your core systems and enabled micro services in the right way, maybe instead of having seven or eight transactions, you could be able to do that in two or three. Similarly >> Peter: Unstage them. >> Unstage them, yeah in a certain way so that you're not getting into the performance issue which I talked about in this banking example as you know, you don't want to build a wonderful digital app but having that to go through a significant performance issue over the period of time. So that is one of the things. The other important element of what he just now said is also the talent piece of it. We underestimate, I think, as we said, one of the reasons why many of these engagements fail is also because people don't think talent is a big deal in a lot of this. Because when you really see, if you're a big company, been around for awhile, you have a very strong core, and your people in the IT organization are going to be wired somewhat to the processes which are going to be sort of the ordeal if you may. And how do you move to this new world of digital? So there is a fundamental difference from the talent point of view. Two things, as an organization you're moving from process centric to user centric. Now you want to build something for your customer, for your employee. When you do that the talent base, of course their minds have changed, but also a simple example, we always hire people for skills. Maybe still, some companies still do, for skills. But I believe that's a passe because you know what do you now need is a tenacity for learnability or tenacity for a life long learning for the people whom you're hiring. Not necessarily a skill that you value today because what happens in today's world, after six months that skill is no longer valuable for you. So what do you do with them? But if you have a tenacity for life long learning, the ability for you to pick up new skills and then transform yourself will be so high that you're not stuck with people who are all skills for a long period of time. >> I was talking to a senior, a guy who owns development and he said one of the biggest impacts of open source over the last few years was that it brought the notion of responsibility, recognition, reputation, and change the way that the evolvers talk about collaboration with each other, not just in the open source world but overall. I think collaboration and new collaboration agile also has to be part of the equation. What do you think? >> Well without a question. In fact, I was about to say, collaboration's very, very key because again, when you move from process interviews as intrigue, you also find, traditionally organizations are very role based, so everybody had a role. I'm a developer, I'm a tester, I'm a architect. But in the new world, this is going to be changing into maybe parts of people who are sort of working on a garage metal. Everybody does everything. You have a smaller group of people who are able to evaluate something very, very quick and in an agile fashion as opposed to the traditional way of saying, I'm sort of role based, I have an organization and that's how they operate. So I think there's significant difference and again, I would probably say to leverage the talent for the newer market. Again there are about two or three things that one could potentially do. One would clearly be this learnability. Skills are no longer what is valued, it's the learnability. The ability for you to sort of quickly move from one to another would be valued. Second would be diversity of skills. Today we hire more people with user experience, with psychology major. You would of never thought of this 10 years ago. We never hired anybody from art school but we do that today because of... >> I was really happy. My son's a music major. >> My son is a psychology major, I was just telling you in the University of Colorado. So they get hired probably as well as already the STEM students are going to be, so that's good. (laughing) And the last one is of course, I have this notion called digital label . I don't know if you've heard this before. And Jenny talked about it today. So you're going to have man and machine, when you do that, automation is a great influencer in all of this. I think there are going to be the digital label and the human label are going to co exist. So we're calling it hybrid label. So any task that you're going to do, we will have people which is sort of high capability now, leveraging watts, which is a digital label. So that's another important thing in the talent market. >> And the laborer increasingly requires sort of multi tool skills not only domain expertise but also digital skills. >> Rajesh: Absolutely >> At least being able to understand how the leverage, the machine intelligence. I want to ask you, and I know Peter you got to go soon. But this trend with IOT, Blockchain, we saw the IV and Maersk example today where they're attacking inefficiencies where there's a third party trust involved and it's creating a trustless system. Do you see a trend toward sort of putting token economics embedded inside of applications, things like Blockchain, increasingly going into core applications? Is that a trend you're seeing yet? >> Yes, yes, I think not as much as we would like to see but I think it's beginning to sort of level up in a period of time. I think Blockchain is still, as I said, there's a more in the experimentation phase, and there are a few companies who have leveraged fully. Great example is as you saw this morning with what we're doing with the APMM Maersk, the fact that we're able to do the distribution systems within shipping. And any radio finding that there's going to be a significant amount of paperwork or transactional arrangements that are being done outside of the normal systems. I think Blockchain would be a great way to solve this issue. >> I want to tease your session a little bit. You're going talk, you got a CIO panel, what is that? >> Well the talk is actually going to be I think unlocking the value of the core system. So there's going to be something similar to what we talked about. We've got great session with three CIO's who are going to be on the panel. We're going to have the Carhartt CIO John Hill is going to be on the panel, and they've done a lot of good work in terms of truly making sure that they understood that if they don't level the core they can't really get to the digital. >> Was that CarHartt? >> Carhartt, yes. >> The only brand I wear. >> Really? (laughing) >> They'll be interesting, then KLM with (mumbling) with their history of the core that they've had for several years and how they're really moving into the new digital era and then being sort of a customer friendly airline if you may, so he's going to talk about some of that. And then we also have the TPX which is the communications organization which they've done gone through about 12 acquisitions over the last 12 years, so one a year pretty much. How are they integrating all of those companies and how are they really putting them together into sort of one system. >> Peter: And when is that session? >> That session's on Thursday morning at 11:30, I hope you guys are there to watch that. I'm worried because it's the last day. >> It's a getaway day but listen, a good day to go down and check it out because that notion of what incumbents should be doing and competing from the core is very, very important idea. So Rajesh thanks for coming on theCUBE and explaining that. Best of luck to you tomorrow and great to see you. >> Thank you so much, thank you. >> Alright, keep it right there buddy. We'll be back with our next guest. This is CUBE, you're watching live from IBM Think 2018. We'll be right back. (upbeat music)

Published Date : Mar 21 2018

SUMMARY :

brought to you by IBM. Rajesh Nambiar is here, he's the general manager We were saying you must love the fact I think as you said, combining some of the events So let's talk about what you do with application services I believe that the chances of you failing I believe you do the three things to get the synergy right. back in the core and we found that So the issue is definitely what you said. the ability for you to pick up new skills and he said one of the biggest impacts of open source The ability for you to sort of quickly move I was really happy. and the human label are going to co exist. And the laborer increasingly requires sort of Do you see a trend toward sort of putting token economics Great example is as you saw this morning with You're going talk, you got a CIO panel, what is that? Well the talk is actually going to be I think a customer friendly airline if you may, I hope you guys are there to watch that. Best of luck to you tomorrow and great to see you. This is CUBE, you're watching live from IBM Think 2018.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Dave VellantePERSON

0.99+

RajeshPERSON

0.99+

Rajesh NambiarPERSON

0.99+

SingaporeLOCATION

0.99+

IBMORGANIZATION

0.99+

PeterPERSON

0.99+

JennyPERSON

0.99+

John HillPERSON

0.99+

sevenQUANTITY

0.99+

CarharttORGANIZATION

0.99+

Peter BurstPERSON

0.99+

twoQUANTITY

0.99+

fourQUANTITY

0.99+

CarHarttORGANIZATION

0.99+

tomorrowDATE

0.99+

SecondQUANTITY

0.99+

threeQUANTITY

0.99+

Las VegasLOCATION

0.99+

oneQUANTITY

0.99+

five daysQUANTITY

0.99+

eight timesQUANTITY

0.99+

thirdQUANTITY

0.99+

10 years agoDATE

0.99+

Two thingsQUANTITY

0.99+

todayDATE

0.98+

TodayDATE

0.98+

two worldsQUANTITY

0.98+

IBM Think 2018EVENT

0.98+

TPXORGANIZATION

0.98+

KLMORGANIZATION

0.98+

ForbesORGANIZATION

0.97+

about 80 percentQUANTITY

0.97+

one placeQUANTITY

0.97+

three thingsQUANTITY

0.97+

secondQUANTITY

0.96+

one a yearQUANTITY

0.96+

eight transactionsQUANTITY

0.96+

Day twoQUANTITY

0.96+

a weekQUANTITY

0.95+

two different thingsQUANTITY

0.92+

six monthsQUANTITY

0.92+

this morningDATE

0.9+

sevenfoldQUANTITY

0.89+

APMM MaerskORGANIZATION

0.86+

many years agoDATE

0.85+

University of ColoradoORGANIZATION

0.85+

Thursday morning at 11:30DATE

0.84+

about sevenQUANTITY

0.82+

OneQUANTITY

0.79+

12 acquisitionsQUANTITY

0.79+

last 12 yearsDATE

0.78+

three CIOQUANTITY

0.77+

about twoQUANTITY

0.77+

MaerskORGANIZATION

0.74+

GBSORGANIZATION

0.72+

Think conferenceEVENT

0.71+

themesQUANTITY

0.7+

single transactionQUANTITY

0.68+

a minuteQUANTITY

0.65+

one systemQUANTITY

0.63+

last few yearsDATE

0.61+

ThinkEVENT

0.6+

Laura Stevens, American Heart Association | AWS re:Invent


 

>> Narrator: Live from Las Vegas, it's theCUBE, covering AWS re:Invent 2017, presented by AWS, Intel, and our ecosystem of partners. >> Hey, welcome back everyone, this is theCUBE's exclusive live coverage here in Las Vegas for AWS Amazon web services re:Invent 2017. I'm John Furrier with Keith Townsend. Our next guest is Laura Stevens, data scientist at the American Heart Association, an AWS customer, welcome to theCUBE. >> Hi, it's nice to be here. >> So, the new architecture, we're seeing all this great stuff, but one of the things that they mention is data is the killer app, that's my word, Verna didn't say that, but essentially saying that. You guys are doing some good work with AWS and precision medicine, what's the story? How does this all work, what are you working with them on? >> Yeah, so the American Heart Association was founded in 1924, and it is the oldest and largest voluntary organization dedicated to curing heart disease and stroke, and I think in the past few years what the American Heart Association has realized is that the potential of technology and data can really help us create innovative ways and really launch precision medicine in a fashion that hasn't been capable to do before. >> What are you guys doing with AWS? What's that, what's the solution? >> Yeah so the HA has strategically partnered with Amazon Web Services to basically use technology as a way to power precision medicine, and so when I say precision medicine, I mean identifying individual treatments, based on one's genetics, their environmental factors, their life factors, that then results in preventative and treatment that's catered to you as an individual rather than kind of a one size fits all approach that is currently happening. >> So more tailored? >> Yeah, specifically tailored to you as an individual. >> What do I do, get a genome sequence? I walk in, they throw a high force computing, sequence my genomes, maybe edit some genes while they're at it, I mean what's going on. There's some cutting edge conversations out there we see in some of the academic areas, course per that was me just throwing that in for fun, but data has to be there. What kind of data do you guys look at? Is it personal data, is it like how big is the data? Give us a sense of some of the data science work that you're doing? >> Yeah so the American Heart Association has launched the Institute for Precision Cardiovascular Medicine, and as a result, with Amazon, they created the precision medicine platform, which is a data marketplace that houses and provides analytic tools that enable high performance computing and data sharing for all sorts of different types of data, whether it be personal data, clinical trial data, pharmaceutical data, other data that's collected in different industries, hospital data, so a variety of data. >> So Laura, there's a lot of think fud out there around the ability to store data in a cloud, but there's also some valid concerns. A lot of individual researchers, I would imagine, don't have the skillset to properly protect data. What is the Heart Association doing with the framework to help your customers protect data? >> Yeah so the I guess security of data, the security of the individual, and the privacy of the individual is at the heart of the AHA, and it's their number one concern, and making anything that they provide that a number one priority, and the way that we do that in partnering with AWS is with this cloud environment we've been able to create even if you have data that you'd like to use sort of a walled garden behind your data so that it's not accessible to people who don't have access to the data, and it's also HIPAA compliant, it meets the standards that the utmost secure standards of health care today. >> So I want to make sure we're clear on this, the Heart Association doesn't collect data themselves. Are you guys creating a platform for your members to leverage this technology? >> So there's, I would so maybe both actually. The American Heart Association does have data that it is associated with, with its volunteers and the hospitals that it's associated with, and then on top of that, we've actually just launched My Research Legacy, which allows individuals of the community to, who want to share their data, whether you're healthy or just sick, either one, they want to share their data and help in aiding to cure heart disease and stroke, and so they can share their own data, and then on top of that, anybody, we are committed to strategically partnering with anybody who's involved and wants to share their data and make their data accessible. >> So I can share my data? >> Yes, you can share your data. >> Wow, so what type of tools do you guys use against that data set and what are some of the outcomes? >> Yeah so I think the foundation is the cloud, and that's where the data is stored and housed, and then from there, we have a variety of different tools that enable researchers to kind of custom build data sets that they want to answer the specific research questions they have, and so some of those tools, they range from common tools that are already in use today on your personal computer, such as Python or R Bioconductor, and then they have more high performance computing tools, such as Hal or any kind of s3 environment, or Amazon services, and then on top of that I think what is so awesome about the platform is that it's very dynamic, so a tool that's needed to use for high performance computing or a tool that's needed even just as a on a smaller data set, that can easily be installed and may be available to researchers, and so that they can use it for their research. >> So kind of data as a service. I would love to know about the community itself. How are you guys sharing the results of kind of oh this process worked great for this type of analysis amongst your members? >> Yeah so I think that there's kind of two different targets in that sense that you can think of is that there's the researchers and the researchers that come to the platform and then there's actually the patient itself, and ultimately the HA's goal is to make, to use the data and use the researcher for patient centered care, so with the researchers specifically, we have a variety of tutorials available so that researchers can one, learn how to perform high performance computing analysis, see what other people have done. We have a forum where researchers can log on and enable, I guess access other researchers and talk to them about different analysis, and then additionally we have My Research Legacy, which is patient centered, so it's this is what's been found and this is what we can give back to you as the patient about your specific individualized treatment. >> What do you do on a daily basis? Take us through your job, are you writing code, are you slinging API's around? What are some of the things that you're doing? >> I think I might say all of the above. I think right now my main effort is focused on one, conducting research using the platform, so I do use the platform to answer my own research questions, and those we have presented at different conferences, for example the American Heart Association, we had a talk here about the precision medicine platform, and then two, I'm focused on strategically making the precision medicine platform better by getting more data, adding data to the platform, improving the way that data is harmonized in the platform, and improving the amount of data that we have, and the diversity, and the variety. >> Alright, we'll help you with that, so let's help you get some people recruited, so what do they got to do to volunteer, volunteer their data, because I think this is one of those things where you know people do want to help. So, how do they, how you onboard? You use the website, is it easy, one click? Do they have to wear an iWatch, I mean what I mean? >> Yeah. >> What's the deal? What do I got to do? >> So I think I would encourage researchers and scientists and anybody who is data centric to go to precision.heart.org, and they can just sign up for an account, they can contact us through that, there's plenty of different ways to get in touch with us and plenty of ways to help. >> Precision.heart.org. >> Yup, precision.heart.org. >> Stu: Register now. >> Register now click, >> Powered by AWS. >> Yup. >> Alright so I gotta ask you as an AWS customer, okay take your customer hat off, put your citizen's hat on, what is Amazon mean to you, I mean is it, how do you describe it to people who don't use it? >> Okay yeah, so I think... the HA's ultimate mission right, is to provide individualized treatment and cures for cardiovascular disease and stroke. Amazon is a way to enable that and make that actually happen so that we can mine extremely large data sets, identify those individualized patterns. It allows us to store data in a fashion where we can provide a market place where there's extremely large amounts of data, extremely diverse amounts of data, and data that can be processed effectively, so that it can be directly used for research. >> What's your favorite tool or product or service within Amazon? >> That's a good question. I think, I mean the cloud and s3 buckets are definitely in a sense they're my favorites because there's so much that can be stored right there, Athena I think is also pretty awesome, and then the EMR clusters with Spark. >> The list is too long. >> My jam. >> It is. (laughs) >> So, one of the interesting things that I love is a lot of my friends are in non-profits, fundraising is a big, big challenge, grants are again, a big challenge, have you guys seen any new opportunities as a result of the results of the research coming out of HA and AWS in the cloud? >> Yeah so I think one of the coolest things about the HA is that they have this Institute for Precision Cardiovascular Medicine, and the strategic partnership between the HA and AWS, even just this year we've launched 13 new grants, where the HA kind of backs the research behind, and the AWS provides credit so that people can come to the cloud and use the cloud and use the tools available on a grant funded basis. >> So tell me a little bit more about that program. Anybody specifically that you, kind of like saying, seeing that's used these credits from AWS to do some cool research? >> Yeah definitely, so I think specifically we have one grantee right now that is really focused on identifying outcomes across multiple clinical trials, so currently clinical trials take 20 years, and there's a large variety of them. I don't know if any of you are familiar with the Framingham heart study, the Dallas heart study, the Jackson heart study, and trying to determine how those trials compare, and what outcomes we can generate, and research insights we can generate across multiple data sets is something that's been challenging due to the ability to not being able to necessarily access that data, all of those different data sets together, and then two, trying to find ways to actually compare them, and so with the precision medicine platform, we have a grantee at the University of Colorado-Denver, who has been able to find those synchronicities across data sets and has actually created kind of a framework that then can be implemented in the precision medicine platform. >> Well I just registered, it takes really two seconds to register, that's cool. Thanks so much for pointing out precision.heart.org. Final question, you said EMR's your jam. (laughing) >> Why, why is it? Why do you like it so much, is it fast, is it easy to use? >> I think the speed is one of the things. When it comes to using genetic data and multiple biological levels of data, whether it be your genetics, your lifestyle, your environment factors, there's... it just ends up being extremely large amounts of data, and to be able to implement things like server-less AI, and artificial intelligence, and machine learning on that data set is time consuming, and having the power of an EMR cluster that is scalable makes that so much faster so that we can then answer our research questions faster and identify those insights and get them to out in the world. >> Gotta love the new services they're launching, too. It just builds on top of it. Doesn't it? >> Yes. >> Yeah, soon everyone's gonna be jamming on AWS in our opinion. Thanks so much for coming on, appreciate the stories and commentary. >> Yeah. >> Precision.heart.org, you want to volunteer if you're a researcher or a user, want to share your data, they've got a lot of data science mojo going on over there, so check it out. It's theCUBE bringing a lot of data here, tons of data from the show, three days of wall to wall coverage, we'll be back with more live coverage after this short break. (upbeat music)

Published Date : Nov 30 2017

SUMMARY :

Narrator: Live from Las Vegas, scientist at the American Heart Association, but one of the things that they mention is that the potential of technology Yeah so the HA has strategically partnered What kind of data do you guys look at? Yeah so the American Heart Association has launched the framework to help your customers protect data? so that it's not accessible to people who the Heart Association doesn't collect data themselves. and the hospitals that it's associated with, and so that they can use it for their research. How are you guys sharing the results of kind back to you as the patient about your conferences, for example the American Heart Association, do they got to do to volunteer, volunteer to go to precision.heart.org, and they can actually happen so that we can mine extremely I mean the cloud and s3 buckets It is. and the AWS provides credit so that people from AWS to do some cool research? kind of a framework that then can be implemented Final question, you said EMR's your jam. of data, and to be able to implement Gotta love the new services they're launching, too. Thanks so much for coming on, appreciate the Precision.heart.org, you want to volunteer

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
AWSORGANIZATION

0.99+

Laura StevensPERSON

0.99+

LauraPERSON

0.99+

American Heart AssociationORGANIZATION

0.99+

Amazon Web ServicesORGANIZATION

0.99+

Keith TownsendPERSON

0.99+

John FurrierPERSON

0.99+

two secondsQUANTITY

0.99+

20 yearsQUANTITY

0.99+

Heart AssociationORGANIZATION

0.99+

AmazonORGANIZATION

0.99+

Institute for Precision Cardiovascular MedicineORGANIZATION

0.99+

1924DATE

0.99+

AHAORGANIZATION

0.99+

Las VegasLOCATION

0.99+

Institute for Precision Cardiovascular MedicineORGANIZATION

0.99+

13 new grantsQUANTITY

0.99+

precision.heart.orgOTHER

0.99+

PythonTITLE

0.99+

HAORGANIZATION

0.99+

twoQUANTITY

0.99+

Precision.heart.orgOTHER

0.99+

University of ColoradoORGANIZATION

0.99+

this yearDATE

0.99+

HIPAATITLE

0.98+

oneQUANTITY

0.98+

R BioconductorTITLE

0.98+

bothQUANTITY

0.98+

DallasLOCATION

0.98+

IntelORGANIZATION

0.98+

iWatchCOMMERCIAL_ITEM

0.97+

one clickQUANTITY

0.97+

three daysQUANTITY

0.96+

VernaPERSON

0.96+

tons of dataQUANTITY

0.96+

s3TITLE

0.92+

one granteeQUANTITY

0.92+

theCUBETITLE

0.9+

two different targetsQUANTITY

0.9+

My Research LegacyTITLE

0.9+

Invent 2017EVENT

0.89+

FraminghamORGANIZATION

0.89+

SparkTITLE

0.85+

DenverORGANIZATION

0.83+

todayDATE

0.82+

HalTITLE

0.82+

lot of dataQUANTITY

0.79+

Narrator: Live from LasTITLE

0.79+

InventEVENT

0.71+

re:Invent 2017EVENT

0.71+

past few yearsDATE

0.7+

one sizeQUANTITY

0.67+

EMRORGANIZATION

0.64+

VegasLOCATION

0.63+

s3COMMERCIAL_ITEM

0.56+

reEVENT

0.53+

JacksonPERSON

0.52+

precisionORGANIZATION

0.5+

Armughan Ahmad, Dell EMC | Super Computing 2017


 

>> Announcer: From Denver, Colorado, it's theCUBE, covering Super Computing 17. Brought to you by Intel. (soft electronic music) Hey, welcome back, everybody. Jeff Frick here with theCUBE. We're gettin' towards the end of the day here at Super Computing 2017 in Denver, Colorado. 12,000 people talkin' really about the outer limits of what you can do with compute power and lookin' out into the universe and black holes and all kinds of exciting stuff. We're kind of bringin' it back, right? We're all about democratization of technology for people to solve real problems. We're really excited to have our last guest of the day, bringin' the energy, Armughan Ahmad. He's SVP and GM, Hybrid Cloud and Ready Solutions for Dell EMC, and a many-time CUBE alumni. Armughan, great to see you. >> Yeah, good to see you, Jeff. So, first off, just impressions of the show. 12,000 people, we had no idea. We've never been to this show before. This is great. >> This is a show that has been around. If you know the history of the show, this was an IEEE engineering show, that actually turned into high-performance computing around research-based analytics and other things that came out of it. But, it's just grown. We're seeing now, yesterday the super computing top petaflops were released here. So, it's fascinating. You have some of the brightest minds in the world that actually come to this event. 12,000 of them. >> Yeah, and Dell EMC is here in force, so a lot of announcements, a lot of excitement. What are you guys excited about participating in this type of show? >> Yeah, Jeff, so when we come to an event like this, HBC-- We know that HBC is also evolved from your traditional HBC, which was around modeling and simulation, and how it started from engineering to then clusters. It's now evolving more towards machine learning, deep learning, and artificial intelligence. So, what we announced here-- Yesterday, our press release went out. It was really related to how our strategy of advancing HBC, but also democratizing HBC's working. So, on the advancing, on the HBC side, the top 500 super computing list came out. We're powering some of the top 500 of those. One big one is TAC, which is Texas Institute out of UT, University of Texas. They now have, I believe, the number 12 spot in the top 500 super computers in the world, running an 8.2 petaflops off computing. >> So, a lot of zeros. I have no idea what a petaflop is. >> It's very, very big. It's very big. It's available for machine learning, but also eventually going to be available for deep learning. But, more importantly, we're also moving towards democratizing HBC because we feel that democratizing is also very important, where HBC should not only be for the research and the academia, but it should also be focused towards the manufacturing customers, the financial customers, our commercial customers, so that they can actually take the complexity of HBC out, and that's where our-- We call it our HBC 2.0 strategy, off learning from the advancements that we continue to drive, to then also democratizing it for our customers. >> It's interesting, I think, back to the old days of Intel microprocessors getting better and better and better, and you had Spark and you had Silicon Graphics, and these things that were way better. This huge differentiation. But, the Intel I32 just kept pluggin' along and it really begs the question, where is the distinction now? You have huge clusters of computers you can put together with virtualization. Where is the difference between just a really big cluster and HBC and super computing? >> So, I think, if you look at HBC, HBC is also evolving, so let's look at the customer view, right? So, the other part of our announcement here was artificial intelligence, which is really, what is artificial intelligence? It's, if you look at a customer retailer, a retailer has-- They start with data, for example. You buy beer and chips at J's Retailer, for example. You come in and do that, you usually used to run a SEQUEL database or you used to run a RDBMS database, and then that would basically tell you, these are the people who can purchase from me. You know their purchase history. But, then you evolved into BI, and then if that data got really, very large, you then had an HBC cluster, would which basically analyze a lot of that data for you, and show you trends and things. That would then tell you, you know what, these are my customers, this is how many times they are frequent. But, now it's moving more towards machine learning and deep learning as well. So, as the data gets larger and larger, we're seeing datas becoming larger, not just by social media, but your traditional computational frameworks, your traditional applications and others. We're finding that data is also growing at the edge, so by 2020, about 20 billion devices are going to wake up at the edge and start generating data. So, now, Internet data is going to look very small over the next three, four years, as the edge data comes up. So, you actually need to now start thinking of machine learning and deep learning a lot more. So, you asked the question, how do you see that evolving? So, you see an RDBMS traditional SQL evolving to BI. BI then evolves into either an HBC or hadoop. Then, from HBC and hadoop, what do you do next? What you do next is you start to now feed predictive analytics into machine learning kind of solutions, and then once those predictive analytics are there, then you really, truly start thinking about the full deep learning frameworks. >> Right, well and clearly like the data in motion. I think it's funny, we used to make decisions on a sample of data in the past. Now, we have the opportunity to take all the data in real time and make those decisions with Kafka and Spark and Flink and all these crazy systems that are comin' to play. Makes Hadoop look ancient, tired, and yesterday, right? But, it's still valid, right? >> A lot of customers are still paying. Customers are using it, and that's where we feel we need to simplify the complex for our customers. That's why we announced our Machine Learning Ready Bundle and our Deep Learning Ready Bundle. We announced it with Intel and Nvidia together, because we feel like our customers either go to the GPU route, which is your accelerator's route. We announced-- You were talking to Ravi, from our server team, earlier, where he talked about the C4140, which has the quad GPU power, and it's perfect for deep learning. But, with Intel, we've also worked on the same, where we worked on the AI software with Intel. Why are we doing all of this? We're saying that if you thought that RDBMS was difficult, and if you thought that building a hadoop cluster or HBC was a little challenging and time consuming, as the customers move to machine learning and deep learning, you now have to think about the whole stack. So, let me explain the stack to you. You think of a compute storage and network stack, then you think of-- The whole eternity. Yeah, that's right, the whole eternity of our data center. Then you talk about our-- These frameworks, like Theano, Caffe, TensorFlow, right? These are new frameworks. They are machine learning and deep learning frameworks. They're open source and others. Then you go to libraries. Then you go to accelerators, which accelerators you choose, then you go to your operating systems. Now, you haven't even talked about your use case. Retail use case or genomic sequencing use case. All you're trying to do is now figure out TensorFlow works with this accelerator or does not work with this accelerator. Or, does Caffe and Theano work with this operating system or not? And, that is a complexity that is way more complex. So, that's where we felt that we really needed to launch these new solutions, and we prelaunched them here at Super Computing, because we feel the evolution of HBC towards AI is happening. We're going to start shipping these Ready Bundles for machine learning and deep learning in first half of 2018. >> So, that's what the Ready Solutions are? You're basically putting the solution together for the client, then they can start-- You work together to build the application to fix whatever it is they're trying to do. >> That's exactly it. But, not just fix it. It's an outcome. So, I'm going to go back to the retailer. So, if you are the CEO of the biggest retailer and you are saying, hey, I just don't want to know who buys from me, I want to now do predictive analytics, which is who buys chips and beer, but who can I sell more things to, right? So, you now start thinking about demographic data. You start thinking about payroll data and other datas that surround-- You start feeding that data into it, so your machine now starts to learn a lot more of those frameworks, and then can actually give you predictive analytics. But, imagine a day where you actually-- The machine or the deep learning AI actually tells you that it's not just who you want to sell chips and beer to, it's who's going to buy the 4k TV? You're makin' a lot of presumptions. Well, there you go, and the 4k-- But, I'm glad you're doin' the 4k TV. So, that's important, right? That is where our customers need to understand how predictive analytics are going to move towards cognitive analytics. So, this is complex but we're trying to make that complex simple with these Ready Solutions from machine learning and deep learning. >> So, I want to just get your take on-- You've kind of talked about these three things a couple times, how you delineate between AI, machine learning, and deep learning. >> So, as I said, there is an evolution. I don't think a customer can achieve artificial intelligence unless they go through the whole crawl walk around space. There's no shortcuts there, right? What do you do? So, if you think about, Mastercard is a great customer of ours. They do an incredible amount of transactions per day, (laughs) as you can think, right? In millions. They want to do facial recognitions at kiosks, or they're looking at different policies based on your buying behavior-- That, hey, Jeff doesn't buy $20,000 Rolexes every year. Maybe once every week, you know, (laughs) it just depends how your mood is. I was in the Emirates. Exactly, you were in Dubai (laughs). Then, you think about his credit card is being used where? And, based on your behaviors that's important. Now, think about, even for Mastercard, they have traditional RDBMS databases. They went to BI. They have high-performance computing clusters. Then, they developed the hadoop cluster. So, what we did with them, we said okay. All that is good. That data that has been generated for you through customers and through internal IT organizations, those things are all very important. But, at the same time, now you need to start going through this data and start analyzing this data for predictive analytics. So, they had 1.2 million policies, for example, that they had to crunch. Now, think about 1.2 million policies that they had to say-- In which they had to take decisions on. That they had to take decisions on. One of the policies could be, hey, does Jeff go to Dubai to buy a Rolex or not? Or, does Jeff do these other patterns, or is Armughan taking his card and having a field day with it? So, those are policies that they feed into machine learning frameworks, and then machine learning actually gives you patterns that they can now see what your behavior is. Then, based on that, eventually deep learning is when they move to next. Deep learning now not only you actually talk about your behavior patterns on the credit card, but your entire other life data starts to-- Starts to also come into that. Then, now, you're actually talking about something before, that's for catching a fraud, you can actually be a lot more predictive about it and cognitive about it. So, that's where we feel that our Ready Solutions around machine learning and deep learning are really geared towards, so taking HBC to then democratizing it, advancing it, and then now helping our customers move towards machine learning and deep learning, 'cause these buzzwords of AIs are out there. If you're a financial institution and you're trying to figure out, who is that customer who's going to buy the next mortgage from you? Or, who are you going to lend to next? You want the machine and others to tell you this, not to take over your life, but to actually help you make these decisions so that your bottom line can go up along with your top line. Revenue and margins are important to every customer. >> It's amazing on the credit card example, because people get so pissed if there's a false positive. With the amount of effort that they've put into keep you from making fraudulent transactions, and if your credit card ever gets denied, people go bananas, right? The behavior just is amazing. But, I want to ask you-- We're comin' to the end of 2017, which is hard to believe. Things are rolling at Dell EMC. Michael Dell, ever since he took that thing private, you could see the sparkle in his eye. We got him on a CUBE interview a few years back. A year from now, 2018. What are we going to talk about? What are your top priorities for 2018? >> So, number one, Michael continues to talk about that our vision is advancing human progress through technology, right? That's our vision. We want to get there. But, at the same time we know that we have to drive IT transformation, we have to drive workforce transformation, we have to drive digital transformation, and we have to drive security transformation. All those things are important because lots of customers-- I mean, Jeff, do you know like 75% of the S&P 500 companies will not exist by 2027 because they're either not going to be able to make that shift from Blockbuster to Netflix, or Uber taxi-- It's happened to our friends at GE over the last little while. >> You can think about any customer-- That's what Michael did. Michael actually disrupted Dell with Dell technologies and the acquisition of EMC and Pivotal and VMWare. In a year from now, our strategy is really about edge to core to the cloud. We think the world is going to be all three, because the rise of 20 billion devices at the edge is going to require new computational frameworks. But, at the same time, people are going to bring them into the core, and then cloud will still exist. But, a lot of times-- Let me ask you, if you were driving an autonomous vehicle, do you want that data-- I'm an Edge guy. I know where you're going with this. It's not going to go, right? You want it at the edge, because data gravity is important. That's where we're going, so it's going to be huge. We feel data gravity is going to be big. We think core is going to be big. We think cloud's going to be big. And we really want to play in all three of those areas. >> That's when the speed of light is just too damn slow, in the car example. You don't want to send it to the data center and back. You don't want to send it to the data center, you want those decisions to be made at the edge. Your manufacturing floor needs to make the decision at the edge as well. You don't want a lot of that data going back to the cloud. All right, Armughan, thanks for bringing the energy to wrap up our day, and it's great to see you as always. Always good to see you guys, thank you. >> All right, this is Armughan, I'm Jeff Frick. You're watching theCUBE from Super Computing Summit 2017. Thanks for watching. We'll see you next time. (soft electronic music)

Published Date : Nov 16 2017

SUMMARY :

Brought to you by Intel. So, first off, just impressions of the show. You have some of the brightest minds in the world What are you guys excited about So, on the advancing, on the HBC side, So, a lot of zeros. the complexity of HBC out, and that's where our-- You have huge clusters of computers you can and then if that data got really, very large, you then had and all these crazy systems that are comin' to play. So, let me explain the stack to you. for the client, then they can start-- The machine or the deep learning AI actually tells you So, I want to just get your take on-- But, at the same time, now you need to start you could see the sparkle in his eye. But, at the same time we know that we have to But, at the same time, people are going to bring them and it's great to see you as always. We'll see you next time.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
MichaelPERSON

0.99+

Jeff FrickPERSON

0.99+

JeffPERSON

0.99+

DubaiLOCATION

0.99+

ArmughanPERSON

0.99+

$20,000QUANTITY

0.99+

Michael DellPERSON

0.99+

EMCORGANIZATION

0.99+

2018DATE

0.99+

TACORGANIZATION

0.99+

NvidiaORGANIZATION

0.99+

2027DATE

0.99+

Armughan AhmadPERSON

0.99+

DellORGANIZATION

0.99+

12,000QUANTITY

0.99+

EmiratesLOCATION

0.99+

75%QUANTITY

0.99+

MastercardORGANIZATION

0.99+

NetflixORGANIZATION

0.99+

2020DATE

0.99+

PivotalORGANIZATION

0.99+

8.2 petaflopsQUANTITY

0.99+

C4140COMMERCIAL_ITEM

0.99+

12,000 peopleQUANTITY

0.99+

Texas InstituteORGANIZATION

0.99+

GEORGANIZATION

0.99+

OneQUANTITY

0.99+

1.2 million policiesQUANTITY

0.99+

J's RetailerORGANIZATION

0.99+

Denver, ColoradoLOCATION

0.99+

YesterdayDATE

0.99+

500 super computersQUANTITY

0.99+

millionsQUANTITY

0.99+

20 billion devicesQUANTITY

0.99+

University of TexasORGANIZATION

0.99+

VMWareORGANIZATION

0.99+

CaffeORGANIZATION

0.98+

Super Computing Summit 2017EVENT

0.98+

yesterdayDATE

0.98+

Dell EMCORGANIZATION

0.98+

UberORGANIZATION

0.98+

IntelORGANIZATION

0.98+

HBCORGANIZATION

0.97+

RaviPERSON

0.97+

about 20 billion devicesQUANTITY

0.97+

end of 2017DATE

0.97+

I32COMMERCIAL_ITEM

0.97+

threeQUANTITY

0.96+

CUBEORGANIZATION

0.96+

first half of 2018DATE

0.96+

Super Computing 17EVENT

0.95+

Super Computing 2017EVENT

0.95+

Deep Learning Ready BundleCOMMERCIAL_ITEM

0.94+

GMORGANIZATION

0.94+

HadoopTITLE

0.93+

three thingsQUANTITY

0.91+

S&P 500ORGANIZATION

0.91+

SQLTITLE

0.9+

UTORGANIZATION

0.9+

about 1.2 million policiesQUANTITY

0.89+

firstQUANTITY

0.89+

RolexORGANIZATION

0.89+

Hybrid CloudORGANIZATION

0.88+

BlockbusterORGANIZATION

0.87+

TheanoORGANIZATION

0.86+

12QUANTITY

0.86+

IEEEORGANIZATION

0.85+