VeeamON Power Panel | VeeamON 2021
>>President. >>Hello everyone and welcome to wien on 2021. My name is Dave Volonte and you're watching the cubes continuous coverage of the event. You know, VM is a company that made its mark riding the virtualization wave, but quite amazingly has continued to extend its product portfolio and catch the other major waves of the industry. Of course, we're talking about cloud backup. SaS data protection was one of the early players there making moves and containers. And this is the VM on power panel with me or Danny Allen, who is the Ceo and Senior vice president of product strategy at VM. Dave Russell is the vice President of enterprise Strategy, of course, said Vin and Rick Vanover, senior director of product strategy at VM. It's great to see you again. Welcome back to the cube. >>Good to be here. >>Well, it had to be here. >>Yeah, let's do it. >>Let's do this. So Danny, you know, we heard you kind of your keynotes and we saw the general sessions and uh sort of diving into the breakouts. But the thing that jumps out to me is this growth rate that you're on. Uh you know, many companies and we've seen this throughout the industry have really struggled, you know, moving from the traditional on prem model to an an A. R. R. Model. Uh they've had challenges doing so the, I mean, you're not a public company, but you're quite transparent and a lot of your numbers 25% a our our growth year of a year in the last quarter, You know, 400,000 plus customers. You're talking about huge numbers of downloads of backup and replication Danny. So what are your big takeaways from the last, You know, 6-12 months? I know it was a strange year obviously, but you guys just keep cranking. >>Yeah, so we're obviously hugely excited by this and it really is a confluence of various things. It's our, it's our partners, it's the channel. Um, it's our customers frankly that that guide us and give us direction on what to do. But I always focus in on the product because I, you know, we run product strategy here, this group and we're very focused on building good products and I would say there's three product areas that are on maximum thrust right now. One is in the data center. So we built a billion dollar business on being the very best in the data center for V sphere, hyper V, um, for Nutanix, HV and as we announced also with red hat virtualization. So data center obviously a huge thrust for us going forward. The second assess Office 3 65 is exploding. We already announced we're protecting 5.8 million users right now with being back up for Office 3 65 and there's a lot of room to grow there. There's 145 million daily users of Microsoft teams. So a lot of room to grow. And then the third areas cloud, we moved over 100 petabytes of data into the public cloud in Q one and there's a lot of opportunity there as well. So those three things are driving the growth, the data center SaAS and cloud >>Davis. I want to get your kind of former analyst perspective on this. Uh you know, I know, you know, it's kind of become cliche but you still got that D. N. A. And I'm gonna tap it. So when you think about and you were following beam, of course very closely during its ascendancy with virtualization. And back then you wouldn't just take your existing, you know, approaches to back up in your processes and just slap them on to virtualization. That that wouldn't have worked. You had to rethink your backup. And it seems like I want to ask you about cloud because people talk about lift and shift and what I hear from customers is, you know, if I just lift and shift to cloud, it's okay, but if I don't have a plan to change my operating model, you know, I don't get the real benefit out of it. And so I would think back up data protection, data management etcetera is a key part of that. So how are you thinking about cloud and the opportunity there? >>Yeah, that's a good point, David. You know, I think the key area right there is it's important to protect the workload of the environment. The way that that environment is naturally is best suited to be protected and also to interact in a way that the administrator doesn't have to rethink, doesn't have to change their process so early on. Um I think it was very successful because the interface is the work experience looked like what an active directory administrator was used to, seeing if they went to go and protect something with me where to go recover an item. Same is true in the cloud, You don't want to just take what's working well in one area and just force it, you know, around round peg into a square hole. This doesn't work well. So you've got to think about the environment and you've got to think about what's gonna be the real use case for getting access to this data. So you want to really tune things and there's obviously commonality involved, but from a workflow perspective, from an application perspective and then a delivery model perspective, Now, when it comes to hybrid cloud multi cloud, it's important to look like that you belong there, not a fish out of water. >>Well, so of course, Danny you were talking to talking about you guys have product first, Right? And so rick your your key product guy here. What's interesting to me is when you look at the history of the technology industry and disruption, it's it's so often that the the incumbent, which you knew now an incumbent, you know, you're not the startup anymore, but the incumbent has challenges riding these these new waves because you've got to serve the existing customer base, but you gotta ride the new momentum as well. So how rick do you approach that from a product standpoint? Because based on the numbers that we see it doesn't you seem to be winning in both the traditional business and the new business. So how do you adapt from a product standpoint? >>Well, Dave, that's a good question. And Danny set it up? Well, it's really the birth of the Wien platform and its relevance in the market. In my 11th year here at Wien, I've had all kinds of conversations. Right. You know, the perception was that, you know, this smb toy for one hyper Advisor those days are long gone. We can check the boxes across the data center and cloud and even cloud native apps. You know, one of the things that my team has done is invest heavily in both people and staff on kubernetes, which aligns to our casting acquisition, which was featured heavily here at V Mon. So I think that being able to have that complete platform conversation Dave has really given us incredible momentum but also credibility with the customers because more than ever, this fundamental promise of having data backed up and being able to drive a recovery for whatever may happen to data nowadays. You know, that's a real emotional, important thing for people and to be able to bring that kind of outcome across the data center, across the cloud, across changes in what they do kubernetes that's really aligned well to our success and you know, I love talking to customers now. It's a heck of a lot easier when you can say yes to so many things and get the technical win. So that kind of drives a lot of the momentum Dave, but it's really the platform. >>So let's talk about the future of it and I want all you guys to chime in here and Danny, you start up, How do you see it? I mean, I always say the last 10 years, the next 10 years ain't gonna be like the last 10 years whether it's in cloud or hybrid et cetera. But so how Danny do you see I. T. In the future of I. T. Where do you see VM fitting in, how does that inform your roadmap, your product strategy? Maybe you could kick that segment off? >>Yeah. I think of the kind of the two past decades that we've gone through starting back in 2000 we had a lot of digital services built for end users and it was built on physical infrastructure and that was fantastic. Obviously we could buy things online, we could order close we could order food, we we could do things interact with end users. The second era about a decade later was based on virtualization. Now that wasn't a benefit so much to the end user is a benefit to the business. The Y because you could put 10 servers on a single physical server and you could be a lot more flexible in terms of delivery. I really think this next era that we're going into is actually based on containers. That's why the cost of acquisition is so strategic to us. Because the unique thing about containers is they're designed for to be consumption friendly. You spin them up, you spin them down, you provision them, you d provisions and they're completely portable. You can move it >>from on >>premises if you're running open shift to e k s a k s G k E. And so I think the next big era that we're going to go through is this movement towards containerized infrastructure. Now, if you ask me who's running that, I still think there's going to be a data center operations team, platform ups is the way that I think about them who run that because who's going to take the call in the middle of the night. But it is interesting that we're going through this transformation and I think we're in the very early stages of this radical transformation to a more consumption based model. Dave. I don't know what you think about that. >>Yeah, I would say something pretty similar Danny. It sounds cliche day valenti, but I take everything back to digital transformation. And the reason I say that is to me, digital transformation is about improving customer intimacy and so that you can deliver goods and services that better resonate and you can deliver them in better time frame. So exactly what Danny said, you know, I think that the siloed approaches of the past where we built very hard in environments and we were willing to take a long time to stand those up and then we have very tight change control. I feel like 2020 sort of a metaphor for where the data center is going to throw all that out the window we're compiling today. We're shipping today and we're going to get experience today and we're going to refine it and do it again tomorrow. But that's the environment we live in. And to Danny's point why containers are so important. That notion of shift left meaning experience things earlier in the cycle. That is going to be the reality of the data center regardless of whether the data center is on prem hybrid cloud, multi cloud or for some of us potentially completely in the cloud. >>So rick when you think about some of your peeps like the backup admit right and how that role is changing in a big discussion in the economy now about the sort of skills gap we got all these jobs and and yet there's still all this unemployment now, you know the debate about the reasons why, but there's a there's a transition enrolls in terms of how people are using products and obviously containers brings that, what what are you seeing when you talk to like a guy called him your peeps? Yeah, it's >>an evolving conversation. Dave the audience, right. It has to be relevant. Uh you know, we were afforded good luxury in that data center wheelhouse that Danny mentioned. So virtualization platform storage, physical servers, that's a pretty good start. But in the software as a service wheelhouse, it's a different persona now, they used to talk to those types of people, there's a little bit of connection, but as we go farther to the cloud, native apps, kubernetes and some of the other SAAS platforms, it is absolutely an audience journey. So I've actually worked really hard on that in my team, right? Everything from what I would say, parachuting into a community, right? And you have to speak their language. Number one reason is just number one outcomes just be present. And if you're in these communities you can find these individuals, you can talk their language, you can resonate with their needs, right? So that's something uh you know, everything from Levin marketing strategy to the community strategy to even just seating products in the market, That's a recipe that beam does really well. So yeah, it's a moving target for sure. >>Dave you were talking about the cliche of digital transformation and I'll say this may be pre Covid, I really felt like it was a cliche, there was a lot of, you know, complacency, I'll call it, but then the force marks the digital change that uh and now we kind of understand if you're not a digital business, you're in trouble. Uh And so my question is how it relates to some of the trends that we've been talking about in terms of cloud containers, We've seen the SAs ification for the better part of a decade now, but specifically as it relates to migration, it's hard for customers to just migrate their application portfolio to the cloud. Uh It's hard to fund it. It takes a long time. It's complex. Um how do you see that cloud migration evolving? Maybe that's where hybrid comes in And again, I'm interested in how you guys think about it and how it affects your strategy. >>Yeah. Well it's a complex answer as you might imagine because 400,000 customers, we take the exact same code. The exact same ice so that I run on my laptop is the exact same being backup and replication image that a major bank protects almost 20,000 machines and a petabytes of data. And so what that means is that you have to look at things on a case by case basis for some of us continuing to operate proprietary systems on prem might be the best choice for a certain workload. But for many of us the Genie is kind of out of the bottle with 2020 we have to move faster. It's less about safety and a lot more about speed and favorable outcome. We'll fix it if it's broken but let's get going. So for organizations struggling with how to move to the cloud, believe it or not, backup and recovery is an excellent way to start to venture into that because you can start to move data backup ISm data movement engine. So we can start to see data there where it makes sense. But rick would be quick to point out we want to offer a safe return. We have instances of where people want to repatriate data back and having a portable data format is key to that Rick. >>Uh yeah, I had a conversation recently with an organization managing cloud sprawl. They decided to consolidate, we're going to use this cloud, so it was removing a presence from one cloud that starts with an A and migrating it to the other cloud that starts with an A. You know, So yeah, we've seen that need for portability repatriation on prem classic example going from on prem apps to software as a service models for critical apps. So data mobility is at the heart of VM and with all the different platforms, kubernetes comes into play as well. It's definitely aligning to the needs that we're seeing in the market for sure. >>So repatriation, I want to stay on that for a second because you're, you're an arms dealer, you don't care if they're in the cloud or on prem and I don't know, maybe you make more money in one or the other, but you're gonna ride whatever waves the market gives you so repatriation to me implies. Or maybe I'm just inferring that somebody's moved to the cloud and they feel like, wow, we've made a mistake, it was too fast, too expensive. It didn't work for us. So now we're gonna bring it back on prem. Is that what you're saying? Are you saying they actually want their data in both both places. As another layer of data protection Danny. I wonder if you could address that. What are you seeing? >>Well, one of the interesting things that we saw recently, Dave Russell actually did the survey on this is that customers will actually build their work laid loads in the cloud with the intent to bring it back on premises. And so that repatriation is real customers actually don't just accidentally fall into it, but they intend to do it. And the thing about being everyone says, hey, we're disrupting the market, we're helping you go through this transformation, we're helping you go forward. Actually take a slightly different view of this. The team gives them the confidence that they can move forward if they want to, but if they don't like it, then they can move back and so we give them the stability through this incredible pace, change of innovation. We're moving forward so so quickly, but we give them the ability to move forward if they want then to recover to repatriate if that's what they need to do in a very effective way. And Dave maybe you can touch on that study because I know that you talked to a lot of customers who do repatriate workloads after moving them to the cloud. >>Yeah, it's kind of funny Dave not in the analyst business right now, but thanks to Danny and our chief marketing Officer, we've got now half a dozen different research surveys that have either just completed or in flight, including the largest in the data protection industry's history. And so the survey that Danny alluded to, what we're finding is people are learning as they're going and in some cases what they thought would happen when they went to the cloud they did not experience. So the net kind of funny slide that we discovered when we asked people, what did you like most about going to the cloud and then what did you like least about going to the cloud? The two lists look very similar. So in some cases people said, oh, it was more stable. In other cases people said no, it was actually unstable. So rick I would suggest that that really depends on the practice that you bring to it. It's like moving from a smaller house to a larger house and hoping that it won't be messy again. Well if you don't change your habits, it's eventually going to end up in the same situation. >>Well, there's still door number three and that's data reuse and analytics. And I found a lot of organizations love the idea of at least manipulating data, running test f scenarios on yesterday's production, cloud workload completely removed from the cloud or even just analytics. I need this file. You know, those types of scenarios are very easy to do today with them. And you know, sometimes those repatriations, those portable recoveries, Sometimes people do that intentionally, but sometimes they have to do it. You know, whether it's fire, flood and blood and you know, oh, I was looks like today we're moving to the cloud because I've lost my data center. Right. Those are scenarios that, that portable data format really allows organizations to do that pretty easily with being >>it's a good discussion because to me it's not repatriation, it has this negative connotation, the zero sum game and it's not Danny what you describe and rick as well. It was kind of an experimentation, a purposeful. We're going to do it in the cloud because we can and it's cheap and low risk to spin it up and then we're gonna move it because we've always thought we're going to have it on prem. So, so you know, there is some zero sum game between the cloud and on prem. Clearly no question about it. But there's also this rising tide lifts all ship. I want to, I want to change the subject to something that's super important and and top of mind it's in the press and it ain't going away and that is cyber and specifically ransomware. I mean, since the solar winds hack and it seems to me that was a new milestone in the capabilities and aggressiveness of the adversary who is very well funded and quite capable. And what we're seeing is this idea of tucking into the supply chain of islands, so called island hopping. You're seeing malware that's self forming and takes different signatures very stealthy. And the big trend that we've seen in the last six months or so is that the bad guys will will lurk and they'll steal all kinds of sensitive data. And then when you have an incident response, they will punish you for responding. And they will say, okay, fine, you want to do that. We're going to hold you ransom. We're gonna encrypt your data. And oh, by the way, we stole this list of positive covid test results with names from your website and we're gonna release it if you don't pay their. I mean, it's like, so you have to be stealthy in your incident response. And this is a huge problem. We're talking about trillions of dollars lost each year in, in in cybercrime. And so, uh, you know, it's again, it's this uh the bad news is good news for companies like you. But how do you help customers deal with this problem? What are you seeing Danny? Maybe you can chime in and others who have thoughts? >>Well we're certainly seeing the rise of cyber like crazy right now and we've had a focus on this for a while because if you think about the last line of defense for customers, especially with ransomware, it is having secure backups. So whether it be, you know, hardened Linux repositories, but making sure that you can store the data, have it offline, have it, have it encrypted immutable. Those are things that we've been focused on for a long while. It's more than that. Um it's detection and monitoring of the environment, which is um certainly that we do with our monitoring tools and then also the secure recovery. The last thing that you want to do of course is bring your backups or bring your data back online only to be hit again. And so we've had a number of capabilities across our portfolio to help in all of these. But I think what's interesting is where it's going, if you think about unleashing a world where we're continuously delivering, I look at things like containers where you have continues delivery and I think every time you run that helm commander, every time you run that terra form command, wouldn't that be a great time to do a backup to capture your data so that you don't have an issue once it goes into production. So I think we're going towards a world where security and the protection against these cyber threats is built into the supply chain rather than doing it on just a time based uh, schedule. And I know rick you're pretty involved on the cyber side as well. Would you agree with that? I >>would. And you know, for organizations that are concerned about ransomware, you know, this is something that is taken very seriously and what Danny explained for those who are familiar with security, he kind of jumped around this, this universally acceptable framework in this cybersecurity framework there, our five functions that are a really good recipe on how you can go about this. And and my advice to IT professionals and decision makers across the board is to really align everything you do to that framework. Backup is a part of it. The security monitoring and user training. All those other things are are areas that that need to really follow that wheel of functions. And my little tip here and this is where I think we can introduce some differentiation is around detection and response. A lot of people think of backup product would shine in both protection and recovery, which it does being does, but especially on response and detection, you know, we have a lot of capabilities that become impact opportunities for organizations to be able to really provide successful outcomes through the other functions. So it's something we've worked on a lot. In fact we've covered here at the event. I'm pretty sure it will be on replay the updated white paper. All those other resources for different levels can definitely guide them through. >>So we follow up to the detection is what analytics that help you identify whatever lateral movement or people go in places they shouldn't go. I mean the hard part is is you know, the bad guys are living off the land, meaning they're using your own tooling to to hack you. So they're not it's not like they're introducing something new that shouldn't be there. They're they're just using making judo moves against you. So so specifically talk a little bit more about your your detection because that's critical. >>Sure. So I'll give you one example imagine we capture some data in the form of a backup. Now we have an existing advice that says, you know what Don't put your backup infrastructure with internet connectivity. Use explicit minimal permissions. And those three things right there and keep it up to date. Those four things right there will really hedge off a lot of the different threat vectors to the back of data, couple that with some of the mutability offline or air gapped capabilities that Danny mentioned and you have an additional level of resiliency that can really ensure that you can drive recovery from an analytic standpoint. We have an api that allows organizations to look into the backup data. Do more aggressive scanning without any exclusions with different tools on a flat file system. You know, the threats can't jump around in memory couple that with secure restore. When you reintroduce things into the environment From a recovery standpoint, you don't want to reintroduce threats. So there's protections, there's there's confidence building steps along the way with them and these are all generally available technologies. So again, I got this white paper, I think we're up to 50 pages now, but it's a very thorough that goes through a couple of those scenarios. But you know, it gets the uh, it gets quickly into things that you wouldn't expect from a backup product. >>Please send me a copy if you, if you don't mind. I this is a huge problem and you guys are global company. I admittedly have a bit of a US bias, but I was interviewing robert Gates one time the former defense secretary and we're talking about cyber war and I said, don't we have the best cyber, can't we let go on the offense? He goes, yeah, we can, but we got the most to lose. So this is really a huge problem for organizations. All right, guys, last question I gotta ask you. So what's life like under, under inside capital of the private equity? What's changed? What's, what's the same? Uh, do you hear from our good friend ratner at all? Give us the update there. >>Yes. Oh, absolutely fantastic. You know, it's interesting. So obviously acquired by insight partners in February of 2020, right, when the pandemic was hitting, but they essentially said light the fuse, keep the engine's going. And we've certainly been doing that. They haven't held us back. We've been hiring like crazy. We're up to, I don't know what the count is now, I think 4600 employees, but um, you know, people think of private equity and they think of cost optimizations and, and optimizing the business, That's not the case here. This is a growth opportunity and it's a growth opportunity simply because of the technology opportunity in front of us to keep, keep the engine's going. So we hear from right near, you know, on and off. But the new executive team at VM is very passionate about driving the success in the industry, keeping abreast of all the technology changes. It's been fantastic. Nothing but good things to say. >>Yes, insight inside partners, their players, we watched them watch their moves and so it's, you know, I heard Bill McDermott, the ceo of service now the other day talking about he called himself the rule of 60 where, you know, I always thought it was even plus growth, you know, add that up. And that's what he was talking about free cash flow. He's sort of changing the definition a little bit but but so what are you guys optimizing for you optimizing for growth? Are you optimising for Alberta? You optimizing for free cash flow? I mean you can't do All three. Right. What how do you think about that? >>Well, we're definitely optimizing for growth. No question. And one of the things that we've actually done in the past 12 months, 18 months is beginning to focus on annual recurring revenue. You see this in our statements, I know we're not public but we talk about the growth in A. R. R. So we're certainly focused on that growth in the annual recovering revenue and that that's really what we tracked too. And it aligns well with the cloud. If you look at the areas where we're investing in cloud native and the cloud and SAAS applications, it's very clear that that recurring revenue model is beneficial. Now We've been lucky, I think we're 13 straight quarters of double-digit growth. And and obviously they don't want to see that dip. They want to see that that growth continue. But we are optimizing on the growth trajectory. >>Okay. And you see you clearly have a 25% growth last quarter in A. R. R. Uh If I recall correctly, the number was evaluation was $5 billion last january. So obviously then, given that strategy, Dave Russell, that says that your tam is a lot bigger than just the traditional backup world. So how do you think about tam? I'll we'll close there >>and uh yeah, I think you look at a couple of different ways. So just in the backup recovery space or backup in replication to paying which one you want to use? You've got a large market there in excess of $8 billion $1 billion dollar ongoing enterprise. Now, if you look at recent i. D. C. Numbers, we grew and I got my handy HP calculator. I like to make sure I got this right. We grew 44.88 times faster than the market average year over year. So let's call that 45 times faster and backup. There's billions more to be made in traditional backup and recovery. However, go back to what we've been talking around digital transformation Danny talking about containers in the environment, deployment models, changing at the heart of backup and recovery where a data capture data management, data movement engine. We envision being able to do that not only for availability but to be able to drive the business board to be able to drive economies of scale faster for our organizations that we serve. I think the trick is continuing to do more of the same Danny mentioned, he knows the view's got lit. We haven't stopped doing anything. In fact, Danny, I think we're doing like 10 times more of everything that we used to be doing prior to the pandemic. >>All right, Danny will give you the last word, bring it home. >>So our goal has always been to be the most trusted provider of backup solutions that deliver modern data protection. And I think folks have seen at demon this year that we're very focused on that modern data protection. Yes, we want to be the best in the data center but we also want to be the best in the next generation, the next generation of I. T. So whether it be sas whether it be cloud VM is very committed to making sure that our customers have the confidence that they need to move forward through this digital transformation era. >>Guys, I miss flying. I mean, I don't miss flying, but I miss hanging with you all. We'll see you. Uh, for sure. Vim on 2022 will be belly to belly, but thanks so much for coming on the the virtual edition and thanks for having us. >>Thank you. >>All right. And thank you for watching everybody. This keeps continuous coverage of the mon 21. The virtual edition. Keep it right there for more great coverage. >>Mm
SUMMARY :
It's great to see you again. So Danny, you know, we heard you kind of your keynotes and we saw the general But I always focus in on the product because I, you know, we run product strategy here, I know, you know, it's kind of become cliche but you still got that D. N. A. that the administrator doesn't have to rethink, doesn't have to change their process so early on. Because based on the numbers that we see it doesn't you seem to be winning in both the traditional business It's a heck of a lot easier when you can say yes to so many things So let's talk about the future of it and I want all you guys to chime in here and Danny, You spin them up, you spin them down, you provision them, you d provisions and they're completely portable. I don't know what you think about that. So exactly what Danny said, you know, I think that the siloed approaches of the past So that's something uh you I really felt like it was a cliche, there was a lot of, you know, complacency, I'll call it, And so what that means is that you have to So data mobility is at the heart of VM and with all the different platforms, I wonder if you could address that. And Dave maybe you can touch on that study depends on the practice that you bring to it. And you know, sometimes those repatriations, those portable recoveries, And then when you have an incident response, they will punish you for responding. you know, hardened Linux repositories, but making sure that you can store the data, And you know, for organizations that are concerned about ransomware, I mean the hard part is is you know, Now we have an existing advice that says, you know what Don't put your backup infrastructure with internet connectivity. I this is a huge problem and you guys are global company. So we hear from right near, you know, on and off. called himself the rule of 60 where, you know, I always thought it was even plus growth, And one of the things that we've actually done in the past 12 So how do you think about tam? recovery space or backup in replication to paying which one you want to use? So our goal has always been to be the most trusted provider of backup solutions that deliver I mean, I don't miss flying, but I miss hanging with you all. And thank you for watching everybody.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Danny | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
David | PERSON | 0.99+ |
Dave Volonte | PERSON | 0.99+ |
Danny Allen | PERSON | 0.99+ |
Rick Vanover | PERSON | 0.99+ |
Dave Russell | PERSON | 0.99+ |
Vin | PERSON | 0.99+ |
45 times | QUANTITY | 0.99+ |
44.88 times | QUANTITY | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
February of 2020 | DATE | 0.99+ |
Bill McDermott | PERSON | 0.99+ |
robert Gates | PERSON | 0.99+ |
10 servers | QUANTITY | 0.99+ |
$5 billion | QUANTITY | 0.99+ |
400,000 customers | QUANTITY | 0.99+ |
2000 | DATE | 0.99+ |
10 times | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
2021 | DATE | 0.99+ |
145 million | QUANTITY | 0.99+ |
tomorrow | DATE | 0.99+ |
25% | QUANTITY | 0.99+ |
4600 employees | QUANTITY | 0.99+ |
HP | ORGANIZATION | 0.99+ |
both | QUANTITY | 0.99+ |
11th year | QUANTITY | 0.99+ |
each year | QUANTITY | 0.99+ |
Nutanix | ORGANIZATION | 0.99+ |
one | QUANTITY | 0.99+ |
VM | ORGANIZATION | 0.99+ |
Rick | PERSON | 0.99+ |
yesterday | DATE | 0.99+ |
18 months | QUANTITY | 0.99+ |
One | QUANTITY | 0.99+ |
billions | QUANTITY | 0.99+ |
two lists | QUANTITY | 0.99+ |
five functions | QUANTITY | 0.99+ |
2020 | DATE | 0.98+ |
VeeamON | ORGANIZATION | 0.98+ |
last quarter | DATE | 0.98+ |
last january | DATE | 0.98+ |
6-12 months | QUANTITY | 0.98+ |
HV | ORGANIZATION | 0.98+ |
over 100 petabytes | QUANTITY | 0.98+ |
400,000 plus customers | QUANTITY | 0.98+ |
one example | QUANTITY | 0.98+ |
three things | QUANTITY | 0.97+ |
Office 3 65 | TITLE | 0.97+ |
both places | QUANTITY | 0.97+ |
13 straight quarters | QUANTITY | 0.97+ |
SaAS | ORGANIZATION | 0.97+ |
Levin | PERSON | 0.97+ |
about a decade later | DATE | 0.96+ |
second | QUANTITY | 0.96+ |
2022 | DATE | 0.95+ |
rick | PERSON | 0.95+ |
Ceo | ORGANIZATION | 0.95+ |
UNLIST TILL 4/2 - Keep Data Private
>> Paige: Hello everybody and thank you for joining us today for the Virtual Vertica BDC 2020. Today's breakout session is entitled Keep Data Private Prepare and Analyze Without Unencrypting With Voltage SecureData for Vertica. I'm Paige Roberts, Open Source Relations Manager at Vertica, and I'll be your host for this session. Joining me is Rich Gaston, Global Solutions Architect, Security, Risk, and Government at Voltage. And before we begin, I encourage you to submit your questions or comments during the virtual session, you don't have to wait till the end. Just type your question as it occurs to you, or comment, in the question box below the slide and then click Submit. There'll be a Q&A session at the end of the presentation where we'll try to answer as many of your questions as we're able to get to during the time. Any questions that we don't address we'll do our best to answer offline. Now, if you want, you can visit the Vertica Forum to post your questions there after the session. Now, that's going to take the place of the Developer Lounge, and our engineering team is planning to join the Forum, to keep the conversation going. So as a reminder, you can also maximize your screen by clicking the double arrow button, in the lower-right corner of the slides. That'll allow you to see the slides better. And before you ask, yes, this virtual session is being recorded and it will be available to view on-demand this week. We'll send you a notification as soon as it's ready. All right, let's get started. Over to you, Rich. >> Rich: Hey, thank you very much, Paige, and appreciate the opportunity to discuss this topic with the audience. My name is Rich Gaston and I'm a Global Solutions Architect, within the Micro Focus team, and I work on global Data privacy and protection efforts, for many different organizations, looking to take that journey toward breach defense and regulatory compliance, from platforms ranging from mobile to mainframe, everything in between, cloud, you name it, we're there in terms of our solution sets. Vertica is one of our major partners in this space, and I'm very excited to talk with you today about our solutions on the Vertica platform. First, let's talk a little bit about what you're not going to learn today, and that is, on screen you'll see, just part of the mathematics that goes into, the format-preserving encryption algorithm. We are the originators and authors and patent holders on that algorithm. Came out of research from Stanford University, back in the '90s, and we are very proud, to take that out into the market through the NIST standard process, and license that to others. So we are the originators and maintainers, of both standards and athureader in the industry. We try to make this easy and you don't have to learn any of this tough math. Behind this there are also many other layers of technology. They are part of the security, the platform, such as stateless key management. That's a really complex area, and we make it very simple for you. We have very mature and powerful products in that space, that really make your job quite easy, when you want to implement our technology within Vertica. So today, our goal is to make Data protection easy for you, to be able to understand the basics of Voltage Secure Data, you're going to be learning how the Vertica UDx, can help you get started quickly, and we're going to see some examples of how Vertica plus Voltage Secure Data, are going to be working together, in our customer cases out in the field. First, let's take you through a quick introduction to Voltage Secure Data. The business drivers and what's this all about. First of all, we started off with Breach Defense. We see that despite continued investments, in personal perimeter and platform security, Data breaches continue to occur. Voltage Secure Data plus Vertica, provides defense in depth for sensitive Data, and that's a key concept that we're going to be referring to. in the security field defense in depth, is a standard approach to be able to provide, more layers of protection around sensitive assets, such as your Data, and that's exactly what Secure Data is designed to do. Now that we've come through many of these breach examples, and big ticket items, getting the news around breaches and their impact, the business regulators have stepped up, and regulatory compliance, is now a hot topic in Data privacy. Regulations such as GDPR came online in 2018 for the EU. CCPA came online just this year, a couple months ago for California, and is the de-facto standard for the United States now, as organizations are trying to look at, the best practices for providing, regulatory compliance around Data privacy and protection. These gives massive new rights to consumers, but also obligations to organizations, to protect that personal Data. Secure Data Plus Vertica provides, fine grained authorization around sensitive Data, And we're going to show you exactly how that works, within the Vertica platform. At the bottom, you'll see some of the snippets there, of the news articles that just keep racking up, and our goal is to keep you off the news, to keep your company safe, so that you can have the assurance, that even if there is an unintentional, or intentional breach of Data out of the corporation, if it is protected by voltage Secure Data, it will be of no value to those hackers, and then you have no impact, in terms of risk to the organization. What do we mean by defense in depth? Let's take a look first at the encryption types, and the benefits that they provide, and we see our customers implementing, all kinds of different protection mechanisms, within the organization. You could be looking at disk level protection, file system protection, protection on the files themselves. You could protect the entire Database, you could protect our transmissions, as they go from the client to the server via TLS, or other protected tunnels. And then we look at Field-level Encryption, and that's what we're talking about today. That's all the above protections, at the perimeter level at the platform level. Plus, we're giving you granular access control, to your sensitive Data. Our main message is, keep the Data protected for at the earliest possible point, and only access it, when you have a valid business need to do so. That's a really critical aspect as we see Vertica customers, loading terabytes, petabytes of Data, into clusters of Vertica console, Vertica Database being able to give access to that Data, out to a wide variety of end users. We started off with organizations having, four people in an office doing Data science, or analytics, or Data warehousing, or whatever it's called within an organization, and that's now ballooned out, to a new customer coming in and telling us, we're going to have 1000 people accessing it, plus service accounts accessing Vertica, we need to be able to provide fine level access control, and be able to understand what are folks doing with that sensitive Data? And how can we Secure it, the best practices possible. In very simple state, voltage protect Data at rest and in motion. The encryption of Data facilitates compliance, and it reduces your risk of breach. So if you take a look at what we mean by feel level, we could take a name, that name might not just be in US ASCII. Here we have a sort of Latin one extended, example of Harold Potter, and we could take a look at the example protected Data. Notice that we're taking a character set approach, to protecting it, meaning, I've got an alphanumeric option here for the format, that I'm applying to that name. That gives me a mix of alpha and numeric, and plus, I've got some of that Latin one extended alphabet in there as well, and that's really controllable by the end customer. They can have this be just US ASCII, they can have it be numbers for numbers, you can have a wide variety, of different protection mechanisms, including ignoring some characters in the alphabet, in case you want to maintain formatting. We've got all the bells and whistles, that you would ever want, to put on top of format preserving encryption, and we continue to add more to that platform, as we go forward. Taking a look at tax ID, there's an example of numbers for numbers, pretty basic, but it gives us the sort of idea, that we can very quickly and easily keep the Data protected, while maintaining the format. No schema changes are going to be required, when you want to protect that Data. If you look at credit card number, really popular example, and the same concept can be applied to tax ID, often the last four digits will be used in a tax ID, to verify someone's identity. That could be on an automated telephone system, it could be a customer service representative, just trying to validate the security of the customer, and we can keep that Data in the clear for that purpose, while protecting the entire string from breach. Dates are another critical area of concern, for a lot of medical use cases. But we're seeing Date of Birth, being included in a lot of Data privacy conversations, and we can protect dates with dates, they're going to be a valid date, and we have some really nifty tools, to maintain offsets between dates. So again, we've got the real depth of capability, within our encryption, that's not just saying, here's a one size fits all approach, GPS location, customer ID, IP address, all of those kinds of Data strings, can be protected by voltage Secure Data within Vertica. Let's take a look at the UDx basics. So what are we doing, when we add Voltage to Vertica? Vertica stays as is in the center. In fact, if you get the Vertical distribution, you're getting the Secure Data UDx onboard, you just need to enable it, and have Secure Data virtual appliance, that's the box there on the middle right. That's what we come in and add to the mix, as we start to be able to add those capabilities to Vertica. On the left hand side, you'll see that your users, your service accounts, your analytics, are still typically doing Select, Update, Insert, Delete, type of functionality within Vertica. And they're going to come into Vertica's access control layer, they're going to also access those services via SQL, and we simply extend SQL for Vertica. So when you add the UDx, you get additional syntax that we can provide, and we're going to show you examples of that. You can also integrate that with concepts, like Views within Vertica. So that we can say, let's give a view of Data, that gives the Data in the clear, using the UDx to decrypt that Data, and let's give everybody else, access to the raw Data which is protected. Third parties could be brought in, folks like contractors or folks that aren't vetted, as closely as a security team might do, for internal sensitive Data access, could be given access to the Vertical cluster, without risk of them breaching and going into some area, they're not supposed to take a look at. Vertica has excellent control for access, down even to the column level, which is phenomenal, and really provides you with world class security, around the Vertical solution itself. Secure Data adds another layer of protection, like we're mentioning, so that we can have Data protected in use, Data protected at rest, and then we can have the ability, to share that protected Data throughout the organization. And that's really where Secure Data shines, is the ability to protect that Data on mainframe, on mobile, and open systems, in the cloud, everywhere you want to have that Data move to and from Vertica, then you can have Secure Data, integrated with those endpoints as well. That's an additional solution on top, the Secure Data Plus Vertica solution, that is bundled together today for a sales purpose. But we can also have that conversation with you, about those wider Secure Data use cases, we'd be happy to talk to you about that. Security to the virtual appliance, is a lightweight appliance, sits on something like eight cores, 16 gigs of RAM, 100 gig of disk or 200 gig of disk, really a lightweight appliance, you can have one or many. Most customers have four in production, just for redundancy, they don't need them for scale. But we have some customers with 16 or more in production, because they're running such high volumes of transaction load. They're running a lot of web service transactions, and they're running Vertica as well. So we're going to have those virtual appliances, as co-located around the globe, hooked up to all kinds of systems, like Syslog, LDAP, load balancers, we've got a lot of capability within the appliance, to fit into your enterprise IP landscape. So let me get you directly into the neat, of what does the UDx do. If you're technical and you know SQL, this is probably going to be pretty straightforward to you, you'll see the copy command, used widely in Vertica to get Data into Vertica. So let's try to protect that Data when we're ingesting it. Let's grab it from maybe a CSV file, and put it straight into Vertica, but protected on the way and that's what the UDx does. We have Voltage Secure protectors, an added syntax, like I mentioned, to the Vertica SQL. And that allows us to say, we're going to protect the customer first name, using the parameters of hyper alphanumeric. That's our internal lingo of a format, within Secure Data, this part of our API, the API is require very few inputs. The format is the one, that you as a developer will be supplying, and you'll have different ones for maybe SSN, you'll have different formats for street address, but you can reuse a lot of your formats, across a lot of your PII, PHI Data types. Protecting after ingest is also common. So I've got some Data, that's already been put into a staging area, perhaps I've got a landing zone, a sandbox of some sort, now I want to be able to move that, into a different zone in Vertica, different area of the schema, and I want to have that Data protected. We can do that with the update command, and simply again, you'll notice Voltage Secure protect, nothing too wild there, basically the same syntax. We're going to query unprotected Data. How do we search once I've encrypted all my Data? Well, actually, there's a pretty nifty trick to do so. If you want to be able to query unprotected Data, and we have the search string, like a phone number there in this example, simply call Voltage Secure protect on that, now you'll have the cipher text, and you'll be able to search the stored cipher text. Again, we're just format preserving encrypting the Data, and it's just a string, and we can always compare those strings, using standard syntax and SQL. Using views to decrypt Data, again a powerful concept, in terms of how to make this work, within the Vertica Landscape, when you have a lot of different groups of users. Views are very powerful, to be able to point a BI tool, for instance, business intelligence tools, Cognos, Tableau, etc, might be accessing Data from Vertica with simple queries. Well, let's point them to a view that does the hard work, and uses the Vertical nodes, and its horsepower of CPU and RAM, to actually run that Udx, and do the decryption of the Data in use, temporarily in memory, and then throw that away, so that it can't be breached. That's a nice way to keep your users active and working and going forward, with their Data access and Data analytics, while also keeping the Data Secure in the process. And then we might want to export some Data, and push it out to someone in a clear text manner. We've got a third party, needs to take the tax ID along with some Data, to do some processing, all we need to do is call Voltage Secure Access, again, very similar to the protect call, and you're writing the parameter again, and boom, we have decrypted the Data and used again, the Vertical resources of RAM and CPU and horsepower, to do the work. All we're doing with Voltage Secure Data Appliance, is a real simple little key fetch, across a protected tunnel, that's a tiny atomic transaction, gets done very quick, and you're good to go. This is it in terms of the UDx, you have a couple of calls, and one parameter to pass, everything else is config driven, and really, you're up and running very quickly. We can even do demos and samples of this Vertical Udx, using hosted appliances, that we put up for pre sales purposes. So folks want to get up and get a demo going. We could take that Udx, configure it to point to our, appliance sitting on the internet, and within a couple of minutes, we're up and running with some simple use cases. Of course, for on-prem deployment, or deployment in the cloud, you'll want your own appliance in your own crypto district, you have your own security, but it just shows, that we can easily connect to any appliance, and get this working in a matter of minutes. Let's take a look deeper at the voltage plus Vertica solution, and we'll describe some of the use cases and path to success. First of all your steps to, implementing Data-centric security and Vertica. Want to note there on the left hand side, identify sensitive Data. How do we do this? I have one customer, where they look at me and say, Rich, we know exactly what our sensitive Data is, we develop the schema, it's our own App, we have a customer table, we don't need any help in this. We've got other customers that say, Rich, we have a very complex Database environment, with multiple Databases, multiple schemas, thousands of tables, hundreds of thousands of columns, it's really, really complex help, and we don't know what people have been doing exactly, with some of that Data, We've got various teams that share this resource. There, we do have additional tools, I wanted to give a shout out to another microfocus product, which is called Structured Data Manager. It's a great tool that helps you identify sensitive Data, with some really amazing technology under the hood, that can go into a Vertica repository, scan those tables, take a sample of rows or a full table scan, and give you back some really good reports on, we think this is sensitive, let's go confirm it, and move forward with Data protection. So if you need help on that, we've got the tools to do it. Once you identify that sensitive Data, you're going to want to understand, your Data flows and your use cases. Take a look at what analytics you're doing today. What analytics do you want to do, on sensitive Data in the future? Let's start designing our analytics, to work with sensitive Data, and there's some tips and tricks that we can provide, to help you mitigate, any kind of concerns around performance, or any kind of concerns around rewriting your SQL. As you've noted, you can just simply insert our SQL additions, into your code and you're off and running. You want to install and configure the Udx, and secure Data software plants. Well, the UDx is pretty darn simple. The documentation on Vertica is publicly available, you could see how that works, and what you need to configure it, one file here, and you're ready to go. So that's pretty straightforward to process, either grant some access to the Udx, and that's really up to the customer, because there are many different ways, to handle access control in Vertica, we're going to be flexible to fit within your model, of access control and adding the UDx to your mix. Each customer is a little different there, so you might want to talk with us a little bit about, the best practices for your use cases. But in general, that's going to be up and running in just a minute. The security software plants, hardened Linux appliance today, sits on-prem or in the cloud. And you can deploy that. I've seen it done in 15 minutes, but that's what the real tech you had, access to being able to generate a search, and do all this so that, your being able to set the firewall and all the DNS entries, the basically blocking and tackling of a software appliance, you get that done, corporations can take care of that, in just a couple of weeks, they get it all done, because they have wait waiting on other teams, but the software plants are really fast to get stood up, and they're very simple to administer, with our web based GUI. Then finally, you're going to implement your UDx use cases. Once the software appliance is up and running, we can set authentication methods, we could set up the format that you're going to use in Vertica, and then those two start talking together. And it should be going in dev and test in about half a day, and then you're running toward production, in just a matter of days, in most cases. We've got other customers that say, Hey, this is going to be a bigger migration project for us. We might want to split this up into chunks. Let's do the real sensitive and scary Data, like tax ID first, as our sort of toe in the water approach, and then we'll come back and protect other Data elements. That's one way to slice and dice, and implement your solution in a planned manner. Another way is schema based. Let's take a look at this section of the schema, and implement protection on these Data elements. Now let's take a look at the different schema, and we'll repeat the process, so you can iteratively move forward with your deployment. So what's the added value? When you add full Vertica plus voltage? I want to highlight this distinction because, Vertica contains world class security controls, around their Database. I'm an old time DBA from a different product, competing against Vertica in the past, and I'm really aware of the granular access controls, that are provided within various platforms. Vertica would rank at the very top of the list, in terms of being able to give me very tight control, and a lot of different AWS methods, being able to protect the Data, in a lot of different use cases. So Vertica can handle a lot of your Data protection needs, right out of the box. Voltage Secure Data, as we keep mentioning, adds that defense in-Depth, and it's going to enable those, enterprise wide use cases as well. So first off, I mentioned this, the standard of FF1, that is format preserving encryption, we're the authors of it, we continue to maintain that, and we want to emphasize that customers, really ought to be very, very careful, in terms of choosing a NIST standard, when implementing any kind of encryption, within the organization. So 8 ES was one of the first, and Hallmark, benchmark encryption algorithms, and in 2016, we were added to that mix, as FF1 with CS online. If you search NIST, and Voltage Security, you'll see us right there as the author of the standard, and all the processes that went along with that approval. We have centralized policy for key management, authentication, audit and compliance. We can now see that Vertica selected or fetch the key, to be able to protect some Data at this date and time. We can track that and be able to give you audit, and compliance reporting against that Data. You can move protected Data into and out of Vertica. So if we ingest via Kafka, and just via NiFi and Kafka, ingest on stream sets. There are a variety of different ingestion methods, and streaming methods, that can get Data into Vertica. We can integrate secure Data with all of those components. We're very well suited to integrate, with any Hadoop technology or any big Data technology, as we have API's in a variety of languages, bitness and platforms. So we've got that all out of the box, ready to go for you, if you need it. When you're moving Data out of Vertica, you might move it into an open systems platform, you might move it to the cloud, we can also operate and do the decryption there, you're going to get the same plaintext back, and if you protect Data over in the cloud, and move it into Vertica, you're going to be able to decrypt it in Vertica. That's our cross platform promise. We've been delivering on that for many, many years, and we now have many, many endpoints that do that, in production for the world's largest organization. We're going to preserve your Data format, and referential integrity. So if I protect my social security number today, I can protect another batch of Data tomorrow, and that same ciphertext will be generated, when I put that into Vertica, I can have absolute referential integrity on that Data, to be able to allow for analytics to occur, without even decrypting Data in many cases. And we have decrypt access for authorized users only, with the ability to add LDAP authentication authorization, for UDx users. So you can really have a number of different approaches, and flavors of how you implement voltage within Vertica, but what you're getting is the additional ability, to have that confidence, that we've got the Data protected at rest, even if I have a DBA that's not vetted or someone new, or I don't know where this person is from a third party, and being provided access as a DBA level privilege. They could select star from all day long, and they're going to get ciphertext, they're going to have nothing of any value, and if they want to use the UDF to decrypt it, they're going to be tracked and traced, as to their utilization of that. So it allows us to have that control, and additional layer of security on your sensitive Data. This may be required by regulatory agencies, and it's seeming that we're seeing compliance audits, get more and more strict every year. GDPR was kind of funny, because they said in 2016, hey, this is coming, they said in 2018, it's here, and now they're saying in 2020, hey, we're serious about this, and the fines are mounting. And let's give you some examples to kind of, help you understand, that these regulations are real, the fines are real, and your reputational damage can be significant, if you were to be in breach, of a regulatory compliance requirements. We're finding so many different use cases now, popping up around regional protection of Data. I need to protect this Data so that it cannot go offshore. I need to protect this Data, so that people from another region cannot see it. That's all the kind of capability that we have, within secure Data that we can add to Vertica. We have that broad platform support, and I mentioned NiFi and Kafka, those would be on the left hand side, as we start to ingest Data from applications into Vertica. We can have landing zone approaches, where we provide some automated scripting at an OS level, to be able to protect ETL batch transactions coming in. We could protect within the Vertica UDx, as I mentioned, with the copy command, directly using Vertica. Everything inside that dot dash line, is the Vertical Plus Voltage Secure Data combo, that's sold together as a single package. Additionally, we'd love to talk with you, about the stuff that's outside the dash box, because we have dozens and dozens of endpoints, that could protect and access Data, on many different platforms. And this is where you really start to leverage, some of the extensive power of secure Data, to go across platform to handle your web based apps, to handle apps in the cloud, and to handle all of this at scale, with hundreds of thousands of transactions per second, of format preserving encryption. That may not sound like much, but when you take a look at the algorithm, what we're doing on the mathematics side, when you look at everything that goes into that transaction, to me, that's an amazing accomplishment, that we're trying to reach those kinds of levels of scale, and with Vertica, it scales horizontally. So the more nodes you add, the more power you get, the more throughput you're going to get, from voltage secure Data. I want to highlight the next steps, on how we can continue to move forward. Our secure Data team is available to you, to talk about the landscape, your use cases, your Data. We really love the concept that, we've got so many different organizations out there, using secure Data in so many different and unique ways. We have vehicle manufacturers, who are protecting not just the VIN, not just their customer Data, but in fact they're protecting sensor Data from the vehicles, which is sent over the network, down to the home base every 15 minutes, for every vehicle that's on the road, and every vehicle of this customer of ours, since 2017, has included that capability. So now we're talking about, an additional millions and millions of units coming online, as those cars are sold and distributed, and used by customers. That sensor Data is critical to the customer, and they cannot let that be ex-filled in the clear. So they protect that Data with secure Data, and we have a great track record of being able to meet, a variety of different unique requirements, whether it's IoT, whether it's web based Apps, E-commerce, healthcare, all kinds of different industries, we would love to help move the conversations forward, and we do find that it's really a three party discussion, the customer, secure Data experts in some cases, and the Vertica team. We have great enablement within Vertica team, to be able to explain and present, our secure Data solution to you. But we also have that other ability to add other experts in, to keep that conversation going into a broader perspective, of how can I protect my Data across all my platforms, not just in Vertica. I want to give a shout out to our friends at Vertica Academy. They're building out a great demo and training facilities, to be able to help you learn more about these UDx's, and how they're implemented. The Academy, is a terrific reference and resource for your teams, to be able to learn more, about the solution in a self guided way, and then we'd love to have your feedback on that. How can we help you more? What are the topics you'd like to learn more about? How can we look to the future, in protecting unstructured Data? How can we look to the future, of being able to protect Data at scale? What are the requirements that we need to be meeting? Help us through the learning processes, and through feedback to the team, get better, and then we'll help you deliver more solutions, out to those endpoints and protect that Data, so that we're not having Data breach, we're not having regulatory compliance concerns. And then lastly, learn more about the Udx. I mentioned, that all of our content there, is online and available to the public. So vertica.com/secureData , you're going to be able to walk through the basics of the UDX. You're going to see how simple it is to set up, what the UDx syntax looks like, how to grant access to it, and then you'll start to be able to figure out, hey, how can I start to put this, into a PLC in my own environment? Like I mentioned before, we have publicly available hosted appliance, for demo purposes, that we can make available to you, if you want to PLC this. Reach out to us. Let's get a conversation going, and we'll get you the address and get you some instructions, we can have a quick enablement session. We really want to make this accessible to you, and help demystify the concept of encryption, because when you see it as a developer, and you start to get your hands on it and put it to use, you can very quickly see, huh, I could use this in a variety of different cases, and I could use this to protect my Data, without impacting my analytics. Those are some of the really big concerns that folks have, and once we start to get through that learning process, and playing around with it in a PLC way, that we can start to really put it to practice into production, to say, with confidence, we're going to move forward toward Data encryption, and have a very good result, at the end of the day. This is one of the things I find with customers, that's really interesting. Their biggest stress, is not around the timeframe or the resource, it's really around, this is my Data, I have been working on collecting this Data, and making it available in a very high quality way, for many years. This is my job and I'm responsible for this Data, and now you're telling me, you're going to encrypt that Data? It makes me nervous, and that's common, everybody feels that. So we want to have that conversation, and that sort of trial and error process to say, hey, let's get your feet wet with it, and see how you like it in a sandbox environment. Let's now take that into analytics, and take a look at how we can make this, go for a quick 1.0 release, and let's then take a look at, future expansions to that, where we start adding Kafka on the ingest side. We start sending Data off, into other machine learning and analytics platforms, that we might want to utilize outside of Vertica, for certain purposes, in certain industries. Let's take a look at those use cases together, and through that journey, we can really chart a path toward the future, where we can really help you protect that Data, at rest, in use, and keep you safe, from both the hackers and the regulators, and that I think at the end of the day, is really what it's all about, in terms of protecting our Data within Vertica. We're going to have a little couple minutes for Q&A, and we would encourage you to have any questions here, and we'd love to follow up with you more, about any questions you might have, about Vertica Plus Voltage Secure Data. They you very much for your time today.
SUMMARY :
and our engineering team is planning to join the Forum, and our goal is to keep you off the news,
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Vertica | ORGANIZATION | 0.99+ |
100 gig | QUANTITY | 0.99+ |
16 | QUANTITY | 0.99+ |
16 gigs | QUANTITY | 0.99+ |
200 gig | QUANTITY | 0.99+ |
Paige Roberts | PERSON | 0.99+ |
2016 | DATE | 0.99+ |
Paige | PERSON | 0.99+ |
Rich Gaston | PERSON | 0.99+ |
dozens | QUANTITY | 0.99+ |
2018 | DATE | 0.99+ |
Vertica Academy | ORGANIZATION | 0.99+ |
2020 | DATE | 0.99+ |
SQL | TITLE | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
First | QUANTITY | 0.99+ |
1000 people | QUANTITY | 0.99+ |
Hallmark | ORGANIZATION | 0.99+ |
today | DATE | 0.99+ |
Harold Potter | PERSON | 0.99+ |
Rich | PERSON | 0.99+ |
millions | QUANTITY | 0.99+ |
Stanford University | ORGANIZATION | 0.99+ |
15 minutes | QUANTITY | 0.99+ |
Today | DATE | 0.99+ |
Each customer | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
both | QUANTITY | 0.99+ |
California | LOCATION | 0.99+ |
Kafka | TITLE | 0.99+ |
Vertica | TITLE | 0.99+ |
Latin | OTHER | 0.99+ |
tomorrow | DATE | 0.99+ |
2017 | DATE | 0.99+ |
eight cores | QUANTITY | 0.99+ |
two | QUANTITY | 0.98+ |
GDPR | TITLE | 0.98+ |
first | QUANTITY | 0.98+ |
one customer | QUANTITY | 0.98+ |
Tableau | TITLE | 0.98+ |
United States | LOCATION | 0.97+ |
this week | DATE | 0.97+ |
Vertica | LOCATION | 0.97+ |
4/2 | DATE | 0.97+ |
Linux | TITLE | 0.97+ |
one file | QUANTITY | 0.96+ |
vertica.com/secureData | OTHER | 0.96+ |
four | QUANTITY | 0.95+ |
about half a day | QUANTITY | 0.95+ |
Cognos | TITLE | 0.95+ |
four people | QUANTITY | 0.94+ |
Udx | ORGANIZATION | 0.94+ |
one way | QUANTITY | 0.94+ |
Keynote Analysis | AWS Summit New York 2019
>> live from New York. It's the Q covering AWS Global Summit 2019. Brought to you by Amazon Web service is >> Hi and welcome to New York City, The Big Apple. I'm stupid and my co host for today is Cory Quinn, and this is eight of us. Summit New York City. It is one of the regional events that they have, but these regional events are actually tend to be bigger and more exciting than >> many companies. You know, big events not say that companies don't do good shows, but if you look, we've got 11,500 people in attendance over 120 seconds over 125. Sponsoring partners here in the ecosystem just had Werner Vogels up on stage. A number of the customers such a fin ra and Gordon, who we will have on the program on good energy, a local show it is free to attend Cory. Before >> we get into the technology, though, there's a little bit of a protest going on. Here is actually the second Amazon show in a row that this was was that Amazon re Mars, where a protester talking about I believe it was >> something around about chickens in Whole Foods. Basically, she got really close to the richest man in the world. But the protest here, it's outside, it's going and it's about ice and border control was actually a very well organized protest. Security had to take many of them out for the first least half hour of the of the keynote. Warner stopped a few times and said, Look, I'll be happy to talk to you after, >> but please let me finish. I thought he handled it, respectively. But what? What was your take? >> Very much so. And it's, I think it's an issue with There aren't too many people you'd want associate with on the other side of it, Kids in Cages is not something anyone sensible wants to endorse. The challenge that I continually have, I think, is that it's easy to have these conversations. Now is not the time. Okay, great. Typically, it's difficult to get big companies to say, and now is the time for us to address this and anything outside of very carefully worded statements. So I empathize. I really do. I mean, as a speaker myself, it's terrifying to me the idea that I could go up and have to have that level of conversation and a suddenly interrupted by people yelling at me. It's gotta be nerve wracking. Speaking to 10,000 people on its own is not easy, and having to carry that forward with something that effectively comes down to a morality question is it's gotta be tough. I have sympathy for people going through this on work on Amazon, and it's I don't know that there's a great answer right now. >> So, Cory, I know you know You are not >> deep in the government space, but you were at the public sector show there and there's always this discussion as you know Well, you're supplying the technology. While Amazon might not be providing, you know, bummers and, you know, guns. They are providing the technology underneath. Facial recognition causes a lot of concern, you know, rightfully so that make sure we understand this thing. Security products in the light. So, you know, when you have the Department of Defense and Border Control as your clients, they do open themselves up for some criticism, >> right? At some point, you have to wonder who you do business with versus who don't do business with and the historical approach. Well, as long as there are sanctions or laws preventing us from doing business with someone, we'll be open to all comers. I some level I find that incredibly compelling. In practice, the world is messy. If things were that black and white, we wouldn't have these social media content, moderation issues. It would be a very different story with a very different narrative. >> Yeah, definitely. Amazon as a whole has a platform, and they have relationships. You know, Jeff Bezos has met with, you know, the highest levels of power in this country. They've got Jay Carney. The foot was part of the Obama administration helping with policy. So absolutely with great to see Amazon, you know, take a strong statement and you know, for good is something that we're hugely a part of and therefore way want to see all the suppliers you know, having a dialogue and helping to move this >> for you. And I think the lesson that we take from it, too, is that there are multiple ways to agitate for change and protest. One is to disrupt the keynote, and I understand that it gets attention and it's valuable. But you could do that, or you can have a seat at the table and start lobbying for change, either internally or with stakeholders. But you need to it. There's a bunch of different paths to get there, and I think that I don't blame anyone who's protesting today, and I don't blame anyone who chose not to. >> All right, So let's let's let's talk now about some of the content. So, Cory lutely, you know that there there's in the Amazon ecosystem. Every day we wake up and there were multiple new announcements. A matter of fact. We're always saying, Oh my gosh, how do I keep up with all of the things happening there? Well, one of the ways we keep up with it is reading last week in a VWs, which is your newsletter. I'll do the shameless plug, you know, for much. Appreciate your telling my story, Cory, But Amazon Cloudwatch Container Insight, Amazon event bridge. You know, new developer kids fluent bid, you know, talking about the momentum of the company security databases on you know, the general adoption overall, you know, quick take for me as I love to hear you know, Werner up there talking about applications. It's not purely Oh, everything's going to live in the cloud and it'll be sun shines in unicorns and rainbows. But we understand that there's challenges here, your data and how we manage that requires, you know, >> a broad ecosystem that was the event bridge is something I would >> definitely want a drilling on because from a serverless environment, not just one thing, it's lots of different things. And how do we play between all of them? But since you do sort through and sift through all of these announcements, give us a date. It was there anything new here? Did you already know all of this because it's in your R S s feed Newsletters are you know what did grab you? >> Surprisingly, it turns out, in the weeks with you have, obviously reinvent is just a firehose torrent that no human being can wind up consuming. And you see a few releases in Santa Clara and a few in New York. But I thought I knew most of things that were coming out, and I did. I missed one that I just noticed. About two minutes we went on the air called cloudwatch anomaly detection the idea is that it uses machine learning. So someone check that off the business card of the bingo card. And at that point, you take all the cloudwatch logs and start running machine learning and look for anomalies discrepancies. In the rest it uses machine learning. But rather than go figure out what it's for, it's applied to a very specific problem and those of the A. I am l products. I like the best where it's we're solving a problem with your data for you. But riding guard rails as opposed to step one, hire $2,000,000 worth of data. Scientists Step two. We're still working on that. >> All right, so court cloudwatch actually e saw the event bridge that I mentioned, which is that event ecosystem around Lambda uh, Deepak, who we're going to have on the program that said that it was the learnings from cloudwatch that helped them to build. This may be for audience. Just give us cloudwatch. There's a lot of different products under that. Give us what you hear from your customers. You know where cloudwatch fits and, you >> know, let's start at the beginning For those who are fortune enough never to have used it. Cloudwatch is AWS is internal monitoring solution. It gathers metrics, it gathers logs, it presents them in different ways. And it has interesting bill impacts as a cloud economist. I see it an awful lot where every time you the monitoring company, walk around the Expo hall, you'll trip over 40 of those. They're all gathering their data on the infrastructure from Bob Watch and interpreting that. Now you're paying for the monitoring company and you're paying for the FBI charges against it. And I was sort of frozen in amber, more or less for a good five years or so. I wrote a bit of a hit piece late last year and had some fascinating conversations afterwards, and it hasn't aged well, they're really coming to the fore with a lot of enhancements that are valuable on it. The problem is, there's a tremendous amount of data. How do you get a signal from it? How do you look at actionable things? If you're running 10,000 instances, you're not looking at individual metrics for individualism. You care about aggregates, but you also care about observe ability. You care about drilling down into things Bernard talked about X rays distributed tracing framework today, and I think we're rapidly seeing across the board that it all ties back to events. Watch events is what's driving a lot of things like >> Event Bridge >> and the idea of an event centric architecture is really what we're trying to see Software's evolving into. >> Yeah, it's one of those things, you know, when you >> talk, you know that server list term out, their events are at the center of them. And how do I get some standardization across the industry? There's some open source groups that are trying to insert themselves and give some flexibility here. You know, when I want understand from Vin, Fridge says, Okay, it's Lambda and their ecosystem. But is this going to be a lame the only ecosystem or, well, this lay the ground work so that, yes, there are other clouds out there. You know what azure has other environment? Will this eventually be able to extend beyond this, or is this a Amazon proprietary system? Do you have any insight there? >> It's a great question. I would argue that I guess one of the taking a step back for a second. It would have to be almost irrelevant in some cases. When you start looking at server this lock in, it's not the fact that who there's this magic system only in one provider that will take my crappy code and run it for me. It's tied into the entire event ecosystem. It's tied into a bunch of primitives that do not translate very well. Now, inherently by looking What event bridge is in the fact that anyone who wants to be integrated into their applications, you absolutely could wind up with a deep native integration coming from another large, hyper scale pop provider? The only question is, will >> you great, great point. I know when I've talked to some of the surveillance ecosystem, it's that skills on understanding, you know, each environment because today, doing A W S versus doing azure, there's still a lot of difference, is there? Sure I could learn >> it, But yeah, and one of the things that I think is fascinating to is we've seen a couple attempts of this before from other start ups that are doing very similar things in open stores or trying to do something themselves. But one of the things that change this tremendously here is that this is a double us doing, that it doesn't matter what they do, what ridiculous name they give it when they want something. World generally tends to sit up and notice, just by sheer virtue of its scale and the fact that it's already built out. And you don't have to build the infrastructure yourself to run these things. If anything has a chance to start driving a cohesive standard around this, it's something coming from someone like Amazon. >> Yeah, absolutely. All right, Cory, you know, database is always a hot topic. Latest stat from Werner is, I believe it was 150,000 databases migrated. You called and >> said, Hey, why's amazon dot com on there? Jeff Faris like, Well, they have a choice. And of course, Amazon would point out they were using >> a traditional database for a long time and now have >> completely unplug the last in a >> long time. But they finally got off of a database that was produced by a law firm, and I understand the reasons behind that. But I was talking with people afterwards. Amazon does have a choice. Do they use, and if AWS wants to win them over to use their service is they have to sell them just like any other customer. And that's why it's on that slide as a customer. Now, if you're not in the ecosystem like some of us are, it looks a little disjointed of weight. C successfully sold yourself and put yourself on the slide. Well, okay, >> yes, it was actually so so the biggest thing I learned at the Amazon remarks show when >> you talk about all the fulfillment centers in the robotics and machine, learning almost everything underneath there it's got eight of us. Service is underneath it, So absolutely, it is one company. But yes, Amazon is the biggest customer of AWS. But that doesn't mean that there isn't somewhere, you know. You know, I still haven't gotten the word if they're absolutely 100% on that WS because we expect that there's some 400 sitting in the back ground running >> one of those financial service things. Maybe they finally micro did that one >> that's rather building in AWS 400. >> All right, Cory, what else you know either from the key note or from your general observations about Amazon that you want to share? >> I want to say that it's very clear that Amazon is getting an awful lot of practice at putting these events on and just tracking it here. Two year, Not just the venue. Logistics, which Okay, great. Get a bunch of people in a conference room, have a conversation. Do Aquino throw him out the end. But the way they're pacing the chinos, the way they're doing narratives, the customer stories that are getting up on stage are a lot less challenging. But then they were in years past. Where people get on stage, they seem more comfortable. It's very clear that a number of Amazon exacts not just here but another. Summits have been paying serious attention to how to speak publicly to 10,000 people once it's its own unique skill. >> Yeah, and you gotta like that, You know that. You know, the two first customers that they put on which will have on financial service is, of course, a big presence here in New York City. Gord Ash has their headquarters, you know, just a few blocks uptown from good, deep stories. Isn't you know, there there's that mixed that they did a good job. I thought of kind of cloud 10 >> one because still many customers are very early on that journey. We're not all cloud native, you know, run by the developers and everything there. But, you know, good looks of technology and the new pieces for those people that have been in a while, but still, you know, welcoming and embracing for how to get started >> and the stories we're moving up the stack to. It's not. >> We had a bunch of the >> EMS, and we put them in a different place. Okay, which is great news. Everyone starts there. But now the stories are moving into running serious regulated workloads with higher level of service is And that's great, because it's also not the far extreme Twitter for pets. We built this toy project last week when someone else fell through. And now we have to give this talk. It's very clearly something large enterprises. >> Yeah. So, Corey, last thing I want to ask you is you remember in the early days, you know, that public cloud? Oh, it was It was cheap and easy to use today. They have 200 instance types up there. You know, What does that mean for customers? You know you are a cloud economist. So need your official opinion diagnosis. >> I think it reduces the question, too, before you buy a bunch of reserve businesses. Are you on the right instance? Types. And the answer is almost certainly not just based on statistics alone. So now it's a constant state of indecision. It's rooted in an epic game of battleship between two Amazon S. V. V S. And I really hope one of the winds already so we can stop getting additional instance dives every couple of months. But so far no luck. >> So in your your your perfect world, you know what the announcement reinvented, fixes the problem. >> That's a really good question. I think that fundamentally, I don't I don't And I don't think I have any customers who care what type of incidents they're running on. They want certain resource levels. They want certain performance characteristics. But whatever you call that does not matter to them and having to commit to, though what you picked for 1 to 3 years, that's a problem. You don't have to. You can go on demand, but you're leaving 30% of the day. >> Yeah, and I love that point is actually taken notes fin rot. I want to talk to them because they say they've been three major re architectures in four years. So therefore, how did they make sure that they get the latest price performance but still get, you know, good, good economics on the outdated >> regulatory authority? I just assume they get there with audit threats when it comes time >> for renegotiating. >> All right. You're Cory Quinn. I am stupid. I mean, we have a full day here of water wall coverage from eight of US. Summit, New York City. Thank you so much for watching.
SUMMARY :
Brought to you by Amazon Web service It is one of the regional events that they but if you look, we've got 11,500 people in attendance over 120 seconds over 125. Here is actually the second Amazon show in a row that this was was that Amazon re Mars, I'll be happy to talk to you after, I thought he handled it, respectively. and now is the time for us to address this and anything outside of very carefully worded statements. deep in the government space, but you were at the public sector show there and there's always this discussion as At some point, you have to wonder who you do business with versus who don't do business with and the historical approach. You know, Jeff Bezos has met with, you know, the highest levels of power in this country. But you could do that, or you can have a seat at the table and start lobbying for change, either internally or the general adoption overall, you know, quick take for me as I love to hear you But since you And at that point, you take all the cloudwatch logs and start running machine learning and Give us what you hear from your customers. I see it an awful lot where every time you the monitoring company, talk, you know that server list term out, their events are at the center of them. it's not the fact that who there's this magic system only in one provider that will take my crappy code and run it for understanding, you know, each environment because today, doing A W S versus doing azure, But one of the things that change this tremendously here is that this is a double us doing, All right, Cory, you know, database is always a hot topic. And of course, Amazon would point out they were using But I was talking with people afterwards. But that doesn't mean that there isn't somewhere, you know. one of those financial service things. But the way they're pacing the chinos, the way they're doing narratives, Isn't you know, there there's that mixed that they did a good job. that have been in a while, but still, you know, welcoming and embracing for how to get started and the stories we're moving up the stack to. But now the stories are moving into running serious regulated workloads with higher level of service is you know, that public cloud? I think it reduces the question, too, before you buy a bunch of reserve businesses. having to commit to, though what you picked for 1 to 3 years, that's a problem. the latest price performance but still get, you know, good, good economics on Thank you so much for watching.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Jeff Faris | PERSON | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
$2,000,000 | QUANTITY | 0.99+ |
Corey | PERSON | 0.99+ |
New York | LOCATION | 0.99+ |
30% | QUANTITY | 0.99+ |
Cory Quinn | PERSON | 0.99+ |
1 | QUANTITY | 0.99+ |
FBI | ORGANIZATION | 0.99+ |
Jay Carney | PERSON | 0.99+ |
Jeff Bezos | PERSON | 0.99+ |
Gordon | PERSON | 0.99+ |
New York City | LOCATION | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Cory | PERSON | 0.99+ |
Cory Quinn | PERSON | 0.99+ |
11,500 people | QUANTITY | 0.99+ |
Department of Defense | ORGANIZATION | 0.99+ |
eight | QUANTITY | 0.99+ |
10,000 people | QUANTITY | 0.99+ |
last week | DATE | 0.99+ |
one | QUANTITY | 0.99+ |
Bernard | PERSON | 0.99+ |
100% | QUANTITY | 0.99+ |
five years | QUANTITY | 0.99+ |
10,000 instances | QUANTITY | 0.99+ |
Werner | PERSON | 0.99+ |
four years | QUANTITY | 0.99+ |
3 years | QUANTITY | 0.99+ |
one provider | QUANTITY | 0.99+ |
WS | ORGANIZATION | 0.98+ |
over 120 seconds | QUANTITY | 0.98+ |
150,000 databases | QUANTITY | 0.98+ |
second | QUANTITY | 0.98+ |
Two year | QUANTITY | 0.98+ |
US | LOCATION | 0.98+ |
Santa Clara | LOCATION | 0.98+ |
Werner Vogels | PERSON | 0.98+ |
ORGANIZATION | 0.97+ | |
two | QUANTITY | 0.97+ |
today | DATE | 0.97+ |
Gord Ash | PERSON | 0.96+ |
One | QUANTITY | 0.96+ |
each environment | QUANTITY | 0.96+ |
Warner | PERSON | 0.96+ |
first | QUANTITY | 0.96+ |
one company | QUANTITY | 0.95+ |
over 40 | QUANTITY | 0.93+ |
About two minutes | QUANTITY | 0.93+ |
AWS Global Summit 2019 | EVENT | 0.93+ |
one thing | QUANTITY | 0.92+ |
cloudwatch | ORGANIZATION | 0.92+ |
amazon dot com | ORGANIZATION | 0.91+ |
Deepak | PERSON | 0.91+ |
hall | LOCATION | 0.91+ |
late last year | DATE | 0.9+ |
V. V S. | TITLE | 0.89+ |
Judy Estrin, JLabs | Mayfield People First Network
>> Over and welcome to this special cube conversation here in the Palo Alto Studios of Cube. Part of our People. First project with Mayfield Fund and Co creation with Cuban John Very your host. Very special guest. Judy Estrin. She's the CEO of J Labs and author of the book Closing the Innovation Gap. She's also well known for being an Internet entrepreneur. Pioneer worked on the initial TCP IP protocol with Vin Cerf from When the A Stanford Great History Computer Science. You have computer systems in your blood, and now you're mentoring a lot of companies. Author you a lot of work, and you're lending your voice to some cutting edge issues here in Silicon Valley and around the world. Thanks for joining me today for the conversation. >> Thank you. It's fun to be here, >> So I love the fact that you're here. You're a celebrity in the commute computer industry circles. You were there at the beginning, when the computer systems or the Internet were being connected as they built out of stone of the whole system's revolution in the eighties, and the rest is history. Now we have cloud computing, and now we're seeing a whole nother level step function of scale. And so you've kind of seen it all. You've seen all all the waves. Actually, something like make is they have seen some of the ways, but you've seen all of them. The most compelling thing I think that's happening now is the convergence of social science and computer science. Kind of our motto. Silicon Angle. You recently wrote to Post on Medium that that has been kind of trending and going viral. I want to get your perspective on that. And they're They're interesting because they they bring a little bit of computer science called the authoritative Authority Terrian Technology Reclaiming Control far too attention, part one. We go into great detail to lay out some big picture computer industry discussions. What's it all about? What's what's the What's the idea behind these stories? >> So let me back up a little bit in that, a Sze Yu said. And we can go into this if you want. I was very involved in a lot of thie, ah, innovation that happened in the Village Valley in terms of microprocessors, the Internet, networking, everything that laid the foundation for a lot of the things we see today incredible opportunities for my career for problems we solved over the last ten years. Ten, twelve years. Um, I began to see a shift and a shift in the culture and a shift in the way technology was impacting us. And it's not all good or bad. It's that it felt like we were out of balance and that we were becoming shorter and shorter, term focused and actually my book in two thousand eight closing the innovation gap. The main message there is let's not forget about the seeds you plant that all of this comes from because we're reaping the benefit of those seeds. We're not planning new seats and that we were becoming in the Valley in the nation the way we thought about things more and more short term focused and technology was causing some of that and benefitting and not been and at a disadvantage because of that. So that started with my book in two thousand eight and then in twenty fourteen, I think it was I did a Ted talk a Ted X talk called Balancing our Digital Diets, and I was even Mohr concerned that we were out of whack in terms of the consequences of innovation, and I drew an analogy to our food's systems, where so much innovation and creating cheap calories and energy and things like high fructose corn syrup that it took years to realize that, Oh, there's some negative consequences of that innovation. And so that was kind of a warning that, um, we weren't thinking enough about the consequences of at that point. Social media. That was before fake news, and I talked about tweets and how truth that lies went faster than truth, not knowing how bad that situation was going to be and then leading up to the election and after the election. We all know and have all learned now about the impacts of these technologies on our democracy, and I believe on our society and humanity. And I don't think it's just about our election system. I think it's about our psyches and how the technology's air impacting the way we think our fear and anxiety level of our kids and us is adults. So I been talking to people about it and advising, and I finally decided as, uh, I was collaborating with people that I felt that a lot of the awareness was in pockets that we talked about data privacy or we talked about addiction. But these air things were all interrelated, and so I wanted to one ad. My voices is technologists because I think a lot of the people who are writing the building, the awareness and talking about it if you are in government or a journalist's or even a social scientist people, it's really easy to say, Yeah, you say that, but you don't understand. It's more complicated than that. You don't understand the technology. So one, I do understand that technology. So I felt adding my voice as a technologist. But I'm also, uh, just increasingly concerned about what we do about it and that we take a more holistic view. So that's what, what what the pieces are about. And the reason I broke it into two pieces is because they're too long for most people, even the way they are. But the first is to build awareness of the problems which we can dig into it a high level if you want. And then the second is to throw out ideas as we move towards discussing solutions. So let me take a breath because you were goingto jump in, and then I can. >> No, it's just because you're connecting the foundational of technology foundation technology, identifying impact, looking at pockets of awareness and then looking at how it's all kind of coming together when you talk like that The first time I saw O subsystem interrupt us connection so someone could get like a operating system. And I think the society that you're pointing out in the article, the first one intention was there only to relate. And I think that's the key part. I think that's interesting because we run into people all the time when we do our cue broadcasts that have awareness here and don't know what's going on this. So this context that's highly cohesive. But there's no connection, right? So the decoupled right but highly cohesive, That's kind of systems. Architecture concept. So how do we create a robust technology's society system where technology and I think that's a threat that we're seeing this? What I cleaned out of the articles was your kind of raising the flag a little bit to the notion of big picture right system, kind of a foundational, but let's look at consequences and inter relationships, and how can we kind of orchestrate and figure out solutions? So what was the reaction to expand on that concept? Because this is where I was. It was provocative to me, >> right? So I think there are two thought trains that I just went down. One is that one of the problems we have that has been created by technology and technology is suffering from again. It's causing both cause and effect is not enough seats, system thinking and so one issue, which is not just this is not just about social media and not just about a I, but over the last twenty years we've increasingly trained, I think, are, Ah, engineers and computer scientists in Mohr transactional thinking. And as we move quicker and quicker to solve problems, we are not training our leaders or training our technologist to think in terms of systems. And so what I mean by systems is two things that you can break, that any problems have pieces. But those pieces air inter connected. We are interconnected, and that you, if you don't keep those things in mind, then you will not design things in a way, I believe that have the longevity and make the right type decisions. The second is the law of consequences when you have a system, if you do something here, it's going to impact something here. And so that whole notion of taking was thinking through consequences. I'm afraid that we're training people as we are focusing on being more and more agile, moving more and more quickly that it's in technology and in society that we're losing some of that system, thinking >> that they kind of think that's the trade off is always around. Whenever he had systems conversations in the past, but my old systems had on trade offs, we have overhead, so we have more memory. How do we handle things? So this is kind of That's just what happens. You tell about consequence, but >> we don't have all those we I'm older than you. But we started at a time when that we were limited. We were limited by memory. We were limited by processing. We were limited by band with and a different times. As thie industry emerged, the constraints were in different areas. Today, you don't have any of those constraints. And so, if you don't have any of those constraints. You don't get trained in thinking about trade offs and thinking about consequences. So when when we come into just what drove me to write, this one set of things are foundational issues and what I mean by foundational it's it's our relationship to technology. And the fact of the matter is, as a society, um, we put technology on a pedestal, and we have, uh, this is not to be taken out of Cut is not to be taken the extreme of talking about people, but overall, our relationship with technology is a bullying, controlling relationship. That's why I called it authoritarianism. >> Upgrade your iPhone to the new version. >> Well, whether it's as a user that you're giving up your your your authority to all these notifications and to your addiction, whether it is the fact that it is the control with the data, whether it is predictive ai ai algorithms that are reading your unconscious behaviors and telling you what you think, because if it's suggesting what you by putting things in front of you. So there are all of these behaviors that our relationship with technology is not a balanced relationship and you could one. You have a culture where the companies that are that have that power are driving towards. It's a culture of moving fast growth only don't think about the consequences. It's not just the unintended consequences, but it's the consequences of intended use. So the business models and at which we don't need to go into, because I think a lot of other people talk about that all end up with a situation which is unhealthy for us as people and humanity and for us as a society. So you take that part and it is. There's a parallel here, and we should learn from what happened with industrial Ah, the industrial revolution. We want progress. But if we don't pay attention to the harm, the harmful byproducts and trade offs of progress, it's why we have issues with climate. It's why we have plastic in our oceans. It's because you, you judge everything by progresses just growth and industrialization without thinking about well being or the consequences. Well, I believe we now face a similar challenge of digitization, so it's not industrialization. But it's digitalization that has byproducts in a whole number of areas. And so what the the article does is get into those specifics, whether it's data or anxiety, how we think our cognitive abilities, our ability to solve problems, All of those things are byproducts of progress. And so we should debate um, where we what we're willing to give up one last thing. And then I'll have to come in, which is one of the problems with both of these is is humans value convenience. We get addicted to convenience, and if somebody gives us something that is going to make things more convenient, it sure is held to go backward. And that's one of the reasons the combination of measuring our goodness as a country or a CZ. Globalization by economic growth and measuring our personal wellness by convenience, if something is more convenient, were happier. Take those two together, and it makes a dangerous cop combination because then our need for community convenience gets manipulated for continued economic growth. And it doesn't necessarily end up in, Ah, progress from, ah, well being perspective. >> It's interesting point about the digitization, because the digital industrial revolution, when the digital revolution is happening, has consequences. We're seeing them and you point them out in your post Facebook and fake news. There's also the global landscape is the political overlay. There's societal impact. There's not enough scholars that I've been trained in the art of understanding into relationships of technology, and Peg used to be a nerd thing. And now my kids are growing up. Digital natives. Technology is mainstreams, and there it is. Politics. You know, the first hack collection, Some of the control, The first president actually trolled his way. That president, I said that I'm the kid. That was my position. He actually was a successful troll and got everyone he trolled the media and you got the attention. These air new dynamics, This is reality. So is you look forward and bring these ideas, and I want to get your thoughts on ideas on how to bring people together. You've been on a CTO Cisco Systems. I know you've been sleeping on a board. This is a cross pollination opportunity. Bring people together to think about this. How do you do You look at that? How do you view how to take the next steps as a as an industry, as a society and as a global nations? It eventually, because cyber security privacy is becoming polarized. Also on a geography bases in China they have. GPR is hard core there. In Europe, he got Asia. With Chinese. You got America being American. It's kind of complicated as a system architecture thinking. How do you look at this? What is the playing field where the guard rails? What's your thoughts on this? Because it's a hard one, >> right? So it is a hard one and it isn't. It isn't easy to pave out a path that says it's solvable. Um, nor does Climate right now. But you have to believe we're going to figure it out because we have to figure it out. So I think there are a lot of pieces that we need to start with, and then we need to adjust along the way. And, um, one piece is and let me back up. I am not. I don't believe we can leave this up to the industry to solve the incentives and the value systems and the understanding of the issues. The industry is coming from an industry perspective, and you can't also. You also can't leave it just two technologists because technologists have a technology person perspective. I don't believe that you just can have government solve it for a variety of reasons. One is, if it takes a spectrum of things to legislation, tends to be retroactive, not forward looking. And you need to be really careful not to come up with regulation that actually reinforces the status quo as opposed to making something better. But I think we need to. We do need to figure out how to govern in a way that includes all of these things. So once >> it's running, it's clear that watching the Facebook hearing and watching soon dark sky in front of the house. Our current elected officials actually don't even know how the Internet works, so that's one challenge. So you have a shift in its every beat >> and it and it's actually, if you think about the way legislation often gets made one of the problems with our democracy right now, I'm not going to put it in quotes. But I want to put it >> out. >> Is that the influence of money on our democracy means that so often the input toe legislation comes from industry. So whether it's again big tech, big pharma, big Oil, big. That's the way this cycle works in places where we have had successful legislation that industry input, what you need industry input. You just don't want industry to be the on ly input that is balanced with other input. And so we need infrastructure in the world. In the country that has policy ideas, technology. This needs to come from civil society, from the academy from non profits. So you need the same way we have environmental sciences. We need to fund from government, not just industry funded that science. That's number one. And then we need ways to have conversations about influencing companies to do the right thing. Some of it is going to be through legislation some of it is going to be for through pressure. This, in some ways is like tobacco in some ways, like it's like food. In some ways, it's like climate on DH. It's so and an underlying any of this to happen. We need people to understand and to speak up because awareness amongst whether it's individuals, parents, teachers, we need to give people the information to protect themselves and to push back on companies and to rally pushback on government. Because if if there's not an awareness of people are walking around saying, Don't take away my service, don't make this less convenient don't tax my soda. Don't tell me my text messages. That's right, so and I'm not saying taxes of the way. But if there isn't what what I'm focused on is, how do we build awareness? How do we get information out? How do we get companies like yours and others that this becomes part of >> our >> messaging of understanding so we can be talking about I >> think it's, you know back, Teo, The glory days of the TCP epi Internet revolution. He sent a package from here to there. It's a step. Take a first step. I personally listening to you talk feel and I said, It's on The Cuban people know that. You know, my my rap know that I've been pounding this. There's a counter culture in there somewhere. Counter culture's is where action happens, and I think you know, tax regulation and, you know, the current generations inherited. It is what it is we have. You're laying out essentially the current situation. John Markoff wrote a great book, What the door Mail said, talking about how the sixties counterculture influence the computer industry from breaking in for getting computer time for time sharing, too hippy revolution question I have for you put you on the spot. Is Is there a counterculture in your mind? Coming a digital hippie quotes is because I feel it. I feel that that let the air out of the balloon before it pops. Something has to happen and I think has to be a counterculture. I yet yet can't put my finger on it. Maybe it's a digital kind of a revolution, something compelling that says Whoa time out. >> All right? I think we need a couple of counter culture's in that in layers of it, because, um, I think there is going to be or is starting to be a counterculture amongst technologist and the technology industry and entrepreneurs who are some it's still small who are saying, You know what? This chasing unicorns and fastest growth and scale, you know, move faxed and break things. But, um, we want to move fast, but we want to think about whether we're breaking what we're breaking is really dangerous, you know, move fast and break things is fine, but if it's oops, we broke democracy. That isn't something that, uh that is I'm sorry you have to think about and adapt more quickly. So I think there is Are people who are talking about let's talk openly about the harm. Let's not just be tech optimists. Let's understand that it's small, but it's beginning and you're seeing it in a I for instance, the people who are saying Look, were technologists, we want to be responsible. This is a powerful weapon or tool. And let's make sure we think about how we use it. Let me just say one thing, which is, I think we needed another kind of counterculture, which I'm hoping is happing in a number of areas, which is societally saying, You know, we have a slow food movement. Maybe we just need a slow down, a little bit movement. So if you look at mindfulness, if you look at kids who are starting to say, You know what? I want to talk to someone in person, I don't. So we we need some of that counter movement where I'm hoping the pedestal starts to come back. In terms of people looking for real connectivity and not just numbers of connections, >> it's interesting, You know, everything has a symmetrical, responsible thing about it. For every fake news payload and network effect is potentially an opposite reaction of quality network effect. It's interesting, and I don't know where it is, but I think that's got it could be filled, certainly on the economic side, by new entrepreneurial thinking, like one observation I'm making is you know this. Remember, they'll bad boys of tech and he's smiling. Now It's bad gals, too, which is growing still lower numbers. So I think there's gonna be a shift to the good, the good folks right moment. But she's a she's a good entrepreneur. She's not just out there to make a quick buck or hey, mission driven za signal we're seeing. So you start to see a little bit more of a swing to Whoa, hey, let's recognize that it's not about, you know, could Buck or >> so, yes, but between you and I, it's teeny compared to the other forces. So that's what those of us who believe that needs to happen need to continue to >> one of those forces money making. >> I think it's a combination of, Ah, money and how much money, Dr. Celebrity culture, um, the forces, the power that's in place is so strong that it's hard to break through, um, short term thinking, not even being trained. So like so many things in our culture, where you have entrenched power and then you see uprising and you get hope and that's where you need the hope. But, um, we've seen it so often in so many movements, from race to gender, where you think, Oh, that's solved, it's not solved and then you come back in and come back at it. So I just I would argue that there is little bits of it, but it needs fuel. It needs continuity. It it. And the reason I think we need some government regulation is it needs help because it's not gonna >> happen. You should question, you know, some successes that I point out Amazon Web services, Google even having a long game kind of narrative they're always kind of were misunderstood at first. Remember, Google was loud by search is not doing too well. Then the rest is history. Amazon was laughed. Amazon Web services was laughed at. So people who have the long game seemed to be winning in these transitions. And that's kind of what you're getting at. You think long term, the long game. If you think in terms of the long term vision, you then going look at consequences differently. How many people do you run in? The valleys actually think like that. Okay, >> so we're talking about two different things. One is long term thinking, and I do think that apple, Google, Amazon have taken long term thinking's. So there are a good example. But if you look at them, if we look at the big companies in terms of the way they approached the market and competition and their potential negative impacts on overall society, they're part of the power. They're not doing anything to change the systems, to not >> have good and continue to benefit. The rich get richer. >> So there this This is why it's complicated. There are not good guys and bad guys there are. These people are doing this and that. So do I think overall dough? I see more long term thinking. Um, not really. I think that the incentives in the investment community, the incentives in the stock market. The incentives culturally are still very much around shorter term thinking. Not that there aren't any, but >> yeah, I would agree. I mean, it tends to be, you know, Hey, we're crushing it. We're winning, you know? Look at us. Growth hack. I mean, just the languages. Semantics. You look at that. I think it's changed. I think Facebook is, I think, the poster child of short term thinking growth hacks move fast, break stuff and look where they are, you know, they can't actually sustaining and brand outside of Facebook, they have to buy Instagram and these other companies to actually get the kind of growth. But certainly Facebook is dominate on the financial performance, but they're kind of sitting in their situation. I think you know the bro Grammer movement, I think is kind of moving through the white common ear culture of Okay, let's get some entrepreneurship going. Great. Rod. I think that's stabilising. I think we're seeing with cloud really science and thinking for good. That's a positive sign. >> Well, I'm I'm glad to hear that from you, you know, and all >> you're probably going with. >> No, no, no, I'll take that and take that into feeding my hope because I hope, >> well, the movement is classic. Look, we're not gonna tolerate this anymore. I think transparency in my final question to you before you get to some of the more entrepreneur Question says, If you look at the role of community on data, science and connectedness, one of the things about being connected is you got potential potential for collective intelligence. So if you look at data, as I said, networks, what if there was a way to kind of hone that network to get to the truth fast? Esther, something we've been working on here, and I think that's something that, you know changes media. It changes the game. But collective intelligent, the role of the community now becomes a stakeholder and potentially laying out. So his problems and you're part of the Mayfield community was co created this video with roll community, super important people. The rule of the of the person your thoughts on >> so I community is a word that is has takes on a lot of meetings, and the problem is when you mean it one way and use it the other way, the same as data driven. So I think there's at one level which is community and conductivity that has to do with collecting input from lots of sources. And when you talk about investigative journalism or they're in environmental situations or all sorts of areas where the ability to collect information from lots of sources that air interested and analyze that information that is one level of community and connectivity and networking because of people you know which is great, there's another type. When people talk about community, they mean a sense of community in terms of what humans need and what that connectivity is. And most online networks don't give you that level. The online needs to be augmented by, Ah, inter personal understanding. And one of the problems. I think with today's technology is we're fitting humans into bits that technology Khun Support, as opposed to recognizing what are our human needs that we want to hold on to and saying There are some things that are not going to fit into somebody's data set. So in that first type of community than absolutely, I think there's lots of benefits of the cloud and wisdom of the crowd. But if you're talking about humans connecting in people. You don't have the same type of, uh, that that really community online tools can help. But we should never confuse what happens in our online world >> with your final question for, you know, we got We're pushing the time here. Thank you for spending time. First of all, it's great conversation. You've seen the movie with venture capital from the beginning. You know, all the original players seeing what is now just where's that come from? Where are we? What's the state of VC? Then? He hope to the future, they all adding value. How do you see that evolving and where are we with? >> You know, I would. I think venture capital has gone through a lot of different phases. And like so many things, especially those of us who want computers, we liketo lump them all together. They're not altogether. There are some small, Yes, like they field. And the I do think, though, that something shifted in the lead up to the dot com. Ah, and later the burst. And what shifted is venture capitalists. Before that time were company builders. They were the financiers, but they saw themselves with the entrepreneur building companies because of the expansion leading up to two thousand, and the funds grew and the people coming into the field were, they became more bankers and they took more financial supposed to balancing financing and entrepreneurship. It felt like it moved. Maurin toe. This is a private equity play, Um, and I think the dynamic with entrepreneurs and the methodology overall shifted, and I don't know that that's changed Now again, not across the board. I think there are some, uh, those firms that have identified our partners within firms who still very much want Teo filled companies and partner with entrepreneurs. But I think the dynamic shifted, and if you view them as that's what they are, is private equity investors. And don't expect something else. If people need money, that's a good pick. Ones that are the best partner >> is your partner. If you want a banker, go here. If you want Builder, go their key distinction. Judy. Thanks for sharing that insight. We're Judy Estrin. Sea of Jail as author of Closing Innovation. Gabbas Wellman's well known entrepreneur advisor board member formally CTO of Cisco. And again, Great gas. Thanks for coming on I'm John for Herewith. Cube conversation. Part ofmy Mayfield. People first with the Cube. Thanks for watching.
SUMMARY :
She's the CEO of J Labs and author of the book Closing the It's fun to be here, So I love the fact that you're here. that I felt that a lot of the awareness was in pockets that we talked about how it's all kind of coming together when you talk like that The first time I saw O subsystem interrupt One is that one of the problems we have that has been created that they kind of think that's the trade off is always around. And the fact of the matter And then I'll have to come in, which is one of the problems with both of these is is So is you look forward and bring these ideas, and I want to get your thoughts on ideas I don't believe that you just can So you have a shift in its every beat and it and it's actually, if you think about the way legislation Is that the influence of money on our democracy means that so I feel that that let the air out of the balloon before it pops. So if you look at mindfulness, if you look at kids who are starting to say, So you start to see a little bit more of a swing to Whoa, hey, let's recognize that it's it's teeny compared to the other forces. And the reason I think we need some government regulation is it You should question, you know, some successes that I point out Amazon Web services, of the way they approached the market and competition and have good and continue to benefit. community, the incentives in the stock market. I mean, it tends to be, you know, Hey, we're crushing it. data, science and connectedness, one of the things about being connected is you got potential potential has takes on a lot of meetings, and the problem is when you mean it one You know, all the original players seeing what is now just where's that come from? But I think the dynamic shifted, and if you view them as that's what they are, is private equity investors. If you want a banker, go here.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Amazon | ORGANIZATION | 0.99+ |
John Markoff | PERSON | 0.99+ |
ORGANIZATION | 0.99+ | |
apple | ORGANIZATION | 0.99+ |
Judy Estrin | PERSON | 0.99+ |
Silicon Valley | LOCATION | 0.99+ |
Europe | LOCATION | 0.99+ |
ORGANIZATION | 0.99+ | |
Cisco | ORGANIZATION | 0.99+ |
Today | DATE | 0.99+ |
J Labs | ORGANIZATION | 0.99+ |
Gabbas Wellman | PERSON | 0.99+ |
China | LOCATION | 0.99+ |
Closing the Innovation Gap | TITLE | 0.99+ |
iPhone | COMMERCIAL_ITEM | 0.99+ |
two pieces | QUANTITY | 0.99+ |
Ten | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
one piece | QUANTITY | 0.99+ |
Vin Cerf | PERSON | 0.99+ |
Teo | PERSON | 0.99+ |
Judy | PERSON | 0.99+ |
one issue | QUANTITY | 0.99+ |
John | PERSON | 0.99+ |
two things | QUANTITY | 0.99+ |
Esther | PERSON | 0.99+ |
One | QUANTITY | 0.99+ |
Rod | PERSON | 0.99+ |
both | QUANTITY | 0.99+ |
first | QUANTITY | 0.99+ |
two | QUANTITY | 0.99+ |
First project | QUANTITY | 0.99+ |
Sea of Jail | TITLE | 0.99+ |
Closing Innovation | TITLE | 0.99+ |
ORGANIZATION | 0.99+ | |
second | QUANTITY | 0.98+ |
two technologists | QUANTITY | 0.98+ |
Ted talk | TITLE | 0.98+ |
Asia | LOCATION | 0.98+ |
first step | QUANTITY | 0.98+ |
Amazon Web | ORGANIZATION | 0.98+ |
eighties | DATE | 0.98+ |
Balancing our Digital Diets | TITLE | 0.97+ |
today | DATE | 0.97+ |
Pioneer | ORGANIZATION | 0.97+ |
Cisco Systems | ORGANIZATION | 0.97+ |
twelve years | QUANTITY | 0.97+ |
one level | QUANTITY | 0.97+ |
Mohr | PERSON | 0.97+ |
one challenge | QUANTITY | 0.96+ |
JLabs | ORGANIZATION | 0.95+ |
twenty fourteen | QUANTITY | 0.94+ |
Palo Alto Studios | LOCATION | 0.94+ |
first time | QUANTITY | 0.94+ |
one ad | QUANTITY | 0.92+ |
one thing | QUANTITY | 0.92+ |
First | QUANTITY | 0.92+ |
Mayfield Fund and Co | ORGANIZATION | 0.91+ |
Maurin | PERSON | 0.91+ |
two thought trains | QUANTITY | 0.9+ |
Sze Yu | PERSON | 0.9+ |
first hack | QUANTITY | 0.89+ |
two thousand eight | QUANTITY | 0.89+ |
two thousand | QUANTITY | 0.88+ |
Ted X talk | TITLE | 0.88+ |
one last | QUANTITY | 0.87+ |
two different | QUANTITY | 0.86+ |
Valley | LOCATION | 0.86+ |
one observation | QUANTITY | 0.84+ |
one way | QUANTITY | 0.84+ |
first president | QUANTITY | 0.82+ |
first one intention | QUANTITY | 0.81+ |
Teo | ORGANIZATION | 0.81+ |
Mayfield | ORGANIZATION | 0.79+ |
Curtis Garner, Bowles Farming Company and Megan Nunes, Vinsight - Food IT 2017 - #FoodIT #theCUBE
>> Announcer: Live from the Computer History Museum in the heart of Silicon Valley, it's The Cube, covering Food IT: Fork to Farm. Brought to you by Western Digital. >> Hi, welcome back to The Cube. I'm Lisa Martin, we are at the fourth annual Food IT: Fork to Farm Event at the Computer History Museum in the heart of Silicon Valley. I'm very excited to be joined by my next two guests, we have Curtis Garner, Senior Farm Analyst from Bowles Farming Company, welcome. >> Thank you. >> Great to have you, and we have Megan Nunes, CEO of Vinsight. Welcome! >> Thank you! >> Great to have you guys here. So this event is so interesting for us. We cover a lot of technology innovation, a lot on the infrastructure side, this is more on the application side, but Curtis, I wanted to start with you being a farmer, your farm has been, a six-generation farm, Bowles Farming Company based in Los Banos, California. One of the things I found really interesting, when I was doing some research on Bowles Farm, is that you have a big solar project, and one of the things that's really interesting, it's been reported that the US food system uses 15% of the total energy of the US, to produce food. Tell us about the solar project, that Bowles Farms has done, and what you've been saving on energy. >> So, with Bowles Farming and agriculture in general, there's been kind of a stagnation of innovation, and through technology with drip irrigation, we've seen a difference in technology from doing gravity-fed irrigation, which is basically free energy, right, gravity doesn't cost anything, to pressurized drip irrigation systems, and so we've used pressurized pumps that use diesel energy, and we've been switching them over to electricity, and that's been an efficiency for Bowles Farming, but we've, we've offset our costs by two solar plants and so we have two solar plants, two 500-kilowatt energy to generate one megawatt of energy, we've displaced about 80% of our energy use on the farm. >> 80%, that's dramatic. And was that a multi-year project that you initiated? >> It was supposed to happen about a year, but through regulation and difficulties with permitting and PG&E, it took about a year and a half to complete. We'll see the benefits of it this year. >> And your primary crops are cotton, tomatoes, nuts, almonds ... >> So, yeah. We're diverse, diversified row crops, so we have 12 different crops, but our primary crops are Pima cotton, and processing tomatoes. >> So, question for you from a technology perspective, this event is so interesting because, when I first read the title like I thought, fork-to-farm, we're so used to the trendiness of farm-to-table, right, farm-to-fork. But, the fact that the tech-enabled consumer has really influenced, or wants to influence, organic, must be cage-free if it's eggs, you know, it must be, non-genetic, et cetera. What are some of the influences that you're seeing on the farming side that the consumer is driving, and how has Bowles Farm made some changes to accommodate that? >> So our crop choice, so the consumer is actually voting with their fork, is actually a real thing. So like, the most posted food picture on Instagram and Pinterest is actually a purple vegetable. So a thought on the farm is, should we be growing a bunch of purple vegetables? And so, it's actually very real that the consumers are driving production. >> Yeah, interesting! So Megan, as the CEO of Vinsight, talk to us about the genesis of Vinsight. You yourself come from a farming background. What was the origination of your company? >> Yeah, so, I grew up in the Central Valley of California, I'm originally from a small town called Gustine, and I left Gustine, went to college in San Louis Obispo at Cal Poly, and then after that I worked for an aerospace company in the remote sensing space for about seven years. And while I was there, one of the things that we were looking at doing was providing satellite imagery to farmers, and different growers, and quickly I realized that the traditional imagery that the satellite imagery business was providing through um, it's called NBDI, which basically is a health map of red, green, and yellow. Wasn't necessarily helpful or terribly actionable, and that really bothered me, and so through lots of conversations and investigation that I took on my own, I decided, you know what, it's time to start something on my own, through utilizing different data techniques to better understand food production. And so Vinsight was basically initially born out of the idea of utilizing satellite imagery, in a more meaningful way to benefit growers and then the entire supply chain as a whole. And that later turned into crop forecasting for grapes and almonds here in California. >> And, and, especially, you know, grapes being huge, I mean, Napa, Edna Valley, Pasa Robles, we're very fortunate to have a, a tremendous amount of grapes and wine opportunities, but you mentioned almonds. 90% of the world's almonds come from California. Talk to us about how maybe an example of how a farm is using your technologies, like, are you putting sensors in their farms or is it really they're utilizing satellite imagery and data acquisition through your product and API, to improve their yields? >> So it's more of the latter. At Vinsight, our objective is to be data agnostic, and so what that means is we take in data from any source that allows us to better understand production as a whole. And so what happens is we collect data from four major categories, which include remote sensing data or satellite imagery, climate and weather, historical yield, and then geographical information, so primarily that'll be like soil type, elevation angling, and so on. And what we do, is we built out this 20-year historical archive, and we've utilized machine learning techniques to train on that data and understand what matters to the plant at this specific point in time, and how does that correlate and trend against what we've seen in the past. And so in real time, during the growing season, we pull in like the top ten features that matter, to that plant at that specific time, and then we give you a crop forecast of, hey, you're going to produce so many pounds or tons, depending on the industry, of x product, and we're assuming a 10% or better error rate typically on understanding your total production. And so our goal is, through starting with understanding your total supply, how can that also start to relate into how we handle pricing and how that ultimately will benefit both the grower and consumer at the end of the day. >> Interesting, so, about the production yields, I wanted to kind of talk, Curtis, to you about, if you look at the food chain from planting, through monitoring soil conditions, fertilizers, water, we've just gotten out of a massive drought here in California, one other thing that it's, that I find interesting is the post-harvest arena, and you know, supply chain logistics traceability. Talking about almonds, I was reading, and this is very surprising, to me, that in the last three years, over 35 truckloads of almonds have vanished, and that's tantamount to ten million dollars. So on the traceability side, I know that's going to be one of the themes at the event today, how are you using technology, Curtis, at Bowles Farms, on the traceability? Can you give us some examples there? >> Yeah, so traceability is a very big deal for the farm and the consumer and the producer. Bowles Farming has actually a pretty unique story about this in that, our cotton that we grow is a Pima cotton. Costco sold bedsheets that were Pima cotton, and they had the olive oil scandal, the same guy that did that, did a market sweep of all the Pima cotton sheets that represented that they were 100% Pima, found that over half the supply was actually adulterated, is actually not Pima cotton, is Upland or primarily a blend. And so with that, he applied the same technology that he did with olive oil to the cotton industry, and we are the first farm and the first gin to sign up with him, to do traceability, from basically from farm all the way to sheets. Yeah, and so ... >> Wow, farm to sheets. >> Farm to sheets, yeah >> Didn't expect to hear that today. >> Yeah, I guess so. They're now, it's, the brand is Wamsutta, the Pima cotton brand, and they're available at the Bed Bath & Beyond. >> Wow, so, looking at what Megan has done with Vinsight, being a six-generational, six-generation farm, what's the, um, what are your thoughts, as a senior farm analyst, on the adoption of technology? Was it something that was slow to be adopted, or do you really feel, we've been so successful for six generations, we want to understand how we can look at data types that are aggregated as Megan, you said over 20 years of historical information, what's been that adoption at your farm? >> So Bowles has a legacy of innovation, and we're an innovative farm, we have a lot of innovative people and so, for us, it's a matter of survival. So with the regulatory pressures, with the increasing costs of California, farming in California, innovation's going to be key, and that's going to come in the role of technology, and so, we're pretty quick to adopt. If you look at farmers as a whole, people think that they're overall-wearing, individuals that aren't very intelligent, but it's actually quite the opposite, and if a new technology comes that has a great ROI, just like the drip irrigation, they'll implement that, though, pretty quickly. >> Oh, fantastic. Well, Curtis, we wish you the best of luck at Bowles Farms, Megan, same, congratulations on Vinsight, we wish you the very best of luck and we thank you both for joining us on The Cube. >> Thank you! >> Thank you! >> We want to thank you for watching again. We are at the Food IT: Fork to Farm Summit in the heart of Silicon Valley. I'm Lisa Martin, you're watching The Cube. Stick around, we'll be right back. (techno music sting)
SUMMARY :
in the heart of Silicon Valley, in the heart of Silicon Valley. Great to have you, and we have Megan Nunes, and one of the things that's really interesting, and so we have two solar plants, And was that a multi-year project that you initiated? We'll see the benefits of it this year. And your primary crops are cotton, tomatoes, so we have 12 different crops, but our primary crops on the farming side that the consumer is driving, So our crop choice, so the consumer is actually voting So Megan, as the CEO of Vinsight, for an aerospace company in the remote sensing space 90% of the world's almonds come from California. and consumer at the end of the day. that I find interesting is the post-harvest arena, found that over half the supply was actually adulterated, to hear that today. the Pima cotton brand, and they're available and if a new technology comes that has a great ROI, and we thank you both for joining us on The Cube. We are at the Food IT: Fork to Farm Summit
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Lisa Martin | PERSON | 0.99+ |
Curtis | PERSON | 0.99+ |
Curtis Garner | PERSON | 0.99+ |
Costco | ORGANIZATION | 0.99+ |
10% | QUANTITY | 0.99+ |
San Louis Obispo | LOCATION | 0.99+ |
California | LOCATION | 0.99+ |
Bowles Farming Company | ORGANIZATION | 0.99+ |
15% | QUANTITY | 0.99+ |
Vinsight | ORGANIZATION | 0.99+ |
Western Digital | ORGANIZATION | 0.99+ |
Bowles Farming | ORGANIZATION | 0.99+ |
Silicon Valley | LOCATION | 0.99+ |
six-generation | QUANTITY | 0.99+ |
Bowles Farm | ORGANIZATION | 0.99+ |
Megan | PERSON | 0.99+ |
Wamsutta | ORGANIZATION | 0.99+ |
PG&E | ORGANIZATION | 0.99+ |
ten million dollars | QUANTITY | 0.99+ |
Bowles Farms | ORGANIZATION | 0.99+ |
12 different crops | QUANTITY | 0.99+ |
two solar plants | QUANTITY | 0.99+ |
Megan Nunes | PERSON | 0.99+ |
100% | QUANTITY | 0.99+ |
Bed Bath & Beyond | ORGANIZATION | 0.99+ |
Pima | ORGANIZATION | 0.99+ |
90% | QUANTITY | 0.99+ |
20-year | QUANTITY | 0.99+ |
Los Banos, California | LOCATION | 0.99+ |
this year | DATE | 0.99+ |
US | LOCATION | 0.98+ |
first | QUANTITY | 0.98+ |
one megawatt | QUANTITY | 0.98+ |
about seven years | QUANTITY | 0.98+ |
first gin | QUANTITY | 0.98+ |
first farm | QUANTITY | 0.98+ |
over 20 years | QUANTITY | 0.98+ |
both | QUANTITY | 0.97+ |
about a year | QUANTITY | 0.97+ |
Vinsight | PERSON | 0.97+ |
one | QUANTITY | 0.97+ |
Vin | PERSON | 0.97+ |
six-generational | QUANTITY | 0.97+ |
One | QUANTITY | 0.97+ |
about a year and a half | QUANTITY | 0.97+ |
The Cube | TITLE | 0.97+ |
Food IT | ORGANIZATION | 0.96+ |
today | DATE | 0.96+ |
six generations | QUANTITY | 0.95+ |
two 500-kilowatt | QUANTITY | 0.95+ |
about 80% | QUANTITY | 0.94+ |
ten features | QUANTITY | 0.94+ |
Central Valley of California | LOCATION | 0.94+ |
Edna Valley | LOCATION | 0.94+ |
Bowles | ORGANIZATION | 0.94+ |
ORGANIZATION | 0.94+ | |
two guests | QUANTITY | 0.93+ |
over half | QUANTITY | 0.92+ |
Napa | LOCATION | 0.91+ |
#FoodIT | ORGANIZATION | 0.91+ |
last three years | DATE | 0.89+ |
Gustine | LOCATION | 0.87+ |
Steve Wong, SMPTE - NAB Show 2017 - #NABShow - #theCUBE
>> Narrator: Live from Las Vegas, it's, theCube. Covering NAB 2017, brought to you by HGST. (upbeat techno music) >> Hey, welcome back everybody. Jeff Frick hear with, theCube. We're at NAB 2017 in Las Vegas, California. 100,000 people all talking about broadcast industry, media industry, and tech. Met is the theme because the technology is completely interwoven in with media and entertainment. And we're excited to have a great representative from the Hollywood Section Manager, Society Motion Picture and Television Engineers. That's a mouth full, Steve Wong. Steve, welcome. >> Welcome, or SMPTE, that's the easiest. >> SMPTE, I'll go with SMPTE, he's from SMPTE. Alright so you had an interesting talk earlier about blockchain. It's interesting, we've been here for three days and a lot of conversations of kind of, similarities with trends we're seeing at other shows that we cover with democratization of data, and access to the data, and abilities of cloud, and integrated security. But we haven't really talked about blockchain. But I think that's kind of funny, that now we're hearing the blockchain conversation come in too as we hear in many places. Where does blockchain fit? >> You know it's really interesting, because originally I had heard of a blockchain for folks in the financial industry. And that's where the real big push is. And a lot of VC's were talking about blockchain. So I started to look at blockchain and median entertainment, and I said, "You know could this fit? "You know what would be an interesting fit for this?" And when you look at making a movie or a television program, it's just a lot of transactions. And that's where blockchain is absolutely perfect. >> Right. >> You know blockchain is basically a general ledger entry. So when you think of you know, why is that important? You know, I looked back to the origination of content, you know, for moving images, and that's a feature film script or a television script. >> Jeff: Right, right. >> So imagine when you write that, the first thing you do is you go and you register it with the copyright office. So my thought is, that's your first chain in that link of ownership. And so the next thing you do, is you want to option that script off. So you're going to send out a document, your PDF to your agent, and he's going to send it out to a bunch of other agents. And then you'll have a track record of that next transaction, whoever received that. >> Jeff: Right, right. >> So as you go down through that production, you know I envision being able to tie it back to that original ownership for that script. Whoever options his script to go out into the production. To actually take that all the way down to the storage, to the camera, and be able to pull even all of that meta-data together. Link it to the ownership into that chain, all the way to the distribution to the actual viewer at the end of it. >> So, the greatest descriptive term I've heard of blockchain is trust as a service. >> Steve: Right. >> Which is really an interesting way to coin it. And what's interesting about this industry, is the transient nature of the way, you know, kind of groups of people and resources are assembled around a particular project, this script in which you described. They create this asset, and then they go, you know, poof, they go back from whence they came. >> That's the challenge, right? >> So it really begs, it begs for better trust solutions. >> So imagine you get a deal with a show, and they say, "You know what? "We're going to pay you rate, "but we're going to give you percentage of the back end." And you say, "Fantastic." And then you go on to your next project. How do you find that out? >> Jeff: Right, right. >> Right now it's really difficult to track that all the way back, residuals or whatever. This will be an easy way to basically see who's seen it, who gets paid, what you're owed, and everything else. >> Right. Now it's pretty crazy now you said before we turned on the cameras, that it's all very, very still old-school paper based at this point and time. >> That's the crazy thing about, you know, you look at other industries, you know, and I touch a lot of industries. And you think, wow, you know, we've got basic things. Such as when I start with an employer, I can go online and download all of my stuff, and I never touch paper. But even today in the television industry and the motion picture, you know, for 99% of it, it's all paper. So basically all my stuff I have to physically give them, and fill out, you know, documents at the end of the day. You know, a PA checks me in when I show up. A PA signs when I send out, on a piece of paper, they send it in a football back to the financial office at the show. And they do all these things manually. You know, it's coming to where they're doing digital onboarding. >> Right. >> But all this stuff is still paper. Because really it's like we've been making movies for the last hundred years. >> Right, and yet we're surrounded at this conference with hundreds of thousands of square feet of new technology, and new innovation, and computer based stuff, and IP based stuff, and crazy cameras, and 360 cameras, and 4K, and 8K, and HDTV. So clearly there's no holding back the technology edge. That there's three leverages, but then you got to check-in with the PA right? >> If you make billions of dollars the same way that you did a hundred years ago You know, who's going to be the guy that going to change that? Or a girl, right? That's the challenge, if it's, you know, not broke, don't fix it. >> That's why I love Clayton Christensen's book. It's still my all-time favorite book. Right, it hard to change when you've been making money, that same old way. So what are some of your other impressions of the show? You've been coming here for a number of years. The vibe's different I keep hearing. It's our first time, but I'm curious to get your kind of general impression. >> You know the interesting thing is, you know, again following the trends in other industries, you know, to move to a true digital IP workflow. So I'm seeing that really starting to materialize around here. You know, I think that the challenge is... You know, when I started off a hundred years ago on television I was a, you know, de facto MIS manager and director of research at ABC. And back in those days, in the 90s, you know, I connected our sales team to the internet. And then you could actually send emails to the buyers, and that was like a big, big jump. >> That was a bad day though, in hindsight. >> Yeah, so um. >> (laughing) Too much email ack. >> So you see folks that, you know, understand video and BNC cables, and things like that. >> Right, right. You have another group that understand ethernet, you know, NIP. And they have always been in two different worlds. You know, at every TV station, you have your IT guy that would never touch the broadcast equipment, he was forbidden there. >> Jeff: Right, right. >> You know, a long time ago. But now you see that merger. You know, where you really have, you know, a manager or VP that understands video and understands IP, and says, "You know there's a better way to do that." And it's secure now a days, and you know, if you take the right precautions. So that's the trend that I've seen change around here. Because the cameras are all digital, right? >> Right, right. >> Everything is digital along that path, why would you have to go back to video? >> Jeff: Right. >> You know, we have things like Periscope. We can do live video to millions of people. >> Jeff: Right. >> So the technology's clearly here. >> It's just so amazing, you know again, the themes are consistent wherever we go. This just democratization of access, and ability. That I can go sit in the front row of a Dodger, Giant's game, and you know, hold up my Periscope and pretend that I'm Vin Scully, you know, for a minute. Which clearly I'm not. And people probably are not going to watch me like they love Vin Scully. But it's so interesting that at the low-end, you know, there's so many tools available for people, for creators, that they just have access that they didn't have before. At the high-end, I mean, the amount of stuff in this conference room. Again with the 360, and VR, and the IR, and the 4K, and the 8K. You know, it's fascinating. But I sometimes wonder is it too much? Are we still managing, you know, the story telling? And is it-- >> And that's what it comes down to. You have to tell a story, that's the most important thing. >> It's so competitive for the audience, right? Because the alternate is just a quick swipe away, you know. So it seems like the pressure to perform, and to get your ROI's, especially on these bigger projects, has got to be higher than it's ever been. >> Alright, this is an interesting thing, because what we've seen in Hollywood is an increase in production. You know, it used to be you'd wait, you know, for a TV season, and they'd pitch the shows to the advertising agencies in New York. But now with the increase of Netflix and Amazon, there's always a season. >> Jeff: Right, right. 'Cause they're always buying things. You know, whatever YouTube channels. You see YouTube stars that are making money, and that's a valuable audience now. Where people are saying, "I'll just watch YouTube tonight "and see what's going on there, "from the people I like to follow." >> Jeff: Right. >> So that drives production, you know, goals and costs down because you can't do a hundred million dollar YouTube production, or you can I guess, right? But you probably won't make any money with it. >> (laughing) I'm sure they are. But the other thing is just strikes me, just is the compression around, for feature movies, around the opening weekend. 'Cause there's only 52 weekends a year. >> Steve: Right. >> And, you know, some of those are probably not so great from a marketing point of view. And this just compression to make that number. Because the next weekend, or two weekends from now it's another movie, or it's another movie, or it's another movie. And so it's seems just crazy. On the other hand, the long-tail opportunities with VOD, and multi-forms of distribution, multi-language, multi-format, multi-channel are bigger than they've ever been before. So it's this interesting dichotomy in terms of the way the market's evolving. >> The interesting thing, because of that pressure, we see huge growth in analytics. You know, there was a great article from, About Netflix, talking about the genres. You know, in Hollywood we've got like 13 genres or something like that. But Netflix has like 73 genres. >> Jeff: Right. >> So they've broken down their audience 'cause they have the device. You know, they know exactly what they're watching. So they use those analytics to their benefits when they buy. You know, the studios are at a disadvantage, unless they have the same things. >> Right. >> So you see guys like Legendary investing in analytics teams and, you know, all these other folks out there that are investing in these analytics teams to make that, you know, smarter investment for those movies. >> Right, it is interesting is, again, as it gets consistent, right? Is that now, if you can track to the consumption of the material, you're not just shipping the product anymore. And it's going to a theater, and hopefully people are watching it or not watching it. But now if they're watching it on their phone, you know, where they're watching, who's watching it, you know what time, how often, how deep they go-- >> Well now that's the key. >> Jeff: It's pretty interesting. >> If you have that application, and you have the ability, you know, like Netflix does that's awesome. >> Jeff: Right, right. >> But remember most of the studios and networks, they're creating it and licensing it off. So they may not get that information. But that's where you see the other trend, where folks like HBO, they create the content, but they also want to have that application device so they can get that information. So I think that's another trend you'll start seeing. >> So will the ones that are still independent that don't have the channel, you know, start to get back as part of their channel deal, some of that data? >> It's challenging, right? Because cable companies typically don't want to release that data. You know, a secondary OTT app may not want to release that data. So it really forces a creator to own that distribution chain, so they can get that valuable data, so. >> Interesting time. Somebody said earlier, I think in the week, that Netflix, I think, is now the largest producer. I don't know what genre of category, but they're like one of the largest studios now of all. Which is pretty fascinating, when they were simply, you know, DVD rental service not that long ago for people that remember what a DVD was. >> Steve: Right. Having difficulty getting contracts with studios. >> Jeff: Right, exactly. >> But-- >> So make your own I guess, that's the ticket. >> Steve: There you go. >> Alright, Steve, so I'll give you the last word. As you look forward to 2017, if we meet again here next year-- >> Steve: Yes. >> What do you think the topics going to be? >> Again, I think what you're going to see is more folks moving to a public cloud, trusting that, and really working with it, using analytics. And the most important thing, that we touched on, is managing that security. Making sure they don't get hacked, so. >> Alright, Steve. Well, Steve from SMPTE. That was the shorter way. >> There you go. >> Steve Wong, I'm Jeff Frick. Thanks for stopping by. >> Steve: Thanks so much. >> Alright, you're watching, theCube, from NAB 2017. We'll be right back after this short break. (upbeat techno music)
SUMMARY :
Covering NAB 2017, brought to you by HGST. Met is the theme Alright so you had an interesting talk earlier And when you look at making a movie So when you think of you know, why is that important? And so the next thing you do, So as you go down through that production, So, the greatest descriptive term I've heard is the transient nature of the way, you know, So it really begs, And then you go on to your next project. to track that all the way back, Now it's pretty crazy now you said and the motion picture, you know, for 99% of it, for the last hundred years. but then you got to check-in with the PA right? That's the challenge, if it's, you know, Right, it hard to change when you've been making money, you know, again following the trends in other industries, So you see folks that, you know, you know, NIP. You know, where you really have, you know, You know, we have things like Periscope. But it's so interesting that at the low-end, you know, You have to tell a story, that's the most important thing. Because the alternate is just a quick swipe away, you know. you know, for a TV season, "from the people I like to follow." So that drives production, you know, But the other thing is just strikes me, And, you know, some of those are probably not so great You know, there was a great article You know, the studios are at a disadvantage, to make that, you know, smarter investment Is that now, if you can track and you have the ability, you know, But that's where you see the other trend, You know, a secondary OTT app may not want when they were simply, you know, Having difficulty getting contracts with studios. Alright, Steve, so I'll give you the last word. And the most important thing, that we touched on, That was the shorter way. Thanks for stopping by. We'll be right back after this short break.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Jeff Frick | PERSON | 0.99+ |
Jeff | PERSON | 0.99+ |
Steve | PERSON | 0.99+ |
New York | LOCATION | 0.99+ |
2017 | DATE | 0.99+ |
Steve Wong | PERSON | 0.99+ |
99% | QUANTITY | 0.99+ |
ABC | ORGANIZATION | 0.99+ |
HBO | ORGANIZATION | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Netflix | ORGANIZATION | 0.99+ |
SMPTE | ORGANIZATION | 0.99+ |
Las Vegas, California | LOCATION | 0.99+ |
100,000 people | QUANTITY | 0.99+ |
next year | DATE | 0.99+ |
13 genres | QUANTITY | 0.99+ |
73 genres | QUANTITY | 0.99+ |
three days | QUANTITY | 0.99+ |
first | QUANTITY | 0.99+ |
NAB 2017 | EVENT | 0.99+ |
Vin Scully | PERSON | 0.99+ |
two weekends | QUANTITY | 0.99+ |
YouTube | ORGANIZATION | 0.99+ |
Clayton Christensen | PERSON | 0.98+ |
90s | DATE | 0.98+ |
next weekend | DATE | 0.98+ |
hundreds of thousands of square feet | QUANTITY | 0.98+ |
first time | QUANTITY | 0.98+ |
billions of dollars | QUANTITY | 0.98+ |
millions of people | QUANTITY | 0.97+ |
first chain | QUANTITY | 0.97+ |
today | DATE | 0.96+ |
#NABShow | EVENT | 0.96+ |
tonight | DATE | 0.95+ |
two different worlds | QUANTITY | 0.95+ |
52 weekends a year | QUANTITY | 0.94+ |
a hundred years ago | DATE | 0.94+ |
HGST | ORGANIZATION | 0.93+ |
NAB Show 2017 | EVENT | 0.92+ |
three leverages | QUANTITY | 0.92+ |
Las Vegas | LOCATION | 0.92+ |
Hollywood Section | ORGANIZATION | 0.91+ |
Periscope | ORGANIZATION | 0.9+ |
one | QUANTITY | 0.89+ |
Hollywood | ORGANIZATION | 0.89+ |
Society Motion Picture | ORGANIZATION | 0.86+ |
Narrator | TITLE | 0.84+ |
hundred million dollar | QUANTITY | 0.84+ |
360 cameras | QUANTITY | 0.84+ |
Alri | PERSON | 0.82+ |
8K | QUANTITY | 0.77+ |
a minute | QUANTITY | 0.73+ |
4K | QUANTITY | 0.7+ |
theCube | ORGANIZATION | 0.68+ |
Legendary | TITLE | 0.67+ |
last hundred years | DATE | 0.6+ |
360 | QUANTITY | 0.6+ |