Image Title

Search Results for fourth gear:

Brad Maltz, Dell Technologies | KubeCon + CloudNativeCon NA 2022


 

(upbeat music) >> Good afternoon, everyone. Welcome back to theCUBE Live in Detroit, Michigan. Lisa Martin here with John Furrier. We are covering KubeCon + CloudNativeCon '22. John, this is day two of our coverage wall-to-wall three days of coverage on theCUBE. We've been talking a lot about the developer and how the world is starting to really revolve around developer and DevOps portfolios. >> Yes, developers, startups, big companies, all transforming. This next segment, we want to hear from how Dell Technologies cloud natives, big time strategy there and looking forward to it. It's good. It's going to be a great segment. >> Yes, please welcome back one of our alumni to theCUBE. Brad Maltz is here, Senior Director of DevOps Portfolio and DevRel for Dell Technologies. Good to see you. >> Thank you guys for having me. >> So, Dell at KubeCon, what's going on? >> Yeah, that's literally the most common question I'm getting. So for us, it's a lot about our customer base is making that transformation into a DevOps world. And they have a ton of Dell and they're like, Hey, from a Dell perspective, how do you help us make that transformation into a DevOps operating model? So we're here to explain that. We're here to talk about infrastructure as code, our container Kubernetes story, our multi-cloud story. We're talking about all of it. >> Tell us about those stories and what the value is in it for companies to work with Dell as they transition. >> So when we look at it from a DevOps perspective for us, it's all about the culture, the operating model shift they're trying to make. And what that means to them is they have to figure out how do they automate all of the stacks they have to deal with. Whether it's going to be server, storage, data protection, network, and all the way up through the hypervisor and Kubernetes. That means they need to work with an ecosystem of tools. Things like Ansible, things like Terraform, all that stuff. Our job is to make our portfolio more consumable in the infrastructure as code space. That's one part of the discussion. The second part of the conversation is Kubernetes won. Kubernetes won the abstraction in this multi-cloud world and we as Dell are helping our customers consume Kubernetes. Whether it's by bringing solutions and more appliance oriented mentality to the market or whether it's actually enabling them with our container storage modules and CSI drivers. >> So it as supercloud as we call or multi-cloud as some people call it, you're starting to see the abstraction for interoperability, but essentially just distributed hybrid cloud. Edge as you guys have a big presence. So Dell's supplying not just the data center anymore. Cloud models are moving to hybrid on-premises, edge is growing. We saw some great use cases where military applications are using Kubernetes and all kinds of new things. So this real examples happening right now. This is going to impact Dell's customers and Dell as a supplier of compute and servers. And the gear that runs everything. Like at a telco, you can have a data center at an edge spot, like a box could be a data center. >> Telco is a great example cause we created the business, the Telco business unit. And in the Telco business unit, our goal was, hey, telco is a little different than enterprise edge. Enterprise edge, retail, manufacturing, healthcare. They have certain needs. Telco, much smaller group of customers that have a much different set of needs. And that's very similar is how do we scale at the edge? How do we control things programmatically? How do we do it in a secure way? And how do we do it so that our people internally don't have to deal with the underpinnings of all that infrastructure. Just make it easier for them. That's our goal through the edge discussions, through telco and all that. >> Yeah. We've been doing a big thing on why hardware matters. Hardware's back. We look at all the hyperscalers, the big competition is faster, faster, faster chips, faster the physics. This is part of the supply chain both hardware and software. Okay. So developers want more power. At the end of the day, this community here wants invisible infrastructure and they want it fast. >> Brad: Yes, that's exactly right. >> There's a lot under the hub. It's still servers. >> You still got firmware, you still got bio, you still got to management operating system, You still got to patch things, kernels, security issues, all of that from a server perspective. We haven't even talked about storage or networking or any of the other stuff. So there's a ton of buttons and dials under the covers. >> And that's totally going to be awesome. And the question comes in, okay, now take me to the cloud native because automation, infrastructures code, these are now the hotspots. Software supply chain, not hardware, software supply chain. So these are all things that are going to be intersecting. What's your view? >> In the multi-cloud view of the world, what we really have are our customers are saying, okay, we started on one cloud, Amazon or Azure or Google. And they're like, you know what? We had to go to a second cloud for whatever reason, many reasons. Now we have to manage two clouds. And by the way, we never got fully off-prem. So now we have all of our on-premises stuff plus multiple clouds. How do we deal with the complexity there? And the complexity there is everything from data problems of data mobility, data protection, replication, all that stuff. How do we deal with the actual application life cycle management across that? And that's where a lot of the tooling we're discussing comes in. That's where Kubernetes comes in and they want to do it in an agnostic way. 'Cause if they can't begin to transition to do it in a standardized layer, then the end of the day they're still going to be managing three totally different environments with three separate engineering teams. >> So is your target audience primarily existing Dell customers, legacy customers, or is it really wide open? >> It's actually been opening up. So we have kind of, the way I view it is we have three different segments that we're going to be going after. We have what I would say is the top 10% of the industry that's really able to skill up into this DevOps world very quickly. They're going to go after the GitOps, they're going to go after all those things. That's a combination of existing customers, but also the really, really large customers that can build their own clouds on-premises. We then have the other end of the spectrum. People that aren't making the shift. People that are like, you know what this DevOps transformation it's not going to help us there, but we still need server and storage and whatnot. And then I like to call it the squishy middle. 60, 70% of the market that's like, we can't scale up in time, we can't hire the people, they're not available 'cause that 10% just got them all, but we still have the same problems. And how do we operate in a world where we have that multi-cloud type of a problem, but we can't find the people. Now you got to figure out more of the no-code, low-code packaged solutions, packaged automation coming from companies like Dell and others. >> So there's customers that are either at the beginning of their journey are not convinced yet. What are some of the barriers that they're seeing that Dell can help them overcome? >> Number one thing, education. >> Lisa: Really? >> We're hearing that consistently here at KubeCon and just customer meetings all over the place. There is a segment of the industry that they're empowered to move into a DevOps model. They don't have the ability or resources. They're not able to say, I've been doing this forever in this way in storage. How do I do that in another thing? And they're scared. They want somebody to come in and kind of handhold them a little bit, but somebody they trust. Somebody they've been working with for a very long time. That's Dell's role. Hands-on labs, training materials, how-to videos, but do it in the comfortable way that they feel like, okay we got this. >> And the success with the customers has been that well-documented. The success with the company, again, continues to survive and thrive in all conditions. So Michael Dell knows what he's doing. Love following his strategy. Michael, if you're watching, I know he watches theCUBE video, congratulations. But now the hard question for Dell is this, the applications used to run on PCs, now they're running PCs under the covers and servers. The application space here at this community is enabled by Kubernetes, is creating a new application runtime like environment. I like, compared to the old app server days when things were like just application specific, development got easier. We're in that renaissance now where the app runtime is being enabled by Kubernetes. You guys been there, done that in the old school, now the new school. What's your view on this Kubernetes? What's Dell's view on? >> Yeah, so back to Kubernetes won in my head. It's just flat out won and part of the reason, and it beat out a lot of things. You remember Cloud Foundry, which there's still a thing, but Cloud Foundry went a little too far up into the application stack and constrained the application developers a bit too much. Kubernetes success is two things. It's because they're not constraining the developer, but they're also figuring out how to enable that IT operations mindset. And they become that happy medium that's out there. So now all of a sudden, application modernization conversations and cloud-native app development, there is a standard package. There's standard load balancing and security paradigm, standard registration mechanisms, all built into the Kubernetes layer, by the way, enabled by an ecosystem. And because they're actually going through that, what's happening now is we can finally move forward. We can take that next step and we can build around that ecosystem of Kubernetes. >> That is thematically something that we've been hearing, John, for the last day and a half is the maturation of Kubernetes People, what's next? We are ready for the next step. Talk about Dell as an enabler of that. >> Yeah, so a funny, another part of that paradigm is Kubernetes does not equal virtualization. And this is a hard one in this industry right now. A lot of people say, well, yeah, we did the VMware pivot and then the KVM and everything else and they're like, this is just another one of those pivots. I'm like, no it's not. Virtualization was the pivot of physical hardware became virtual hardware, but you still thought of it in CPU memory disc and you managed it in the same way. Kubernetes, it's a such a different way of thinking about operationalization and all that abstraction that what we're realizing is people need to take baby steps into Kubernetes right now. The maturity of it is great because there is an ecosystem around it, but the majority of the industry isn't even aware of the basics of Kubernetes right now. So our job, we look at it as the education part, but also can we deliver the solutions together with the OpenShift's of the world and the Tanzu's of the world and the Rancher's of the world. Can we deliver more of that full stack experience going into the next few years? That's where we believe we can help accelerate them. Education and that delivery mechanism. >> And the community support is going to be there too. You got to have the. >> 100%. >> The community, not just education, which you guys done before, but doing it with open source vibe. >> That's where DevRel comes in. So the DevRel half of my world now is all about Dell in the community. And to be part of community isn't just to say, Hey, I'm going to go sponsor something. That's not community to me. >> It doesn't hurt. >> It doesn't hurt, but we're going to do that. We're definitely going to help with that. What our notion is you got to participate, you got to contribute, you got to be there, you got to be part of the community. That's part of my developer relations team is to become part of it. >> You got to be part of it and belong. Belonging is earning. >> Brad: Yes. >> And that's the key. And the other thing we were talking about standards and Dell has won a lot of business 'cause the PC and the servers all had standards, standard components. Standards now in the community are being driven by developer consensus. >> Brad: Yes. >> So that is an interesting new paradigm. So if you make cloud native work where all the hardware and software that's powering the builders is invisible. The developers will tell you what they want. >> 100%. >> And that's why your Kubernetes, Cloud Foundry example is so on point. It's a little bit nuanced, but what happened there is, let's explain Kubernetes was loosely de facto enabling. They didn't try to take too much territory. They didn't over push. >> Brad: Exactly. >> They were very flexible, lightweight at first, but it was enabling. >> It was organic. >> And we called it on theCUBE, I'm not going to lie, we called that early on. So props to us. >> Brad: Good job. >> Pat on the back. >> Lisa: Pat your own back. >> We get it right a lot. But now there's impact though. But the Dell I think speaks to the theme here, which just we talked is that you got startups here. We had from Envoy, we saw the donator there. He started his own company. You got Dell, which has large enterprises running massive workloads with a lot of legacy and modernization. So you got a combination of both coming together. This is going to be a collision of innovation. >> Oh I look, that's exactly right. Part of what I've been getting is not just the end users, the infrastructure developers, and whatnot around here. Startups look, come to Dell, and they're like, why are you here? Like we build this and we don't talk to you. And we're like, why not? If we come to market and start delivering more of those Kubernetes oriented solutions and the Kubernetes stack experience, that's where you guys should be working with us. You're part of the ecosystem. >> Well, your job is to say to them, look it when you want to write your software for the edge and we have market share of the most hardware at the edge, 'cause we perform better on the edge. No one wants to write software on the slower platform. >> No. >> Name me one I want to write software that's just, this is something, but people don't understand that's why you're here. >> Brad: That's exactly right. >> The game is about performance. >> Brad: Yeah. >> Cloud can do it, you can do it with a machine. So it depends where in the distributed computing chain you're at. >> You bring up one topic that actually isn't a core discussion topic around DevOps, but I am seeing more HPC and a AI/ML conversations popping up in this DevOps cloud native space. 'Cause even the market of HPC, which is a very traditional market, commodity server driven in the past, they're starting to say, how do I take advantage of Kubernetes and all of the benefits that we've been talking about. >> What are some of the things that you've heard like in your sense is the key theme or the talk track of Kubernetes, its evolution? What's on the developer's minds the last day and a half at this conference? >> Oh, okay. That's a hard question, but a good one. So the way I look at it is probably it's the robustness of the features within Kubernetes, not the native features, but even partner included features. They just want to be able to handle security in a much more, I hate to say zero trust, but secure cloud native way. There's tools in the Kubernetes ecosystem that are so integrated into Kubernetes. They don't have to think sometimes as much about how do they do it themselves. They can go find through open source or off-the-shelf startup and say, I need that and I can spin it up in about five minutes and now I'm doing that without having to spend weeks or months and having to build that. And that's security is one example. You can go through the networking discussion, you can go through so many different areas. The fact is because of community and the ecosystem, that is the winning formula for Kubernetes to enable the development. That's all I'm hearing here is they're like, give me more, give me more startups, give me more of these technologies. >> And ease of use has been a big topic here. We've been talking before we came on camera about VMware has done great since it used the virtual machine example versus Kubernetes. That is millions of developers and operators on VMware. They have about 200,000 plus just in VMUG alone. So they are going to transform their careers. They're looking for a home. They're looking for a community for the next 10 years. I mean, VMware will still be around with Broadcom, but I'm speculating that it will be much more in maintenance mode. But to get someone's career in fourth gear, fifth gear, you got to go and get that next skill set, and that's the question. Where do all these operators, IT operators go to become enterprise operators? >> Brad: That's exactly right. >> That is a big topic. What's your reaction? >> Sp I'm actually a living proof of that. I grew up in the VMware ecosystem. And for me making that pivot, it took me many years. One of the ways I did that was I actually have run in Dell, our advanced development pivotal Dojos, if you remember Pivotal. >> Yes. >> And doing the Pair Programming in Agile. It took me that mental shift to say, okay, we were doing it that way and now there's a new way to do it through code with developers and using all the new buzzwords. And that pivot is different for somebody that's just starting now, and they don't have access to a Dojo that they can go handle like a whole bunch of pair programmers. How do they make that pivot? That's 100% what we have to do. >> Okay, so my question is this, this is a hard question for you, maybe you can answer or not or maybe you can. What's different now than the attempt in the past from Dell EMC to do work or align with the developers? I think, was it five, six years ago, it was an effort. Was it timing? What's different now from then? >> So that attempt was awesome. That team was great. I was very close to that team and that was from the EMC side originally is where they have built that out. And the notion of that was that we just have to go start contributing knowledge and technology into the community and start really taking the brand and trying to expand the brand to be relevant in that community. Nothing wrong. That was actually an amazing way they did it. I think through the merger there was definitely a little bit of, okay, well, maybe this isn't one of our top priorities right now and that's probably what happened through the actual merger. >> John: It's a little bit distraction. >> It was distraction. >> Timings wasn't as good now. >> You try merging a 67 billion merger. I mean it's just really hard to do. What happened here is I think we finally got past a lot of that with the merger and now we're in steady stage/growth mode, which is a notion that now we can go and do this again in the new world, taking our lessons learned from what we did before, and try to actually go and update that in these new power apps. >> And you could point to some specific timing issues. Like at that time this community wasn't as advanced along. Kubernetes wasn't as clear. Visibility to that value proposition. Although a lot of people were speculating what happened that way. >> Exactly. >> But now with multi-cloud, I think developers starting to see the reality that it ain't going to be one cloud. >> Well, multi-cloud is not one cloud, so 100%. >> Well, I mean there's multi-cloud today, but it's really not multi-cloud by the way it could be. The people have multiple clouds. I think that gives developers comfort that existing enterprise players. Remember Microsoft wasn't really in the cloud game six, seven years ago. Look where they are now. Significant progress, nipping at the heels of AWS. So all the enterprise players are back at the table. >> Brad: Yeah, definitely. We're here. >> And that's timing issue. >> We're here. >> Talk about, you're here, you are helping customers get to the basics of Kubernetes. You talked a lot about the importance of the education. >> Brad: Yes. >> That screams to me that Dell can be a facilitator of cultural change within organizations, whether it's a bank or a hospital or a retailer or whatnot. Another thing that I'm curious about, what you guys are doing, how you've evolved, Dell is a massive partner ecosystem. How is the partner ecosystem involved in helping customers build their DevOps portfolios and really start embracing, understanding, and learning about Kubernetes? >> So that's an ever changing world right now. And that's part of why we're here at KubeCon is to help expand that. We have a very, very strong partner community. Not even just channel, but like technology partner community. And our goal is to understand with our DevOps portfolio what needs to be the next step of that partner community. Do we have to go partner up with like the, I'll use examples, the Solo.io. Do we have to partner up with all the mesh companies, the HashiCorp, which we are, We have to understand where the layers that make sense and where don't. There are some that don't make sense because they're so often to an app developer land or they're so far above even Kubernetes sometimes that maybe they don't make sense in our partner community. >> How influential are, I know we got to go soon, but how influential are your customers in helping to make some of those decisions? It's all about the customer at the end of the day. >> They're the only one that's deciding for us. They have to come to us. We have to see the need. We have to understand the discussions through our sales mechanisms, our other mechanisms. We're using that data every single day, every hour to make those decisions. >> Awesome. Brad, it's been great to have you. Sorry we took more of your time than we planned, but it was so interesting. >> No, this is awesome. >> Dell at KubeCon, you've done a great job of explaining why that absolutely resonates, the relevance, and why customers should be looking at Dell as their partner for this. Thank you so much for your time and your insights. >> Thank you guys. >> All right. For John Furrier and our guest, I'm Lisa Martin. You're watching theCUBE live at KubeCon + CloudNativeCon '22 from Detroit, Michigan. Stick around, our next guest will be here in just a minute. (gentle music)

Published Date : Oct 27 2022

SUMMARY :

and how the world is and looking forward to it. one of our alumni to theCUBE. the most common question I'm getting. for companies to work with Dell and all the way up through And the gear that runs everything. And in the Telco business This is part of the supply chain There's a lot under the hub. or any of the other stuff. And the question comes in, And by the way, we never People that aren't making the shift. at the beginning of their but do it in the comfortable way And the success with the customers and part of the reason, is the maturation of Kubernetes and the Tanzu's of the world And the community support but doing it with open source vibe. So the DevRel half of my world now We're definitely going to help with that. You got to be part of it and belong. And the other thing we were the builders is invisible. And that's why your They were very flexible, So props to us. This is going to be a and the Kubernetes stack experience, the most hardware at the edge, that's why you're here. the distributed computing and all of the benefits that that is the winning formula for Kubernetes and that's the question. That is a big topic. One of the ways I did that was and they don't have access to the attempt in the past And the notion of that was a lot of that with the merger Visibility to that value proposition. that it ain't going to be one cloud. not one cloud, so 100%. So all the enterprise players Brad: Yeah, definitely. importance of the education. How is the partner ecosystem involved And our goal is to understand at the end of the day. They're the only one been great to have you. the relevance, and why customers For John Furrier and our

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Lisa MartinPERSON

0.99+

TelcoORGANIZATION

0.99+

JohnPERSON

0.99+

BradPERSON

0.99+

Brad MaltzPERSON

0.99+

LisaPERSON

0.99+

MichaelPERSON

0.99+

telcoORGANIZATION

0.99+

DellORGANIZATION

0.99+

MicrosoftORGANIZATION

0.99+

10%QUANTITY

0.99+

Detroit, MichiganLOCATION

0.99+

AmazonORGANIZATION

0.99+

100%QUANTITY

0.99+

John FurrierPERSON

0.99+

GoogleORGANIZATION

0.99+

EMCORGANIZATION

0.99+

Cloud FoundryTITLE

0.99+

60QUANTITY

0.99+

one partQUANTITY

0.99+

AWSORGANIZATION

0.99+

two thingsQUANTITY

0.99+

fifth gearQUANTITY

0.99+

KubeConEVENT

0.99+

BroadcomORGANIZATION

0.99+

Dell TechnologiesORGANIZATION

0.99+

millionsQUANTITY

0.99+

fourth gearQUANTITY

0.99+

two cloudsQUANTITY

0.99+

bothQUANTITY

0.99+

VMwareORGANIZATION

0.98+

HashiCorpORGANIZATION

0.98+

three daysQUANTITY

0.98+

Dell TechnologiesORGANIZATION

0.98+

second cloudQUANTITY

0.98+

KubernetesTITLE

0.98+

70%QUANTITY

0.98+

OneQUANTITY

0.98+

EnvoyORGANIZATION

0.97+

about 200,000 plusQUANTITY

0.97+

one cloudQUANTITY

0.97+

one topicQUANTITY

0.97+

AgileTITLE

0.96+

second partQUANTITY

0.96+

Michael DellPERSON

0.96+

Bob Pucci, State of Tennessee & Cristina Secrest, EY | UiPath Forward 5


 

>>The Cube presents UI Path Forward five. Brought to you by UI Path. >>Hi everybody. Welcome back to Las Vegas. You're watching the Cube's coverage of UI Path Forward. Five. We reach cruising altitude on day two. Christina Seacrest is here. She's the process Artificial intelligence and automation GPS automation leader at ey. And Bob PCIs, executive director for Intelligent Automation for the state of Tennessee. Folks, welcome to the cube. Thank you for Adam. >>Good >>To have you. Okay, I don't know if I messed up that title, Christina, but it's kind of interesting. You got process, you got ai, you got automation, you got gps. What's your role? >>I have a lot of rules, so thank you for that. Yeah, so my focus is first and foremost automation. So how do you get things like UI path into our clients, but also I focus specifically in our government and public sector clients. So sled specifically. So state local education. So that's why I'm here with the state of Tennessee. And then we also like to take it beyond automation. So how do you bring an artificial intelligence and all the technologies that come with that. So really full end to end spectrum of >>Automation. So Bob, when you think about the sort of the, the factors that are driving your organization of, how did you describe that, Those sort of external factors that inform your strategy. What, what's, what are the catalysts for how you determine to deploy technology? >>Well, it was primarily that we know tendency has a tendency to provide good customer service, but we want to get to a great status best in class, if you will. And we had an external advisory review where it said, Hey, you know, we could make automation to improve our customer experience. And so that was like a directive of the, the state leaders to go across the board and automate all processes statewide, starting with the 23 executive agencies. >>So where's the focus from that standpoint? Is it on just providing better interfaces to your constituents, your customers? Is it cutting costs or you actually have more budget to invest? Kind of a combination of >>Those? Yeah, so it's, it's really both qualitative and quantitative, right? So quantitative is where we're able to reduce hours and therefore we can redirect people to more less mundane work, if you will. And then qualitative is where we're able to reduce the errors, improve data quality, reduce cycle time for our citizens, you know, when they're making requests, et cetera. So it's, I think it's a combination of both of those quantitative and qualitative metrics that we are mandated in, in micromanaged, quite frankly to, to bring, make those >>Numbers. So I'm from Massachusetts, when I go to a a mass.gov website, I say, all this was done in the 1990s and you could just see where the different stovepipes were, were. But then every now and then you'll hit one and you'll say, Wow, okay, this is up to, it's such a great experience. And then the flip side of that is you want your employees to be happy and not have to do all this mundane work so you can retain the best people. You don't have to. So you're living that in, in state and, and local. So where did you start your automation journey? What role did EY play? Let's go. Yeah, >>Sure. So I, I, I think the thought for process automation was probably three or four years ago, but then we started the program about 18 months ago and there was a lot of, let's say behind the scenes work before we could bring EY in, you know, like what resources was I gonna have in, in the state that were gonna help me address all of the agency simultaneously, right? Cuz normally you'll see a project that'll do be more siloed across the state and say, we're gonna do this agency, we're gonna do this division. Well, you have 40 other agencies that are, you know, the momentum is it's just gonna fall, it wayside. So how we looked at it was let's blanket it and go across all 23 agencies at the same time, you know, identify common processes that are used across 40 divisions, for example, right? >>So, so what we basically did is we procured the software, you know, did the contracts, and then it was really about, I designed, I'm gonna say a multistream approach where they were, we could run multiple work streams, independent define all the architectures, required dev tests, production, the disaster recovery at the same time in parallel developed the center of excellence, the operation model, the processes, methodologies. And the third one was, let's go out to a few divisions, business administration, health, you know, health, human resources, and be able to do a process inventory to see what was there. And then based on that, there's all this theory of well let's do a proof of concept. Let's do a proof of technology, let's do apply. Well, the bottom line is rpa technology's been around for a long time. It's proven there's nothing to prove. But really what was important to prove before we decided to go, you know, full tilt was, you know, develop a proof of perceived business value. >>Are we gonna bring in the, the business value, the hours and the qu qualitative metrics that is expected by our ex executive team, The leadership, we were able to do that, you know, with the help of help of ey, we built out the prototypes and we got the green light to go forward, got ey to start, and then we just basically went pedal to the metal. We had our foundation already defined. We built up the architecture in less than one to two months. Now, in, in a public sector or private sector, it's just not heard of, right? But we have a tendency with EYs technical team, myself, we look around the, the road around the rock instead, the rock in the road, right? So we ended up coming up with a very unique, very easy to easy to handle architecture that was very scalable. And then were able to hit the ground running and deploy in production by December where head of >>Was EY involved in the whole, you know, dev test production, dr. Center of excellence, the, the process inventory or did you bring them in? Did you kind of do that internally then bring EY in for the proof of >>Value? EY was actually awarded the contract for soup to nuts, basically the first phase, which was those four work streams I told you about. And they worked with myself and the state of Tennessee infrastructure architecture teams. We needed to get these things defined and signed off the architecture so we could expedite getting them built out. And then they, and they basically ran all four work streams, you know, the process, inventory, the prototype, the, the proof of perceived business value, the building out the center of excellence, working with myself. And, and this wasn't just us in a, a vacuum, we ended up having to, I mean, I could do the strategy, I could do the technology and I could said the roadmap and all the good stuff, but we had to actually meet with a lot of the state or tendency organizations on change management. How do we end up putting this process or an automation in the middle of the, the normal traditional process, right? So there was a lot of interaction there and getting their feedback and then tweaking our operational model based on feedback from the state of Tennessee. So it was all very collective collaborative. I think that would be the keyword is collaborative and then building out everything. So then, and then we ended up going to the next way where they knew so much and we were, we had such a tight timeframe that we continued with ey. >>So Christina, Bob mentioned center of excellence a couple of times in the state of Tennessee, but then beyond state of Tennessee, other organizations you've worked with in this space, what's the relationship between center of excellence and this thing we've been hearing about over the last couple of days, the citizen developer has that been, has, has, has that been leveraged in the state of Tennessee? Bob, have you seen that leveraged in other places? Christina? What's that relationship look like? >>Yeah, so we don't leverage that, that model yet we have centralized model and there's reasons for that. So we don't end up having maverick's, runoff runoffs have one off, have, you know, have a a UI path version or down this division or have another RPA tool in another division, right? So then all of a sudden we're, we have a maintenance nightmare. Manageability nightmare. So we basically, you know, I I I negotiate an ELA with UI path, so therefore if anyone wants to go do another automation on another division, or they would basically follow our model, our design, our coe, our quality gates. We we're the gatekeepers to bring into production. >>Got it. Now, yeah. Now Christina, what's your perspective? Because I can imagine Nashville and Memphis might have very different ideas about a lot of things. Yeah. Little Tennessee reference there, but what, what, what about what, what about other places are you, are you seeing the citizen developer leveraged in, in some kinds of places more than others or >>What? Yeah. Yeah. And that's part of, because of the foundation we're building. Yeah. So we laid, you know, when, when Bob talks about the first phase of eight weeks, that was amazingly fast, even in that's ridiculous. Spoke about it to say you're gonna lay these four foundations. I was excited, like, I was like, wow, this, this is a very serious client. They wanna go fast and they wanna get that momentum, but the AUM was laid out so we could propel ourselves. So we are at 40 automations right now. We're in the works of creating 80 more automations in this next year. We'll be at 120 really quickly. The AUM is critical. And I will say at a client, I've, I've worked with over 50 clients on automation programs. The way state of Tennessee treats the aom and they abide by it, it is the living document of how you go and go fast. Got it. And the one thing I would say is it's also allowed us to have such immense quality. So I always talk about you put in forward, you put in another 80, we're at 98% uptime on all our automations, meaning they don't go down. And that's because of the AOM we set up. And the natural progression is going to be how do you take it to citizen developer? How do you take it to, we call, you know, process automation plus, >>But methodically, methodically, not just throwing it out at the beginning and, and hoping the chaos >>Works. Exactly. Exactly. And >>The ratio of of bots to automations, is that one to one or you have automation? Oh no, the single bot is doing multiple. So how many bots are you talking about? >>We're doing, Bob, you're gonna answer this better than I will, but the efficiency is amazing. We've been pushing that. >>So our ratio now, cause we have a high density architecture we put in is four bots, excuse me, four processes. The one bot and four bots, The one virtual machine EC two server. Right? So it's four to one, four to one. Now what we're going to get by next summer, we'll do more analysis. We'll probably get the six to one, six to one that's made serious shrinkage of our footprint from a machine, you know, management perspective from 60 down to seven right now we're gonna add the next chunk. We add another 80 automations in FIS gear 24. We're only gonna add two more bot, two more servers. Right? So that's only 10 running like close to 200 bucks. >>And, and is doing this on prem in the cloud? >>No, our, the architecture's fully >>Oh, cloud based >>Ct. Yeah. So we use UiPath SAS model. Yeah. Right. So that handles the orchestrator, the attended bots, all the other tooling you need automation hub, process minor et etc. Etc. Cetera. And then on the state side in aws we have, we use unattended bots, cert bots that have to go down into the legacy systems, et cetera. And they're sitting on EC two instances. >>Was there, was there a security not hole that you had to get through internally? What was that like? >>No, actually we, we, we were lock and step with the security team on this. I mean, there are some standards and templates and you know, what we had to follow, you know, but they're doing an assessment every single release, they do assessments on little bots, what systems it's activating or are accessing, et cetera. The data, because you have fedra data of FTI data, you know, in the public sector to make sure we're not touching it. >>Do you guys golf? >>I do, yeah. Not Well, yes, >>If you mean I I like golf but not don't golf well, but so you know what, what a mulligan is. If you had a Mulligan right, for the state of Tennessee, what'd you learn? What would you do differently? You know, what are some of the gotchas you see maybe Christina in, in other customers and then maybe specifically state of Tennessee, >>Right? I would say, you know, it is the intangibles. So when we talk about our clients that go fast and go big, like state of Tennessee, it's because that, that we call it phase zero that gets done that Bob did. It's about making sure you've got the sponsorship. So we've got executive sponsorship all the way up. You've got amazing stakeholder engagement. So you're communicating the value of what we're trying to do. And you're, you're showing them the value. We have been really focused on the return on investment and we'll talk a little bit about that, but it's how do you make sure that when you do, you know, states are different with those agencies, you have such an opportunity to maximize return on investment if you do it right, because you're not talking about automation in one agency, you're talking it across multiple agencies. We call that the multiplier effect. And that's huge. And if you understand that and how to actually apply that, the value you get is amazing. So I, I don't, I can't say there's a mulligan here, Bob, you may think of some, I know on other clients, if you don't line up your stakeholders and you don't set the expectations early on, you meander and you may get five, six automations in over the year. You know, when I go to clients and say, we're doing 40, we're doing 80, they're like, >>Wow, that's the, but that's the bottom line. Gotcha. Is if you, if you want to have an operational impact and have multiple zeros, you gotta go through that process that you said up front. >>Exactly. A >>Anything you do differently, Bob? >>Well, I I what I do differently, I mean, I think, I mean we, we did get executive sponsorship, you know, and in one area, but we still have to go out to all the 23 agencies and get, and bring awareness and kind of like set the hook to bring 'em in, right? Bring 'em to the, to the, to the lake. Right. And, and I think if, if it was more of a blanket top down, getting every agency to agree to, you know, in investigate automation, it would've been a lot easier. So we're, we're, we're getting it done. We've gone through 13 agencies already and less than a year, all of our releases are sprinkling across multiple agencies. So it's not like a silo. I'll look at that. Everyone at every agency is being impacted. So I think that's great. But I, I think our, our Mueller now is just trying to make sure we have enough backlog to do the next sprints. >>Is it, you know, the ROI on these initiatives is, is, is so clear and so fast. Is it self-funding? Is there gain sharing or do you just give business, give money back to the state and have to scramble for more? Do you get to, you know, get a lick off that cone? >>Unfortunately we don't, but I, I, I try to see if we could get some property like, nah, we don't do that. It's all cost, cost based. But, but our ROI is very attractive, I think for, for doing a whole state, you know, transformation. I think our ROI is three and a half to four years. Right. And that's pretty mind blowing. Even if you look at private sector or, I, I think some of the, the key things which people are noticing, even though we're in public sector, we're we are very nimble. This project is extremely nimble. We've had people come in, exactly, we need this, so we're gonna get penalized. Okay, knock it out in four hours, four days. Right? So it's that nimbleness that you just don't hear of even in private sector or public sector. And we're just able to do that for all the collaboration we do across ey, across myself and across all the other organizations that I, that I kind of drag along or what have, >>What do you, what do you, do you see any limits to the opportunities here? I mean, is this a decade long opportunity? Is you have that much runway >>Or that's just not my dna, so we're gonna, we're gonna probably do it like in four years, but Well, when >>You say do it, I mean, will you be done at that point? Or do you see the weight, >>Look at, you know, we could boil the ocean and I think this is one of the reasons why we're successful is we could boil the ocean and and be, it will be 10 attended 20 year program. Yeah. Okay. Or we looked at it, we had some of EY guys look at it and say, I said, what's the 25 80 rule? Meaning, you know, give me, So if we had 500 processes, tell me how many processes will gimme 80% of the hours. And it was 125, it was a 25 80 rule. I said, that's what we're doing it, we're doing, we're gonna do the 80% of the hours quantifiably. Now when we're done with that pass, then we'll have those other ones that are bringing 20% of the hours, that's when we might be bringing citizens in. That's what we're bringing state workers in. But at that same time, we will be going back in the wave and doing advanced ai. Right. Or advance ia, in other words. So right now we do rpa, ocr, icr, but you know, there's NL ml nps, there's virtual agents and stuff. So that's like the wave we're gonna do through the ones we've already gone through. Got it. Right. So it'll probably be a two or three wave or iterations. >>Cool. Guys, thanks so much for coming into the cube. Great story. Really appreciate you taking us through it. Thank you so much for having us. You're very welcome. All right, keep it right there. Dave Nicholson. The Dave ante. We back at UI path forward five from the Venetian in Las Vegas. Keep it right there.

Published Date : Sep 30 2022

SUMMARY :

Brought to you by Thank you for Adam. you got ai, you got automation, you got gps. So how do you bring an artificial intelligence and all the technologies that come with that. of, how did you describe that, Those sort of external factors that inform your strategy. but we want to get to a great status best in class, if you will. reduce cycle time for our citizens, you know, when they're making requests, et cetera. So where did you start your automation journey? Well, you have 40 other agencies that are, you know, to prove before we decided to go, you know, full tilt was, you know, got the green light to go forward, got ey to start, and then we just basically went Was EY involved in the whole, you know, dev test production, dr. And then they, and they basically ran all four work streams, you know, the process, inventory, you know, I I I negotiate an ELA with UI path, so therefore if Because I can imagine Nashville and Memphis might have very So we laid, you know, when, when Bob talks about the first And So how many bots are you talking about? We're doing, Bob, you're gonna answer this better than I will, but the efficiency is amazing. machine, you know, management perspective from 60 down to seven right the attended bots, all the other tooling you need automation hub, process minor et etc. Etc. I mean, there are some standards and templates and you know, what we had to follow, you know, but they're doing an assessment I do, yeah. If you had a Mulligan right, for the state of Tennessee, what'd you learn? on the return on investment and we'll talk a little bit about that, but it's how do you make sure that when you do, Wow, that's the, but that's the bottom line. Exactly. down, getting every agency to agree to, you know, in investigate automation, Is it, you know, the ROI on these initiatives is, So it's that nimbleness that you just don't hear of even in So that's like the wave we're gonna do through the ones we've already gone Thank you so much for having us.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
ChristinaPERSON

0.99+

Christina SeacrestPERSON

0.99+

Dave NicholsonPERSON

0.99+

Bob PucciPERSON

0.99+

MassachusettsLOCATION

0.99+

AUMORGANIZATION

0.99+

fiveQUANTITY

0.99+

40 divisionsQUANTITY

0.99+

BobPERSON

0.99+

Bob PCIsPERSON

0.99+

23 executive agenciesQUANTITY

0.99+

TennesseeLOCATION

0.99+

13 agenciesQUANTITY

0.99+

Las VegasLOCATION

0.99+

AdamPERSON

0.99+

Cristina SecrestPERSON

0.99+

80%QUANTITY

0.99+

23 agenciesQUANTITY

0.99+

sixQUANTITY

0.99+

1990sDATE

0.99+

DecemberDATE

0.99+

40QUANTITY

0.99+

four daysQUANTITY

0.99+

four yearsQUANTITY

0.99+

60QUANTITY

0.99+

four hoursQUANTITY

0.99+

98%QUANTITY

0.99+

eight weeksQUANTITY

0.99+

80 automationsQUANTITY

0.99+

less than a yearQUANTITY

0.99+

80QUANTITY

0.99+

NashvilleLOCATION

0.99+

one agencyQUANTITY

0.99+

500 processesQUANTITY

0.99+

oneQUANTITY

0.99+

40 other agenciesQUANTITY

0.99+

bothQUANTITY

0.99+

VenetianLOCATION

0.99+

sevenQUANTITY

0.99+

MemphisLOCATION

0.99+

120QUANTITY

0.98+

10QUANTITY

0.98+

less than oneQUANTITY

0.98+

next summerDATE

0.98+

four botsQUANTITY

0.98+

threeDATE

0.98+

one botQUANTITY

0.98+

single botQUANTITY

0.98+

20 yearQUANTITY

0.98+

fourQUANTITY

0.98+

three and a halfQUANTITY

0.97+

40 automationsQUANTITY

0.97+

over 50 clientsQUANTITY

0.97+

first phaseQUANTITY

0.97+

25 80 ruleOTHER

0.97+

FTIORGANIZATION

0.97+

four years agoDATE

0.96+

first phaseQUANTITY

0.96+

UI Path ForwardTITLE

0.96+

phase zeroOTHER

0.95+

Pete Gerr and Steve Kenniston, Dell Technologies


 

[Music] the cyber security landscape has changed dramatically over the past 24 to 36 months rapid cloud migration has created a new layer of security defense sure but that doesn't mean csos can relax in many respects it further complicates or at least changes the cso's scope of responsibilities in particular the threat surface has expanded and that creates more seams and csos have to make sure their teams pick up where the hyperscaler clouds leave off application developers have become a critical execution point for cyber assurance shift left is the kind of new buzz phrase for devs but organizations still have to shield right meaning the operational teams must continue to partner with secops to make sure infrastructure is resilient so it's no wonder that an etr's latest survey of nearly 1500 cios and it buyers that business technology executives cite security as their number one priority well ahead of other critical technology initiatives including collaboration software cloud computing and analytics rounding out the top four but budgets are under pressure and csos have to prioritize it's not like they have an open checkbook they have to contend with other key initiatives like those just mentioned to secure the funding and what about zero trust can you go out and buy zero trust or is it a framework a mindset in a series of best practices applied to create a security consciousness throughout the organization can you implement zero trust in other words if a machine or human is not explicitly allowed access then access is denied can you implement that policy without constricting organizational agility the question is what's the most practical way to apply that premise and what role does infrastructure play as the enforcer how does automation play in the equation the fact is that today's approach to cyber resilient type resilience can't be an either or it has to be an and conversation meaning you have to ensure data protection while at the same time advancing the mission of the organization with as little friction as possible and don't even talk to me about the edge that's really going to keep you up at night hello and welcome to the special cube presentation a blueprint for trusted infrastructure made possible by dell technologies in this program we explore the critical role that trusted infrastructure plays in cyber security strategies how organizations should think about the infrastructure side of the cyber security equation and how dell specifically approaches securing infrastructure for your business we'll dig into what it means to transform and evolve toward a modern security infrastructure that's both trusted and agile first up are pete gear and steve kenniston they're both senior cyber security consultants at dell technologies and they're going to talk about the company's philosophy and approach to trusted infrastructure and then we're going to speak to paris our godaddy who's a senior consultant for storage at dell technologies to understand where and how storage plays in this trusted infrastructure world and then finally rob emsley who heads product marketing for data protection and cyber security he's going to take a deeper dive with rob into data protection and explain how it has become a critical component of a comprehensive cyber security strategy okay let's get started pete gear steve kenniston welcome to the cube thanks for coming into the marlboro studios today great to be here dave thanks dave good to see you great to see you guys pete start by talking about the security landscape you heard my little rap up front what are you seeing i thought you wrapped it up really well and you touched on all the key points right technology is ubiquitous today it's everywhere it's no longer confined to a monolithic data center it lives at the edge it lives in front of us it lives in our pockets and smartphones along with that is data and as you said organizations are managing sometimes 10 to 20 times the amount of data that they were just five years ago and along with that cyber crime has become a very profitable uh enterprise in fact it's been more than 10 years since uh the nsa chief actually called cybercrime the biggest transfer of wealth in history that was 10 years ago and we've seen nothing but accelerating cybercrime and really sophistication of how those attacks are are perpetrated and so the new security landscape is really more of an evolution we're finally seeing security catch up with all of the technology adoption all the build out the work from home and work from anywhere that we've seen over the last couple of years we're finally seeing organizations and really it goes beyond the i.t directors it's a board level discussion today security's become a board level discussion so yeah i think that's true as well it's like it used to be the security was okay the sec ops team you're responsible for security now you've got the developers are involved the business lines are involved it's part of onboarding for most companies you know steve this concept of zero trust it was kind of a buzzword before the pandemic and i feel like i've often said it's now become a a mandate but it's it's it's still fuzzy to a lot of people how do you guys think about zero trust what does it mean to you how does it fit yeah i thought again i thought your opening was fantastic in this whole lead into to what is zero trust it had been a buzzword for a long time and now ever since the federal government came out with their implementation or or desire to drive zero trust a lot more people are taking a lot more seriously because i don't think they've seen the government do this but ultimately let's see ultimately it's just like you said right if you don't have trust to those particular devices applications or data you can't get at it the question is and and you phrase it perfectly can you implement that as well as allow the business to be as agile as it needs to be in order to be competitive because we're seeing with your whole notion around devops and the ability to kind of build make deploy build make deploy right they still need that functionality but it also needs to be trusted it needs to be secure and things can't get away from you yeah so it's interesting we attended every uh reinforce since 2019 and the narrative there is hey everything in this in the cloud is great you know and this narrative around oh security is a big problem is you know doesn't help the industry the fact is that the big hyperscalers they're not strapped for talent but csos are they don't have the the capabilities to really apply all these best practices they're they're playing whack-a-mole so they look to companies like yours to take their your r d and bake it into security products and solutions so what are the critical aspects of the so-called dell trusted infrastructure that we should be thinking about yeah well dell trusted infrastructure for us is a way for us to describe uh the the work that we do through design development and even delivery of our it system so dell trusted infrastructure includes our storage it includes our servers our networking our data protection our hyper-converged everything that infrastructure always has been it's just that today customers consume that infrastructure at the edge as a service in a multi-cloud environment i mean i view the cloud as really a way for organizations to become more agile and to become more flexible and also to control costs i don't think organizations move to the cloud or move to a multi-cloud environment to enhance security so i don't see cloud computing as a panacea for security i see it as another attack surface and another uh aspect in front that organizations and and security organizations and departments have to manage it's part of their infrastructure today whether it's in their data center in a cloud or at the edge i mean i think it's a huge point because a lot of people think oh the data's in the cloud i'm good it's like steve we've talked about oh why do i have to back up my data it's in the cloud well you might have to recover it someday so i don't know if you have anything to add to that or any additional thoughts on it no i mean i think i think like what pete was saying when it comes to when it comes to all these new vectors for attack surfaces you know people did choose the cloud in order to be more agile more flexible and all that did was open up to the csos who need to pay attention to now okay where can i possibly be attacked i need to be thinking about is that secure and part of the part of that is dell now also understands and thinks about as we're building solutions is it is it a trusted development life cycle so we have our own trusted development life cycle how many times in the past did you used to hear about vendors saying you got to patch your software because of this we think about what changes to our software and what implementations and what enhancements we deliver can actually cause from a security perspective and make sure we don't give up or or have security become a whole just in order to implement a feature we got to think about those things yeah and as pete alluded to our secure supply chain so all the way through knowing what you're going to get when you actually receive it is going to be secure and not be tampered with becomes vitally important and pete and i were talking earlier when you have tens of thousands of devices that need to be delivered whether it be storage or laptops or pcs or or whatever it is you want to be tr you want to know that that that those devices are can be trusted okay guys maybe pete you could talk about the how dell thinks about it's its framework and its philosophy of cyber security and then specifically what dell's advantages are relative to the competition yeah definitely dave thank you so i we've talked a lot about dell as a technology provider but one thing dell also is is a partner in this larger ecosystem we realize that security whether it's a zero trust paradigm or any other kind of security environment is an ecosystem with a lot of different vendors so we look at three areas uh one is protecting data in systems we know that it starts with and ends with data that helps organizations combat threats across their entire infrastructure and what it means is dell's embedding security features consistently across our portfolios of storage servers networking the second is enhancing cyber resiliency over the last decade a lot of the funding and spending has been in protecting or trying to prevent cyber threats not necessarily in responding to and recovering from threats right we call that resiliency organizations need to build resiliency across their organization so not only can they withstand a threat but they can respond recover and continue with their operations and the third is overcoming security complexity security is hard it's more difficult because of the the things we've talked about about distributed data distributed technology and and attack surfaces everywhere and so we're enabling organizations to scale confidently to continue their business but know that all all the i.t decisions that they're making um have these intrinsic security features and are built and delivered in a consistent security so those are kind of the three pillars maybe we could end on what you guys see as the key differentiators uh that people should know about that that dell brings to the table maybe each of you could take take a shot at that yeah i i think first of all from from a holistic portfolio perspective right the secure supply chain and the secure development life cycle permeate through everything dell does when building things so we build things with security in mind all the way from as pete mentioned from from creation to delivery we want to make sure you have that that secure device or or asset that permeates everything from servers networking storage data protection through hyper converge through everything that to me is really a key asset because that means you can you understand when you receive something it's a trusted piece of your infrastructure i think the other core component to think about and pete mentioned as dell being a partner for um making sure you can deliver these things is that even though those are that's part of our framework these pillars are our framework of how we want to deliver security it's also important to understand that we are partners and that you don't need to rip and replace but as you start to put in new components you can be you can be assured that the components that you're replacing as you're evolving as you're growing as you're moving to the cloud as you're moving to more on-prem type services or whatever that your environment is secure i think those are two key things got it okay pete bring us home yeah i think one of one of the big advantages of dell uh is our scope and our scale right we're a large technology vendor that's been around for decades and we develop and sell almost every piece of technology we also know that organizations are might make different decisions and so we have a large services organization with a lot of experienced services people that can help customers along their security journey depending on uh whatever type of infrastructure or solutions that they're looking at the other thing we do is make it very easy to consume our technology whether that's traditional on-premise in a multi-cloud environment uh or as a service and so the best of breed technology can be consumed in any variety of fashion and know that you're getting that consistent secure infrastructure that dell provides well and dell's forgot the probably top supply chain not only in the tech business but probably any business and so you can actually take take your dog food and then and allow other your champagne sorry allow other people to you know share share best practices with your with your customers all right guys thanks so much for coming thank you appreciate it okay keep it right there after this short break we'll be back to drill into the storage domain you're watching a blueprint for trusted infrastructure on the cube the leader in enterprise and emerging tech coverage be right back you

Published Date : Sep 20 2022

SUMMARY :

don't have the the capabilities to

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Steve KennistonPERSON

0.99+

10QUANTITY

0.99+

petePERSON

0.99+

steve kennistonPERSON

0.99+

dell technologiesORGANIZATION

0.99+

steve kennistonPERSON

0.99+

Dell TechnologiesORGANIZATION

0.99+

todayDATE

0.98+

five years agoDATE

0.98+

davePERSON

0.98+

dellORGANIZATION

0.98+

rob emsleyPERSON

0.98+

more than 10 yearsQUANTITY

0.98+

tens of thousands of devicesQUANTITY

0.98+

dell technologiesORGANIZATION

0.97+

thirdQUANTITY

0.97+

bothQUANTITY

0.97+

two keyQUANTITY

0.97+

20 timesQUANTITY

0.97+

2019DATE

0.96+

Pete GerrPERSON

0.96+

nearly 1500 ciosQUANTITY

0.95+

10 years agoDATE

0.95+

three areasQUANTITY

0.95+

pandemicEVENT

0.94+

oneQUANTITY

0.94+

firstQUANTITY

0.93+

eachQUANTITY

0.93+

pete gearPERSON

0.93+

secondQUANTITY

0.93+

zero trustQUANTITY

0.92+

a lot more peopleQUANTITY

0.91+

stevePERSON

0.9+

top fourQUANTITY

0.89+

number oneQUANTITY

0.88+

pete startPERSON

0.85+

lot of peopleQUANTITY

0.85+

zeroQUANTITY

0.84+

36 monthsQUANTITY

0.84+

decadesQUANTITY

0.82+

last decadeDATE

0.81+

last couple of yearsDATE

0.79+

three pillarsQUANTITY

0.76+

zero trustQUANTITY

0.76+

etrORGANIZATION

0.76+

parisLOCATION

0.66+

lotQUANTITY

0.64+

governmentORGANIZATION

0.6+

marlboroORGANIZATION

0.59+

agileTITLE

0.59+

nsaORGANIZATION

0.59+

agileORGANIZATION

0.58+

24QUANTITY

0.51+

pastDATE

0.41+

Parasar Kodati, Dell Technologies


 

okay we're back digging into trusted infrastructure with paris are good at he's a senior consultant for product marketing and storage at dell technologies pastor welcome to the cube good to see you great to be with you dave yeah coming from hyderabad awesome so i really appreciate you uh coming on the program let's start with talking about your point of view on what cyber security resilience means to to dell generally but storage specifically yeah so for something like storage you know we are talking about the data layer name and if you look at cyber security it's all about securing your data applications and infrastructure it has been a very mature field at the network and application layers and there are a lot of great technologies right from you know enabling zero trust uh advanced authentications uh identity management systems and so on and and in fact you know with the advent of you know the the use of artificial intelligence and machine learning really these detection tools for cyber securities have really evolved in the network and application spaces so for storage what it means is how can you bring them to the data layer right how can you bring you know the principles of zero trust to the data layer uh how can you leverage artificial intelligence and machine learning to look at you know access patterns and make intelligent decisions about maybe an indicator of a compromise and identify them ahead of time just like you know how it's happening and other of of applications and when it comes to cyber resilience it's it's basically a strategy which assumes that a threat is imminent and it's a good assumption with the severity and the frequency of the attacks that are happening and the question is how do we fortify the infrastructure in this rich infrastructure to withstand those attacks and have a plan a response plan where we can recover the data and make sure the business continuity is not affected so that's uh really cyber security and cyber resiliency at storage layer and of course there are technologies like you know network isolation um immutability and all these principles need to be applied at the storage level as well let me have a follow up on that if i may the intelligence that you talked about that ai and machine learning is that do you do you build that into the infrastructure or is that sort of a separate software module that that points at various you know infrastructure components how does that work both dave right at the data storage level we have come up with various data characteristics depending on the nature of data we developed a lot of signals to see what could be a good indicator of a compromise um and there are also additional applications like cloud iq is the best example which is like an infrastructure wide health monitoring system for dell infrastructure and now we have elevated that to include cyber security as well so these signals are being gathered at cloud iq level and other applications as well so that we can make those decisions about compromise and we can either cascade that intelligence and alert stream upstream for uh security teams um so that they can take actions in platforms like sign systems xtr systems and so on but when it comes to which layer the intelligence is it has to be at every layer where it makes sense where we have the information to make a decision and being closest to the data we have we are basically monitoring you know the various parallels data access who is accessing um are they crossing across any geo fencing is there any mass deletion that is happening or a mass encryption that is happening and we are able to uh detect uh those uh patterns and flag them as indicators of compromise and in allowing automated response manual control and so on for i.t teams yeah thank you for that explanation so at dell technologies world we were there in may it was one of the first you know live shows that that we did in the spring certainly one of the largest and i interviewed shannon champion and my huge takeaway from the storage side was the degree to which you guys uh emphasized security uh within the operating systems i mean really i mean power max more than half i think of the features were security related but also the rest of the portfolio so can you talk about the the security aspects of the dell storage portfolio specifically yeah yeah so when it comes to data security and broadly data availability right in the context of cyber resiliency um dell storage uh this you know these elements have been at the core of our um a core strength for the portfolio and a source of differentiation for the storage portfolio you know with almost decades of collective experience of building highly resilient architectures for mission critical data something like power max system which is the most secure storage platform for high-end enterprises um and now with the increased focus on cyber security we are extending those core technologies of high availability and adding modern detection systems modern data isolation techniques to offer a comprehensive solution to the customer so that they don't have to piece together multiple things to ensure data security or data resiliency but a well-designed and well-architected solution by design is uh delivered to them to ensure cyber protection at the data layer got it um you know we were talking earlier to steve kenniston and pete gear about this notion of dell trusted infrastructure how does storage fit into that as a component of that sort of overall you know theme yeah and you know and let me say this if you could adjust because a lot of people might be skeptical that i can actually have security and at the same time not constrict my organizational agility that's old you know not an or it's an and how do you actually do that if you could address both of those that would be great definitely so for dell trusted infrastructure cyber resiliency is a key component of that and just as i mentioned you know uh air gap isolation it really started with you know power protect cyber recovery you know that was the solution more than three years ago we launched and that was first in the industry which paved way to you know kind of data isolation being a core element of data management and you know for data infrastructure and since then we have implemented these technologies within different storage platforms as well so the customers have the flexibility depending on their data landscape they can approach they can do the right data isolation architecture right either natively from the storage platform or consolidate things into the backup platform and isolate from there and and the other key thing we focus in trusted infrastructure delta dell trusted infrastructure is you know the goal of simplifying security for the customers so one good example here is uh you know risk being able to respond to these cyber threats or indicators of compromise is one thing but an i.t security team may not be looking at the dashboard of the storage systems constantly right storage administration admins may be looking at it so how can we build this intelligence and provide this upstream platforms so that they have a single pane of glass to understand security landscape across applications across networks firewalls as well as storage infrastructure and and compute infrastructure so that's one of the key ways where how we are helping simplify the um kind of the ability to uh respond ability to detect and respond these threads uh in real time for security teams and you mentioned you know about zero trust and how it's a balance of you know not uh kind of restricting users or put heavy burden on you know multi-factor authentication and so on and this really starts with you know what we are doing is provide all the tools you know when it comes to advanced authentication uh supporting external identity management systems multi-factor authentication encryption all these things are intrinsically built into these platforms now the question is the customers are actually one of the key steps is to identify uh what are the most critical parts of their business or what are the applications uh that the most critical business operations depend on and similarly identify uh mission critical data where part of your response plan where it cannot be compromised where you need to have a way to recover once you do this identification then the level of security can be really determined uh by uh by the security teams by the infrastructure teams and you know another you know intelligence that gives a lot of flexibility for for even developers to do this is today we have apis um that so you can not only track these alerts at the data infrastructure level but you can use our apis to take concrete actions like blocking a certain user or increasing the level of authentication based on the threat level that has been perceived at the application layer or at the network layer so there is a lot of flexibility that is built into this by design so that depending on the criticality of the data criticality of the application number of users affected these decisions have to be made from time to time and it's as you mentioned it's it's a balance right and sometimes you know if if an organization had a recent attack you know the level of awareness is very high uh against cyber attacks so for a time you know these these settings may be a bit difficult to deal with but then it's a decision that has to be made by security teams as well got it so you're surfacing what may be hidden kpis that are being buried inside for instance the storage system through apis upstream into a dashboard so that somebody you know dig into the storage tunnel extract that data and then somehow you know populate that dashboard you're saying you're automating that that that workflow that's a great example and you may have others but is that the correct understanding absolutely and it's a two-way integration let's say a detector an attack has been detected at a completely different layer right in the application layer or at a firewall we can respond to those as well so it's a two-way integration we can cascade things up as well as uh respond to threats that have been detected elsewhere uh through the api that's great all right api for power skill is the best example for that uh excellent so thank you appreciate that give us the last word put a bow on this and and bring this segment home please absolutely so a dell uh storage portfolio um using advanced data isolation um with air gap having machine learning based algorithms to detect uh indicators of compromise and having ripple mechanisms um with granular snapshots being able to recover data and restore applications to maintain business continuity is what we deliver to customers uh and these are areas where a lot of innovation is happening a lot of product focus as well as you know if you look at the professional services all the way from engineering to professional services the way we build these systems the very we configure and architect these systems cyber security and protection is a key focus uh for all these activities and dell.com securities is where you can learn a lot about these initiatives that's great thank you you know at the recent uh reinforce uh event in in boston we heard a lot uh from aws about you know detent and response and devops and machine learning and some really cool stuff we heard a little bit about ransomware but i'm glad you brought up air gaps because we heard virtually nothing in the keynotes about air gaps that's an example of where you know this the cso has to pick up from where the cloud leaves off but as i was in front and so number one and number two we didn't hear a ton about how the cloud is making the life of the cso simpler and that's really my takeaway is is in part anyway your job and companies like dell so paris i really appreciate the insights thank you for coming on thecube thank you very much dave it's always great to be in these uh conversations all right keep it right there we'll be right back with rob emsley to talk about data protection strategies and what's in the dell portfolio you're watching the cube [Music] you

Published Date : Sep 20 2022

SUMMARY :

is provide all the tools you know when

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
rob emsleyPERSON

0.99+

hyderabadLOCATION

0.99+

bostonLOCATION

0.99+

Dell TechnologiesORGANIZATION

0.99+

two-wayQUANTITY

0.99+

bothQUANTITY

0.97+

steve kennistonPERSON

0.96+

firstQUANTITY

0.95+

parisORGANIZATION

0.95+

dell.comORGANIZATION

0.94+

oneQUANTITY

0.94+

more than three years agoDATE

0.93+

todayDATE

0.93+

cloud iqTITLE

0.92+

more than halfQUANTITY

0.92+

dell technologiesORGANIZATION

0.91+

davePERSON

0.87+

a lot of peopleQUANTITY

0.84+

one of the key waysQUANTITY

0.83+

single pane of glassQUANTITY

0.79+

zeroQUANTITY

0.77+

pete gearPERSON

0.73+

one thingQUANTITY

0.73+

Parasar KodatiPERSON

0.73+

deltaORGANIZATION

0.71+

dell so parisORGANIZATION

0.68+

zero trustQUANTITY

0.67+

mayDATE

0.66+

uhEVENT

0.62+

shannon championTITLE

0.61+

decadesQUANTITY

0.59+

cloudTITLE

0.59+

almostQUANTITY

0.57+

twoQUANTITY

0.53+

layerQUANTITY

0.5+

stepsQUANTITY

0.49+

dellORGANIZATION

0.43+

springDATE

0.37+

Dell A Blueprint for Trusted Infrastructure


 

the cyber security landscape has changed dramatically over the past 24 to 36 months rapid cloud migration has created a new layer of security defense sure but that doesn't mean csos can relax in many respects it further complicates or at least changes the ciso's scope of responsibilities in particular the threat surface has expanded and that creates more seams and cisos have to make sure their teams pick up where the hyperscaler clouds leave off application developers have become a critical execution point for cyber assurance shift left is the kind of new buzz phrase for devs but organizations still have to shield right meaning the operational teams must continue to partner with secops to make sure infrastructure is resilient so it's no wonder that in etr's latest survey of nearly 1500 cios and it buyers that business technology executives cite security as their number one priority well ahead of other critical technology initiatives including collaboration software cloud computing and analytics rounding out the top four but budgets are under pressure and csos have to prioritize it's not like they have an open checkbook they have to contend with other key initiatives like those just mentioned to secure the funding and what about zero trust can you go out and buy xero trust or is it a framework a mindset in a series of best practices applied to create a security consciousness throughout the organization can you implement zero trust in other words if a machine or human is not explicitly allowed access then access is denied can you implement that policy without constricting organizational agility the question is what's the most practical way to apply that premise and what role does infrastructure play as the enforcer how does automation play in the equation the fact is that today's approach to cyber resilient type resilience can't be an either or it has to be an and conversation meaning you have to ensure data protection while at the same time advancing the mission of the organization with as little friction as possible and don't even talk to me about the edge that's really going to keep you up at night hello and welcome to the special cube presentation a blueprint for trusted infrastructure made possible by dell technologies in this program we explore the critical role that trusted infrastructure plays in cyber security strategies how organizations should think about the infrastructure side of the cyber security equation and how dell specifically approaches securing infrastructure for your business we'll dig into what it means to transform and evolve toward a modern security infrastructure that's both trusted and agile first up are pete gear and steve kenniston they're both senior cyber security consultants at dell technologies and they're going to talk about the company's philosophy and approach to trusted infrastructure and then we're going to speak to paris arcadi who's a senior consultant for storage at dell technologies to understand where and how storage plays in this trusted infrastructure world and then finally rob emsley who heads product marketing for data protection and cyber security he's going to take a deeper dive with rob into data protection and explain how it has become a critical component of a comprehensive cyber security strategy okay let's get started pete gear steve kenniston welcome to the cube thanks for coming into the marlboro studios today great to be here dave thanks dave good to see you great to see you guys pete start by talking about the security landscape you heard my little rap up front what are you seeing i thought you wrapped it up really well and you touched on all the key points right technology is ubiquitous today it's everywhere it's no longer confined to a monolithic data center it lives at the edge it lives in front of us it lives in our pockets and smartphones along with that is data and as you said organizations are managing sometimes 10 to 20 times the amount of data that they were just five years ago and along with that cyber crime has become a very profitable enterprise in fact it's been more than 10 years since uh the nsa chief actually called cyber crime the biggest transfer of wealth in history that was 10 years ago and we've seen nothing but accelerating cyber crime and really sophistication of how those attacks are perpetrated and so the new security landscape is really more of an evolution we're finally seeing security catch up with all of the technology adoption all the build out the work from home and work from anywhere that we've seen over the last couple of years we're finally seeing organizations and really it goes beyond the i t directors it's a board level discussion today security's become a board level discussion yeah i think that's true as well it's like it used to be the security was okay the secops team you're responsible for security now you've got the developers are involved the business lines are involved it's part of onboarding for most companies you know steve this concept of zero trust it was kind of a buzzword before the pandemic and i feel like i've often said it's now become a mandate but it's it's it's still fuzzy to a lot of people how do you guys think about zero trust what does it mean to you how does it fit yeah i thought again i thought your opening was fantastic in in this whole lead into to what is zero trust it had been a buzzword for a long time and now ever since the federal government came out with their implementation or or desire to drive zero trust a lot more people are taking a lot more seriously because i don't think they've seen the government do this but ultimately let's see ultimately it's just like you said right if if you don't have trust to those particular devices uh applications or data you can't get at it the question is and and you phrase it perfectly can you implement that as well as allow the business to be as agile as it needs to be in order to be competitive because we're seeing with your whole notion around devops and the ability to kind of build make deploy build make deploy right they still need that functionality but it also needs to be trusted it needs to be secure and things can't get away from you yeah so it's interesting we attended every uh reinforce since 2019 and the narrative there is hey everything in this in the cloud is great you know and this narrative around oh security is a big problem is you know doesn't help the industry the fact is that the big hyperscalers they're not strapped for talent but csos are they don't have the the capabilities to really apply all these best practices they're they're playing whack-a-mole so they look to companies like yours to take their r your r d and bake it into security products and solutions so what are the critical aspects of the so-called dell trusted infrastructure that we should be thinking about yeah well dell trusted infrastructure for us is a way for us to describe uh the the work that we do through design development and even delivery of our it system so dell trusted infrastructure includes our storage it includes our servers our networking our data protection our hyper converged everything that infrastructure always has been it's just that today customers consume that infrastructure at the edge as a service in a multi-cloud environment i mean i view the cloud as really a way for organizations to become more agile and to become more flexible and also to control costs i don't think organizations move to the cloud or move to a multi-cloud environment to enhance security so i don't see cloud computing as a panacea for security i see it as another attack surface and another uh aspect in front that organizations and and security organizations and departments have to manage it's part of their infrastructure today whether it's in their data center in a cloud or at the edge i mean i think it's a huge point because a lot of people think oh data's in the cloud i'm good it's like steve we've talked about oh why do i have to back up my data it's in the cloud well you might have to recover it someday so i don't know if you have anything to add to that or any additional thoughts on it no i mean i think i think like what pete was saying when it comes to when it comes to all these new vectors for attack surfaces you know people did choose the cloud in order to be more agile more flexible and all that did was open up to the csos who need to pay attention to now okay where can i possibly be attacked i need to be thinking about is that secure and part of the part of that is dell now also understands and thinks about as we're building solutions is it is it a trusted development life cycle so we have our own trusted development life cycle how many times in the past did you used to hear about vendors saying you got to patch your software because of this we think about what changes to our software and what implementations and what enhancements we deliver can actually cause from a security perspective and make sure we don't give up or or have security become a whole just in order to implement a feature we got to think about those things yeah and as pete alluded to our secure supply chain so all the way through knowing what you're going to get when you actually receive it is going to be secure and not be tampered with becomes vitally important and pete and i were talking earlier when you have tens of thousands of devices that need to be delivered whether it be storage or laptops or pcs or or whatever it is you want to be you want to know that that that those devices are can be trusted okay guys maybe pete you could talk about the how dell thinks about it's its framework and its philosophy of cyber security and then specifically what dell's advantages are relative to the competition yeah definitely dave thank you so we've talked a lot about dell as a technology provider but one thing dell also is is a partner in this larger ecosystem we realize that security whether it's a zero trust paradigm or any other kind of security environment is an ecosystem uh with a lot of different vendors so we look at three areas one is protecting data in systems we know that it starts with and ends with data that helps organizations combat threats across their entire infrastructure and what it means is dell's embedding security features consistently across our portfolios of storage servers networking the second is enhancing cyber resiliency over the last decade a lot of the funding and spending has been in protecting or trying to prevent cyber threats not necessarily in responding to and recovering from threats right we call that resiliency organizations need to build resiliency across their organization so not only can they withstand a threat but they can respond recover and continue with their operations and the third is overcoming security complexity security is hard it's more difficult because of the things we've talked about about distributed data distributed technology and and attack surfaces everywhere and so we're enabling organizations to scale confidently to continue their business but know that all all the i.t decisions that they're making um have these intrinsic security features and are built and delivered in a consistent security so those are kind of the three pillars maybe we could end on what you guys see as the key differentiators that people should know about that that dell brings to the table maybe each of you could take take a shot at that yeah i think first of all from from a holistic portfolio perspective right the uh secure supply chain and the secure development life cycle permeate through everything dell does when building things so we build things with security in mind all the way from as pete mentioned from from creation to delivery we want to make sure you have that that secure device or or asset that permeates everything from servers networking storage data protection through hyper converge through everything that to me is really a key asset because that means you can you understand when you receive something it's a trusted piece of your infrastructure i think the other core component to think about and pete mentioned as dell being a partner for making sure you can deliver these things is that even though those are that's part of our framework these pillars are our framework of how we want to deliver security it's also important to understand that we are partners and that you don't need to rip and replace but as you start to put in new components you can be you can be assured that the components that you're replacing as you're evolving as you're growing as you're moving to the cloud as you're moving to a more on-prem type services or whatever that your environment is secure i think those are two key things got it okay pete bring us home yeah i think one of one of the big advantages of dell is our scope and our scale right we're a large technology vendor that's been around for decades and we develop and sell almost every piece of technology we also know that organizations are might make different decisions and so we have a large services organization with a lot of experienced services people that can help customers along their security journey depending on whatever type of infrastructure or solutions that they're looking at the other thing we do is make it very easy to consume our technology whether that's traditional on-premise in a multi-cloud environment uh or as a service and so the best of breed technology can be consumed in any variety of fashion and know that you're getting that consistent secure infrastructure that dell provides well and dell's forgot the probably top supply chain not only in the tech business but probably any business and so you can actually take take your dog food and then and allow other billionaire champagne sorry allow other people to you know share share best practices with your with your customers all right guys thanks so much for coming thank you appreciate it okay keep it right there after this short break we'll be back to drill into the storage domain you're watching a blueprint for trusted infrastructure on the cube the leader in enterprise and emerging tech coverage be right back concern over cyber attacks is now the norm for organizations of all sizes the impact of these attacks can be operationally crippling expensive and have long-term ramifications organizations have accepted the reality of not if but when from boardrooms to i.t departments and are now moving to increase their cyber security preparedness they know that security transformation is foundational to digital transformation and while no one can do it alone dell technologies can help you fortify with modern security modern security is built on three pillars protect your data and systems by modernizing your security approach with intrinsic features and hardware and processes from a provider with a holistic presence across the entire it ecosystem enhance your cyber resiliency by understanding your current level of resiliency for defending your data and preparing for business continuity and availability in the face of attacks overcome security complexity by simplifying and automating your security operations to enable scale insights and extend resources through service partnerships from advanced capabilities that intelligently scale a holistic presence throughout it and decades as a leading global technology provider we'll stop at nothing to help keep you secure okay we're back digging into trusted infrastructure with paris sarcadi he's a senior consultant for product marketing and storage at dell technologies parasaur welcome to the cube good to see you great to be with you dave yeah coming from hyderabad awesome so i really appreciate you uh coming on the program let's start with talking about your point of view on what cyber security resilience means to to dell generally but storage specifically yeah so for something like storage you know we are talking about the data layer name and if you look at cyber security it's all about securing your data applications and infrastructure it has been a very mature field at the network and application layers and there are a lot of great technologies right from you know enabling zero trust advanced authentications uh identity management systems and so on and and in fact you know with the advent of you know the the use of artificial intelligence and machine learning really these detection tools for cyber securities have really evolved in the network and the application spaces so for storage what it means is how can you bring them to the data layer right how can you bring you know the principles of zero trust to the data layer uh how can you leverage artificial intelligence and machine learning to look at you know access patterns and make intelligent decisions about maybe an indicator of a compromise and identify them ahead of time just like you know how it's happening and other ways of applications and when it comes to cyber resilience it's it's basically a strategy which assumes that a threat is imminent and it's a good assumption with the severity of the frequency of the attacks that are happening and the question is how do we fortify the infrastructure in the switch infrastructure to withstand those attacks and have a plan a response plan where we can recover the data and make sure the business continuity is not affected so that's uh really cyber security and cyber resiliency and storage layer and of course there are technologies like you know network isolation immutability and all these principles need to be applied at the storage level as well let me have a follow up on that if i may the intelligence that you talked about that ai and machine learning is that do you do you build that into the infrastructure or is that sort of a separate software module that that points at various you know infrastructure components how does that work both dave right at the data storage level um we have come with various data characteristics depending on the nature of data we developed a lot of signals to see what could be a good indicator of a compromise um and there are also additional applications like cloud iq is the best example which is like an infrastructure wide health monitoring system for dell infrastructure and now we have elevated that to include cyber security as well so these signals are being gathered at cloud iq level and other applications as well so that we can make those decisions about compromise and we can either cascade that intelligence and alert stream upstream for uh security teams um so that they can take actions in platforms like sign systems xtr systems and so on but when it comes to which layer the intelligence is it has to be at every layer where it makes sense where we have the information to make a decision and being closest to the data we have we are basically monitoring you know the various parallels data access who is accessing um are they crossing across any geo fencing uh is there any mass deletion that is happening or a mass encryption that is happening and we are able to uh detect uh those uh patterns and flag them as indicators of compromise and in allowing automated response manual control and so on for it teams yeah thank you for that explanation so at dell technologies world we were there in may it was one of the first you know live shows that that we did in the spring certainly one of the largest and i interviewed shannon champion and a huge takeaway from the storage side was the degree to which you guys emphasized security uh within the operating systems i mean really i mean powermax more than half i think of the features were security related but also the rest of the portfolio so can you talk about the the security aspects of the dell storage portfolio specifically yeah yeah so when it comes to data security and broadly data availability right in the context of cyber resiliency dell storage this you know these elements have been at the core of our um a core strength for the portfolio and the source of differentiation for the storage portfolio you know with almost decades of collective experience of building highly resilient architectures for mission critical data something like power max system which is the most secure storage platform for high-end enterprises and now with the increased focus on cyber security we are extending those core technologies of high availability and adding modern detection systems modern data isolation techniques to offer a comprehensive solution to the customer so that they don't have to piece together multiple things to ensure data security or data resiliency but a well-designed and well-architected solution by design is delivered to them to ensure cyber protection at the data layer got it um you know we were talking earlier to steve kenniston and pete gear about this notion of dell trusted infrastructure how does storage fit into that as a component of that sort of overall you know theme yeah and you know and let me say this if you could adjust because a lot of people might be skeptical that i can actually have security and at the same time not constrict my organizational agility that's old you know not an ore it's an end how do you actually do that if you could address both of those that would be great definitely so for dell trusted infrastructure cyber resiliency is a key component of that and just as i mentioned you know uh air gap isolation it really started with you know power protect cyber recovery you know that was the solution more than three years ago we launched and that was first in the industry which paved way to you know kind of data isolation being a core element of data management and uh for data infrastructure and since then we have implemented these technologies within different storage platforms as well so that customers have the flexibility depending on their data landscape they can approach they can do the right data isolation architecture right either natively from the storage platform or consolidate things into the backup platform and isolate from there and and the other key thing we focus in trusted infrastructure dell infra dell trusted infrastructure is you know the goal of simplifying security for the customers so one good example here is uh you know being able to respond to these cyber threats or indicators of compromise is one thing but an i.t security team may not be looking at the dashboard of the storage systems constantly right storage administration admins may be looking at it so how can we build this intelligence and provide this upstream platforms so that they have a single pane of glass to understand security landscape across applications across networks firewalls as well as storage infrastructure and in compute infrastructure so that's one of the key ways where how we are helping simplify the um kind of the ability to uh respond ability to detect and respond these threads uh in real time for security teams and you mentioned you know about zero trust and how it's a balance of you know not uh kind of restricting users or put heavy burden on you know multi-factor authentication and so on and this really starts with you know what we're doing is provide all the tools you know when it comes to advanced authentication uh supporting external identity management systems multi-factor authentication encryption all these things are intrinsically built into these platforms now the question is the customers are actually one of the key steps is to identify uh what are the most critical parts of their business or what are the applications uh that the most critical business operations depend on and similarly identify uh mission critical data where part of your response plan where it cannot be compromised where you need to have a way to recover once you do this identification then the level of security can be really determined uh by uh by the security teams by the infrastructure teams and you know another you know intelligence that gives a lot of flexibility uh for for even developers to do this is today we have apis um that so you can not only track these alerts at the data infrastructure level but you can use our apis to take concrete actions like blocking a certain user or increasing the level of authentication based on the threat level that has been perceived at the application layer or at the network layer so there is a lot of flexibility that is built into this by design so that depending on the criticality of the data criticality of the application number of users affected these decisions have to be made from time to time and it's as you mentioned it's it's a balance right and sometimes you know if if an organization had a recent attack you know the level of awareness is very high against cyber attacks so for a time you know these these settings may be a bit difficult to deal with but then it's a decision that has to be made by security teams as well got it so you're surfacing what may be hidden kpis that are being buried inside for instance the storage system through apis upstream into a dashboard so that somebody could you know dig into the storage tunnel extract that data and then somehow you know populate that dashboard you're saying you're automating that that that workflow that's a great example and you may have others but is that the correct understanding absolutely and it's a two-way integration let's say a detector an attack has been detected at a completely different layer right in the application layer or at a firewall we can respond to those as well so it's a two-way integration we can cascade things up as well as respond to threats that have been detected elsewhere um uh through the api that's great all right hey api for power skill is the best example for that uh excellent so thank you appreciate that give us the last word put a bow on this and and bring this segment home please absolutely so a dell storage portfolio um using advanced data isolation um with air gap having machine learning based algorithms to detect uh indicators of compromise and having rigor mechanisms with granular snapshots being able to recover data and restore applications to maintain business continuity is what we deliver to customers uh and these are areas where a lot of innovation is happening a lot of product focus as well as you know if you look at the professional services all the way from engineering to professional services the way we build these systems the way we we configure and architect these systems um cyber security and protection is a key focus uh for all these activities and dell.com securities is where you can learn a lot about these initiatives that's great thank you you know at the recent uh reinforce uh event in in boston we heard a lot uh from aws about you know detent and response and devops and machine learning and some really cool stuff we heard a little bit about ransomware but i'm glad you brought up air gaps because we heard virtually nothing in the keynotes about air gaps that's an example of where you know this the cso has to pick up from where the cloud leaves off but that was in front and so number one and number two we didn't hear a ton about how the cloud is making the life of the cso simpler and that's really my takeaway is is in part anyway your job and companies like dell so paris i really appreciate the insights thank you for coming on thecube thank you very much dave it's always great to be in these uh conversations all right keep it right there we'll be right back with rob emsley to talk about data protection strategies and what's in the dell portfolio you're watching thecube data is the currency of the global economy it has value to your organization and cyber criminals in the age of ransomware attacks companies need secure and resilient it infrastructure to safeguard their data from aggressive cyber attacks [Music] as part of the dell technologies infrastructure portfolio powerstor and powermax combine storage innovation with advanced security that adheres to stringent government regulations and corporate compliance requirements security starts with multi-factor authentication enabling only authorized admins to access your system using assigned roles tamper-proof audit logs track system usage and changes so it admins can identify suspicious activity and act with snapshot policies you can quickly automate the protection and recovery process for your data powermax secure snapshots cannot be deleted by any user prior to the retention time expiration dell technologies also make sure your data at rest stays safe with power store and powermax data encryption protects your flash drive media from unauthorized access if it's removed from the data center while adhering to stringent fips 140-2 security requirements cloud iq brings together predictive analytics anomaly detection and machine learning with proactive policy-based security assessments monitoring and alerting the result intelligent insights that help you maintain the security health status of your storage environment and if a security breach does occur power protect cyber recovery isolates critical data identifies suspicious activity and accelerates data recovery using the automated data copy feature unchangeable data is duplicated in a secure digital vault then an operational air gap isolates the vault from the production and backup environments [Music] architected with security in mind dell emc power store and powermax provides storage innovation so your data is always available and always secure wherever and whenever you need it [Music] welcome back to a blueprint for trusted infrastructure we're here with rob emsley who's the director of product marketing for data protection and cyber security rob good to see a new role yeah good to be back dave good to see you yeah it's been a while since we chatted last and you know one of the changes in in my world is that i've expanded my responsibilities beyond data protection marketing to also focus on uh cyber security marketing specifically for our infrastructure solutions group so certainly that's you know something that really has driven us to you know to come and have this conversation with you today so data protection obviously has become an increasingly important component of the cyber security space i i don't think necessarily of you know traditional backup and recovery as security it's to me it's an adjacency i know some companies have said oh yeah now we're a security company they're kind of chasing the valuation for sure bubble um dell's interesting because you you have you know data protection in the form of backup and recovery and data management but you also have security you know direct security capability so you're sort of bringing those two worlds together and it sounds like your responsibility is to to connect those those dots is that right absolutely yeah i mean i think that uh the reality is is that security is a a multi-layer discipline um i think the the days of thinking that it's one uh or another um technology that you can use or process that you can use to make your organization secure uh are long gone i mean certainly um you actually correct if you think about the backup and recovery space i mean people have been doing that for years you know certainly backup and recovery is all about the recovery it's all about getting yourself back up and running when bad things happen and one of the realities unfortunately today is that one of the worst things that can happen is cyber attacks you know ransomware malware are all things that are top of mind for all organizations today and that's why you see a lot of technology and a lot of innovation going into the backup and recovery space because if you have a copy a good copy of your data then that is really the the first place you go to recover from a cyber attack and that's why it's so important the reality is is that unfortunately the cyber criminals keep on getting smarter i don't know how it happens but one of the things that is happening is that the days of them just going after your production data are no longer the only challenge that you have they go after your your backup data as well so over the last half a decade dell technologies with its backup and recovery portfolio has introduced the concept of isolated cyber recovery vaults and that is really the you know we've had many conversations about that over the years um and that's really a big tenant of what we do in the data protection portfolio so this idea of of cyber security resilience that definition is evolving what does it mean to you yeah i think the the analyst team over at gartner they wrote a very insightful paper called you will be hacked embrace the breach and the whole basis of this analysis is so much money has been spent on prevention is that what's out of balance is the amount of budget that companies have spent on cyber resilience and cyber resilience is based upon the premise that you will be hacked you have to embrace that fact and be ready and prepared to bring yourself back into business you know and that's really where cyber resiliency is very very different than cyber security and prevention you know and i think that balance of get your security disciplines well-funded get your defenses as good as you can get them but make sure that if the inevitable happens and you find yourself compromised that you have a great recovery plan and certainly a great recovery plan is really the basis of any good solid data protection backup and recovery uh philosophy so if i had to do a swot analysis we don't have to do the wot but let's focus on the s um what would you say are dell's strengths in this you know cyber security space as it relates to data protection um one is we've been doing it a long time you know we talk a lot about dell's data protection being proven and modern you know certainly the experience that we've had over literally three decades of providing enterprise scale data protection solutions to our customers has really allowed us to have a lot of insight into what works and what doesn't as i mentioned to you one of the unique differentiators of our solution is the cyber recovery vaulting solution that we introduced a little over five years ago five six years parapatek cyber recovery is something which has become a unique capability for customers to adopt uh on top of their investment in dell technologies data protection you know the the unique elements of our solution already threefold and it's we call them the three eyes it's isolation it's immutability and it's intelligence and the the isolation part is really so important because you need to reduce the attack surface of your good known copies of data you know you need to put it in a location that the bad actors can't get to it and that really is the the the the essence of a cyber recovery vault interestingly enough you're starting to see the market throw out that word um you know from many other places but really it comes down to having a real discipline that you don't allow the security of your cyber recovery vault to be compromised insofar as allowing it to be controlled from outside of the vault you know allowing it to be controlled by your backup application our cyber recovery vaulting technology is independent of the backup infrastructure it uses it but it controls its own security and that is so so important it's like having a vault that the only way to open it is from the inside you know and think about that if you think about you know volts in banks or volts in your home normally you have a keypad on the outside think of our cyber recovery vault as having its security controlled from inside of the vault so nobody can get in nothing can get in unless it's already in and if it's already in then it's trusted exactly yeah exactly yeah so isolation is the key and then you mentioned immutability is the second piece yeah so immutability is is also something which has been around for a long time people talk about uh backup immunoability or immutable backup copies so immutability is just the the the additional um technology that allows the data that's inside of the vault to be unchangeable you know but again that immutability you know your mileage varies you know when you look across the uh the different offers that are out there in the market especially in the backup industry you make a very valid point earlier that the backup vendors in the market seems to be security washing their marketing messages i mean everybody is leaning into the ever-present danger of cyber security not a bad thing but the reality is is that you have to have the technology to back it up you know quite literally yeah no pun intended and then actually pun intended now what about the intelligence piece of it uh that's that's ai ml where does that fit for sure so the intelligence piece is delivered by um a solution called cybersense and cybersense for us is what really gives you the confidence that what you have in your cyber recovery vault is a good clean copy of data so it's looking at the backup copies that get driven into the cyber vault and it's looking for anomalies so it's not looking for signatures of malware you know that's what your antivirus software does that's what your endpoint protection software does that's on the prevention side of the equation but what we're looking for is we're looking to ensure that the data that you need when all hell breaks loose is good and that when you get a request to restore and recover your business you go right let's go and do it and you don't have any concern that what you have in the vault has been compromised so cyber sense is really a unique analytic solution in the market based upon the fact that it isn't looking at cursory indicators of of um of of of malware infection or or ransomware introduction it's doing full content analytics you know looking at you know has the data um in any way changed has it suddenly become encrypted has it suddenly become different to how it was in the previous scan so that anomaly detection is very very different it's looking for um you know like different characteristics that really are an indicator that something is going on and of course if it sees it you immediately get flagged but the good news is is that you always have in the vault the previous copy of good known data which now becomes your restore point so we're talking to rob emsley about how data protection fits into what dell calls dti dell trusted infrastructure and and i want to come back rob to this notion of and not or because i think a lot of people are skeptical like how can i have great security and not introduce friction into my organization is that an automation play how does dell tackle that problem i mean i think a lot of it is across our infrastructure is is security has to be built in i mean intrinsic security within our servers within our storage devices uh within our elements of our backup infrastructure i mean security multi-factor authentication you know elements that make the overall infrastructure secure you know we have capabilities that you know allow us to identify whether or not configurations have changed you know we'll probably be talking about that a little bit more to you later in the segment but the the essence is is um security is not a bolt-on it has to be part of the overall infrastructure and that's so true um certainly in the data protection space give us the the bottom line on on how you see dell's key differentiators maybe you could talk about dell of course always talks about its portfolio but but why should customers you know lead in to dell in in this whole cyber resilience space um you know staying on the data protection space as i mentioned the the the work we've been doing um to introduce this cyber resiliency solution for data protection is in our opinion as good as it gets you know the you know you've spoken to a number of our of our best customers whether it be bob bender from founders federal or more recently at delton allergies world you spoke to tony bryson from the town of gilbert and these are customers that we've had for many years that have implemented cyber recovery vaults and at the end of the day they can now sleep at night you know that's really the the peace of mind that they have is that the insurance that a data protection from dell cyber recovery vault a parapatex cyber recovery solution gives them you know really allows them to you know just have the assurance that they don't have to pay a ransom if they have a an insider threat issue and you know all the way down to data deletion is they know that what's in the cyber recovery vault is good and ready for them to recover from great well rob congratulations on the new scope of responsibility i like how you know your organization is expanding as the threat surface is expanding as we said data protection becoming an adjacency to security not security in and of itself a key component of a comprehensive security strategy rob emsley thank you for coming back in the cube good to see you again you too dave thanks all right in a moment i'll be back to wrap up a blueprint for trusted infrastructure you're watching the cube every day it seems there's a new headline about the devastating financial impacts or trust that's lost due to ransomware or other sophisticated cyber attacks but with our help dell technologies customers are taking action by becoming more cyber resilient and deterring attacks so they can greet students daily with a smile they're ensuring that a range of essential government services remain available 24 7 to citizens wherever they're needed from swiftly dispatching public safety personnel or sending an inspector to sign off on a homeowner's dream to protecting restoring and sustaining our precious natural resources for future generations with ever-changing cyber attacks targeting organizations in every industry our cyber resiliency solutions are right on the money providing the security and controls you need we help customers protect and isolate critical data from ransomware and other cyber threats delivering the highest data integrity to keep your doors open and ensuring that hospitals and healthcare providers have access to the data they need so patients get life-saving treatment without fail if a cyber incident does occur our intelligence analytics and responsive team are in a class by themselves helping you reliably recover your data and applications so you can quickly get your organization back up and running with dell technologies behind you you can stay ahead of cybercrime safeguarding your business and your customers vital information learn more about how dell technology's cyber resiliency solutions can provide true peace of mind for you the adversary is highly capable motivated and well equipped and is not standing still your job is to partner with technology vendors and increase the cost of the bad guys getting to your data so that their roi is reduced and they go elsewhere the growing issues around cyber security will continue to drive forward thinking in cyber resilience we heard today that it is actually possible to achieve infrastructure security while at the same time minimizing friction to enable organizations to move quickly in their digital transformations a xero trust framework must include vendor r d and innovation that builds security designs it into infrastructure products and services from the start not as a bolt-on but as a fundamental ingredient of the cloud hybrid cloud private cloud to edge operational model the bottom line is if you can't trust your infrastructure your security posture is weakened remember this program is available on demand in its entirety at thecube.net and the individual interviews are also available and you can go to dell security solutions landing page for for more information go to dell.com security solutions that's dell.com security solutions this is dave vellante thecube thanks for watching a blueprint for trusted infrastructure made possible by dell we'll see you next time

Published Date : Sep 20 2022

SUMMARY :

the degree to which you guys

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
tony brysonPERSON

0.99+

10QUANTITY

0.99+

bostonLOCATION

0.99+

hyderabadLOCATION

0.99+

steve kennistonPERSON

0.99+

second pieceQUANTITY

0.99+

rob emsleyPERSON

0.99+

two-wayQUANTITY

0.99+

rob emsleyPERSON

0.99+

dell technologiesORGANIZATION

0.99+

petePERSON

0.99+

todayDATE

0.99+

thecube.netOTHER

0.99+

dell.comORGANIZATION

0.99+

gartnerORGANIZATION

0.98+

three eyesQUANTITY

0.98+

davePERSON

0.98+

more than 10 yearsQUANTITY

0.98+

dellORGANIZATION

0.98+

three areasQUANTITY

0.98+

five years agoDATE

0.98+

two keyQUANTITY

0.98+

10 years agoDATE

0.98+

dell technologiesORGANIZATION

0.98+

bothQUANTITY

0.97+

steve kennistonPERSON

0.97+

20 timesQUANTITY

0.97+

firstQUANTITY

0.97+

thirdQUANTITY

0.97+

cybersenseORGANIZATION

0.97+

nearly 1500 ciosQUANTITY

0.96+

a lot more peopleQUANTITY

0.95+

one thingQUANTITY

0.95+

secondQUANTITY

0.95+

stevePERSON

0.94+

cloud iqTITLE

0.94+

tens of thousands of devicesQUANTITY

0.94+

pete gearPERSON

0.94+

more than three years agoDATE

0.93+

oneQUANTITY

0.93+

powermaxORGANIZATION

0.93+

two worldsQUANTITY

0.93+

2019DATE

0.92+

gilbertLOCATION

0.92+

one of the key waysQUANTITY

0.91+

DellORGANIZATION

0.91+

pandemicEVENT

0.91+

more than halfQUANTITY

0.9+

eachQUANTITY

0.9+

first placeQUANTITY

0.89+

benderPERSON

0.89+

a lot of peopleQUANTITY

0.89+

zero trustQUANTITY

0.89+

last decadeDATE

0.88+

Parasar Kodati, Dell Technologies


 

[Music] okay we're back digging into trusted infrastructure with paris our godaddy he's a senior consultant for product marketing and storage at dell technologies parasite welcome to the cube good to see you great to be with you dave yeah coming from hyderabad awesome so i really appreciate you uh coming on the program let's start with talking about your point of view on what cyber security resilience means to to dell generally but storage specifically yeah so for something like storage you know we are talking about the data layer name and if you look at cyber security it's all about securing your data applications and infrastructure it has been a very mature field at the network and application layers and there are a lot of great technologies right from you know enabling zero trust uh advanced authentications uh identity management systems and so on and and in fact you know with the advent of you know the the use of artificial intelligence and machine learning really these detection tools for cyber securities have really evolved in the network and the application spaces so for storage what it means is how can you bring them to the data layer right how can you bring you know the principles of zero trust to the data layer how can you leverage artificial intelligence and machine learning to look at you know access patterns and make intelligent decisions about maybe an indicator of a compromise and identify them ahead of time just like you know how it's happening in other words of of applications and when it comes to cyber resilience it's it's basically a strategy which assumes that a threat is imminent and it's a good assumption with the severity and the frequency of the attacks that are happening and the question is how do we fortify the infrastructure in the switch infrastructure to withstand those attacks and have a plan a response plan where we can recover the data and make sure the business continuity is not affected so that's uh really cyber security and cyber resiliency and storage layer and of course there are technologies like you know um in network isolation um immutability and all these principles need to be applied at the storage level as well let me have a follow up on that if i may the intelligence that you talked about that ai and machine learning is that do you do you build that into the infrastructure or is that sort of a separate software module that that points at various you know infrastructure components how does that work both dave um right at the data storage level um we have come with various data characteristics depending on the nature of data we developed a lot of signals to see what could be a good indicator of a compromise um and there are also additional applications like cloud iq is the best example which is like an infrastructure-wide health monitoring system for dell infrastructure and now we have elevated that to include cyber security as well so these signals are being gathered at cloud iq level and other applications as well so that we can make those decisions about compromise and we can either cascade that intelligence and alert stream upstream for uh security teams um so that they can take actions in platforms like sign systems xtr systems and so on but when it comes to which layer the intelligence is it has to be at every layer where it makes sense where we have the information to make a decision and being closest to the data we have we are basically monitoring you know the various parallels data access who is accessing um are they crossing across any geo fencing is there any mass deletion that is happening or mass encryption that is happening and we are able to uh detect uh those uh patterns and flag them as indicators of compromise and in allowing automated response manual control and so on for iot teams yeah thank you for that explanation so at dell technologies world we were there in may it was one of the first you know live shows that that we did in the spring certainly one of the largest and i interviewed shannon champion and my huge takeaway from the storage side was the degree to which you guys uh emphasized security uh within the operating systems i mean really i mean powermax more than half i think of the features were security related but also the rest of the portfolio so can you talk about the the security aspects of the dell storage portfolio specifically yeah yeah so when it comes to data security and broadly data availability right in the context of cyber resiliency um dell storage uh this you know these elements have been at the core of our um a core strength for the portfolio and a source of differentiation for the storage portfolio you know with almost decades of collective experience of building highly resilient architectures for mission critical data something like power max system which is the most secure storage platform for high-end enterprises um and now with the increased focus on cyber security we are extending those core technologies of high availability and adding modern detection systems modern data isolation techniques to offer a comprehensive solution to the customer so that they don't have to piece together multiple things to ensure data security or data resiliency but a well-designed and well-architected solution by design is delivered to them to ensure cyber protection at the data layer got it um you know we were talking earlier to steve kenniston and pete gear about this notion of dell trusted infrastructure how does storage fit into that as a component of that sort of overall you know theme yeah and you know and let me say this if you could address because a lot of people might be skeptical that i can actually have security and at the same time not constrict my organizational agility that's old you know not an ore it's an end how do you actually do that if you could address both of those that would be great definitely so for dell trusted infrastructure cyber resiliency is a key component of that and just as i mentioned you know uh air gap isolation it really started with you know power protect cyber recovery you know that was the solution more than three years ago we launched and that was first in the industry which paved way to you know kind of data isolation being a core element of data management and uh for data infrastructure and since then we have implemented these technologies within different storage platforms as well so that customers have the flexibility depending on their data landscape they can approach they can do the right data isolation architecture right either natively from the storage platform or consolidate things into the backup platform and isolate from there and and the other key thing we focus in trusted infrastructure dell infra dell trusted infrastructure is you know the goal of simplifying security for the customers so one good example here is uh you know being able to respond to these cyber threats or indicators of compromise is one thing but an i.t security team may not be looking at the dashboard of the storage systems constantly right storage administration admins may be looking at it so how can we build this intelligence and provide this upstream platforms so that they have a single pane of glass to understand security landscape across applications across networks firewalls as well as storage infrastructure and and compute infrastructure so that's one of the key ways where how we are helping simplify the um kind of the ability to uh respond ability to detect and respond these threads uh in real time for security teams and you mentioned you know about zero trust and how it's a balance of you know not uh kind of restricting users or put heavy burden on you know multi-factor authentication and so on and this really starts with you know what we are doing is provide all the tools you know when it comes to advanced authentication uh supporting external identity management systems multi-factor authentication encryption all these things are intrinsically built into these platforms now the question is the customers are actually one of the key steps is to identify uh what are the most critical parts of their business or what are the applications uh that the most critical uh business operations depend on and similarly identify uh mission critical data where part of your response plan where it cannot be compromised where you need to have a way to recover once you do this identification then the level of security can be really determined uh by uh by the security teams by the infrastructure teams and you know another you know intelligence that gives a lot of flexibility uh for for even developers to do this is today we have apis um that so you can not only track these alerts at the data infrastructure level but you can use our apis to take concrete actions like blocking a certain user or increasing the level of authentication based on the threat level that has been perceived at the application layer or at the network layer so there is a lot of flexibility that is built into this by design so that depending on the criticality of the data criticality of the application number of users affected these decisions have to be made from time to time and it's as you mentioned it's it's a balance right and sometimes you know if if an organization had a recent attack you know the level of awareness is very high uh against cyber attacks so for a time you know these these settings may be a bit difficult to deal with but then it's a decision that has to be made by security teams as well got it so you're surfacing what may be hidden kpis that are buried inside for instance the storage system through apis upstream into a dashboard so that somebody could you know dig into the storage tunnel extract that data and then somehow you know populate that dashboard you're saying you're automating that that that workflow that's a great example and you may have others but is that the correct understanding absolutely and it's a two-way integration let's say a detector an attack has been detected at a completely different layer right in the application layer or at a firewall we can respond to those as well so it's a two-way integration we can cascade things up as well as uh respond to uh threats that have been detected elsewhere um through the api that's great all right api for power scale is the best example for that uh excellent so thank you appreciate that give us the last word put a bow on this and and bring this segment home please absolutely so a dell storage portfolio um using advanced data isolation with air gap having machine learning based algorithms to detect uh indicators of compromise and having rigor mechanisms with granular snapshots being able to recover data and restore applications to maintain business continuity is what we deliver to customers uh and these are areas where a lot of innovation is happening a lot of product focus as well as you know if you look at the professional services all the way from engineering to professional services the way we build these systems the way we we configure and architect these systems uh cyber security and protection uh is a key focus uh for all these activities and dell.com securities is where you can learn a lot about these initiatives that's great thank you you know at the recent uh reinforce uh event in in boston we heard a lot uh from aws about you know detent and response and devops and machine learning and some really cool stuff we heard a little bit about ransomware but i'm glad you brought up air gaps because we heard virtually nothing in the keynotes about air gaps that's an example of where you know this the cso has to pick up from where the cloud leaves off that was in front and so number one and number two we didn't hear a ton about how the cloud is making the life of the cso simpler and that's really my takeaway is is in part anyway your job and companies like dell so paris i really appreciate the insights thank you for coming on thecube thank you very much dave it's always great to be in these uh conversations all right keep it right there we'll be right back with rob emsley to talk about data protection strategies and what's in the dell portfolio you're watching the cube [Music] you

Published Date : Aug 4 2022

SUMMARY :

is provide all the tools you know when

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
hyderabadLOCATION

0.99+

rob emsleyPERSON

0.99+

bostonLOCATION

0.99+

Dell TechnologiesORGANIZATION

0.99+

two-wayQUANTITY

0.98+

firstQUANTITY

0.98+

bothQUANTITY

0.97+

oneQUANTITY

0.96+

steve kennistonPERSON

0.95+

todayDATE

0.95+

parisORGANIZATION

0.92+

more than halfQUANTITY

0.9+

davePERSON

0.89+

dell.comORGANIZATION

0.89+

dell technologiesORGANIZATION

0.88+

more than three years agoDATE

0.88+

awsORGANIZATION

0.84+

dell so parisORGANIZATION

0.83+

a lot of peopleQUANTITY

0.8+

pete gearPERSON

0.75+

cloud iqTITLE

0.73+

zeroQUANTITY

0.72+

single pane of glassQUANTITY

0.7+

mayDATE

0.66+

Parasar KodatiORGANIZATION

0.64+

key stepsQUANTITY

0.61+

twoQUANTITY

0.61+

key waysQUANTITY

0.58+

decadesQUANTITY

0.56+

shannon championTITLE

0.54+

uhEVENT

0.52+

layerQUANTITY

0.51+

JT Giri, nOps | CUBE Conversation


 

>>mhm >>Hello and welcome to this cube conversation here in Palo alto California, I'm john for a year host of the cube, we're here with a great guest Jt gear, Ceo and founder and ops Hot Startup. Jt Welcome to the cube conversation. >>Hey, that sound, thanks for having me. It sounds like we know each other, we used to run into each other at meat out. So yeah, >>it's fun to talk to you because I know you're, you know, scratching the devops it from the beginning before devops was devops before infrastructure of code was infrastructure as code. All that's played out. So it's really a great ride. I know you had a good time doing it a lot of action though. If you look at devops it's kind of like this new, I won't say devops two point because it kind of cliche but you're starting to see the mature ization of companies besides the early adopters and the people who are hardcore adopting and they realize this is amazing and then they? Re platform in the cloud and they go great, let's do more and next thing, you know, they have an operations issue and they got a really kind of stabilize and then also not break anything. So this is kind of the wheelhouse of what you guys are doing in ops reminds me of no ops, no operations, you know, we don't want to have a lot of extra stuff. This is a big thing. Take a but take them in to explain the company, you're what you guys stand for and what you're all about. >>Yeah, so you know, our main focus is more on the operation side, so, you know the reason why you move to cloud or the reason why you have devops practices, you want to go fast. Um but you know when you're building cloud infrastructure, you have to make trade offs right? You have to maybe some environment, maybe you have to optimize for S L A. And maybe another workload, you have to optimize for um you know, maybe costs, right? So what we're on a mission to do is to make sure that companies are able to make the right trade offs, right? We help companies to make sure all their workload, every single resource in the cloud is aligned with the business needs, you know, so we do a lot of cool things by like, you know, bringing accountability mapping and we're close to different genes. But yeah, the end goal is, can we make sure that every single resource on data Bs is aligned with the business needs >>and they're also adding stuff. Every reinvent zillion more services get announced. So a lot, a lot of stuff going on, I gotta ask you while I got you here, what is the definition of cloud apps these days, from your standpoint and why is it important? A lot of folks are looking at this and they want to have stable operations. They love the cloud really can't deny the cloud value at all. But cloud ops has become a big topic. What is cloud apps and why is it important. >>Right? I mean, first of all, Like you just mentioned, right? Like Amazon keeps on launching more services. It's over 200. So the environment is very complex, Right? And then mm complexity within the services is uh pretty uh you really need to be the main expert for example, know everything about do So, you know, our question to us is, let's say if you find a critical issue, uh let's say you want to uh you know, enable multi AZ on your RDS for example. Uh and it's critical because you know, you're running a uh high availability workloads on AWS. How do you follow up on that right to us. Operation is how do you build a cloud backlog? How do you prioritize, how do you come together as a team to actually remediate those issues? No one is tackling that job, everyone's surfaces like, hey, here's 1000 things that are wrong with your environment. No one is focused on like how do you go from these issues to prioritization to backlog to actually coming together as a team. You know, I've been fixing some of those issues. That's that's what operation means is >>I know it's totally hard because sometimes I don't even know what's going on. I gotta ask you why, why is it harder now? Why are people, I mean I get the impression that people like looking the other way? I hope it goes the problem kind of goes away. What are the challenges? What's the big blocker from getting at the root cause or trying to solve these problems? What's the big thing that's holding people back? >>Yeah, I mean, when I first got into, you know, I t you know, I was working in data center and every time we needed a server, you know, we have to ask for approvals, right? And you finally got a server, but nowadays anyone could provision resources. And normally you have different people within the team's provisioning resources and you can have hundreds of different teams who are provisioning resources. So the complexity uh and the speed that we are, you know, provisioning resources across multiple people, it just continues to go higher and higher. So that's why uh you know, on the surface it might look that hey, this, you know, maybe the biggest instance uh is, you know, aligned with the business needs, you know, looking at the changes, it's hard to know, are those aligned with the business? They're not? So that's that's that's where the complexity and player. >>So the question I get a lot from people we talk about devops and cloud, cloud apps or cloud management or whatever kind of buzz words out there, it kind of comes down to cloud apps and cloud management seems to be the category, people focus on. How is cloud ops different then? Say the traditional cloud management and what impact does it have for customers and why should they care and what do they need an option. >>Right. So one of the things we do uh and and we do think that cloud operation is sort of an evolution from cloud management. We make sure that Every single resource 1st, first of all blondes and workload. So and you know, workload could be a group of microservices uh and then uh you know every single workload has owners like define owners who are responsible for making sure they managed budget that they're responsible for security that normally doesn't exist. Right? Cloud is this black box, you know where multiple people are provisioning resources, you know, everyone tries to sort of build sort of a structure to kind of see like what are these resources for? What are these resources for as part of onboarding to end up? So what we do, we actually, you know, analyze all your metadata. We create like 56 workloads and then we say here is a bucket where there's there, this is totally unassigned, right? And then we actually walked them through assigning different roles and also we walk them through to kinda looking under this unallocated resources and assign resources for those as well. So once you're done, every single resource has clear definition, right? Is this a compliant? Uh you know hip hop workload, what are the run books, what is this for? John I don't know if he heard that before. Sometimes there are workloads running and how people don't know, I don't even know who is the owner, right? So after you're done with an office and after you're managing and uh, you know, uh, managing your workload on and off, you have full visibility and clear understanding of what are the. It's funny, it's >>funny you mentioned the workloads being kind of either not knowing the owners, but also we see people um, with the workloads sometimes it's like throwing a switch and leaving the hose on the water on. And next thing you know, they get the bill. They're like, oh my God, what happened? Why did I leave? What, what is this? So there's a lot of things that you could miss. This brings up the point you just said and what you said earlier aligning resources across the cloud uh and and having accountability. And then you, you mentioned at the top of this interview that aligning with the business needs. I find that fastest. I would like to take him in to explain because it sounds really hard. I get how you can align the resources and do some things, identify what's going on, accountability kind of map that that's, that's good tech. How does that, how do you get that to the alignment on the business side. >>Yeah. I mean we start by, first of all, like I said, you know, we use machine learning to play these workloads? And then we asked basic questions about the workload. You know, what is this workload for? Uh Do you need to meet with any kind of compliance is for this workload? Uh What is your S. O. A. For this workload? You know, depending on that. We we make recommendations. Uh So we kind of ask those questions and we also walk them through where they create roles. Like we asked who was responsible for creating budgets or managing security for this workload and guess what also the you know the bucket where resources are allocated for. We ask for you know, owners for that as well like in this bucket who's the owner for who's going to monitor the budget and things like that. So you know we asked, you know, we start by just asking the question, having teams complete that sort of information and also you know, why do you a little bit more information on how this aligns with the business needs? You know, >>talk about the complexity side of it. I love that conversation around the number of services. You said 200 services depending how you count what you call services in the thousands of so many different things uh knobs to turn on amazon uh web services. So why are people um focused on the complexity and the partnering side? Because you know, it's the clouds at E. P. I. Based system. So you're dealing with a lot of different diverse resources. So you have complexity and diversity. Can you talk me through how that works? Because that's that seems to be a tough beast to tame the difference between the complexity of services and also working with other people. >>Yeah for sure like this this normal to have um you know maybe thousands of lambda functions in their application. We're working with a customer where within last month there were nine million containers that launched and got terminated right there, pretty much leveraging, auto scaling and things like that. So these environments are like very complex. You know, there's a lot of moving pieces even, you know, depending on the type of services they're using. So again what we do, you know we when we look at tags and we look at other variables like environments and we look at who's provisioning resources, those resources and we try to group them together and that way there's accountability uh you know if the cost goes up for one workload were able to show that team like your cost is going up uh And also we can show uh unallocated bucket that hey within last week Your cost is you know, $4,000 higher in the unallocated bucket. Where would you like to move this these resources to just like an ongoing game. You >>know, you know jt I was talking with my friend jerry Chen is that Greylock partners is a V. C. Has been on the cube many times a couple of years ago. We're talking about how you can build a business within the cloud, in the shadows of the clouds, what he called it, but I called it more the enabling side and and that's happened now, you're seeing the massive growth. I'm also talking to some C X O C IOS or CSOs and they're like trying to figure out which companies that are evolving and growing to be to buy from, get to get the technology. Uh and they always say to me john I'm looking for game changing kind of impact. I'm looking for the efficiency and you know, enablement, the classic kind of criteria. So how would you guys position yourself to those buyers out there that might want to look at you guys as a solution and ups what game changing aspect of what you do is out there, how would you talk to that that C I O or C. So or buyer um out in the end the enterprise and the thieves ran his piece. What would you say to them? >>Yeah, I think the biggest uh advantage and I think right now it's a necessity, you hear these stories where, you know, people provision resources, they don't even know which project is it for. It's just very hard to govern the cloud environment, but I believe we're the only tool. Mhm where you want to compromise on the speed, right? The whole reason um cloud but they want to innovate faster. No one wants to follow that. Right? But I think what's important. We need to make sure everything is aligned with the business value. Uh, we allow people to do that. You know, we, we, we can both fast at the same time. You can have some sort of guard rails. So there are proper ownership. There's accountability. People are collaborating and people are also rightsizing terminating resources, they're not using. It's like, you know, I think if companies are looking for a tool that's gonna drive better accountability on how people build and collaborate on cloud, I think reply the best solution. >>So people are evolving with the cloud and you mentioned terminating services. That's a huge deal in cloud. Native things are being spun up and turned off all the time. So you need to have good law, You have a good visibility, observe ability is one of the hottest buzzwords out there. We see a zillion companies saying, hey, we're observe ability, which is to me is just monitoring stuff. They can sure you're tracking everything. So when you have all this and you start to operationalize this next gen, next level cloud scale, cost optimization and visibility is huge. Um, what is the, what is the secret sauce uh, for that you guys offer? Because the change management is a big 12 teams are changing too cost team accountability. All this is kind of, it's not just speeds and feeds, there's, it's kind of intersection of both. What's your take on that reaction to that? >>Yeah, I think it's the Delta. Right? So change management, What you're really looking for is not a, like a fire hose, you're looking for. What changed what the root cause who did it, what happened? Right. Because it's totally normal for someone to provision maybe thousands or even millions containers. But how many of those got shut down? What is the delta and uh, you know, if there is a, there is an anomaly, what is the root cause? Right? Uh, how we fix it. So you know the way we've changed managers, change management is a lot different. We really get to the root cause analysis and we really help companies to make, really show what changed and how they can take action to a media. But if there were issues, >>I want to put a little plug in for you guys. I noticed you guys have a really strong net promoter score. You have happy customers also get partners. A lot of enablement there. You kind of got a lot of things going on. Um, explain what you guys are all about. How did you get here? What's the day in the life of a customer that you're serving? Why then why are the scores so high? Um, take us through a use case of someone getting that value. >>Yeah. So I, I come from like a consulting background, john so you know, I was migrating companies to read the Bs when the institute was in beta and then I, you know, founded a consulting company over 100 employees. Really successful interview. S premier partner called in clouds. And so Enos was born there because because you know it was, it was born out a consulting company, there are a lot of other partners who are leveraging the tools to help their customers and it goes back to our point earlier, john like amazon has to wonder services, right? We are noticing customers are open to work with partners and uh you know with different partners that really helped them to make sure they're making the right decisions when they are building on cloud. So a lot of the partners, a lot of the consulting companies are leveraging uh and hopes to deliver value to their customers as far as uh you know how we actually operate. You know, we pay attention to uh you know what, what customers are looking for, what, where are the next sort of challenges uh you know, customers are facing in a cloud environment world like super obsessed, you know, like we're trying to figure out how do we make sure every single resource is aligned with the business value without slowing companies down so that really drives us, we're constantly welcome customers to stay true to the admission >>and that's the ethos of devops moving fast. The old quote Mark Zuckerberg used to have move fast, break stuff and then he revised it to move move fast and make it stable, which is essentially operational thing. Right, so you're starting to see that maturity, I noticed that you guys also have a really cool pricing model, very easy to get in and you have a high end too. So talk us through about how to engage with you guys, how do people get involved? Just click and just jump in there, buying software buying services, take a minute to explain how people can, can work with you. >>Yeah, it's just, it's just signing up on our site, you know, our pricing is tier model, uh you know, once you sign up, if you do need help with, you know, remediating high risk issues we can bring in partners, we have a strong partner ecosystem. Uh we could definitely help you do interviews to the right partners but it's as simple as just signing up and just taking me out. First thing I guess. >>Jt great chatting with you have been there from early days of devops, born in the field, getting, getting close to the customers and you mentioned ec two and beta, they just celebrate their 15th birthday and I remember one of my starts that didn't actually get off the off the blocks, they didn't even have custom domains at that time was still the long remember the long you are else >>everything was ephemeral like when you restart server, everything will go away a cool >>time. And I just remember saying to myself man, every entrepreneur is going to use this service who would ever go out and buy and host the server. So you were there from the beginning and it's been great to see the success. Thanks for coming on the cube >>all That's >>okay. Jt thanks so much as a cube conversation here in Palo alto. I'm john for your host. Thanks for watching. Mhm.

Published Date : Sep 7 2021

SUMMARY :

Jt Welcome to the cube conversation. So yeah, Re platform in the cloud and they go great, let's do more and next thing, you know, they have an operations You have to maybe some environment, maybe you have to optimize So a lot, a lot of stuff going on, I gotta ask you while I got you here, what is the definition of cloud apps these days, Uh and it's critical because you know, you're running a uh high availability I gotta ask you why, why is it harder Yeah, I mean, when I first got into, you know, I t you know, So the question I get a lot from people we talk about devops and cloud, cloud apps or cloud So what we do, we actually, you know, analyze all your metadata. So there's a lot of things that you could miss. So you know we asked, you know, we start by just asking the question, having teams Because you know, it's the clouds at E. P. I. Based system. we do, you know we when we look at tags and we look of what you do is out there, how would you talk to that that C I O or C. It's like, you know, So when you have all this and you start to operationalize this next gen, What is the delta and uh, you know, I noticed you guys have a really strong net promoter score. and then I, you know, founded a consulting company over 100 employees. So talk us through about how to engage with you guys, how do people get involved? our pricing is tier model, uh you know, once you sign up, So you were there from the beginning and it's been great to see the I'm john for your host.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
AmazonORGANIZATION

0.99+

Mark ZuckerbergPERSON

0.99+

$4,000QUANTITY

0.99+

amazonORGANIZATION

0.99+

JohnPERSON

0.99+

JT GiriPERSON

0.99+

200 servicesQUANTITY

0.99+

thousandsQUANTITY

0.99+

jerry ChenPERSON

0.99+

AWSORGANIZATION

0.99+

hundredsQUANTITY

0.99+

nine million containersQUANTITY

0.99+

1000 thingsQUANTITY

0.99+

over 100 employeesQUANTITY

0.99+

last weekDATE

0.98+

last monthDATE

0.98+

johnPERSON

0.98+

Palo alto CaliforniaLOCATION

0.98+

12 teamsQUANTITY

0.98+

JtPERSON

0.98+

15th birthdayQUANTITY

0.98+

over 200QUANTITY

0.98+

bothQUANTITY

0.97+

First thingQUANTITY

0.97+

Palo altoLOCATION

0.97+

two pointQUANTITY

0.95+

56 workloadsQUANTITY

0.95+

firstQUANTITY

0.95+

oneQUANTITY

0.92+

couple of years agoDATE

0.92+

GreylockORGANIZATION

0.92+

millions containersQUANTITY

0.87+

CeoORGANIZATION

0.84+

Jt gearORGANIZATION

0.84+

a yearQUANTITY

0.84+

C X O C IOSTITLE

0.83+

companiesQUANTITY

0.77+

single resourceQUANTITY

0.77+

Hot StartupORGANIZATION

0.76+

1stQUANTITY

0.75+

singleQUANTITY

0.75+

EnosORGANIZATION

0.72+

one workloadQUANTITY

0.71+

CSOsTITLE

0.67+

lambdaQUANTITY

0.66+

every single resourceQUANTITY

0.64+

single workloadQUANTITY

0.63+

ec twoTITLE

0.5+

zillionQUANTITY

0.49+

DeltaORGANIZATION

0.49+

resourceQUANTITY

0.44+

Neuromorphic in Silico Simulator For the Coherent Ising Machine


 

>>Hi everyone, This system A fellow from the University of Tokyo before I thought that would like to thank you she and all the stuff of entity for the invitation and the organization of this online meeting and also would like to say that it has been very exciting to see the growth of this new film lab. And I'm happy to share with you today or some of the recent works that have been done either by me or by character of Hong Kong Noise Group indicating the title of my talk is a neuro more fic in silica simulator for the commenters in machine. And here is the outline I would like to make the case that the simulation in digital Tektronix of the CME can be useful for the better understanding or improving its function principles by new job introducing some ideas from neural networks. This is what I will discuss in the first part and then I will show some proof of concept of the game in performance that can be obtained using dissimulation in the second part and the production of the performance that can be achieved using a very large chaos simulator in the third part and finally talk about future plans. So first, let me start by comparing recently proposed izing machines using this table there is adapted from a recent natural tronics paper from the Village Back hard People. And this comparison shows that there's always a trade off between energy efficiency, speed and scalability that depends on the physical implementation. So in red, here are the limitation of each of the servers hardware on, Interestingly, the F p G, a based systems such as a producer, digital, another uh Toshiba purification machine, or a recently proposed restricted Bozeman machine, FPD eight, by a group in Berkeley. They offer a good compromise between speed and scalability. And this is why, despite the unique advantage that some of these older hardware have trust as the currency proposition influx you beat or the energy efficiency off memory sisters uh P. J. O are still an attractive platform for building large theorizing machines in the near future. The reason for the good performance of Refugee A is not so much that they operate at the high frequency. No, there are particle in use, efficient, but rather that the physical wiring off its elements can be reconfigured in a way that limits the funding human bottleneck, larger, funny and phenols and the long propagation video information within the system in this respect, the f. D. A s. They are interesting from the perspective, off the physics off complex systems, but then the physics of the actions on the photos. So to put the performance of these various hardware and perspective, we can look at the competition of bringing the brain the brain complete, using billions of neurons using only 20 watts of power and operates. It's a very theoretically slow, if we can see. And so this impressive characteristic, they motivate us to try to investigate. What kind of new inspired principles be useful for designing better izing machines? The idea of this research project in the future collaboration it's to temporary alleviates the limitations that are intrinsic to the realization of an optical cortex in machine shown in the top panel here. By designing a large care simulator in silicone in the bottom here that can be used for suggesting the better organization principles of the CIA and this talk, I will talk about three neuro inspired principles that are the symmetry of connections, neural dynamics. Orphan, chaotic because of symmetry, is interconnectivity. The infrastructure. No neck talks are not composed of the reputation of always the same types of non environments of the neurons, but there is a local structure that is repeated. So here's a schematic of the micro column in the cortex. And lastly, the Iraqi co organization of connectivity connectivity is organizing a tree structure in the brain. So here you see a representation of the Iraqi and organization of the monkey cerebral cortex. So how can these principles we used to improve the performance of the icing machines? And it's in sequence stimulation. So, first about the two of principles of the estimate Trian Rico structure. We know that the classical approximation of the Cortes in machine, which is a growing toe the rate based on your networks. So in the case of the icing machines, uh, the okay, Scott approximation can be obtained using the trump active in your position, for example, so the times of both of the system they are, they can be described by the following ordinary differential equations on in which, in case of see, I am the X, I represent the in phase component of one GOP Oh, Theo F represents the monitor optical parts, the district optical parametric amplification and some of the good I JoJo extra represent the coupling, which is done in the case of the measure of feedback cooking cm using oh, more than detection and refugee A then injection off the cooking time and eso this dynamics in both cases of CME in your networks, they can be written as the grand set of a potential function V, and this written here, and this potential functionally includes the rising Maccagnan. So this is why it's natural to use this type of, uh, dynamics to solve the icing problem in which the Omega I J or the Eyes in coping and the H is the extension of the rising and attorney in India and expect so. >>Not that this potential function can only be defined if the Omega I j. R. A. Symmetric. So the well known problem of >>this approach is that this potential function V that we obtain is very non convicts at low temperature, and also one strategy is to gradually deformed this landscape, using so many in process. But there is no theorem. Unfortunately, that granted convergence to the global minimum of there's even 20 and using this approach. And so this is >>why we propose toe introduce a macro structure the system or where one analog spin or one D o. P. O is replaced by a pair off one and knock spin and one error on cutting. Viable. And the addition of this chemical structure introduces a symmetry in the system, which in terms induces chaotic dynamics, a chaotic search rather than a >>learning process for searching for the ground state of the icing. Every 20 >>within this massacre structure the role of the ER variable eyes to control the amplitude off the analog spins to force the amplitude of the expense toe, become equal to certain target amplitude. A Andi. This is known by moderating the strength off the icing complaints or see the the error variable e I multiply the icing complain here in the dynamics off UH, D o p o on Then the dynamics. The whole dynamics described by this coupled equations because the e I do not necessarily take away the same value for the different, I think introduces a >>symmetry in the system, which in turn creates chaotic dynamics, which I'm showing here for solving certain current size off, um, escape problem, Uh, in which the exiled from here in the i r. From here and the value of the icing energy is shown in the bottom plots. And you see this Celtics search that visit various local minima of the as Newtonian and eventually finds the local minima Um, >>it can be shown that this modulation off the target opportunity can be used to destabilize all the local minima off the icing hamiltonian so that we're gonna do not get stuck in any of them. On more over the other types of attractors, I can eventually appear, such as the limits of contractors or quality contractors. They can also be destabilized using a moderation of the target amplitude. And so we have proposed in the past two different motivation of the target constitute the first one is a moderation that ensure the 100 >>reproduction rate of the system to become positive on this forbids the creation of any non tree retractors. And but in this work I will talk about another modulation or Uresti moderation, which is given here that works, uh, as well as this first, uh, moderation, but is easy to be implemented on refugee. >>So this couple of the question that represent the current the stimulation of the cortex in machine with some error correction, they can be implemented especially efficiently on an F B G. And here I show the time that it takes to simulate three system and eso in red. You see, at the time that it takes to simulate the X, I term the EI term, the dot product and the rising everything. Yet for a system with 500 spins analog Spain's equivalent to 500 g. O. P. S. So in f b d a. The nonlinear dynamics which, according to the digital optical Parametric amplification that the Opa off the CME can be computed in only 13 clock cycles at 300 yards. So which corresponds to about 0.1 microseconds. And this is Toby, uh, compared to what can be achieved in the measurements tobacco cm in which, if we want to get 500 timer chip Xia Pios with the one she got repetition rate through the obstacle nine narrative. Uh, then way would require 0.5 microseconds toe do this so the submission in F B J can be at least as fast as, ah one gear repression to replicate the post phaser CIA. Um, then the DOT product that appears in this differential equation can be completed in 43 clock cycles. That's to say, one microseconds at 15 years. So I pieced for pouring sizes that are larger than 500 speeds. The dot product becomes clearly the bottleneck, and this can be seen by looking at the the skating off the time the numbers of clock cycles a text to compute either the non in your optical parts, all the dog products, respect to the problem size. And and if we had a new infinite amount of resources and PGA to simulate the dynamics, then the non in optical post can could be done in the old one. On the mattress Vector product could be done in the low carrot off, located off scales as a low carrot off end and while the kite off end. Because computing the dot product involves the summing, all the terms in the products, which is done by a nephew, Jay by another tree, which heights scares a logarithmic any with the size of the system. But this is in the case if we had an infinite amount of resources on the LPGA food but for dealing for larger problems off more than 100 spins, usually we need to decompose the metrics into ah smaller blocks with the block side that are not you here. And then the scaling becomes funny non inner parts linear in the and over you and for the products in the end of you square eso typically for low NF pdf cheap P a. You know you the block size off this matrix is typically about 100. So clearly way want to make you as large as possible in order to maintain this scanning in a log event for the numbers of clock cycles needed to compute the product rather than this and square that occurs if we decompose the metrics into smaller blocks. But the difficulty in, uh, having this larger blocks eyes that having another tree very large Haider tree introduces a large finding and finance and long distance started path within the refugee. So the solution to get higher performance for a simulator of the contest in machine eyes to get rid of this bottleneck for the dot product. By increasing the size of this at the tree and this can be done by organizing Yeah, click the extra co components within the F p G A in order which is shown here in this right panel here in order to minimize the finding finance of the system and to minimize the long distance that the path in the in the fpt So I'm not going to the details of how this is implemented the PGA. But just to give you a new idea off why the Iraqi Yahiko organization off the system becomes extremely important toe get good performance for simulator organizing mission. So instead of instead of getting into the details of the mpg implementation, I would like to give some few benchmark results off this simulator, uh, off the that that was used as a proof of concept for this idea which is can be found in this archive paper here and here. I should result for solving escape problems, free connected person, randomly person minus one, spin last problems and we sure, as we use as a metric the numbers >>of the mattress Victor products since it's the bottleneck of the computation, uh, to get the optimal solution of this escape problem with Nina successful BT against the problem size here and and in red here there's propose F B J implementation and in ah blue is the numbers of retrospective product that are necessary for the C. I am without error correction to solve this escape programs and in green here for noisy means in an evening which is, uh, behavior. It's similar to the car testing machine >>and security. You see that the scaling off the numbers of metrics victor product necessary to solve this problem scales with a better exponents than this other approaches. So so So that's interesting feature of the system and next we can see what is the real time to solution. To solve this, SK instances eso in the last six years, the time institution in seconds >>to find a grand state of risk. Instances remain answers is possibility for different state of the art hardware. So in red is the F B G. A presentation proposing this paper and then the other curve represent ah, brick, a local search in in orange and center dining in purple, for example, and So you see that the scaring off this purpose simulator is is rather good and that for larger politicizes, we can get orders of magnitude faster than the state of the other approaches. >>Moreover, the relatively good scanning off the time to search in respect to problem size uh, they indicate that the FBT implementation would be faster than risk Other recently proposed izing machine, such as the Hope you know network implemented on Memory Sisters. That is very fast for small problem size in blue here, which is very fast for small problem size. But which scanning is not good on the same thing for the >>restricted Bosman machine implemented a PGA proposed by some group in Brooklyn recently again, which is very fast for small promise sizes. But which canning is bad So that, uh, this worse than the purpose approach so that we can expect that for promise sizes larger than, let's say, 1000 spins. The purpose, of course, would be the faster one. >>Let me jump toe this other slide and another confirmation that the scheme scales well that you can find the maximum cut values off benchmark sets. The G sets better cut values that have been previously found by any other >>algorithms. So they are the best known could values to best of our knowledge. And, um, or so which is shown in this paper table here in particular, the instances, Uh, 14 and 15 of this G set can be We can find better converse than previously >>known, and we can find this can vary is 100 times >>faster than the state of the art algorithm and cp to do this which is a recount. Kasich, it s not that getting this a good result on the G sets, they do not require ah, particular hard tuning of the parameters. So the tuning issuing here is very simple. It it just depends on the degree off connectivity within each graph. And so this good results on the set indicate that the proposed approach would be a good not only at solving escape problems in this problems, but all the types off graph sizing problems on Mexican province in communities. >>So given that the performance off the design depends on the height of this other tree, we can try to maximize the height of this other tree on a large F p g A onda and carefully routing the trickle components within the P G A. And and we can draw some projections of what type of performance we can achieve in >>the near future based on the, uh, implementation that we are currently working. So here you see projection for the time to solution way, then next property for solving this escape problems respect to the prime assize. And here, compared to different with such publicizing machines, particularly the digital and, you know, free to is shown in the green here, the green >>line without that's and, uh and we should two different, uh, prosthesis for this productions either that the time to solution scales as exponential off n or that >>the time of social skills as expression of square root off. So it seems according to the data, that time solution scares more as an expression of square root of and also we can be sure >>on this and this production showed that we probably can solve Prime Escape Program of Science 2000 spins to find the rial ground state of this problem with 99 success ability in about 10 seconds, which is much faster than all the other proposed approaches. So one of the future plans for this current is in machine simulator. So the first thing is that we would like to make dissimulation closer to the rial, uh, GOP or optical system in particular for a first step to get closer to the system of a measurement back. See, I am. And to do this, what is, uh, simulate Herbal on the p a is this quantum, uh, condoms Goshen model that is proposed described in this paper and proposed by people in the in the Entity group. And so the idea of this model is that instead of having the very simple or these and have shown previously, it includes paired all these that take into account out on me the mean off the awesome leverage off the, uh, European face component, but also their violence s so that we can take into account more quantum effects off the g o p. O, such as the squeezing. And then we plan toe, make the simulator open access for the members to run their instances on the system. There will be a first version in September that will >>be just based on the simple common line access for the simulator and in which will have just a classical approximation of the system. We don't know Sturm, binary weights and Museum in >>term, but then will propose a second version that would extend the current arising machine to Iraq off eight f p g. A. In which we will add the more refined models truncated bigger in the bottom question model that just talked about on the supports in which he valued waits for the rising problems and support the cement. So we will announce >>later when this is available, and Farah is working hard to get the first version available sometime in September. Thank you all, and we'll be happy to answer any questions that you have.

Published Date : Sep 24 2020

SUMMARY :

know that the classical approximation of the Cortes in machine, which is a growing toe So the well known problem of And so this is And the addition of this chemical structure introduces learning process for searching for the ground state of the icing. off the analog spins to force the amplitude of the expense toe, symmetry in the system, which in turn creates chaotic dynamics, which I'm showing here is a moderation that ensure the 100 reproduction rate of the system to become positive on this forbids the creation of any non tree in the in the fpt So I'm not going to the details of how this is implemented the PGA. of the mattress Victor products since it's the bottleneck of the computation, uh, You see that the scaling off the numbers of metrics victor product necessary to solve So in red is the F B G. A presentation proposing Moreover, the relatively good scanning off the But which canning is bad So that, scheme scales well that you can find the maximum cut values off benchmark the instances, Uh, 14 and 15 of this G set can be We can find better faster than the state of the art algorithm and cp to do this which is a recount. So given that the performance off the design depends on the height the near future based on the, uh, implementation that we are currently working. the time of social skills as expression of square root off. And so the idea of this model is that instead of having the very be just based on the simple common line access for the simulator and in which will have just a classical to Iraq off eight f p g. A. In which we will add the more refined models any questions that you have.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
BrooklynLOCATION

0.99+

SeptemberDATE

0.99+

100 timesQUANTITY

0.99+

BerkeleyLOCATION

0.99+

Hong Kong Noise GroupORGANIZATION

0.99+

CIAORGANIZATION

0.99+

300 yardsQUANTITY

0.99+

1000 spinsQUANTITY

0.99+

IndiaLOCATION

0.99+

15 yearsQUANTITY

0.99+

second versionQUANTITY

0.99+

first versionQUANTITY

0.99+

FarahPERSON

0.99+

second partQUANTITY

0.99+

first partQUANTITY

0.99+

twoQUANTITY

0.99+

500 spinsQUANTITY

0.99+

ToshibaORGANIZATION

0.99+

first stepQUANTITY

0.99+

20QUANTITY

0.99+

more than 100 spinsQUANTITY

0.99+

ScottPERSON

0.99+

University of TokyoORGANIZATION

0.99+

500 g.QUANTITY

0.98+

MexicanLOCATION

0.98+

bothQUANTITY

0.98+

todayDATE

0.98+

KasichPERSON

0.98+

first versionQUANTITY

0.98+

firstQUANTITY

0.98+

IraqLOCATION

0.98+

third partQUANTITY

0.98+

13 clock cyclesQUANTITY

0.98+

43 clock cyclesQUANTITY

0.98+

first thingQUANTITY

0.98+

0.5 microsecondsQUANTITY

0.97+

JayPERSON

0.97+

HaiderLOCATION

0.97+

15QUANTITY

0.97+

one microsecondsQUANTITY

0.97+

SpainLOCATION

0.97+

about 10 secondsQUANTITY

0.97+

LPGAORGANIZATION

0.96+

eachQUANTITY

0.96+

500 timerQUANTITY

0.96+

one strategyQUANTITY

0.96+

both casesQUANTITY

0.95+

one errorQUANTITY

0.95+

20 wattsQUANTITY

0.95+

NinaPERSON

0.95+

about 0.1 microsecondsQUANTITY

0.95+

nineQUANTITY

0.95+

each graphQUANTITY

0.93+

14QUANTITY

0.92+

CMEORGANIZATION

0.91+

IraqiOTHER

0.91+

billions of neuronsQUANTITY

0.91+

99 successQUANTITY

0.9+

about 100QUANTITY

0.9+

larger than 500 speedsQUANTITY

0.9+

VectorORGANIZATION

0.89+

spinsQUANTITY

0.89+

VictorORGANIZATION

0.89+

last six yearsDATE

0.86+

oneQUANTITY

0.85+

one analogQUANTITY

0.82+

hamiltonianOTHER

0.82+

SimulatorTITLE

0.8+

EuropeanOTHER

0.79+

three neuro inspired principlesQUANTITY

0.78+

BosmanPERSON

0.75+

three systemQUANTITY

0.75+

trumpPERSON

0.74+

Xia PiosCOMMERCIAL_ITEM

0.72+

100QUANTITY

0.7+

one gearQUANTITY

0.7+

P.QUANTITY

0.68+

FPD eightCOMMERCIAL_ITEM

0.66+

first oneQUANTITY

0.64+

Escape Program of Science 2000TITLE

0.6+

CelticsOTHER

0.58+

TobyPERSON

0.56+

MachineTITLE

0.54+

Refugee ATITLE

0.54+

coupleQUANTITY

0.53+

TektronixORGANIZATION

0.51+

OpaOTHER

0.51+

P. J. OORGANIZATION

0.51+

BozemanORGANIZATION

0.48+

Michael DeCesare, Forescout | RSA 2019


 

>> Live from San Francisco. It's the Cube covering artists. A conference twenty nineteen brought to you by for scout. >> Hey, welcome back already, Geoffrey here with the Cube were in downtown San Francisco at the brand new Open. I think it's finally complete. Mosconi Center for our conference. Twenty nineteen were really excited this year. For the first time ever in the four Scout booth, we've been coming to our say for a long time. We had Mike on last last year by Caesar. President Seo >> for scout. I appreciate you having me >> because we had the last year and you're so nice. You You invited us to the way we must both done something right? Absolutely it Also, before we get too far into it, Congratulations. Doing some homework. The stock is going well. You're making acquisitions, You said it's the anniversary of going out in public. So things are things are looking good for Four. Scout >> things have been good. We've been public company now for four quarters. We've beaten, raised on every metric we had out there. So we're feeling good about >> life. So I don't think the security threats are going down. I don't think you're Tamas is shrinking by any stretch of the imagination. Definitely >> does not feel like the threat landscape is getting less challenging these days, right? I mean, when you look at all the geopolitical stuff going on between the US and China and Russia, that that usually spills into the cybersecurity world and kind of makes things a little bit more tense, >> right? So the crazy talk and all confidence now is machine learning an a I and obviously one of the big themes that came up, we had a great interview. A googol is you just can't hire enough professionals regardless of the field, especially in this one to take care of everything So automation, really key. Hey, I really key. But the same time the bad guys have access to many of the same tools so that you're in the middle of this arm raise. How are you? You kind of taken a strategic view of machine learning an A I in this world. >> So what's amazing about cyber security in two thousand nineteen is the fact that the pace of innovation is exploding at an unprecedented rate, Right? I mean, we're bringing Maur devices online every quarter now, then the first ten years of the Internet combined. So the pace of adoption of new technologies is really what is driving the need for machine learning and a I a human being. Historically, in the cybersecurity world, most corporations approach was, I'm gonna have a whole bunch of different cyber products. They all have their own dashboards. I'm going to build this thing called a cyber Operations Center of Sock. That is going to be the input of all those. But a human being is going to be involved in a lot of the research and prioritization of attacks. And I think just the volume and sophistication of the breaches these days and attacks is making those same companies turn towards automation. You have to be willing to let your cyber security products take action on their own and machine learning in a I play a very large roll back. >> Yeah, it's really interesting because there's very few instances where the eye in the M L actually generate an action. Oftentimes will generate a flag, though they'll bring in a human to try to make one of the final analysis. But it's not, not often that way, actually give them the power to do something. Is that changing? Do you see that changing are people more accepting of that when you can't give it up that >> control when you when you look at for scouts kind of core value Proposition the category that were in his device. Visibility in control device visibility. What's on the network control? When I find something that shouldn't be, there are customers. Want to block that so way? Have a front row seat on watching customers that for decades have been unwilling to allow cybersecurity products to actually take action, turning our product on everyday and allowing us to do exactly that. So when we look at the way that they approached the breaches in every one of these scenarios, they're trying to figure out how they can augment the personal staff they have with products that can provide that level of intelligence >> on nothing to >> see over and over is that people are so falih. Fallible interview to Gala Grasshopper A couple of years he was one hundred percent a social engineering her way into any company that she tried. She had a kind of cool trick. She looked at Instagram photos. He would see the kind of browser that you had, and you know the company picnic. Paige won't let me in. Can you please try this? You're one hundred percent success. So you guys really act in a very different way. You're kind of after the breaches happened. You're sensing and taking action, not necessarily trying to maintain that that print Big Mo >> we're actually on the front end were before the breach takes place. So the way our product works is way plug into the network and then we turned that network ten years ago. A CEO would would would control everything on their networks. They would buy servers and load them with products and put them in their data centers. And they bite, you know, end points and they give those to their to their employees. Those same CEOs now need to allow everything to connect and try to make sense of this growing number of devices. So both the role that we play is preventative. We are on the front end. When a device first joins that network, you need to make sure that device is allowed to be there. So before we worry about what credentials that device is trying to log in with, let's make sure that's a device that the company wants to be on the network to begin with. So to your point, exactly your right. I mean, I think my CFO and I probably every week have some very sophisticated email that makes it sound like one of us asked the other to approve a check request. But it's but they're getting good and you're right. They go on the They know that I went to Villanova, where I'm a Phish fan, and they'll leverage some form of thing. All Post online has tried to make that seem a little bit more personalized, but our philosophy is a company is very basic, which is you need situational awareness of what devices are allowed to be on that network to begin with. If you get that in place, there's a lot less examples that what you described a couple of minutes >> ago and that you said to really instinct philosophy, having kind of an agent list methodology to identify and profile everything that's connected to the network, as opposed to having having you know an OS or having a little bug on there, Which would put you in good shape for this operations technology thing, which is such a critical piece of the i O. T and the I O T transfer >> there. Now there's there's no doubt, You know, that's one of the most fourth sight ful things that, for Scout has ever done is we made the decision to go Agent Lis ten years ago, Way saw that the world was moving from you, Nick and and Lenox and Windows and all of these basic operating systems that were open and only a few of them to the world that we're in today, where every TV has a different operating system, every OT manufacturer has their own operating system, right? It's example I uses that is the Google, you know, the nest thermostat where you you, you buy that, you put it on the wall of your house, you pair with your network, and it's sitting right on line next to your work laptop, right? And and there's been Brit breaches shown that attacks can come in through a device like that and get on to a more more trusted asset, right? So just having that situational awareness is a big part to begin with. But, oh, teams, let's talk about OT for a couple of seconds is almost in front of us post Wanna cry? I am seeing almost every sea, so in the world not having had but the cyber responsibilities for OT being pulled into the O. T part of the business. And it makes sense. You know that the when you watch it a cry, a breach like Wanna cry? Most companies didn't think they bought something from Windows. They thought they bought a controller from Siemens or Gear, one of the larger manufacturers. What they realized on wanna cry was that those controllers have embedded versions of an old operating system from Microsoft called X that had vulnerabilities. And that's how it was exploited so that the approach of devices being online, which changing in front of us, is not just the volume of devices. But they're not open anymore. So the Agent Lis approach of allowing devices to connect to the network and then using the network to do our thing and figure out what's on it makes us a really relevant and big player in that world of coyote and don't. So >> do you have to hold their hand when they when they break the air gap and connect the TV into the Heidi to say it'll be okay. We'll be able to keep an eye on these things before you go. You know, you talk about air gaps all the time is such a kind of fundamental security paradigm in the old way. But now the benefits of connectivity are outweighing, you know, the potential cost of very >> difficult, right? I mean, one of the examples I always uses. PG and E are local power company here. We're up until a few years ago, they'd have a human being. A band would come to your house and knock on your door, and all they wanted to do is get in your garage to read your meter, right? So they could bill you correctly. And then they put smart meters on the side of our houses. And I'm sure the roo I for them was incredible because they got rid of their entire fleet as a result, but recognized that my house is Theo T grid, now connected back to the side, which is Billy. So there's just so many examples in this connected world that we're in. Companies want to do business online, but online means interconnectivity. Interconnectivity means OT and connected so Yes, you're absolutely right. There's many companies believe they have systems air gapped off from each other. Most of those same cos once they get for Scout Live recognized they actually were not air gapped off from each other to begin with. That's part of the role that we play. >> This cure is to get your >> take. You talk to a lot of sizes about how kind of the the types of threats you know have evolved more recently. You know, we saw the stuff with presidential campaign. The targets and what they're trying to do has changed dramatically over the last several years in terms of what the bad guys actually want to do once they get in where they see the value. So how has that changed? No, it's not directly because you guys don't worry about what they're trying to do bad. You want to protect everything. But how is that kind of change from the size of perspective? >> Our customers are government's financial service companies, health care companies, manufacturing companies. Because every one of those companies, I mean, it sounds basic. But if you knew the bad thing was plugged into your network, doing something bad you would've blocked it. You didn't know it was there to begin with. So we actually have a role in all types of threats. But when you look at the threat landscape, it's shifted your right. I mean, ten years ago, it was mostly I p theft. You were hearing examples of somebody's blueprints being stolen before they got their product into the market. WeII. Then soft financial threat shifted. That's still where the bulk of it is today, right? No, they ransomware attacks. I mean, they're all money motivated. The swift breaches. They're all about trying to get a slice of money and more money moves online that becomes a good hunting ground for cybersecurity attackers. Right? But what? What is now being introduced? A CZ? Well, as all the geopolitical stuff. And I think you know with, with our commander in chief being willing to be online, tweeting that with other organism governments worldwide having a more social footprint, now that's on the table. And can you embarrass somebody? And what does that mean? And can you divide parties? But, yeah, there's there's a lot of different reasons for people to be online. What's amazing is the attacks behind them are actually fairly consistent. The mechanisms used right toe actually achieve those that you know that you know the objectives are actually quite similar. >> I'm curious from the site's perspective >> and trying to measure r A Y and, you know, kind of where they should invest in, not a vest, How the changing kind of value proposition of the things that they that are at risk really got to change the dynamic because they're not just feeling a little bit of money. You know, these air, these are much more complex and squishy kind of value propositions. If you're trying to influence our election or you're trying to embarrass somebody or you know, >> that's kind of different from anything. If it's state funded sheriff, it's believed to be state funded. It typically has a different roo. I model behind it, right, and there's different different organizations. But, you know, like on the OT side that you described a second ago, right? Why is OT so hot right now? Because it's one thing to have a bunch of employees have their laptops compromised with something you don't want to be on their right. It's embarrassing. Your emails get stolen it's embarrassing. It's a very different thing when you bring down a shipping line. When a company can't shift, you know can't ship their products. So the stakes are so high on the OT side for organizations that you know, they are obviously put a lot of energy and doing these days. >> You need talk about autonomous vehicles, you know, misreading signs and giving up control. And you know what kinds of things in this feature? Right, Mike? So if we let you go, you're busy. Guy, get thanks >> for having us in the booth. What do your superiors for twenty nineteen, you know for us at Four Scout, the priorities are continuing to execute. You know, we grow our business thirty three percent. Last year. We achieved free cash flow profitability, which is the first time in the company's history. So way of obligation to our investment community. And we intend to run a good, solid business from a product perspective. Our priorities are right in the category of device visibility and control its one of things. When you look around this conferences, you know cos cos had to be careful. They don't increase their product size too quickly. Before they have the financial means to do so. And we just see such a large market in helping answer that question. What is on my network? That's our focus, and we want to do it across the extent that enterprise at scale. >> Yeah, I've sought interesting quote from you on one of their earnings calls that I thought was was needed. A lot of people complain What, you go public. You're on the ninety day shot clock in that that becomes a focus. But your your take on it was now that everything's exposed country spending an already how much spinning a marketing I'm in shipping, it sails that it forces you to really take a deeper look and to make tougher decisions and to make sure you guys are prioritizing your resource is in the right way, knowing that a lot of other people now are making those judgments. >> You know, Listen, the process of raising money and then going public is that you have to be willing to understand that you have an investment community, but you have an obligation to share a lot of detail about the business. But from the other side of that, I get a chance to sit in front of some of the smartest people on the planet that look att my peer companies and me and then provide us input on areas that they're either excited about are concerned about. That's amazing input for me and helps me drive the business. And again, we're trying to build this into a big, organically large cybersecurity business, which is a rare thing these days. And we're quite were very how aboutthe trajectory that we're on. >> Right? Well, Mike, thank you. Like just out with smart people like, you know, I appreciate it and learned a lot. So you congrats on this very much. >> Sorry. He's Mike. I'm Jeff. You're watching The Cube were in the Fourth Scout booth at RC North America. Mosconi Center. Or in the north North Hall. Just find the Seibu. Thanks for watching. >> We'LL see you next time.

Published Date : Mar 6 2019

SUMMARY :

A conference twenty nineteen brought to you by for scout. For the first time ever in the four Scout booth, we've been coming to our say for a long time. I appreciate you having me You're making acquisitions, You said it's the anniversary of going So we're feeling good about shrinking by any stretch of the imagination. But the same time the bad guys have access to many of the same tools so So the pace of adoption of the final analysis. control when you when you look at for scouts kind of core value Proposition the category that were So you guys really act in a very different way. And they bite, you know, end points and they give those to their to their employees. as opposed to having having you know an OS or having a little bug on there, You know that the when you watch it a cry, a breach like Wanna We'll be able to keep an eye on these things before you go. So they could bill you correctly. But how is that kind of change from the size of perspective? And I think you know with, with our commander in chief and trying to measure r A Y and, you know, kind of where they should invest in, not a vest, How the changing So the stakes are so high on the OT side for organizations that you So if we let you go, you're busy. the priorities are continuing to execute. and to make sure you guys are prioritizing your resource is in the right way, knowing that a lot of other people now You know, Listen, the process of raising money and then going public is that you have to be willing to understand So you congrats on this very much. Or in the north North Hall.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
MikePERSON

0.99+

SiemensORGANIZATION

0.99+

JeffPERSON

0.99+

PGORGANIZATION

0.99+

Michael DeCesarePERSON

0.99+

GeoffreyPERSON

0.99+

Last yearDATE

0.99+

San FranciscoLOCATION

0.99+

CaesarPERSON

0.99+

MicrosoftORGANIZATION

0.99+

last yearDATE

0.99+

Four ScoutORGANIZATION

0.99+

first ten yearsQUANTITY

0.99+

GoogleORGANIZATION

0.99+

ninety dayQUANTITY

0.99+

first timeQUANTITY

0.99+

thirty three percentQUANTITY

0.99+

bothQUANTITY

0.98+

lastDATE

0.98+

ten years agoDATE

0.98+

GearORGANIZATION

0.98+

todayDATE

0.98+

CubeORGANIZATION

0.98+

one hundred percentQUANTITY

0.98+

Mosconi CenterLOCATION

0.97+

this yearDATE

0.97+

oneQUANTITY

0.97+

WindowsTITLE

0.96+

twenty nineteenQUANTITY

0.96+

one thingQUANTITY

0.96+

BillyPERSON

0.95+

one hundred percentQUANTITY

0.93+

Wanna cryTITLE

0.92+

Fourth ScoutQUANTITY

0.92+

NickPERSON

0.91+

SeibuPERSON

0.91+

PresidentPERSON

0.89+

few years agoDATE

0.88+

Theo TPERSON

0.88+

four quartersQUANTITY

0.88+

fourth sightQUANTITY

0.86+

two thousand nineteenQUANTITY

0.86+

PhishORGANIZATION

0.86+

firstQUANTITY

0.83+

AmericaLOCATION

0.82+

four Scout boothQUANTITY

0.82+

FourQUANTITY

0.82+

north North HallLOCATION

0.81+

SeoPERSON

0.81+

InstagramORGANIZATION

0.8+

ChinaORGANIZATION

0.8+

2019DATE

0.79+

MosconiLOCATION

0.78+

LenoxPERSON

0.77+

a couple of minutesDATE

0.74+

RussiaORGANIZATION

0.72+

CubeTITLE

0.69+

EORGANIZATION

0.69+

Scout LiveTITLE

0.69+

of SockORGANIZATION

0.69+

USORGANIZATION

0.68+

last several yearsDATE

0.68+

NorthORGANIZATION

0.67+

TwentyQUANTITY

0.65+

decadesQUANTITY

0.63+

ScoutORGANIZATION

0.58+

every weekQUANTITY

0.57+

couple of secondsQUANTITY

0.56+

wanna cryTITLE

0.56+

TamasPERSON

0.55+

RCLOCATION

0.55+

VillanovaLOCATION

0.54+

RSAEVENT

0.54+

nineteenDATE

0.51+

CenterORGANIZATION

0.5+

second agoDATE

0.5+

Gala GrasshopperTITLE

0.5+

BritOTHER

0.49+

MaurORGANIZATION

0.49+

Donnie Williams & Eric Herzog | Cisco Live EU 2019


 

>> Live from Barcelona, Spain. It's the cue covering Sisqo Live Europe, brought to you by Cisco and its ecosystem partners. Welcome back >> to Barcelona. Everybody would adapt. Wrapping up day one of Sisqo live Barcelona Cube coverage. I'm David. Long day. He's stupid men. You're watching the Cube. The leader in live tech coverage. Donnie Williams is it director at Scott Equipment out of Louisiana. And Eric hurts August back. He's the CMO of IBM storage. Gentlemen, good to see you. Welcome. >> Thank you for having us. >> You're very welcome. So tell us about Scott equipment. What do you guys do? Look, what's the company all about were >> a heavy equipment dealer, So we've been we've been in the business for eighty years, privately owned company. And so we're we're We started out and farm implement eighty years ago by the founder, Thomas Scott, which is where the name Scott equipment comes from. And so we transition over the years, Teo construction equipment, Andi were now back in two thousand fourteen, we sold all of our the farm stores that handled all of that equipment. And now we're We're strictly servicing the construction industry and petrochemical in >> history. So your dealer of exactly what equipment and your services as well? >> Yes. We service that we were primarily a rental company. First then then we We also sell what we rent. We service service it and and also parts as well. So we're talking massive? Yes, they got. If you if you think our one of our main lines is Volvo, which you have you have you seen the show? Gold rush that that Volvo equipment you see there, that's that's what we sell. So is incredible machine. Yeah, Yeah, they are. Hada chance tio to play with one. I went Teo Shippensburg, Pennsylvania. Where were their North America offices and had a chance to play with their largest excavator? That was That was >> fun. So is a lot of your Senate on sort of the maintenance business in the service business? >> Yes. So we were just mostly. Mirror is like a car dealership. If if you so we were like I said, we do sale service parts, all of that. >> So the business flow starts after the sale is made on >> exactly. Yes. We still like, Yeah, exactly. We get. We get equipment out there in the in the in the territory, and then the revenue continues tio to come in. >> So what are some of the challenges? The external challenges that are driving your business? You really >> are. The whole heavy equipment industry is It's kind of behind the times in my from a dealership perspective from from a manufacturer perspective there. They're somewhat up with technology, especially especially Volvo. But from a dealership there, there might mainly privately owned. So they're not there's not a whole lot of resource is in, and ah, in technology they don't. That's not a focus for them that they're they're focused on the business side of it. So what? We we're not When I first started the company ten, eleven years ago, now there was one guy servicing six hundred employees and and it was one eyed person, one i t person. So, as you can imagine, it was, it was a nightmare. Go. I mean, it's not the guy's fault. I don't blame him at all. Is this Is this the way that they had done business and not change bombed out, >> right? Exactly. Yeah. Guys >> find them. >> So their customer of ours for the versus stack, we have, ah, partner that they've been buying their IBM in their Cisco gear from. And then when they were doing a modernization effort, the reseller talk to Scott and said, Dani, what do you think? How about doing this? Converge infrastructure. Easier to play. It's after. So it all came through their existing channel. Part of that they were using for both IBM gear and Cisco Gear. >> So you wanted a solution. That one guy could run, right? We've now at least growing that company to house. We have six total in our in our department. So we've changed a lot since I started the eleven years ago. >> And why are they spending their time doing what? Premier >> Li? We do a lot of help desk on systems administration way do mostly, uh, are My focus is to make sure that our employees are satisfied that so they could take care of the customer, and that's that's the primary goal. And along with that comes comes systems administration. A cz. Well, so, But, >> you know, a full stack like this. I mean, the joke. You need more than one person, but it's going to be simplified. You know what you're buying, right? Predictable. And therefore, you shouldn't need to be seen on a basis. >> Yes, I like keeping things simple. Simple as possible. So that makes that makes my job easier. It makes my team's job easier. What >> kind of >> things you driving? Is it? You know, data protection, is it? You know what? What? What? What sort of, you know, use cases do you have on your stack >> on that Were from our were servicing on our with Francisco verse. Sorry versus stack. We are mostly it is all profit cloud were servicing applications. That's the supplement. Our court system. So we have reporting solutions. We were when we first bought it. The vs stack way were considering moving to another Air P system. Oh, and we would have that that infrastructure in place tio migrate to that. So we see what we still have that that actually on the table as a as an option >> for us, but the migration to a new Europe E system. Yes, we should talk afterwards. No, you >> were warning that it >> all about you. Of course, you don't want to convert if you don't have to write. But sometimes there's a business case. Sometimes it's hard to make you talk. Cloud in your in your future president were doing some that's ass stuff. >> Yeah, a little of that. I mean, anything. I mean things that that makes sense for us to to cloud I security services we're doing. Of course, probably most common is hosting email. Were doing a lot of that share point that that type of solution in the cloud >> How long you been with the company? Eleven years. Eleven years. Okay, So, thinking about the last decade, I mean, it's a lot of lot has changed. Yes. What's your What do you most proud of? What you like your biggest success that you can share with us. Oh, >> really? Building my the that dude the I T department and bringing our company into the twenty first system century from a from a technology perspective. I mean, like I said, we had one person that was that was handing. It was really impossible. I mean, you couldn't depend. Depends on one person. And and and, yeah, expect the company's or saw survive long term. Yeah, That one person had to say no a lot. Exactly. Right. Why would he? Just couldn't get everything >> done right? So that really that modernization? Yes, I know where you guys >> can. Ninety Mater, My team modernization play. The versus stack is heavily used for that. And, you know, as we said, on the earlier and every we had to see ESPN, we've also used it to do you know, to the next level from a night transformation to the future. Because in that case, as you know that was a CSP who uses it to service. You know, hundreds of customers all across the UK in a service model. And in this case, this is more of a mighty modernization. Take the old stuff, upgraded to what it was. They even have old IBM blade servers. That's how old the stuff wass old, actually, six played servers that must have been ten years old before they went to the Versus Stack. >> How many people in the company >> right now? We've actually sold off side since I've been with the company we sold off. Some of our non performing business units were probably roughly around five hundred fifty now. Okay, so I mean, we're Ah, we're actually more profitable now than we were eleven years ago from Ah, I mean, we have less employees, but our profitability is actually exceeded >> the name of simplification. Exactly. Right. So what's the biggest challenge you face Is the head of it today? The biggest, Probably >> the biggest challenge would be me wanting to implement technologies. They're not really not ready. I want it. I want tohave the competitive edge, that of the industry. I want to be able to be ahead of of the ahead of the curve. Uh, and that's probably the probably biggest challenge. And you're >> saying you can't Because the tech is ready or skills >> is just is just the industry just trying Teo. I work with vendors and getting getting them to be ready for I say, vendors, manufacturers, they're our vendors. Toe Get them Tio and other dealers as well. Teo Teo Albee. Acceptable to technology that's been there twenty years. >> What would you say is the but the top number one or the top things that IBM has done to make your life easier? And what's the one thing they could do that they're they're not doing that could make your life easier. What's the start with what they've done? You know whether successes, you know that >> really? Really. I mean, we've been a long time IBM customer. We have not, not just the versus Stack, but we also have the power system, which were actually runs are our core AARP. Um, okay. And so that we had long standing relationship with IBM, and the reliability is there. The trust is, >> there's well, a long term partnership. But what's the one thing they could do? One thing that you could If you could wave a wand and IBM will do x what would x B to make your life better? Uh, cut the price way. Go >> way. I should have prefaced that something that size >> on that topic. But you know, the power system thing brings up. You know, our friend Bob. Pity on who's running the cognitive systems group now You guys do with some stuff in a I talked about that a little bit. >> So what we've done is two things. First of all, we've been beauty inside of our system's ai ai all over the place. So, for example, we tear data which can weaken due not only to our own array, but literally two four hundred forty rays that have someone else's logo on them. It's all a eye dunce. When the data is hot, it's on the fastest here. So if you have fifteen thousand rpm drives in seventeen hundred rpm drives, it goes to fifteen thousand. When it cools off A. I automatically moves that the storage admin does nothing. You don't set policies, A takes care. We have flash and you have hard drive's same thing. It'll move around and you could have on IBM array talking to any AMC array. So all sorts of technology that we implement, that's a I in the box. Then, on top of that, what we've done is come up with a Siri's of a reference architectures for storage, as one of the critical elements in the platform. So we've done is create what we call a data pipeline. It involves not only our storage raise, but four pieces of our software spectrum scale, which is giant scale out file system, in fact, to fastest super computers in the world have almost half an exabyte of that software storage. With that software, our spectrum discover which we announced in queue for which is all about better management of metadata. So for a I workloads, big get anally work loves the data scientist doesn't prep the data. They can actually talk to what we do, and you could create all these meditate a template, then boom. They run a a ay workload on Thursday and then run a analytic workload on Friday. But all automated our archive and then our cloud objects towards. So all that is really think about it. Maura's an oval because when you're doing an A I system, you're constantly learning. So the thing you got to do is one you've got to have high performance and be ableto handle the analytics, which we do on flash. Okay, so the flashes connected, you've got to be able to move the date around. And part of thing with the spectrum Discover is that we can talk through an A P I to a piece of a AI software two piece of analytic software to piece of big data software, and they can literally go through that. AP I create templates for the metadata and then automatically suck what they need into their app and then munge it and then spirit back out and then obviously on the archives side, you want to be able to quickly recall the data, because if you think about a I system, it's like a human. So it's giving my Russian example. So I'm old enough. When I was a kid, there were bomb shelters in my neighborhood that people dug in the backyard. Then we have, you know, Nixon lightening up with the Chinese and we have Reagan and Gorbachev next, You know, the wall comes down right then. Next thing you know, there's no longer Soviet Union. All of a sudden, no, the Russians might get a little aggressive, even though they're no longer communist. And now, you see, depending on which political party. Either they're totally against us where they're totally helping us. But, you know, if they really were hacking systems whose whatever political party urine, they really were hacking our system, tried to manipulate the election pro or con. The point is, that's kind of like a cyber attack, and that's not a good thing. So we learn and it changes. So when a I system needs to understand and change constantly, learn. If all of a sudden you have flying cars, that's going to be different than a car with tires. Now, a lot of it, maybe the same, the interior, all the amenities. But the engine is going to be different. And there are companies, including the big Big three, four five who are actually working on flying cars, knows it will happen. But the A I system needs to understand and learn that and constantly learning. So the foundation has to be heavily resilient, heavily performance, heavily available, lasting one is an A I system going down on you, especially if you're in health care or big giant manufacturing. Like Volvo, his customer. When they're building those cranes and things, they must cost fifty sixty million dollars at that assembly line goes down its prey a big deal for them. So you need a I systems that always keep your other systems up and running. So you have to have that solid foundation storage underneath. >> Awesome. All right, we got to leave it there. Give the customer the last word. Donnie. First time in Barcelona, right? Yes. It ISS how you find in the show and the >> syphilis is awesome. This's my, actually my fifth, uh, Cisco lifers our first time in Europe, so yeah, enjoying it. >> Good. Good. Well, thank you, guys. For German of the >> correct. Thank you. Have you appreciate it? >> You're welcome. Alright. Keep right there, everybody. We'll be back to rap Day one. Sisqo live Barcelona watching you.

Published Date : Jan 29 2019

SUMMARY :

Sisqo Live Europe, brought to you by Cisco and its ecosystem partners. He's the CMO of IBM storage. What do you guys do? the construction industry and petrochemical in So your dealer of exactly what equipment and your services as well? Gold rush that that Volvo equipment you see there, that's that's what we sell. So is a lot of your Senate on sort of the maintenance If if you so we were like I said, we do sale service parts, the in the in the territory, and then the revenue continues tio to Go. I mean, it's not the guy's fault. right? to Scott and said, Dani, what do you think? So you wanted a solution. We do a lot of help desk on systems And therefore, you shouldn't need to be seen on a basis. So that makes that makes my job So we see what we still have that that actually on the table as a as an option No, you Sometimes it's hard to make you talk. Were doing a lot of that share point that that type of solution in the cloud What you like your biggest success that you can share with us. I mean, you couldn't depend. to do you know, to the next level from a night transformation to the future. now than we were eleven years ago from Ah, I mean, we have less employees, So what's the biggest challenge you Uh, and that's probably the probably biggest challenge. is just is just the industry just trying Teo. You know whether successes, you know that And so that we had long standing relationship with IBM, One thing that you could If you could I should have prefaced that something that size But you know, the power system thing brings up. So the thing you got to do is one you've It ISS how you find in the show and the uh, Cisco lifers our first time in Europe, so yeah, For German of the Have you appreciate it? We'll be back to rap Day one.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
IBMORGANIZATION

0.99+

Donnie WilliamsPERSON

0.99+

DaniPERSON

0.99+

DavidPERSON

0.99+

EuropeLOCATION

0.99+

BarcelonaLOCATION

0.99+

LouisianaLOCATION

0.99+

VolvoORGANIZATION

0.99+

CiscoORGANIZATION

0.99+

Eric HerzogPERSON

0.99+

GorbachevPERSON

0.99+

FridayDATE

0.99+

ReaganPERSON

0.99+

fifteen thousandQUANTITY

0.99+

AugustDATE

0.99+

BobPERSON

0.99+

ScottPERSON

0.99+

eighty yearsQUANTITY

0.99+

Thomas ScottPERSON

0.99+

DonniePERSON

0.99+

ThursdayDATE

0.99+

six hundred employeesQUANTITY

0.99+

EricPERSON

0.99+

fifty sixty million dollarsQUANTITY

0.99+

UKLOCATION

0.99+

Scott EquipmentORGANIZATION

0.99+

fifthQUANTITY

0.99+

SiriTITLE

0.99+

FirstQUANTITY

0.99+

twenty yearsQUANTITY

0.99+

Barcelona, SpainLOCATION

0.99+

one guyQUANTITY

0.99+

Eleven yearsQUANTITY

0.99+

oneQUANTITY

0.99+

eighty years agoDATE

0.99+

two thingsQUANTITY

0.99+

North AmericaLOCATION

0.99+

first timeQUANTITY

0.98+

SenateORGANIZATION

0.98+

todayDATE

0.98+

around five hundred fiftyQUANTITY

0.98+

First timeQUANTITY

0.98+

bothQUANTITY

0.98+

eleven years agoDATE

0.98+

two thousand fourteenQUANTITY

0.98+

one personQUANTITY

0.98+

hundreds of customersQUANTITY

0.97+

more than one personQUANTITY

0.97+

six played serversQUANTITY

0.96+

One thingQUANTITY

0.96+

Day oneQUANTITY

0.96+

NixonPERSON

0.96+

firstQUANTITY

0.95+

ESPNORGANIZATION

0.95+

last decadeDATE

0.95+

one eyed personQUANTITY

0.94+

two four hundred forty raysQUANTITY

0.94+

day oneQUANTITY

0.94+

Europe ELOCATION

0.93+

seventeen hundred rpm drivesQUANTITY

0.93+

AMCORGANIZATION

0.93+

four piecesQUANTITY

0.92+

one thingQUANTITY

0.91+

fifteen thousand rpm drivesQUANTITY

0.9+

two pieceQUANTITY

0.88+

tenDATE

0.87+

TeoPERSON

0.87+

RussiansPERSON

0.86+

TeoORGANIZATION

0.86+

AndiPERSON

0.86+

FranciscoPERSON

0.85+

fourQUANTITY

0.83+

ten years oldQUANTITY

0.82+

Adam Burden & Chris Scott, Accenture | AWS Executive Summit 2018


 

>> Live from Las Vegas, it's theCUBE covering the AWS Accenture Executive Summit. Brought to you by Accenture. >> Welcome back everyone to theCUBE's live coverage of the AWS Executive Summit here at the Venetian in Las Vegas, Nevada. I'm your host, Rebecca Knight. We have two guests for this segment, we have Adam Burden, Chief Software Engineer at Accenture and Chris Scott, AWS North America Lead. Thank you both so much for coming back on theCUBE for returning. >> Sure, thanks for having us. >> Awesome, thanks. >> So we're talking today about future systems. So, in the past, when Accenture has talked about this, it's talked about the future of applications, future applications, now it's future systems. What are we talking about first of all? >> Sure. >> And why the switch? >> Look, it's actually a key question for us, and I think that we aspire to be to our clients thought leaders about where we believe that the technology landscape of tomorrow is heading. To help give them guidance about the path that they should chart their own systems on today. And we wrote kind of a seminal paper several years ago, called The Future of Applications, and it laid out different strategies that our clients, we recommended to our clients that they follow in order to build the technology systems of tomorrow. And in it, we have three characteristics, liquid, intelligent, and connected. And the outcome from that was great. It was an inspiration for many of them to build their future technology landscape and that language of liquid, intelligent, connected from a white paper was written five years ago has really entered the lexicon of many of our clients in industry. Now, however, they've seen the success, but they want to be able to do that truly at scale. They want to be able to take advantage of applications and the way that they're built and designed for tomorrow, but do that at an enterprise wide scale. And we felt like it was a time for us to go back and reflect upon what we had wrote about as the future of applications, and said, let's think about how systems, three years on, four years on, are going to be built for tomorrow. And that's exactly what we did in future systems. So future systems, you can look at it as a compass for how they'll continue to chart their path to be able to scale the new and close something that we call the innovation achievement gap. And this innovation achievement gap is really kind of the diagnosis that we put on there of where, they've seen success in pockets of innovation across their enterprise, but they want to be able to have that occurring across all of their businesses simultaneously. And we believe that following some of the prescriptive advice that we provide in future systems, that clients, our clients, would be able to do exactly that. >> So I want to dig into that research a little bit and you said, liquid, intelligent, connected. Those really became part of the vernacular. This year, it's three new-- >> Three new ones that's right! >> Three new ones, boundaryless, adaptable, and radically human. These are the characteristics that you say are the secret sauce for a successful system. >> That's right. >> So, let's get into these a little bit, let's start with boundaryless. >> Sure, boundaryless is great to talk here about, reinvent, because it really is all about cloud and how you use cloud. But before I get ahead of myself, and really define about what boundaryless is. Naturally, it's about breaking down barriers between systems, between businesses, and between humans and machines. And the successful companies that do this can really quickly respond to the market 'cause their systems are very agile and can react. There are really two really important elements to boundaryless, first is cloud. Being able to leverage cloud not just as a data center, but as an innovation platform to be able to do more, leveraging the great services from AWS, like Lambda and API Gateway and across the entire stack of AWS services and leveraging automation and really getting beyond infrastructure, to treating it infrastructure as code with an environment is an important component of that. The second is decoupling. It's decoupling applications and data. For years, we designed systems and the data that's part of that system would remain within that system. But you didn't get the value out of it by linking that across various parts of the organization. So it's important to decouple that data and application and give that access to other parts of the organization. The other important part is decoupling applications from legacy infrastructure. I talked a little bit about infrastructure as code. That's an important component of it. And lastly, it's decoupling integrated systems into loosely coupled applications and systems. And that's important because you develop components that you can share across the organization. You do really well for one system, you want to share that component across other systems in the organization. So Adam and I were talking a little bit about boundaryless and different examples that we've seen in working with our clients. Adam had a really good one that he was talking about before. >> Yeah, so this, I think this characteristic kind of sets the foundation for how future systems are going to be constructed and when you think about the restrictions that you perhaps even falsely place on applications today by sort of limiting how they can actually expand or grow or scale over time, you're limiting the potential growth of your business, and that's why we think it's so important that as you're designing and building systems of tomorrow and we're working with a client right now who is rethinking their loyalty program, it's Cathay Pacific, a big airline. >> We're going to be speaking with them later on theCUBE. >> Yeah, and it's a remarkable story and you're going to get a lot of details of this later, but what I really love about this is they've embraced this concept of boundaryless by introducing blockchain technologies in cloud into how their loyalty points program is going to work in the future. So whether they have 10 partners, 1,000 partners, or 10,000 partners in there, the way that they've constructed their system is it is going to elastically scale to be able to support all that, and it's going to make it faster and better with higher quality than ever before for them to onboard new partners and even more importantly, serve their mile point program customers better. So great example of boundaryless and how the systems of tomorrow are going to be built. >> And particularly because you said that that was a big challenge, that it's not only not communicating with your partners, but it's also not communicating within the business, the different units not talking to each other. >> Exactly. >> So let's move onto adaptable, and adapt, you think every system's got to be adaptable, duh! But what do we need, let's break it down. >> It's actually, you know, this is a really interesting challenge for us and you're starting to see the early stages now of systems and technologies that can embrace these characteristics. Basically what we mean by adaptable is that these are systems that autonomously change. They anticipate, for example, new loads or performance expectations or they anticipate certain changes in user patterns or behavior and actually reorganize themselves without you telling them to do it. So they're taking advantage of trusted data and artificial intelligence and other elements so that they can perform better and that you can focus more attention on the business value that's delivered on top of them. A great analogy that I've used for this is imagine you've got kind of two gears that are turning towards each other, right? And one gear has like a really big tooth on it and you can kind of see it coming and it's going to wreck the other gear when it gets there. Well, imagine that gear sort of sees that coming and adapts, and says, oh, okay, I can make this area wider, and that tooth will fit right in there. That's what adaptable is all about, is it's looking at what's happening around it and it's adjusting itself so it can perform better in the enterprise instead of falling over. And that makes your systems more reliable, it makes your customer experiences better and allows you to have systems that will make you one of these high performers of tomorrow. >> Anticipating and adapting? >> Anticipating and adapting, exactly right. >> Finally, the final characteristic, radically human, I love this. Define what it is, and then I want to talk about the kinds of companies that you've seen do this best. >> Yeah, radically human, I love the term too. I think it's great, and it's really about creating systems that are simple, they're elegant, but they're also immersive to our customers. Natural language processing, computer vision, machine learning are all important components and it's really about how these systems listen, they see, they can adapt, they understand what's going on just like people do. And it's interesting that technology's become so invasive in our lives, but it's also become invisible and it's woven into the fabric of what we do, with digital assistants and all the things that are out there today. It's such an important part of what we do. So it's important to create systems that are aligned to the users, and this is created an interesting inversion. We would design systems in the past that would gather requirements and then eventually, when the system went live, you'd have to train all of the users how to use that system and you would have to adapt the user to the system. Now what we're talking about is developing systems that can adapt, to the adaptable point that Adam mentioned, but really change to work better for the users. We were talking a little bit before as well about Amazon Connect, and a great example of this is leveraging Connect and omnichannel capabilities to allow customers to interact with customer service and businesses the way they want to interact. Whether that's via phone or through online or text message, find the right medium to get them the right answers as fast as possible. A great example of this is a client we're working with, Mutual of Omaha, who's going to be here on theCUBE and we've done a breakout session with them. They've been through this whole journey and they've really gotten much better customer engagement through this. >> So it's not necessarily feeling that your technology is mimicking a human, it's really just the technology is what you, the human, want it to be, in whatever format, I mean, is that right? >> That's a really interesting way of putting it. It's about so many times, and there's examples all around us, where people have kind of adapted to technology rather than us adapting to, or rather than that, technology adapting to us. I mean, even the keyboard, I have right here, right, the keyboard? This keyboard and the layout was invented in 1870, okay? And it was invented in a way to actually slow down typists so that the arms wouldn't get stuck on it. I mean, why are we still suffering with a keyboard that limits how fast we can type this many years later. And that's the point we're trying to make with radically human, is that we should be thinking about how technology is designed around people rather than the other way around. >> So that's a real cultural shift that has to take place within companies, so what are some of the best practices that sort of how companies can become more radically human and their systems become more radically human? >> Well, look, there's human-centered design, is a really important aspect of it, and then a lot of great emerging thought in that space. We think that design thinking contributes a lot to kind of really thinking from the very beginning about how do we build applications or technology systems in the future that are going to work with people so it's human plus machine, not human versus machine. And we think the outcomes that you get from embracing some of those approaches allow you to build solutions and design them that are much more radically human in the future. And this is really important. You're going to be more productive, more effective, your workforce is going to be happier, your customers are going to be happier, and they're going to be more engaged. And there's a paradox here too. Is it the more we do this, actually the less you'll see of the technology, because it'll become embedded in the things around us. So maybe, I've actually written some things in the past that says AI is the new UI, and the end of screens, right? So maybe it doesn't really mean the end of screens, but we're going to see a lot less screens because it's easier for people to hear information, sometimes, than it is to actually see it. >> Right, this is really fascinating stuff. Thank you both so much for coming back on theCUBE for these great conversation. >> Oh, we're happy to, thank you, Rebecca. >> Adam and Chris, thank you. >> Thank you. >> I'm Rebecca Knight, we will have more of theCUBE's live coverage of the AWS Executive Summit coming up in just a little bit. (techno music)

Published Date : Nov 28 2018

SUMMARY :

Brought to you by Accenture. of the AWS Executive Summit here at the Venetian it's talked about the future of applications, and it laid out different strategies that our clients, and you said, liquid, intelligent, connected. These are the characteristics that you say a little bit, let's start with boundaryless. and across the entire stack of AWS services and when you think about the restrictions and it's going to make it faster and better with higher quality that it's not only not communicating with your partners, you think every system's got to be adaptable, duh! and that you can focus more attention the kinds of companies that you've seen do this best. and businesses the way they want to interact. so that the arms wouldn't get stuck on it. in the future that are going to work with people Thank you both so much for coming back on theCUBE I'm Rebecca Knight, we will have more

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
AdamPERSON

0.99+

Rebecca KnightPERSON

0.99+

Adam BurdenPERSON

0.99+

Chris ScottPERSON

0.99+

RebeccaPERSON

0.99+

AccentureORGANIZATION

0.99+

10 partnersQUANTITY

0.99+

twoQUANTITY

0.99+

1,000 partnersQUANTITY

0.99+

1870DATE

0.99+

ChrisPERSON

0.99+

two guestsQUANTITY

0.99+

AWSORGANIZATION

0.99+

Cathay PacificORGANIZATION

0.99+

10,000 partnersQUANTITY

0.99+

This yearDATE

0.99+

three yearsQUANTITY

0.99+

Las VegasLOCATION

0.99+

one gearQUANTITY

0.99+

one systemQUANTITY

0.99+

AmazonORGANIZATION

0.99+

four yearsQUANTITY

0.99+

VenetianLOCATION

0.99+

firstQUANTITY

0.98+

tomorrowDATE

0.98+

secondQUANTITY

0.98+

five years agoDATE

0.98+

two gearsQUANTITY

0.98+

The Future of ApplicationsTITLE

0.98+

Las Vegas, NevadaLOCATION

0.97+

several years agoDATE

0.97+

bothQUANTITY

0.97+

AWS North AmericaORGANIZATION

0.97+

LambdaTITLE

0.97+

AWS Executive SummitEVENT

0.95+

Mutual of OmahaORGANIZATION

0.95+

API GatewayTITLE

0.95+

todayDATE

0.95+

AWSEVENT

0.95+

Three new onesQUANTITY

0.91+

many years laterDATE

0.88+

theCUBEORGANIZATION

0.86+

Accenture Executive SummitEVENT

0.81+

three characteristicsQUANTITY

0.81+

Executive Summit 2018EVENT

0.73+

three newQUANTITY

0.72+

important elementsQUANTITY

0.71+

yearsQUANTITY

0.66+

pointsOTHER

0.54+

ConnectCOMMERCIAL_ITEM

0.44+

Keynote Analysis | NetApp Insight 2018


 

>> Announcer: Live from Las Vegas, it's theCUBE, covering NetApp Insight 2018. Brought to you by NetApp. >> Welcome to theCUBE, we are live at NetApp Insight 2018, I'm Lisa Martin and I'm joined by Stu Miniman. Stu and I are going to be here all day. And this is the third annual Insight, with customers and partners and NetAppians and analysts and press. Stu this is the second time theCUBE has been here. We just came from the keynote and the interesting thing that Stu, that you and I both noticed, was at least the first 75 minutes of the keynote that we got to see today, none of the product news was announced. It was really about strategy, #datadriven, how NetApp wants to enable their customers from DreamWorks to oil and gas companies, health care, etc. To use data, develop a data strategy, to move their businesses into the digital age. >> Yeah, Lisa, first of all, great to be working with you again. >> Always. >> And I'm excited, it's second year that we've been at this show, third of the NetApp Insights that we've done. Cause we've done both the U.S. and the European shows. My first time actually coming to a NetApp event. I remember, gosh I'm showing my age, I remember when NetApp started, network storage was becoming a thing. NetApp really rose its ascendancy with file systems and NAS, and FAS was the one operating system to rule them all, really grew into a very sizable business. Company's about $6 billion worth of revenue and I think somewhere about 10,000 employees. Today, NetApp is really the largest independent storage company after Dell took EMC off as an independent now, so it's interesting to watch. George Kurian got on stage and talked about digital transformation. And one of the things I'm really interested in looking at is how is NetApp doing in that transformation? Because, most people when I was talking to some customers at some of the meals and walking the floor and things like that it's, NetApp is my filer company. I buy boxes, sometimes I mine some software and there's some things there, but I'm the guy that runs NetApp Gear, if you will. And that transformation, what is the NetApp of 2019 and beyond? Are they a storage company? Are they a hybrid, multi-cloud software led something something company in the future? Are they a services company? There's a nice ecosystem here, so that's what I'm excited to dig into. George Kurian he in the keynote this morning, laid out the four things that companies need to do for digital transformation. It's something we'll dig into, but yeah, I had to go search NetApp on the news release and be like, oh Cloud Insights, and ONTAP in the Cloud, and HCI and Partnership News and things like that, so there definitely is some news, they just didn't talk about it in the keynote. >> Yeah, it was an interesting keynote for me, and as theCUBE we go to a lot of keynotes, many times a year, and this was an interesting start to it. It's clear from the NetApp messaging on NetApp.com, NetApp Insight, things that are being put out on media that they're really putting cloud at the heart of their strategy. The discussions and the keynote this morning included futurist Gerd Leonhard, who's going to be on the program with us in just a few minutes. Interesting take on data, humanity, the only thing that NetApp talked about was about 75 minutes minutes into they keynote this morning was when Anthony Lye got on, he's going to be on the show later today, talking about the data fabric. And I think some of the messages that NetApp was wanting to get out is that data fabric is transforming from a vision into an architecture kind of foundationally to enable organizations to employ those four principals of digital transformation that George Kurian talked about. Digital transformation requires IT transformation, speed is the new scale, some interesting thoughts and concepts there, more conceptual. I liked the DreamWorks customer, I think she's a great speaker. Kind of talked also about how DreamWorks, everybody knows DreamWorks, "Shrek", "How to Train your Dragon", are becoming more morphing from a customer to an engineering partner. So that was and interesting kind of, I wouldn't even say undertone, but part of the story today. >> You know, Lisa, absolutely. When you look at traditionally, not only NetApp, but all the storage companies, where they sold to. It was the storage budget, and oh how do I manage with the explosion of data, and that growth and what's the performance, the speeds and feeds, the price per terabyte, all that kind of stuff? I thought we could actually take George Kurian's four characteristics and say, how's NetApp doing? First is digital transformation requires IT transformation. >> (Lisa) Right. >> I heard yesterday in some of the sessions they actually had some of NetApp's IT people talk about how they're leveraging and using new technologies. We talked about speed is the new scale, well how fast is NetApp? We have a number of acquisitions. There was the big SolidFire acquisition which is now fully part of the portfolio. They had a Kubernetes company that they bought recently. They've had management companies that they bought. How fast is NetApp keeping up with the pace of what they're doing? Hybrid multi-cloud, I think NetApp first of all was really what you would call software-defined before that was a thing, and they were very early in jumping on this wave of we need to play in the cloud environment. Most of the storage companies really lined up and was like, oh wait, Amazon's the competition, you can't do that, but NetApp was partnering with Amazon for many years, now I'd like to see more proof points as to what customers are doing, how are they doing it differently. But absolutely we're going to have Microsoft Azure on the program with Anthony Lye, this afternoon. I know we're going to be talking about Amazon, we're going to be talking about Kubernetes and Istio, where does NetApp fit into that environment? I've been going to theCUBE Con shows for a couple years, and storage is actually lagging in that space. When you talk about having persistent data, that's not something we're there with. We spent more than a decade trying to fix storage and networking in the virtualized environments, and NetApp played a strong role in helping on the storage piece there. So it would be great to see how they are going to play into the Kubernetes and issue discussion. And the last piece is they said moving from data center to data fabric. >> Right. >> Which is the closest tie to the products as you said. >> (Lisa) Yes, exactly. >> To what they're doing. >> Well, Stu we have a jam-packed schedule today, all day. We're going to be able to unpack a lot of things from NetApp, execs, to their branding folks, to customers, so Stu and I will be right back with our next guest. Again, theCUBE Live from NetApp Insight 2018. We'll be right back. (music)

Published Date : Oct 23 2018

SUMMARY :

Brought to you by NetApp. none of the product news was announced. Yeah, Lisa, first of all, great to be working with you George Kurian he in the keynote this morning, laid out the the only thing that NetApp talked about was all the storage companies, where they sold to. And the last piece is they said moving from data center to We're going to be able to unpack a lot of things from NetApp,

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Gerd LeonhardPERSON

0.99+

George KurianPERSON

0.99+

Anthony LyePERSON

0.99+

AmazonORGANIZATION

0.99+

Lisa MartinPERSON

0.99+

LisaPERSON

0.99+

StuPERSON

0.99+

DellORGANIZATION

0.99+

EMCORGANIZATION

0.99+

DreamWorksORGANIZATION

0.99+

Stu MinimanPERSON

0.99+

2019DATE

0.99+

yesterdayDATE

0.99+

KubernetesORGANIZATION

0.99+

first timeQUANTITY

0.99+

Las VegasLOCATION

0.99+

NetAppORGANIZATION

0.99+

TodayDATE

0.99+

second yearQUANTITY

0.99+

FirstQUANTITY

0.99+

about $6 billionQUANTITY

0.99+

second timeQUANTITY

0.99+

thirdQUANTITY

0.99+

bothQUANTITY

0.98+

MicrosoftORGANIZATION

0.98+

How to Train your DragonTITLE

0.98+

first 75 minutesQUANTITY

0.98+

todayDATE

0.97+

oneQUANTITY

0.97+

SolidFireORGANIZATION

0.97+

ShrekTITLE

0.97+

more than a decadeQUANTITY

0.97+

NetAppiansORGANIZATION

0.97+

IstioORGANIZATION

0.96+

about 10,000 employeesQUANTITY

0.96+

third annualQUANTITY

0.96+

NetApp Insight 2018EVENT

0.96+

later todayDATE

0.95+

NetAppTITLE

0.95+

this morningDATE

0.94+

HCIORGANIZATION

0.94+

firstQUANTITY

0.91+

U.S.LOCATION

0.91+

theCUBEORGANIZATION

0.89+

this afternoonDATE

0.89+

about 75 minutes minutesQUANTITY

0.84+

NetApp InsightORGANIZATION

0.84+

four characteristicsQUANTITY

0.82+

KubernetesTITLE

0.81+

ConEVENT

0.77+

AzureTITLE

0.74+

EuropeanOTHER

0.74+

NetApp GearTITLE

0.67+

couple yearsQUANTITY

0.66+

NetApp InsightTITLE

0.65+

one operatingQUANTITY

0.64+

NetApp Insight 2018TITLE

0.57+

Larry Cutler | Samsung Developer Conference 2017


 

>> Narrator: From San Francisco, it's The Cube. Covering Samsung Developer Conference 2017, brought to you by Samsung. (upbeat music) >> Okay, welcome back, everyone. Live here, in San Francisco, for day two. We're winding down day two of two days of wall to wall coverage, The Cube's exclusive coverage of Samsung Developer Conference. I'm John Furrier the founder, co-founder of SiliconANGLE Media (mumbles) the Cube our next guest Larry Cutler, co-founder and CTO of Baobab Studios. >> You got it right. >> And you're co-founder and CEO Maureen Fan was at our Grace Hopper event. >> Larry: Yes. >> Well thanks for joining us. >> Thank you for having me. >> So you guys are doing great. Love the story-telling, gaming, tech culture coming together here at Samsung. >> Yep. >> And seeing the future. The future, if you connect the dots, is augmented reality voice-activated, headphones that can be hacked and programmed and customized. You guys are doing some interesting things, you've got some good awards. Take a minute to talk about your studios. What are you guys doing, what's the aha moment for you guys. What should people know? >> So we at Baobab Studios, we're reinventing animated storytelling using VR. And so what we've, our aha moment was feeling that you could completely immerse yourself in the world in VR. And when we started thinking about well what is so special about an animated film, it's really about transporting you to faraway worlds, and making those worlds so real that you could like reach out and touch them. And then if you think about VR, that's kind of the same thing, where VR's promise is being able to transport you to incredible places and to make you really feel like you're in those worlds and you're part of those worlds. >> And to relax and chill a little bit too. >> Well relax and chill as well. >> Or entertainment or to be thrilled. >> So in our case we wanted to take all the experience that we have telling stories at places like Pixar and Dreamworks and apply that into this new medium. And so we found that VR is an incredibly powerful medium, and it really is one that's unlike film and unlike games. So, you're talking about bringing together the expertise of people from films, and people from games. That's critical to what we're doing, and yet at the same time, the experience is something that's totally different. >> Yeah we were commenting with some of our guys in our office how Twitch was experimenting with using the comments to drive the game behavior. You start to see new kinds of game systems develop around the storytelling as more of a behavioral dynamic, not the boring game I figured out, or the multi-player game with my same friends, or whatever that's going on, you're seeing a whole new level of creativity going on, one. Two, the other question is how much does it cost to make these things, 'cause Dreamworks and these guys are spending a lot of dough to do animation. >> Larry: Yes. >> I mean it's not cheap, so how do you guys crack the code on keeping it low, not low-budget, but low-cost and also intelligent is that the secret sauce? >> Yes well that's certainly super important for us. You know we're a start-up company, so obviously we need to be able to have a pipeline that if we run efficiently and you know for us, I think what we've done is we've brought together some of the best people, you know. So we've hired our friends, we've hired people who are really experts in the field, and we're really creating a next-generation VR platform so that we can actually create these animated experiences, be able to experiment in this space. You know, sort of try out different techniques and storytelling methodologies and at the same time do it in a way that we can, you know, sort of experiment as much as possible. >> John: Talk about some of the awards you guys had, I mean, you guys done some things. Share some of the accolades you've gotten. >> Yes, so, I mean what's amazing is that we started with our first piece of content Invasion!, and we premiered it last year in April at Tribecca Film Festival, and it's really gone on to, first of all, from a consumer standpoint, it's one of the most popular downloaded pieces of content on all the VR platforms, and at the same time it's been shown at a number of different film festivals, and it recently won an Emmy, so we're very excited about that, and, you know, what we realize is that audiences just fell in love with this bunny character Chloe. So Invasion! is this story about two aliens that try to take over Earth, and they're thwarted not by humans with powerful weapons, but by cute little woodland creatures. In the first episode in Invasion! they're thwarted by this cute little bunny Chloe, and what happens is that at the very beginning of the piece, Chloe like hops up to you, and if you look down you're a little bunny in the scene, you've got bunny legs, you can hop around. And audiences, you know, the viewer just reacted in ways that you would never do in a film, like people are waving at Chloe, a lot of people reach out and try to pet Chloe, a lot of people mimic what Chloe's doing, and in short people are just treating Chloe as if she's real. And it made us realize that there's something really powerful here that is really worth kind of leaning in and digging deeper into. >> And what was the next step after that, so you went what you went, some development, was it the game, was it the character development? How do you double-down on them, I'm just kind of curious on thinking about how the, on the thinking behind it. >> It was really interesting because we, in Invasion! we were kind of the first to make you a character in the story, but at the time there really weren't hand controllers, or any of the devices so that you could actually really have sort of a more like increased role in the story. And so at the same time, people really felt that they were front and center, and they felt this sense of protecting Chloe from the aliens 'cause you're placed right in the center of the story. And so with Asteroids! when we started, we just wanted to dive deeper into that idea of you playing an active role in the story. And so in Asteroids! we focused on the two alien characters Mac and Cheez and their relationship, and you're a helper robot on the ship, so you have. >> So how do I get involved and get these stories, do I have to have a VR kit? So I don't have, I haven't bought anything yet VR-wise, so for me, how do I engage with you guys, what do I do? Do I buy Oculus Rift, or certain headsets? >> So our stuff is meant to be available for everyone. We really want to have as many people be able to see our content as possible. And so first of all, if you have a VR headset of any type, our, Invasion! is available on all those platforms, so that's the high-end headsets like the Rift and Vive, the PlayStation VR for Sony, as well as if you have a mobile phone like a Samsung phone, you can plug it into your VR. At the same time, we also have a Baobab Cardboard app, so you don't even need to have VR to see our product. So you just get an IOS or Android app, a Baobab app. >> So I'm in the market to buy a headset, I'm not price sensitive, what should I buy? What would you recommend? (Larry chuckling) >> Well there really are so many options, so you know obviously at the high >> John: What would you get? >> Well at the highest end, you know, getting a Rift or Vive really gives you the full VR experience because it's really tracking your position and orientation so you can actually walk around a space, the characters can react to you in believable ways, and it's all happening in real time. And on the other hand, the Sony PlayStation VR's are really affordable if you've got a Sony Playstation, you just buy the PSVR headset, you plug it right in and you're ready to go. I'm really excited looking forward to a world where you're not tethered to your computer, and so it's really exciting to see these stand-alone headsets that are going to come out that basically there's no tethering to a computer and yet you have that same inside-out tracking so that >> And this is the Samsung vision, right? The Samsung vision is to use their displays. >> Yes, exactly. See right now what you have, which is, which is already really exciting, is you take your Samsung phone, you plug it into a Gear VR, and the one thing that's missing is that you're not able to track both the position and orientation of where you are, and so the next generation headsets are going to have that. And the experiences will be much higher feeling. >> Alright cool, so then I, I'll actually download all of this stuff. So as the CTO of the venture, your job is to kind of look over the landscape. You have to have the 20 mile stare of the future, not screw it up, but you've got to win the present. >> Larry: Yes, we're all about being able to deliver in the present and look forward to the future. >> And that's the key, and you have that unique skill as an entrepreneur. What are you guys doing now technically and with the product, what are some of the key things that people should know about, because I mean I look at the CG and the animation world, and you see the Moore's law kind of coming that way, right, so you go wow, as someone with a live video, I would love to have a bunny and the cube set right here, right? So we see a future where I want to immerse myself with characters, not just stickers. >> We of course see that as well, so you know, obviously. >> John: Is expensive I mean it must be, 'cause in the old days what, you had the artists, monster storage, tons of compute, what's it like now? >> Well we're a really small start-up company, so we are not a, you know, 300 person organization that is producing a full animated film. We're a small team of artists and engineers working together in the same way that we had that same excitement in the early days. I started my career at Pixar in some of their earlier films, and it was that same >> John: Power work stations, you had that high-end gear. >> Yeah so it was that same excitement in those early days, like we just had to figure out like how are we going to actually create this shot, how are we going to like, you know, build this character, how are we going to like finish this on time. And we have that same exact excitement in the office. >> When were you at Pixar, were you there for the Toy Story kind of thing? >> Yeah, so I worked on the Toy Story films, and A Bug's Life and Monster's Inc., and then I went over to Dreamworks and headed up all of their character technologies on their various films. >> Okay so you guys do anything different than those guys, or are you guys more focused more simple? >> Yeah, I mean what's interesting is that this is really a new medium and it's a new skill set, because what's happened is that you are part of the world, and for us the thing that's most exciting is that by you being a character, first of all, the other characters are not just able to have, you know, sort of high-quality animation, but they're able to react to you, and so there's there A. a number of technical innovations that you need to overcome so that we can have that same high-quality character performance that I would expect from a Pixar or Dreamworks film happening, running in real time at 90 frames a second on my headset, and at the same time also be able to have those characters react to you and respond to what you're doing. And you know, so we've scratched the surface on that. So one of the things that's really interesting is how two people will actually have all these subconscious communication cues, you know, whether it's eye contact or whether it's two lovers sitting across the table and mirroring each other's behavior, that's the type of thing that we can add into our animation. And at the same time, we have stories where depending on what you do, whether you choose to participate or not, that actually affects the outcome, and affects the way that characters respond to you. And so having much smarter character performances is certainly one area that I think is really exciting. >> And that's going to be interesting for you guys because you have some structured ways to do that, and then some unstructured ways to do it with community data, machine learning, and then you can use bots in a way to help you get data, but you almost could have character developments be dynamic. >> You definitely could, and you know for us I think the thing that is always the biggest point that we come back to is story. And so on one hand we want to tell one story that's really told well, not ten different stories, and on another hand, because you're part of that story, depending on what you do, that's actually going to affect how the characters respond to you, and that could be in a really nuanced way, and so, you know, building up AI systems, and building up the smarts so that you can actually have that type of response, and yet still feel like these characters are alive and breathing. >> Well the Chloe example on Invasion! is great example, you'd love to have that automated, so when you see those magical moments, the story could evolve, you can kind of give it that programmable policy-based taping. (John laughing) >> Yeah exactly so you know, so this is the type of thing. >> We're geeking out here on the set, Larry, great to have you on, super informative content, and I love the world you're in, I think the world's changing, I think you're going to see some interesting dynamics coming, you certainly have the historical view, Pixar and Dreamworks, old school, if you call that old school. >> That's right. >> Now the new school's coming in, certainly AR looks good too. >> Yeah, we're really excited about AR as well. When we think about stories, you know, VR is about transporting you to a different world and having a story take place there. AR is about the characters being alive in your world, both are really exciting. >> Have you seen the Magic Leap demo? >> Larry: Yes, yeah. >> What's it like, can you tell us? >> I'm not allowed to tell. >> John: Is it good? >> Yes, yeah. >> So it's worth half of another half a billion, oh I can't wait. >> That I can't say, you know. I can't comment on their business, but. >> It's a freaking award chest. >> I think there's a lot of exciting things you know, AR. >> They must have a killer demo, I want to find out, I want to see this demo. Magic Leap, I want to to see your demo. All seriousness, great to have you on, and certainly come down to our Cube studios. I want to follow your story, I think you guys are on the cutting edge of a new user experience that's going to bring computer animation, computer graphics, into a new persona as a storytelling, so congratulations. Larry Cutler, how do you say the. >> Baobab. >> Baobab, B-A-O-B-A-B Studios in Redwood City, California. It's the Cube live coverage from Samsung Developer Conference, I'm John Furrier, more after this short break. (peppy music)

Published Date : Oct 20 2017

SUMMARY :

2017, brought to you by Samsung. I'm John Furrier the founder, co-founder And you're co-founder and CEO Maureen Fan was So you guys are doing great. What are you guys doing, what's the aha moment for you guys. to incredible places and to make you really feel like you're And so we found that VR is an incredibly powerful medium, and these guys are spending a lot of dough to do animation. that if we run efficiently and you know for us, John: Talk about some of the awards you guys had, And audiences, you know, the viewer just reacted in ways so you went what you went, some development, or any of the devices so that you could actually really And so first of all, if you have a VR headset of any type, the characters can react to you in believable ways, And this is the Samsung vision, right? and so the next generation headsets are going to have that. So as the CTO of the venture, your job is in the present and look forward to the future. And that's the key, and you have so we are not a, you know, 300 person organization how are we going to like, you know, build this character, and then I went over to Dreamworks and headed up all to have, you know, sort of high-quality animation, And that's going to be interesting for you guys and so, you know, building up AI systems, the story could evolve, you can kind of give it great to have you on, super informative Now the new school's coming in, When we think about stories, you know, So it's worth half of another That I can't say, you know. All seriousness, great to have you on, It's the Cube live coverage from

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Larry CutlerPERSON

0.99+

JohnPERSON

0.99+

LarryPERSON

0.99+

John FurrierPERSON

0.99+

ChloePERSON

0.99+

PixarORGANIZATION

0.99+

IOSTITLE

0.99+

SamsungORGANIZATION

0.99+

San FranciscoLOCATION

0.99+

TwitchORGANIZATION

0.99+

two loversQUANTITY

0.99+

DreamworksORGANIZATION

0.99+

SonyORGANIZATION

0.99+

AndroidTITLE

0.99+

90 framesQUANTITY

0.99+

OculusORGANIZATION

0.99+

PlayStation VRCOMMERCIAL_ITEM

0.99+

20 mileQUANTITY

0.99+

Baobab StudiosORGANIZATION

0.99+

last yearDATE

0.99+

two daysQUANTITY

0.99+

Redwood City, CaliforniaLOCATION

0.99+

two peopleQUANTITY

0.99+

first episodeQUANTITY

0.99+

SiliconANGLE MediaORGANIZATION

0.99+

EarthLOCATION

0.99+

PSVRCOMMERCIAL_ITEM

0.99+

first pieceQUANTITY

0.99+

MacPERSON

0.99+

RiftCOMMERCIAL_ITEM

0.99+

300 personQUANTITY

0.99+

Tribecca Film FestivalEVENT

0.99+

CheezPERSON

0.99+

Gear VRCOMMERCIAL_ITEM

0.99+

Samsung Developer ConferenceEVENT

0.98+

two aliensQUANTITY

0.98+

TwoQUANTITY

0.98+

two alienQUANTITY

0.98+

bothQUANTITY

0.98+

PlaystationCOMMERCIAL_ITEM

0.98+

Maureen FanPERSON

0.97+

one storyQUANTITY

0.97+

Samsung Developer Conference 2017EVENT

0.97+

day twoQUANTITY

0.97+

ViveCOMMERCIAL_ITEM

0.97+

ten different storiesQUANTITY

0.97+

InvasionTITLE

0.97+

firstQUANTITY

0.96+

CubeORGANIZATION

0.96+

Samsung Developer Conference 2017EVENT

0.96+

oneQUANTITY

0.96+

Magic LeapTITLE

0.96+

AprilDATE

0.96+

half a billionQUANTITY

0.95+

one areaQUANTITY

0.94+

Kevin Hague, HARMAN | Samsung Developer Conference 2017


 

>> Announcer: From San Francisco, it's theCube. Covering Samsung Developer Conference 2017. Brought to you by Samsung. >> Hey, welcome back everyone, this is theCube's exclusive live coverage of Samsung Development Conference, SDC 2017. I'm John Furrier, the founder, co-founder of SiliconANGLE Media, co-host of theCube. My next guest is Kevin Hague, Vice President of Technology Strategy at Harman, now part of Samsung. His twitter handle is JSGuy. Welcome to theCube. >> Thank you, thank you having me. >> So HARMAN has a lot of cool things. Obviously, you're known for music, audio, in-car stuff, headphones, really the premier audio tech. >> Kevin: Yes, yeah. >> So give us the update. Part of Samsung. When did that happen? What have you guys done? Have you integrated in to the edge of the network? Is entertainment. >> It is these days. And it seems like more and more people are becoming interested in audio. Audio's becoming, you know, a big part of everybody's lives. Everybody will have headphones at work, connected devices at home, with AIs and voice assistance in their car. You know, we're huge in the car. A huge percentage of our automotive business is in audio, and infotainment, IVI systems, and we're really excited to be here at the Samsung Developer Conference, because this is our first conference, kind of together, and we're excited to show off a lot of cool developer tech. >> So we're huge on internet of things. I've been saying this for years, but now it's so clear to the developer community that internet of things includes people. Wearables, we had guests on doing dresses that are part of the internet, and technology with robotic arms and software. But headphones, you guys have a cool program called Hack Your Headphones. Which, tell a little about that, and then we'll talk about this new product that's here on the desk, I can't wait to get to, but >> Yeah, we have a couple of new products >> Hack your headphones, I mean, you got to get developers excited, because augmented reality and virtual reality, no one wants to put those damn goggles on. And it's got no audio. >> That's right. Yeah, so we're trying to fix that with this particular product, which is the JBL Everest Elite headphones. And it's probably one of the first consumer hackable headphones. We have an API, out for Android, that allows the developer to control many of the features and functions of this headphone. And we've added a lot of extra features, so this thing not only, when you put it on, and you're wearing virtual VR goggles, you're immersed, right? And you don't even know what's going on in the outside world. Well, we've come up with some tech that allows some of the outside world to come in programmatically. So within a game, or a VR game, or a VR application, you can do something where the outside noise can be added in to the gameplay. So let's say if you're playing Fruit Ninja, or something really crazy on your VR goggles, and you're about to hit somebody, it could warn you through audio signals. So we're really excited about these headphones, lots of other features that developers would like. >> So let's talk about the API, because this is a really cool feature, and I want to get to that again, the new thing, new device that's coming out of this new, breaking news here on theCube, which is, these headphones, is about, you guys have the normal coolness around, noise canceling, all that stuff, but you guys have tech that actually lets developers play with the settings. >> Kevin: That's right. >> So you actually reverse the settings. Right? Like, imagining, like, okay, what if I want to increase the noise out that comes in. Is that the concept? >> That's right. And so we can adjust, the developers can adjust, almost an infinite levels, the noise ratio from outside to inside. So if you want it perfectly quiet, you can set that. If you want it where a lot of outside noise is coming in, you can adjust that as well, without having to do this to talk to somebody. >> It's almost tap your phone, tap your app, or have some notifications sensing, so you're looking for creativity from the developer community. >> That's the objective. >> We are. And we don't actually know what developers are going to do. I always have a saying, that says, If I put ten of my smartest guys in a room for a week, they're going to come up with a 100 ideas. If I throw this out to the developer community, they're going to come up with a 1,000 ideas, and I think that's what we're looking for, is that kind of creative spark, and we're just going to give them platform to do that on. >> And that's super smart, because now you can let the creative development community tinker around, and kick the tires. You guys get the free access to the creative, but also you have APIs that make it kind of stable. >> That's right. And that's that something that we support. We love developers to play with. >> Alright, so now you have a new product. So this is the exclusive Cube coverage. So let's see this new product. >> Actually, we just sent boxes right before coming on set. >> Here, let me introduce this thing. So this is looks like a collar. Goes around your neck. So, first of all, what's the product name? >> So this is a JBL Sound Gear, and it's going to be available starting next month. So this is, as far as I know, the first one in the United States. I can't say that for sure, but that's the first one I've seen in the United States. >> So it looks like one of those old football collars, but you put it around like this, and it allows for music to come up only to my ears, right? Actually, let's turn on the music, and then they'll actually get to hear through my little headset here. >> Kevin: Yeah, we'll just throw something on. There's a little, it's kind of cranked up, actually. >> Okay, so this is cranked up. Can you hear this? >> Kevin: Just a little bit. >> So he can barely hear this. I'm, like, talking loud. >> Kevin: Yeah, yeah, that's right, because it's pretty loud to you. >> So I could be a gamer, I could be doing virtual reality with a headset. This is kind of like my ear experience, without and freeing my arms up. >> Yeah, that's right. And the nice thing is, we're looking in the future, and seeing augmented reality-type experiences are going to be important. But with augmented reality, you want that kind of pass through. So I want to be able to talk to you while you have your glasses on, or whatever the future brings us. >> So I can get a little notification, bing, you got this car coming, or about to get attacked by my app. >> Yeah, imagine walking down the street. Now you can listen to your music while walking down the street, and not worry about getting hit by a car or something. >> Or pissing people off. Hey, turn your headphones on! Or having some ambient noise coming in so I'm aware. >> Kevin: Yeah, that's right. >> Yeah, that's cool. >> And so that's a really exciting product. >> They're not that flexible. >> Yeah, it's a little bit. So I think a lot of people put it on from the side and twist it around, but it's actually a pretty solid product, and we're, you know, it's a transformative product. There's nobody else shipping anything like this that I know of. >> So it has a little bit of wiggle, but it's not, you could break it if you snap it, like a chicken bone. >> Kevin: Yeah, don't do that. As far as I know it's the only one in the United States. >> You can just throw it too, it's like horseshoes. Just toss it. >> We have other uses. Yes, we made it multiuse. >> Don't toss it. It's not horseshoes. That's awesome. And you've also got a little pow here, but also now, the problem with some of these devices is on, watching TV, or interfacing with a large screen, there's latency issues and if people are talking, and you're hearing it separately. A lot of internet streamings we see that. It's not like direct connected. >> Kevin: Yes. >> Talk about that. How does that address that? Does it have a feature where you could create a low latency connection to something that's either on the internet or TV? >> Sure, so there's a couple of different ways, so like audio latency's very important, especially if you're watching TV, and lip sync, it's always weird if you get that delay, and so, that's why we actually pair with this in the box comes a low latency transmitter. So it's plug and play, plug it into your TV, turn on this, it pairs up. Now you can watch TV seamlessly in the house without disturbing like everybody. >> I can watch my football games, make some dinner, lunch, whatever. >> Or even late night TV, somebody's asleep in the same room as you, and it won't disturb them, right? >> My wife, Linda, Linda, if you're watching, this is perfect, save our marriage. Turn the TV off! Maybe not that. But it'll be a first step, but this is exactly the use of these. Create a personal space, and the technology as it shoots up from the sides. >> Yeah, there's two speakers on each side. >> And it shoots up to the ear, so it comes up this way. >> That's right. And we do a lot of work to make sure that the beam of sound stays in the vertical space, so that a lot of people can't hear it from outside maybe three feet. Literally, when you first put it on, I couldn't even tell it was working, and I was going, can you hear it? And you're like, oh, it's loud! And so. >> And the folks listening heard it to, 'cause my microphone was right there. >> That's right, yes, and that's the side effect, is in this area here, you have full. >> Okay so this product >> Full awareness. >> will be shipped and it's called the >> AVL Sound Gear. >> Sound Gear, it's available next month. >> Next month. >> In Best Buy retail. >> Best Buy retail. MSRP I think is going to be 249. >> Which includes some accessories, right? >> It includes a couple of accessories, like the streaming unit and everything. >> Yeah, that's awesome. So it's not going to break the bank. >> I don't think so. >> Good. Well, so that's a good price point, I'm definitely going to buy one. >> It's definitely different. It's not like just a regular pair of headphones. This is also available in the stores today, the 750. >> And how about this being developer enabled? API's for this, too, or not yet? >> Not yet, but stay tuned. >> This is the total Star Trek device. >> Kevin: It is. >> If you're a Star Trek classic fan like me, you know the thrall collars. (laughter) >> Kevin: That's awesome. >> And certainly, I can use this. It's got voice in there just so I can talk to it, like on conference calls? >> That's right. You can do a conference call with it, or. >> Have intercommunications on gameplay, multiplayer? >> That's right. >> So yeah, I think gamers are going to love this. >> I think so, too. >> Yeah, my son plays Call of Duty and Destiny. >> It's very comfortable to wear. I think that's one of the key things, is once you get it on, it feels like, when I've tried some of our early prototypes of it, I forgot that I was even wearing it. >> I can listen to theCube music while talking to the guests. >> Kevin: I know, we need to get you one of these. I mean, we'll get you one soon so you can try it. >> Promotional considerations by Samsung. >> Kevin: That's right. >> Kevin, thanks for coming on, great tunes, old school classics. Yeah, crank it up a little bit more, we'll end on some music. Kevin Hague, Vice President of Technology at Harmon, (upbeat music) Samsung. Bringing all the developer action to you here, theCube. >> Kevin: Thanks for having me. >> Alright. More after this short break. (upbeat music)

Published Date : Oct 19 2017

SUMMARY :

Brought to you by Samsung. I'm John Furrier, the founder, So HARMAN has a lot of cool things. What have you guys done? Audio's becoming, you know, but now it's so clear to the developer community you got to get developers excited, so this thing not only, when you put it on, but you guys have tech that actually So you actually reverse the settings. So if you want it perfectly quiet, you can set that. from the developer community. they're going to come up with a 100 ideas. You guys get the free access to the creative, And that's that something that we support. Alright, so now you have a new product. So this is looks like a collar. but that's the first one I've seen in the United States. and it allows for music to come up only to my ears, right? Kevin: Yeah, we'll just throw something on. Okay, so this is cranked up. So he can barely hear this. because it's pretty loud to you. So I could be a gamer, So I want to be able to talk to you bing, you got this car coming, Now you can listen to your music Hey, turn your headphones on! and we're, you know, it's a transformative product. but it's not, you could break it if you snap it, As far as I know it's the only one in the United States. You can just throw it too, it's like horseshoes. Yes, we made it multiuse. the problem with some of these devices is on, where you could create a low latency connection and lip sync, it's always weird if you get that delay, I can watch my football games, and the technology as it shoots up from the sides. and I was going, can you hear it? And the folks listening heard it to, is in this area here, you have full. MSRP I think is going to be 249. like the streaming unit and everything. So it's not going to break the bank. I'm definitely going to buy one. This is also available in the stores today, the 750. you know the thrall collars. And certainly, I can use this. You can do a conference call with it, or. is once you get it on, it feels like, I can listen to theCube music Kevin: I know, we need to get you one of these. Bringing all the developer action to you here, theCube. More after this short break.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Kevin HaguePERSON

0.99+

John FurrierPERSON

0.99+

KevinPERSON

0.99+

Call of DutyTITLE

0.99+

San FranciscoLOCATION

0.99+

JBLORGANIZATION

0.99+

Best BuyORGANIZATION

0.99+

three feetQUANTITY

0.99+

two speakersQUANTITY

0.99+

SamsungORGANIZATION

0.99+

100 ideasQUANTITY

0.99+

Star TrekTITLE

0.99+

1,000 ideasQUANTITY

0.99+

United StatesLOCATION

0.99+

SiliconANGLE MediaORGANIZATION

0.99+

Fruit NinjaTITLE

0.99+

next monthDATE

0.99+

LindaPERSON

0.99+

Next monthDATE

0.99+

HARMANORGANIZATION

0.99+

Samsung Development ConferenceEVENT

0.98+

first stepQUANTITY

0.98+

each sideQUANTITY

0.98+

DestinyTITLE

0.98+

a weekQUANTITY

0.98+

SDC 2017EVENT

0.98+

first conferenceQUANTITY

0.97+

first oneQUANTITY

0.97+

AndroidTITLE

0.97+

HarmanORGANIZATION

0.96+

249QUANTITY

0.96+

Samsung Developer ConferenceEVENT

0.96+

Samsung Developer Conference 2017EVENT

0.95+

firstQUANTITY

0.95+

todayDATE

0.93+

twitterORGANIZATION

0.92+

Sound GearCOMMERCIAL_ITEM

0.9+

oneQUANTITY

0.88+

Everest EliteCOMMERCIAL_ITEM

0.87+

JSGuyPERSON

0.86+

theCubeCOMMERCIAL_ITEM

0.85+

AVLORGANIZATION

0.83+

CubeORGANIZATION

0.82+

HarmonORGANIZATION

0.8+

Vice PresidentPERSON

0.76+

750COMMERCIAL_ITEM

0.76+

yearsQUANTITY

0.74+

ten of my smartest guysQUANTITY

0.74+

coupleQUANTITY

0.71+

HackTITLE

0.58+

MSRPORGANIZATION

0.53+

roomQUANTITY

0.53+

couple ofQUANTITY

0.51+

SoundCOMMERCIAL_ITEM

0.51+

Jack McCauley, Oculus VR – When IoT Met AI: The Intelligence of Things - #theCUBE


 

>> Announcer: From the Fairmont Hotel in the heart of Silicon Valley, it's The Cube. Covering when IOT met AI, the intelligence of things. Brought to you by Western Digital. >> Hey, welcome back everybody. Jeff Rick here with The Cube. We're in downtown San Jose at the Fairmont Hotel at a little show called when IOT Met AI, the Intelligence of Things. Talking about big data, IOT, AI and how those things are all coming together with virtual reality, artificial intelligence, augmented reality, all the fun buzz words, but this is where it's actually happening and we're real excited to have a pioneer in this space. He's Jack McCauley. He was a co-founder at Occulus VR, now spending his time at UC Berkeley as an innovator in residence. Jack welcome. >> Thank you. >> So you've been watching this thing evolve, obviously Occulus, way out front in kind of the VR space and I think augmented a reality in some ways is even more exciting than just kind of pure virtual reality. >> Right. >> So what do you think as you see this thing develop from the early days when you first sat down and started putting this all together? >> Well, I come from a gaming background. That's what I did for 30 years. I worked in video game development, particularly in hardware and things, console hardware. >> That's right, you did the Guitar Hero. >> Guitar Hero. Yeah, that's right. >> We got that one at home. >> I built their guitars and designed and built their guitars for Activision. And when were part of Red Octane, which is a studio. I primarily worked in the studio, not the headquarters, but I did some of the IP work with them too, so, to your question, you know when you produce a product and put it on the market, you never really know how it's going to do. >> Jeff: Right. >> So we make, we made two developer kits, put them out there and they exceeded our expectations and that was very good. It means that there is a market for VR, there is. We produce a consumer version and sales are not what we expected for that particular product. That was designated towards PC gamers and hopefully console games. But what has done well is the mobile stuff has exceeded everyone's mildest expectations. I heard numbers, Gear VR, which is Occulus designed product for me, sold 7 million of those. That's a smash hit. Now, worldwide for phone mounted VR goggles, it's about 20 million and that's just in two years, so that's really intriguing. So, what has happened is it's shifted away from an expensive PC based rig with $700 or whatever it costs, plus $1,500 for the computer to something that costs $50 and you just stick your cell phone in it and that's what people, it doesn't give you the best experience, but that's what has sold and so if I were doing a start-up right now, I would not be working on PC stuff, I'd be working on mobile stuff. >> Jeff: Right. >> And the next thing I think, which will play out of this is, and I think you mentioned it prior to the interview, is the 360 cameras and Google has announced a camera that they're going to come out and it's for their VR 180 initiative, which allows you to see 180 video in stereo with a cell phone strapped to your face. And that's very intriguing. There's a couple of companies out there working on similar products. Lucid Cam, which is a start-up company here has a 180 camera that's very, very good and they have one coming out that's in 4K. They just launched their product. So to answer your question, it looks like what is going to happen is for VR, is that it's a cell phone strapped to your face and a camera somewhere else that you can view and experience. A concert. Imagine taking it to a sporting event where 5,000 people can view your video, 10,000 from your seat. That's very intriguing. >> Yeah, it's interesting I had my first kind of experience just not even 360 or live view, but I did a periscope from the YouTube concert here at Levi Stadium a couple of months ago, just to try it out, I'd never really done it and it was fascinating to watch the engagement of people on that application who had either seen them the prior week in Seattle or were anticipating them coming to the Rose Bowl, I think, you know, within a couple of days, and to have an interaction just based on my little, you know, mobile phone, I was able to find a rail so I had a pretty steady vantage point, but it was a fascinating, different way to experience media, as well as engagement, as well as kind of a crowd interaction beyond the people that happened to be kind of standing in a circle. >> You, what's intriguing about VR 180 is that anybody can film the concert and put the video on YouTube or stream it through their phone. And formerly it would require a $10,000 camera, a stereo camera set up professionally, but can you imagine though that a crowd, you know, sourced sort of thing where the media is sourced by the crowd and anyone can watch it with a mobile phone. That's what's happening, I think, and with Google's announcement, it even that reinforces my opinion anyways that that is where the market will be. It's live events, sporting events. >> Right, it's an experience, right? It all comes back to kind of experience. People are so much more experience drive these days than I think thing driven from everything from buying cars versus taking a new Uber and seeing it over and over and over again. People want the experience, but not necessarily, as the CEO of Zura said, the straps and straddles of ownership, let me have the fun, I don't necessarily want to own it. But I think the other thing that gets less talked about, get your opinion, is really the kind of combination of virtual reality plus the real world, augmented reality. We see the industrial internet of things all the time where, you know, you go take a walk on that factory before you put your goggles on and not only do you see what you see that's actually in front of you, but now you can start to see, it's almost like a heads up display, certain characteristics of the machinery and this and that are now driven from the database side back into the goggles, but now the richness of your observation has completely changed. >> Yes, and in some ways when you think of what Google did with Google Glass, not as well as we had liked. >> But for a first attempt. >> Yeah. They're way ahead of their time and there will come a time when, you know, Snap has their specs, right? Have you seen those? It's not augmented reality, but, there will come a time when you can probably have a manacle on your face and see the kinds of things you need to see if your driving a car for instance that, I mean, a heads up display or a projector projecting right into your retina. So, and, so I think that's the main thing for augmented reality. Will people, I mean, your Pokemon Go, that's kind of a AR game in a way. You look through your cell phone and the character stays fixed on the table or wherever you're looking for it. I mean that uses a mobile device to do that and I can imagine other applications that use a mobile device to do that and I'm aware of people working on things like that right now. >> So do you think that the breakthrough on the mobile versus the PC-based system was just good enough? In being able to just experience that so easily, you know, I mean, Google gave out hundreds and hundreds of thousands of the cardboard boxes, so wow. >> Yeah. Well, it didn't mean that Gear VR didn't move into the market, it did. You know, it did anyways, but to answer your question about AR, you know, I think that, you know, without having good locals, I mean the problem with wearing the Google Glass and the Google cardboard and Gear VR is it kind of makes you sick a little bit and nobody's working on the localization part. Like how to get rid of the nausea effect. I watched a video that was filmed with Lucid Cam at the Pride Parade in San Francisco and I put it on and somebody was moving with the crowd and I just felt nauseous, so that problem probably probably is one I would attempt to attack if I were going to build a company or something like that right now. >> But I wonder too, how much of that is kind of getting used to the format because people when they first put them on for sure, there's like, ah, but you know, if you settle in a little bit and our eyes are pretty forgiving, you get used to things pretty quickly. Your mind can get accustomed to it to a certain degree, but even I get nauseous and I don't get nauseous very easily. >> Okay, so you're title should just be tinkerer. I looked at your Twitter handle. You're building all kinds of fun stuff in your not a garage, but your big giant lab and you're working at Berkeley. What are some of the things that you can share that you see coming down the road that people aren't necessary thinking about that's going to take some of these technologies to the next level. >> I got one for you. So you've heard of autonomous vehicles, right? >> Jeff: Yep, yep. >> And you've heard of Hollow Lens, right. Hollow Lens is an augmented reality device you put on your had and it's got built in localization and it creates what's, it's uses what's know as SLAM or S-L-A-M to build a mesh of the world around you. And with that mesh, the next guy that comes into that virtual world that you mapped will be away ahead. In other words, the map will already exists and he'll modify upon that and the mesh always gets updated. Can you imagine getting that into a self-driving vehicle just for safety's sake, mapping out the road ahead of you, the vehicle ahead of you has already mapped the road for you and you're adding to the mesh and adjusting the mesh, so I think that that's, you know, as far as Hollow Lens is concerned and their localization system, that's going to be really relevant to self-driving cars. Now whether or not it'll be Microsoft's SLAM or somebody else's, I think that that's probably the best, that's the good thing that came out of Hollow Lens and that will bleed into the self-driving car market. It's a big data crunching number and in Jobs, he was actually looking at this a long time ago, like what can we do with self-driving vehicles and I think he had banned the idea because he realized he had a huge computing and data problem. That was 10 years ago. Things have changed. But I think that that's the thing that will possibly come out of, you know, this AR stuff is that localization is just going to be transported to other areas of technology and self-driving cars and so forth. >> I just love autonomous vehicles because everything gets distilled and applied into that application, which is a great application for people to see and understand it's so tangible. >> Yeah, it may change the way we think about cars and we may just not ever own a car. >> I think absolutely. The car industry, it's ownership, it's usage, it's frequency of usage, how they're used. It's not a steel cage anymore for safety as the crash rates go down significantly. I think there's a lot of changes. >> Yeah, you buy a car and it sits for 20 hours a day. >> Right. >> Unutilized. >> All right. Well, Jack I hope maybe I get a chance to come out and check out your lab one time because you're making all kinds of cool stuff. When's that car going to be done? >> I took it upon myself to remodel a house the same time I was doing that, but the car is moving ahead. In September I think I can get it started. Get the engine running and get the power train up and running. Right now I'm working on the electronics and we have an interesting feature on that car that we're going to do an announcement on later. >> Okay, we'll look out for that. We'll keep watching the Twitter. All right, thanks for taking a few minutes. All right, let's check with Cauley. I'm Jeff Rick. You're watching The Cube from When IOT Met AI, the Intelligence of Things in San Jose. We'll be right back after this short break. Thanks for watching. (technological jingle)

Published Date : Jul 3 2017

SUMMARY :

Brought to you by Western Digital. We're in downtown San Jose at the Fairmont Hotel and I think augmented a reality in some ways I worked in video game development, Yeah, that's right. it on the market, you never really know to something that costs $50 and you just stick and a camera somewhere else that you the people that happened to be kind but can you imagine though that a crowd, you know, but now the richness of your observation Yes, and in some ways when you think of what a time when, you know, Snap has their specs, right? you know, I mean, Google gave out hundreds is it kind of makes you sick a little bit there's like, ah, but you know, if you settle What are some of the things that you can share I got one for you. and adjusting the mesh, so I think that that's, you know, gets distilled and applied into that application, Yeah, it may change the way we think about as the crash rates go down significantly. When's that car going to be done? the same time I was doing that, the Intelligence of Things in San Jose.

SENTIMENT ANALYSIS :

ENTITIES

EntityCategoryConfidence
Jeff RickPERSON

0.99+

Jack McCauleyPERSON

0.99+

JeffPERSON

0.99+

$700QUANTITY

0.99+

Western DigitalORGANIZATION

0.99+

JackPERSON

0.99+

Levi StadiumLOCATION

0.99+

7 millionQUANTITY

0.99+

SeptemberDATE

0.99+

30 yearsQUANTITY

0.99+

SeattleLOCATION

0.99+

$10,000QUANTITY

0.99+

Silicon ValleyLOCATION

0.99+

$1,500QUANTITY

0.99+

GoogleORGANIZATION

0.99+

OcculusORGANIZATION

0.99+

$50QUANTITY

0.99+

CauleyPERSON

0.99+

5,000 peopleQUANTITY

0.99+

San FranciscoLOCATION

0.99+

OculusORGANIZATION

0.99+

MicrosoftORGANIZATION

0.99+

10,000QUANTITY

0.99+

The CubeTITLE

0.99+

Pokemon GoTITLE

0.99+

360QUANTITY

0.99+

Red OctaneORGANIZATION

0.99+

UberORGANIZATION

0.99+

180 cameraQUANTITY

0.99+

first attemptQUANTITY

0.99+

Gear VRCOMMERCIAL_ITEM

0.98+

10 years agoDATE

0.98+

two yearsQUANTITY

0.98+

YouTubeORGANIZATION

0.98+

two developerQUANTITY

0.98+

Pride ParadeEVENT

0.98+

20 hours a dayQUANTITY

0.98+

TwitterORGANIZATION

0.97+

about 20 millionQUANTITY

0.97+

San JoseLOCATION

0.96+

firstQUANTITY

0.96+

Guitar HeroTITLE

0.96+

ActivisionORGANIZATION

0.96+

180 videoQUANTITY

0.95+

Fairmont HotelORGANIZATION

0.95+

When IoT Met AI: The Intelligence of ThingsTITLE

0.94+

360 camerasQUANTITY

0.93+

UC BerkeleyORGANIZATION

0.92+

SnapORGANIZATION

0.92+

prior weekDATE

0.91+

a couple of daysQUANTITY

0.91+

one timeQUANTITY

0.91+

first kindQUANTITY

0.9+

oneQUANTITY

0.9+

a couple of months agoDATE

0.9+

hundreds of thousandsQUANTITY

0.9+

VR 180COMMERCIAL_ITEM

0.85+

hundreds andQUANTITY

0.84+

Google GlassCOMMERCIAL_ITEM

0.82+

BerkeleyLOCATION

0.81+

When IOT MetTITLE

0.79+

CamTITLE

0.75+

SLAMTITLE

0.73+

the Intelligence of ThingsTITLE

0.73+

GlassCOMMERCIAL_ITEM

0.71+

ZuraORGANIZATION

0.68+

cardboard boxesQUANTITY

0.66+

#theCUBETITLE

0.63+

The CubeORGANIZATION

0.58+

Rose BowlEVENT

0.52+

coupleQUANTITY

0.48+

IOTTITLE

0.48+

companiesQUANTITY

0.47+

4KOTHER

0.47+

Lucid CamORGANIZATION

0.47+

LucidPERSON

0.47+

Hollow LensORGANIZATION

0.46+

The CubeCOMMERCIAL_ITEM

0.43+