Luis Ceze & Anna Connolly, OctoML | AWS Startup Showcase S3 E1
(soft music) >> Hello, everyone. Welcome to theCUBE's presentation of the AWS Startup Showcase. AI and Machine Learning: Top Startups Building Foundational Model Infrastructure. This is season 3, episode 1 of the ongoing series covering the exciting stuff from the AWS ecosystem, talking about machine learning and AI. I'm your host, John Furrier and today we are excited to be joined by Luis Ceze who's the CEO of OctoML and Anna Connolly, VP of customer success and experience OctoML. Great to have you on again, Luis. Anna, thanks for coming on. Appreciate it. >> Thank you, John. It's great to be here. >> Thanks for having us. >> I love the company. We had a CUBE conversation about this. You guys are really addressing how to run foundational models faster for less. And this is like the key theme. But before we get into it, this is a hot trend, but let's explain what you guys do. Can you set the narrative of what the company's about, why it was founded, what's your North Star and your mission? >> Yeah, so John, our mission is to make AI sustainable and accessible for everyone. And what we offer customers is, you know, a way of taking their models into production in the most efficient way possible by automating the process of getting a model and optimizing it for a variety of hardware and making cost-effective. So better, faster, cheaper model deployment. >> You know, the big trend here is AI. Everyone's seeing the ChatGPT, kind of the shot heard around the world. The BingAI and this fiasco and the ongoing experimentation. People are into it, and I think the business impact is clear. I haven't seen this in all of my career in the technology industry of this kind of inflection point. And every senior leader I talk to is rethinking about how to rebuild their business with AI because now the large language models have come in, these foundational models are here, they can see value in their data. This is a 10 year journey in the big data world. Now it's impacting that, and everyone's rebuilding their company around this idea of being AI first 'cause they see ways to eliminate things and make things more efficient. And so now they telling 'em to go do it. And they're like, what do we do? So what do you guys think? Can you explain what is this wave of AI and why is it happening, why now, and what should people pay attention to? What does it mean to them? >> Yeah, I mean, it's pretty clear by now that AI can do amazing things that captures people's imaginations. And also now can show things that are really impactful in businesses, right? So what people have the opportunity to do today is to either train their own model that adds value to their business or find open models out there that can do very valuable things to them. So the next step really is how do you take that model and put it into production in a cost-effective way so that the business can actually get value out of it, right? >> Anna, what's your take? Because customers are there, you're there to make 'em successful, you got the new secret weapon for their business. >> Yeah, I think we just see a lot of companies struggle to get from a trained model into a model that is deployed in a cost-effective way that actually makes sense for the application they're building. I think that's a huge challenge we see today, kind of across the board across all of our customers. >> Well, I see this, everyone asking the same question. I have data, I want to get value out of it. I got to get these big models, I got to train it. What's it going to cost? So I think there's a reality of, okay, I got to do it. Then no one has any visibility on what it costs. When they get into it, this is going to break the bank. So I have to ask you guys, the cost of training these models is on everyone's mind. OctoML, your company's focus on the cost side of it as well as the efficiency side of running these models in production. Why are the production costs such a concern and where specifically are people looking at it and why did it get here? >> Yeah, so training costs get a lot of attention because normally a large number, but we shouldn't forget that it's a large, typically one time upfront cost that customers pay. But, you know, when the model is put into production, the cost grows directly with model usage and you actually want your model to be used because it's adding value, right? So, you know, the question that a customer faces is, you know, they have a model, they have a trained model and now what? So how much would it cost to run in production, right? And now without the big wave in generative AI, which rightfully is getting a lot of attention because of the amazing things that it can do. It's important for us to keep in mind that generative AI models like ChatGPT are huge, expensive energy hogs. They cost a lot to run, right? And given that model usage growth directly, model cost grows directly with usage, what you want to do is make sure that once you put a model into production, you have the best cost structure possible so that you're not surprised when it's gets popular, right? So let me give you an example. So if you have a model that costs, say 1 to $2 million to train, but then it costs about one to two cents per session to use it, right? So if you have a million active users, even if they use just once a day, it's 10 to $20,000 a day to operate that model in production. And that very, very quickly, you know, get beyond what you paid to train it. >> Anna, these aren't small numbers, and it's cost to train and cost to operate, it kind of reminds me of when the cloud came around and the data center versus cloud options. Like, wait a minute, one, it costs a ton of cash to deploy, and then running it. This is kind of a similar dynamic. What are you seeing? >> Yeah, absolutely. I think we are going to see increasingly the cost and production outpacing the costs and training by a lot. I mean, people talk about training costs now because that's what they're confronting now because people are so focused on getting models performant enough to even use in an application. And now that we have them and they're that capable, we're really going to start to see production costs go up a lot. >> Yeah, Luis, if you don't mind, I know this might be a little bit of a tangent, but, you know, training's super important. I get that. That's what people are doing now, but then there's the deployment side of production. Where do people get caught up and miss the boat or misconfigure? What's the gotcha? Where's the trip wire or so to speak? Where do people mess up on the cost side? What do they do? Is it they don't think about it, they tie it to proprietary hardware? What's the issue? >> Yeah, several things, right? So without getting really technical, which, you know, I might get into, you know, you have to understand relationship between performance, you know, both in terms of latency and throughput and cost, right? So reducing latency is important because you improve responsiveness of the model. But it's really important to keep in mind that it often leads diminishing returns. Below a certain latency, making it faster won't make a measurable difference in experience, but it's going to cost a lot more. So understanding that is important. Now, if you care more about throughputs, which is the time it takes for you to, you know, units per period of time, you care about time to solution, we should think about this throughput per dollar. And understand what you want is the highest throughput per dollar, which may come at the cost of higher latency, which you're not going to care about, right? So, and the reality here, John, is that, you know, humans and especially folks in this space want to have the latest and greatest hardware. And often they commit a lot of money to get access to them and have to commit upfront before they understand the needs that their models have, right? So common mistake here, one is not spending time to understand what you really need, and then two, over-committing and using more hardware than you actually need. And not giving yourself enough freedom to get your workload to move around to the more cost-effective choice, right? So this is just a metaphoric choice. And then another thing that's important here too is making a model run faster on the hardware directly translates to lower cost, right? So, but it takes a lot of engineers, you need to think of ways of producing very efficient versions of your model for the target hardware that you're going to use. >> Anna, what's the customer angle here? Because price performance has been around for a long time, people get that, but now latency and throughput, that's key because we're starting to see this in apps. I mean, there's an end user piece. I even seeing it on the infrastructure side where they're taking a heavy lifting away from operational costs. So you got, you know, application specific to the user and/or top of the stack, and then you got actually being used in operations where they want both. >> Yeah, absolutely. Maybe I can illustrate this with a quick story with the customer that we had recently been working with. So this customer is planning to run kind of a transformer based model for tech generation at super high scale on Nvidia T4 GPU, so kind of a commodity GPU. And the scale was so high that they would've been paying hundreds of thousands of dollars in cloud costs per year just to serve this model alone. You know, one of many models in their application stack. So we worked with this team to optimize our model and then benchmark across several possible targets. So that matching the hardware that Luis was just talking about, including the newer kind of Nvidia A10 GPUs. And what they found during this process was pretty interesting. First, the team was able to shave a quarter of their spend just by using better optimization techniques on the T4, the older hardware. But actually moving to a newer GPU would allow them to serve this model in a sub two milliseconds latency, so super fast, which was able to unlock an entirely new kind of user experience. So they were able to kind of change the value they're delivering in their application just because they were able to move to this new hardware easily. So they ultimately decided to plan their deployment on the more expensive A10 because of this, but because of the hardware specific optimizations that we helped them with, they managed to even, you know, bring costs down from what they had originally planned. And so if you extend this kind of example to everything that's happening with generative AI, I think the story we just talked about was super relevant, but the scale can be even higher, you know, it can be tenfold that. We were recently conducting kind of this internal study using GPT-J as a proxy to illustrate the experience of just a company trying to use one of these large language models with an example scenario of creating a chatbot to help job seekers prepare for interviews. So if you imagine kind of a conservative usage scenario where the model generates just 3000 words per user per day, which is, you know, pretty conservative for how people are interacting with these models. It costs 5 cents a session and if you're a company and your app goes viral, so from, you know, beginning of the year there's nobody, at the end of the year there's a million daily active active users in that year alone, going from zero to a million. You'll be spending about $6 million a year, which is pretty unmanageable. That's crazy, right? >> Yeah. >> For a company or a product that's just launching. So I think, you know, for us we see the real way to make these kind of advancements accessible and sustainable, as we said is to bring down cost to serve using these techniques. >> That's a great story and I think that illustrates this idea that deployment cost can vary from situation to situation, from model to model and that the efficiency is so strong with this new wave, it eliminates heavy lifting, creates more efficiency, automates intellect. I mean, this is the trend, this is radical, this is going to increase. So the cost could go from nominal to millions, literally, potentially. So, this is what customers are doing. Yeah, that's a great story. What makes sense on a financial, is there a cost of ownership? Is there a pattern for best practice for training? What do you guys advise cuz this is a lot of time and money involved in all potential, you know, good scenarios of upside. But you can get over your skis as they say, and be successful and be out of business if you don't manage it. I mean, that's what people are talking about, right? >> Yeah, absolutely. I think, you know, we see kind of three main vectors to reduce cost. I think one is make your deployment process easier overall, so that your engineering effort to even get your app running goes down. Two, would be get more from the compute you're already paying for, you're already paying, you know, for your instances in the cloud, but can you do more with that? And then three would be shop around for lower cost hardware to match your use case. So on the first one, I think making the deployment easier overall, there's a lot of manual work that goes into benchmarking, optimizing and packaging models for deployment. And because the performance of machine learning models can be really hardware dependent, you have to go through this process for each target you want to consider running your model on. And this is hard, you know, we see that every day. But for teams who want to incorporate some of these large language models into their applications, it might be desirable because licensing a model from a large vendor like OpenAI can leave you, you know, over provision, kind of paying for capabilities you don't need in your application or can lock you into them and you lose flexibility. So we have a customer whose team actually prepares models for deployment in a SaaS application that many of us use every day. And they told us recently that without kind of an automated benchmarking and experimentation platform, they were spending several days each to benchmark a single model on a single hardware type. So this is really, you know, manually intensive and then getting more from the compute you're already paying for. We do see customers who leave money on the table by running models that haven't been optimized specifically for the hardware target they're using, like Luis was mentioning. And for some teams they just don't have the time to go through an optimization process and for others they might lack kind of specialized expertise and this is something we can bring. And then on shopping around for different hardware types, we really see a huge variation in model performance across hardware, not just CPU vs. GPU, which is, you know, what people normally think of. But across CPU vendors themselves, high memory instances and across cloud providers even. So the best strategy here is for teams to really be able to, we say, look before you leap by running real world benchmarking and not just simulations or predictions to find the best software, hardware combination for their workload. >> Yeah. You guys sound like you have a very impressive customer base deploying large language models. Where would you categorize your current customer base? And as you look out, as you guys are growing, you have new customers coming in, take me through the progression. Take me through the profile of some of your customers you have now, size, are they hyperscalers, are they big app folks, are they kicking the tires? And then as people are out there scratching heads, I got to get in this game, what's their psychology like? Are they coming in with specific problems or do they have specific orientation point of view about what they want to do? Can you share some data around what you're seeing? >> Yeah, I think, you know, we have customers that kind of range across the spectrum of sophistication from teams that basically don't have MLOps expertise in their company at all. And so they're really looking for us to kind of give a full service, how should I do everything from, you know, optimization, find the hardware, prepare for deployment. And then we have teams that, you know, maybe already have their serving and hosting infrastructure up and ready and they already have models in production and they're really just looking to, you know, take the extra juice out of the hardware and just do really specific on that optimization piece. I think one place where we're doing a lot more work now is kind of in the developer tooling, you know, model selection space. And that's kind of an area that we're creating more tools for, particularly within the PyTorch ecosystem to bring kind of this power earlier in the development cycle so that as people are grabbing a model off the shelf, they can, you know, see how it might perform and use that to inform their development process. >> Luis, what's the big, I like this idea of picking the models because isn't that like going to the market and picking the best model for your data? It's like, you know, it's like, isn't there a certain approaches? What's your view on this? 'Cause this is where everyone, I think it's going to be a land rush for this and I want to get your thoughts. >> For sure, yeah. So, you know, I guess I'll start with saying the one main takeaway that we got from the GPT-J study is that, you know, having a different understanding of what your model's compute and memory requirements are, very quickly, early on helps with the much smarter AI model deployments, right? So, and in fact, you know, Anna just touched on this, but I want to, you know, make sure that it's clear that OctoML is putting that power into user's hands right now. So in partnership with AWS, we are launching this new PyTorch native profiler that allows you with a single, you know, one line, you know, code decorator allows you to see how your code runs on a variety of different hardware after accelerations. So it gives you very clear, you know, data on how you should think about your model deployments. And this ties back to choices of models. So like, if you have a set of choices that are equally good of models in terms of functionality and you want to understand after acceleration how are you going to deploy, how much they're going to cost or what are the options using a automated process of making a decision is really, really useful. And in fact, so I think these events can get early access to this by signing up for the Octopods, you know, this is exclusive group for insiders here, so you can go to OctoML.ai/pods to sign up. >> So that Octopod, is that a program? What is that, is that access to code? Is that a beta, what is that? Explain, take a minute and explain Octopod. >> I think the Octopod would be a group of people who is interested in experiencing this functionality. So it is the friends and users of OctoML that would be the Octopod. And then yes, after you sign up, we would provide you essentially the tool in code form for you to try out in your own. I mean, part of the benefit of this is that it happens in your own local environment and you're in control of everything kind of within the workflow that developers are already using to create and begin putting these models into their applications. So it would all be within your control. >> Got it. I think the big question I have for you is when do you, when does that one of your customers know they need to call you? What's their environment look like? What are they struggling with? What are the conversations they might be having on their side of the fence? If anyone's watching this, they're like, "Hey, you know what, I've got my team, we have a lot of data. Do we have our own language model or do I use someone else's?" There's a lot of this, I will say discovery going on around what to do, what path to take, what does that customer look like, if someone's listening, when do they know to call you guys, OctoML? >> Well, I mean the most obvious one is that you have a significant spend on AI/ML, come and talk to us, you know, putting AIML into production. So that's the clear one. In fact, just this morning I was talking to someone who is in life sciences space and is having, you know, 15 to $20 million a year cloud related to AI/ML deployment is a clear, it's a pretty clear match right there, right? So that's on the cost side. But I also want to emphasize something that Anna said earlier that, you know, the hardware and software complexity involved in putting model into production is really high. So we've been able to abstract that away, offering a clean automation flow enables one, to experiment early on, you know, how models would run and get them to production. And then two, once they are into production, gives you an automated flow to continuously updating your model and taking advantage of all this acceleration and ability to run the model on the right hardware. So anyways, let's say one then is cost, you know, you have significant cost and then two, you have an automation needs. And Anna please compliment that. >> Yeah, Anna you can please- >> Yeah, I think that's exactly right. Maybe the other time is when you are expecting a big scale up in serving your application, right? You're launching a new feature, you expect to get a lot of usage or, and you want to kind of anticipate maybe your CTO, your CIO, whoever pays your cloud bills is going to come after you, right? And so they want to know, you know, what's the return on putting this model essentially into my application stack? Am I going to, is the usage going to match what I'm paying for it? And then you can understand that. >> So you guys have a lot of the early adopters, they got big data teams, they're pushed in the production, they want to get a little QA, test the waters, understand, use your technology to figure it out. Is there any cases where people have gone into production, they have to pull it out? It's like the old lemon laws with your car, you buy a car and oh my god, it's not the way I wanted it. I mean, I can imagine the early people through the wall, so to speak, in the wave here are going to be bloody in the sense that they've gone in and tried stuff and get stuck with huge bills. Are you seeing that? Are people pulling stuff out of production and redeploying? Or I can imagine that if I had a bad deployment, I'd want to refactor that or actually replatform that. Do you see that too? >> Definitely after a sticker shock, yes, your customers will come and make sure that, you know, the sticker shock won't happen again. >> Yeah. >> But then there's another more thorough aspect here that I think we likely touched on, be worth elaborating a bit more is just how are you going to scale in a way that's feasible depending on the allocation that you get, right? So as we mentioned several times here, you know, model deployment is so hardware dependent and so complex that you tend to get a model for a hardware choice and then you want to scale that specific type of instance. But what if, when you want to scale because suddenly luckily got popular and, you know, you want to scale it up and then you don't have that instance anymore. So how do you live with whatever you have at that moment is something that we see customers needing as well. You know, so in fact, ideally what we want is customers to not think about what kind of specific instances they want. What they want is to know what their models need. Say, they know the SLA and then find a set of hybrid targets and instances that hit the SLA whenever they're also scaling, they're going to scale with more freedom, right? Instead of having to wait for AWS to give them more specific allocation for a specific instance. What if you could live with other types of hardware and scale up in a more free way, right? So that's another thing that we see customers, you know, like they need more freedom to be able to scale with whatever is available. >> Anna, you touched on this with the business model impact to that 6 million cost, if that goes out of control, there's a business model aspect and there's a technical operation aspect to the cost side too. You want to be mindful of riding the wave in a good way, but not getting over your skis. So that brings up the point around, you know, confidence, right? And teamwork. Because if you're in production, there's probably a team behind it. Talk about the team aspect of your customers. I mean, they're dedicated, they go put stuff into production, they're developers, there're data. What's in it for them? Are they getting better, are they in the beach, you know, reading the book. Are they, you know, are there easy street for them? What's the customer benefit to the teams? >> Yeah, absolutely. With just a few clicks of a button, you're in production, right? That's the dream. So yeah, I mean I think that, you know, we illustrated it before a little bit. I think the automated kind of benchmarking and optimization process, like when you think about the effort it takes to get that data by hand, which is what people are doing today, they just don't do it. So they're making decisions without the best information because it's, you know, there just isn't the bandwidth to get the information that they need to make the best decision and then know exactly how to deploy it. So I think it's actually bringing kind of a new insight and capability to these teams that they didn't have before. And then maybe another aspect on the team side is that it's making the hand-off of the models from the data science teams to the model deployment teams more seamless. So we have, you know, we have seen in the past that this kind of transition point is the place where there are a lot of hiccups, right? The data science team will give a model to the production team and it'll be too slow for the application or it'll be too expensive to run and it has to go back and be changed and kind of this loop. And so, you know, with the PyTorch profiler that Luis was talking about, and then also, you know, the other ways we do optimization that kind of prevents that hand-off problem from happening. >> Luis and Anna, you guys have a great company. Final couple minutes left. Talk about the company, the people there, what's the culture like, you know, if Intel has Moore's law, which is, you know, doubling the performance in few years, what's the culture like there? Is it, you know, more throughput, better pricing? Explain what's going on with the company and put a plug in. Luis, we'll start with you. >> Yeah, absolutely. I'm extremely proud of the team that we built here. You know, we have a people first culture, you know, very, very collaborative and folks, we all have a shared mission here of making AI more accessible and sustainable. We have a very diverse team in terms of backgrounds and life stories, you know, to do what we do here, we need a team that has expertise in software engineering, in machine learning, in computer architecture. Even though we don't build chips, we need to understand how they work, right? So, and then, you know, the fact that we have this, this very really, really varied set of backgrounds makes the environment, you know, it's say very exciting to learn more about, you know, assistance end-to-end. But also makes it for a very interesting, you know, work environment, right? So people have different backgrounds, different stories. Some of them went to grad school, others, you know, were in intelligence agencies and now are working here, you know. So we have a really interesting set of people and, you know, life is too short not to work with interesting humans. You know, that's something that I like to think about, you know. >> I'm sure your off-site meetings are a lot of fun, people talking about computer architectures, silicon advances, the next GPU, the big data models coming in. Anna, what's your take? What's the culture like? What's the company vibe and what are you guys looking to do? What's the customer success pattern? What's up? >> Yeah, absolutely. I mean, I, you know, second all of the great things that Luis just said about the team. I think one that I, an additional one that I'd really like to underscore is kind of this customer obsession, to use a term you all know well. And focus on the end users and really making the experiences that we're bringing to our user who are developers really, you know, useful and valuable for them. And so I think, you know, all of these tools that we're trying to put in the hands of users, the industry and the market is changing so rapidly that our products across the board, you know, all of the companies that, you know, are part of the showcase today, we're all evolving them so quickly and we can only do that kind of really hand in glove with our users. So that would be another thing I'd emphasize. >> I think the change dynamic, the power dynamics of this industry is just the beginning. I'm very bullish that this is going to be probably one of the biggest inflection points in history of the computer industry because of all the dynamics of the confluence of all the forces, which you mentioned some of them, I mean PC, you know, interoperability within internetworking and you got, you know, the web and then mobile. Now we have this, I mean, I wouldn't even put social media even in the close to this. Like, this is like, changes user experience, changes infrastructure. There's going to be massive accelerations in performance on the hardware side from AWS's of the world and cloud and you got the edge and more data. This is really what big data was going to look like. This is the beginning. Final question, what do you guys see going forward in the future? >> Well, it's undeniable that machine learning and AI models are becoming an integral part of an interesting application today, right? So, and the clear trends here are, you know, more and more competitional needs for these models because they're only getting more and more powerful. And then two, you know, seeing the complexity of the infrastructure where they run, you know, just considering the cloud, there's like a wide variety of choices there, right? So being able to live with that and making the most out of it in a way that does not require, you know, an impossible to find team is something that's pretty clear. So the need for automation, abstracting with the complexity is definitely here. And we are seeing this, you know, trends are that you also see models starting to move to the edge as well. So it's clear that we're seeing, we are going to live in a world where there's no large models living in the cloud. And then, you know, edge models that talk to these models in the cloud to form, you know, an end-to-end truly intelligent application. >> Anna? >> Yeah, I think, you know, our, Luis said it at the beginning. Our vision is to make AI sustainable and accessible. And I think as this technology just expands in every company and every team, that's going to happen kind of on its own. And we're here to help support that. And I think you can't do that without tools like those like OctoML. >> I think it's going to be an error of massive invention, creativity, a lot of the format heavy lifting is going to allow the talented people to automate their intellect. I mean, this is really kind of what we see going on. And Luis, thank you so much. Anna, thanks for coming on this segment. Thanks for coming on theCUBE and being part of the AWS Startup Showcase. I'm John Furrier, your host. Thanks for watching. (upbeat music)
SUMMARY :
Great to have you on again, Luis. It's great to be here. but let's explain what you guys do. And what we offer customers is, you know, So what do you guys think? so that the business you got the new secret kind of across the board So I have to ask you guys, And that very, very quickly, you know, and the data center versus cloud options. And now that we have them but, you know, training's super important. John, is that, you know, humans and then you got actually managed to even, you know, So I think, you know, for us we see in all potential, you know, And this is hard, you know, And as you look out, as And then we have teams that, you know, and picking the best model for your data? from the GPT-J study is that, you know, What is that, is that access to code? And then yes, after you sign up, to call you guys, OctoML? come and talk to us, you know, And so they want to know, you know, So you guys have a lot make sure that, you know, we see customers, you know, What's the customer benefit to the teams? and then also, you know, what's the culture like, you know, So, and then, you know, and what are you guys looking to do? all of the companies that, you know, I mean PC, you know, in the cloud to form, you know, And I think you can't And Luis, thank you so much.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Anna | PERSON | 0.99+ |
Anna Connolly | PERSON | 0.99+ |
John Furrier | PERSON | 0.99+ |
Luis | PERSON | 0.99+ |
Luis Ceze | PERSON | 0.99+ |
John | PERSON | 0.99+ |
1 | QUANTITY | 0.99+ |
10 | QUANTITY | 0.99+ |
15 | QUANTITY | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
10 year | QUANTITY | 0.99+ |
6 million | QUANTITY | 0.99+ |
zero | QUANTITY | 0.99+ |
Intel | ORGANIZATION | 0.99+ |
three | QUANTITY | 0.99+ |
Nvidia | ORGANIZATION | 0.99+ |
First | QUANTITY | 0.99+ |
OctoML | ORGANIZATION | 0.99+ |
two | QUANTITY | 0.99+ |
millions | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
Two | QUANTITY | 0.99+ |
$2 million | QUANTITY | 0.98+ |
3000 words | QUANTITY | 0.98+ |
one line | QUANTITY | 0.98+ |
A10 | COMMERCIAL_ITEM | 0.98+ |
OctoML | TITLE | 0.98+ |
one | QUANTITY | 0.98+ |
three main vectors | QUANTITY | 0.97+ |
hundreds of thousands of dollars | QUANTITY | 0.97+ |
both | QUANTITY | 0.97+ |
CUBE | ORGANIZATION | 0.97+ |
T4 | COMMERCIAL_ITEM | 0.97+ |
one time | QUANTITY | 0.97+ |
first one | QUANTITY | 0.96+ |
two cents | QUANTITY | 0.96+ |
GPT-J | ORGANIZATION | 0.96+ |
single model | QUANTITY | 0.95+ |
a minute | QUANTITY | 0.95+ |
about $6 million a year | QUANTITY | 0.95+ |
once a day | QUANTITY | 0.95+ |
$20,000 a day | QUANTITY | 0.95+ |
a million | QUANTITY | 0.94+ |
theCUBE | ORGANIZATION | 0.93+ |
Octopod | TITLE | 0.93+ |
this morning | DATE | 0.93+ |
first culture | QUANTITY | 0.92+ |
$20 million a year | QUANTITY | 0.92+ |
AWS Startup Showcase | EVENT | 0.9+ |
North Star | ORGANIZATION | 0.9+ |
Dell Technologies MWC 2023 Exclusive Booth Tour with David Nicholson
>> And I'm here at Dell's Presence at MWC with vice president of marketing for telecom and Edge Computing, Aaron Chaisson. Aaron, how's it going? >> Doing great. How's it going today, Dave? >> It's going pretty well. Pretty excited about what you've got going here and I'm looking forward to getting the tour. You ready to take a closer look? >> Ready to do it. Let's go take a look! For us in the telecom ecosystem, it's really all about how we bring together the different players that are innovating across the industry to drive value for our CSP customers. So, it starts really, for us, at the ecosystem layer, bringing partners, bringing telecommunication providers, bringing (stutters) a bunch of different technologies together to innovate together to drive new value. So Paul, take us a little bit through what we're doing to- to develop and bring in these partnerships and develop our ecosystem. >> Uh, sure. Thank you Aaron. Uh, you know, one of the things that we've been focusing on, you know, Dell is really working with many players in the open telecom ecosystem. Network equipment providers, independent software vendors, and the communication service providers. And, you know, through our lines of business or open telecom ecosystem labs, what we want to do is bring 'em together into a community with the goal of really being able to accelerate open innovation and, uh, open solutions into the market. And that's what this community is really about, is being able to, you know, have those communications, develop those collaborations whether it's through, you know, sharing information online, having webinars dedicated to sharing Dell information, whether it's our next generation hardware portfolio we announced here at the show, our use case directory, our- how we're dealing with new service opportunities, but as well as the community to share, too, which I think is an exciting way for us to be able to, you know- what is the knowledge thing? As well as activities at other events that we have coming up. So really the key thing I think about, the- the open telecom ecosystem community, it's collaboration and accelerating the open industry forward. >> So- So Aaron, if I'm hearing this correctly you're saying that you can't just say, "Hey, we're open", and throw a bunch of parts in a box and have it work? >> No, we've got to work together to integrate these pieces to be able to deliver value, and, you know, we opened up a- (stutters) in our open ecosystem labs, we started a- a self-certification process a couple of months back. We've already had 13 partners go through that, we've got 16 more in the pipeline. Everything you see in this entire booth has been innovated and worked with partnerships from Intel to Microsoft to, uh, to (stutters) Wind River and Red Hat and others. You go all the way around the booth, everything here has partnerships at its core. And why don't we go to the next section here where we're going to be showing how we're pulling that all together in our open ecosystems labs to drive that innovation? >> So Aaron, you talked about the kinds of validation and testing that goes on, so that you can prove out an open stack to deliver the same kinds of reliability and performance and availability that we expect from a wireless network. But in the opens- in the open world, uh, what are we looking at here? >> Yeah absolutely. So one of the- one of the challenges to a very big, broad open ecosystem is the complexity of integrating, deploying, and managing these, especially at telecom scale. You're not talking about thousands of servers in one site, you're talking about one server in thousands of sites. So how do you deploy that predictable stack and then also manage that at scale? I'm going to show you two places where we're talkin' about that. So, this is actually representing an area that we've been innovating in recently around creating an integrated infrastructure and virtualization stack for the telecom industry. We've been doing this for years in IT with VxBlocks and VxRails and others. Here what you see is we got, uh, Dell hardware infrastructure, we've got, uh, an open platform for virtualization providers, in this case we've created an infrastructure block for Red Hat to be able to supply an infrastructure for core operations and Packet Cores for telecoms. On the other side of this, you can actually see what we're doing with Wind River to drive innovation around RAN and being able to simplify RAN- vRAN and O-RAN deployments. >> What does that virtualization look like? Are we talking about, uh, traditional virtual machines with OSs, or is this containerized cloud native? What does it look like? >> Yeah, it's actually both, so it can support, uh, virtual, uh-uh, software as well as containerized software, so we leverage the (indistinct) distributions for these to be able to deploy, you know, cloud native applications, be able to modernize how they're deploying these applications across the telecom network. So in this case with Red Hat, uh, (stutters) leveraging OpenShift in order to support containerized apps in your Packet Core environments. >> So what are- what are some of the kinds of things that you can do once you have infrastructure like this deployed? >> Yeah, I mean by- by partnering broadly across the ecosystem with VMware, with Red Hat, uh, with- with Wind River and with others, it gives them the ability to be able to deploy the right virtualization software in their network for the types of applications they're deploying. They might want to use Red Hat in their core, they may want to use Wind River in their RAM, they may want to use, uh, Microsoft or VMware for their- for their Edge workloads, and we allow them to be able to deploy all those, but centrally manage those with a common user interface and a common set of APIs. >> Okay, well I'm dying to understand the link between this and the Lego city that the viewers can't see, yet, but it's behind me. Let's take a look. >> So let's take a look at the Lego city that shows how we not deploy just one of these, but dozens or hundreds of these at scale across a cityscape. >> So Aaron, I know we're not in Copenhagen. What's all the Lego about? >> Yeah, so the Lego city here is to show- and, uh, really there's multiple points of Presence across an entire Metro area that we want to be able to manage if we're a telecom provider. We just talked about one infrastructure block. What if I wanted to deploy dozens of these across the city to be able to manage my network, to be able to manage, uh, uh- to be able to deploy private mobility potentially out into a customer enterprise environment, and be able to manage all of these, uh, very simply and easily from a common interface? >> So it's interesting. Now I think I understand why you are VP of marketing for both telecom and Edge. Just heard- just heard a lot about Edge and I can imagine a lot of internet of things, things, hooked up at that Edge. >> Yeah, so why don't we actually go over to another area? We're actually going to show you how one small microbrewery (stutters) in one of our cities nearby, uh, (stutters) my hometown in Massachusetts is actually using this technology to go from more of an analyzed- analog world to digitizing their business to be able to brew better beer. >> So Aaron, you bring me to a brewery. What do we have- what do we have going on here? >> Yeah, so, actually (stutters) about- about a year ago or so, I- I was able to get my team to come together finally after COVID to be able to meet each other and have a nice team event. One of those nights, we went out to dinner at a- at a brewery called "Exhibit 'A'" in Massachusetts, and they actually gave us a tour of their facilities and showed us how they actually go through the process of brewing beer. What we saw as we were going through it, interestingly, was that everything was analog. They literally had people with pen and paper walking around checking time and temperature and the process of brewing the beer, and they weren't asking for help, but we actually saw an opportunity where what we're doing to help businesses digitize what they're doing in their manufacturing floor can actually help them optimize how they build whatever product they're building, in this case it was beer. >> Hey Warren, good to meet you! What do we have goin' on? >> Yeah, it's all right. So yeah, basically what we did is we took some of their assets in the, uh, brewery that were completely manually monitored. People were literally walking around the floor with clipboards, writing down values. And we censorized the asset, in this case fermentation tanks and we measured the, uh, pressure and the temperature, which in fermentation are very key to monitor those, because if they get out of range the entire batch of beer can go bad or you don't get the consistency from batch to batch if you don't tightly monitor those. So we censorized the fermentation tank, brought that into an industrial I/O network, and then brought that into a Dell gateway which is connected 5G up to the cloud, which then that data comes to a tablet or a phone, which they, rather than being out on the floor and monitor it, can look at this data remotely at any time. >> So I'm not sure the exact date, the first time we have evidence of beer being brewed by humanity... >> Yep. >> But I know it's thousands of years ago. So it's taken that long to get to the point where someone had to come along, namely Dell, to actually digitally transform the beer business. Is this sort of proof that if you can digitally transform this, you can digitally transform anything? >> Absolutely. You name it, anything that's being manufactured, sold, uh, uh, taken care of, (stutters) any business out there that's looking to be able to be modernize and deliver better service to their customers can benefit from technologies like this. >> So we've taken a look at the ecosystem, the way that you validate architectures, we've seen an example of that kind of open architecture. Now we've seen a real world use case. Do you want to take a look a little deeper under the covers and see what's powering all of this? >> We just this week announced a new line of servers that power Edge and RAN use cases, and I want to introduce Mike to kind of take us through what we've been working on and really what the power of what this providing. >> Hey Mike, welcome to theCube. >> Oh, glad- glad to be here. So, what I'd really like to talk about are the three new XR series servers that we just announced last week and we're showing here at Mobile World Congress. They are all short depth, ruggedized, uh, very environmentally tolerant, and able to withstand, you know, high temperatures, high humidities, and really be deployed to places where traditional data center servers just can't handle, you know, due to one fact or another, whether it's depth or the temperature. And so, the first one I'd like to show you is the XR7620. This is, uh, 450 millimeters deep, it's designed for, uh, high levels of acceleration so it can support up to 2-300 watt, uh, GPUs. But what I really want to show you over here, especially for Mobile World Congress, is our new XR8000. The XR8000 is based on Intel's latest Sapphire Rapids technology, and this is- happens to be one of the first, uh, EE boost processors that is out, and basically what it is (stutters) an embedded accelerator that makes, uh, the- the processing of vRAN loads very, uh, very efficient. And so they're actually projecting a, uh, 3x improvement, uh, of processing per watt over the previous generation of processors. This particular unit is also sledded. It's very much like, uh, today's traditional baseband unit, so it's something that is designed for low TCO and easy maintenance in the field. This is the frew. When anything fails, you'll pull one out, you pop a new one in, it comes back into service, and the- the, uh, you know, your radio is- is, uh, minimally disrupted. >> Yeah, would you describe this as quantitative and qualitative in terms of the kinds of performance gains that these underlying units are delivering to us? I mean, this really kind of changes the game, doesn't it? It's not just about more, is it about different also in terms of what we can do? >> Well we are (stutters) to his point, we are able to bring in new accelerator technologies. Not only are we doing it with the Intel, uh, uh, uh, of the vRAN boost technologies, but also (stutters) we can bring it, too, but there's another booth here where we're actually working with our own accelerator cards and other accelerator cards from our partners across the industry to be able to deliver the price and performance capabilities required by a vRAN or an O-RAN deployment in the network. So it's not- it's not just the chip technology, it's the integration and the innovation we're doing with others, as well as, of course, the unique power cooling capabilities that Dell provides in our servers that really makes these the most efficient way of being able to power a network. >> Any final thoughts recapping the whole picture here? >> Yeah, I mean I would just say if anybody's, uh, i- is still here in Mobile World Congress, wants to come and learn what we're doing, I only showed you a small section of the demos we've got here. We've got 13 demos across on 8th floor here. Uh, for those of you who want to talk to us (stutters) and have meetings with us, we've got 13 meeting rooms back there, over 500 costumer partner meetings this week, we've got some whisper suites for those of you who want to come and talk to us but we're innovating on going forward. So, you know, there's a lot that we're doing, we're really excited, there's a ton of passion at this event, and, uh, we're really excited about where the industry is going and our role in it. >> 'Preciate the tour, Aaron. Thanks Mike. >> Mike: Thank you! >> Well, for theCube... Again, Dave Nicholson here. Thanks for joining us on this tour of Dell's Presence here at MWC 2023.
SUMMARY :
with vice president of marketing for it going today, Dave? to getting the tour. the industry to drive value and the communication service providers. to be able to deliver value, and availability that we one of the challenges to a to be able to deploy, you know, the ecosystem with and the Lego city that the the Lego city that shows how What's all the Lego about? Yeah, so the Lego city here is to show- think I understand why you are to be able to brew better beer. So Aaron, you bring me to and temperature and the process to batch if you don't So I'm not sure the to get to the point that's looking to be able to the way that you validate architectures, to kind of take us through and really be deployed to the industry to be able to come and talk to us but we're 'Preciate the tour, Aaron. Thanks for joining us on this
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Aaron | PERSON | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
Dave Nicholson | PERSON | 0.99+ |
Aaron Chaisson | PERSON | 0.99+ |
Paul | PERSON | 0.99+ |
Massachusetts | LOCATION | 0.99+ |
Mike | PERSON | 0.99+ |
Copenhagen | LOCATION | 0.99+ |
Warren | PERSON | 0.99+ |
13 partners | QUANTITY | 0.99+ |
David Nicholson | PERSON | 0.99+ |
13 demos | QUANTITY | 0.99+ |
450 millimeters | QUANTITY | 0.99+ |
Dave | PERSON | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
last week | DATE | 0.99+ |
two places | QUANTITY | 0.99+ |
XR7620 | COMMERCIAL_ITEM | 0.99+ |
one site | QUANTITY | 0.99+ |
XR8000 | COMMERCIAL_ITEM | 0.99+ |
dozens | QUANTITY | 0.99+ |
Lego | ORGANIZATION | 0.99+ |
8th floor | QUANTITY | 0.99+ |
Intel | ORGANIZATION | 0.99+ |
Edge | ORGANIZATION | 0.98+ |
this week | DATE | 0.98+ |
both | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
first time | QUANTITY | 0.98+ |
three | QUANTITY | 0.98+ |
Wind River | ORGANIZATION | 0.98+ |
hundreds | QUANTITY | 0.98+ |
13 meeting rooms | QUANTITY | 0.98+ |
thousands of years ago | DATE | 0.97+ |
thousands of servers | QUANTITY | 0.97+ |
one | QUANTITY | 0.97+ |
Wind River | ORGANIZATION | 0.97+ |
OpenShift | TITLE | 0.97+ |
Red Hat | ORGANIZATION | 0.97+ |
Red Hat | TITLE | 0.97+ |
one server | QUANTITY | 0.96+ |
3x | QUANTITY | 0.96+ |
Red Hat | TITLE | 0.96+ |
Mobile World Congress | EVENT | 0.95+ |
One | QUANTITY | 0.94+ |
first | QUANTITY | 0.94+ |
Mobile World Congress | EVENT | 0.93+ |
16 more | QUANTITY | 0.93+ |
first one | QUANTITY | 0.92+ |
Edge | TITLE | 0.92+ |
over 500 costumer partner meetings | QUANTITY | 0.92+ |
dozens of these | QUANTITY | 0.9+ |
MWC 2023 | EVENT | 0.88+ |
thousands of sites | QUANTITY | 0.88+ |
about a year ago | DATE | 0.87+ |
Sapphire Rapids | OTHER | 0.87+ |
RAN- vRAN | TITLE | 0.87+ |
one small microbrewery | QUANTITY | 0.86+ |
Edge Computing | ORGANIZATION | 0.86+ |
Wind River | TITLE | 0.83+ |
one infrastructure block | QUANTITY | 0.82+ |
up to 2-300 watt | QUANTITY | 0.82+ |
RAN | TITLE | 0.81+ |
VMware | ORGANIZATION | 0.8+ |
Manish Singh, Dell Technologies & Doug Wolff, Dell Technologies | MWC Barcelona 2023
>> Announcer: theCUBE's live coverage is made possible by funding from Dell Technologies, creating technologies that drive human progress. (upbeat music) >> Welcome to the Fira in Barcelona, everybody. This is theCUBE's coverage of MWC 23, day one of that coverage. We have four days of wall-to-wall action going on, the place is going crazy. I'm here with Dave Nicholson, Lisa Martin is also in the house. Today's ecosystem day, and we're really excited to have Manish Singh who's the CTO of the Telecom Systems Business unit at Dell Technologies. He's joined by Doug Wolf who's the head of strategy for the Telecom Systems Business unit at Dell. Gents, welcome. What a show. I mean really the first major MWC or used to be Mobile World Congress since you guys have launched your telecom business, you kind of did that sort of in the Covid transition, but really exciting, obviously a huge, huge venue to match the huge market. So Manish, how did you guys get into this? What did you see? What was the overall thinking to get Dell into this business? >> Manish: Yeah, well, I mean just to start with you know, if you look at the telecom ecosystem today, the service providers in particular, they are looking for network transformation, driving more disaggregation into their network so that they can get better utilization of the infrastructure, but then also get more agility, more cloud native characteristics onto their, for their networks in particular. And then further on, it's important for them to really start to accelerate the pace of innovation on the networks itself, to start more supply chain diversity, that's one of the challenges that they've been having. And so there've been all these market forces that have been really getting these service providers to really start to transform the way they have built the infrastructure in the past, which was legacy monolithic architectures to more cloud native disaggregated. And from a Dell perspective, you know, that really gives us the permission to play, to really, given all the expertise on the work we have done in the IT with all the IT transformations to leverage all that expertise and bring that to the service providers and really help them in accelerating their network transformation. So that's where the journey started. We've been obviously ever since then working on expanding the product portfolio on our compute platforms to bring Teleco great compute platforms with more capabilities than we can talk about that. But then working with partners and building the ecosystem to again create this disaggregated and open ecosystem that will be more cloud native and really meet the objective that the service providers are after. >> Dave Vellante: Great, thank you. So, Doug the strategy obviously is to attack this market, as Manish said, from an open standpoint, that's sort of new territory. It's like a little bit like the wild, wild west. So maybe you could double click on what Manish was saying from a, from a strategy standpoint, yes, the Telecos need to be more flexible, they need to be more open, but they also need this reliability piece. So talk about that from a strategy standpoint of what you guys saw. >> Doug: Yeah, absolutely. As Manish mentioned, you know, Dell getting into open systems isn't something new. You know, Dell has been kind of playing in that world for years and years, but the opportunity in Telecom that came was opening of the RAN, the core network, the edge, all of these with 5G really created a wide opening for us. So we started developing products and solutions, you know, built our first Telecom grade servers for open RAN over the last year, we'll talk about those at the show. But you know, as, as Manish mentioned, an open ecosystem is new to Telecom. I've been in the Telecom business along with Manish for, you know, 25 plus years and this is a new thing that they're embarking on. So started with virtualization about five, six years ago, and now moving to cloud native architectures on the core, suddenly there's this need to have multiple parties partner really well, share specifications, and put that together for an operator to consume. And I think that's just the start of really where all the challenges are and the opportunities that we see. >> Where are we in this transition cycle? When the average consumer hears 5G, feels like it's been around for a long time because it was hyped beforehand. >> Doug: Yeah. >> If you're talking about moving to an open infrastructure model from a proprietary closed model, when is the opportunity for Dell to become part of that? Is it, are there specific sites that have already transitioned to 5G, therefore they've either made the decision to be open or not? Or are there places where the 5G transition has taken place, and they might then make a transition to open brand with 5G? Where, where are we in that cycle? What does the opportunity look like? >> I'll kind of take it from the typology of the operator, and I'm sure Manish will build on this, but if I look back on the core, started to get virtualized you know, back around 2015-16 with some of the lead operators like AT&T et cetera. So Dell has been partnering with those operators for some years. So it really, it's happening on the core, but it's moving with 5G to more of a cloud-like architecture, number one. And number two, they're going beyond just virtualizing the network. You know, they previously had used OpenStack and most of them are migrating to more of a cloud native architecture that Manish mentioned. And that is a bit different in terms of there's more software vendors in that ecosystem because the software is disaggregated also. So Dell's been playing in the core for a number of years, but we brought out new solutions we've announced at the show for the core. And the parts that are really starting that transition of maybe where the core was back in 2015 is on the RAN and on the edge in particular. >> Because NFV kind of predated the ascendancy of cloud. >> Exactly, yeah. >> Right, so it really didn't have the impact that people had hoped. And there's some, when you look back, 'cause it's not same wine, new bottle as the open systems movement, there are a lot of similarities but you know, you mentioned cloud, and cloud native, you really didn't have, back in the nineties, true engineered systems. You didn't really have AI that, you know, to speak of at the sort of volume of the data that we have. So Manish, from a CTO's perspective, how are you attacking some of those differences in bringing that to market? >> Manish: Yeah, I mean, I think you touched on some very important points there. So first of all, the duck's point, a lot of this transformation started in the core, right? And as the technology evolution progress, the opportunities opened up. It has now come into the edge and the radio access network as well, in particular with open RAN. And so when we talk about the disaggregation of the infrastructure from the software itself and an open ecosystem, this now starts to create the opportunity to accelerate innovation. And I really want to pick up on the point that you'd said on AI, for example. AI and machine learning bring a whole new set of capabilities and opportunities for these service providers to drive better optimization, better performance, better sustainability and energy efficiency on their infrastructure, on and on and on. But to really tap into these technologies, they really need to open that up to third parties implementation solutions that are coming up. And again, the end objective remains to accelerate that innovation. Now that said, all these things need to be brought together, right? And delivered and deployed in the network without any degradation in the KPIs and actually improving the performance on different vectors, right? So this is what the current state of play is. And with this aggregation I'm definitely a believer that all these new technologies, including AI, machine learning, and there's a whole area, host area of problems that can be solved and attacked and are actually getting attacked by applying AI and machine learning onto these networks. >> Open obviously is good. Nobody's ever going to, you know, argue that open is a bad thing. It's like democracy is a good thing, right? At least amongst us. And so, but, the RAN, the open RAN, has to be as reliable and performant, right, as these, closed networks. Or maybe not, maybe it doesn't have to be identical. Just has to be close enough in order for that tipping point to occur. Is that a fair summarization? What are you guys hearing from carriers in terms of their willingness to sort of put their toe in the water and, and what could we expect in terms of the maturity model of, of open RAN and adoption? >> Right, so I mean I think on, on performance that, that's a tough one. I think the operators will demand performance and you've seen experiments, you've really seen more of the Greenfield operators kind of launch. >> Okay. >> Doug: Open RAN or vRAN type solutions. >> So they're going to disrupt. >> Doug: Yeah, they're going to disrupt. >> Yeah. >> Doug: And there's flexibility in an open RAN architecture also for 5G that they, that they're interested in and I think the Brownfield operators are too, but let's say maybe the Greenfield jump first in terms of doing that from a mass deployment perspective. But I still think that it's going to be critical to meet very similar SLAs and end user performance. And, you know, I think that's where, you know, maturity of that model is what's required. I think Brownfield operators are conservative in terms of, you know, going with something they know, but the opportunities and the benefits of that architecture and building new flexible, potentially cost advantaged over time solutions, that's what the, where the real interest is going forward. >> And new services that you can introduce much more quickly. You know, the interesting thing about Dell to me, you don't compete with the carriers, the public cloud vendors though, the carriers are concerned about them sort of doing an end run on them. So you provide a potential partnership for the carriers that's non-threatening, right? 'Cause you're, you're an arms dealer, you're selling hardware and software, right? But, but how do you see that? Because we heard in the keynote today, one of the Teleco, I think it was the chairman of Telefonica said, you know, cloud guys can't do this alone. You know, they need, you know, this massive, you know, build out. And so, what do you think about that in terms of your relationship with the carriers not being threatening? I mean versus say potentially the cloud guys, who are also your partners, I understand, it's a really interesting dynamic, isn't it? >> Manish: Yeah, I mean I think, you know, I mean, the way I look at it, the carriers actually need someone like Dell who really come in who can bring in the right capabilities, the right infrastructure, but also bring in the ecosystem together and deliver a performance solution that they can deploy and that they can trust, number one. Number two, to your point on cloud, I mean, from a Dell perspective, you know, we announced our Dell Telecom Multicloud Foundation and as part of that last year in September, we announced what we call is the Dell Telecom Infrastructure Blocks. The first one we announced with Wind River, and this is, think of it as the, you know, hardware and the cashier all pre-integrated with lot of automation around it, factory integrated, you know, delivered to customers in an integrated model with all the licenses, everything. And so it starts to solve the day zero, day one, day two integration deployment and then lifecycle management for them. So to broaden the discussion, our view is it's a multicloud world, the future is multicloud where you can have different clouds which can be optimized for different workloads. So for example, while our work with Wind River initially was very focused on virtualization of the radio access network, we just announced our infrastructure block with Red Hat, which is very much targeted and optimized for core network and edge, right? So, you know, there are different workflows which will require different capabilities also. And so, you know, again, we are bringing those things to these service providers to again, bring those cloud characteristics and cloud native architecture for their network. >> And It's going to be hybrid, to your point. >> David N.: And you, just hit on something, you said cloud characteristics. >> Yeah. >> If you look at this through the lens of kind of the general world of IT, sometimes when people hear the word cloud, they immediately leap to the idea that it's a hyperscale cloud provider. In this scenario we're talking about radio towers that have intelligence living on them and physically at the base. And so the cloud characteristics that you're delivering might be living physically in these remote locations all over the place, is that correct? >> Yeah, I mean that, that's true. That will definitely happen over time. But I think, I think we've seen the hyperscalers enter, you know, public cloud providers, enter at the edge and they're dabbling maybe with private, but I think the public RAN is another further challenge. I think that maybe a little bit down the road for them. So I think that is a different characteristic that you're talking about managing the macro RAN environment. >> Manish: If I may just add one more perspective of this cloud, and I mean, again, the hyperscale cloud, right? I mean that world's been great when you can centralize a lot of compute capability and you can then start to, you know, do workload aggregation and use the infrastructure more efficient. When it comes to Telecom, it is inherently it distributed architecture where you have access, you talked about radio access, your port, and it is inherently distributed because it has to provide the coverage and capacity. And so, you know, it does require different kind of capabilities when you're going out and about, and this is where I was talking about things like, you know, we just talked, we just have been working on our bare metal orchestration, right? This is what we are bringing is a capability where you can actually have distributed infrastructure, you can deploy, you can actually manage, do lifecycle management, in a distributed multicloud form. So it does require, you know, different set of capabilities that need to be enabled. >> Some, when talking about cloud, would argue that it's always been information technology, it always will be information technology, and especially as what we might refer to as public cloud or hyperscale cloud providers, are delivering things essentially on premises. It's like, well, is that cloud? Because it feels like some of those players are going to be delivering physical infrastructure outside of their own data centers in order to address this. It seems the nature, the nature of the beast is that some of these things need to be distributed. So it seems perfectly situated for Dell. That's why you guys are both at Dell now and not working for other Telecom places, right? >> Exactly. Exactly, yes. >> It's definitely an exciting space. It's transformed, the networks are under transformation and I do think that Dell's very well positioned to, to really help the customers, the service providers in accelerating their transformation journey with an open ecosystem. >> Dave V.: You've got the brand, and the breadth, and the resources to actually attract an ecosystem. But I wonder if you could sort of take us through your strategy of ecosystem, the challenges that you've seen in developing that ecosystem and what the vision is that ultimately, what's the outcome going to be of that open ecosystem? >> Yeah, I can start. So maybe just to give you the big picture, right? I mean the big picture, is disaggregation with performance, right, TCO models to the service providers, right? And it starts at the infrastructure layer, builds on bringing these cloud capabilities, the cast layer, right? Bringing the right accelerators. All of this requires to pull the ecosystem. So give you an example on the infrastructure in a Teleco grade servers like XR8000 with Sapphire, the new intel processors that we've just announced, and an extended array of servers. These are Teleco grade, short depth, et cetera. You know, the Teleco great characteristic. Working with the partners like Marvel for bringing in the accelerators in there, that's important to again, drive the performance and optimize for the TCO. Working then with partners like Wind River, Red Hat, et cetera, to bring in the cast capabilities so you can start to see how this ecosystem starts to build up. And then very recently we announced our private 5G solution with AirSpan and Expeto on the core site. So bringing those workloads together. Similarly, we have an open RAN solution we announce with Fujitsu. So it's, it's open, it's disaggregated, but bringing all these together. And one of the last things I would say is, you know, to make all this happen and make all of these, we've also been putting together our OTEL, our open Telecom ecosystem lab, which is very much geared, really gives this open ecosystem a playground where they can come in and do all that heavy lifting, which is anyways required, to do the integration, optimization, and board. So put all these capabilities in place, but the end goal, the end vision again, is that cloud native disaggregated infrastructure that starts to innovate at the speed of software and scales at the speed of cloud. >> And this is different than the nineties. You didn't have something like OTEL back then, you know, you didn't have the developer ecosystem that you have today because on top of everything that you just said, Manish, are new workloads and new applications that are going to be developed. Doug, anything you'd add to what Manish said? >> Doug: Yeah, I mean, as Manish said, I think adding to the infrastructure layers, which are, you know, critical for us to, to help integrate, right? Because we kind of took a vertical Teleco stack and we've disaggregated it, and it's gotten a little bit more complex. So our Solutions Dell Technology infrastructure block, and our lab infrastructure with OTEL, helps put those pieces together. But without the software players in this, you know, that's what we really do, I think in OTEL. And that's just starting to grow. So integrating with those software providers with that integration is something that the operators need. So we fill a gap there in terms of either providing engineered solutions so they can readily build on or actually bringing in that software provider. And I think that's what you're going to see more from us going forward is just extending that ecosystem even further. More software players effectively. >> In thinking about O-RAN, are they, is it possible to have the low latency, the high performance, the reliability capabilities that carriers are used to and the flexibility? Or can you sort of prioritize one over the other from a go to market and rollout standpoint and optimize one, maybe get a foothold in the market? How do you see that balance? >> Manish: Oh the answer is absolutely yes you can have both We are on that journey, we are on that journey. This is where all these things I was talking about in terms of the right kind of accelerators, right kind of capabilities on the infrastructure, obviously retargeting the software, there are certain changes, et cetera that need to be done on the software itself to make it more cloud native. And then building all the surrounding capabilities around the CICD pipeline and all where it's not just day zero or day one that you're doing the cloud-like lifecycle management of this infrastructure. But the answer to your point, yes, absolutely. It's possible, the technology is there, and the ecosystem is coming together, and that's the direction. Now, are there challenges? Absolutely there are challenges, but directionally that's the direction the industry is moving to. >> Dave V.: I guess my question, Manish, is do they have to go in lockstep? Because I would argue that the public cloud when it first came out wasn't nearly as functional as what I could get from my own data center in terms of recovery, you know, backup and recovery is a perfect example and it took, you know, a decade plus to get there. But it was the flexibility, and the openness, and the developer affinity, the programmability, that attracted people. Do you see O-RAN following a similar path? Or does it, my question is does it have to have that carrier class reliability today? >> David N.: Everything on day one, does it have to have everything on day one? >> Yeah, I mean, I would say, you know, like again, the Greenfield operators I think we're, we're willing do a little bit more experimentation. I think the operators, Brownfield operators that have existing, you know, deployments, they're going to want to be closer. But I think there's room for innovation here. And clearly, you know, Manish came from, from Meta and we're, we've been very involved with TIP, we're very involved with the O-RAN alliance, and as Manish mentioned, with all those accelerators that we're working with on our infrastructure, that is a space that we're trying to help move the ball forward. So I think you're seeing deployments from mainstream operators, but it's maybe not in, you know, downtown New York deployment, they're more rural deployments. I think that's getting at, you know, kind of your question is there's maybe a little bit more flexibility there, they get to experiment with the technology and the flexibility and then I think it will start to evolve >> Dave V.: And that's where the disruption's going to come from, I think. >> David N.: Well, where was the first place you could get reliable 4K streaming of video content? It wasn't ABC, CBS, NBC. It was YouTube. >> Right. >> So is it possible that when you say Greenfield, are a lot of those going to be what we refer to as private 5G networks where someone may set up a private 5G network that has more functions and capabilities than the public network? >> That's exactly where I was going is that, you know, that that's why you're seeing us getting very active in 5G solutions that Manish mentioned with, you know, Expeto and AirSpan. There's more of those that we haven't publicly announced. So I think you'll be seeing more announcements from us, but that is really, you know, a new opportunity. And there's spectrum there also, right? I mean, there's public and private spectrum. We plan to work directly with the operators and do it in their spectrum when needed. But we also have solutions that will do it, you know, on non-public spectrum. >> So let's close out, oh go ahead. You you have something to add there? >> I'm just going to add one more point to Doug's point, right? Is if you look on the private 5G and the end customer, it's the enterprise, right? And they're, they're not a service provider. They're not a carrier. They're more used to deploying, you know, enterprise infrastructure, maintaining, managing that. So, you know, private 5G, especially with this open ecosystem and with all the open run capabilities, it naturally tends to, you know, blend itself very well to meet those requirements that the enterprise would have. >> And people should not think of private 5G as a sort of a replacement for wifi, right? It's to to deal with those, you know, intense situations that can afford the additional cost, but absolutely require the reliability and the performance and, you know, never go down type of scenario. Is that right? >> Doug: And low latencies usually, the primary characteristics, you know, for things like Industry 4.0 manufacturing requirements, those are tough SLAs. They're just, they're different than the operator SLAs for coverage and, you know, cell performance. They're now, you know, Five9 type characteristics, but on a manufacturing floor. >> That's why we don't use wifi on theCUBE to broadcast, we need a hard line. >> Yeah, but why wouldn't it replace wifi over time? I mean, you know, I still have a home phone number that's hardwired to align, but it goes to a voicemail. We don't even have handset anymore for it, yeah. >> I think, well, unless the cost can come down, but I think that wifi is flexible, it's cheap. It's, it's kind of perfect for that. >> Manish: And it's good technology. >> Dave V.: And it works great. >> David N.: For now, for now. >> Dave V.: But you wouldn't want it in those situations, and you're arguing that maybe. >> I'm saying eventually, what, put a sim in a device, I don't know, you know, but why not? >> Yeah, I mean, you know, and Dell offers, you know, from our laptop, you know, our client side, we do offer wifi, we do offer 4G and 5G solutions. And I think those, you know, it's a volume and scale issue, I think for the cost structure you're talking about. >> Manish: Come to our booth and see the connected laptop. >> Dave V.: Well let's, let's close on that. Why don't you guys talk a little bit about what you're going on at the show, I did go by the booth, you got a whole big lineup of servers. You got some, you know, cool devices going on. So give us the rundown and you know, let's end with the takeaways here. >> The simple rundown, a broad range of new powered servers, broad range addressing core, edge, RAN, optimized for those with all the different kind of acceleration capabilities. You can see that, you can see infrastructure blocks. These are with Wind River, with Red Hat. You can see OTEL, the open telecom ecosystem lab where all that playground, the integration, the real work, the real sausage makings happening. And then you will see some interesting solutions in terms of co-creation that we are doing, right? So you, you will see all of that and not to forget the connected laptops. >> Dave V.: Yeah, yeah, cool. >> Doug: Yeah and, we mentioned it before, but just to add on, I think, you know, for private 5G, you know, we've announced a few offers here at the show with partners. So with Expeto and AirSpan in particular, and I think, you know, I just want to emphasize the partnerships that we're doing. You know, we're doing some, you know, fundamental integration on infrastructure, bare metal and different options for the operators to get engineered systems. But building on that ecosystem is really, the move to cloud native is where Dell is trying to get in front of. And we're offering solutions and a much larger ecosystem to go after it. >> Dave V.: Great. Manish and Doug, thanks for coming on the program. It was great to have you, awesome discussion. >> Thank you for having us. >> Thanks for having us. >> All right, Dave Vellante for Dave Nicholson and Lisa Martin. We're seeing the disaggregation of the Teleco network into open ecosystems with integration from companies like Dell and others. Keep it right there for theCUBE's coverage of MWC 23. We'll be right back. (upbeat tech music)
SUMMARY :
that drive human progress. I mean really the first just to start with you know, of what you guys saw. for open RAN over the last year, When the average consumer hears 5G, and on the edge in particular. the ascendancy of cloud. in bringing that to market? So first of all, the duck's point, And so, but, the RAN, the open RAN, the Greenfield operators but the opportunities and the And new services that you and this is, think of it as the, you know, And It's going to be you said cloud characteristics. and physically at the base. you know, public cloud providers, So it does require, you know, the nature of the beast Exactly, yes. the service providers in and the resources to actually So maybe just to give you ecosystem that you have today something that the operators need. But the answer to your and it took, you know, a does it have to have that have existing, you know, deployments, going to come from, I think. you could get reliable 4K but that is really, you You you have something to add there? that the enterprise would have. It's to to deal with those, you know, the primary characteristics, you know, we need a hard line. I mean, you know, I still the cost can come down, Dave V.: But you wouldn't And I think those, you know, and see the connected laptop. So give us the rundown and you know, and not to forget the connected laptops. the move to cloud native is where Dell coming on the program. of the Teleco network
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Doug | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
Dave Nicholson | PERSON | 0.99+ |
Lisa Martin | PERSON | 0.99+ |
Fujitsu | ORGANIZATION | 0.99+ |
ABC | ORGANIZATION | 0.99+ |
2015 | DATE | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
Doug Wolf | PERSON | 0.99+ |
OTEL | ORGANIZATION | 0.99+ |
CBS | ORGANIZATION | 0.99+ |
Manish Singh | PERSON | 0.99+ |
NBC | ORGANIZATION | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
David N. | PERSON | 0.99+ |
AT&T | ORGANIZATION | 0.99+ |
Marvel | ORGANIZATION | 0.99+ |
AirSpan | ORGANIZATION | 0.99+ |
Brownfield | ORGANIZATION | 0.99+ |
Telefonica | ORGANIZATION | 0.99+ |
Greenfield | ORGANIZATION | 0.99+ |
Teleco | ORGANIZATION | 0.99+ |
Manish | ORGANIZATION | 0.99+ |
Red Hat | ORGANIZATION | 0.99+ |
Expeto | ORGANIZATION | 0.99+ |
Wind River | ORGANIZATION | 0.99+ |
YouTube | ORGANIZATION | 0.99+ |
last year | DATE | 0.99+ |
Dave V. | PERSON | 0.99+ |
Manish | PERSON | 0.99+ |
MWC 23 | EVENT | 0.99+ |
Doug Wolff | PERSON | 0.99+ |
first | QUANTITY | 0.99+ |
Dell Telecom Multicloud Foundation | ORGANIZATION | 0.99+ |
Barcelona | LOCATION | 0.99+ |
September | DATE | 0.99+ |
Mobile World Congress | EVENT | 0.99+ |
25 plus years | QUANTITY | 0.99+ |
O-RAN | ORGANIZATION | 0.99+ |
Telecos | ORGANIZATION | 0.98+ |
today | DATE | 0.98+ |
Driving Business Results with Cloud Transformation | Jay Dowling and Jim Miller
(upbeat music) >> Hello and welcome to what is sure to be an insightful conversation about getting business results with cloud transformation. My name is Dave Vellante and I'm here with James Miller, Chief Technologist for Cloud and Infrastructure Services and Jay Dowling, America's Sales Lead for cloud and infrastructure services both with DXC Technology. Gentlemen, thanks for your time today. Welcome to the Cube. >> Great. Thanks for having us. >> Thank you Dave. Appreciate it. >> So let's get right into it. You know, I've talked to a lot of practitioners who've said, look, if you really want to drop zeros, like a lot of zeros to the bottom line, you can't just lift and shift. You really got to think about modernizing the application portfolio, you got to think about your business model and really think about transforming your business particularly the operating model. So my first question Jim is what role does the cloud play in modernization? >> Well, there are really three aspects that the cloud plays in modernization. You mentioned multiple zeros. One is cost optimization and that can be achieved through business operations, through environmental, social and governance. Also being more efficient with your IT investments. But that's not the only aspect. There's also agility and innovation and that can be achieved through automation and productivity, speed to market for new features and functions, improvements in the customer experience and the capability to metabolize a great deal more data in your environment which the end result is an improvement in releasing of new things to the field. And finally, there's resilience and I'm not really talking about IT resilience, but more of business resilience. To be able to handle operational risk, improve your securities and controls, deal with some of the talent gap that's in the industry and also protect your brand reputation. So modernization is really about balancing these three aspects, cost optimization, agility and innovation and resilience. >> So, thank you for that. So Jay, I got to ask you, in the current climate everybody's sort of concerned and there's not great visibility on the macro. So Jim mentioned cost optimization. That seems to be one of the top areas that customers are focused on. The two I hear a lot are consolidating redundant vendors and optimizing cloud costs. So that's, you know, top of mind today. I think everybody really, you know understands the innovation and agility piece at least at a high level, maybe realizing it is different. And then the business resilience piece is really interesting because, you know, prior to the pandemic people you know, they had a DR strategy, but they realized, wow, my business might not be that resilient. So Jay, my question to you is what are you hearing when you talk to customers? What's the priority today? >> You know, priority is often an overused term in digital transformation, you know people want to get ready for next generation environments, customer experience, making sure they're improving, you know, how they engage with their clients and what their branding is. And what we find is a lot of clients don't have the underlying infrastructure in place today to get to where they want to get to. So cloud becomes an important element of that. But, you know, with DXC'S philosophy not everything necessarily needs to go to cloud to be cost optimized for instance, in many cases you can run applications, you know in your own data center or on-prem or in other environments in a hybrid environment or multi-cloud environment and still be very optimized from a cost spend standpoint, and also put yourself in position for modernization and for be able to do the bring the things to the business that the clients are you know, that their clients are looking for like the CMO and the CFO, et cetera, trying to use IT as a lever to drive business and to drive, you know business acceleration and drive profitability, frankly. So there's a lot of dependency on infrastructure, but there's a lot of elements to it. And we advocate for, you know there's not a single answer to that. We'd like to evaluate clients' environments and work with them to get them to an optimal target operating model you know, so that they can really deliver on what the promises are for their departments. >> So let's talk about some of the barriers to realizing value in a context of modernization. We talked about cost optimization, agility and resilience. But there's a business angle and there's a technical angle here. We always talk about people process and technology, technology oftentimes CIOs will tell us, well, that's the easy part, We'll figure that out whether it's true or not but I agree, people and process are sometimes the tough ones. So Jay, why don't you start, what do you see as the barriers, particularly from a business standpoint? >> Well, I think people need to let their guard down and be open to the ideas that are out there in the market from, you know, the standards that are being built by, you know best in class models, and there's many people that have gone on, you know cloud journeys and been very successful with it. There's others that have set high expectations with their business leaders that haven't necessarily met the goals that they need to meet or maybe haven't met them as quickly as they promised. So there's a, you know, there's a change management aspect that you'd need to look at with the, you know, with the environments, there's a, you know, there's a skillset environment that they need to be prepared for. Do they have the people, you know, to deliver with the, you know, with the tools and the skills and the models that they're putting themselves in place for in the future versus where they are now? There's just a lot of, you know there's a lot of different elements. It's not just a this price is better or this can operate better than one environment over the other. I think we like to try to look at things holistically and make sure that, you know, we're being, you know as much of a consultative advocate for the client, for, you know, where they want to go, what their destiny is, and based on what we've learned with other clients, you know and we can bring those best practices forward because we've worked, you know across such a broad spectrum of clients versus them being somewhat contained and sometimes can't see outside of their own, you know their own challenges if you would. So they need advocacy to help, you know bring them to the next level. And we like to translate that through you know, technology advances, which, you know Jim's really good at doing for us. >> Yeah. Jim, is the big barrier a skills issue, you know, bench strength? Are there other considerations from your perspective? >> Well, we've identified a number of factors that inhibit success of customers. One is, thinking it's only a technology change in moving to cloud when it's much broader than that. There are changes in governance, changes in process that need to take place. The other is evaluating the cloud providers on their current pricing structure and performance. And we see pricing and structure changing dramatically every few months between the various cloud providers. And you have to be flexible enough to determine which providers you want, and it may not be feasible to just have a single cloud provider in this world. The other thing is a big bang approach to transformation. I want to move everything and I want to move it all at once. That's not necessarily the best approach. A well thought out cloud journey and strategy and timing your investments, are really important to get maximizing your business return on a journey to the cloud. And finally, not engaging stakeholders early and continuously. You have to manage expectations in moving to cloud on what business factors will get affected, how you will achieve your cost savings and how you will achieve the business impact over the journey and reporting out on that with very strict metrics to all of the stakeholders. >> You know, mentioned multi-cloud just then we had in January 17th we had our Supercloud two event and Supercloud is basically, it's really what multi-cloud should have been, I'd like to say. So it's just creating a common experience across clouds, and you guys were talking about, you know there's different governance, there's different security there's different pricing. So, and one of the takeaways from this event, in talking to customers and practitioners and technologists is you can't go it alone. So I wonder if you could talk about your partnership strategy, what do partners bring to the table and what is DXC's, you know, unique value? >> I'd be happy to lead with that if you'd like. >> Great. >> I, you know, we've got a vast partner ecosystem at DXC given the size and the history of the company. I can use several examples. One of the larger partners in my particular space is Dell technology, right? They're a great, you know, partner for us across many different areas of the business. It's not just a storage and compute play anymore. They're, on the edge. They're, you know, they've got intelligence in their networking devices now and they've really brought, you know a lot of value to us as a partner. And, you know, there's somebody who could look at Dell technology as somebody that might, you know have a victim, you know, effect because of all the hyperscaler activity and all the cloud activity. But they've really taken an outstanding attitude with this and said, listen, not all things are destined for cloud or not all things would operate better in a cloud environment, and they'd like to be part of those discussions to see how they can, you know how we can bring a multi-cloud environment, you know both private and public, you know to clients and let's look at the applications and the infrastructure and, and what's, you know what's the best optimal running environment, you know for us to be able to bring, you know the greatest value to the business with speed, with security, with, you know, and, you know the things that they want to keep closest to the business are often things that you want to kind of you know, keep on your premise or keep in your own data center. So they're an ideal model of somebody that's resourced us well, partners with us well in the market and we continue to grow that relationship day in and day out with those guys. And we really appreciate, you know their support of our strategy and we like to also compliment their strategy and work, you know work together hand in hand in front of our clients. >> Yeah. You know, Jim, Matt Baker, who's the Head of Strategic Planning at Dell talks about it's not a zero sum game. And I think, you know, you're right Jay, I think initially people felt like, oh wow, it is a zero sum game, but it's clearly not. And this idea of whether you call it super cloud or Uber cloud or multi-cloud, clearly Dell is headed in that direction and I've, you know, look at some of their future projects, their narrative. I'm curious from a technology standpoint, Jim, what your role is. Is it to make it all work? Is it to, you know, end to end? I wonder if you could help, you know, us understand that. >> Help us figure this out Jim (all laughing) >> Glad to expand on that. One of my key roles is developing our product roadmap for DXC offerings. And we do that roadmap in conjunction with our partners where we can leverage the innovation that our partners bring to the table, and we often utilize engineering resources from our partners to help us jointly build those offerings that adapt to changes in the market and also adapt to many of our customers changing needs over time. So my primary role is to look at the market, talk to our customers, and work with our partners, to develop a product roadmap for delivering DXC products and services to our clients so that they can get the return on investment on their technology journeys. >> You know, we've been working with these two firms for a while now. Even predates, you know, the name DXC and that transformation. I'm curious as to what's, how you would respond to what's unique. You know, you hear a lot about partnerships, you guys got a lot of competition, Dell has a lot of competition. What's specifically unique about this combination? >> I would say our unique approach, we call it cloud right. And that approach is making the right investments at the right time and on the right platforms. And our partners play a key role in that. So we encourage our customers to not necessarily have a cloud first approach but a cloud right approach, where they place the workloads in the environment that is best suited from a technology perspective, a business perspective and even a security and governance perspective. And the right approach might include mainframe, it might include an on-premises infrastructure, it could include private cloud, public cloud and SaaS components all integrated together to deliver that value. >> Yeah, Jay, please. It's a complicated situation for a lot of customers, but chime in here. >> And now if you were speaking still specifically to Dell here, like they also walk the talk, right? They invest in DXC as a partnership they put people on the ground that their only purpose in life is to help DXC succeed with Dell in, you know, arm in arm in front of clients. And it's not, you know, it's not a winner take all thing at all. It's really true partnership. They've brought solution resources. We have an account CTO, we've got executive sponsorship, we do regular QBR meetings, we have regular executive touchpoint meetings. It's really important that you keep a high level of intimacy with the client with the partners, you know, in the GSI community. And I've been with several GSI's and this is an exceptional example of true partnership and commitment to success with Dell technology. I'm really extremely impressed on the engagement level that we've had there and, you know, continue to show a lot of support, you know, both for them, you know there's other OEM partners of course in the market there's always going to be other technology solutions for certain clients but this has been a particularly strong element for us in our partnership and our go-to-market strategy. >> Well, I think too, just my observation is a lot of it is about trust. You guys have both earned the trust, kind of over the years, taking your arrows, you know, over decades, and you know, that just doesn't happen overnight. So guys, I appreciate it. Thanks for your time. It's all about getting cloud right, isn't it? >> That's right. Thank you Dave. Appreciate it very much. >> Thank you. >> Great to have you on. Keep it right there for more action on the cube right back. (upbeat music)
SUMMARY :
and I'm here with James Miller, Thanks for having us. you got to think about your business model and the capability to metabolize So Jay, my question to you is and to drive, you know So Jay, why don't you start, So they need advocacy to help, you know a skills issue, you know, and how you will achieve and what is DXC's, you know, unique value? I'd be happy to lead to see how they can, you know and I've, you know, look at and also adapt to many of Even predates, you know, in the environment that is for a lot of customers, with the partners, you know, and you know, that just Thank you Dave. Great to have you on.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Dave | PERSON | 0.99+ |
Jim | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
Jay Dowling | PERSON | 0.99+ |
Matt Baker | PERSON | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
James Miller | PERSON | 0.99+ |
Jay | PERSON | 0.99+ |
DXC | ORGANIZATION | 0.99+ |
Jim Miller | PERSON | 0.99+ |
January 17th | DATE | 0.99+ |
two firms | QUANTITY | 0.99+ |
One | QUANTITY | 0.99+ |
both | QUANTITY | 0.99+ |
DXC Technology | ORGANIZATION | 0.99+ |
two | QUANTITY | 0.99+ |
one | QUANTITY | 0.98+ |
first question | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
first approach | QUANTITY | 0.98+ |
Uber | ORGANIZATION | 0.98+ |
three aspects | QUANTITY | 0.96+ |
GSI | ORGANIZATION | 0.95+ |
pandemic | EVENT | 0.91+ |
three | QUANTITY | 0.91+ |
single answer | QUANTITY | 0.89+ |
zeros | QUANTITY | 0.83+ |
America | LOCATION | 0.82+ |
single cloud provider | QUANTITY | 0.81+ |
and Infrastructure Services | ORGANIZATION | 0.76+ |
Supercloud | EVENT | 0.74+ |
DXC | TITLE | 0.49+ |
Driving Business Results with Cloud
>> If you really want to make an impact to your business, it takes more than just moving your workloads into the cloud. So-called lift and shift is fine to reduce data center footprints and associated costs, but to really drive change, you don't want to simply "pave the cow path," as the saying goes. Rather, you need to think about the operating model, and that requires more comprehensive systems thinking. In other words, how will changes in technology affect business productivity? Or, you know what? Even flip that. What changes in my business process could lower cost, cut elapse times, and accelerate time to market, increase user productivity, and lower operational risks? And what role can technology play in supporting these mandates through modernization, automation, machine intelligence, and business resilience? And that's what we're here to discuss today. Welcome to Driving Business Results with Cloud Transformation, made Possible by Dell and DXC. My name is Dave Vellante, and today we're going to zoom out and explore many aspects of cloud transformation that leading organizations are acting on today. Yeah, sure, we're going to look at optimizing infrastructure, but we'll also dig deeper into cloud considerations, governance, compliance, and security angles, as well as the impact of emerging opportunities around edge and Industry 4.0. Our focus will be on how to remove barriers and help you achieve business outcomes. And to do this, our program features the long-term partnership between Dell and DXC. And we bring to this program six experts in three separate sessions, who are working directly with top organizations in virtually every industry to achieve high impact results. We're going to start with a conversation about cloud, the cloud operating model, and transforming key aspects of your infrastructure. And then we'll look into governance, security, and business resilience. And in our third session, we'll discuss exciting transformations that are occurring in smart manufacturing and facilities innovations. So let's get right into it with our first session. Enjoy the program. (bright music) Hello, and welcome to what is sure to be an insightful conversation about getting business results with cloud transformation. My name is Dave Vellante, and I'm here with James Miller, Chief Technologist for Cloud and Infrastructure Services, and Jay Dowling, Americas Sales Lead for Cloud and Infrastructure Services, both with DXC Technology. Gentlemen, thanks for your time today. Welcome to theCube. >> Great. Thanks for having us. >> Thank you Dave. Appreciate it. >> So let's get right into it. You know, I've talked to a lot of practitioners who've said, "Look, if you really want to drop zeros, like a lot of zeros to the bottom line, you can't just lift and shift." You really got to think about modernizing, the application portfolio. You got to think about your business model, and really think about transforming your business, particularly the operating model. So my first question, Jim, is, What role does the cloud play in modernization? >> Well, there are really three aspects that the, the cloud plays in modernization. You mentioned multiple zeros. One is cost optimization, and that can be achieved through business operations, through environmental, social, and governance. Also being more efficient with your IT investments. But that's not the only aspect. There's also agility and innovation. And that can be achieved through automation and productivity, speed to market for new features and functions, improvements in the customer experience, and the capability to metabolize a great deal more data in your environment, which the end result is an improvement in releasing of new things to the field. And finally, there's resilience. And I'm not really talking about IT resilience, but more of business resilience, to be able, to be able to handle operational risk, improve your securities and controls, deal with some of the talent gap that's in the industry, and also protect your brand reputation. So modernization is really about balancing these three aspects, cost optimization, agility and innovation, and resilience. >> So, so thank you for that. So Jay, I got to ask you, in the current climate, everybody's, you know, concerned, and there's not great visibility on the macro. So, Jim mentioned cost optimization. That seems to be one of the top areas that customers are focused on. The two I hear a lot are consolidating redundant vendors and optimizing cloud costs. So that's, you know, top of mind today. I think everybody really, you know, understands the innovation and, and, and agility piece, at least at a high level, maybe realizing it is different. And then the business resilience piece is really interesting because, you know, prior to the pandemic people, you know, they had a DR strategy, but they realized, "Wow, my business might not be that resilient." So Jay, my question to you is, What are you hearing when you talk to customers? What's the priority today? >> Yeah, the priority is an often overused term of digital transformation. You know, people want to get ready for next generation environments, customer experience, making sure they're improving, you know, how they engage with their clients and what their branding is. And what we find is a lot of clients don't have the underlying infrastructure in place today to get to where they want to get to. So cloud becomes an important element of that. But, you know, with DXC's philosophy, not everything goes to, not everything necessarily needs to go to cloud to be cost optimized, for instance. In many cases, you can run applications, you know, in your own data center, or on-prem, or in other environments, in a hybrid environment, or multi-cloud environment, and, and still be very optimized from a cost spend standpoint and also put yourself in position for modernization and for be able to do the, bring the things to the business that the clients are, you know, that their clients are looking for, like the CMO and the CFO, et cetera. Trying to use IT as a lever to drive business and to drive, you know, business acceleration and drive profitability, frankly. So there's a lot of dependency on infrastructure, but there's a lot of elements to it. And, and we advocate for, you know, there's not a single answer to that. We like to evaluate clients' environments and work with them to get them to an optimal target operating model, you know, so that they can really deliver on what the promises are for their departments. >> So if, let's talk about some of the, the barriers to realizing value in, in a context of modernization. We talked about cost optimization, agility, and, and, and resilience. But there's a business angle, and there's a technical angle here. 'Cause we always talk about people, process, and technology. Technology, oftentimes, CIOs will tell us, "Well, that's the easy part. We'll figured that out," whether it's true or not. But I agree, people and process is sometimes the tough one. So Jay, why don't you start. What do you see as the barriers, particularly from a business standpoint? >> I think people need to let their guard down and be open to the ideas that are, that are out there in the market from, you know, the, the standards that are being built by, you know, best in class models. And, and there's many people that have gone on, you know, cloud journeys and been very successful with it. There's others that have set high expectations with their business leaders that haven't necessarily met the goals that they need to meet or maybe haven't met them as quickly as they promised. So there's a, you know, there's a change management aspect that you'd need to look at with the, you know, with the environments. There's a, you know, there's a skillset set environment that they need to be prepared for. Do they have the people, you know, to deliver with the, you know, with the tools and the skills and the, and the models that that they're putting themselves in place for in the future versus where they are now? There's just a lot of, you know, there's a lot of different elements. It's not just a, "This price is better," or, "This can operate better than one environment over the other." I think we like to try to look at things holistically and make sure that, you know, we're being, you know, as much of a consultative advocate for the client, for where they want to go, what their destiny is, and based on what we've learned with other clients. You know, and we can bring those best practices forward because we've worked, you know, across such a broad spectra of clients versus them being somewhat contained and sometimes can't see outside of their own, you know, their own challenges, if you would. So they need, they need advocacy to help, you know, bring them to the next level. And we like to translate that through, you know, technology advances, which, you know, Jim's really good at doing for us. >> Yeah, Jim, is, is it, is it a, is the big barrier a skills issue, you know, bench strength? Are there other considerations from your perspective? >> Well, we, we've identified a number of factors that inhibit success of, of customers. One is thinking it's only a technology change in moving to cloud when it's much broader than that. There are changes in governance, changes in process that need to take place. The other is evaluating the cloud providers on their current pricing structure and performance. And, and we see pricing and structure changing dramatically every few months between the various cloud providers. And you have to be flexible enough to, to determine which providers you want. And it may not be feasible to just have a single cloud provider in this world. The other thing is a big bang approach to transformation, "I want to move everything, and I want to move it all at once." That's not necessarily the best approach. A well thought out cloud journey and strategy and timing your investments are really important to get at maximizing your business return on the journey to the cloud. And finally, not engaging stakeholders early and continuously. You have to manage expectations in moving to cloud on what business factors will get affected, how you will achieve your cost savings, and, and how you will achieve the business impact over the journey and reporting out on that with very strict metrics to all of the stakeholders. >> You know, mentioned multi-cloud just then. We had, in January 17th, we had our Supercloud 2 event. And Supercloud is basically, it's really multi, what multi-cloud should have been, I, I like to say. So it's this creating a common experience across clouds. And you guys were talking about, you know, there's different governance, there's different security, there's different pricing. So, and, and one of the takeaways from this event in talking to customers and practitioners and technologists is, you can't go it alone. So I wonder if you could talk about your partnership strategy, what do partners bring to the table, and what is, what is DXC's, you know, unique value? >> I'd be happy to lead with that if you'd like. >> Great. >> I, you know, we've got a vast partner ecosystem at DXC, given the size and, and the history of the company. I could use several examples. One of the larger partners in my particular space is Dell Technology, right? They're a great, you know, partner for us across many different areas of the business. It's not just a storage and compute play anymore. They're, they're on the edge. They're, you know, they're, they've got intelligence in their networking devices now. And they've really brought, you know, a lot of value to us as a partner. And, you know, there, there's somebody, you could look at Dell technology as somebody that might, you know, have a victim, you know, effect because of all the hyperscale activity and all the cloud activity. But they've really taken an outstanding attitude with this and say, "Listen, not all things are destined for cloud, or not all things would operate better in a cloud environment." And they like to be part of those discussions to see how they can, you know, how we can bring a multi-cloud environment, you know, both private and public, you know, to clients. And let's look at the applications and the infrastructure and, and what's, you know, what's the best optimal running environment, you know, for us to be able to bring, you know, the greatest value to the business with speed, with security, with, you know. And, you know, the things that they want to keep closest to the business are often things that you want to kind of, you know, keep on your premise or keep in your own data center. So they're, they're an ideal model of somebody that's resourced us well, partners with us well in the market. And, and we continue to grow that relationship day in and day out with those guys. And we really appreciate, you know, their support of our strategy, and, and we like to also compliment their strategy and work, you know, work together hand in hand in front of our clients. >> Yeah, you know, Jim, Matt Baker, who's the head of strategic planning at Dell talks about, "It's not a zero sum game." And I think, you know, you're right, Jay. I think initially people felt like, "Oh wow, it's, it is a zero sum game." But it's clearly not, and this idea of of, whether you call it supercloud or ubercloud or multicloud, clearly Dell is headed in in that direction. And I, you know, look at some of their future projects. There's their narrative. I'm curious from a technology standpoint, Jim, what your role is. Is it to make it all work? Is it to, you know, end to end? I wonder if you could help, you know, us understand that. >> Help us figure this out, Jim, here. (group laughing) >> Glad to expand on that. One of my key roles is developing our product roadmap for DXC offerings. And we do that roadmap in conjunction with our partners where we can leverage the innovation that our partners bring to the table. And we often utilize engineering resources from our partners to help us jointly build those offerings that adapt to changes in the market and also adapt to many of our customers changing needs over time. So my primary role is to look at the market, talk to our customers, and work with our partners to develop a product roadmap for delivering DXC products and services to our clients so that they can get the return on investment on their technology journeys. >> You know, we've been working with these two firms for a while now. Even predates, you know, the, the name DXC and that, that transformation. I'm curious as to what's, how you would respond to, "What's unique?" You know, you hear a lot about partnerships. You guys got a lot of competition. Dell has a lot of competition. What's specifically unique about this combination? >> I think, go ahead, Jim. >> I would say our unique approach, we call it cloud right. And that, that approach is making the right investments, at the right time, and on the right platforms. And our partners play a, play a key role in that. So we, we encourage our customers to not necessarily have a cloud first approach, but a cloud right approach where they place the workloads in the environment that is best suited from a technology perspective, a business perspective, and even a security and governance perspective. And, and the right approach might include mainframe. It might include an on-premises infrastructure. It could include private cloud, public cloud, and SaaS components all integrated together to deliver that value. >> Yeah, Jay, please. >> If you were... >> That is a complicated situation for a lot of customers. Chime in here. (Jay chuckles) >> And now, if you were speaking specifically to Dell here, like they, they also walk the talk, right? They invest in DXC as a partnership. They put people on the ground that their only purpose in life is to help DXC succeed with Dell in, you know, arm in arm in front of clients. And it's not, you know, it's not a winner take all thing at all. It's really a true partnership. They, they, they've brought solution resources. We have an account CTO. We've got executive sponsorship. We do regular QBR meetings. We have regular executive touchpoint meetings. It's really important that you keep a high level of intimacy with the client, with the partners, you know, and, and the, and the GSI community. And I, I've been with several GSIs, and, and this is an exceptional example of true partnership and commitment to success with Dell technology. I'm really extremely impressed on, on the engagement level that we've had there and, you know, continue to show a lot of support, you know, both for them. You know, there's other OEM partners, of course, in the market. There's always going to be other technology solutions for certain clients, but this has been a particularly strong element for us in our partnership and in our go-to-market strategy. >> Well, I think too, just my observation, is a lot of it's about trust. You guys have both earned the trust, the kind of, over the, over the years taking your arrows, you know, of over decades. And, and you know, that just doesn't happen overnight. So guys, I appreciate it. Thanks for your time. It's all about getting cloud right, isn't it? >> That's right. (chuckles) (Dave chuckles) >> Thank you Dave. Appreciate it very much. >> Dave, thank you. >> Jay, Jim, great to have you on. Keep it right there for more action on theCube. Be right back. (upbeat guitar music) (keyboard clicks) Welcome back to the program. My name is Dave Vellante, and in this session we're going to explore one of the more interesting topics of the day. IoT for smart factories and with me are Todd Edmunds, the Global CTO of Smart Manufacturing Edge and Digital Twins at Dell Technologies. That is such a cool title. (Todd chuckles) I want to be you. And Dr. Aditi Banerjee who's the Vice President, General Manager for Aerospace Defense and Manufacturing at DXC Technology. Another really cool title. Folks, welcome to the program. Thanks for coming on. >> Thank you. >> Thanks, Dave. Great to be here. >> Nice to be here. So, Todd, let's start with you. We hear a lot about Industry 4.0, smart factories, IIoT. Can you briefly explain like what is Industry 4.0 all about, and why is it important for the manufacturing industry? >> Yeah, sure, Dave. You know, it's been around for quite a while. And it's got, it's gone by multiple different names, as you said, Industry 4.0, smart manufacturing, industrial IoT, smart factory, but it all really means the same thing. Its really applying technology to get more out of the factories and the facilities that you have to do your manufacturing. So being much more efficient, implementing really good sustainability initiatives. And so we really look at that by saying, "Okay, what are we going to do with technology to really accelerate what we've been doing for a long, long time?" So it's really not, it's not new. It's been around for a long time. What's new is that manufacturers are looking at this not as a one-off, two-off, individual use case point of view. But instead they're saying, "We really need to look at this holistically, thinking about a strategic investment in how we do this, not to just enable one or two use cases, but enable many, many use cases across the spectrum." I mean, there's tons of them out there. There's predictive maintenance, and there's OEE, overall equipment effectiveness, and there's computer vision. And all of these things are starting to percolate down to the factory floor. But it needs to be done in a little bit different way. And, and, and really, to really get those outcomes that they're looking for in smart factory, or Industry 4.0, or however you want to call it, and truly transform. Not just throw an Industry 4.0 use case out there, but to do the digital transformation that's really necessary and to be able to stay relevant for the future. You know, I heard it once said that you have three options. Either you digitally transform and stay relevant for the future, or you don't and fade into history like 52% of the companies that used to be on the Fortune 500 since 2000, right? And so really that's a key thing, and we're seeing that really, really being adopted by manufacturers all across the globe. >> Yeah so, Aditi, that's like digital transformation is almost synonymous with business transformation. So is there anything you'd add to what Todd just said? >> Absolutely. Though, I would really add that what really drives Industry 4.0 is the business transformation, what we are able to deliver in terms of improving the manufacturing KPIs and the KPIs for customer satisfaction, right? For example, improving the downtime, you know, or decreasing the maintenance cycle of the equipments, or improving the quality of products, right? So I think these are a lot of business outcomes that our customers are looking at while using Industry 4.0 and the technologies of Industry 4.0 to deliver these outcomes. >> So Aditi, I wonder if I could stay with you. And maybe this is a bit esoteric. But when I first started researching IoT and, and, and Industrial IoT 4.0, et cetera, I felt, you know, while there could be some disruptions in the ecosystem, I kind of came to the conclusion that large manufacturing firms, aerospace defense companies, the firms building out critical infrastructure, actually had kind of an incumbent advantage in a great opportunity. Of course, then I saw on TV, somebody now they're building homes with 3D printers. Its like, blows your mind. So that's pretty disruptive, but, so, but they got to continue. The incumbents have to continue to invest in the future. They're well capitalized. They're pretty good businesses, very good businesses. But there's a lot of complexities involved in kind of connecting the old house to the new addition that's being built, if you will, or this transformation that we're talking about. So my question is, How are your customers preparing for this new era? What are the key challenges that they're facing and the, the blockers, if you will? >> Yeah, I mean the customers are looking at Industry 4.0 for greenfield factories, right? That is where the investments are going directly into building the factories with the new technologies, with the new connectivities, right, for the machines. For example, industrial IoT, having the right type of data platforms to drive computational analytics and outcomes, as well as looking at edge versus cloud type of technologies, right? Those are all getting built in the greenfield factories. However, for the install-based factories, right, that is where our customers are looking at, "How do I modernize these factories? How do I connect the existing machine?" And that is where some of the challenges come in on, you know, the legacy system connectivity that they need to think about. Also, they need to start thinking about cybersecurity and operation technology security, right, because now you are connecting the factories to each other, right? So cybersecurity becomes top of mind, right? So there is definitely investment that is involved. Clients are creating roadmaps for digitizing and modernizing these factories and investments in a very strategic way, right? So perhaps they start with the innovation program, and then they look at the business case, and they scale it up, right? >> Todd, I'm glad Aditi brought up security. Because if you think about the operations technology, you know, folks, historically, they air gapped, you know, the systems. That's how they created security. That's changed. The business came in and said, "Hey, we got to, we got to connect. We got to make it intelligent." So that's, that's got to be a big challenge as well. >> It, it, it absolutely is Dave. And, and you know, you can no longer just segment that because really, to get all of those efficiencies that we talk about, that IoT and Industrial IoT and Industry 4.0 promise, you have to get data out of the factory. But then you got to put data back in the factory. So no longer is it just firewalling everything is really the answer. So you really have to have a comprehensive approach to security, but you also have to have a comprehensive approach to the cloud and what that means. And does it mean a continuum of cloud all the way down to the edge, right down to the factory? It absolutely does because no one approach has the answer to everything. The more you go to the cloud, the broader the attack surface is. So what we're seeing is a lot of our customers approaching this from a, kind of that, that hybrid, you know, "write once, run anywhere" on the factory floor down to the edge. And one of the things we're seeing, too, is to help distinguish between what is the edge, and that, and, and bridge that gap between, like Dave, you talked about IT and OT. And also help that, what Aditi talked about, is the greenfield plants versus the brownfield plants that they call it, that are the legacy ones and modernizing those. Is, it's great to kind of start to delineate. What does that mean? Where's the edge? Where's the IT and the OT? We see that from a couple of different ways. We start to think about really two edges in a manufacturing floor. We talk about an industrial edge that sits, or some people call it a far edge or a thin edge, sits way down on that plan. It consists of industrial hardened devices that do that connectivity. The hard stuff about, "How do I connect to this obsolete legacy protocol and what do I do with it?" And create that next generation of data that has context. And then we see another edge evolving above that, which is much more of a data and analytics and enterprise grade application layer that sits down in the factory itself that helps figure out where we're going to run this. Does it connect to the cloud? Do we run applications on-prem? Because a lot of times that on-prem application is, is, needs to be done because that's the only way that its going to, it's going to work because of security requirements, because of latency requirements, performance, and a lot of times cost. It's really helpful to build that multiple edge strategy because then you kind of, you consolidate all of those resources, applications, infrastructure, hardware, into a centralized location. Makes it much, much easier to really deploy and manage that security. But it also makes it easier to deploy new applications, new use cases, and become the foundation for DXC's expertise and applications that they deliver to our customers as well. >> Todd, how complex are these projects? I mean, I feel like it's kind of the, the digital equivalent of building the Hoover Dam. I mean, it, it, it's, (chuckles) it, it, so. Yeah, how long does a typical project take? I know it varies, but what, you know, what are the critical success factors in terms of delivering business value quickly? >> Yeah, that's a great question in that, in that we're, you know, like I said at the beginning, we, this is not new. Smart factory and Industry 4.0 is not new. It's been, it's, people have been trying to implement the holy grail of smart factory for a long time. And what we're seeing is a switch, a little bit of a switch, or quite a bit of a switch, to where the enterprise and the IT folks are having a much bigger say and have a lot to offer to be able to help that complexity. So instead of deploying a computer here, and a gateway there, and a server there, I mean, you go walk into any manufacturing plant and you can see servers sitting underneath someone's desk or a, or a PC in a closet somewhere running a critical production application. So we're seeing the enterprise have a much bigger say at the table, much louder voice at the table to say, "We've been doing this at enterprise all the time. We, we know how to really consolidate, bring hyper-converged applications, hyper-converged infrastructure, to really accelerate these kind of applications, really accelerate the outcomes that are needed to really drive that smart factory, and start to bring that same capabilities down into the, on the factory floor." That way, if you do it once to make it easier to implement, you can repeat that. You can scale that. You can manage it much easily. And you can then bring that all together because you have the security in one centralized location. So we're seeing manufacturers, yeah, that first use case may be fairly difficult to implement and we got to go down in and see exactly what their problems are. But when the infrastructure is done the correct way, when that, think about how you're going to run that and how are you going to optimize the engineering. Well, let's take that, what you've done in that one factory, and then set. Let's that, make that across all the factories, including the factory that we're in, but across the globe. That makes it much, much easier. You really do the hard work once and then repeat, almost like a cookie cutter. >> Got it. Thank you. Aditi, what about the skillsets available to apply these, to these projects? You got to have knowledge of digital, AI, data, integration. Is there a talent shortage to get all this stuff done? >> Yeah, I mean definitely, a lot. Different types of skillsets are needed from a traditional manufacturing skillset, right? Of course, the basic knowledge of manufacturing is, is important. But the, the digital skillset sets like, you know, IoT, having a skillset in different protocols for connecting the machines, right, that experience that comes with it, data and analytics, security, augmented virtual reality programming. You know, again, looking at robotics and the digital twin. So you know, it's a lot more connectivity software, data driven skillsets that are needed to smart factory to life at scale. And, you know, lots of firms are, you know, recruiting these types of skill, resources with these skillsets to, you know, accelerate their smart factory implementation, as well as consulting firms like DXC Technology and others. We, we, we recruit. We, we train our talent to, to provide these services. >> Got it. Aditi, I wonder if we could stay on you. Let's talk about the partnership between DXC and Dell. What are you doing specifically to simplify the move to Industry 4.0 for customers? What solutions are you offering? How are you working together, Dell and DXC, to, to bring these to market? >> Yeah, Dell and DXC have a very strong partnership. You know, and we work very closely together to, to create solutions, to create strategies, and how we, we are going to jointly help our clients, right? So areas that we have worked closely together is edge compute, right, how that impacts the smart factory. So we have worked pretty closely in that area. We're also looked at vision technologies, you know. How do we use that at the edge to improve the quality of products, right? So we have several areas that we collaborate in. And our approach is that we, we want to bring solutions to our client, and as well as help them scale those solutions with the right infrastructure, the right talent, and the right level of security. So we bring a comprehensive solution to our clients. >> So, Todd, last question, kind of similar but different. You know, why Dell DXC? Pitch me. What's different about this partnership? You know, where do you, are you confident that, you know, you're going to be, deliver the best value to, to customers? >> Absolutely. Great question. You know, there's no shortage of bespoke solutions that are out there. There's hundreds of people that can come in and do individual use cases and do these things. And just, and, and, and that's, that's where it ends. What Dell and DXC Technology together bring to the table is, we do the optimization, the optimization of the engineering of those previously bespoke solutions upfront, together, right? The power of our scalables, enterprise-grade, structured, you know, industry standard infrastructure, as well as our expertise in delivering package solutions that really accelerate with DXC's expertise and reputation as a global, trusted, trusted advisor. Be able to really scale and repeat those solutions that DXC is so really, really good at. And, and Dell's infrastructure, and our, what, 30,000 people across the globe that are really, really good at that, at that scalable infrastructure, to be able to repeat. And then it really lessens the risk that our customers have and really accelerates those solutions. So it's again, not just one individual solutions, it's all of the solutions that not just drive use cases, but drive outcomes with those solutions. >> Yeah, the, you're right, the partnership has gone, I mean, I first encountered it back in, I think it was 2010, May of 2010, we had you, you guys both on theCube. I think you were talking about converged infrastructure. And I had a customer on, and it was, actually a manufacturing customer, was quite interesting. And back then it was, "How do we kind of replicate what's coming in the cloud?" And, and you guys have obviously taken it into the digital world. Really want to thank you for your time today. Great conversation, and love to have you back. >> Thank you so much. >> Absolutely. >> It was a pleasure speaking with you. >> I agree. >> All right, keep it right there for more discussions that educate and inspire on theCube. (bright music) Welcome back to the program and we're going to dig into the number one topic on the minds of every technology organization. That's cybersecurity. You know, survey data from ETR, our data partner, shows that among CIOs and IT decision makers, cybersecurity continues to rank as the number one technology priority to be addressed in the coming year. That's ahead of even cloud migration and analytics. And with me to discuss this critical topic area are Jim Shook, who's the Global Director of Cybersecurity and Compliance Practice at Dell Technologies, and he's joined by Andrew Gonzalez, who focuses on Cloud and Infrastructure consulting at DXC Technology. Gents, welcome. Good to have you. >> Thanks Dave. Great to be here. >> Thank you. >> Jim, let's start with you. What are you seeing from the front lines in terms of the attack surface, and, and how are customers responding these days? >> It's always up and down and back and forth. The bad actors are smart. They adapt to everything that we do. So we're seeing more and more kind of living off the land. They're not necessarily deploying malware. Makes it harder to find what they're doing. And I think though, Dave, we've, we've adapted, and this whole notion of cyber resilience really helps our customers figure this out. And the idea there goes beyond cybersecurity, it's, "Let's protect as much as possible, so we keep the bad actors out as much as we can. But then, let's have the ability to adapt to and recover to the extent that the bad actors are successful." So we're recognizing that we can't be perfect a hundred percent of the time against a hundred percent of the bad actors. Let's keep out what we can, but then recognize and have that ability to recover when necessary. >> Yeah, thank you. So Andrew, you know, I like what Jim was saying about living off the land, of course, meaning using your own tooling against you, kind of hiding in plain sight, if you will. But, and, and as Jim is saying, you, you can't be perfect. But, so given that, what's your perspective on what good cybersecurity hygiene looks like? >> Yeah, so you have to understand what your crown jewel data looks like, what a good copy of a recoverable asset looks like. When you look at an attack, if it were to occur, right, how you get that copy of data back into production. And not only that, but what that golden image actually entails. So, whether it's networking, storage, some copy of a source code, intellectual property, maybe CMBD data, or an active directory, or DNS dump, right? Understanding what your data actually entails so that you can protect it and that you can build out your recovery plan for it. >> So, and where's that live? Where's that gold copy? You put on a yellow sticky? No, it's got to be, (chuckles) you got to be somewhere safe, right? So you have to think about that chain as well, right? >> Absolutely. Yeah. You, so, a lot of folks have not gone through the exercise of identifying what that golden copy looks like. Everyone has a DR scenario, everyone has a DR strategy, but actually identifying what that golden crown jewel data, let's call it, actually entails is one aspect of it. And then where to put it, how to protect it, how to make it immutable and isolated, that's the other portion of it. >> You know, if I go back to sort of earlier part of last decade, you know, cybersecurity was kind of a checkoff item. And as you got toward the middle part of the decade, and I'd say clearly by 2016, it, security became a boardroom issue. It was on the agenda, you know, every quarter at the board meetings. So compliance is no longer the driver, is, is my point. The driver is business risk, real loss of reputation or data, you know, it's, or money, et cetera. What are the business implications of not having your cyber house in order today? >> They're extreme, Dave. I mean the, you know, the bad actors are good at what they do. These losses by organizations, tens, hundreds of millions into the billions sometimes, plus the reputational damage that's difficult to, to really measure. There haven't been a lot of organizations that have actually been put out of business by an attack, at least not directly on, if they're larger organizations. But that's also on the table, too. So you can't just rely on, "Oh we need to do, you know, A, B and C because our regulators require it." You need to look at what the actual risk is to the business, and then come up with a strategy from there. >> You know, Jim, staying with you, one of the most common targets we hear of attackers is to go after the backup corpus. So how should customers think about protecting themselves from that tactic? >> Well, Dave, you hit on it before, right? Everybody's had the backup and DR strategies for a long time going back to requirements that we had in place for physical disaster or human error. And that's a great starting point for resilience capability. But that's all it is, is a starting point. Because the bad actors will, they also understand that you have those capabilities, and, and they've adapted to that. In every sophisticated attack that we see, the backup is a target. The bad actors want to take it out, or corrupt it, or do something else to that backup so that it's not available to you. That's not to say they're always successful, and it's still a good control to have in place because maybe it will survive. But you have to plan beyond that. So the capabilities that we talk about with resilience, let's harden that backup infrastructure. You've already got it in place. Let's use the capabilities that are there like immutability and other controls to make it more difficult for the bad actors to get to. But then as Andrew said, that gold copy, that critical systems, you need to protect that in something that's more secure, which commonly we, we might say a cyber vault. Although, there's a lot of different capabilities for cyber vaulting, some far better than others, and that's some of the things that we focus on. >> You know, it's interesting, but I've talked to a lot of CIOs about this, is prior to the pandemic, they, you know, had their, as you're pointing out, Jim, they had their DR strategy in place, but they felt like they weren't business resilient. And they realized that when we had the forced march to digital. So Andrew, are there solutions out there to help with this problem? Do you guys have an answer to this? >> Yeah, absolutely. So I'm glad you brought up resiliency. We, we take a position that to be cyber resilient, it includes operational resiliency. It includes understanding at the C level what the implication of an attack means, as we stated, and then, how to recover back into production. When you look at protecting that data, not only do you want to put it into what we call a vault, which is a Dell technology that is an offline immutable copy of your crown jewel data, but also how to recover it in real time. So DXC offers a, I don't want to call it a turnkey solution since we architect these specific to each client needs, right, when we look at what client data entails, their recovery point, objectives, recovery time objectives, what we call quality of the restoration. But when we architect these out, we look at not only how to protect the data, but how to alert and monitor for attacks in real time, how to understand what we should do when a breach is in progress, putting together with our security operations centers, a forensic and recovery plan and a runbook for the client, and then being able to cleanse and remediate so that we can get that data back into production. These are all services that DXC offers in conjunction with the Dell solution to protect, and recover, and keep bad actors out. And if we can't keep them out to ensure that we are back into production in short order. >> You know, this, this discussion we've been having about DR kind of versus resilience, and, and you were just talking about RPO and RTO. I mean, it used to be that a lot of firms wouldn't even test their recovery 'cause it was too risky. Or, you know, maybe they tested it on, you know, July 4th or something like that. But, but it, I'm inferring that's changed. I wonder if we could, you know, double click on recovery? How hard is it to, to, to test that recovery, and, and how quickly are you seeing organizations recover from attacks? >> So it depends, right, on the industry vertical, what kind of data. Again, a financial services client compared to a manufacturing client are going to be two separate conversations. We've seen it as quickly as being able to recover in six hours, in 12 hours. In some instances we have the grace period of a day to a couple of days. We do offer the ability to run scenarios once a quarter where we can stand up in our systems the production data that we are protecting to ensure that we have a good recoverable copy. But it depends on the client. >> I really like the emphasis here, Dave, that you're raising and that Andrew's talking about. It's not on the technology of how the data gets protected. It's focused on the recovery. That's all that we want to do. And so the solution with DXC really focuses on generating that recovery for customers. I think where people get a little bit twisted up on their testing capability is, you have to think about different scenarios. So there are scenarios where the attack might be small. It might be limited to a database or an application. It might be really broadly based like the NotPetya attacks from a few years ago. The regulatory environment, we call those attacks severe but plausible. So you can't necessarily test everything with the infrastructure, but you can test some things with the infrastructure. Others, you might sit around on a tabletop exercise or walk through what that looks like to really get that, that recovery kind of muscle, muscle memory so that people know what to do when those things occur. But the key to it, as Andrew said before, have to focus down, "What are those critical applications? What do we need, what's most important? What has to come back first?" And that really will go a long way towards having the right recovery points and recovery times from a cyber disaster. >> Yeah, makes sense. Understanding the value of that data is going to inform you how to, how to respond and how to prioritize. Andrew, one of the things that we hear a lot on theCube, especially lately, is around, you know, IOT, IIOT, Industry 4.0, the whole OT security piece of it. And the problem being that, you know, traditionally, operations technologies have been air gapped, often by design. But as businesses, increasingly they're driving initiatives like Industry 4.0, and they're connecting these OT systems to IT systems. They're, you know, driving efficiency, preventative maintenance, et cetera. So a lot of data flowing through the pipes, if you will. What are you seeing in terms of the threats to critical infrastructure and how should customers think about addressing these issues? >> Yeah, so bad actors, you know, can come in many forms. We've seen instances of social engineering. We've seen, you know, a USB stick dropped in a warehouse. That data that is flowing through the IoT device is as sensitive now as your core mainframe infrastructure data. So when you look at it from a protection standpoint, conceptually, it's not dissimilar from what we've been been talking about where you want to understand, again, what the most critical data is. Looking at IoT data and applications is no different than your core systems now, right? Depending on what your, your business is, right? So when, when we're looking at protecting these, yes, we want firewalls, yes, we want air gap solutions, yes, we want front end protection, but we're looking at it from a resiliency perspective. Putting that data, understanding what what data entails to put in the vault from an IoT perspective is just as critical as as it is for your core systems. >> Jim, anything you can add to this topic? >> Yeah, I think you hit on the, the key points there. Everything is interconnected. So even in the days where maybe people thought the OT systems weren't online, oftentimes the IT systems are talking to them, or controlling them, SCADA systems, or perhaps supporting them. Think back to the pipeline attack of last year. All the public testimony was that the OT systems didn't get attacked directly. But there was uncertainty around that, and the IT systems hadn't been secured. So that caused the OT systems to have to shut down. It certainly is a different recovery when you're shutting them down on your own versus being attacked, but the outcome was the same that the business couldn't operate. So you really have to take all of those into account. And I think that does go back to exactly what Andrew's saying, understanding your critical business services, and then the applications and data and other components that support those and drive those, and making sure those are protected. You understand them, you have the ability to recover them if necessary. >> So guys, I mean, you made the point. I mean, you're right. The adversary is highly capable. They're motivated 'cause the ROI is so, it's so lucrative. It's like this never ending battle that cybersecurity pros, you know, go through. It really is kind of frontline sort of technical heroes, if you will. And so, but sometimes it just feels daunting. Why are you optimistic about the future of, of cyber from the good guy's perspective? >> I think we're coming at the problem the right way, Dave. So that, that focus, I'm so pleased with the idea that we are planning that the systems aren't going to be hundred percent capable every single time, and let's figure that out, right? That's, that's real world stuff. So just as the bad actors continue to adapt and expand, so do we. And I think the differences there, the common criminals, it's getting harder and harder for them. The more sophisticated ones, they're tough to beat all the time. And of course, you've raised the question of some nation states and other activities. But there's a lot more information sharing. There's a lot more focus from the business side of the house and not just the IT side of the house that we need to figure these things out. >> Yeah, to, to add to that, I think furthering education for the client base is important. You, you brought up a point earlier. It used to be a boardroom conversation due to compliance reasons. Now, as we have been in the market for a while, we continue to mature the offerings. It's further education for not only the business itself, but for the IT systems and how they interconnect, and working together so that these systems can be protected and continue to be evolved and continue to be protected through multiple frameworks as opposed to seeing it as another check the box item that the board has to adhere to. >> All right, guys, we got to go. Thank you so much. Great conversation on a, on a really important topic. Keep up the good work. Appreciate it. >> Thanks Dan. >> Thank you. >> All right, and thank you for watching. Stay tuned for more excellent discussions around the partnership between Dell Technologies and DXC Technology. We're talking about solving real world problems, how this partnership has evolved over time, really meeting the changing enterprise landscape challenges. Keep it right there. (bright music) Okay, we hope you enjoyed the program and learned some things about cloud transformation and modernizing your business that will inspire you to action. Now if you want to learn more, go to the Dell DXC partner page shown here, or click on the URL in the description. Thanks for watching everybody and on behalf of our supporters, Dell and DXC, good luck. And as always, get in touch if we can be of any assistance. (bright music)
SUMMARY :
and help you achieve business outcomes. Thanks for having us. You really got to think about modernizing, in releasing of new things to the field. So Jay, my question to you is, and to drive, you know, the barriers to realizing value to deliver with the, you know, on the journey to the cloud. you know, unique value? I'd be happy to lead to kind of, you know, keep on your premise And I think, you know, you're right, Jay. Help us figure this out, Jim, here. that our partners bring to the table. Even predates, you know, the, the name DXC And, and the right approach Chime in here. the partners, you know, And, and you know, that just That's right. Thank you Dave. Jay, Jim, great to have you on. Great to be here. Nice to be here. that you have to do your manufacturing. add to what Todd just said? the downtime, you know, and the, the blockers, if you will? that they need to think about. they air gapped, you know, the systems. on the factory floor down to the edge. I know it varies, but what, you know, in that we're, you know, You got to have knowledge of So you know, it's a lot to simplify the move and the right level of security. that, you know, you're going to be, it's all of the solutions love to have you back. to be addressed in the coming year. What are you seeing from the front lines and have that ability to So Andrew, you know, I and that you can build out how to make it immutable and isolated, of last decade, you know, "Oh we need to do, you know, A, B and C to go after the backup corpus. for the bad actors to get to. they, you know, had their, and then being able to on, you know, July 4th We do offer the ability to But the key to it, as Andrew said before, to inform you how to, how to We've seen, you know, a USB So that caused the OT you know, go through. and not just the IT side of the house that the board has to adhere to. Thank you so much. that will inspire you to action.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Jim | PERSON | 0.99+ |
Andrew Gonzalez | PERSON | 0.99+ |
Andrew | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
Jim Shook | PERSON | 0.99+ |
James Miller | PERSON | 0.99+ |
Jay Dowling | PERSON | 0.99+ |
Todd Edmunds | PERSON | 0.99+ |
Jay | PERSON | 0.99+ |
Matt Baker | PERSON | 0.99+ |
2010 | DATE | 0.99+ |
Aditi Banerjee | PERSON | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
six hours | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
DXC | ORGANIZATION | 0.99+ |
Todd | PERSON | 0.99+ |
January 17th | DATE | 0.99+ |
first session | QUANTITY | 0.99+ |
July 4th | DATE | 0.99+ |
12 hours | QUANTITY | 0.99+ |
2016 | DATE | 0.99+ |
third session | QUANTITY | 0.99+ |
52% | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
six experts | QUANTITY | 0.99+ |
DXC Technology | ORGANIZATION | 0.99+ |
two | QUANTITY | 0.99+ |
tens | QUANTITY | 0.99+ |
ubercloud | ORGANIZATION | 0.99+ |
Aditi | PERSON | 0.99+ |
first question | QUANTITY | 0.99+ |
May of 2010 | DATE | 0.99+ |
The Future of Multicloud Data Protection is Here FULL EPISODE V1
>> Prior to the pandemic, organizations were largely optimized for efficiency as the best path to bottom line profits. Many CIOs tell theCUBE privately that they were caught off guard by the degree to which their businesses required greater resiliency beyond their somewhat cumbersome disaster recovery processes. And the lack of that business resilience has actually cost firms because they were unable to respond to changing market forces. And certainly, we've seen this dynamic with supply chain challenges. And there's a little doubt we're also seeing it in the area of cybersecurity generally, and data recovery specifically. Over the past 30 plus months, the rapid adoption of cloud to support remote workers and build in business resilience had the unintended consequences of expanding attack vectors, which brought an escalation of risk from cybercrime. While security in the public cloud is certainly world class, the result of multicloud has brought with it multiple shared responsibility models, multiple ways of implementing security policies across clouds and on-prem. And at the end of the day, more, not less, . But there's a positive side to this story. The good news is that public policy, industry collaboration and technology innovation is moving fast to accelerate data protection and cybersecurity strategies with a focus on modernizing infrastructure, securing the digital supply chain, and very importantly, simplifying the integration of data protection and cybersecurity. Today, there's heightened awareness that the world of data protection is not only an adjacency to, but is becoming a fundamental component of cybersecurity strategies. In particular, in order to build more resilience into a business, data protection people, technologies and processes must be more tightly coordinated with security operations. Hello, and welcome to "The Future of Multicloud Data Protection" made possible by Dell in collaboration with theCUBE. My name is Dave Vellante and I'll be your host today. In this segment, we welcome into theCUBE two senior executives from Dell who will share details on new technology announcements that directly address these challenges. Jeff Boudreau is the President and General Manager of Dell's Infrastructure Solutions Group, ISG, and he's going to share his perspectives on the market and the challenges he's hearing from customers. And we're going to ask Jeff to double click on the messages that Dell is putting into the marketplace and give us his detailed point of view on what it means for customers. Now, Jeff is going to be joined by Travis Vigil. Travis is the Senior Vice-President of Product Management for ISG at Dell Technologies, and he's going to give us details on the products that are being announced today and go into the hard news. Now, we're also going to challenge our guests to explain why Dell's approach is unique and different in the marketplace. Thanks for being with us. Let's get right into it. (upbeat music) We're here with Jeff Boudreau and Travis Vigil, and we're going to dig into the details about Dell's big data protection announcement. Guys, good to see you. Thanks for coming in. >> Good to see you. Thank you for having us. >> You're very welcome. Alright, let's start off Jeff, with the high level. You know, I'd like to talk about the customer, what challenges they're facing? You're talking to customers all the time. What are they telling you? >> Sure, as you know, we spend a lot of time with our customers, specifically listening, learning, understanding their use cases, their pain points within their specific environments. They tell us a lot. No surprise to any of us that data is a key theme that they talk about. It's one of their most important assets. They need to extract more value from that data to fuel their business models, their innovation engines, their competitive edge. So, they need to make sure that that data is accessible, it's secure and its recoverable, especially in today's world with the increased cyber attacks. >> Okay, so maybe we could get into some of those challenges. I mean, when you talk about things like data sprawl, what do you mean by that? What should people know? >> Sure, so for those big three themes, I'd say, you have data sprawl, which is the big one, which is all about the massive amounts of data. It's the growth of that data, which is growing at unprecedented rates. It's the gravity of that data and the reality of the multicloud sprawl. So stuff is just everywhere, right? Which increases that surface as attack space for cyber criminals. >> And by gravity, you mean the data's there and people don't want to move it. >> It's everywhere, right? And so when it lands someplace, think Edge, Core or Cloud, it's there. And it's something we have to help our customers with. >> Okay, so it's nuanced 'cause complexity has other layers. What are those layers? >> Sure. When we talk to our customers, they tell us complexity is one of their big themes. And specifically it's around data complexity. We talked about that growth and gravity of the data. We talk about multicloud complexity and we talk about multicloud sprawl. So multiple vendors, multiple contracts, multiple tool chains, and none of those work together in this multicloud world. Then that drives their security complexity. So, we talk about that increased attack surface. But this really drives a lot of operational complexity for their teams. Think about we're lacking consistency through everything. So people, process, tools, all that stuff, which is really wasting time and money for our customers. >> So, how does that affect the cyber strategies and the, I mean, I've often said the Cisco, now they have this shared responsibility model. They have to do that across multiple clouds. Every cloud has its own security policies and frameworks and syntax. So, maybe you could double click on your perspective on that. >> Sure. I'd say the big challenge customers have seen, it's really inadequate cyber resiliency and specifically, they're feeling very exposed. And today as the world with cyber attacks being more and more sophisticated, if something goes wrong, it is a real challenge for them to get back up and running quickly. And that's why this is such a big topic for CEOs and businesses around the world. You know, it's funny. I said this in my open. I think that prior to the pandemic businesses were optimized for efficiency, and now they're like, "Wow, we have to actually put some headroom into the system to be more resilient." You know, are you hearing that? >> Yeah, we absolutely are. I mean, the customers really, they're asking us for help, right? It's one of the big things we're learning and hearing from them. And it's really about three things. One's about simplifying IT. Two, it's really helping them to extract more value from their data. And then the third big piece is ensuring their data is protected and recoverable regardless of where it is going back to that data gravity and that very, you know, the multicloud world. Just recently, I don't know if you've seen it, but the Global Data Protected, excuse me, the Global Data Protection Index. >> GDPI. >> Yes. Jesus. >> Not to be confused with GDPR. >> Actually, that was released today and confirms everything we just talked about around customer challenges. But also it highlights at an importance of having a very cyber, a robust cyber resilient data protection strategy. >> Yeah, I haven't seen the latest, but I want to dig into it. I think this, I've done this many, many years in a row. I'd like to look at the time series and see how things have changed. All right. At a high level, Jeff, can you kind of address why Dell, from your point of view is best suited? >> Sure. So, we believe there's a better way or a better approach on how to handle this. We think Dell is uniquely positioned to help our customers as a one stop shop, if you will, for that cyber resilient multicloud data protection solution and needs. We take a modern, a simple and resilient approach. >> What does that mean? What do you mean by modern? >> Sure. So modern, we talk about our software defined architecture. Right? It's really designed to meet the needs not only of today, but really into the future. And we protect data across any cloud and any workload. So, we have a proven track record doing this today. We have more than 1,700 customers that trust us to protect more than 14 exabytes of their data in the cloud today. >> Okay, so you said modern, simple and resilient. What do you mean by simple? >> Sure. We want to provide simplicity everywhere, going back to helping with the complexity challenge. And that's from deployment to consumption, to management and support. So, our offers will deploy in minutes. They are easy to operate and use, and we support flexible consumption models for whatever the customer may desire. So, traditional subscription or as a service. >> And when you talk about resilient, I mean, I put forth that premise, but it's hard because people say, "Well, that's going to cost us more. Well, it may, but you're going to also reduce your risk." So, what's your point of view on resilience? >> Yeah, I think it's something all customers need. So, we're going to be providing a comprehensive and resilient portfolio of cyber solutions that are secure by design. And we have some unique capabilities and a combination of things like built in immutability, physical and logical isolation. We have intelligence built in with AI part recovery. And just one, I guess fun fact for everybody is we have, our cyber vault is the only solution in the industry that is endorsed by Sheltered Harbor that meets all the needs of the financial sector. >> So it's interesting when you think about the NIST framework for cybersecurity. It's all about about layers. You're sort of bringing that now to data protection. >> Jeff: Correct. Yeah. >> All right. In a minute, we're going to come back with Travis and dig into the news. We're going to take a short break. Keep it right there. (upbeat music) (upbeat adventurous music) Okay, we're back with Jeff and Travis Vigil to dig deeper into the news. Guys, again, good to see you. Travis, if you could, maybe you, before we get into the news, can you set the business context for us? What's going on out there? >> Yeah. Thanks for that question, Dave. To set a little bit of the context, when you look at the data protection market, Dell has been a leader in providing solutions to customers for going on nearly two decades now. We have tens of thousands of people using our appliances. We have multiple thousands of people using our latest modern, simple PowerProtect Data Manager Software. And as Jeff mentioned, we have, 1,700 customers protecting 14 exabytes of data in the public clouds today. And that foundation gives us a unique vantage point. We talked to a lot of customers and they're really telling us three things. They want simple solutions. They want us to help them modernize. And they want us to add as the highest priority, maintain that high degree of resiliency that they expect from our data protection solutions. So, that's the backdrop to the news today. And as we go through the news, I think you'll agree that each of these announcements deliver on those pillars. And in particular, today we're announcing the PowerProtect Data Manager Appliance. We are announcing PowerProtect Cyber Recovery Enhancements, and we are announcing enhancements to our APEX Data Storage Services. >> Okay, so three pieces. Let's dig to that. It's interesting, appliance, everybody wants software, but then you talk to customers and they're like, "Well, we actually want appliances because we just want to put it in and it works." >> Travis: (laughs) Right. >> It performs great. So, what do we need to know about the appliance? What's the news there? >> Well, you know, part of the reason I gave you some of those stats to begin with is that we have this strong foundation of experience, but also intellectual property components that we've taken that have been battle tested in the market. And we've put them together in a new simple, integrated appliance that really combines the best of the target appliance capabilities we have with that modern, simple software. And we've integrated it from the, you know, sort of taking all of those pieces, putting them together in a simple, easy to use and easy to scale interface for customers. >> So, the premise that I've been putting forth for months now, probably well over a year, is that data protection is becoming an extension of your cybersecurity strategies. So, I'm interested in your perspective on cyber recovery. Your specific news that you have there. >> Yeah, you know, we are in addition to simplifying things via the appliance, we are providing solutions for customers no matter where they're deploying. And cyber recovery, especially when it comes to cloud deployments, is an increasing area of interest and deployment that we see with our customers. So, what we're announcing today is that we're expanding our cyber recovery services to be available in Google Cloud. With this announcement, it means we're available in all three of the major clouds and it really provides customers the flexibility to secure their data no matter if they're running on-premises, in Acolo, at the Edge, in the public cloud. And the other nice thing about this announcement is that you have the ability to use Google Cloud as a cyber recovery vault that really allows customers to isolate critical data and they can recover that critical data from the vault back to on-premises or from that vault back to running their cyber protection or their data protection solutions in the public cloud. >> I always invoke my favorite Matt Baker here. "It's not a zero sum game", but this is a perfect example where there's opportunities for a company like Dell to partner with the public cloud provider. You've got capabilities that don't exist there. You've got the on-prem capabilities. We could talk about Edge all day, but that's a different topic. Okay, so my other question Travis, is how does this all fit into APEX? We hear a lot about APEX as a service. It's sort of the new hot thing. What's happening there? What's the news around APEX? >> Yeah, we've seen incredible momentum with our APEX solutions since we introduced data protection options into them earlier this year. And we're really building on that momentum with this announcement being providing solutions that allow customers to consume flexibly. And so, what we're announcing specifically is that we're expanding APEX Data Storage Services to include a data protection option. And it's like with all APEX offers, it's a pay-as-you-go solution. Really streamlines the process of customers purchasing, deploying, maintaining and managing their backup software. All a customer really needs to do is specify their base capacity. They specify their performance tier. They tell us do they want a one year term or a three year term and we take it from there. We get them up and running so they can start deploying and consuming flexibly. And as with many of our APEX solutions, it's a simple user experience all exposed through a unified APEX Console. >> Okay, so it's, you're keeping it simple, like I think large, medium, small. You know, we hear a lot about T-shirt sizes. I'm a big fan of that 'cause you guys should be smart enough to figure out, you know, based on my workload, what I need. How different is this? I wonder if you guys could address this. Jeff, maybe you can start. >> Sure, I'll start and then- >> Pitch me. >> You know, Travis, you jump in when I screw up here. >> Awesome. >> So, first I'd say we offer innovative multicloud data protection solutions. We provide that deliver performance, efficiency and scale that our customers demand and require. We support as Travis said, all the major public clouds. We have a broad ecosystem of workload support and I guess the great news is we're up to 80% more cost effective than any of the competition. >> Dave: 80%? >> 80% >> Hey, that's a big number. All right, Travis, what's your point of view on this? >> Yeah, I think number one, end-to-end data protection. We are that one stop shop that I talked about, whether it's a simplified appliance, whether it's deployed in the cloud, whether it's at the Edge, whether it's integrated appliances, target appliances, software. We have solutions that span the gamut as a service. I mentioned the APEX Solution as well. So really, we can provide solutions that help support customers and protect them, any workload, any cloud, anywhere that data lives. Edge, Core to Cloud. The other thing that we hear as a big differentiator for Dell, and Jeff touched on on this a little bit earlier, is our Intelligent Cyber Resiliency. We have a unique combination in the market where we can offer immutability or protection against deletion as sort of that first line of defense. But we can also offer a second level of defense, which is isolation, talking about data vaults or cyber vaults and cyber recovery. And more importantly, the intelligence that goes around that vault. It can look at detecting cyber attacks. It can help customers speed time to recovery. And really provides AI and ML to help early diagnosis of a cyber attack and fast recovery should a cyber attack occur. And if you look at customer adoption of that solution, specifically in the cloud, we have over 1300 customers utilizing PowerProtect Cyber Recovery. >> So, I think it's fair to say that your portfolio has obviously been a big differentiator. Whenever I talk to your finance team, Michael Dell, et cetera, that end-to-end capability, that your ability to manage throughout the supply chain. We actually just did an event recently with you guys where you went into what you're doing to make infrastructure trusted. And so my take on that is you, in a lot of respects, you're shifting the client's burden to your R&D. now they have a lot of work to do, so it's not like they can go home and just relax. But that's a key part of the partnership that I see. Jeff, I wonder if you could give us the final thoughts. >> Sure. Dell has a long history of being a trusted partner within IT, right? So, we have unmatched capabilities. Going back to your point, we have the broadest portfolio. We're a leader in every category that we participate in. We have a broad deep breadth of portfolio. We have scale. We have innovation that is just unmatched. Within data protection itself, we are the trusted market leader. No if, ands or buts. We're number one for both data protection software in appliances per IDC and we were just named for the 17th consecutive time the leader in the Gartner Magic Quadrant. So, bottom line is customers can count on Dell. >> Yeah, and I think again, we're seeing the evolution of data protection. It's not like the last 10 years. It's really becoming an adjacency and really, a key component of your cyber strategy. I think those two parts of the organization are coming together. So guys, really appreciate your time. Thanks for coming. >> Thank you, sir. >> Dave. >> Travis, good to see you. All right, in a moment I'm going to come right back and summarize what we learned today, what actions you can take for your business. You're watching "The Future of Multicloud Data Protection" made possible by Dell in collaboration with theCUBE, your leader in enterprise and emerging tech coverage. Right back. >> Advertiser: In our data-driven world, protecting data has never been more critical. To guard against everything from cyber incidents to unplanned outages, you need a cyber resilient multicloud data protection strategy. >> It's not a matter of if you're going to get hacked, it's a matter of when. And I want to know that I can recover and continue to recover each day. >> It is important to have a cyber security and a cyber resiliency plan in place because the threat of cyber attack are imminent. >> Advertiser: PowerProtect Data Manager from Dell Technologies helps deliver the data protection and security confidence you would expect from a trusted partner and market leader. >> We chose PowerProtect Data Manager because we've been a strategic partner with Dell Technologies for roughly 20 years now. Our partnership with Dell Technologies has provided us with the ability to scale and grow as we've transitioned from 10 billion in assets to 20 billion. >> Advertiser: With PowerProtect Data Manager, you can enjoy exceptional ease of use to increase your efficiency and reduce costs. >> I'd installed it by myself, learn it by myself. It was very intuitive. >> While restoring your machine with PowerProtect Data Manager is fast, we can fully manage PowerProtect through the center. We can recover a whole machine in seconds. >> Instructor: Data Manager offers innovation such as transparent snapshots to simplify virtual machine backups, and it goes beyond backup and restore to provide valuable insights into protected data, workloads and VMs. >> In our previous environment, it would take anywhere from three to six hours a night to do a single backup of each VM. Now, we're backing up hourly and it takes two to three seconds with the transparent snapshots. >> Advertiser: With PowerProtect's Data Manager, you get the peace of mind knowing that your data is safe and available whenever you need it. >> Data is extremely important. We can't afford to lose any data. We need things just to work. >> Advertiser: Start your journey to modern data protection with Dell PowerProtect's Data Manager. Visit dell.com/powerprotectdatamanager >> We put forth the premise in our introduction that the worlds of data protection in cybersecurity must be more integrated. We said that data recovery strategies have to be built into security practices and procedures and by default, this should include modern hardware and software. Now, in addition to reviewing some of the challenges that customers face, which have been pretty well documented, we heard about new products that Dell Technologies is bringing to the marketplace that specifically address these customer concerns. And there were three that we talked about today. First, the PowerProtect Data Manager Appliance, which is an integrated system taking advantage of Dell's history in data protection, but adding new capabilities. And I want to come back to that in a moment. Second is Dell's PowerProtect Cyber Recovery for Google Cloud platform. This rounds out the big three public cloud providers for Dell, which joins AWS and Azure support. Now finally, Dell has made its target backup appliances available in APEX. You might recall, earlier this year we saw the introduction from Dell of APEX Backup Services and then in May at Dell Technologies World, we heard about the introduction of APEX Cyber Recovery Services. And today, Dell is making its most popular backup appliances available in APEX. Now, I want to come back to the PowerProtect Data Manager Appliance because it's a new integrated appliance and I asked Dell off camera, "Really what is so special about these new systems and what's really different from the competition?" Because look, everyone offers some kind of integrated appliance. So, I heard a number of items. Dell talked about simplicity and efficiency and containers and Kubernetes. So, I kind of kept pushing and got to what I think is the heart of the matter in two really important areas. One is simplicity. Dell claims that customers can deploy the system in half the time relative to the competition. So, we're talking minutes to deploy, and of course that's going to lead to much simpler management. And the second real difference I heard was backup and restore performance for VMware workloads. In particular, Dell has developed transparent snapshot capabilities to fundamentally change the way VMs are protected, which leads to faster backup and restores with less impact on virtual infrastructure. Dell believes this new development is unique in the market and claims that in its benchmarks, the new appliance was able to back up 500 virtual machines in 47% less time compared to a leading competitor. Now, this is based on Dell benchmarks, so hopefully these are things that you can explore in more detail with Dell to see if and how they apply to your business. So if you want more information, go to the Data Protection Page at dell.com. You can find that at dell.com/dataprotection. And all the content here and other videos are available on demand at theCUBE.net. Check out our series on the blueprint for trusted infrastructure, it's related and has some additional information. And go to siliconangle.com for all the news and analysis related to these and other announcements. This is Dave Vellante. Thanks for watching "The Future of Multicloud Protection" made possible by Dell, in collaboration with theCUBE, your leader in enterprise and emerging tech coverage. (upbeat music)
SUMMARY :
by the degree to which their businesses Good to see you. You know, I'd like to So, they need to make sure I mean, when you talk about and the reality of the multicloud sprawl. mean the data's there to help our customers with. Okay, so it's nuanced 'cause and gravity of the data. They have to do that into the system to be more resilient." and that very, you know, and confirms everything we just talked I'd like to look at the time series on how to handle this. in the cloud today. Okay, so you said modern, And that's from deployment to consumption, to also reduce your risk." that meets all the needs that now to data protection. Yeah. and dig into the news. So, that's the backdrop to the news today. Let's dig to that. What's the news there? and easy to scale interface for customers. So, the premise that that critical data from the to partner with the public cloud provider. that allow customers to consume flexibly. I'm a big fan of that 'cause you guys You know, Travis, you and I guess the great news is we're up your point of view on this? I mentioned the APEX Solution as well. to say that your portfolio Going back to your point, we of the organization Travis, good to see you. to unplanned outages, you and continue to recover each day. It is important to and security confidence you would expect from 10 billion in assets to 20 billion. to increase your efficiency I'd installed it by we can fully manage to simplify virtual machine backups, from three to six hours a and available whenever you need it. We need things just to work. journey to modern data protection and of course that's going to
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Dave Vellante | PERSON | 0.99+ |
Travis | PERSON | 0.99+ |
Jeff | PERSON | 0.99+ |
Jeff Boudreau | PERSON | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
Cisco | ORGANIZATION | 0.99+ |
Matt Baker | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
10 billion | QUANTITY | 0.99+ |
47% | QUANTITY | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
20 billion | QUANTITY | 0.99+ |
two | QUANTITY | 0.99+ |
Jeff Boudreau | PERSON | 0.99+ |
three | QUANTITY | 0.99+ |
Sheltered Harbor | ORGANIZATION | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
one year | QUANTITY | 0.99+ |
second | QUANTITY | 0.99+ |
May | DATE | 0.99+ |
Second | QUANTITY | 0.99+ |
ISG | ORGANIZATION | 0.99+ |
Michael Dell | PERSON | 0.99+ |
First | QUANTITY | 0.99+ |
more than 1,700 customers | QUANTITY | 0.99+ |
Travis Vigil | PERSON | 0.99+ |
three year | QUANTITY | 0.99+ |
both | QUANTITY | 0.99+ |
more than 14 exabytes | QUANTITY | 0.99+ |
two parts | QUANTITY | 0.99+ |
80% | QUANTITY | 0.99+ |
three seconds | QUANTITY | 0.99+ |
The Future of Multicloud Protection | TITLE | 0.99+ |
three pieces | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
each day | QUANTITY | 0.99+ |
each | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
Two | QUANTITY | 0.99+ |
second level | QUANTITY | 0.99+ |
One | QUANTITY | 0.99+ |
over 1300 customers | QUANTITY | 0.99+ |
two senior executives | QUANTITY | 0.98+ |
dell.com/powerprotectdatamanager | OTHER | 0.98+ |
Gartner | ORGANIZATION | 0.98+ |
Jeff Boudreau, Dell Technology Summit
>>Welcome back to the Cube's exclusive coverage of the Dell Technology Summit. I'm Dave Ante. We're going inside with Dell Execs to extract the signal from the noise. And right now we're gonna dig into customer requirements in a data intensive world and how cross cloud complexities get resolved from a product development perspective and how the ecosystem fits in to that mosaic to close the gaps and accelerate innovation. And with me now as friend of the cube, Jeff Boudreau, he's the president of the Infrastructure Solutions Group, ISG at Dell Technologies. Jeff, always good to see you. Welcome. >>You too. Thank you for having me. It's great to see you. And thanks for having me back on the cube. I'm thrilled to be here. Yeah, >>It's our pleasure. Okay, so let's talk about what you're observing from customers today. You know, we talk all the time about operating in a data driven multi-cloud world, blah, blah, blah, blah. But what does that all mean to you when you have to translate that noise into products that solve specific customer problems, Jeff? >>Sure. Hey, great question. And everything always starts with our customers. They're our motivation, They're top of mind, everything we do. My leadership team and I spend a lot of time with our customers. We're listening, we're learning, we're really understanding their pain points, and we want to get their feedback in regards to our solutions, both turn and future offerings, really ensure that we're aligned to meeting their business objectives. I would say from these conversations, I'd say customers are telling us several things. First, it's all about data. So no surprise going back to your opening. And second, it's about the multi-cloud world. And I'd say the big thing coming from all of this is that both of those are driving a ton of complexity for our customers. And I'll unpack that just a bit, which is first the data. As we all know, data is growing at unprecedented rates with more than 90% of the world's data being produced in the last two years alone. >>And you can just think of that in its everywhere, right? And so as it is, the IT world shifts towards distributed compute to support that data growth and that data gravity to really extract more value from that data in real time environments become inherently more and more hybrid and more and more multi-cloud. Which leads me to the second key point that I've been hearing from our customers, which it's a multi-cloud world, not new news. Customers by default have multiple clouds running across multiple locations. That's OnPrem and off, it's running at the edge and it's serving a variety of different needs. Unfortunately, for most of our CU customers, multicloud actually added to their complexity. As we've discussed, it's been a lot more of multi-cloud by default versus multicloud by design. If you really think about our customers, I mean, I, I, I'm talking to 'EM all the time. >>You think about the data complexity, that's the growth and the gravity. You think about their infrastructure complexity shifting from central to decentralized it, you think about multi-cloud complexity. So you have these walled gardens, if you will. So you have multiple vendors and you have these multiple contracts that all creates operational complexity for their teams around their processes of their tools. And then you think about the security complexity that that drives with the, just the increased tax service and the list goes on. So what are we seeing for our customers? They, what they really want from, also what they're asking us for is simplicity, not complexity. The mediacy, not latency. They're asking for open and align versus I'd say siloed and closed. And they're looking for a lot more agility and not rigidity in what we do. So they really wanna simplify everything. They're looking for a simpler IT in a more agile it, and they want more control of their data, right? >>And so, and they want to extract more of the value to enrich their business or their customer engagements, which all sounds pretty obvious and we've probably all heard it a bunch, but it's really hard to achieve. And that's where I believe, and we believe as Dell, that we, it creates a big opportunity for us to really help our customers as that great simplifier of it. We're already doing this today. Just a couple quick examples. First is Salesforce. We've supported recently, we've supported their global expansion with a multi-cloud solution to help them drive their business growth. Our solution delivered a reliable and consistent IT experience will go back to that complexity. And it was across a very distributed environment, including more than 60 data centers, 230 countries in hundreds of thousands of customers. It really provided Salesforce with the flexibility of placing workloads and data in an environment based on the right service level. >>Objective things like cost complexity or even security compliance considerations. The second customer A is a big new knowing little Patriot fan. And Dan, Dave, I know you are as well. Oh yeah, this one's near, near and data to my heart, it's the craft group. We just created a platform to span all their businesses that created more, I'd say data driven, immersive, secure experience, which is allowing them to capture data at the edge and use it for real time insights for things like cyber resiliency, but also like safety of the facilities. And as being a PA patron fan like I am, did they truly are meeting us where we are in our seats on their mobile devices and also in the parking lot. So just keep that in mind next time you're there. The bottom line, everything we're doing is really to make it simpler for our customers and to help them get the most of their data. I'd say we're gonna do this, is it through a multi-cloud by design approach, which we've talked a lot about with you and and others at Dell Tech world earlier this >>Year, right? And we had Salesforce on, actually at Dell Tech Group. The craft group is interesting because, you know, when you get to the stadium, you know, everybody's trying to get, get, get out to the internet and, and, but then the experience is so much better if you can actually, you know, deal with that edge. So I wanna talk about complexity though. You got data, you got, you know, the, the edge, you got multiple clouds, you got a different operating model across security model, different. So a lot of times in this industry we solve complexity with more complexity and it's like a bandaid. So I wanna, I wanna talk to, to how you're innovating around simplicity in ISG to address this complexity and what this means for Dell's long term strategy. >>Sure, I'd love to. So first I, I'd like to state the obvious, which are our investments in our innovations really focused on advancing, you know, our, our our customers needs, right? So we are really, our investments are gonna be targeted. We, we believe customers can have the most value. And some of that's gonna be around how we create strategic partnerships as well. Connecting to what we just spoke about. Much of the complexity of customers have or experiencing is the orchestration and management of all the data in all these different places. And customers, you know, they must be able to quickly deploy and operate across cloud environments. They need to increase their developer productivity, really enabling those developers that do what they do best, which is creating more value for their customers than for their businesses. Our innovation efforts are really focused on addressing this by delivering an open and modern IT architecture that allows customers to run and manage any workload in any cloud anywhere. >>Data lives we're focused on, also focused on consumption based solutions, which allow for a greater degree of simplicity and flexibility, which they're really asking for as well. The foundation for this is our software defined common storage layer. That common storage layer, You can think about this, Dave, as our ias if you will. It underpins our data access in mobility across all data types of locations. So you can think private, public, telecom, colo, edge, and it's delivered in a secure, holistic, and consistent cloud experience through Apex. We are making a ton of progress to let you, just to be, just to be clear, we made headway in things like Project Alpine, which you're very well aware of. This is our storage as a service. We announced us back in in January, which brings our unique software IP from our flagship storage platform to all the major public clouds. >>Really delivering the best of both worlds, allowing our customers to take advantage of Dell's enterprise class data services and storage software, such as performance at scale, resiliency, efficiency and security. But in addition to that, we're leveraging the breadth of the public cloud services, right? They're on demand scaling capabilities and access to analytical services. So in addition, we're really, we're, we're on our way to win at the edge as well with Project Frontier, which reduces complexity at the edge by creating an open and secure software platform to help our customers simplify their edge operations, optimize their edge environments and investments, secure that edge environment as well. I believe you're gonna be discussing Project Frontier here with Sam Broco in the very near future. So I won't give up more, too many more details there. And lastly, we're also scaling Apex, which, you know, well shifting from our vision, really shifting from vision to reality and introducing several new Apex service offerings, which are coming to market over the next month or so. And the intent is really supporting our customers on there as a service transitions by modernize the con consumption experience and providing that flexible as a service model. Ultimately, we're trying to help our customers achieve that multi-cloud by design to really simplify it in a, unlock the power of their data. >>So some good examples there. I I like to talk about the super Cloud as you, you know, you're building on top of the, you know, hyperscale infrastructure and you got Apex is your cloud, the common storage layer, you call it your ISAs. And that's, that's a ingredient in what we call the super cloud out to the edge. You have to have a common platform there and one of the hallmarks of a cloud company. And as you become a cloud company, everybody's a cloud company ecosystem becomes really, really important in terms of product development and, and innovation. Matt Baker always loves to stress it's not a zero sum game. And, and I think Super Cloud recognizes that, that there's value to be built on top of other clouds and, and, and of course on top of your infrastructure so that your ecosystem can add value. So what role does the ecosystem play there? >>For me, it's, it's pretty clear. It's, it's, it's critical. I can't say that enough above the having an open ecosystem. Think about everything we just discussed, and I agree with your super cloud analogy. I agree with what Matt Baker had said to you, I would assert no one company can actually address all the pain points and all the issues and challenges that customers are having on their own, not one. I think customers really want and deserve an open technology ecosystem, one that works together. So not these close stacks that discourage this interoperability or stifles innovation and productivity of our, of each of our teams. We Dell, I guess, have a long history of supporting open ecosystems that really put customers first. And to be clear, we're gonna be at the center of the multi-cloud ecosystem and we're working with partners today to make that a reality. >>I mean, just think of what we're doing with VMware. We continue to build on our first investment alliances with them in August at their VMware explorer, which I know you were at. We announced several joint engineering initiatives to really help customers more easily manage and gain value from their data in their infrastructure. For multi-cloud specifically, we strength our relationship with VMware and know with Tansu as part of that. In addition, just a few weeks ago we announced our partnership with Red Hat to simplify our multicloud deployments for managing containerized workloads. I'd say, and using your analogy, I could think of that as our multicloud platform. So that's kind of our PAs layer, if you will. And as you're aware, we have a very longstanding and strategic partnership with Microsoft and I'd say stay tuned. There's a lot more to come with them and also others in this multi-cloud space. >>Shifting a bit to some of the growth engines that my team's responsible for the edge, right? As you think about data being everywhere, we've established partnerships for the Edge as well with folks like PTC and Litmus for the manufacturing edge, but also folks like Deep North for the retail edge analytics in data management, using your Supercloud analogy data, the sa right? This is our SAS layer. We've announced that we're collaborating, partnering with folks like Snowflake and, and there's other data management companies as well to really simplify data access and accelerate those data insights. And then given customers choice of where they'd like to have their IT and their infrastructure, we've we're expanding our colo partnerships as well with folks like Equinox and, and they're allowing us to broaden our availability of Apex, providing customers the flexibility to take advantage of those as a service offerings wherever it's delivered and where they can get the most value. So those are just some you can hear from me. I think it's critical not only for, for us, I think it's critical for our customers. I think it's been critical, critical for the entire, you know, industry as a whole to really have that open technology ecosystem as we work with our customers on our multi-cloud solutions really to meet their needs. We'll continue to collaborate with whoever customers choose and you know, and who they want us to do business with. So I'd say a lot more coming in that space. >>So it's been an interesting three years for you, just, just over three years now since you've been made the president of the IS isg. And so you had to dig in and it was obviously strange time around the world, but, but you really had to look at, okay, how do we modernize the platform? How do we make it, you know, cloud first? You've mentioned the Edge, we're expanding. So what are the big takeaways? What do you want customers and our audience to understand? Just some closing thoughts and if you could summarize. >>Sure. So I'd say first, you know, we discuss, we're working in a very fast paced, ever changing market with massive amounts of data that needs to be managed. It's very complex and our customers need help with that complexity. I believe that Dell Technologies is uniquely positioned to help as their multi-cloud champion. No one else can solve the breadth and depth of the challenges like we can. And we're gonna help our customers move forward when they basically moving from a multi-cloud by default, as we've discussed before, to multicloud by design. And I'm really excited for the opportunity to work with our customers to help them expand that ecosystem as they truly realize the future of it and, and what they're trying to accomplish. >>Jeff, thanks so much. Really appreciate your time. Always a pleasure. Go pats and we'll see you on the blog. >>Thanks Dave. >>All right, you're watching Exclusive Inside Insights from Dell Technology Summit on the cube, your leader in enterprise and emerging tech coverage.
SUMMARY :
how the ecosystem fits in to that mosaic to close the gaps and accelerate And thanks for having me back on the cube. But what does that all mean to you when you have to translate And I'd say the big thing coming from all of this is that both of those are driving And you can just think of that in its everywhere, right? from central to decentralized it, you think about multi-cloud complexity. And so, and they want to extract more of the value to enrich their business or their customer engagements, And Dan, Dave, I know you are as well. So a lot of times in this industry we solve complexity with more complexity So first I, I'd like to state the obvious, which are our investments in So you can think private, public, So in addition, we're really, we're, we're on our way to win at the edge as well with And as you become a cloud company, I can't say that enough above the having We continue to build on our first investment alliances with I think it's been critical, critical for the entire, you around the world, but, but you really had to look at, okay, how do we modernize the platform? And I'm really excited for the opportunity to work with our customers to help them expand that ecosystem as Go pats and we'll see you All right, you're watching Exclusive Inside Insights from Dell Technology Summit on the cube,
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Jeff Boudreau | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
Jeff | PERSON | 0.99+ |
Matt Baker | PERSON | 0.99+ |
Dan | PERSON | 0.99+ |
Equinox | ORGANIZATION | 0.99+ |
August | DATE | 0.99+ |
January | DATE | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
Dave Ante | PERSON | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
Red Hat | ORGANIZATION | 0.99+ |
First | QUANTITY | 0.99+ |
VMware | ORGANIZATION | 0.99+ |
Sam Broco | PERSON | 0.99+ |
PTC | ORGANIZATION | 0.99+ |
second | QUANTITY | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
three years | QUANTITY | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
Infrastructure Solutions Group | ORGANIZATION | 0.99+ |
230 countries | QUANTITY | 0.99+ |
more than 60 data centers | QUANTITY | 0.99+ |
more than 90% | QUANTITY | 0.99+ |
first | QUANTITY | 0.99+ |
both | QUANTITY | 0.99+ |
Tansu | ORGANIZATION | 0.98+ |
Litmus | ORGANIZATION | 0.98+ |
over three years | QUANTITY | 0.98+ |
Dell Technology Summit | EVENT | 0.98+ |
Dell Tech Group | ORGANIZATION | 0.98+ |
Apex | ORGANIZATION | 0.98+ |
today | DATE | 0.97+ |
both worlds | QUANTITY | 0.97+ |
Dell Tech | ORGANIZATION | 0.97+ |
Deep North | ORGANIZATION | 0.95+ |
one | QUANTITY | 0.94+ |
ISG | ORGANIZATION | 0.93+ |
second key point | QUANTITY | 0.93+ |
Project Frontier | ORGANIZATION | 0.93+ |
IS | ORGANIZATION | 0.93+ |
second customer | QUANTITY | 0.92+ |
each | QUANTITY | 0.9+ |
next month | DATE | 0.89+ |
first investment alliances | QUANTITY | 0.87+ |
Snowflake | ORGANIZATION | 0.86+ |
few weeks ago | DATE | 0.86+ |
Salesforce | ORGANIZATION | 0.82+ |
Edge | ORGANIZATION | 0.81+ |
hundreds of thousands of customers | QUANTITY | 0.75+ |
Project Alpine | ORGANIZATION | 0.73+ |
couple | QUANTITY | 0.71+ |
last two years | DATE | 0.7+ |
Patriot | ORGANIZATION | 0.67+ |
Super | TITLE | 0.66+ |
super Cloud | TITLE | 0.64+ |
multicloud | ORGANIZATION | 0.6+ |
Apex | TITLE | 0.59+ |
Supercloud | ORGANIZATION | 0.57+ |
super cloud | TITLE | 0.56+ |
Cloud | ORGANIZATION | 0.51+ |
Execs | COMMERCIAL_ITEM | 0.43+ |
Tom Sweet, Dell Technology Summit
>>As we said in our analysis of Dell's future, the transformation of Dell into Dell emc and now Dell Technologies has been one of the most remarkable stories in the history of the technology industry. After years of successfully integrated EMC and becoming VMware's number one distribution channel, the metamorphosis of Dell com culminated in the spin out of VMware from Dell and a massive wealth creation milestone pending, of course the Broadcom acquisition of VMware. So where's that leave Dell and what does the future look like for this technology powerhouse? Hello and welcome to the Cube's exclusive coverage of Dell Technology Summit 2022. My name is Dave Ante and I'll be hosting the program today in conjunction with the Dell Tech Summit. We'll hear from four of Dell senior executives. Tom Sweet is the CFO of Dell. Technologies's gonna share his views of the company's position and opportunities and answer the question, why is Dell good long term investment? >>Then we'll hear from Jeff Boudreau, who's the president of Dell's ISG business unit, who's gonna talk about the product angle and specifically how Dell is thinking about solving the multi-cloud challenge. And then Sam GrowCo is the senior vice President of marketing. He's gonna come in the program and give us the update on Apex, which is Dell's as a service offering and a new edge platform called Project Frontier. By the way, it's also Cybersecurity Awareness Month, and we're gonna see if Sam has any stories there. And finally, for a company that's nearly 40 years old, Dell has some pretty forward thinking philosophies when it comes to its culture and workforce. And we're gonna speak with Jen Savira, who's Dell's chief Human Resource officer about hybrid work and how Dell is thinking about the future of work. We're gonna geek out all day and talk multi-cloud and edge and latency, but first, let's talk wallet. Tom Sweet cfo, and one of Dell's key business architects. Welcome back to the >>David, It's good to see you and good to be back with you. So thanks for having me. >>Yeah, you bet. So Tom, it's been a pretty incredible past 18 months. Not only the pandemic and all that craziness, but the VMware spin, you had to give up your gross margin. Pinky as kidding. And, and of course the macro environment. I'm so sick of talking about the macro, but putting that aside for a moment, what's really remarkable is that for a company at your size, you've had some success at the top line, which I think surprised a lot of people. What are your reflections on the last 18 to 24 months? >>Well, Dave, it's been an incredible, not only last 18 months, but the whole transformation journey. If you think all the way back maybe to the LBO and forward from there, but, you know, stepping into the last 18 months, it's, you know, I, I think I remember talking with you and saying, Hey, you know, the scenario planning we did at the beginning of this pandemic journey was, you know, 30 different scenarios roughly, and none of which sort of panned out the way it actually did, which was a pretty incredible growth story as we think about how we helped customers, you know, drive workforce productivity, enable their business model during the all remote work environment. That was the pandemic created. And couple that with the, you know, the, the rise then in the infrastructure spin as we got towards the tail end of the, of the pandemic coupled with, you know, the spin out of VMware, which culminated last November, as you know, as we completed that, which unlocked a pathway back to investment grade within unlocked, quite frankly, shareholder value, capital allocation frameworks. It's really been a remarkable, you know, 18, 24 months. It's, it's never dull at Dell Technologies, Let me put it that way. >>Well, well, I was impressed with you, Tom, before the leverage buyout and then what I've seen you guys navigate through is, is, is truly amazing. Well, let's talk about the challenging macro. I mean, I've been through a lot of downturns, but I've never seen anything quite like this with fed tightening and you're combating inflation, you got this recession looming, there's a bear market you got, but you got zero unemployment, you're rising wages, strong dollar, and it's very confusing. But it spending is, you know, it's somewhat softer, but it's still not bad. How are you seeing customers behave? How is Dell responding? >>Yeah, look, if you think about the markets we play in Dave, and we should start there as a grounding, you know, the, the total market, the core market that we think about is roughly 700 and, you know, $50 billion or so. If you think about our core IT services capability, you couple that with some of the, the growth initiatives that we're driving and the adjacent markets that that, that brings in, you're roughly talking a 1.4 to $1.5 trillion market opportunity, total addressable market. And so from, from that perspective, we're extraordinarily bullish on where are we in the journey as we continue to grow and expand. You know, we have, we're number one share in just about every category that we plan, but yet when you look at that, you know, number one share in some of these, you know, our highest share position may be, you know, low thirties and maybe in the high end of storage you're at the upper end of thirties or 40%. >>But the opportunity there to continue to expand the core and, and continue to take share and outperform the market is truly extraordinary. So, so you step back and think about that, then you say, okay, what have we seen over the last number of months and quarters? It's been, you know, really great performance through the pandemic as, as you highlighted, we actually had a really strong first half of the year of our fiscal year 23 with revenue up 12% operating income up 12% for the first half. You know, what we talked about as you, if you might recall in our second quarter earnings, was the fact that we were starting to see softness. We had seen it in the consumer PC space, which is not a big area of focus for us in the sense of our, our total revenue stream, But we started to see commercial PC soften and we were starting to see server demand soften a bit and storage demand was, was holding quite frankly. >>And so we gave a a framework around guidance for the rest of the year as a result of what we were seeing. You know, the macro environment as you highlight it continues to be challenging. You know, you, if you look at inflation rates and the efforts by central banks across the globe to with through interest rate rise to press down and, and constrain growth and push down inflation, you couple that with supply chain challenges that continue principle, particularly in the ISG space. And then you couple that with the Ukraine war and the energy crisis that that's created. And particularly in Europe, it's a pretty dynamic environment. And, but I'm confident, you know, I'm confident in the long term, but I do think that there is, you know, that there's navigation that we're going to have to do over the coming number of quarters, who knows quite how long, you know, to, to make sure the business is properly positioned and, you know, we've got a great portfolio and you're gonna talk to some of the team LA later on as you think your way through some of the solution capabilities we're driving what we're seeing around technology trends. >>So the opportunities there, there's some short term navigation that we're gonna need to do just to make sure that we address some of the, you know, some of the environmental things that we're seeing right >>Now. Yeah. And as a global company, of course you're converting current local currencies back to appreciated dollars. That's, that's, that's another headwind. But as you say, I mean, that's math and you're navigating it. And again, I've seen a lot of downturns, but you know, the best companies not only weather the storm, but they invest in ways they that allow them to cut out, come out the other side stronger. So I wanna talk about that longer term opportunity, the relationship between the core, the the business growth. You mentioned the tam, I mean, even, even as a lower margin business, if, if you can penetrate that big of a tam, you could still throw off a lot of cash and you've got other levers to turn in potentially acquisitions and software. And, but so ultimately what gives you confidence in Dell's future? How should we think about Dell's future? >>Yeah, look, I, I think it comes down to we are extraordinarily excited about the opportunity over the long term digital transformation continues. I I, I am on numerous customer and CIO calls every week. Customers are continuing to invest in digital transformation in infrastructure to enable their business model. Yes, maybe it's gonna slow or, or pause or maybe they're not gonna invest quite at the same rate over the next number of quarters, but over the long term the needs are there. You look at what we're doing around the, the growth opportunities that we see, not only in our core space where we continue to invest, but also in the, what we call the strategic adjacencies. Things like 5G and modern telecom infrastructure as our, the telecom providers across the globe open up their, what a cl previous been closed ecosystems, you know, to open architecture. You think about, you know, what we're doing around the edge and the distribution now that we're seeing of compute and storage back to the edge given data gravity and latency matters. >>And so we're pretty bullish on the opportunity in front of us, you know, yes, we will, We're continuing to invest. And you Jeff Boudreau talk about that I think later on in the program. So I'm excited about the opportunities and you look at our cash flow generation capability, you know, we are in, in, in normal times a, a cash flow generation machine and we'll continue to do so. You know, we've got a negative, you know, CCC in terms of, you know, how do we think about efficiency of working capital? And we look at our, you know, our capital allocation strategy, which has now returned, you know, somewhere in near 60% of our free cash flow back to shareholders. And so, you know, there's lots to, lots of reasons to think about why this, you know, we are a great sort of, I think, value creation opportunity in a over the long term that the long term trends are with us, and I expect them to continue to be so, >>Yeah, and you guys, you, you, you do what you say you're gonna do. I mean, I said in my, in my other piece that I did recently, I think you guys put 46 billion on the, on the, on the balance sheet in terms of debt. That's down to I think 16 billion in the core, which that's quite remarking. That gives you some other opportunities. Give us your, your closing thoughts. I mean, you kind of just addressed why Dell is a good long term play, but I'll give you an opportunity to bring us home. >>Hey, Dave. Yeah, look, I, I just think if you look at the gr the market opportunity, the size and scale of Dell and how we think about the competitive advantages that we have, we com you know, if you look at, say we're a hundred billion revenue company, which we were a year, you know, last year, that as we reported roughly 60, 65 billion of that in the client and in PC space, roughly, you know, 35 to 40 billion in the ISG or infrastructure space, those markets are gonna continue the opportunity to grow, share, grow at a premium to the market, drive, cash flow, drive, share, gain is clearly there. You couple that with, you know, what we think the opportunity is in these adjacent markets, whether it's telecom, the edge, what we're thinking around data services, data management, you know, we, and you cut, you put that together with the long term trends around, you know, data creation and digital transformation. We are extraordinarily well positioned. We have the largest direct selling organization in, in the technology space. We have the largest supply chain, our services footprint, you know, well positioned in my mind to take advantage of the opportunities as we move forward. >>Well, Tom, really appreciate you taking the time to speak with us. Good to see you again. >>Nice seeing you. Thanks Dave. >>All right. You're watching the Cube's exclusive behind the scenes coverage of Dell Technology Summit 2022. In a moment, I'll be back with Jeff Boudreau. He's the president of Dell's ISG Infrastructure Solutions Group. He's responsible for all the important enterprise business at Dell and we're excited to get his thoughts, keep it right there.
SUMMARY :
Dell Technologies has been one of the most remarkable stories in the history of the technology industry. He's gonna come in the program and give us the update on Apex, which is Dell's as a service offering and David, It's good to see you and good to be back with you. all that craziness, but the VMware spin, you had to give up your gross margin. stepping into the last 18 months, it's, you know, I, I think I remember talking with you and But it spending is, you know, it's somewhat softer, but it's still not bad. grounding, you know, the, the total market, the core market that we think about is roughly It's been, you know, really great performance through the pandemic as, You know, the macro environment as you highlight it continues to be challenging. And again, I've seen a lot of downturns, but you know, the best companies not only weather the storm, You think about, you know, what we're doing around the edge and the distribution you know, our capital allocation strategy, which has now returned, you know, somewhere in near Yeah, and you guys, you, you, you do what you say you're gonna do. the edge, what we're thinking around data services, data management, you know, Well, Tom, really appreciate you taking the time to speak with us. Nice seeing you. He's responsible for all the important enterprise business at Dell and we're excited to get his thoughts,
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Jeff Boudreau | PERSON | 0.99+ |
David | PERSON | 0.99+ |
Tom | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
Jen Savira | PERSON | 0.99+ |
Tom Sweet | PERSON | 0.99+ |
$50 billion | QUANTITY | 0.99+ |
35 | QUANTITY | 0.99+ |
Sam | PERSON | 0.99+ |
40% | QUANTITY | 0.99+ |
16 billion | QUANTITY | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
VMware | ORGANIZATION | 0.99+ |
46 billion | QUANTITY | 0.99+ |
Dave Ante | PERSON | 0.99+ |
ISG Infrastructure Solutions Group | ORGANIZATION | 0.99+ |
1.4 | QUANTITY | 0.99+ |
Europe | LOCATION | 0.99+ |
last year | DATE | 0.99+ |
Sam GrowCo | PERSON | 0.99+ |
last November | DATE | 0.99+ |
18 | QUANTITY | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
first half | QUANTITY | 0.99+ |
Dell Tech Summit | EVENT | 0.98+ |
40 billion | QUANTITY | 0.98+ |
four | QUANTITY | 0.98+ |
24 months | QUANTITY | 0.98+ |
fiscal year 23 | DATE | 0.98+ |
Dell Technology Summit 2022 | EVENT | 0.98+ |
30 different scenarios | QUANTITY | 0.97+ |
$1.5 trillion | QUANTITY | 0.97+ |
nearly 40 years old | QUANTITY | 0.97+ |
60, 65 billion | QUANTITY | 0.97+ |
Broadcom | ORGANIZATION | 0.97+ |
thirties | QUANTITY | 0.96+ |
first | QUANTITY | 0.95+ |
700 | QUANTITY | 0.95+ |
today | DATE | 0.95+ |
12% | QUANTITY | 0.94+ |
Dell Technology Summit | EVENT | 0.94+ |
Cybersecurity Awareness Month | EVENT | 0.93+ |
pandemic | EVENT | 0.92+ |
one | QUANTITY | 0.9+ |
near 60% | QUANTITY | 0.88+ |
Cube | PERSON | 0.87+ |
Ukraine war | EVENT | 0.87+ |
Apex | ORGANIZATION | 0.87+ |
second quarter | DATE | 0.87+ |
zero unemployment | QUANTITY | 0.86+ |
Technologies | ORGANIZATION | 0.84+ |
past 18 months | DATE | 0.84+ |
EMC | ORGANIZATION | 0.83+ |
LA | LOCATION | 0.83+ |
last 18 months | DATE | 0.8+ |
ISG | ORGANIZATION | 0.79+ |
Dell com | ORGANIZATION | 0.76+ |
hundred billion | QUANTITY | 0.74+ |
Breaking Analysis: Analyst Take on Dell
(upbeat music) >> The transformation of Dell into Dell EMC, and now Dell Technologies, has been one of the most remarkable stories in the history of the enterprise technology industry. The company has gone from a Wall Street darling rocketship PC company, to a middling enterprise player, forced to go private, to a debt-laden powerhouse that controlled one of the most valuable assets in enterprise tech, i.e., VMware. And now is a $100 billion dollar giant with a low-margin business, a strong balance sheet, and the broadest hardware portfolio in the industry. The financial magic that Dell went through would make anyone's head spin. The last lever of the Dell EMC deal was detailed in Michael Dell's book "Play Nice But Win," in a captivating chapter called "Harry You and the Bolt from the Blue." Michael Dell described how he and his colleagues came up with the final straw of how to finance the deal. If you haven't read it, you should. And of course, after years of successfully integrating EMC and becoming VMware's number-one distribution channel, all of this culminated in the spin-out of VMware from Dell, and a massive wealth-creation milestone, pending, of course, the Broadcom acquisition of VMware. So where's that leave Dell, and what does the future look like for this technology powerhouse? Hello, and welcome to theCUBE's exclusive coverage of Dell Technologies Summit 2022. My name is Dave Vellante, and I'll be hosting the program. Now, today in conjunction with the Dell Tech Summit, we're going to hear from four of Dell's senior executives. Tom Sweet, who's the CFO of Dell Technologies. He's going to share his views on the company's position and opportunities going forward. He's going to answer the question, why is Dell a good long-term investment? Then we'll hear from Jeff Boudreau, who's the President of Dell's ISG business. That unit is the largest profit driver of Dell. He's going to talk about the product angle, and specifically, how Dell is thinking about solving the multi-cloud challenge. And then Sam Grocott, who's the Senior Vice President of Marketing, will come on the program and give us the update on APEX, which is Dell's as-a-Service offering, and then the new edge platform called Project Frontier. Now, it's also Cybersecurity Awareness Month, that we're going to see if Sam has, you know, anything to say about that. Then finally, for a company that's nearly 40 years old, Dell actually has some pretty forward-thinking philosophies when it comes to its culture and workforce. And we're going to speak with Jenn Saavedra, who's Dell's Chief Human Resource Officer, about hybrid work, and how Dell is thinking about the future of work. However, before we get into all this, I want to share our independent perspectives on the company, and some research that we'll introduce to frame the program. Now, as you know, we love data here at theCUBE, and one of our partners, ETR, has what we believe is the best spending intentions data for enterprise tech. So here's a graphic that shows ETR's proprietary Net Score methodology on the vertical axis, that's a measure of spending velocity, and on the x-axis is overlap or pervasiveness in the data sample. This is a cut for just the server, the storage, and the client sectors within the ETR taxonomy. So you can see Dell's CSG products, laptops in particular, are dominant on both the x and the y dimensions. CSG is the Client Solutions Group, and accounts for nearly 60% of Dell's revenue, and about half of its operating income. And then the arrow signifies that dot that represents Dell's ISG business, that we're going to talk to Jeff Boudreau about. That's the Infrastructure Solutions Group. Now, ISG accounts for the bulk of the remainder of Dell's business, and it is its, as I said, its most profitable from a margin standpoint. It comprises the EMC storage business, as well as the Dell server business, and Dell's networking portfolio. And as a note, we didn't include networking in that cut. Had we done so, Cisco would've dominated the graphic. And frankly, Dell's networking business isn't industry leading in the same way that PCs, servers, and storage are. And as you can see, the data confirms the leadership position Dell has in its client side, its server, and its storage sectors. But the nuance is, look at that red dotted line at 40% on the vertical axis. That represents a highly elevated Net Score, and every company in the sector is below that line. Now, we should mention that we also filtered the data for those companies with more than a hundred mentions in the survey, but the point remains the same. This is a mature business that generally is lower margin. Storage is the exception, but cloud has put pressure on margins even in that business, in addition to the server space. The last point on this graphic is, we put a box around VMware, and it's prominently present on both the x and y dimensions. VMware participates with purely software-defined high-margin offerings in these spaces, and it gives you a sense of what might have been, had Dell chosen to hold onto that asset or spin it into the company. But let's face it, the alternatives for Michael Dell were just too attractive, and it's unlikely that a spin-in would've unlocked the value in the way a spin-out did, at least not in the near future. So let's take a look at the snapshot of Dell's financials, to give you a sense of where the company stands today. Dell is a company with over $100 billion dollars in revenue. Last quarter, it did more than 26 billion in revenue, and grew at a quite amazing 9% rate, for a company that size. But because it's a hardware company, primarily, its margins are low, with operating income 10% of revenue, and at 21% gross margin. With VMware on Dell's income statement before the spin, its gross margins were in the low 30s. Now, Dell only spends about 2% of revenue on R&D, but because it's so big, it's still a lot of money. And you can see it is cash-flow positive. Dell's free cash flow over the trailing 12-month period is 3.7 billion, but that's only 3.5% of trailing 12-month revenue. Dell's APEX, and of course its hardware maintenance business, is recurring revenue, and that is only about 5 billion in revenue, and it's growing at 8% annually. Now, having said that, it's the equivalent of ServiceNow's total revenue. Of course, ServiceNow has 23% operating margin and 16% free cash-flow margin, and more than $5 billion in cash on the balance sheet, and an $85 billion market cap. That's what software will do for you. Now Dell, like most companies, is staring at a challenging macro environment, with FX headwinds, inflation, et cetera. You've heard the story. And hence it's conservative, and contracting revenue guidance. But the balance sheet transformation has been quite amazing, thanks to VMware's cash flow. Michael Dell and his partners from Silver Lake et al., they put up around $4 billion of their own cash to buy EMC for 67 billion, and of course got VMware in the process. Most of that financing was debt that Dell put on its balance sheet to do the transaction, to the tune of $46 billion it added to the balance sheet debt. Now, Dell's debt, the core debt, net of its financing operation, is now down to 16 billion, and it has $7 billion in cash on the balance sheet. So a dramatic delta from just a few years ago. So, pretty good picture. But Dell, a $100 billion company, is still only valued at 28 billion, or around 26 cents on the revenue dollar. HPE's revenue multiple is around 60 cents on the revenue dollar. HP Inc., Dell's laptop and PC competitor, is around 45 cents. IBM's revenue multiple is almost two times. By the way, IBM has more than $50 billion in debt thanks to the Red Hat acquisition. And Cisco has a revenue multiple that's over 3x, about 3.3x currently. So is Dell undervalued? Well, based on these comparisons with its peers, I'd say yes, and no. Dell's performance, relative to its peers in the market, is very strong. It's winning, and has an extremely adept go-to-market machine, but its lack of software content and its margin profile leads one to believe that if it can continue to pull some valuation levers while entering new markets, it can get its valuation well above where it is today. So what are some of those levers, and what might that look like, going forward? Despite the fact that Dell doesn't have a huge software revenue component since spinning out VMware, and it doesn't own a cloud, it plays in virtually every part of the hardware market. And it can provide infrastructure for pretty much any application in any use case, in pretty much any industry, in pretty much any geography in the world. And it can serve those customers. So its size is an advantage. However, the history for hardware-heavy companies that try to get bigger has some notable failures, namely HP, which had to split into two businesses, HP Inc. and HPE, and IBM, which has had an abysmal decade from a performance standpoint, and has had to shrink to grow again, and obviously do a massive $34 billion acquisition of Red Hat. So why will Dell do any better than these two? Well, it has a fantastic supply chain. It's a founder-led company, which makes a cultural difference, in our view. And it's actually comfortable with a low-margin software-light business model. Most certainly, IBM wasn't comfortable with that, and didn't have these characteristics, and HP was kind of just incomprehensible at the end. So Dell in my opinion, has a much better chance of doing well at 100 billion or over, but we'll see how it navigates through the current headwinds as it's guiding down. APEX is essentially Dell's version of the cloud. Now, remember, Dell got started late. HPE is further along from a model standpoint with GreenLake, but Dell has a larger portfolio, so they're going to try to play on that advantage. But at the end of the day, these as-a-Service offerings are simply ways to bring a utility model to existing customers, and generate recurring revenue. And that's a good thing, because customers will be loyal to an incumbent if it can deliver as-a-Service and reduce risk for customers. But the real opportunity lies ahead. Specifically, Dell is embracing the cloud model. It took a while, but they're on board. As Matt Baker, Dell's Senior Vice President of Corporate Strategy, likes to say, it's not a zero-sum game. What he means by that is, just because Dell doesn't own its own cloud, it doesn't mean Dell can't build value on top of hyperscale clouds. What we call supercloud. And that's Dell's strategy, to take advantage of public cloud capex, and connect on-prem to the cloud, create a unified experience across clouds, and out to the edge. That's ambitious, and technically it's nontrivial. But listen to Dell's Vice Chairman and Co-COO, Jeff Clarke, explain this vision. Please play the clip. >> You said also, technology and business models are tied together, and an enabler. >> That's right. >> If you believe that, then you have to believe that it's a business operating system that they want. They want to leverage whatever they can, and at the end of the day, they have to differentiate what they do. >> Well, that's exactly right. If I take that and what Dave was saying, and I summarize it the following way: if we can take these cloud assets and capabilities, combine them in an orchestrated way to deliver a distributed platform, game over. >> Eh, pretty interesting, right? John Furrier called it a "business operating system." Essentially, I think of it sometimes as a cloud operating system, or cloud operating environment, to drive new business value on top of the hyperscale capex. Now, is it really game over, as Jeff Clarke said, if Dell can do that? Uh, (sucks in breath) I'd say if it had that today, it might be game over for the competition, but this vision will take years to play out. And of course, it's got to be funded. And that's going to take time, and in this industry, it tends to move, companies tend to move in lockstep. So, as often is the case, it's going to come down to execution and Dell's ability to enter new markets that are ideally, at least from my perspective, higher margin. Data management, extending data protection into cybersecurity as an adjacency, and of course, edge and telco/5G opportunities. All there for the taking. I mean, look, even if Dell doesn't go after more higher-margin software content, it can thrive with a lower-margin model just by penetrating new markets and throwing off cash from those markets. But by keeping close to customers, and maybe through tuck-in acquisitions, it might be able to find the next nugget beyond today's cloud and on-prem models. And the last thing I'll call out is ecosystem. I say here, "Ecosystem, ecosystem, ecosystem," because a defining characteristic of a cloud player is ecosystem, and if APEX is Dell's cloud, it has the opportunity to expand that ecosystem dramatically. This is one of the company's biggest opportunities and challenges at the same time, in my view. It's just scratching the surface on its partner ecosystem. And its ecosystem today is both reseller heavy and tech partner heavy. And that's not a bad thing, but it's starting to evolve more rapidly. The Snowflake deal is an example of up-the-stack evolution, but I'd like to see much more out of that Snowflake relationship, and more relationships like that. Specifically, I'd like to see more momentum with data and database. And if we live in a data-heavy world, which we do, where the data and the database and data management offerings, you know, coexist and are super important to customers, I'd like to see that inside of APEX. I'd like to see that data play beyond storage, which is really where it is today, in its early days. The point is, with Dell's go-to-market advantage, which company wouldn't treat Dell like the on-prem, hybrid, edge, supercloud player that I want to partner with to drive more business? You'd be crazy not to. But Dell has a lot on its plate, and we'd like to see some serious acceleration on the ecosystem front. In other words, Dell as both a selling partner and a business enabler with its platform, its programmable Infrastructure-as-a-Service. And that is a moving target that will rapidly evolve. And of course, we'll be here watching and reporting. So thanks for watching this preview of Dell Technologies Summit 2022. I'm Dave Vellante, we hope you enjoy the rest of the program. (upbeat music)
SUMMARY :
and of course got VMware in the process. and an enabler. and at the end of the day, and I summarize it the following way: and are super important to customers,
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Jeff Boudreau | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
IBM | ORGANIZATION | 0.99+ |
Dave | PERSON | 0.99+ |
Jeff Clarke | PERSON | 0.99+ |
Sam Grocott | PERSON | 0.99+ |
Tom Sweet | PERSON | 0.99+ |
Jenn Saavedra | PERSON | 0.99+ |
Matt Baker | PERSON | 0.99+ |
HP | ORGANIZATION | 0.99+ |
HPE | ORGANIZATION | 0.99+ |
Cisco | ORGANIZATION | 0.99+ |
Michael Dell | PERSON | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
$85 billion | QUANTITY | 0.99+ |
VMware | ORGANIZATION | 0.99+ |
$34 billion | QUANTITY | 0.99+ |
21% | QUANTITY | 0.99+ |
3.7 billion | QUANTITY | 0.99+ |
$7 billion | QUANTITY | 0.99+ |
HP Inc. | ORGANIZATION | 0.99+ |
Last quarter | DATE | 0.99+ |
10% | QUANTITY | 0.99+ |
100 billion | QUANTITY | 0.99+ |
$100 billion | QUANTITY | 0.99+ |
Sam | PERSON | 0.99+ |
John Furrier | PERSON | 0.99+ |
Harry You and the Bolt from the Blue | TITLE | 0.99+ |
8% | QUANTITY | 0.99+ |
more than $50 billion | QUANTITY | 0.99+ |
23% | QUANTITY | 0.99+ |
28 billion | QUANTITY | 0.99+ |
40% | QUANTITY | 0.99+ |
16% | QUANTITY | 0.99+ |
67 billion | QUANTITY | 0.99+ |
more than $5 billion | QUANTITY | 0.99+ |
Red Hat | ORGANIZATION | 0.99+ |
$46 billion | QUANTITY | 0.99+ |
12-month | QUANTITY | 0.99+ |
more than 26 billion | QUANTITY | 0.99+ |
Play Nice But Win | TITLE | 0.99+ |
3.5% | QUANTITY | 0.99+ |
Michael Dell | PERSON | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
Dell Technology Summit
>>As we said in our analysis of Dell's future, the transformation of Dell into Dell emc and now Dell Technologies has been one of the most remarkable stories in the history of the technology industry. After years of successfully integrated EMC and becoming VMware's number one distribution channel, the metamorphosis of Dell com culminated in the spin out of VMware from Dell and a massive wealth creation milestone pending, of course the Broadcom acquisition of VMware. So where's that leave Dell and what does the future look like for this technology powerhouse? Hello and welcome to the Cube's exclusive coverage of Dell Technology Summit 2022. My name is Dave Ante and I'll be hosting the program today In conjunction with the Dell Tech Summit. We'll hear from four of Dell's senior executives. Tom Sweet is the CFO of Dell Technologies. He's gonna share his views of the company's position and opportunities and answer the question, why is Dell good long term investment? >>Then we'll hear from Jeff Boudreau was the president of Dell's ISG business unit. He's gonna talk about the product angle and specifically how Dell is thinking about solving the multi-cloud challenge. And then Sam Grow Cot is the senior vice president of marketing's gonna come in the program and give us the update on Apex, which is Dell's as a service offering and a new edge platform called Project Frontier. By the way, it's also Cybersecurity Awareness Month, and we're gonna see if Sam has any stories there. And finally, for a company that's nearly 40 years old, Dell has some pretty forward thinking philosophies when it comes to its culture and workforce. And we're gonna speak with Jen Savira, who's Dell's chief Human Resource officer about hybrid work and how Dell is thinking about the future of work. We're gonna geek out all day and talk multi-cloud and edge and latency, but first, let's talk wallet. Tom Sweet cfo, and one of Dell's key business architects. Welcome back to the cube, >>Dave, it's good to see you and good to be back with you. So thanks for having me, Jay. >>Yeah, you bet. Tom. It's been a pretty incredible past 18 months. Not only the pandemic and all that craziness, but the VMware spin, you had to give up your gross margin binky as kidding, and, and of course the macro environment. I'm so sick of talking about the macro, but putting that aside for a moment, what's really remarkable is that for a company at your size, you've had some success at the top line, which I think surprised a lot of people. What are your reflections on the last 18 to 24 months? >>Well, Dave, it's been an incredible, not only last 18 months, but the whole transformation journey. If you think all the way back maybe to the LBO and forward from there, but, you know, stepping into the last 18 months, it's, you know, I, I think I remember talking with you and saying, Hey, you know, this scenario planning we did at the beginning of this pandemic journey was, you know, 30 different scenarios roughly, and none of which sort of panned out the way it actually did, which was a pretty incredible growth story as we think about how we helped customers, you know, drive workforce productivity, enabled their business model during the all remote work environment. That was the pandemic created. And couple that with the, you know, the, the rise then and the infrastructure spin as we got towards the tail end of the, of the pandemic coupled with, you know, the spin out of VMware, which culminated last November, as you know, as we completed that, which unlocked a pathway back to investment grade within unlocked, quite frankly shareholder value, capital allocation frameworks. It's really been a remarkable, you know, 18, 24 months. It's, it's never dull at Dell Technologies. Lemme put it that way. >>Well, well, I was impressed with you, Tom, before the leverage buyout and then what I've seen you guys navigate through is, is, is truly amazing. Well, let's talk about the challenging macro. I mean, I've been through a lot of downturns, but I've never seen anything quite like this with fed tightening and you're combating inflation, you got this recession looming, there's a bear market you got, but you got zero unemployment, you're rising wages, strong dollar, and it's very confusing. But it spending is, you know, it's somewhat softer, but it's still not bad. How are you seeing customers behave? How is Dell responding? >>Yeah, look, if you think about the markets we play in Dave, and we should start there as a grounding, you know, the, the total market, the core market that we think about is roughly 700 and, you know, 50 billion or so. If you think about our core IT services capability, you couple that with some of the, the growth initiatives that we're driving and the adjacent markets that that, that brings in, you're roughly talking a 1.4 to $1.5 trillion market opportunity, total addressable market. And so from from that perspective, we're extraordinarily bullish on where are we in the journey as we continue to grow and expand. You know, we have, we're number one share in just about every category that we plan, but yet when you look at that, you know, number one share in some of these, you know, our highest share position may be, you know, low thirties and maybe in the high end of storage you're at the upper end of thirties or 40%. >>But the opportunity there to continue to expand the core and, and continue to take share and outperform the market is truly extraordinary. So, so you step back and think about that, then you say, okay, what have we seen over the last number of months and quarters? It's been, you know, really great performance through the pandemic as, as you highlighted, we actually had a really strong first half of the year of our fiscal year 23 with revenue up 12% operating income up 12% for the first half. You know, what we talked about as you, if you might recall in our second quarter earnings, was the fact that we were starting to see softness. We had seen it in the consumer PC space, which is not a big area of focus for us in the sense of our, our total revenue stream, but we started to see commercial PC soften and we were starting to see server demand soften a bit and storage demand was, was holding quite frankly. >>And so we gave a a framework around guidance for the rest of the year as a, of what we were seeing. You know, the macro environment as you highlight it continues to be challenging. You know, if you look at inflation rates and the efforts by central banks across the globe to with through interest rate rise to press down and, and constrain growth and push down inflation, you couple that with supply chain challenges that continue principle, particularly in the ISG space. And then you couple that with the Ukraine war and the, and the energy crisis that that's created. And particularly in Europe, it's a pretty dynamic environment. And, but I'm confident, you know, I'm confident in the long term, but I do think that there is, you know, that there's navigation that we're going to have to do over the coming number of quarters, who knows quite how long, you know, to, to make sure the business is properly positioned and, you know, we've got a great portfolio and you're gonna talk to some of the team LA later on as you think your way through some of the solution capabilities we're driving what we're seeing around technology trends. >>So the opportunities there, there's some short term navigation that we're gonna need to do just to make sure that we address some of the, you know, some of the environmental things that we're seeing right >>Now. Yeah. And as a global company, of course you're converting local currencies back to appreciated dollars. That's, that's, that's another headwind. But as you say, I mean, that's math and you're navigating it. And again, I've seen a lot of downturns, but you know, the best companies not only weather the storm, but they invest in ways they that allow them to cut out, come out the other side stronger. So I wanna talk about that longer term opportunity, the relationship between the core, the the business growth. You mentioned the tam, I mean, even as a lower margin business, if, if you can penetrate that big of a tam, you could still throw off a lot of cash and you've got other levers to turn in potentially acquisitions and software. And, but so ultimately what gives you confidence in Dell's future? How should we think about Dell's future? >>Yeah, look, I, I think it comes down to we are extraordinarily excited about the opportunity over the long term digital transformation continues. I I am on numerous customer and CIO calls every week. Customers are continuing to invest in digital transformation and infrastructure to enable their business model. Yes, maybe it's gonna slow or, or pause or maybe they're not gonna invest quite at the same rate over the next number of quarters, but over the long term the needs are there. You look at what we're doing around the, the growth opportunities that we see, not only in our core space where we continue to invest, but also in the, what we call the strategic adjacencies. Things like 5G and modern telecom infrastructure as our, the telecom providers across the globe open up their, what a cl previous been closed ecosystems, you know, to open architecture. You think about, you know, what we're doing around the edge and the distribution now that we're seeing of compute and storage back to the edge given data gravity and latency matters. >>And so we're pretty bullish on the opportunity in front of us, you know, yes, we will and we're continuing to invest and you know, Jeff Boudreau talk about that I think later on in the program. So I'm excited about the opportunities and you look at our cash flow generation capability, you know, we are in, in, in normal times a, a cash flow generation machine and we'll continue to do so, You know, we've got a negative, you know, CCC in terms of, you know, how do we think about efficiency of working capital? And we look at our, you know, our capital allocation strategy, which has now returned, you know, somewhere in near 60% of our free cash flow back to shareholders. And so, you know, there's lots to, lots of reasons to think about why this, you know, we are a great sort of, I think value creation opportunity and a over the long term that the long term trends are with us, and I expect them to continue to be so, >>Yeah, and you guys, you, you, you do what you say you're gonna do. I mean, I said in my, in my other piece that I did recently, I think you guys put 46 billion on the, on the, on the balance sheet in terms of debt. That's down to I think 16 billion in the core, which that's quite remarking and that gives you some other opportunities. Give us your, your closing thoughts. I mean, you kind of just addressed why Dell is a good long term play, but I'll give you an opportunity to bring us home. >>Hey, Dave. Yeah, look, I, I just think if you look at the good, the market opportunity, the size and scale of Dell and how we think about the competitive advantages that we have, we com you know, if you look at, say we're a hundred billion revenue company, which we were a year, you know, last year, that as we reported roughly 60, 65 billion of that in the client, in in PC space, roughly, you know, 35 to 40 billion in the ISG or infrastructure space, those markets are gonna continue the opportunity to grow, share, grow at a premium to the market, drive, cash flow, drive, share gain is clearly there. You couple that with, you know, what we think the opportunity is in these adjacent markets, whether it's telecom, the edge, what we're thinking around data services, data management, you know, we, and you cut, you put that together with the long term trends around, you know, data creation and digital transformation. We are extraordinarily well positioned. We have the largest direct selling organization in in the technology space. We have the largest supply chain, our services footprint, you know, well positioned in my mind to take advantage of the opportunities as we move forward. >>Well Tom, really appreciate you taking the time to speak with us. Good to see you again. >>Nice seeing you. Thanks Dave. >>All right. You're watching the Cubes exclusive behind the scenes coverage of Dell Technology Summit 2022. In a moment, I'll be back with Jeff Boudreau. He's the president of Dell's ISG Infrastructure Solutions Group. He's responsible for all the important enterprise business at Dell, and we're excited to get his thoughts, keep it right there. >>Welcome back to the cube's exclusive coverage of the Dell Technology Summit. I'm Dave Ante and we're going inside with Dell execs to extract the signal from the noise. And right now we're gonna dig into customer requirements in a data intensive world and how cross cloud complexities get resolved from a product development perspective and how the ecosystem fits in to that mosaic to close the gaps and accelerate innovation. And with me now as friend of the cube, Jeff Boudreau, he's the president of the Infrastructure Solutions Group, ISG at Dell Technologies. Jeff, always good to see you. Welcome. >>You too. Thank you for having me. It's great to see you and thanks for having me back on the cube. I'm thrilled to be here. >>Yeah, it's our pleasure. Okay, so let's talk about what you're observing from customers today. You know, we talk all the time about operating in a data driven multi-cloud world, blah, blah, blah, blah. But what does that all mean to you when you have to translate that noise into products that solve specific customer problems, Jeff? >>Sure. Hey, great question. And everything always starts with our customers. There are motivation, they're top of mind, everything we do, my leadership team and I spend a lot of time with our customers. We're listening, we're learning, we're really understanding their pain points, and we wanna get their feedback in regards to our solutions, both turn and future offerings, really ensure that we're aligned to meeting their business objectives. I would say from these conversations, I'd say customers are telling us several things. First, it's all about data for no surprise going back to your opening. And second, it's about the multi-cloud world. And I'd say the big thing coming from all of this is that both of those are driving a ton of complexity for our customers. And I'll unpack that just a bit, which is first the data. As we all know, data is growing at unprecedented rates with more than 90% of the world's data being produced in the last two years alone. >>And you can just think of that in it's everywhere, right? And so as it as the IT world shifts towards distributed compute to support that data growth and that data gravity to really extract more value from that data in real time environments become inherently more and more hybrid and more and more multi-cloud. Which leads me to the second key point that I've been hearing from our customers, which it's a multi-cloud world, not new news. Customers by default have multiple clouds running across multiple locations that's on-prem and off-prem, it's running at the edge and it's serving a variety of different needs. Unfortunately, for most of our CU customers, multi-cloud is actually added to their complexity. As we've discussed. It's been a lot more of multi-cloud by default versus multi-cloud by design. And if you really think about our customers, I mean, I, I, I've talking to 'EM all the time, you think about the data complexity, that's the growth and the gravity. >>You think about their infrastructure complexity shifting from central to decentralized it, you think about multi-cloud complexity. So you have these walled gardens, if you will. So you have multiple vendors and you have these multiple contracts that all creates operational complexity for their teams around their processes of their tools. And then you think about security complexity that that dries with the, just the increased tax service and the list goes on. So what are we seeing for our customers? They, what they really want from us, and what they're asking us for is simplicity, not complexity. The immediacy, not latency. They're asking for open and aligned versus I'd say siloed and closed. And they're looking for a lot more agility and not rigidity in what we do. So they really wanna simplify everything. They're looking for a simpler IT and a more agile it. And they want more control of their data, right? >>And so, and they want to extract more of the value to enrich their business or their customer engagements, which all sounds pretty obvious and we've probably all heard it a bunch, but it's really hard to achieve. And that's where I believe, and we believe as Dell that we, it creates a big opportunity for us to really help our customers as that great simplifier of it. We're already doing this today on just a couple quick examples. First is Salesforce. We've supported recently, we've supported their global expansion with a multi-cloud solution to help them drive their business growth. Our solution delivered a reliable and consistent IT experience. We go back to that complexity and it was across a very distributed environment, including more than 60 data centers, 230 countries and hundreds of thousands of customers. It really provided Salesforce with the flexibility of placing workloads and data in an environment based on the right service level. >>Objective things like cost complexity or even security compliance considerations. The second customer A is a big New England Patriot fan. And Dan, Dave, I know you are as well. Oh yeah, this one's near, near data to my heart, it's the craft group. We just created a platform to span all the businesses that create more, I'd say data driven, immersive, secure experience, which is allowing them to capture data at the edge and use it for real time insights for things like cyber resiliency, but also like safety of the facilities. And as being a PA fan like I am, did they truly are meeting us where we are in our seats on their mobile devices and also in the parking lot. So just keep that in mind next time you're there. The bottom line, everything we're doing is really to make it simpler for our customers and to help them get the most of their data. I'd say we're gonna do this, is it through a multi-cloud by design approach, which we talked a lot about with you and and others at Dell Tech world earlier this year, >>Right? And we had Salesforce on, actually at Dell Tech group. The craft group is interesting because, you know, when you get to the stadium, you know, everybody's trying to get, get, get out to the internet and, and, but then the experience is so much better if you can actually, you know, deal with that edge. So I wanna talk about complexity though. You got data, you got, you know, the, the edge, you got multiple clouds, you got a different operating model across security model, different. So a lot of times in this industry we solve complexity with more complexity and it's like a bandaid. So I wanna, I wanna talk to, to how you're innovating around simplicity in ISG to address this complexity and what this means for Dell's long term strategy. >>Sure, I'd love to. So first I, I'd like to state the obvious, which are our investments in our innovations really focused on advancing, you know, our, our our customers needs, right? So we are really, our investments are gonna be targeted. We, we believe customers can have the most value. And some of that's gonna be around how we create strategic partnerships as well connected to what we just spoke about. Much of the complexity of customers have or experiencing is in the orchestration and management of all the data in all these different places and customers, you know, they must be able to quickly deploy and operate across cloud environments. They need to increase their developer productivity, really enabling those developers that do what they do best, which is creating more value for their customers than for their businesses. Our innovation efforts are really focused on addressing this by delivering an open and modern IT architecture that allows customers to run and manage any workload in any cloud anywhere. >>Data lives we're focused on, also focused on consumption based solutions, which allow for a greater degree of simplicity and flexibility, which they're really asking for as well. The foundation for this is our software to define common storage layer, that common storage layer. You can think about this Dave, as our ias if you will. It underpins our data access in mobility across all data types and locations. So you can think private, public, telecom, colo, edge, and it's delivered in a secure, holistic, and consistent cloud experience through Apex. We are making a ton of progress to let you just to be, just to be clear, we've made headway in things like Project Alpine, which you're very well aware of. This is our storage as a service. We announce this back in in January, which brings our unique software IP from our flagship storage platform to all the major public clouds. >>Really delivering the best of both worlds, allowing our customers to take advantage of Dell's enterprise class data services and storage software, such as performance at scale, resiliency, efficiency and security. But in addition to that, we're leveraging the breadth of the public cloud services, right? They're on demand scaling capabilities and access to analytical services. So in addition, we're really, we're, we're on our way to win at the edge as well with Project Frontier, which reduces complexity at the edge by creating an open and secure software platform to help our customers simplify their edge operations, optimize their edge environments and investments, secure that edge environment as well. I believe you're gonna be discussing Project Frontier here with Sam Gro Crop, the very near future. So I won't give up too many more details there. And lastly, we're also scaling Apex, which, oh, well, shifting from our vision, really shifting from vision to reality and introducing several new Apex service offerings, which are coming to market over the next month or so. And the intent is really supporting our customers on their as a service transitions by modernize the consumption experience and providing that flexible as a service model. Ultimately, we're trying to help our customers achieve that multi-cloud by design to really simplify it and unlock the power of their data. >>So some good examples there. I I like to talk about the super Cloud as you, you know, you're building on top of the, you know, hyperscale infrastructure and you got Apex is your cloud, the common storage layer, you call it your is. And that's, that's a ingredient in what we call the super cloud out to the edge. You have to have a common platform there and one of the hallmarks of a cloud company. And as you become a cloud company, everybody's a cloud company ecosystem becomes really, really important in terms of product development and, and innovation. Matt Baker always loves to stress it's not a zero zero sum game. And, and I think Super Cloud recognizes that, that there's value to be built on top of other clouds and, and, and of course on top of your infrastructure so that your ecosystem can add value. So what role does the ecosystem play there? >>For me, it's, it's pretty clear. It's, it's, it's critical. I can't say that enough above the having an open ecosystem. Think about everything we just discussed, and I agree with your super cloud analogy. I agree with what Matt Baker had said to you, I would certain no one company can actually address all the pain points and all the issues and challenges our customers are having on their own, not one. I think customers really want and deserve an open technology ecosystem, one that works together. So not these close stacks that discourages interoperability or stifles innovation and productivity of our, of each of our teams. We del I guess have a long history of supporting open ecosystems that really put customers first. And to be clear, we're gonna be at the center of the multi-cloud ecosystem and we're working with partners today to make that a reality. >>I mean, just think of what we're doing with VMware. We continue to build on our first and best alliances with them in August at their VMware explorer, which I know you were at, we announced several joint engineering initiatives to really help customers more easily manage and gain value from their data and their infrastructure. For multi-cloud specifically, we strength our relationship with VMware and with Tansu as part of that. In addition, just a few weeks ago we announced our partnership with Red Hat to simplify our multi-cloud deployments for managing containerized workloads. I'd say, and using your analogy, I could think of that as our multicloud platform. So that's kind of our PAs layer, if you will. And as you're aware, we have a very long standing and strategic partnership with Microsoft and I'd say stay tuned. There's a lot more to come with them and also others in this multicloud space. >>Shifting a bit to some of the growth engines that my team's responsible for the edge, right? As you think about data being everywhere, we've established partnerships for the Edge as well with folks like PTC and Litmus for the manufacturing edge, but also folks like Deep North for the retail edge analytics and data management. Using your Supercloud analogy, Dave the sa, right? This is our Sasa, we've announced that we're collaborating, partnering with folks like Snowflake and, and there's other data management companies as well to really simplify data access and accelerate those data insights. And then given customers choice of where they'd like to have their IT and their infrastructure, we've we're expanding our colo partnerships as well with folks like eex and, and they're allowing us to broaden our availability of Apex, providing customers the flexibility to take advantage of those as a service offerings wherever it's delivered and where they can get the most value. So those are just some you can hear from me. I think it's critical not only for, for us, I think it's critical for our customers. I think it's been critical, critical for the entire, you know, industry as a whole to really have that open technology ecosystem as we work with our customers on our multi-cloud solutions really to meet their needs. We'll continue to collaborate with whoever customers choose and you know, and who they want us to do business with. So I'd say a lot more coming in that space. >>So it's been an interesting three years for you, just, just over three years now since you've been made the president of the IS isg. And so you had to dig in and, and it was obviously a strange time around the world, but, but you really had to look at, okay, how do we modernize the platform? How do we make it, you know, cloud first, You've mentioned the edge, we're expanding. So what are the big takeaways? What do you want customers and our audience to understand? Just some closing thoughts and if you could summarize. >>Sure. So I'd say first, you know, we discussed we're working in a very fast paced, ever-changing market with massive amounts of data that needs to be managed. It's very complex and our customers need help with that complexity. I believe that Dell Technologies is uniquely positioned to help as their multicloud champion. No one else can solve the breadth and depth of the challenges like we can. And we're gonna help our customers move forward when they basically moving from a multi-cloud by default, as we've discussed before, to multicloud by design. And I'm really excited for the opportunity to work with our customers to help them expand that ecosystem as they truly realize the future of it and, and what they're trying to accomplish. >>Jeff, thanks so much. Really appreciate your time. Always a pleasure. Go pats and we'll see you on the blog. >>Thanks Dave. >>All right, you're watching exclusive insight insights from Dell Technology Summit on the cube, your leader in enterprise and emerging tech coverage. >>Hello everyone, this is Dave Lanta and you're watching the Cubes coverage of the Dell Technology Summit 2022 with exclusive behind the scenes interviews featuring Dell executive perspectives. And right now we're gonna explore Apex, which is Dell's as a service offering Dell's multi-cloud and edge strategies and the momentum around those. And we have news around Project Frontier, which is Dell's vision for its edge platform. And there's so much happening here. And don't forget it's cyber security Awareness month. Sam Grot is here, he's the senior vice president of marketing at Dell Technologies. Sam, always great to see you. How you doing? >>Always great to be here, Dave. >>All right, let's look at cloud. Everybody's talking about cloud Apex, multi-cloud, what's the update? How's it going? Where's the innovation and focal points of the strategy? >>Yeah, yeah. Look Dave, if you think back over the course of this year, you've really heard, heard us pivot as a company and discussing more and more about how multi-cloud is becoming a reality for our customers today. And when we listen and talk with our customers, they really describe multi-cloud challenges and a few key threads. One, the complexity is growing very, very quickly. Two, they're having a harder time controlling how their users are accessing the various different clouds. And then of course, finally the cloud costs are growing unchecked as well. So we, we like to describe this phenomenon as multi-cloud by design. We're essentially, organizations are waking up and seeing cloud sprawl around their organization every day. And this is creating more and more of those challenges. So of course at Dell we've got a strong point of view that you don't need to build multicloud by by default, rather it's multicloud by design where you're very intentional in how you do multicloud. >>And how we deliver multicloud by design is through apex. Apex is our modern cloud and our modern consumption experience. So when you think about the innovation as well, Dave, like we've been on a pretty quick track record here in that, you know, the beginning of this year we introduced brand new Apex backup services that provides that SAS based backup service. We've introduced or announced project outline, which is bringing our storage software, intellectual property from on-prem and putting it and running it natively in the public cloud. We've also introduced new Apex cyber recovery services that is simplifying how customers protect against cyber attacks. They can run an Amazon Azure, aw, I'm sorry, Amazon, aws, Azure or Google. And then, you know, we are really focused on this multi-cloud ecosystem. We announce key partnerships with SaaS providers such as Snowflake, where you can now access our information or our data from on-prem through the Snow Snowflake cloud. >>Or if needed, we can actually move the data to the Snowflake cloud if required. So we're continuing to build out that ecosystem SaaS providers. And then finally I would say, you know, we made a big strategic announcement just recently with Red Hat, where we're not only delivering new Apex container services, but we announce the strategic partnership to build jointly engineered solutions to address hybrid and multi-cloud solutions going forward. You know, VMware is gonna always continue to be a key partner of ours at the la at the recent VMware explorer we announced new Tansu integration. So, So Dave, I, I think in a nutshell we've been innovating at a very, very fast pace. We think there is a better way to do multi-cloud and that's multi-cloud by design. >>Yeah, we heard that at Dell Technologies world. First time I had heard that multi-cloud by design versus sort of default, which is great Alpine, which is sort of our, what we called super cloud in the making. And then of course the ecosystem is critical for any cloud company. VMware of course, you know, top partner, but the Snowflake announcement was very interesting Red Hat. So seeing that expand, now let's go out to the edge. How's it going with the edge expansion? There's gotta be new speaking of ecosystem, the edge is like a whole different, you know, OT type, that's right, ecosystem, that's telcos what and what's this new frontier platform all about? >>Yeah, yeah. So we've talked a lot about cloud and multi clouds, we've talked about private and hybrid cloud, we've talked about public clouds, clouds and cos, telcos, et cetera. There's really been one key piece of our multi-cloud and technology strategy that we haven't spent a lot of time on. And that's the edge. And we do see that as that next frontier for our customers to really gain that competitive advantage that is created from their data and get closer to the point of creation where the data lives. And that's at the edge. We see the edge infrastructure space growing very, very quickly. We see upwards of 300% year of year growth in terms of amount of data being created at the edge. That's almost 3000 exabytes of data by 2026. So just incredible growth. And the edge is not really new for Dell. We've been at it for over 20 years of delivering edge solutions. >>81% of the Fortune 100 companies in the US use Dell solutions today at the Edge. And we are the number one OEM provider of Edge solutions with over 44,000 customers across over 40 industries and things like manufacturing, retail, edge healthcare, and more. So Dave, while we've been at it for a long time, we have such a, a deep understanding of how our customers are using Edge solutions. Say the bottom line is the game has gotta change. With that growth that we talked about, the new use cases that are emerging, we've got to un unlock this new frontier for customers to take advantage of the edge. And that's why we are announcing and revealing Project Frontier. And Project Frontier in its most simplest form, is a software platform that's gonna help customers and organizations really radically simplify their edge deployments by automating their edge operations. You know, with Project Frontier organizations are really gonna be able to manage, OP, and operate their edge infrastructure and applications securely, efficiently and at scale. >>Okay, so it is, first of all, I like the name, it is software, it's a software architecture. So presumably a lot of API capabilities. That's right. Integration's. Is there hardware involved? >>Yeah, so of course you'll run it on Dell infrastructure. We'll be able to do both infrastructure orchestration, orchestration through the platform, but as well as application orchestration. And you know, really there's, there's a handful of key drivers that have been really pushing our customers to take on and look at building a better way to do the edge with Project Frontier. And I think I would just highlight a handful of 'em, you know, freedom of choice. We definitely see this as an open ecosystem out there, even more so at the Edge than any other part of the IT stack. You know, being able to provide that freedom of choice for software applications or I O T frameworks, operational technology or OT for any of their edge use cases, that's really, really important. Another key area that we're helping to solve with Project Frontier is, you know, being able to expect zero trust security across all their edge applications from design to deployment, you know, and of course backed by an end and secure supply chain is really, really important to customers. >>And then getting that greater efficiency and reliability of operations with the centralized management through Project Frontier and Zero Touch deployments. You know, one of the biggest challenges, especially when you get out to the far, far reach of the frontier is really IT resources and being able to have the IT expertise and we built in an enormous amount of automation helps streamline the edge deployments where you might be deploying a single edge solution, which is highly unlikely or hundreds or thousands, which is becoming more and more likely. So Dave, we do think Project Frontier is the right edge platform for customers to build their edge applications on now and certain, excuse me, certainly, and into the future. >>Yeah. Sam, no truck rolls. I like it. And you, you mentioned, you mentioned Zero trust. So we have Mother's Day, we have Father's Day. The kids always ask When's kids' day? And we of course we say every day is kids' day and every day should be cybersecurity awareness day. So, but we have cybersecurity awareness month. What does it mean for Dell? What are you hearing from customers and, and how are you responding? >>Yeah, yeah. No, there isn't a more prevalent pop of mind conversation, whether it's the boardroom or the IT departments or every company is really have been forced to reckon with the cybersecurity and ransom secure issues out there. You know, every decision in IT department makes impacts your security profile. Those decisions can certainly, positively, hopefully impact it, but also can negatively impact it as well. So data security is, is really not a new area of focus for Dell. It's been an area that we've been focused on for a long time, but there are really three core elements to cyber security and data security as we go forward. The first is really setting the foundation of trust is really, really important across any IT system. And having the right supply chain and the right partner to partner with to deliver that is kind of the foundation in step one. >>Second, you need to of course go with technology that is trustworthy. It doesn't mean you are putting it together correctly. It means that you're essentially assembling the right piece parts together. That, that coexist together in the right way. You know, to truly change that landscape of the attackers out there that are gonna potentially create risk for your environment. We are definitely pushing and helping to embrace the zero trust principles and architectures that are out there. So finally, while when you think about security, it certainly is not absolute all correct. Security architectures assume that, you know, there are going to be challenges, there are going to be pain points, but you've gotta be able to plan for recovery. And I think that's the holistic approach that we're taking with Dell. >>Well, and I think too, it's obviously security is a complicated situation now with cloud you've got, you know, shared responsibility models, you've got that a multi-cloud, you've got that across clouds, you're asking developers to do more. So I think the, the key takeaway is as a security pro, I'm looking for my technology partner through their r and d and their, you mentioned supply chain processes to take that off my plate so I can go plug holes elsewhere. Okay, Sam, put a bow on Dell Technology Summit for us and give us your closing thoughts. >>Yeah, look, I I think we're at a transformative point in it. You know, customers are moving more and more quickly to multi-cloud environments. They're looking to consume it in different ways, such as as a service, a lot of customers edge is new and an untapped opportunity for them to get closer to their customers and to their data. And of course there's more and more cyber threats out there every day. You know, our customers when we talk with them, they really want simple, consistent infrastructure options that are built on an open ecosystem that allows them to accomplish their goals quickly and successfully. And look, I think at Dell we've got the right strategy, we've got the right portfolio, we are the trusted partner of choice, help them lead, lead their, their future transformations into the future. So Dave, look, I think it's, it's absolutely one of the most exciting times in it and I can't wait to see where it goes from here. >>Sam, always fun catching up with you. Appreciate your time. >>Thanks Dave. >>All right. A Dell tech world in Vegas this past year, one of the most interesting conversations I personally had was around hybrid work and the future of work and the protocols associated with that and the mindset of, you know, the younger generation. And that conversation was with Jen Savira and we're gonna speak to Jen about this and other people and culture topics. Keep it right there. You're watching the cube's exclusive coverage of Dell Technology Summit 2022. Okay, we're back with Jen Vera, who's the chief human resource officer of Dell, and we're gonna discuss people, culture and hybrid work and leadership in the post isolation economy. Jen, the conversations that we had at Dell Tech World this past May around the new work environment were some of the most interesting and engaging that I had personally. So I'm really eager to, to get the update. It's great to see you again. Thanks for coming on the cube. >>Thanks for having me Dave. There's been a lot of change in just a short amount of time, so I'm excited to, to share some of our learnings >>With you. I, I mean, I bet there has, I mean, post pandemic companies, they're trying, everybody's trying to figure out the return to work and, and what it looks like. You know, last May there was really a theme of flexibility, but depending, we talked about, well, millennial or not young old, and it's just really was mixed, but, so how have you approached the topic? What, what are your policies? What's changed since we last talked? You know, what's working, you know, what's still being worked? What would you recommend to other companies to over to you? >>Yeah, well, you know, this isn't a topic that's necessarily new to Dell technology. So we've been doing hybrid before. Hybrid was a thing. So for over a decade we've been doing what we called connected workplace. So we have kind of a, a history and we have some great learnings from that. Although things did change for the entire world. You know, March of 2020, we went from kind of this hybrid to everybody being remote for a while. But what we wanted to do is, we're such a data driven company, there's so many headlines out there, you know, about all these things that people think could happen will happen, but there wasn't a lot of data behind it. So we took a step back and we asked our team members, How do you think we're doing? And we asked very kind of strong language because we've been doing this for a while. >>We asked them, Do you think we're leading in the world of hybrid in 86% of our team members said that we were, which is great, but we always know there's nuance right behind that macro level. So we, we asked 'em a lot of different questions and we just went on this kind of myth busting journey and we decided to test some of those things. We're hearing about Culture Willow Road or new team members will have trouble being connected or millennials will be different. And we really just collected a lot of data, asked our team members what their experience is. And what we have found is really, you don't have to be together in the office all the time to have a strong culture, a sense of connection, to be productive and to have it really healthy business. >>Well, I like that you were data driven around it in the data business here. So, but, but there is a lot of debate around your culture and how it suffers in a hybrid environment, how remote workers won't get, you know, promoted. And so I'm curious, you know, and I've, and I've seen some like-minded companies like Dell say, Hey, we, we want you guys to work the way you wanna work. But then they've, I've seen them adjust and say, Well yeah, but we also want you to know in the office be so we can collaborate a little bit more. So what are you seeing at Dell and, and, and how do you maintain that cultural advantage that you're alluding to in this kind of strange, new ever changing world? >>Yeah, well I think, look, one approach doesn't fit all. So I don't think that the approach that works for Dell Technologies isn't necessarily the approach that works for every company. It works with our strategy and culture. It is really important that we listen to our team members and that we support them through this journey. You know, they tell us time and time again, one of the most special things about our culture is that we provide flexibility and choice. So we're not a mandate culture. We really want to make sure that our team members know that we want them to be their best and do their best. And not every individual role has the same requirements. Not every individual person has the same needs. And so we really wanna meet them where they are so that they can be productive. They feel connected to the team and to the company and engaged and inspired. >>So, you know, for, for us, it really does make sense to go forward with this. And so we haven't, we haven't taken a step back. We've been doing hybrid, we'll continue to do hybrid, but just like if you, you know, we talk about not being a mandate. I think the companies that say nobody will come in or you have to come in three days a week, all of that feels more limiting. And so what we really say is, work out with your team, work out with your role, workout with your leader, what really makes the most sense to drive things forward. >>I >>You were, so >>That's what we, you were talking before about myths and you know, I wanna talk about team member performance cuz there's a lot of people believe that if, if you're not in the office, you have disadvantages, people in the office have the advantage cuz they get FaceTime. Is is that a myth? You know, is there some truth to that? What, what do you think about that? >>Well, for us, you know, we look, again, we just looked at the data. So we said we don't wanna create a have and have not culture that you're talking about. We really wanna have an inclusive culture. We wanna be outcome driven, we're meritocracy. But we went and we looked at the data. So pre pandemic, we looked at things like performance, we looked at rewards and recognition, we looked at attrition rates, we looked at sentiment, Do you feel like your leader is inspiring? And we found no meaningful differences in any of that or in engagement between those who worked fully remote, fully in the office or some combination between. So our data would bust that myth and say, it doesn't, you don't have to be in an office and be seen to get ahead. We have equitable opportunity. Now, having said that, you always have to be watching that data. And that's something that we'll continue to do and make sure that we are creating equal opportunity regardless of where you work. >>And it's personal too, I think, I think some people can be really productive at home. I happen to be one that I'm way more productive in the office cause the dogs aren't barking. I have less distractions. And so I think we think, and, and I think the takeaway that in just in talking to, to, to you Jen and, and folks at Dell is, you know, whatever works for you, we're we're gonna, we're gonna support. So I I wanted to switch gears a little bit, talk about leadership and, and very specifically empathic leadership has been said to be, have a big impact on attracting talent, retaining talent, but, but it's hard to have empathy sometimes. And I know I saw some stats in a recent Dell study. It was like two thirds the people felt like their organization underestimates the people requirements. And I, I ask myself, I'm like, what am I missing? I hope, you know, with our folks, so especially as it relates to, to transformation programs. So how can human resource practitioners support business leaders generally, specifically as it relates to leading with empathy? >>I think empathy's always been important. You have to develop trust. You can have the best strategy in the world, right? But if you don't feel like your leader understands who you are, appreciates the the value that you bring to the company, then you're not gonna get very far. So I think empathetic leadership has always been part of the foundation of a trusting, strong relationship between a leader and a team member. But if I think we look back on the last two years, and I imagine it'll be even more so as we go forward, empathetic leadership will be even more important. There's so much going on in the world, politically, socially, economically, that taking that time to say you want your team members to see you as credible, that you and confident that you can take us forward, but also that, you know, and understand me as a human being. >>And that to me is really what it's about. And I think with regard to transformation that you brought up, I think one of the things we forget about is leaders. We've probably been thinking about a decision or transformation for months or weeks and we're ready to go execute, we're ready to go operationalize that thing. And so sometimes when we get to that point, because we've been talking about it for so long, we send out the email, we have the all hands and we just say we're ready to go. But our team members haven't always been on that journey for those months that we have. And so I think that empathetic moment to say, Okay, not everybody is on a change curve where I am. Let's take a pause, let me put myself in their shoes and really think about how we bring everybody along. >>You know, Jen, in the spirit of myth busting, I mean I'm one of those people who felt like that a business is gonna have a hard time, harder time fostering this culture of collaboration and innovation post isolation economy as they, they could pre covid. But you know, I noticed there's a, there's an announcement today that came across my desk, I think it's from Newsweek. Yes. And, and it's the list of top hundred companies recognized for employee motivation satisfaction. And it was really interesting because you, you always see, oh, we're the top 10 or the top hundred, But this says as a survey of 1.4 million employees from companies ranging from 50 to 10,000 employees. And it recognizes the companies that put respect, caring, and appreciation for their employees at the center of their business model. And they doing so have earned the loyalty and respect of the people who work for them. >>Number one on the list is Dell sap. So congratulations SAP was number two. I mean, there really isn't any other tech company on there, certainly no large tech companies on there. So I always see these lists, they go, Yeah, okay, that's cool, top a hundred, whatever. But top one in, in, in an industry where there's only two in the top is, is pretty impressive. And how does that relate to fostering my earlier skepticism of a culture of collaboration? So first of all, congratulations, you know, how'd you do it? And how are you succeeding in, in this new world? >>Well thanks. It does feel great to be number one, but you know, it doesn't happen by accident. And I think while most companies have a, a culture and a spouse values, we have ours called the culture code. But it's really been very important to us that it's not just a poster on the wall or or words on paper. And so we embed our culture code into all of our HR practices, that whole ecosystem from recognition of rewards to performance evaluation, to interviewing, to development. We build it into everything. So it really reflects who we are and you experience it every day. And then to make sure that we're not, you know, fooling ourselves, we ask all of our employees, do you feel like the behaviors you see and the experience you have every day reflects the culture code? And 94% of our team members say that, in fact it does. So I think that that's really been kind of the secret to our success. If you, if you listen to Michael Dell, he'll always say, you know, the most special thing about Dell is our culture and our people. And that comes through being very thoughtful and deliberate to preserve and protect and continue to focus on our culture. >>Don't you think too that repetition and, well first of all, belief in that cultural philosophy is, is important. And then kind of repeating, like you said, Yeah, it's not just a poster in the wall, but I remember like, you know, when we're kids, your parents tell you, okay, power positive thinking, do one to others as others, you know, you have others do it to you. Don't make the say you're gonna do some dumb things but don't do the same dumb things twice and you sort of fluff it up. But then as you mature you say, Wow, actually those were, >>They might have had a >>Were instilled in me and now I'm bringing them forward and, you know, paying it forward. But, but so i, it, it, my, I guess my, my point is, and it's kind of a point observation, but I'll turn it into a question, is isn't isn't consistency and belief in your values really, really important? >>I couldn't agree with you more, right? I think that's one of those things that we talk about it all the time and as an HR professional, you know, it's not the HR people just talking about our culture, it's our business leaders, it's our ceo, it's our COOs ev, it's our partners. We share our culture code with our partners and our vendors and our suppliers and, and everybody, this is important. We say when you interact with anybody at Dell Technologies, you should expect that this is the experience that you're gonna get. And so it is something that we talk about that we embed in, into everything that we do. And I think it's, it's really important that you don't just think it's a one and done cuz that's not how things really, really work >>Well. And it's a culture of respect, you know, high performance, high expectations, accountability at having followed the company and worked with the company for many, many years. You always respect the dignity of your partners and your people. So really appreciate your time Jen. Again, congratulations on being number one. >>Thank you so much. >>You're very welcome. Okay. You've been watching a special presentation of the cube inside Dell Technology Summit 2022. Remember, these episodes are all available on demand@thecube.net and you can check out s silicon angle.com for all the news and analysis. And don't forget to check out wikibon.com each week for a new episode of breaking analysis. This is Dave Valante, thanks for watching and we'll see you next time.
SUMMARY :
My name is Dave Ante and I'll be hosting the program today In conjunction with the And we're gonna speak with Jen Savira, Dave, it's good to see you and good to be back with you. all that craziness, but the VMware spin, you had to give up your gross margin binky as the spin out of VMware, which culminated last November, as you know, But it spending is, you know, it's somewhat softer, but it's still not bad. category that we plan, but yet when you look at that, you know, number one share in some of these, So, so you step back and think about that, then you say, okay, what have we seen over the last number of months You know, the macro environment as you highlight it continues to be challenging. And again, I've seen a lot of downturns, but you know, the best companies not only weather the storm, You think about, you know, And so, you know, in my other piece that I did recently, I think you guys put 46 billion the edge, what we're thinking around data services, data management, you know, Good to see you again. Nice seeing you. He's responsible for all the important enterprise business at Dell, and we're excited to get his thoughts, how the ecosystem fits in to that mosaic to close the gaps and accelerate It's great to see you and thanks for having me back on the cube. But what does that all mean to you when you have to translate And I'd say the big thing coming from all of this is that both of those are driving And if you really think about our customers, I mean, I, I, I've talking to 'EM all the time, you think about the data complexity, And then you think about security complexity that that dries And that's where I believe, and we believe as Dell that we, it creates a big opportunity for us to really help And Dan, Dave, I know you are as well. you know, when you get to the stadium, you know, everybody's trying to get, get, get out to the internet all the data in all these different places and customers, you know, to let you just to be, just to be clear, we've made headway in things like Project Alpine, And the intent is really supporting And as you become And to be clear, So that's kind of our PAs layer, if you will. We'll continue to collaborate with whoever customers choose and you know, How do we make it, you know, cloud first, You've mentioned the edge, we're expanding. the opportunity to work with our customers to help them expand that ecosystem as they truly realize the Go pats and we'll see you All right, you're watching exclusive insight insights from Dell Technology Summit on the cube, And right now we're gonna explore Apex, which is Dell's as a service offering Where's the innovation and focal points of the strategy? So of course at Dell we've got a strong point of view that you don't need to build multicloud So when you think about you know, we made a big strategic announcement just recently with Red Hat, There's gotta be new speaking of ecosystem, the edge is like a whole different, you know, And that's the edge. And we are the number one OEM provider of Edge solutions with over 44,000 Okay, so it is, first of all, I like the name, it is software, And I think I would just highlight a handful of 'em, you know, freedom of choice. the edge deployments where you might be deploying a single edge solution, and, and how are you responding? And having the right supply chain and the right partner you know, there are going to be challenges, there are going to be pain points, but you've gotta be able to plan got, you know, shared responsibility models, you've got that a multi-cloud, you've got that across clouds, And look, I think at Dell we've got the right Sam, always fun catching up with you. with that and the mindset of, you know, the younger generation. There's been a lot of change in just a short amount of time, You know, what's working, you know, what's still being worked? So we took a step back and we asked our team members, How do you think we're doing? And what we have found is really, you don't have to be together in the office we want you guys to work the way you wanna work. And so we really wanna you know, we talk about not being a mandate. That's what we, you were talking before about myths and you know, I wanna talk about team member performance cuz Well, for us, you know, we look, again, we just looked at the data. I hope, you know, with our folks, socially, economically, that taking that time to say you want your team members And I think with regard to transformation that you But you know, So first of all, congratulations, you know, how'd you do it? And then to make sure that we're not, you know, fooling ourselves, it's not just a poster in the wall, but I remember like, you know, when we're kids, your parents tell you, Were instilled in me and now I'm bringing them forward and, you know, paying it forward. the time and as an HR professional, you know, it's not the HR people just talking the dignity of your partners and your people. And don't forget to check out wikibon.com each
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Jeff Boudreau | PERSON | 0.99+ |
Dave Valante | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
Dave Lanta | PERSON | 0.99+ |
Jeff | PERSON | 0.99+ |
Jen Savira | PERSON | 0.99+ |
Tom | PERSON | 0.99+ |
Tom Sweet | PERSON | 0.99+ |
Dan | PERSON | 0.99+ |
Sam | PERSON | 0.99+ |
Michael Dell | PERSON | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
Matt Baker | PERSON | 0.99+ |
Sam Grot | PERSON | 0.99+ |
35 | QUANTITY | 0.99+ |
Jen Vera | PERSON | 0.99+ |
March of 2020 | DATE | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
Jay | PERSON | 0.99+ |
VMware | ORGANIZATION | 0.99+ |
Jen | PERSON | 0.99+ |
16 billion | QUANTITY | 0.99+ |
August | DATE | 0.99+ |
40% | QUANTITY | 0.99+ |
Dave Ante | PERSON | 0.99+ |
Vegas | LOCATION | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
46 billion | QUANTITY | 0.99+ |
January | DATE | 0.99+ |
ORGANIZATION | 0.99+ | |
86% | QUANTITY | 0.99+ |
2026 | DATE | 0.99+ |
50 billion | QUANTITY | 0.99+ |
Red Hat | ORGANIZATION | 0.99+ |
ISG Infrastructure Solutions Group | ORGANIZATION | 0.99+ |
US | LOCATION | 0.99+ |
three years | QUANTITY | 0.99+ |
demand@thecube.net | OTHER | 0.99+ |
Sam Grow Cot | PERSON | 0.99+ |
50 | QUANTITY | 0.99+ |
Sam Gro Crop | PERSON | 0.99+ |
Jeff Boudreau, Dell Technologies| | Dell Technologies Summit 2022
>>Welcome back to the Cube's exclusive coverage of the Dell Technology Summit. I'm Dave Ante. We're going inside with Dell Execs to extract the signal from the noise. And right now we're gonna dig into customer requirements in a data intensive world and how cross cloud complexities get resolved from a product development perspective and how the ecosystem fits in to that mosaic to close the gaps and accelerate innovation. And with me now is friend of the Cube, Jeff Boudreau. He's the president of the Infrastructure Solutions Group, ISG at Dell Technologies. Jeff, always good to see you. Welcome. >>You too. Thank you for having me. It's great to see you and thanks for having me back on the key. I'm thrilled to be here. >>Yeah, it's our pleasure. Okay, so let's talk about what you're observing from customers today. You know, we talk all the time about operating in a data driven multi-cloud world, blah, blah, blah, blah. But what does that all mean to you when you have to translate that noise into products that solve specific customer problems, Jeff? >>Sure. Hey, great question. And everything always starts with our customers. They're our motivation. They're top of mind in everything we do. My leadership team and I spend a lot of time with our customers. We're listening, we're learning, we're really understanding their pain points, and we wanna get their feedback in regards to our solutions. Both turn and future offerings really ensured that we're aligned to meeting their business objectives. I would say from these conversations, I'd say customers are telling us several things. First, it's all about data for no surprise going back to your opening. And second, it's about the multi-cloud world. And I'd say the big thing coming from all of this is that both of those is driving a ton of complexity for our customers. And I'll unpack that just a bit, which is first the data. As we all know, data is growing at unprecedented rates with more than 90% of the world's data being produced in the last two years alone. >>And you can just think of that in its everywhere, right? And so as it is, the IT world shifts towards distributed compute to support that data growth and that data gravity to really extract more value from that data in real time environments become inherently more and more hybrid and more and more multi-cloud. Which leads me to the second key point that I've been hearing from our customers, which it's a multi-cloud world, not new news. Customers by default have multiple clouds running across multiple locations. That's on-prem and off, it's running at the edge and it's serving a variety of different needs. Unfortunately, for most of our CU customers, multicloud actually added to their complexity. As we've discussed, it's been a lot more of multicloud by default versus multicloud by design. Really think about customers, I I, I'm talking to 'EM all the time. You think about the data complexity, that's the growth in the graph. >>You think about their infrastructure complexity, shifting from central to decentralized it, you think of a multi-cloud complexity. So you have these walled gardens, if you will. So you have multiple vendors and you have these multiple contracts that all creates operational complexity for their teams around their processes of their tools. And then you think about the security complexity that that drives with the, just the increased tax service and the list goes on. So what are we seeing for our customers? They, what they really want from, also what they're asking us for is simplicity, not complexity. The immediacy, not latency. They're asking for open and align versus I'd say siloed and closed. And they're looking for a lot more agility and not rigidity in what we do. So they really wanna simplify everything. They're looking for a simpler IT in a more agile it, and they want more control of their data, right? >>And so, and they want to extract more of the value to enrich their business or their customer engagements, which all sounds pretty obvious and we've probably all heard it a bunch, but it's really hard to achieve. And that's where I believe, and we believe as Dell that we, it creates a big opportunity for us to really help our customers as that great simplifier of it. We're already doing this today on just a couple quick examples. First is Salesforce. We've supported recently, we've supported their global expansion with a multi-cloud solution to help them drive their business growth. Our solution delivered a reliable and consistent IT experience. We go back to that complexity and it was across a very distributed environment, including more than 60 data centers, 230 countries in hundreds of thousands of customers. It really provided Salesforce with the flexibility of placing workloads and data in an environment based on the right service level. >>Objective things like cost complexity or even security compliance considerations. The second customer A is a big New England Patriot fan. And Dan, Dave, I know you are as well. Oh yeah, this one's near, near data, my heart, it's the craft group. We just created a platform to span all their businesses that created more, I'd say data driven, immersive, secure experience, which is allowing them to capture data at the edge and use it for realtime insights for things like cyber resiliency, but also like safety of the facilities. And as being a pare fan like I am Dave, they truly are meeting us where we are in, in our seats on their mobile devices and also in the parking lot. So just keep that in mind next time you're there. But bottom line, everything we're doing is really to make it simpler for our customers and to help them get the most of their data. I'd say we're gonna do this, is it through a multi-cloud by design approach, which we talked a lot about with you and and others at Dell Tech world earlier this year, >>Right? And we had Salesforce on, actually at Dell Tech Group. The craft group is interesting because, you know, when you get to the stadium, you know, everybody's trying to get, get, get out to the internet and, and, but then the experience is so much better if you can actually, you know, deal with that edge. So I wanna talk about complexity though. You got data, you got, you know, the, the edge, you got multiple clouds, you got a different operating model across security models, different. So a lot of times in this industry we solve complexity with more complexity and it's like a bandaid. So I wanna, I wanna talk to, to how you're innovating around simplicity in ISG to address this complexity and what this means for Dell's long term strategy. >>Sure, I'd love to. So first I, I'd like to state the obvious, which are our investments in our innovations really focused on advancing, you know, our, our our customers needs, right? So we are really, our investments are gonna be targeted. We, we believe customers can have the most value. And some of that's gonna be around how we create strategic partnerships as well connected to what we just spoke about. Much of the complexity of customers have or experiencing is in the orchestration and management of all the data in all these different places and customers, you know, they must be able to quickly deploy and operate across cloud environments. They need to increase their developer productivity, really enabling those developers that do what they do best, which is creating more value for their customers than for their businesses. Our innovation efforts are really focused on addressing this by delivering an open and modern IT architecture that allows customers to run and manage any workload in any cloud anywhere. >>Data lives we're focused on, also focused on consumption based solutions, which allow for a greater degree of simplicity and flexibility, which they're really asking for as well. The foundation for this is our software defined common storage layer. That common storage layer, You can think about this, Dave, as our ias if you will. It underpins our data access in mobility across all data types of locations. So you can think private, public, telecom, colo, edge, and it's delivered in a secure, holistic, and consistent cloud experience through Apex. We are making a ton of progress to let you, just to be, just to be clear, we made headway in things like Project Alpine, which you're very well aware of. This is our storage as a service. We announce us back in, in January, which brings our unique software IP from our flagship storage platform to all the major public clouds, really delivering the best of both world, allowing our customers to take advantage of Dell's enterprise class data services and storage software, such as performance at scale, resiliency, efficiency and security. >>But in addition to that, we're leveraging the breadth of the public cloud services, right? They're on demand scaling capabilities and access to analytical services. So in addition, we're really, we're on our way to win at the edge as well with Project Frontier, which reduces complexity at the edge by creating an open and secure software platform to help our customers simplify their edge operations, optimize their edge environments and investments, secure that edge environment as well. I believe you're gonna be discussing Cru in Frontier here with Sam Broco in the very near future. So I won't give up more, too many more details there. And lastly, we're also scaling Apex, which, you know, well shifting from our vision, really shifting from vision to reality and introducing several new Apex service offerings, which are coming to market over the next month or so. And the intent is really supporting our customers on their as a service transitions by modernize the consumption experience and providing that flexible as a service model. Ultimately, we're trying to help our customers achieve that multicloud by design to really simplify it and unlock the power of their data. >>So some good examples there. I I like to talk about the super Cloud as you, you know, you're building on top of the, you know, hyperscale infrastructure and you got Apex is your cloud, the common storage layer, you call it your ISAs. And that's, that's a ingredient in what we call the super cloud out to the edge. You have to have a common platform there and one of the hallmarks of a cloud company. And as you become a cloud company, everybody's a cloud company ecosystem becomes really, really important in terms of product development and, and innovation. Matt Baker always loves to stress it's not a zero sum game. And, and I think Super Cloud recognizes that, that there's value to be built on top of other clouds and, and, and of course on top of your infrastructure so that your ecosystem can add value. So what role does the ecosystem play there? >>For me, it's, it's pretty clear. It's, it's, it's critical. I can't say that enough above the having an open ecosystem. Think about everything we just discussed, and I agree with your super cloud analogy. I agree with what Matt Baker had said to you, I would certain no one company can actually address all the pain points and all the issues and challenges our customers are having on their own. Not one. I think customers really want and deserve an open technology ecosystem, one that works together. So not these close stacks that discourages interoperability or stifles innovation and productivity of each of our teams. We del I guess, have a long history of supporting open ecosystems that really put customers first. And to be clear, we're gonna be at the center of the multi-cloud ecosystem and we're working with partners today to make that a reality. I mean, just think of what we're doing with VMware. >>We continue to build on our first and best alliances with them in August at their VMware explorer, which I know you were at. We announced several joint engineering initiatives to really help customers more easily manage and gain value from their data and their infrastructure. For multi-cloud. Specifically, we strength our relationship with VMware and know with Tansu as part of that. In addition, just a few weeks ago we announced our partnership with Red Hat to simplify our multicloud deployments for managing containerized workloads. I'd say, and using your analogy, I could think of that as our multicloud platform. So that's kind of our PAs layer, if you will. And as you're aware, we have a very long standing and strategic partnership with Microsoft and I'd say stay tuned. There's a lot more to come with them and also others in this multi-cloud space. Shifting a bit to some of the growth engines that my team's responsible for the edge, right? >>As you think about data being everywhere, we've established partnerships for the Edge as well with folks like PTC and Litmus for the manufacturing edge, but also folks like Deep North for the retail edge analytics in data management, using your Supercloud analogy, Dave the sa, right? This is our SAS layer. We've announced that we're collaborating, partnering with folks like Snowflake and, and there's other data management companies as well to really simplify data access and accelerate those data insights. And then given customers choice of where they'd like to have their IT and their infrastructure, we've we're expanding our colo partnerships as well with folks like Equinox and, and they're allowing us to broaden our availability of Apex, providing customers the flexibility, take advantage of those as a service offerings wherever it's delivered and where they can get the most value. So those are just some you can hear from me. I think it's critical not only for, for us, I think it's critical for our customers. I think it's been critical, critical for the entire, you know, industry as a whole to really have that open technology ecosystem as we work with our customers on our multi-cloud solutions really to meet their needs. We'll continue to collaborate with whoever customers choose and you know, and who they want us to do business with. So I'd say a lot more coming in that space. >>So it's been an interesting three years for you, just, just over three years now since you've been made the president of the I isg. And so you had to dig in and it was obviously strange time around the world, but, but you really had to look at, okay, how do we mo modernize the platform? How do we make it, you know, cloud first? You've mentioned the edge, we're expanding. So what are the big takeaways? What do you want customers and our audience to understand? Just some closing thoughts and if you could summarize. >>Sure. So I'd say first, you know, we've discussed, we're working in a very fast paced, ever changing market with massive amounts of data that needs to be managed. It's very complex and our customers need help with that complexity. I believe that Dell Technologies is uniquely positioned to help as their multi-cloud champion. No one else can solve the breadth and depth of the challenges like we can. And we're gonna help our customers move forward when they basically moving from a multicloud by default, as we've discussed before, to multicloud by design. And I'm really excited for the opportunity to work with our customers to help them expand that ecosystem as they truly realize the future of it and, and what they're trying to accomplish. >>Jeff, thanks so much. Really appreciate your time. Always a pleasure. Go pats and we'll see you on the blog. >>Thanks Dave. >>All right, you're watching exclusive insights from Dell Technology Summit on the cube, your leader in enterprise and emerging tech coverage.
SUMMARY :
how the ecosystem fits in to that mosaic to close the gaps and accelerate It's great to see you and thanks for having me back on the key. But what does that all mean to you when you have to translate And I'd say the big thing coming from all of this is that both of those is driving And you can just think of that in its everywhere, right? And then you think about the security complexity that that drives We go back to that complexity and which we talked a lot about with you and and others at Dell Tech world earlier this year, you know, when you get to the stadium, you know, everybody's trying to get, get, get out to the internet of all the data in all these different places and customers, you know, So you can think private, public, And lastly, we're also scaling Apex, which, you know, well shifting from our vision, really shifting from vision to reality And as you become And to be clear, We continue to build on our first and best alliances with them in August at We'll continue to collaborate with whoever customers choose and you know, around the world, but, but you really had to look at, okay, how do we mo modernize the platform? And I'm really excited for the opportunity to work with our customers to help them expand that ecosystem as Go pats and we'll see you All right, you're watching exclusive insights from Dell Technology Summit on the cube,
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Jeff Boudreau | PERSON | 0.99+ |
Dan | PERSON | 0.99+ |
Jeff | PERSON | 0.99+ |
Matt Baker | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
August | DATE | 0.99+ |
Equinox | ORGANIZATION | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
Dave Ante | PERSON | 0.99+ |
January | DATE | 0.99+ |
First | QUANTITY | 0.99+ |
Sam Broco | PERSON | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
three years | QUANTITY | 0.99+ |
second | QUANTITY | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
Infrastructure Solutions Group | ORGANIZATION | 0.99+ |
first | QUANTITY | 0.99+ |
VMware | ORGANIZATION | 0.99+ |
Red Hat | ORGANIZATION | 0.99+ |
PTC | ORGANIZATION | 0.99+ |
230 countries | QUANTITY | 0.99+ |
Dell Tech Group | ORGANIZATION | 0.99+ |
Both | QUANTITY | 0.99+ |
more than 90% | QUANTITY | 0.99+ |
more than 60 data centers | QUANTITY | 0.99+ |
both | QUANTITY | 0.99+ |
Deep North | ORGANIZATION | 0.98+ |
Dell Technology Summit | EVENT | 0.98+ |
over three years | QUANTITY | 0.98+ |
Dell Tech | ORGANIZATION | 0.98+ |
Litmus | ORGANIZATION | 0.97+ |
Tansu | ORGANIZATION | 0.97+ |
today | DATE | 0.97+ |
each | QUANTITY | 0.97+ |
Project Alpine | ORGANIZATION | 0.96+ |
Frontier | ORGANIZATION | 0.96+ |
Dell Technologies Summit | EVENT | 0.96+ |
ISG | ORGANIZATION | 0.95+ |
second key point | QUANTITY | 0.95+ |
Apex | ORGANIZATION | 0.95+ |
next month | DATE | 0.95+ |
earlier this year | DATE | 0.94+ |
I isg | ORGANIZATION | 0.92+ |
Edge | ORGANIZATION | 0.92+ |
Salesforce | ORGANIZATION | 0.9+ |
Snowflake | ORGANIZATION | 0.9+ |
one | QUANTITY | 0.87+ |
hundreds of thousands | QUANTITY | 0.85+ |
both world | QUANTITY | 0.85+ |
few weeks ago | DATE | 0.83+ |
New England Patriot | ORGANIZATION | 0.81+ |
couple | QUANTITY | 0.8+ |
Project Frontier | ORGANIZATION | 0.8+ |
second customer | QUANTITY | 0.8+ |
Apex | TITLE | 0.77+ |
last two years | DATE | 0.76+ |
multicloud | ORGANIZATION | 0.75+ |
super Cloud | TITLE | 0.67+ |
Super Cloud | TITLE | 0.63+ |
customers | QUANTITY | 0.61+ |
2022 | DATE | 0.58+ |
VMware explorer | TITLE | 0.58+ |
Supercloud | ORGANIZATION | 0.56+ |
Cube | ORGANIZATION | 0.55+ |
Cube | COMMERCIAL_ITEM | 0.51+ |
Execs | COMMERCIAL_ITEM | 0.39+ |
Tom Sweet | Dell Technologies Summit
(upbeat music) >> As we said in our analysis of Dell's future, the transformation of Dell into Dell EMC and now Dell Technologies has been one of the most remarkable stories in the history of the technology industry. After years of successfully integrated EMC and becoming VMware's number one distribution channel, the metamorphosis of Dell culminated in the spin out of VMware from Dell and a massive wealth creation milestone pending of course the Broadcom acquisition of VMware. So where's that leave Dell and what does the future look like for this technology powerhouse? Hello, and welcome to theCUBE's exclusive coverage of Dell Technologies Summit 2022. My name is Dave Vellante and I'll be hosting the program. Today, in conjunction with the Dell Tech Summit, we'll hear from four of Dell senior executives. Tom Sweet is the CFO of Dell Technologies. He's going to share his views of the company's position and opportunities and answer the question why is Dell a good long term investment? Then we'll hear from Jeff Boudreau, who's the president of Dell's ISG business unit. He's going to talk about the product angle and specifically how Dell is thinking about solving the multi-cloud challenge. And then Sam Groccot is the senior vice President of marketing. He's going to come in the program and give us the update on Apex, which is Dell's as-a-service offering. And a new edge platform called Project Frontier. By the way, it's also Cybersecurity Awareness Month and we're going to see if Sam has any stories there. And finally, for a company that's nearly 40 years old, Dell has some pretty forward thinking philosophies when it comes to its culture and workforce. And we're going to speak with Jen Saavedra who's Dell's Chief Human Resource officer about hybrid work and how Dell is thinking about the future of work. We're going to geek out all day and talk multi-cloud and Edge and latency, but first, let's talk wallet. Tom Sweet, CFO, and one of Dell's key business architects. Welcome back to "theCUBE." >> Dave, it's good to see you and good to be back with you, so thanks for having me today. >> Yeah, you bet. Tom, it's been a pretty incredible past 18 months. Not only the pandemic and all that craziness, but the VMware spin. You had to give up your gross margin pinky, just kidding, and of course the macro environment. I'm so sick of talking about the macro. But putting that aside for a moment what's really remarkable is that for a company of your size, you've had some success at the top line which I think surprised a lot of people. What are your reflections on the last 18 to 24 months? >> Well Dave, it's been an incredible, not only last 18 months, but the whole transformation journey if you think all the way back maybe to the LBO and forward from there. But stepping into the last 18 months, it's, I think I remember talking with you and saying, "Hey, the scenario planning we did at the beginning of this pandemic journey was 30 different scenarios roughly, and none of which sort of panned out the way it actually did," which was a pretty incredible growth story. As we think about how we helped customers, drive workforce productivity, enable their business model during the all remote work environment that was the pandemic created. And couple that with the rise then and the infrastructure spin as we got towards the tail end of the pandemic coupled with the spin out of VMware, which culminated last November as we completed that, which unlocked a pathway back to investment grade, which then unlocked, quite frankly shareholder value, capital allocation frameworks. It's really been a remarkable 18, 24 months. It's, it's never dull at Dell Technologies. Let me put it that way. >> Well, I was impressed with you Tom before the leverage buyout and then what I've seen you guys navigate through is truly amazing. Well, let's talk about the challenging macro. I mean, I've been through a lot of downturns but I've never seen anything quite like this with Fed tightening, and you're combating inflation, you got this recession looming. There's a bear market. You got, but you got zero unemployment, you're rising wages, strong dollar, and it's very confusing. But IT spending is, it's somewhat softer, but it's still not bad. How are you seeing customers behave? How is Dell responding? >> Yeah look, if you think about the markets we play in Dave, we should start there as a grounding. The total market, the core market that we think about is roughly $750 billion or so, if you think about our core IT services capability. If you couple that with some of the growth initiatives that we're driving and the adjacent markets that that that brings in, you're roughly talking a 1.4 to $1.5 trillion market opportunity total addressable market. And so from that perspective we're extraordinarily bullish on where are we in the journey as we continue to grow and expand. We have, we're number one share in just about every category that we plan, but yet when you look at that, number one share in some of these, our highest share position may be low 30s and maybe in the high end of storage or at the upper end of 30s or 40%. But the opportunity there to continue to expand the core and continue to take share and outperform the market is truly extraordinary. So if you step back and think about that, then you say, okay, what have we seen over the last number of months and quarters? It's been really great performance through the pandemic as you highlighted. We actually had a really strong first half of the year of our fiscal year '23 with revenue up 12% operating income, up 12% for the first half. What we talked about if you might recall in our second quarter earnings was the fact that we were starting to see softness. We had seen it in the consumer PC space, which is not a big area of focus for us in the sense of our total revenue stream. But we started to see commercial PC soften and we were starting to see server demand soften a bit and storage demand was holding quite frankly. And so we gave a framework around guidance for the rest of the year as a result of what we were seeing. The macro environment as you highlighted continues to be challenging. If you look at inflation rates and the efforts by central banks across the globe through interest rate rise to press down and constrain growth and push down inflation, you couple that with supply chain challenges that continue particularly in the ISG space. And then you couple that with the Ukraine war and the energy crisis that that's created. And particularly in Europe, it's a pretty dynamic environment. But I'm confident, I'm confident in the long term. But I do think that there is, there's navigation that we're going to have to do over the coming number of quarters. Who knows quite how long. To make sure the business is properly positioned and we've got a great portfolio and you're going to talk to some of the team later on as you think your way through some of the solution capabilities we're driving, what we're seeing around technology trends. So the opportunity is there. There's some short term navigation that we're going to need to do just to make sure that we address some of the environmental things that we're seeing right now. >> Yeah, and as a global company of course you're converting local currencies back to appreciated dollars. That's another headwind. But as you say, I mean, that's math and you're navigating it. And again, I've seen a lot of downturns, but the best companies not only weather their storm, but they invest in ways they that allow them to come out the other side stronger. So I want to talk about that longer term opportunity the relationship between the core, the the business growth. You mentioned the TAM. I mean, even as a lower margin business, if you can penetrate that big of a TAM, you could still throw off a lot of cash and you've got other levers to turn in potentially acquisitions and software. But so ultimately what gives you confidence in Dell's future? How should we think about Dell's future? >> Yeah look, I think it comes down to we are extraordinarily excited about the opportunity over the long term. Digital transformation continues. I am on numerous customer and CIO conference calls every week. Customers are continuing to invest in digital transformation, in infrastructure, to enable their business model. Yes, maybe it's going to slow or pause, or maybe they're not going to invest quite at the same rate over the next number of quarters but over the long term the needs are there. You look at what we're doing around the growth opportunities that we see, not only in our core space where we continue to invest, but also in the, what we call the strategic adjacencies. Things like 5G and modern telecom infrastructure as our, the telecom providers across the globe open up their what previous been closed ecosystems to open architecture. You think about, what we're doing around the EDGE and the distribution now that we're seeing of compute and storage back to the edge given data, gravity, and latency matters. And so we're pretty bullish on the opportunity in front of us. Yes, we will, and we're continuing to invest. And you hear Jeff Boudreau talk about that I think later on in the program. So I'm excited about the opportunities and you look at our cash flow generation capability, we are in in normal times a cash flow generation machine and we'll continue to do so. We've got a negative CCC in terms of how do we think about efficiency of working capital? And we look at our capital allocation strategy which has now returned somewhere in near 60% of our free cash flow back to shareholders. And so, there's lots to, lots of reasons to think about why this, we are a great sort of, I think value creation opportunity in a over the long term. That the long term trends are with us and I expect them to continue to be so. >> Yeah, and you guys, you do what you say you're going to do. I mean, I said in my other piece that I did recently, I think you guys put $46 billion on the balance sheet in terms of debt. That's down to I think 16 billion in the core which that's quite remarking. That gives you some other opportunities. Give us your closing thoughts. I mean, you kind of just addressed why Dell is a good long term play, but I'll give you an opportunity to bring us home. >> Hey Dave, yeah look, I just think if you look at the grid, the market opportunity, the size and scale of Dell and how we think about the competitive advantages that we have, we can, if you look at say we're a hundred billion dollar revenue company which we were last year as we reported. Roughly 60, 65 billion of that in the client in PC space, roughly 35 to 40 billion in the ISG or infrastructure space. Those markets are going to continue. The opportunity to grow share, grow at a premium to the market, drive cash flow, drive share gain is clearly there. And couple that with what we think the opportunity is in these adjacent markets, whether it's telecom, the EDGE, what we're thinking around data services, data management, we, and you put that together with the long term trends around data creation and digital transformation. We are extraordinarily well positioned. We have the largest direct selling organization in the technology space. We have the largest supply chain. Our services footprint. Well positioned in my mind to take advantage of the opportunities as we move forward. >> Well Tom I really appreciate you taking the time to speak with us. Good to see you again. >> Nice seeing you. Thanks Dave. >> All right, you're watching theCUBE's exclusive behind the scenes coverage of Dell Technology Summit 2022. In a moment, I'll be back with Jeff Boudreau. He's the president of Dell's ISG Infrastructure Solutions Group. He's responsible for all the important enterprise business at Dell, and we're excited to get his thoughts. Keep it right there. (upbeat music)
SUMMARY :
and opportunities and answer the question and good to be back with you, and of course the macro environment. and the infrastructure spin the challenging macro. and maybe in the high end of but the best companies not and the distribution now 16 billion in the core of the opportunities as we move forward. Good to see you again. He's the president
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Jeff Boudreau | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
Jen Saavedra | PERSON | 0.99+ |
Tom | PERSON | 0.99+ |
Sam Groccot | PERSON | 0.99+ |
Tom Sweet | PERSON | 0.99+ |
Sam | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
$46 billion | QUANTITY | 0.99+ |
1.4 | QUANTITY | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
16 billion | QUANTITY | 0.99+ |
ISG Infrastructure Solutions Group | ORGANIZATION | 0.99+ |
Europe | LOCATION | 0.99+ |
VMware | ORGANIZATION | 0.99+ |
last November | DATE | 0.99+ |
40% | QUANTITY | 0.99+ |
18 | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
Today | DATE | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
today | DATE | 0.99+ |
30 different scenarios | QUANTITY | 0.99+ |
Dell Tech Summit | EVENT | 0.98+ |
four | QUANTITY | 0.98+ |
fiscal year '23 | DATE | 0.98+ |
40 billion | QUANTITY | 0.97+ |
30s | QUANTITY | 0.97+ |
first half | QUANTITY | 0.96+ |
35 | QUANTITY | 0.96+ |
nearly 40 years old | QUANTITY | 0.96+ |
$1.5 trillion | QUANTITY | 0.96+ |
Dell Technology Summit 2022 | EVENT | 0.96+ |
lion | QUANTITY | 0.95+ |
EMC | ORGANIZATION | 0.95+ |
pandemic | EVENT | 0.95+ |
one | QUANTITY | 0.94+ |
Dell Technologies Summit | EVENT | 0.94+ |
first | QUANTITY | 0.94+ |
Dell Technologies Summit 2022 | EVENT | 0.93+ |
Dell EMC | ORGANIZATION | 0.93+ |
near 60% | QUANTITY | 0.91+ |
zero unemployment | QUANTITY | 0.91+ |
24 months | QUANTITY | 0.9+ |
60, 65 billion | QUANTITY | 0.9+ |
Apex | ORGANIZATION | 0.89+ |
Broadcom | ORGANIZATION | 0.89+ |
Ukraine war | EVENT | 0.87+ |
Cybersecurity Awareness Month | EVENT | 0.86+ |
12% | QUANTITY | 0.86+ |
ISG | ORGANIZATION | 0.84+ |
hundred billion dollar | QUANTITY | 0.83+ |
TAM | ORGANIZATION | 0.81+ |
last 18 months | DATE | 0.8+ |
$750 bil | QUANTITY | 0.79+ |
past 18 months | DATE | 0.78+ |
DTS Tom Sweet
(upbeat music) >> As we said in our analysis of Dell's future, the transformation of Dell into Dell EMC and now Dell Technologies has been one of the most remarkable stories in the history of the technology industry. After years of successfully integrated EMC and becoming VMware's number one distribution channel, the metamorphosis of Dell culminated in the spin out of VMware from Dell and a massive wealth creation milestone pending of course the Broadcom acquisition of VMware. So, where's that leave Dell and what does the future look like for this technology powerhouse? Hello and welcome to the Cube's exclusive coverage of Dell Technologies Summit 2022. My name is Dave Vellante, and I'll be hosting the program. Today in conjunction with the Dell Tech Summit. We'll hear from four of Dell senior executives. Tom Sweet is the CFO of Dell Technologies. He's going to share his views of the company's position and opportunities and answer the question, why is Dell a good long term investment? Then we'll hear from Jeff Boudreau, who's the president of Dell's ISG business unit, who's going to talk about the product angle and specifically how Dell is thinking about solving the multi-cloud challenge. And then Sam Grocott is the Senior Vice President of Marketing is going to come in the program and give us the update on APEX which is Dell's as-a-service offering and a new edge platform called Project Frontier. By the way, it's also Cybersecurity Awareness Month, and we're going to see if Sam has any stories there. And finally, for a company that's nearly 40 years old, Dell has some pretty forward thinking philosophies when it comes to its culture and workforce. And we're going to speak with Jen Saavedra, who's Dell's chief Human Resource officer about hybrid work and how Dell is thinking about the future of work. We're going to geek out all day and talk multi-cloud and edge and latency, but first, let's talk wallet. Tom Sweet CFO, and one of Dell's key business architects. Welcome back to The Cube. >> Dave, it's good to see you and good to be back with you. So, thanks for having me today. >> Yeah, you bet. Tom, it's been a pretty incredible past 18 months. Not only the pandemic and all that craziness but the VMware spin. You had to give up your gross margin binky just kidding, and of course the macro environment. I'm so sick of talking about the macro but putting that aside for a moment, what's really remarkable is that for a company at your size you've had some success at the top line which I think surprised a lot of people. What are your reflections on the last 18 to 24 months? >> Well, Dave, it's been an incredible, not only last 18 months but the whole transformation journey. If you think all the way back maybe to the LBO and forward from there, but, you know stepping into the last 18 months, it's, you know, I think I remember talking with you and saying, Hey you know, the scenario planning we did at the beginning of this pandemic journey was, you know 30 different scenarios roughly, and none of which sort of panned out the way it actually did which was a pretty incredible growth story as we think about how we helped customers, you know drive workforce productivity, enable their business model during the all remote work environment, that was the pandemic created. And couple that with the, you know, the rise then in the infrastructure spin as we got towards the tail end of the, of the pandemic coupled with, you know, the spin out of VMware, which culminated last November, as you know as we completed that, which unlocked a pathway back to investment grade, we still unlocked, quite frankly shareholder value, capital allocation frameworks. It's really been a remarkable, you know, 18, 24 months. It's never dull at Dell Technologies Let me put it that way. >> Well, well, I was impressed with you, Tom before the leverage buyout and then what I've seen you guys navigate through is truly amazing. Well, let's talk about the challenging macro. I mean, I've been through a lot of downturns, but I've never seen anything quite like this with fed tightening and you combating inflation, you got this recession looming, there's a bear market you got but you got zero unemployment you're rising wages, strong dollar, and it's very confusing. But IT spending is, you know, it's somewhat softer, but it's still not bad. How are you seeing customers behave? How is Dell responding? >> Yeah, look, if you think about the markets we play in Dave and we should start there as a grounding, you know, the total market, the core market that we think about is roughly 700 and, you know, $50 billion or so if you think about our core IT services capability. You couple that with some of the growth initiatives that we're driving and the adjacent markets that that brings in, you're roughly talking a 1.4 to $1.5 trillion market opportunity total addressable market. And so from, from that perspective we're extraordinarily bullish on where are we in the journey as we continue to grow and expand. You know, we have, we're number one share in just about every category that we plan but yet when you look at that, you know number one share in some of these, you know our highest share position may be, you know low 30s and maybe in the high end of storage you're at the upper end of 30 or 40%. But the opportunity there to continue to expand the core and continue to take share and outperform the market is truly extraordinary. So, if you step back and think about that, then you say, okay, what have we seen over the last number of months and quarters? It's been, you know, really great performance through the pandemic as, as you highlighted. We actually had a really strong first half of the year of our fiscal year 23 with revenue up 12% operating income up 12% for the first half. You know, what we talked about is you, if you might recall in our second quarter earnings was the fact that we were starting to see softness. We had seen it in the consumer PC space which is not a big area of focus for us in the sense of our, our total revenue stream. But we started to see commercial PC soften, and we were starting to see server demand soften a bit and storage demand was, was holding quite frankly. And so, we gave a a framework around guidance for the rest of the year as a result of what we were seeing. You know, the macro environment as you highlight it continues to be challenging. You know, if you look at inflation rates and the efforts by central banks across the globe to with through interest rate rise to press down and and constrain growth and push down inflation, you couple that with supply chain challenges that continue particularly in the ISG space. And then you couple that with the Ukraine war and the energy crisis that that's created. And particularly in Europe it's a pretty dynamic environment. And, but I'm confident, you know, I'm confident in the long term, but I do think that there is, you know that there's navigation that we're going to have to do over the coming number of quarters who knows quite how long, you know, to make sure the business is properly positioned then. You know we've got a great portfolio and you're going to talk to some of the team later on as you think your way through some of the solution capabilities we're driving what we're seeing around technology trends. So the opportunities there, there's some short term navigation that we're going to need to do just to make sure that we address some of the, you know, some of the environmental things that we're seeing right now. >> Yeah and as a global company, of course you're converting local currencies back to appreciated dollars. That's, that's, that's another headwind. But as you say, I mean that's math and you're navigating it. And again, I've seen a lot of downturns, but you know the best companies not only weather their storm, but they invest in ways they that allow them to cut out come out the other side stronger. So, I want to talk about that longer term opportunity, the relationship between the core, the business growth. You mentioned the TAM, I mean, even as a lower margin business, if you can penetrate that big of a TAM, you could still throw off a lot of cash and you've got other levers to turn in potentially acquisitions and software but so ultimately what gives you confidence in Dell's future? How should we think about Dell's future? >> Yeah, look, I think it comes down to, we are extraordinarily excited about the opportunity over the long term, digital transformation continues. I am on numerous customer and CIO conference calls every week. Customers are continuing to invest in digital transformation in infrastructure to enable their business model. Yes, maybe it's going to slow or, or pause or maybe they're not going to invest quite at the same rate over the next number of quarters but over the long term the needs are there. You look at what we're doing around the growth opportunities that we see, not only in our core space where we continue to invest but also in the, what we call the strategic adjacencies. Things like 5G and modern telecom infrastructure as our the telecom providers across the globe open up their what previous been closed ecosystems, you know to open architecture. You think about, you know, what we're doing around the edge and the distribution now that we're seeing of compute and storage back to the edge given data gravity and latency matters. And so we're pretty bullish on the opportunity in front of us. You know, yes, we will, we're continuing to invest. And you'll hear Jeff Boudreau talk about that I think later on in the program. So, I'm excited about the opportunities and you look at our cash flow generation capability, you know, we are in normal times a cash flow generation machine and we'll continue to do so. You know, we've got a negative, you know CCC in terms of, you know how do we think about efficiency of working capital? And we look at our, you know our capital allocation strategy which has now returned, you know, somewhere in near 60% of our free cash flow back to shareholders. And so, you know, there's lots to, lots of reasons to think about why this, you know, we are a great sort of, I think value creation opportunity in a over the long term that the long term trends are with us and I expect them to continue to be so. >> Yeah, and you guys, you do what you say you're going to do. I mean, I said in my, in my other piece that I did recently, I think you guys put 46 billion dollars on the balance sheet in terms of debt. That's down to I think 16 billion in the core which that's quite remarking. That gives you some other opportunities. Give us your, your closing thoughts. I mean, you kind of just addressed why Dell is a good long term play but I'll give you an opportunity to bring us home. >> Hey, Dave yeah look, I just think if you look at the grin, the market opportunity the size and scale of Dell and how we think about the competitive advantages that we have, we come you know, if you look at, say we're a hundred billion dollar revenue company which we were year, you know, last year that as we reported, roughly 60, 65 billion of that in the client in PC space, roughly, you know, 35 to 40 billion in the ISG or infrastructure space, those markets are going to continue. The opportunity to grow share, grow at a premium to the market, drive cash flow, drive share gain is clearly there. You couple that with, you know what we think the opportunity is in these adjacent markets, whether it's telecom, the edge, what we're thinking around data services, data management you know, we, and you've cut, you put that together with the long term trends around, you know data creation and digital transformation. We are extraordinarily well positioned. We have the largest direct selling organization in the technology space. We have the largest supply chain, our services footprint you know, well positioned in my mind to take advantage of the opportunities as we move forward. >> Well, Tom really appreciate you taking the time to speak with us. Good to see you again. >> Nice seeing you. Thanks Dave. >> All right. You're watching The Cube's exclusive behind the scenes coverage of Dell Technology Summit 2022. In a moment, I'll be back with Jeff Boudreau. He's the president of Dell's ISG Infrastructure Solutions Group. He's responsible for all the important enterprise business at Dell and we're excited to get his thoughts. Keep it right there. (upbeat jingle)
SUMMARY :
and opportunities and answer the question, Dave, it's good to see you and of course the macro environment. in the infrastructure spin as and then what I've seen you guys navigate But the opportunity there to continue of downturns, but you know that the long term trends are with us Yeah, and you guys, of that in the client in PC space, Good to see you again. Nice seeing you. He's the president of Dell's ISG
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Dave Vellante | PERSON | 0.99+ |
Jeff Boudreau | PERSON | 0.99+ |
Jen Saavedra | PERSON | 0.99+ |
Jeff Boudreau | PERSON | 0.99+ |
Tom | PERSON | 0.99+ |
Tom Sweet | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
Sam Grocott | PERSON | 0.99+ |
35 | QUANTITY | 0.99+ |
$50 billion | QUANTITY | 0.99+ |
Sam | PERSON | 0.99+ |
Europe | LOCATION | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
40% | QUANTITY | 0.99+ |
16 billion | QUANTITY | 0.99+ |
1.4 | QUANTITY | 0.99+ |
VMware | ORGANIZATION | 0.99+ |
30 | QUANTITY | 0.99+ |
18 | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
last November | DATE | 0.99+ |
today | DATE | 0.99+ |
ISG Infrastructure Solutions Group | ORGANIZATION | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
60, 65 billion | QUANTITY | 0.99+ |
40 billion | QUANTITY | 0.99+ |
Dell Tech Summit | EVENT | 0.98+ |
24 months | QUANTITY | 0.98+ |
four | QUANTITY | 0.98+ |
46 billion dollars | QUANTITY | 0.98+ |
Today | DATE | 0.98+ |
30 different scenarios | QUANTITY | 0.98+ |
fiscal year 23 | DATE | 0.97+ |
$1.5 trillion | QUANTITY | 0.97+ |
second quarter | DATE | 0.97+ |
first half | QUANTITY | 0.97+ |
nearly 40 years old | QUANTITY | 0.96+ |
Dell Technologies Summit 2022 | EVENT | 0.96+ |
first | QUANTITY | 0.95+ |
700 | QUANTITY | 0.95+ |
EMC | ORGANIZATION | 0.94+ |
Dell EMC | ORGANIZATION | 0.93+ |
pandemic | EVENT | 0.92+ |
one | QUANTITY | 0.92+ |
TAM | ORGANIZATION | 0.91+ |
CCC | ORGANIZATION | 0.9+ |
Broadcom | ORGANIZATION | 0.9+ |
Dell Technology Summit 2022 | EVENT | 0.9+ |
The Cube | TITLE | 0.89+ |
APEX | ORGANIZATION | 0.86+ |
Ukraine war | EVENT | 0.83+ |
12% | QUANTITY | 0.83+ |
last 18 months | DATE | 0.81+ |
past 18 months | DATE | 0.81+ |
30s | QUANTITY | 0.81+ |
hundred billion dollar | QUANTITY | 0.8+ |
LBO | ORGANIZATION | 0.78+ |
ISG | ORGANIZATION | 0.76+ |
Senior | PERSON | 0.76+ |
DV trusted Infrastructure part 2 Open
>>The cybersecurity landscape continues to be one characterized by a series of point tools designed to do a very specific job, often pretty well, but the mosaic of tooling is grown over the years causing complexity in driving up costs and increasing exposures. So the game of Whackamole continues. Moreover, the way organizations approach security is changing quite dramatically. The cloud, while offering so many advantages, has also created new complexities. The shared responsibility model redefines what the cloud provider secures, for example, the S three bucket and what the customer is responsible for, eg properly configuring the bucket. You know, this is all well and good, but because virtually no organization of any size can go all in on a single cloud, that shared responsibility model now spans multiple clouds and with different protocols. Now, that of course includes on-prem and edge deployments, making things even more complex. Moreover, the DevOps team is being asked to be the point of execution to implement many aspects of an organization's security strategy. >>This extends to securing the runtime, the platform, and even now containers, which can end up anywhere. There's a real need for consolidation in the security industry, and that's part of the answer. We've seen this both in terms of mergers and acquisitions as well as platform plays that cover more and more ground. But the diversity of alternatives and infrastructure implementations continues to boggle the mind with more and more entry points for the attackers. This includes sophisticated supply chain attacks that make it even more difficult to understand how to secure components of a system and how secure those components actually are. The number one challenge CISOs face in today's complex world is lack of talent to address these challenges, and I'm not saying that SecOps pros are now talented. They are. There just aren't enough of them to go around, and the adversary is also talented and very creative, and there are more and more of them every day. >>Now, one of the very important roles that a technology vendor can play is to take mundane infrastructure security tasks off the plates of SEC off teams. Specifically, we're talking about shifting much of the heavy lifting around securing servers, storage, networking, and other infrastructure and their components onto the technology vendor via r and d and other best practices like supply chain management. And that's what we're here to talk about. Welcome to the second part in our series, A Blueprint for Trusted Infrastructure Made Possible by Dell Technologies and produced by the Cube. My name is Dave Ante, and I'm your host now. Previously, we looked at what trusted infrastructure means >>And the role that storage and data protection play in the equation. In this part two of the series, we explore the changing nature of technology infrastructure, how the industry generally in Dell specifically, are adapting to these changes and what is being done to proactively address threats that are increasingly stressing security teams. Now today, we continue the discussion and look more deeply into servers networking and hyper-converged infrastructure to better understand the critical aspects of how one company Dell is securing these elements so that devs SEC op teams can focus on the myriad new attack vectors and challenges that they faced. First up is Deepak rang Garage Power Edge security product manager at Dell Technologies, and after that we're gonna bring on Mahesh Naar oim, who was a consultant in the networking product management area at Dell. And finally, we're closed with Jerome West, who is the product management security lead for HCI hyperconverged infrastructure and converged infrastructure at Dell. Thanks for joining us today. We're thrilled to have you here and hope you enjoy the program.
SUMMARY :
provider secures, for example, the S three bucket and what the customer is responsible But the diversity of alternatives and infrastructure implementations continues to Now, one of the very important roles that a technology vendor can play is to take how the industry generally in Dell specifically, are adapting to
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Jerome West | PERSON | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
First | QUANTITY | 0.99+ |
Dave Ante | PERSON | 0.99+ |
today | DATE | 0.99+ |
second part | QUANTITY | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
Mahesh Naar oim | PERSON | 0.99+ |
one | QUANTITY | 0.98+ |
Deepak | PERSON | 0.98+ |
both | QUANTITY | 0.98+ |
part 2 | OTHER | 0.97+ |
A Blueprint for Trusted Infrastructure Made Possible | TITLE | 0.95+ |
HCI | ORGANIZATION | 0.95+ |
single cloud | QUANTITY | 0.94+ |
Cube | ORGANIZATION | 0.9+ |
Whackamole | TITLE | 0.89+ |
one company | QUANTITY | 0.85+ |
Power Edge | ORGANIZATION | 0.7+ |
part two | QUANTITY | 0.65+ |
DevOps | ORGANIZATION | 0.6+ |
SecOps | TITLE | 0.6+ |
point | QUANTITY | 0.54+ |
Deepak Rangaraj, Dell technologies
>>The cybersecurity landscape continues to be one characterized by a series of point tools designed to do a very specific job, often pretty well, but the mosaic of tooling is grown over the years causing complexity in driving up costs and increasing exposures. So the game of Whackamole continues. Moreover, the way organizations approach security is changing quite dramatically. The cloud, while offering so many advantages, has also created new complexities. The shared responsibility model redefines what the cloud provider secures, for example, the S three bucket and what the customer is responsible for eg properly configuring the bucket. You know, this is all well and good, but because virtually no organization of any size can go all in on a single cloud, that shared responsibility model now spans multiple clouds and with different protocols. Now that of course includes on-prem and edge deployments, making things even more complex. Moreover, the DevOps team is being asked to be the point of execution to implement many aspects of an organization's security strategy. >>This extends to securing the runtime, the platform, and even now containers which can end up anywhere. There's a real need for consolidation in the security industry, and that's part of the answer. We've seen this both in terms of mergers and acquisitions as well as platform plays that cover more and more ground. But the diversity of alternatives and infrastructure implementations continues to boggle the mind with more and more entry points for the attackers. This includes sophisticated supply chain attacks that make it even more difficult to understand how to secure components of a system and how secure those components actually are. The number one challenge CISOs face in today's complex world is lack of talent to address these challenges. And I'm not saying that SecOps pros are not talented. They are. There just aren't enough of them to go around and the adversary is also talented and very creative and there are more and more of them every day. >>Now, one of the very important roles that a technology vendor can play is to take mundane infrastructure security tasks off the plates of SEC off teams. Specifically we're talking about shifting much of the heavy lifting around securing servers, storage, networking, and other infrastructure and their components onto the technology vendor via r and d and other best practices like supply chain management. And that's what we're here to talk about. Welcome to the second part in our series, A Blueprint for Trusted Infrastructure Made Possible by Dell Technologies and produced by the Cube. My name is Dave Ante and I'm your host now. Previously we looked at what trusted infrastructure means and the role that storage and data protection play in the equation. In this part two of the series, we explore the changing nature of technology infrastructure, how the industry generally in Dell specifically, are adapting to these changes and what is being done to proactively address threats that are increasingly stressing security teams. >>Now today, we continue the discussion and look more deeply into servers networking and hyper-converged infrastructure to better understand the critical aspects of how one company Dell is securing these elements so that dev sec op teams can focus on the myriad new attack vectors and challenges that they faced. First up is Deepak rang Garage Power Edge security product manager at Dell Technologies. And after that we're gonna bring on Mahesh Nagar oim, who was consultant in the networking product management area at Dell. And finally, we're close with Jerome West, who is the product management security lead for HCI hyperconverged infrastructure and converged infrastructure at Dell. Thanks for joining us today. We're thrilled to have you here and hope you enjoy the program. Deepak Arage shoes powered security product manager at Dell Technologies. Deepak, great to have you on the program. Thank you. >>Thank you for having me. >>So we're going through the infrastructure stack and in part one of this series we looked at the landscape overall and how cyber has changed and specifically how Dell thinks about data protection in, in security in a manner that both secures infrastructure and minimizes organizational friction. We also hit on the storage part of the portfolio. So now we want to dig into servers. So my first question is, what are the critical aspects of securing server infrastructure that our audience should be aware of? >>Sure. So if you look at compute in general, right, it has rapidly evolved over the past couple of years, especially with trends toward software defined data centers and with also organizations having to deal with hybrid environments where they have private clouds, public cloud locations, remote offices, and also remote workers. So on top of this, there's also an increase in the complexity of the supply chain itself, right? There are companies who are dealing with hundreds of suppliers as part of their supply chain. So all of this complexity provides a lot of opportunity for attackers because it's expanding the threat surface of what can be attacked, and attacks are becoming more frequent, more severe and more sophisticated. And this has also triggered around in the regulatory and mandates around the security needs. >>And these regulations are not just in the government sector, right? So it extends to critical infrastructure and eventually it also get into the private sector. In addition to this, organizations are also looking at their own internal compliance mandates. And this could be based on the industry in which they're operating in, or it could be their own security postures. And this is the landscape in which servers they're operating today. And given that servers are the foundational blocks of the data center, it becomes extremely important to protect them. And given how complex the modern server platforms are, it's also extremely difficult and it takes a lot of effort. And this means protecting everything from the supply chain to the manufacturing and then eventually the assuring the hardware and software integrity of the platforms and also the operations. And there are very few companies that go to the lens that Dell does in order to secure the server. We truly believe in the notion and the security mentality that, you know, security should enable our customers to go focus on their business and proactively innovate on their business and it should not be a burden to them. And we heavily invest to make that possible for our customers. >>So this is really important because the premise that I set up at the beginning of this was really that I, as of security pro, I'm not a security pro, but if I were, I wouldn't want to be doing all this infrastructure stuff because I now have all these new things I gotta deal with. I want a company like Dell who has the resources to build that security in to deal with the supply chain to ensure the providence, et cetera. So I'm glad you you, you hit on that, but so given what you just said, what does cybersecurity resilience mean from a server perspective? For example, are there specific principles that Dell adheres to that are non-negotiable? Let's say, how does Dell ensure that its customers can trust your server infrastructure? >>Yeah, like when, when it comes to security at Dell, right? It's ingrained in our product, so that's the best way to put it. And security is nonnegotiable, right? It's never an afterthought where we come up with a design and then later on figure out how to go make it secure, right? Our security development life cycle, the products are being designed to counter these threats right from the big. And in addition to that, we are also testing and evaluating these products continuously to identify vulnerabilities. We also have external third party audits which supplement this process. And in addition to this, Dell makes the commitment that we will rapidly respond to any mitigations and vulnerability, any vulnerabilities and exposures found out in the field and provide mitigations and patches for in attacking manner. So this security principle is also built into our server life cycle, right? Every phase of it. >>So we want our products to provide cutting edge capabilities when it comes to security. So as part of that, we are constantly evaluating what our security model is done. We are building on it and continuously improving it. So till a few years ago, our model was primarily based on the N framework of protect, detect and rigor. And it's still aligns really well to that framework, but over the past couple of years we have seen how computers evolved, how the threads have evolved, and we have also seen the regulatory trends and we recognize the fact that the best security strategy for the modern world is a zero trust approach. And so now when we are building our infrastructure and tools and offerings for customers, first and foremost, they're cyber resilient, right? What we mean by that is they're capable of anticipating threats, withstanding attacks and rapidly recurring from attacks and also adapting to the adverse conditions in which they're deployed. The process of designing these capabilities and identifying these capabilities however, is done through the zero press framework. And that's very important because now we are also anticipating how our customers will end up using these capabilities at there and to enable their own zero trust IT environments and IT zero trusts deployments. We have completely adapted our security approach to make it easier for customers to work with us no matter where they are in their journey towards zero trust option. >>So thank you for that. You mentioned the, this framework, you talked about zero trust. When I think about n I think as well about layered approaches. And when I think about zero trust, I think about if you, if you don't have access to it, you're not getting access, you've gotta earn that, that access and you've got layers and then you still assume that bad guys are gonna get in. So you've gotta detect that and you've gotta response. So server infrastructure security is so fundamental. So my question is, what is Dell providing specifically to, for example, detect anomalies and breaches from unauthorized activity? How do you enable fast and easy or facile recovery from malicious incidents? >>Right? What is that is exactly right, right? Breachers are bound to happen. And given how complex our current environment is, it's extremely distributed and extremely connected, right? Data and users are no longer contained with an offices where we can set up a perimeter firewall and say, Yeah, everything within that is good. We can trust everything within it. That's no longer true. The best approach to protect data and infrastructure in the current world is to use a zero trust approach, which uses the principles. Nothing is ever trusted, right? Nothing is trusted implicitly. You're constantly verifying every single user, every single device, and every single access in your system at every single level of your ID environment. And this is the principles that we use on power Edge, right? But with an increased focus on providing granular controls and checks based on the principles of these privileged access. >>So the idea is that service first and foremost need to make sure that the threats never enter and they're rejected at the point of entry. But we recognize breaches are going to occur and if they do, they need to be minimized such that the sphere of damage cost by attacker is minimized. So they're not able to move from one part of the network to something else laterally or escalate their privileges and cause more damage, right? So the impact radius for instance, has to be radius. And this is done through features like automated detection capabilities and automation, automated remediation capabilities. So some examples are as part of our end to end boot resilience process, we have what they call a system lockdown, right? We can lock down the configuration of the system and lock on the form versions and all changes to the system. And we have capabilities which automatically detect any drift from that lockdown configuration and we can figure out if the drift was caused to authorized changes or unauthorized changes. >>And if it is an unauthorize change can log it, generate security alerts, and we even have capabilities to automatically roll the firm where, and always versions back to a known good version and also the configurations, right? And this becomes extremely important because as part of zero trust, we need to respond to these things at machine speed and we cannot do it at a human speed. And having these automated capabilities is a big deal when achieving that zero trust strategy. And in addition to this, we also have chassis inclusion detection where if the chassis, the box, the several box is opened up, it logs alerts, and you can figure out even later if there's an AC power cycle, you can go look at the logs to see that the box is opened up and figure out if there was a, like a known authorized access or some malicious actor opening and chain something in your system. >>Great, thank you for that lot. Lot of detail and and appreciate that. I want to go somewhere else now cuz Dell has a renowned supply chain reputation. So what about securing the, the supply chain and the server bill of materials? What does Dell specifically do to track the providence of components it uses in its systems so that when the systems arrive, a customer can be a hundred percent certain that that system hasn't been compromised, >>Right? And we've talked about how complex the modern supply chain is, right? And that's no different for service. We have hundreds of confidence on the server and a lot of these form where in order to be configured and run and this former competence could be coming from third parties suppliers. So now the complexity that we are dealing with like was the end to end approach. And that's where Dell pays a lot of attention into assuring the security approach approaching. And it starts all the way from sourcing competence, right? And then through the design and then even the manufacturing process where we are wetting the personnel leather factories and wetting the factories itself. And the factories also have physical controls, physical security controls built into them and even shipping, right? We have GPS tagging of packages. So all of this is built to ensure supply chain security. >>But a critical aspect of this is also making sure that the systems which are built in the factories are delivered to the customers without any changes or any tapper. And we have a feature called the secure component verification, which is capable of doing this. What the feature does this, when the system gets built in a factory, it generates an inventory of all the competence in the system and it creates a cryptographic certificate based on the signatures presented to this by the competence. And this certificate is stored separately and sent to the customers separately from the system itself. So once the customers receive the system at their end, they can run out to, it generates an inventory of the competence on the system at their end and then compare it to the golden certificate to make sure nothing was changed. And if any changes are detected, we can figure out if there's an authorized change or unauthorize change. >>Again, authorized changes could be like, you know, upgrades to the drives or memory and ized changes could be any sort of temper. So that's the supply chain aspect of it. And bill of metal use is also an important aspect to galing security, right? And we provide a software bill of materials, which is basically a list of ingredients of all the software pieces in the platform. So what it allows our customers to do is quickly take a look at all the different pieces and compare it to the vulnerability database and see if any of the vulner, which have been discovered out in the wild affected platform. So that's a quick way of figuring out if the platform has any known vulnerabilities and it has not been patched. >>Excellent. That's really good. My last question is, I wonder if you, you know, give us the sort of summary from your perspective, what are the key strengths of Dell server portfolio from a security standpoint? I'm really interested in, you know, the uniqueness and the strong suit that Dell brings to the table, >>Right? Yeah. We have talked enough about the complexity of the environment and how zero risk is necessary for the modern ID environment, right? And this is integral to Dell powered service. And as part of that like you know, security starts with the supply chain. We already talked about the second component verification, which is a beneath feature that Dell platforms have. And on top of it we also have a silicon place platform mode of trust. So this is a key which is programmed into the silicon on the black service during manufacturing and can never be changed after. And this immutable key is what forms the anchor for creating the chain of trust that is used to verify everything in the platform from the hardware and software integrity to the boot, all pieces of it, right? In addition to that, we also have a host of data protection features. >>Whether it is protecting data at risk in news or inflight, we have self encrypting drives, which provides scalable and flexible encryption options. And this couple with external key management provides really good protection for your data address. External key management is important because you know, somebody could physically steam the server, walk away, but then the keys are not stored on the server, it stood separately. So that provides your action layer of security. And we also have dual layer encryption where you can compliment the hardware encryption on the secure encrypted drives with software level encryption. Inion to this we have identity and access management features like multifactor authentication, single sign on roles, scope and time based access controls, all of which are critical to enable that granular control and checks for zero trust approach. So I would say like, you know, if you look at the Dell feature set, it's pretty comprehensive and we also have the flexibility built in to meet the needs of all customers no matter where they fall in the spectrum of, you know, risk tolerance and security sensitivity. And we also have the capabilities to meet all the regulatory requirements and compliance requirements. So in a nutshell, I would say that, you know, Dell Power Service cyber resident infrastructure helps accelerate zero tested option for customers. >>Got it. So you've really thought this through all the various things that that you would do to sort of make sure that your server infrastructure is secure, not compromised, that your supply chain is secure so that your customers can focus on some of the other things that they have to worry about, which are numerous. Thanks Deepak, appreciate you coming on the cube and participating in the program. >>Thank you for having >>You're welcome. In a moment I'll be back to dig into the networking portion of the infrastructure. Stay with us for more coverage of a blueprint for trusted infrastructure and collaboration with Dell Technologies on the cube. Your leader in enterprise and emerging tech coverage.
SUMMARY :
So the game of Whackamole continues. But the diversity of alternatives and infrastructure implementations continues to how the industry generally in Dell specifically, are adapting to Deepak, great to have you on the program. We also hit on the storage part of the portfolio. So all of this complexity provides a lot of opportunity for attackers because it's expanding of the data center, it becomes extremely important to protect them. in to deal with the supply chain to ensure the providence, et cetera. And in addition to that, we are also testing and evaluating how the threads have evolved, and we have also seen the regulatory trends and And when I think about zero trust, I think about if And this is the principles that we use on power Edge, part of our end to end boot resilience process, we have what they call a system And in addition to this, we also have chassis inclusion detection where if What does Dell specifically do to track the So now the complexity that we are dealing with like was And this certificate is stored separately and sent to the customers So that's the supply chain aspect of it. the uniqueness and the strong suit that Dell brings to the table, from the hardware and software integrity to the boot, all pieces of it, And we also have dual layer encryption where you of the other things that they have to worry about, which are numerous. In a moment I'll be back to dig into the networking portion of the infrastructure.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Deepak | PERSON | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
Jerome West | PERSON | 0.99+ |
Deepak Rangaraj | PERSON | 0.99+ |
Dave Ante | PERSON | 0.99+ |
second part | QUANTITY | 0.99+ |
First | QUANTITY | 0.99+ |
first question | QUANTITY | 0.99+ |
Deepak Arage | PERSON | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
second component | QUANTITY | 0.99+ |
A Blueprint for Trusted Infrastructure Made Possible | TITLE | 0.99+ |
today | DATE | 0.99+ |
one | QUANTITY | 0.99+ |
Dell Technologies | ORGANIZATION | 0.98+ |
both | QUANTITY | 0.98+ |
hundreds | QUANTITY | 0.98+ |
hundred percent | QUANTITY | 0.98+ |
Mahesh Nagar | PERSON | 0.98+ |
zero trust | QUANTITY | 0.98+ |
single cloud | QUANTITY | 0.96+ |
every single device | QUANTITY | 0.94+ |
one part | QUANTITY | 0.94+ |
first | QUANTITY | 0.94+ |
every single access | QUANTITY | 0.92+ |
every single user | QUANTITY | 0.92+ |
Cube | ORGANIZATION | 0.92+ |
zero risk | QUANTITY | 0.9+ |
Whackamole | TITLE | 0.88+ |
zero | QUANTITY | 0.82+ |
past couple of years | DATE | 0.81+ |
a few years ago | DATE | 0.76+ |
every single level | QUANTITY | 0.74+ |
single | QUANTITY | 0.68+ |
Power | COMMERCIAL_ITEM | 0.66+ |
part one | OTHER | 0.65+ |
HCI | ORGANIZATION | 0.61+ |
SecOps | TITLE | 0.58+ |
confidence | QUANTITY | 0.57+ |
SEC | ORGANIZATION | 0.55+ |
part two | QUANTITY | 0.54+ |
suppliers | QUANTITY | 0.54+ |
point | QUANTITY | 0.53+ |
DevOps | ORGANIZATION | 0.52+ |
Blueprint for Trusted Insfrastructure Episode 2 Full Episode 10-4 V2
>>The cybersecurity landscape continues to be one characterized by a series of point tools designed to do a very specific job, often pretty well, but the mosaic of tooling is grown over the years causing complexity in driving up costs and increasing exposures. So the game of Whackamole continues. Moreover, the way organizations approach security is changing quite dramatically. The cloud, while offering so many advantages, has also created new complexities. The shared responsibility model redefines what the cloud provider secures, for example, the S three bucket and what the customer is responsible for eg properly configuring the bucket. You know, this is all well and good, but because virtually no organization of any size can go all in on a single cloud, that shared responsibility model now spans multiple clouds and with different protocols. Now that of course includes on-prem and edge deployments, making things even more complex. Moreover, the DevOps team is being asked to be the point of execution to implement many aspects of an organization's security strategy. >>This extends to securing the runtime, the platform, and even now containers which can end up anywhere. There's a real need for consolidation in the security industry, and that's part of the answer. We've seen this both in terms of mergers and acquisitions as well as platform plays that cover more and more ground. But the diversity of alternatives and infrastructure implementations continues to boggle the mind with more and more entry points for the attackers. This includes sophisticated supply chain attacks that make it even more difficult to understand how to secure components of a system and how secure those components actually are. The number one challenge CISOs face in today's complex world is lack of talent to address these challenges. And I'm not saying that SecOps pros are not talented, They are. There just aren't enough of them to go around and the adversary is also talented and very creative, and there are more and more of them every day. >>Now, one of the very important roles that a technology vendor can play is to take mundane infrastructure security tasks off the plates of SEC off teams. Specifically we're talking about shifting much of the heavy lifting around securing servers, storage, networking, and other infrastructure and their components onto the technology vendor via r and d and other best practices like supply chain management. And that's what we're here to talk about. Welcome to the second part in our series, A Blueprint for Trusted Infrastructure Made Possible by Dell Technologies and produced by the Cube. My name is Dave Ante and I'm your host now. Previously we looked at what trusted infrastructure means and the role that storage and data protection play in the equation. In this part two of the series, we explore the changing nature of technology infrastructure, how the industry generally in Dell specifically, are adapting to these changes and what is being done to proactively address threats that are increasingly stressing security teams. >>Now today, we continue the discussion and look more deeply into servers networking and hyper-converged infrastructure to better understand the critical aspects of how one company Dell is securing these elements so that dev sec op teams can focus on the myriad new attack vectors and challenges that they faced. First up is Deepak rang Garage Power Edge security product manager at Dell Technologies. And after that we're gonna bring on Mahesh Nagar oim, who was consultant in the networking product management area at Dell. And finally, we're close with Jerome West, who is the product management security lead for HCI hyperconverged infrastructure and converged infrastructure at Dell. Thanks for joining us today. We're thrilled to have you here and hope you enjoy the program. Deepak Arage shoes powered security product manager at Dell Technologies. Deepak, great to have you on the program. Thank you. >>Thank you for having me. >>So we're going through the infrastructure stack and in part one of this series we looked at the landscape overall and how cyber has changed and specifically how Dell thinks about data protection in, in security in a manner that both secures infrastructure and minimizes organizational friction. We also hit on the storage part of the portfolio. So now we want to dig into servers. So my first question is, what are the critical aspects of securing server infrastructure that our audience should be aware of? >>Sure. So if you look at compute in general, right, it has rapidly evolved over the past couple of years, especially with trends toward software defined data centers and with also organizations having to deal with hybrid environments where they have private clouds, public cloud locations, remote offices, and also remote workers. So on top of this, there's also an increase in the complexity of the supply chain itself, right? There are companies who are dealing with hundreds of suppliers as part of their supply chain. So all of this complexity provides a lot of opportunity for attackers because it's expanding the threat surface of what can be attacked, and attacks are becoming more frequent, more severe and more sophisticated. And this has also triggered around in the regulatory and mandates around the security needs. >>And these regulations are not just in the government sector, right? So it extends to critical infrastructure and eventually it also get into the private sector. In addition to this, organizations are also looking at their own internal compliance mandates. And this could be based on the industry in which they're operating in, or it could be their own security postures. And this is the landscape in which servers they're operating today. And given that servers are the foundational blocks of the data center, it becomes extremely important to protect them. And given how complex the modern server platforms are, it's also extremely difficult and it takes a lot of effort. And this means protecting everything from the supply chain to the manufacturing and then eventually the assuring the hardware and software integrity of the platforms and also the operations. And there are very few companies that go to the lens that Dell does in order to secure the server. We truly believe in the notion and the security mentality that, you know, security should enable our customers to go focus on their business and proactively innovate on their business and it should not be a burden to them. And we heavily invest to make that possible for our customers. >>So this is really important because the premise that I set up at the beginning of this was really that I, as of security pro, I'm not a security pro, but if I were, I wouldn't want to be doing all this infrastructure stuff because I now have all these new things I gotta deal with. I want a company like Dell who has the resources to build that security in to deal with the supply chain to ensure the providence, et cetera. So I'm glad you you, you hit on that, but so given what you just said, what does cybersecurity resilience mean from a server perspective? For example, are there specific principles that Dell adheres to that are non-negotiable? Let's say, how does Dell ensure that its customers can trust your server infrastructure? >>Yeah, like when, when it comes to security at Dell, right? It's ingrained in our product, so that's the best way to put it. And security is nonnegotiable, right? It's never an afterthought where we come up with a design and then later on figure out how to go make it secure, right? Our security development life cycle, the products are being designed to counter these threats right from the big. And in addition to that, we are also testing and evaluating these products continuously to identify vulnerabilities. We also have external third party audits which supplement this process. And in addition to this, Dell makes the commitment that we will rapidly respond to any mitigations and vulnerability, any vulnerabilities and exposures found out in the field and provide mitigations and patches for in attacking manner. So this security principle is also built into our server life cycle, right? Every phase of it. >>So we want our products to provide cutting edge capabilities when it comes to security. So as part of that, we are constantly evaluating what our security model is done. We are building on it and continuously improving it. So till a few years ago, our model was primarily based on the N framework of protect, detect and rigor. And it's still aligns really well to that framework, but over the past couple of years, we have seen how computers evolved, how the threads have evolved, and we have also seen the regulatory trends and we recognize the fact that the best security strategy for the modern world is a zero trust approach. And so now when we are building our infrastructure and tools and offerings for customers, first and foremost, they're cyber resilient, right? What we mean by that is they're capable of anticipating threats, withstanding attacks and rapidly recurring from attacks and also adapting to the adverse conditions in which they're deployed. The process of designing these capabilities and identifying these capabilities however, is done through the zero press framework. And that's very important because now we are also anticipating how our customers will end up using these capabilities at there and to enable their own zero trust IT environments and IT zero trusts deployments. We have completely adapted our security approach to make it easier for customers to work with us no matter where they are in their journey towards zero trust option. >>So thank you for that. You mentioned the, this framework, you talked about zero trust. When I think about n I think as well about layered approaches. And when I think about zero trust, I think about if you, if you don't have access to it, you're not getting access, you've gotta earn that, that access and you've got layers and then you still assume that bad guys are gonna get in. So you've gotta detect that and you've gotta response. So server infrastructure security is so fundamental. So my question is, what is Dell providing specifically to, for example, detect anomalies and breaches from unauthorized activity? How do you enable fast and easy or facile recovery from malicious incidents, >>Right? What is that is exactly right, right? Breachers are bound to happen and given how complex our current environment is, it's extremely distributed and extremely connected, right? Data and users are no longer contained with an offices where we can set up a perimeter firewall and say, Yeah, everything within that is good. We can trust everything within it. That's no longer true. The best approach to protect data and infrastructure in the current world is to use a zero trust approach, which uses the principles. Nothing is ever trusted, right? Nothing is trusted implicitly. You're constantly verifying every single user, every single device, and every single access in your system at every single level of your ID environment. And this is the principles that we use on power Edge, right? But with an increased focus on providing granular controls and checks based on the principles of these privileged access. >>So the idea is that service first and foremost need to make sure that the threats never enter and they're rejected at the point of entry, but we recognize breaches are going to occur and if they do, they need to be minimized such that the sphere of damage cost by attacker is minimized so they're not able to move from one part of the network to something else laterally or escalate their privileges and cause more damage, right? So the impact radius for instance, has to be radius. And this is done through features like automated detection capabilities and automation, automated remediation capabilities. So some examples are as part of our end to end boot resilience process, we have what they call a system lockdown, right? We can lock down the configuration of the system and lock on the form versions and all changes to the system. And we have capabilities which automatically detect any drift from that lockdown configuration and we can figure out if the drift was caused to authorized changes or unauthorized changes. >>And if it is an unauthorize change can log it, generate security alerts, and we even have capabilities to automatically roll the firm where, and always versions back to a known good version and also the configurations, right? And this becomes extremely important because as part of zero trust, we need to respond to these things at machine speed and we cannot do it at a human speed. And having these automated capabilities is a big deal when achieving that zero trust strategy. And in addition to this, we also have chassis inclusion detection where if the chassis, the box, the several box is opened up, it logs alerts, and you can figure out even later if there's an AC power cycle, you can go look at the logs to see that the box is opened up and figure out if there was a, like a known authorized access or some malicious actor opening and chain something in your system. >>Great, thank you for that lot. Lot of detail and and appreciate that. I want to go somewhere else now cuz Dell has a renowned supply chain reputation. So what about securing the, the supply chain and the server bill of materials? What does Dell specifically do to track the providence of components it uses in its systems so that when the systems arrive, a customer can be a hundred percent certain that that system hasn't been compromised, >>Right? And we've talked about how complex the modern supply chain is, right? And that's no different for service. We have hundreds of confidence on the server and a lot of these form where in order to be configured and run and this former competence could be coming from third parties suppliers. So now the complexity that we are dealing with like was the end to end approach and that's where Dell pays a lot of attention into assuring the security approach approaching and it starts all the way from sourcing competence, right? And then through the design and then even the manufacturing process where we are wetting the personnel leather factories and wetting the factories itself. And the factories also have physical controls, physical security controls built into them and even shipping, right? We have GPS tagging of packages. So all of this is built to ensure supply chain security. >>But a critical aspect of this is also making sure that the systems which are built in the factories are delivered to the customers without any changes or any tapper. And we have a feature called the secure component verification, which is capable of doing this. What the feature does this, when the system gets built in a factory, it generates an inventory of all the competence in the system and it creates a cryptographic certificate based on the signatures presented to this by the competence. And this certificate is stored separately and sent to the customers separately from the system itself. So once the customers receive the system at their end, they can run out to, it generates an inventory of the competence on the system at their end and then compare it to the golden certificate to make sure nothing was changed. And if any changes are detected, we can figure out if there's an authorized change or unauthorize change. >>Again, authorized changes could be like, you know, upgrades to the drives or memory and ized changes could be any sort of temper. So that's the supply chain aspect of it and bill of metal use is also an important aspect to galing security, right? And we provide a software bill of materials, which is basically a list of ingredients of all the software pieces in the platform. So what it allows our customers to do is quickly take a look at all the different pieces and compare it to the vulnerability database and see if any of the vulner which have been discovered out in the wild affected platform. So that's a quick way of figuring out if the platform has any known vulnerabilities and it has not been patched. >>Excellent. That's really good. My last question is, I wonder if you, you know, give us the sort of summary from your perspective, what are the key strengths of Dell server portfolio from a security standpoint? I'm really interested in, you know, the uniqueness and the strong suit that Dell brings to the table, >>Right? Yeah. We have talked enough about the complexity of the environment and how zero risk is necessary for the modern ID environment, right? And this is integral to Dell powered service. And as part of that like you know, security starts with the supply chain. We already talked about the second component verification, which is a beneath feature that Dell platforms have. And on top of it we also have a silicon place platform mode of trust. So this is a key which is programmed into the silicon on the black service during manufacturing and can never be changed after. And this immutable key is what forms the anchor for creating the chain of trust that is used to verify everything in the platform from the hardware and software integrity to the boot, all pieces of it, right? In addition to that, we also have a host of data protection features. >>Whether it is protecting data at risk in news or inflight, we have self encrypting drives which provides scalable and flexible encryption options. And this couple with external key management provides really good protection for your data address. External key management is important because you know, somebody could physically steam the server walk away, but then the keys are not stored on the server, it stood separately. So that provides your action layer of security. And we also have dual layer encryption where you can compliment the hardware encryption on the secure encrypted drives with software level encryption. Inion to this we have identity and access management features like multifactor authentication, single sign on roles, scope and time based access controls, all of which are critical to enable that granular control and checks for zero trust approach. So I would say like, you know, if you look at the Dell feature set, it's pretty comprehensive and we also have the flexibility built in to meet the needs of all customers no matter where they fall in the spectrum of, you know, risk tolerance and security sensitivity. And we also have the capabilities to meet all the regulatory requirements and compliance requirements. So in a nutshell, I would say that you know, Dell Power Service cyber resident infrastructure helps accelerate zero tested option for customers. >>Got it. So you've really thought this through all the various things that that you would do to sort of make sure that your server infrastructure is secure, not compromised, that your supply chain is secure so that your customers can focus on some of the other things that they have to worry about, which are numerous. Thanks Deepak, appreciate you coming on the cube and participating in the program. >>Thank you for having >>You're welcome. In a moment I'll be back to dig into the networking portion of the infrastructure. Stay with us for more coverage of a blueprint for trusted infrastructure and collaboration with Dell Technologies on the cube, your leader in enterprise and emerging tech coverage. We're back with a blueprint for trusted infrastructure and partnership with Dell Technologies in the cube. And we're here with Mahesh Nager, who is a consultant in the area of networking product management at Dell Technologies. Mahesh, welcome, good to see you. >>Hey, good morning Dell's, nice to meet, meet to you as well. >>Hey, so we've been digging into all the parts of the infrastructure stack and now we're gonna look at the all important networking components. Mahesh, when we think about networking in today's environment, we think about the core data center and we're connecting out to various locations including the cloud and both the near and the far edge. So the question is from Dell's perspective, what's unique and challenging about securing network infrastructure that we should know about? >>Yeah, so few years ago IT security and an enterprise was primarily putting a wrapper around data center out because it was constrained to an infrastructure owned and operated by the enterprise for the most part. So putting a rapid around it like a parameter or a firewall was a sufficient response because you could basically control the environment and data small enough control today with the distributed data, intelligent software, different systems, multi-cloud environment and asset service delivery, you know, the infrastructure for the modern era changes the way to secure the network infrastructure In today's, you know, data driven world, it operates everywhere and data has created and accessed everywhere so far from, you know, the centralized monolithic data centers of the past. The biggest challenge is how do we build the network infrastructure of the modern era that are intelligent with automation enabling maximum flexibility and business agility without any compromise on the security. We believe that in this data era, the security transformation must accompany digital transformation. >>Yeah, that's very good. You talked about a couple of things there. Data by its very nature is distributed. There is no perimeter anymore, so you can't just, as you say, put a rapper around it. I like the way you phrase that. So when you think about cyber security resilience from a networking perspective, how do you define that? In other words, what are the basic principles that you adhere to when thinking about securing network infrastructure for your customers? >>So our belief is that cybersecurity and cybersecurity resilience, they need to be holistic, they need to be integrated, scalable, one that span the entire enterprise and with a co and objective and policy implementation. So cybersecurity needs to span across all the devices and running across any application, whether the application resets on the cloud or anywhere else in the infrastructure. From a networking standpoint, what does it mean? It's again, the same principles, right? You know, in order to prevent the threat actors from accessing changing best destroy or stealing sensitive data, this definition holds good for networking as well. So if you look at it from a networking perspective, it's the ability to protect from and withstand attacks on the networking systems as we continue to evolve. This will also include the ability to adapt and recover from these attacks, which is what cyber resilience aspect is all about. So cybersecurity best practices, as you know, is continuously changing the landscape primarily because the cyber threats also continue to evolve. >>Yeah, got it. So I like that. So it's gotta be integrated, it's gotta be scalable, it's gotta be comprehensive, comprehensive and adaptable. You're saying it can't be static, >>Right? Right. So I think, you know, you had a second part of a question, you know, that says what do we, you know, what are the basic principles? You know, when you think about securing network infrastructure, when you're looking at securing the network infrastructure, it revolves around core security capability of the devices that form the network. And what are these security capabilities? These are access control, software integrity and vulnerability response. When you look at access control, it's to ensure that only the authenticated users are able to access the platform and they're able to access only the kind of the assets that they're authorized to based on their user level. Now accessing a network platform like a switch or a rotor for example, is typically used for say, configuration and management of the networking switch. So user access is based on say roles for that matter in a role based access control, whether you are a security admin or a network admin or a storage admin. >>And it's imperative that logging is enable because any of the change to the configuration is actually logged and monitored as that. Talking about software's integrity, it's the ability to ensure that the software that's running on the system has not been compromised. And, and you know, this is important because it could actually, you know, get hold of the system and you know, you could get UND desire results in terms of say validation of the images. It's, it needs to be done through say digital signature. So, so it's important that when you're talking about say, software integrity, a, you are ensuring that the platform is not compromised, you know, is not compromised and be that any upgrades, you know, that happens to the platform is happening through say validated signature. >>Okay. And now, now you've now, so there's access control, software integrity, and I think you, you've got a third element which is i I think response, but please continue. >>Yeah, so you know, the third one is about civil notability. So we follow the same process that's been followed by the rest of the products within the Dell product family. That's to report or identify, you know, any kind of a vulnerability that's being addressed by the Dell product security incident response team. So the networking portfolio is no different, you know, it follows the same process for identification for tri and for resolution of these vulnerabilities. And these are addressed either through patches or through new reasons via networking software. >>Yeah, got it. Okay. So I mean, you didn't say zero trust, but when you were talking about access control, you're really talking about access to only those assets that people are authorized to access. I know zero trust sometimes is a buzzword, but, but you I think gave it, you know, some clarity there. Software integrity, it's about assurance validation, your digital signature you mentioned and, and that there's been no compromise. And then how you respond to incidents in a standard way that can fit into a security framework. So outstanding description, thank you for that. But then the next question is, how does Dell networking fit into the construct of what we've been talking about Dell trusted infrastructure? >>Okay, so networking is the key element in the Dell trusted infrastructure. It provides the interconnect between the service and the storage world. And you know, it's part of any data center configuration for a trusted infrastructure. The network needs to have access control in place where only the authorized nels are able to make change to the network configuration and logging off any of those changes is also done through the logging capabilities. Additionally, we should also ensure that the configuration should provide network isolation between say the management network and the data traffic network because they need to be separate and distinct from each other. And furthermore, even if you look at the data traffic network and now you have things like segmentation isolated segments and via VRF or, or some micro segmentation via partners, this allows various level of security for each of those segments. So it's important you know, that, that the network infrastructure has the ability, you know, to provide all this, this services from a Dell networking security perspective, right? >>You know, there are multiple layer of defense, you know, both at the edge and in the network in this hardware and in the software and essentially, you know, a set of rules and a configuration that's designed to sort of protect the integrity, confidentiality, and accessibility of the network assets. So each network security layer, it implements policies and controls as I said, you know, including send network segmentation. We do have capabilities sources, centralized management automation and capability and scalability for that matter. Now you add all of these things, you know, with the open networking standards or software, different principles and you essentially, you know, reach to the point where you know, you're looking at zero trust network access, which is essentially sort of a building block for increased cloud adoption. If you look at say that you know the different pillars of a zero trust architecture, you know, if you look at the device aspect, you know, we do have support for security for example, we do have say trust platform in a trusted platform models tpms on certain offer products and you know, the physical security know plain, simple old one love port enable from a user trust perspective, we know it's all done via access control days via role based access control and say capability in order to provide say remote authentication or things like say sticky Mac or Mac learning limit and so on. >>If you look at say a transport and decision trust layer, these are essentially, you know, how do you access, you know, this switch, you know, is it by plain hotel net or is it like secure ssh, right? And you know, when a host communicates, you know, to the switch, we do have things like self-signed or is certificate authority based certification. And one of the important aspect is, you know, in terms of, you know, the routing protocol, the routing protocol, say for example BGP for example, we do have the capability to support MD five authentication between the b g peers so that there is no, you know, manages attack, you know, to the network where the routing table is compromised. And the other aspect is about second control plane is here, you know, you know, it's, it's typical that if you don't have a control plane here, you know, it could be flooded and you know, you know, the switch could be compromised by city denial service attacks. >>From an application test perspective, as I mentioned, you know, we do have, you know, the application specific security rules where you could actually define, you know, the specific security rules based on the specific applications, you know, that are running within the system. And I did talk about, say the digital signature and the cryptographic check that we do for authentication and for, I mean rather for the authenticity and the validation of, you know, of the image and the BS and so on and so forth. Finally, you know, the data trust, we are looking at, you know, the network separation, you know, the network separation could happen or VRF plain old wheel Ls, you know, which can bring about sales multi 10 aspects. We talk about some microsegmentation as it applies to nsx for example. The other aspect is, you know, we do have, with our own smart fabric services that's enabled in a fabric, we have a concept of c cluster security. So all of this, you know, the different pillars, they sort of make up for the zero trust infrastructure for the networking assets of an infrastructure. >>Yeah. So thank you for that. There's a, there's a lot to unpack there. You know, one of the premise, the premise really of this, this, this, this segment that we're setting up in this series is really that everything you just mentioned, or a lot of things you just mentioned used to be the responsibility of the security team. And, and the premise that we're putting forth is that because security teams are so stretched thin, you, you gotta shift the vendor community. Dell specifically is shifting a lot of those tasks to their own r and d and taking care of a lot of that. So, cuz scop teams got a lot of other stuff to, to worry about. So my question relates to things like automation, which can help and scalability, what about those topics as it relates to networking infrastructure? >>Okay, our >>Portfolio, it enables state of the automation software, you know, that enables simplifying of the design. So for example, we do have, you know, you know the fabric design center, you know, a tool that automates the design of the fabric and you know, from a deployment and you know, the management of the network infrastructure that are simplicities, you know, using like Ansible s for Sonic for example are, you know, for a better sit and tell story. You know, we do have smart fabric services that can automate the entire fabric, you know, for a storage solution or for, you know, for one of the workloads for example. Now we do help reduce the complexity by closely integrating the management of the physical and the virtual networking infrastructure. And again, you know, we have those capabilities using Sonic or Smart Traffic services. If you look at Sonic for example, right? >>It delivers automated intent based secure containerized network and it has the ability to provide some network visibility and Avan has and, and all of these things are actually valid, you know, for a modern networking infrastructure. So now if you look at Sonic, you know, it's, you know, the usage of those tools, you know, that are available, you know, within the Sonic no is not restricted, you know, just to the data center infrastructure is, it's a unified no, you know, that's well applicable beyond the data center, you know, right up to the edge. Now if you look at our north from a smart traffic OS 10 perspective, you know, as I mentioned, we do have smart traffic services which essentially, you know, simplifies the deployment day zero, I mean rather day one, day two deployment expansion plans and the lifecycle management of our conversion infrastructure and hyper and hyper conversion infrastructure solutions. And finally, in order to enable say, zero touch deployment, we do have, you know, a VP solution with our SD van capability. So these are, you know, ways by which we bring down the complexity by, you know, enhancing the automation capability using, you know, a singular loss that can expand from a data center now right to the edge. >>Great, thank you for that. Last question real quick, just pitch me, what can you summarize from your point of view, what's the strength of the Dell networking portfolio? >>Okay, so from a Dell networking portfolio, we support capabilities at multiple layers. As I mentioned, we're talking about the physical security for examples, say disabling of the unused interface. Sticky Mac and trusted platform modules are the things that to go after. And when you're talking about say secure boot for example, it delivers the authenticity and the integrity of the OS 10 images at the startup. And Secure Boot also protects the startup configuration so that, you know, the startup configuration file is not compromised. And Secure port also enables the workload of prediction, for example, that is at another aspect of software image integrity validation, you know, wherein the image is data for the digital signature, you know, prior to any upgrade process. And if you are looking at secure access control, we do have things like role based access control, SSH to the switches, control plane access control that pre do tags and say access control from multifactor authentication. >>We do have various tech ads for entry control to the network and things like CSE and PRV support, you know, from a federal perspective we do have say logging wherein, you know, any event, any auditing capabilities can be possible by say looking at the clog service, you know, which are pretty much in our transmitter from the devices overts for example, and last we talked about say network segment, you know, say network separation and you know, these, you know, separation, you know, ensures that are, that is, you know, a contained say segment, you know, for a specific purpose or for the specific zone and, you know, just can be implemented by a, a micro segmentation, you know, just a plain old wheel or using virtual route of framework VR for example. >>A lot there. I mean I think frankly, you know, my takeaway is you guys do the heavy lifting in a very complicated topic. So thank you so much for, for coming on the cube and explaining that in in quite some depth. Really appreciate it. >>Thank you indeed. >>Oh, you're very welcome. Okay, in a moment I'll be back to dig into the hyper-converged infrastructure part of the portfolio and look at how when you enter the world of software defined where you're controlling servers and storage and networks via software led system, you could be sure that your infrastructure is trusted and secure. You're watching a blueprint for trusted infrastructure made possible by Dell Technologies and collaboration with the cube, your leader in enterprise and emerging tech coverage, your own west product management security lead at for HCI at Dell Technologies hyper-converged infrastructure. Jerome, welcome. >>Thank you Dave. >>Hey Jerome, in this series of blueprint for trusted infrastructure, we've been digging into the different parts of the infrastructure stack, including storage servers and networking, and now we want to cover hyperconverged infrastructure. So my first question is, what's unique about HCI that presents specific security challenges? What do we need to know? >>So what's unique about hyper-converge infrastructure is the breadth of the security challenge. We can't simply focus on a single type of IT system. So like a server or storage system or a virtualization piece of software, software. I mean HCI is all of those things. So luckily we have excellent partners like VMware, Microsoft, and internal partners like the Dell Power Edge team, the Dell storage team, the Dell networking team, and on and on. These partnerships in these collaborations are what make us successful from a security standpoint. So let me give you an example to illustrate. In the recent past we're seeing growing scope and sophistication in supply chain attacks. This mean an attacker is going to attack your software supply chain upstream so that hopefully a piece of code, malicious code that wasn't identified early in the software supply chain is distributed like a large player, like a VMware or Microsoft or a Dell. So to confront this kind of sophisticated hard to defeat problem, we need short term solutions and we need long term solutions as well. >>So for the short term solution, the obvious thing to do is to patch the vulnerability. The complexity is for our HCI portfolio. We build our software on VMware, so we would have to consume a patch that VMware would produce and provide it to our customers in a timely manner. Luckily VX rail's engineering team has co engineered a release process with VMware that significantly shortens our development life cycle so that VMware would produce a patch and within 14 days we will integrate our own code with the VMware release we will have tested and validated the update and we will give an update to our customers within 14 days of that VMware release. That as a result of this kind of rapid development process, VHA had over 40 releases of software updates last year for a longer term solution. We're partnering with VMware and others to develop a software bill of materials. We work with VMware to consume their software manifest, including their upstream vendors and their open source providers to have a comprehensive list of software components. Then we aren't caught off guard by an unforeseen vulnerability and we're more able to easily detect where the software problem lies so that we can quickly address it. So these are the kind of relationships and solutions that we can co engineer with effective collaborations with our, with our partners. >>Great, thank you for that. That description. So if I had to define what cybersecurity resilience means to HCI or converged infrastructure, and to me my takeaway was you gotta have a short term instant patch solution and then you gotta do an integration in a very short time, you know, two weeks to then have that integration done. And then longer term you have to have a software bill of materials so that you can ensure the providence of all the components help us. Is that a right way to think about cybersecurity resilience? Do you have, you know, a additives to that definition? >>I do. I really think that's site cybersecurity and resilience for hci because like I said, it has sort of unprecedented breadth across our portfolio. It's not a single thing, it's a bit of everything. So really the strength or the secret sauce is to combine all the solutions that our partner develops while integrating them with our own layer. So let me, let me give you an example. So hci, it's a, basically taking a software abstraction of hardware functionality and implementing it into something called the virtualized layer. It's basically the virtual virtualizing hardware functionality, like say a storage controller, you could implement it in hardware, but for hci, for example, in our VX rail portfolio, we, our Vxl product, we integrated it into a product called vsan, which is provided by our partner VMware. So that portfolio of strength is still, you know, through our, through our partnerships. >>So what we do, we integrate these, these security functionality and features in into our product. So our partnership grows to our ecosystem through products like VMware, products like nsx, Horizon, Carbon Black and vSphere. All of them integrate seamlessly with VMware and we also leverage VMware's software, part software partnerships on top of that. So for example, VX supports multifactor authentication through vSphere integration with something called Active Directory Federation services for adfs. So there's a lot of providers that support adfs including Microsoft Azure. So now we can support a wide array of identity providers such as Off Zero or I mentioned Azure or Active Directory through that partnership. So we can leverage all of our partners partnerships as well. So there's sort of a second layer. So being able to secure all of that, that provides a lot of options and flexibility for our customers. So basically to summarize my my answer, we consume all of the security advantages of our partners, but we also expand on them to make a product that is comprehensively secured at multiple layers from the hardware layer that's provided by Dell through Power Edge to the hyper-converged software that we build ourselves to the virtualization layer that we get through our partnerships with Microsoft and VMware. >>Great, I mean that's super helpful. You've mentioned nsx, Horizon, Carbon Black, all the, you know, the VMware component OTH zero, which the developers are gonna love. You got Azure identity, so it's really an ecosystem. So you may have actually answered my next question, but I'm gonna ask it anyway cuz you've got this software defined environment and you're managing servers and networking and storage with this software led approach, how do you ensure that the entire system is secure end to end? >>That's a really great question. So the, the answer is we do testing and validation as part of the engineering process. It's not just bolted on at the end. So when we do, for example, VxRail is the market's only co engineered solution with VMware, other vendors sell VMware as a hyper converged solution, but we actually include security as part of the co-engineering process with VMware. So it's considered when VMware builds their code and their process dovetails with ours because we have a secure development life cycle, which other products might talk about in their discussions with you that we integrate into our engineering life cycle. So because we follow the same framework, all of the, all of the codes should interoperate from a security standpoint. And so when we do our final validation testing when we do a software release, we're already halfway there in ensuring that all these features will give the customers what we promised. >>That's great. All right, let's, let's close pitch me, what would you say is the strong suit summarize the, the strengths of the Dell hyper-converged infrastructure and converged infrastructure portfolio specifically from a security perspective? Jerome? >>So I talked about how hyper hyper-converged infrastructure simplifies security management because basically you're gonna take all of these features that are abstracted in in hardware, they're now abstracted in the virtualization layer. Now you can manage them from a single point of view, whether it would be, say, you know, in for VX rail would be b be center, for example. So by abstracting all this, you make it very easy to manage security and highly flexible because now you don't have limitations around a single vendor. You have a multiple array of choices and partnerships to select. So I would say that is the, the key to making it to hci. Now, what makes Dell the market leader in HCI is not only do we have that functionality, but we also make it exceptionally useful to you because it's co engineered, it's not bolted on. So I gave the example of spo, I gave the example of how we, we modify our software release process with VMware to make it very responsive. >>A couple of other features that we have specific just to HCI are digitally signed LCM updates. This is an example of a feature that we have that's only exclusive to Dell that's not done through a partnership. So we digitally signed our software updates so the user can be sure that the, the update that they're installing into their system is an authentic and unmodified product. So we give it a Dell signature that's invalidated prior to installation. So not only do we consume the features that others develop in a seamless and fully validated way, but we also bolt on our own a specific HCI security features that work with all the other partnerships and give the user an exceptional security experience. So for, for example, the benefit to the customer is you don't have to create a complicated security framework that's hard for your users to use and it's hard for your system administrators to manage it all comes in a package. So it, it can be all managed through vCenter, for example, or, and then the specific hyper, hyper-converged functions can be managed through VxRail manager or through STDC manager. So there's very few pains of glass that the, the administrator or user ever has to worry about. It's all self contained and manageable. >>That makes a lot of sense. So you've got your own infrastructure, you're applying your best practices to that, like the digital signatures, you've got your ecosystem, you're doing co-engineering with the ecosystems, delivering security in a package, minimizing the complexity at the infrastructure level. The reason Jerome, this is so important is because SecOps teams, you know, they gotta deal with cloud security, they gotta deal with multiple clouds. Now they have their shared responsibility model going across multiple cl. They got all this other stuff that they have to worry, they gotta secure the containers and the run time and and, and, and, and the platform and so forth. So they're being asked to do other things. If they have to worry about all the things that you just mentioned, they'll never get, you know, the, the securities is gonna get worse. So what my takeaway is, you're removing that infrastructure piece and saying, Okay guys, you now can focus on those other things that is not necessarily Dell's, you know, domain, but you, you know, you can work with other partners to and your own teams to really nail that. Is that a fair summary? >>I think that is a fair summary because absolutely the worst thing you can do from a security perspective is provide a feature that's so unusable that the administrator disables it or other key security features. So when I work with my partners to define, to define and develop a new security feature, the thing I keep foremost in mind is, will this be something our users want to use and our administrators want to administer? Because if it's not, if it's something that's too difficult or onerous or complex, then I try to find ways to make it more user friendly and practical. And this is a challenge sometimes because we are, our products operate in highly regulated environments and sometimes they have to have certain rules and certain configurations that aren't the most user friendly or management friendly. So I, I put a lot of effort into thinking about how can we make this feature useful while still complying with all the regulations that we have to comply with. And by the way, we're very successful in a highly regulated space. We sell a lot of VxRail, for example, into the Department of Defense and banks and, and other highly regulated environments and we're very successful there. >>Excellent. Okay, Jerome, thanks. We're gonna leave it there for now. I'd love to have you back to talk about the progress that you're making down the road. Things always, you know, advance in the tech industry and so would appreciate that. >>I would look forward to it. Thank you very much, Dave. >>You're really welcome. In a moment I'll be back to summarize the program and offer some resources that can help you on your journey to secure your enterprise infrastructure. I wanna thank our guests for their contributions in helping us understand how investments by a company like Dell can both reduce the need for dev sec up teams to worry about some of the more fundamental security issues around infrastructure and have greater confidence in the quality providence and data protection designed in to core infrastructure like servers, storage, networking, and hyper-converged systems. You know, at the end of the day, whether your workloads are in the cloud, on prem or at the edge, you are responsible for your own security. But vendor r and d and vendor process must play an important role in easing the burden faced by security devs and operation teams. And on behalf of the cube production content and social teams as well as Dell Technologies, we want to thank you for watching a blueprint for trusted infrastructure. Remember part one of this series as well as all the videos associated with this program and of course today's program are available on demand@thecube.net with additional coverage@siliconangle.com. And you can go to dell.com/security solutions dell.com/security solutions to learn more about Dell's approach to securing infrastructure. And there's tons of additional resources that can help you on your journey. This is Dave Valante for the Cube, your leader in enterprise and emerging tech coverage. We'll see you next time.
SUMMARY :
So the game of Whackamole continues. But the diversity of alternatives and infrastructure implementations continues to how the industry generally in Dell specifically, are adapting to We're thrilled to have you here and hope you enjoy the program. We also hit on the storage part of the portfolio. So all of this complexity provides a lot of opportunity for attackers because it's expanding and the security mentality that, you know, security should enable our customers to go focus So I'm glad you you, you hit on that, but so given what you just said, what And in addition to this, Dell makes the commitment that we will rapidly how the threads have evolved, and we have also seen the regulatory trends and So thank you for that. And this is the principles that we use on power Edge, So the idea is that service first and foremost the chassis, the box, the several box is opened up, it logs alerts, and you can figure Great, thank you for that lot. So now the complexity that we are dealing with like was So once the customers receive the system at their end, do is quickly take a look at all the different pieces and compare it to the vulnerability you know, give us the sort of summary from your perspective, what are the key strengths of And as part of that like you know, security starts with the supply chain. And we also have dual layer encryption where you of the other things that they have to worry about, which are numerous. Technologies on the cube, your leader in enterprise and emerging tech coverage. So the question is from Dell's perspective, what's unique and to secure the network infrastructure In today's, you know, data driven world, it operates I like the way you phrase that. So if you look at it from a networking perspective, it's the ability to protect So I like that. kind of the assets that they're authorized to based on their user level. And it's imperative that logging is enable because any of the change to and I think you, you've got a third element which is i I think response, So the networking portfolio is no different, you know, it follows the same process for identification for tri and And then how you respond to incidents in a standard way has the ability, you know, to provide all this, this services from a Dell networking security You know, there are multiple layer of defense, you know, both at the edge and in the network in And one of the important aspect is, you know, in terms of, you know, the routing protocol, the specific security rules based on the specific applications, you know, that are running within the system. really that everything you just mentioned, or a lot of things you just mentioned used to be the responsibility design of the fabric and you know, from a deployment and you know, the management of the network and all of these things are actually valid, you know, for a modern networking infrastructure. just pitch me, what can you summarize from your point of view, is data for the digital signature, you know, prior to any upgrade process. can be possible by say looking at the clog service, you know, I mean I think frankly, you know, my takeaway is you of the portfolio and look at how when you enter the world of software defined where you're controlling different parts of the infrastructure stack, including storage servers this kind of sophisticated hard to defeat problem, we need short term So for the short term solution, the obvious thing to do is to patch bill of materials so that you can ensure the providence of all the components help So really the strength or the secret sauce is to combine all the So our partnership grows to our ecosystem through products like VMware, you know, the VMware component OTH zero, which the developers are gonna love. life cycle, which other products might talk about in their discussions with you that we integrate into All right, let's, let's close pitch me, what would you say is the strong suit summarize So I gave the example of spo, I gave the example of how So for, for example, the benefit to the customer is you The reason Jerome, this is so important is because SecOps teams, you know, they gotta deal with cloud security, And by the way, we're very successful in a highly regulated space. I'd love to have you back to talk about the progress that you're making down the Thank you very much, Dave. in the quality providence and data protection designed in to core infrastructure like
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Jerome | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
Dave Valante | PERSON | 0.99+ |
Deepak | PERSON | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
Mahesh Nager | PERSON | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
Jerome West | PERSON | 0.99+ |
Mahesh | PERSON | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
demand@thecube.net | OTHER | 0.99+ |
Department of Defense | ORGANIZATION | 0.99+ |
Dave Ante | PERSON | 0.99+ |
second part | QUANTITY | 0.99+ |
first question | QUANTITY | 0.99+ |
VX rail | ORGANIZATION | 0.99+ |
First | QUANTITY | 0.99+ |
two weeks | QUANTITY | 0.99+ |
last year | DATE | 0.99+ |
Deepak Arage | PERSON | 0.99+ |
14 days | QUANTITY | 0.99+ |
second component | QUANTITY | 0.99+ |
second layer | QUANTITY | 0.99+ |
one | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
A Blueprint for Trusted Infrastructure Made Possible | TITLE | 0.99+ |
hundreds | QUANTITY | 0.99+ |
one part | QUANTITY | 0.99+ |
both | QUANTITY | 0.98+ |
VMware | ORGANIZATION | 0.98+ |
VHA | ORGANIZATION | 0.98+ |
coverage@siliconangle.com | OTHER | 0.98+ |
hundred percent | QUANTITY | 0.98+ |
each | QUANTITY | 0.98+ |
vSphere | TITLE | 0.98+ |
dell.com/security | OTHER | 0.98+ |
DV trusted Infrastructure part 2 close
>> Whenever you're ready. >> Okay, I'm Dave, in five, four, three. I want to thank our guests for their contributions in helping us understand how investments by a company like Dell can both reduce the need for DevSecOp teams to worry about some of the more fundamental security issues around infrastructure, and have greater confidence in the quality, provenance and data protection designed in to core infrastructure like servers, storage, networking, and hyperconverged systems. At the end of the day, whether your workloads are in the cloud, on prem or at the edge, you are responsible for your own security but vendor R&D and vendor process must play an important role in easing the burden faced by security, devs and operation teams. And on behalf of theCUBE production, content and social teams, as well as Dell Technologies, we want to thank you for watching A Blueprint for Trusted Infrastructure. Remember, part one of this series, as well as all the videos associated with this program and of course, today's program are available on demand at thecube.net with additional coverage at siliconangle.com. And you can go to dell.com/securitysolutions, dell.com/dell.com/securitysolutions to learn more about Dell's approach to securing infrastructure and there's tons of additional resources that can help you on your journey. This is Dave Vellante for theCUBE, your leader in enterprise and emerging tech coverage. We'll see you next time.
SUMMARY :
in the quality, provenance
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Dave Vellante | PERSON | 0.99+ |
five | QUANTITY | 0.99+ |
Dave | PERSON | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
three | QUANTITY | 0.99+ |
four | QUANTITY | 0.99+ |
siliconangle.com | OTHER | 0.99+ |
thecube.net | OTHER | 0.99+ |
both | QUANTITY | 0.99+ |
Dell Technologies | ORGANIZATION | 0.98+ |
dell.com/dell.com/securitysolutions | OTHER | 0.97+ |
A Blueprint for Trusted Infrastructure | TITLE | 0.95+ |
theCUBE | ORGANIZATION | 0.94+ |
today | DATE | 0.93+ |
tons | QUANTITY | 0.83+ |
part 2 | OTHER | 0.82+ |
dell.com/securitysolutions | OTHER | 0.77+ |
part | QUANTITY | 0.57+ |
one | OTHER | 0.49+ |
AMD & Oracle Partner to Power Exadata X9M
(upbeat jingle) >> The history of Exadata in the platform is really unique. And from my vantage point, it started earlier this century as a skunkworks inside of Oracle called Project Sage back when grid computing was the next big thing. Oracle saw that betting on standard hardware would put it on an industry curve that would rapidly evolve. Last April, for example, Oracle announced the availability of Exadata X9M in OCI, Oracle Cloud Infrastructure. One thing that hasn't been as well publicized is that Exadata on OCI is using AMD's EPYC processors in the database service. EPYC is not Eastern Pacific Yacht Club for all you sailing buffs, rather it stands for Extreme Performance Yield Computing, the enterprise grade version of AMD's Zen architecture which has been a linchpin of AMD's success in terms of penetrating enterprise markets. And to focus on the innovations that AMD and Oracle are bringing to market, we have with us today, Juan Loaiza, who's executive vice president of mission critical technologies at Oracle, and Mark Papermaster, who's the CTO and EVP of technology and engineering at AMD. Juan, welcome back to the show. Mark, great to have you on The Cube in your first appearance, thanks for coming on. Juan, let's start with you. You've been on The Cube a number of times, as I said, and you've talked about how Exadata is a top platform for Oracle database. We've covered that extensively. What's different and unique from your point of view about Exadata Cloud Infrastructure X9M on OCI? >> So as you know, Exadata, it's designed top down to be the best possible platform for database. It has a lot of unique capabilities, like we make extensive use of RDMA, smart storage. We take advantage of everything we can in the leading hardware platforms. X9M is our next generation platform and it does exactly that. We're always wanting to be, to get all the best that we can from the available hardware that our partners like AMD produce. And so that's what X9M in it is, it's faster, more capacity, lower latency, more iOS, pushing the limits of the hardware technology. So we don't want to be the limit, the software database software should not be the limit, it should be the actual physical limits of the hardware. That that's what X9M's all about. >> Why, Juan, AMD chips in X9M? >> We're introducing AMD chips. We think they provide outstanding performance, both for OTP and for analytic workloads. And it's really that simple, we just think the performance is outstanding in the product. >> Mark, your career is quite amazing. I could riff on history for hours but let's focus on the Oracle relationship. Mark, what are the relevant capabilities and key specs of the AMD chips that are used in Exadata X9M on Oracle's cloud? >> Well, thanks. It's really the basis of the great partnership that we have with Oracle on Exadata X9M and that is that the AMD technology uses our third generation of Zen processors. Zen was architected to really bring high performance back to X86, a very strong roadmap that we've executed on schedule to our commitments. And this third generation does all of that, it uses a seven nanometer CPU that is a core that was designed to really bring throughput, bring really high efficiency to computing and just deliver raw capabilities. And so for Exadata X9M, it's really leveraging all of that. It's really a balanced processor and it's implemented in a way to really optimize high performance. That is our whole focus of AMD. It's where we've reset the company focus on years ago. And again, great to see the super smart database team at Oracle really partner with us, understand those capabilities and it's been just great to partner with them to enable Oracle to really leverage the capabilities of the Zen processor. >> Yeah. It's been a pretty amazing 10 or 11 years for both companies. But Mark, how specifically are you working with Oracle at the engineering and product level and what does that mean for your joint customers in terms of what they can expect from the collaboration? >> Well, here's where the collaboration really comes to play. You think about a processor and I'll say, when Juan's team first looked at it, there's general benchmarks and the benchmarks are impressive but they're general benchmarks. And they showed the base processing capability but the partnership comes to bear when it means optimizing for the workloads that Exadata X9M is really delivering to the end customers. And that's where we dive down and as we learn from the Oracle team, we learn to understand where bottlenecks could be, where is there tuning that we could in fact really boost the performance above that baseline that you get in the generic benchmarks. And that's what the teams have done, so for instance, you look at optimizing latency to our DMA, you look at optimizing throughput on oil TP and database processing. When you go through the workloads and you take the traces and you break it down and you find the areas that are bottlenecking and then you can adjust, we have thousands of parameters that can be adjusted for a given workload. And that's the beauty of the partnership. So we have the expertise on the CPU engineering, Oracle Exadata team knows innately what the customers need to get the most out of their platform. And when the teams came together, we actually achieved anywhere from 20% to 50% gains on specific workloads, it is really exciting to see. >> Mark, last question for you is how do you see this relationship evolving in the future? Can you share a little roadmap for the audience? >> You bet. First off, given the deep partnership that we've had on Exadata X9M, it's really allowed us to inform our future design. So in our current third generation, EPYC is that is really what we call our epic server offerings. And it's a 7,003 third gen and Exadara X9M. So what about fourth gen? Well, fourth gen is well underway, ready for the future, but it incorporates learning that we've done in partnership with Oracle. It's going to have even more through capabilities, it's going to have expanded memory capabilities because there's a CXL connect express link that'll expand even more memory opportunities. And I could go on. So that's the beauty of a deep partnership as it enables us to really take that learning going forward. It pays forward and we're very excited to fold all of that into our future generations and provide even a better capabilities to Juan and his team moving forward. >> Yeah, you guys have been obviously very forthcoming. You have to be with Zen and EPYC. Juan, anything you'd like to add as closing comments? >> Yeah. I would say that in the processor market there's been a real acceleration in innovation in the last few years, there was a big move 10, 15 years ago when multicore processors came out. And then we were on that for a while and then things started stagnating, but in the last two or three years, AMD has been leading this, there's been a dramatic acceleration in innovation so it's very exciting to be part of this and customers are getting a big benefit from this. >> All right. Hey, thanks for coming back on The Cube today. Really appreciate your time. >> Thanks. Glad to be here. >> All right and thank you for watching this exclusive Cube conversation. This is Dave Vellante from The Cube and we'll see you next time. (upbeat jingle)
SUMMARY :
in the database service. in the leading hardware platforms. And it's really that simple, and key specs of the the great partnership that we have expect from the collaboration? but the partnership comes to So that's the beauty of a deep partnership You have to be with Zen and EPYC. but in the last two or three years, coming back on The Cube today. Glad to be here. and we'll see you next time.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Juan | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
Oracle | ORGANIZATION | 0.99+ |
Juan Loaiza | PERSON | 0.99+ |
Mark | PERSON | 0.99+ |
10 | QUANTITY | 0.99+ |
20% | QUANTITY | 0.99+ |
Mark Papermaster | PERSON | 0.99+ |
AMD | ORGANIZATION | 0.99+ |
Last April | DATE | 0.99+ |
11 years | QUANTITY | 0.99+ |
thousands | QUANTITY | 0.99+ |
both companies | QUANTITY | 0.99+ |
iOS | TITLE | 0.99+ |
7,003 | QUANTITY | 0.99+ |
X9M | TITLE | 0.99+ |
50% | QUANTITY | 0.99+ |
fourth gen | QUANTITY | 0.98+ |
today | DATE | 0.98+ |
First | QUANTITY | 0.98+ |
Zen | COMMERCIAL_ITEM | 0.97+ |
third generation | QUANTITY | 0.97+ |
X86 | COMMERCIAL_ITEM | 0.97+ |
first appearance | QUANTITY | 0.97+ |
Exadata | TITLE | 0.97+ |
third gen | QUANTITY | 0.96+ |
earlier this century | DATE | 0.96+ |
seven nanometer | QUANTITY | 0.96+ |
Exadata | ORGANIZATION | 0.94+ |
first | QUANTITY | 0.92+ |
Eastern Pacific Yacht Club | ORGANIZATION | 0.9+ |
EPYC | ORGANIZATION | 0.87+ |
both | QUANTITY | 0.86+ |
OCI | TITLE | 0.85+ |
One thing | QUANTITY | 0.83+ |
Exadata X9M | COMMERCIAL_ITEM | 0.81+ |
Power Exadata | ORGANIZATION | 0.81+ |
The Cube | ORGANIZATION | 0.8+ |
OCI | ORGANIZATION | 0.79+ |
The Cube | COMMERCIAL_ITEM | 0.79+ |
Zen | ORGANIZATION | 0.78+ |
three years | QUANTITY | 0.78+ |
Exadata X9M | COMMERCIAL_ITEM | 0.74+ |
X9M | COMMERCIAL_ITEM | 0.74+ |
years | DATE | 0.73+ |
15 years ago | DATE | 0.7+ |
10 | DATE | 0.7+ |
EPYC | OTHER | 0.65+ |
Exadara | ORGANIZATION | 0.64+ |
Oracle Cloud Infrastructure | ORGANIZATION | 0.61+ |
last few years | DATE | 0.6+ |
Exadata Cloud Infrastructure X9M | TITLE | 0.6+ |
Mahesh Nagarathnam, Dell Technologies
(upbeat music) >> We're back with a Blueprint for Trusted Infrastructure in partnership with Dell Technologies and theCUBE. And we're here with Mahesh Nagarathnam who is a consultant in the area of networking product management at Dell technologies. Mahesh, welcome, good to see you. >> Hey, good morning, Dave. It's nice to meet you as well. >> Hey, so we've been digging into all the parts of the infrastructure stack, and now we're going to look at the all important networking components. Mahesh, when we think about networking in today's environment, we think about the core data center and we're connecting out to various locations including the cloud and both the near and the far edge. So the question is from Dell's perspective what's unique and challenging about securing network infrastructure that we should know about? >> Yeah, so a few years ago, IT security in an enterprise was primarily putting a wrapper around the data center because IT was constrained to an infrastructure owned and operated by the enterprise for the most part. So putting a wrapper around it like a perimeter or a firewall was a sufficient response because you could basically control the enormous data into small enough control. Today, with the distributed data intelligent software different systems, multi-cloud environment and asset service delivery. The infrastructure for the modern era changes the way to secure the network infrastructure. In today's data driven world, IT operates everywhere and data is created and accessed everywhere. So far from the centralized mono data centers of the past. The biggest challenge is how do we build the network infrastructure of the modern era that are intelligent, with automation, enabling maximum flexibility and business agility without any compromise on the security. We believe that in this data era, the security transformation must accompany digital transformation. >> Yeah, that's very good. You talked about a couple of things there. Data by its very nature is distributed, there is no perimeter anymore. So you can't just, as you say, put a wrapper around it, I like the way you phrase that. So when you think about cyber security resilience from a networking perspective, how do you define that? In other words, what are the basic principles that you adhere to when thinking about securing network infrastructure for your customers? >> So our belief is that cybersecurity and cybersecurity resilience, they need to be holistic. They need to be integrated, scalable, one that spans the enterprise and with a consistent and objective and policy implementation. So cybersecurity needs to span across all the devices and running across any application whether the application resets on the cloud or anywhere else in the infrastructure. From a networking standpoint, what does it mean? It's again, the same principles. In order to prevent the threat actors from accessing, changing, destroying or stealing sensitive data, this definition holds good for networking as well. So if you look at it from a networking perspective it's the ability to protect from and withstand attacks on the networking systems. As we continue to evolve, this will also include the ability to adapt and recover from these attacks which is what cyber resilience aspect is all about. So cybersecurity, best practices as you know is continuously changing the landscape primarily because the cyber threats also continue to evolve. >> Yeah, got it. I like that. So, it's got to be integrated. It's got to be scalable. It's got to be comprehensive and adaptable. You're saying it can't be static. >> Right. So I think, you had a second part of the question that says, what are the basic principles when you're thinking about securing network infrastructure. When you are looking at securing the network infrastructure it revolves around core security capability of the devices that form the network. And what are these security capabilities? These are access control, software integrity and vulnerability response. When you look at access control it's to ensure that only the authenticated users are able to access the platform and they're able to access only the kind of the assets that they're authorized to, based on their user level. Now accessing a network platform like a switch or a router, for example, is typically used for configuration and management of the networking switch. So user access is based on roles for that matter role based access control, whether you are security admin or a network admin or a storage admin. And it's imperative that logging is enabled because any of the change to the configuration is actually logged and monitored as well. When we're talking about software's integrity, it's the ability to ensure that the software that's running on the system has not been compromised. And this is important because it could actually get hold of the system and you could get undesired results. In terms of validation of the images, it needs to be done through digital signature. So it's important that when you're talking about software integrity, A, you are ensuring that the platform is not compromised and B, that any upgrades that happens to the platform is happening through validated signature. >> Okay. And now you've, so there's access control, software integrity and I think you got a third element, which is, I think response, but please continue. >> Yeah. So, the third one about vulnerability. So we follow the same process that's been followed by the rest of the products within the Dell Product family that's to report or identify any kind of vulnerability that's being addressed by the Dell Product Security Incident Response Team. So the networking portfolio is no different. It follows the same process for identification for triage and for resolution of these vulnerabilities. And this address either through patches or through new resource via networking software. >> Yeah, got it. I mean, you didn't say zero trust but when you were talking about access control you're really talking about access to only those assets that people are authorized to access. I know zero trust sometimes is a buzzword, but you, I think gave it some clarity there. Software integrity, it's about assurance, validation, your digital signature, you mentioned, and that there's been no compromise. And then how you respond to incidents in a standard way that can fit into a security framework. So outstanding description. Thank you for that. But then the next question is how does Dell Networking fit into the construct of what we've been talking about, Dell Trusted Infrastructure? >> So networking is the key element in the Dell Trusted Infrastructure. It provides the interconnect between the server and the storage world and it's part of any data center configuration. For a trusted infrastructure, the network needs to have access control in place where only the authorized personals are able to make change to the network configuration and logging of any of those changes is also done through the logging capabilities. Additionally, we should also ensure that the configuration should provide network isolation between the management network and the data traffic network because they need to be separate and distinct from each other. And furthermore, even if you look at the data traffic network, you have things like segmentation, isolated segments and via VRFs or micro-segmentation via partners. This allows various level of security for each of those segments. So it's important that the network infrastructure has the ability to provide all these services. From a Dell networking security perspective, there are multiple layers of defense, both at the edge and in the network, in the hardware and in the software. And essentially, a set of rules and a configuration that's designed to sort of protect the integrity, confidentiality and accessibility of the network assets. So each network security layer, it implements policies and controls, as I said, including network segmentation, we do have capabilities, resources, centralized management, automation, and capability and scalability for that matter. Now you add all of these things with the open networking standards or software different principles, and you essentially reach to the point where you're looking at zero trust network access which is essentially sort of a building block for increased cloud adoption. If you look at the different pillars of a zero touch architecture, if you look at the device aspect, we do have support for secure boot, for example, we do have trusted platform, trusted platform models, TPMs on certain offer products. And the physical security, plain simple old WLAN port enable disable. From a user trust perspective, we know it's all done via access control base via role based access control and capability in order to provide remote authentication or things like sticky MAC or MAC learning limit and so on. If you look at a transport and a session trust layer, these are essentially, how do you access this switch. Is it by plain old Telnet, or is it like secure SSH. And when a host communicates to the switch, we do have things like self-signed or a certificate authority based certification. And one of the important aspect is, in terms of the routing protocol the routing protocol, for example, BGP, for example, we do have the capability to support MD5 authentication between the BGP peers so that there is no malicious attack to the network where the routing table is compromised. And the other aspect is about control plain ESL. It's typical that if you don't have a control plane Azure, it could be flooded and the switch could be compromised by denial of service attacks. From an application test perspective, as I mentioned, we do have the application specific security rules where you could actually define the specific security rules based on the specific applications that are running within the system. And I did talk about the digital signature and the cryptographic checks and that we do for authentication and, I mean rather for the authenticity and the validation of the image and the boundary and so on and so forth. Finally the data trust, we are looking at the network separation. The network separation could happen over VRF, plain old VLANs which can bring about multitenancy aspects. We talk about micro-segmentation as it applies to NSX, for example. The other aspect is we do have with our own smart fabric services, that's enabled in a fabric, we have a concept of cluster security. So all of this, the different pillars, they sort of make up for the zero trust infrastructure for the networking assets of an infrastructure. >> Yeah, so thank you for that. There's a lot to unpack there. One of the premise, the premise really this segment that we're setting up in this series, is really that everything you just mentioned, or a lot of things you just mentioned used to be the responsibility of the security team and the premise that we're putting forth is that because security teams are so stretched thin, you got to shift a vendor community, Dell specifically is shifting a lot of those tasks to their own R&D and taking care of a lot of that. 'cause SecOps teams got a lot of other stuff to worry about. So my question relates to things like automation which can help and scalability. What about those topics as it relates to networking infrastructure? >> Our portfolio, it enables state of the automation software that enables simplifying of the design. So for example, we do have the fabric design center, a tool that automates the design of the entire fabric and from a deployment and the management of the network infrastructure, there are simplicities using like Ansible playbooks for SONiC, for example. Or for a better storage, we do have smart fabric services that can automate the entire fabric for a storage solution or for one of the workloads, for example. Now we do help reduce the complexity by closely integrating the management of the physical and the virtual networking infrastructure. And again, we have those capabilities using SONiC or smart traffic services. If you look at SONiC for example, it delivers automated intent based secure containerized network. And it has the ability to provide network visibility and awareness and of these things are actually valid for a modern networking infrastructure. So now if you look at SONiC, the usage of those tools that are available within the SONiC NAS is not restricted just to the data center infrastructure, it's a unified NAS that's well applicable beyond the data center, right up to the edge. Now, if you look at our NAS from a smart traffic OS10 perspective, as I mentioned, we do have smart traffic services, which essentially simplifies the deployment, day one day two deployment expansion plans and the life cycle management of our converged infrastructure and hyperconverged infrastructure solutions. And finally, in order to enable zero touch deployment, we do have a VEP solution with our SD-WAN capability. So these are in a ways by which we bring down the complexity by enhancing the automation capability using a singular NAS that can expand from a data center now, right to the edge. >> Great, thank you for that. Last question real quick. Pitch me, can you summarize from your point of view what's the strength of the Dell networking portfolio? >> So from a Dell networking portfolio we support the capabilities at multiple layers, as I mentioned. We've talking about the physical security, for example, let's say disabling of the unused interface, sticky MAC and trusted platform modules are the things that to go after. And when you're talking about secure boot, for example, it delivers the authenticity and the integrity of the OS10 images at the startup. And secure boot also protects the startup configuration so that the startup configuration file is not compromised. And secure boot also enables the bootloader protection, for example. That is at another aspect of software image, integrity validation, wherein the image is validated for the digital signature prior to any upgrade process. And if you are looking at secure access control we do have things like role-based access control, SSH to the switches, control plane, access control, that pre-onset attacks and access control through multifactor authentication. We do have Radius Tech ads for entry control to the network and things like CSE and PRV support from a federal perspective. We do have logging wherein any event, any auditing capabilities can be possible by looking at the syslog servers which are pretty much in our transmitter from the devices ORTS, for example. And last we talked about network separation. And this separation ensures that that is a contained segment for a specific purpose or for the specific zone. And this can be implemented by a micro-segmentation, just a plain old WLAN or using virtual route of framework VRF, for example. >> A lot there. I mean, I think frankly, my takeaway is you guys do the heavy lifting in a very complicated topic. So thank you so much for coming on theCUBE and explaining that in quite some depth. Really appreciate it. >> Thank you, Dave. >> Oh, you're very welcome. Okay in a moment, I'll be back to dig into the hyperconverged infrastructure part of the portfolio, and look at how, when you enter the world of software defined where you're controlling servers and storage and networks via software led system, you could be sure that your infrastructure is trusted and secure. You're watching a Blueprint for Trusted Infrastructure made possible by Dell technologies and collaboration with theCUBE, your leader in enterprise and emerging tech coverage. (soft upbeat music)
SUMMARY :
And we're here with Mahesh Nagarathnam It's nice to meet you as well. of the infrastructure stack, infrastructure of the modern I like the way you phrase that. it's the ability to protect from So, it's got to be integrated. of the system and you could and I think you got a third element, So the networking into the construct of what the network needs to have and the premise that we're And it has the ability to Great, thank you for that. are the things that to go after. do the heavy lifting of the portfolio, and look at how,
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Dave | PERSON | 0.99+ |
Mahesh | PERSON | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
Mahesh Nagarathnam | PERSON | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
Radius Tech | ORGANIZATION | 0.99+ |
third element | QUANTITY | 0.98+ |
Today | DATE | 0.98+ |
SONiC | TITLE | 0.98+ |
two | QUANTITY | 0.98+ |
Dell Technologies | ORGANIZATION | 0.98+ |
each | QUANTITY | 0.98+ |
both | QUANTITY | 0.98+ |
second part | QUANTITY | 0.98+ |
one | QUANTITY | 0.97+ |
OS10 | TITLE | 0.97+ |
theCUBE | ORGANIZATION | 0.97+ |
One | QUANTITY | 0.96+ |
today | DATE | 0.96+ |
third one | QUANTITY | 0.93+ |
few years ago | DATE | 0.9+ |
zero | QUANTITY | 0.87+ |
zero touch | QUANTITY | 0.79+ |
Telnet | ORGANIZATION | 0.78+ |
each network security layer | QUANTITY | 0.78+ |
Azure | TITLE | 0.78+ |
Dell technologies | ORGANIZATION | 0.73+ |
Ansible | ORGANIZATION | 0.55+ |
Blueprint | ORGANIZATION | 0.53+ |
CSE | TITLE | 0.47+ |
Infrastructure | ORGANIZATION | 0.42+ |
playbooks | TITLE | 0.24+ |
Jerome West, Dell Technologies
(upbeat music) >> We're back with Jerome West, the Product Management Security Lead for HCI at Dell Technologies Hyper-Converged Infrastructure. Jerome, welcome. >> Thank you, Dave. >> Hey, Jerome, in this series "A Blueprint for Trusted Infrastructure," we've been digging into the different parts of the infrastructure stack, including storage servers and networking, and now we want to cover hyper-converged infrastructure. So my first question is what's unique about HCI that presents specific security challenges? What do we need to know? >> So what's unique about hyper-converged infrastructure is the breadth of the security challenge. We can't simply focus on a single type of IT system, so like a server or a storage system or a virtualization piece of software. I mean, HCI is all of those things. So luckily we have excellent partners like VMware, Microsoft and internal partners, like the Dell Power Edge Team, the Dell Storage Team, the Dell Networking Team, and on and on. These partnerships and these collaborations are what make us successful from a security standpoint. So let me give you an example to illustrate. In the recent past, we're seeing growing scope and sophistication in supply chain attacks. This means an attacker is going to attack your software supply chain upstream, so that hopefully a piece of code, malicious code that wasn't identified early in the software supply chain is distributed like a large player, like a VMware or a Microsoft or a Dell. So to confront this kind of sophisticated hard to defeat problem, we need short-term solutions and we need long-term solutions as well. So for the short-term solution, the obvious thing to do is to patch the vulnerability. The complexity is for our HCI portfolio, we build our software on VMware. So we would have to consume a patch that VMware would produce and provide it to our customers in a timely manner. Luckily, VxRail's engineering team has co engineered a release process with VMware that significantly shortens our development life cycle, so that VMware will produce a patch, and within 14 days we will integrate our own code with the VMware release. We will have tested and validated the update, and we will give an update to our customers within 14 days of that VMware release. That as a result of this kind of rapid development process, VxRail had over 40 releases of software updates last year. For a longer term solution, we're partnering with VMware and others to develop a software bill of materials. We work with VMware to consume their software manifest including their upstream vendors and their open source providers to have a comprehensive list of software components. Then we aren't caught off guard by an unforeseen vulnerability, and we're more able to easily detect where the software problem lies so that we can quickly address it. So these are the kind of relationships and solutions that we can co-engineer with effective collaborations with our partners. >> Great, thank you for that description. So if I had to define what cybersecurity resilience means to HCI or converged infrastructure, to me, my takeaway was you got to have a short-term instant patch solution and then you got to do an integration in a very short time, you know, two weeks to then have that integration done. And then longer-term, you have to have a software bill of materials so that you can ensure the provenance of all the components. Help us, is that a right way to think about cybersecurity resilience? Do you have, you know, additives to that definition? >> I do. I really think that cybersecurity and resilience for HCI, because like I said it has sort of unprecedented breadth across our portfolio. It's not a single thing. It's a bit of everything. So really the strength or the secret sauce is to combine all the solutions that our partner develops while integrating them with our own layer. So let me give you an example. So HCI, it's a basically taking a software abstraction of hardware functionality and implementing it into something called the virtualized layer. It's basically the virtualizing hardware functionality, like say a storage controller. You could implement it in the hardware, but for HCI, for example, in our VxRail portfolio, our VxRail product, we integrated it into a product called vSan which is provided by our partner VMware. So that portfolio strength is still, you know, through our partnerships. So what we do, we integrate these security functionality and features into our product. So our partnership grows through our ecosystem through products like VMware products, like NSX, Horizon, Carbon Black and vSphere. All of them integrate seamlessly with VMware. And we also leverage VMware's software partnerships on top of that. So for example, VxRail supports multifactor authentication through vSphere's integration with something called Active Directory Federation Services or ADFS. So there is a lot of providers that support ADFS, including Microsoft Azure. So now we can support a wide array of identity providers such as Auth0, or I mentioned Azure or Active Directory through that partnership. So we can leverage all of our partners' partnerships as well. So there's sort of a second layer. So being able to secure all of that, that provides a lot of options and flexibility for our customers. So basically to summarize my answer, we consume all of the security advantages of our partners, but we also expand on them to make a product that is comprehensively secured at multiple layers from the hardware layer that's provided by Dell through Power Edge to the hyper-converged software that we build ourselves to the virtualization layer that we get through our partnerships with Microsoft and VMware. >> Great, I mean, that's super helpful. You've mentioned NSX, Horizon, Carbon Black, all the you know, the VMware component, Auth0, which the developers are going to love. You got Azure Identity. So it's really an ecosystem. So you may have actually answered my next question, but I'm going to ask it anyway cause you've got this software-defined environment, and you're managing servers and networking and storage with this software-led approach. How do you ensure that the entire system is secure end to end? >> That's a really great question. So the answer is we do testing and validation as part of the engineering process. It's not just bolted on at the end. So when we do, for example VxRail is the market's only co-engineered solution with VMware. Other vendors sell VMware as a hyper-converged solution, but we actually include security as part of the co-engineering process with VMware. So it's considered when VMware builds their code, and their process dovetails with ours because we have a secure development lifecycle which other products might talk about in their discussions with you, that we integrate into our engineering lifecycle. So because we follow the same framework, all of the code should inter-operate from a security standpoint. And so when we do our final validation testing, when we do a software release, we're already halfway there in ensuring that all these features will give the customers what we promised. >> That's great. All right, let's close. Pitch me. What would you say is the strong suit, summarize the the strengths of the Dell hyper-converged infrastructure and converged infrastructure portfolio, specifically from a security perspective, Jerome? >> So I talked about how hyper-converged infrastructure simplifies security management because basically you're going to take all of these features that are abstracted in hardware. They're not abstracted in the virtualization layer. Now you can manage them from a single point of view, whether it would be say, you know, for VxRail it would be vCenter, for example. So by abstracting all this, you make it very easy to manage security and highly flexible because now you don't have limitations around a single vendor. You have a multiple array of choices and partnerships to select. So I would say that is the key to making, to HCI. Now what makes Dell the market leader in HCI is not only do we have that functionality, but we also make it exceptionally useful to you because it's co-engineered. It's not bolted on. So I gave the example of SBOM. I gave the example of how we modify our software release process with VMware to make it very responsive. A couple of other features that we have specific just to HCI are digitally signed LCM updates. This is an example of a feature that we have that's only exclusive to Dell. It's not done through a partnership. So we digitally sign our software updates. So the user can be sure that the update that they're installing into their system is an authentic and unmodified product. So we give it a Dell signature that's invalidated prior to installation. So not only do we consume the features that others develop in a seamless and fully validated way, but we also bolt on our own specific HCI security features that work with all the other partnerships and give the user an exceptional security experience. So for example, the benefit to the customer is you don't have to create a complicated security framework. That's hard for your users to use, and it's hard for your system administrators to manage. It all comes in a package, so it can be all managed through vCenter, for example. And then the specific hyper-converged functions can be managed through VxRail manager or through STDC manager. So there's very few panes of glass that the administrator or user ever has to worry about. It's all self-contained and manageable. >> That makes a lot of sense. So you've got your own infrastructure. You're applying your best practices to that like the digital signatures. You've got your ecosystem. You're doing co-engineering with the ecosystems, delivering security in a package, minimizing the complexity at the infrastructure level. The reason, Jerome, this is so important is because SecOps teams, you know, they got to deal with Cloud security. They got to deal with multiple Clouds. Now they have their shared responsibility model going across multiple. They got all this other stuff that they have to worry. They got to secure the containers and the run time and the platform and so forth. So they're being asked to do other things. If they have to worry about all the things that you just mentioned, they'll never get, you know, the security is just going to get worse. So my takeaway is you're removing that infrastructure piece and saying, okay, guys, you now can focus on those other things that is not necessarily Dell's, you know, domain, but you, you know, you can work with other partners and your own teams to really nail that. Is that a fair summary? >> I think that is a fair summary because absolutely the worst thing you can do from a security perspective is provide a feature that's so unusable that the administrator disables it or other key security features. So when I work with my partners to define and develop a new security feature, the thing I keep foremost in mind is will this be something our users want to use and our administrators want to administer? Because if it's not, if it's something that's too difficult or onerous or complex, then I try to find ways to make it more user-friendly and practical. And this is a challenge sometimes because our products operate in highly regulated environments, and sometimes they have to have certain rules and certain configurations that aren't the most user friendly or management friendly. So I put a lot of effort into thinking about how can we make this feature useful while still complying with all the regulations that we have to comply with. And by the way, we're very successful in a highly regulated space. We sell a lot of VxRail, for example, into the Department of Defense and banks and other highly regulated environments. And we're very successful there. >> Excellent, okay, Jerome, thanks. We're going to leave it there for now. I'd love to have you back to talk about the progress that you're making down the road. Things always, you know, advance in the tech industry, and so would appreciate that >> I would look forward to it. Thank you very much, Dave. >> You're really welcome. In a moment, I'll be back to summarize the program and offer some resources that can help you on your journey to secure your enterprise infrastructure. (upbeat music)
SUMMARY :
the Product Management Security Lead and now we want to cover So for the short-term solution, So if I had to define what So really the strength or the secret sauce all the you know, the VMware component, So the answer is we do of the Dell hyper-converged infrastructure So for example, the So they're being asked to do other things. that aren't the most user I'd love to have you back Thank you very much, Dave. and offer some resources that can help you
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Jerome | PERSON | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
Dave | PERSON | 0.99+ |
Jerome West | PERSON | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
first question | QUANTITY | 0.99+ |
Department of Defense | ORGANIZATION | 0.99+ |
second layer | QUANTITY | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
two weeks | QUANTITY | 0.99+ |
HCI | ORGANIZATION | 0.99+ |
last year | DATE | 0.99+ |
VMware | ORGANIZATION | 0.99+ |
VxRail | ORGANIZATION | 0.99+ |
14 days | QUANTITY | 0.99+ |
A Blueprint for Trusted Infrastructure | TITLE | 0.98+ |
NSX | ORGANIZATION | 0.98+ |
VxRail | TITLE | 0.97+ |
Dell Networking Team | ORGANIZATION | 0.97+ |
vCenter | TITLE | 0.97+ |
over 40 releases | QUANTITY | 0.95+ |
Azure | TITLE | 0.95+ |
Auth0 | ORGANIZATION | 0.94+ |
single thing | QUANTITY | 0.94+ |
single vendor | QUANTITY | 0.92+ |
vSan | TITLE | 0.91+ |
Dell Storage Team | ORGANIZATION | 0.91+ |
SBOM | ORGANIZATION | 0.9+ |
Horizon | ORGANIZATION | 0.89+ |
vSphere | TITLE | 0.89+ |
single point | QUANTITY | 0.89+ |
Carbon Black | ORGANIZATION | 0.85+ |
Azure Identity | TITLE | 0.84+ |
ADFS | TITLE | 0.81+ |
Dell Power Edge Team | ORGANIZATION | 0.78+ |
Power Edge | TITLE | 0.75+ |
single type | QUANTITY | 0.74+ |
vSphere | ORGANIZATION | 0.69+ |
couple | QUANTITY | 0.68+ |
VMware | TITLE | 0.6+ |
HCI | TITLE | 0.47+ |
SecOps | ORGANIZATION | 0.45+ |
HCI | OTHER | 0.38+ |
Oracle Announces MySQL HeatWave on AWS
>>Oracle continues to enhance my sequel Heatwave at a very rapid pace. The company is now in its fourth major release since the original announcement in December 2020. 1 of the main criticisms of my sequel, Heatwave, is that it only runs on O. C I. Oracle Cloud Infrastructure and as a lock in to Oracle's Cloud. Oracle recently announced that heat wave is now going to be available in AWS Cloud and it announced its intent to bring my sequel Heatwave to Azure. So my secret heatwave on AWS is a significant TAM expansion move for Oracle because of the momentum AWS Cloud continues to show. And evidently the Heatwave Engineering team has taken the development effort from O. C I. And is bringing that to A W S with a number of enhancements that we're gonna dig into today is senior vice president. My sequel Heatwave at Oracle is back with me on a cube conversation to discuss the latest heatwave news, and we're eager to hear any benchmarks relative to a W S or any others. Nippon has been leading the Heatwave engineering team for over 10 years and there's over 100 and 85 patents and database technology. Welcome back to the show and good to see you. >>Thank you. Very happy to be back. >>Now for those who might not have kept up with the news, uh, to kick things off, give us an overview of my sequel, Heatwave and its evolution. So far, >>so my sequel, Heat Wave, is a fully managed my secret database service offering from Oracle. Traditionally, my secret has been designed and optimised for transaction processing. So customers of my sequel then they had to run analytics or when they had to run machine learning, they would extract the data out of my sequel into some other database for doing. Unlike processing or machine learning processing my sequel, Heat provides all these capabilities built in to a single database service, which is my sequel. He'd fake So customers of my sequel don't need to move the data out with the same database. They can run transaction processing and predicts mixed workloads, machine learning, all with a very, very good performance in very good price performance. Furthermore, one of the design points of heat wave is is a scale out architecture, so the system continues to scale and performed very well, even when customers have very large late assignments. >>So we've seen some interesting moves by Oracle lately. The collaboration with Azure we've we've covered that pretty extensively. What was the impetus here for bringing my sequel Heatwave onto the AWS cloud? What were the drivers that you considered? >>So one of the observations is that a very large percentage of users of my sequel Heatwave, our AWS users who are migrating of Aurora or so already we see that a good percentage of my secret history of customers are migrating from GWS. However, there are some AWS customers who are still not able to migrate the O. C. I to my secret heat wave. And the reason is because of, um, exorbitant cost, which was charges. So in order to migrate the workload from AWS to go see, I digress. Charges are very high fees which becomes prohibitive for the customer or the second example we have seen is that the latency of practising a database which is outside of AWS is very high. So there's a class of customers who would like to get the benefits of my secret heatwave but were unable to do so and with this support of my secret trip inside of AWS, these customers can now get all the grease of the benefits of my secret he trip without having to pay the high fees or without having to suffer with the poorly agency, which is because of the ws architecture. >>Okay, so you're basically meeting the customer's where they are. So was this a straightforward lifted shift from from Oracle Cloud Infrastructure to AWS? >>No, it is not because one of the design girls we have with my sequel, Heatwave is that we want to provide our customers with the best price performance regardless of the cloud. So when we decided to offer my sequel, he headed west. Um, we have optimised my sequel Heatwave on it as well. So one of the things to point out is that this is a service with the data plane control plane and the console are natively running on AWS. And the benefits of doing so is that now we can optimise my sequel Heatwave for the E. W s architecture. In addition to that, we have also announced a bunch of new capabilities as a part of the service which will also be available to the my secret history of customers and our CI, But we just announced them and we're offering them as a part of my secret history of offering on AWS. >>So I just want to make sure I understand that it's not like you just wrapped your stack in a container and stuck it into a W s to be hosted. You're saying you're actually taking advantage of the capabilities of the AWS cloud natively? And I think you've made some other enhancements as well that you're alluding to. Can you maybe, uh, elucidate on those? Sure. >>So for status, um, we have taken the mind sequel Heatwave code and we have optimised for the It was infrastructure with its computer network. And as a result, customers get very good performance and price performance. Uh, with my secret he trade in AWS. That's one performance. Second thing is, we have designed new interactive counsel for the service, which means that customers can now provision there instances with the council. But in addition, they can also manage their schemas. They can. Then court is directly from the council. Autopilot is integrated. The council we have introduced performance monitoring, so a lot of capabilities which we have introduced as a part of the new counsel. The third thing is that we have added a bunch of new security features, uh, expose some of the security features which were part of the My Secret Enterprise edition as a part of the service, which gives customers now a choice of using these features to build more secure applications. And finally, we have extended my secret autopilot for a number of old gpus cases. In the past, my secret autopilot had a lot of capabilities for Benedict, and now we have augmented my secret autopilot to offer capabilities for elderly people. Includes as well. >>But there was something in your press release called Auto thread. Pooling says it provides higher and sustained throughput. High concerns concerns concurrency by determining Apple number of transactions, which should be executed. Uh, what is that all about? The auto thread pool? It seems pretty interesting. How does it affect performance? Can you help us understand that? >>Yes, and this is one of the capabilities of alluding to which we have added in my secret autopilot for transaction processing. So here is the basic idea. If you have a system where there's a large number of old EP transactions coming into it at a high degrees of concurrency in many of the existing systems of my sequel based systems, it can lead to a state where there are few transactions executing, but a bunch of them can get blocked with or a pilot tried pulling. What we basically do is we do workload aware admission control and what this does is it figures out, what's the right scheduling or all of these algorithms, so that either the transactions are executing or as soon as something frees up, they can start executing, so there's no transaction which is blocked. The advantage to the customer of this capability is twofold. A get significantly better throughput compared to service like Aurora at high levels of concurrency. So at high concurrency, for instance, uh, my secret because of this capability Uh oh, thread pulling offers up to 10 times higher compared to Aurora, that's one first benefit better throughput. The second advantage is that the true part of the system never drops, even at high levels of concurrency, whereas in the case of Aurora, the trooper goes up, but then, at high concurrency is, let's say, starting, uh, level of 500 or something. It depends upon the underlying shit they're using the troopers just dropping where it's with my secret heatwave. The truth will never drops. Now, the ramification for the customer is that if the truth is not gonna drop, the user can start off with a small shape, get the performance and be a show that even the workload increases. They will never get a performance, which is worse than what they're getting with lower levels of concurrency. So this let's leads to customers provisioning a shape which is just right for them. And if they need, they can, uh, go with the largest shape. But they don't like, you know, over pay. So those are the two benefits. Better performance and sustain, uh, regardless of the level of concurrency. >>So how do we quantify that? I know you've got some benchmarks. How can you share comparisons with other cloud databases especially interested in in Amazon's own databases are obviously very popular, and and are you publishing those again and get hub, as you have done in the past? Take us through the benchmarks. >>Sure, So benchmarks are important because that gives customers a sense of what performance to expect and what price performance to expect. So we have run a number of benchmarks. And yes, all these benchmarks are available on guitar for customers to take a look at. So we have performance results on all the three castle workloads, ol DB Analytics and Machine Learning. So let's start with the Rdp for Rdp and primarily because of the auto thread pulling feature. We show that for the IPCC for attended dataset at high levels of concurrency, heatwave offers up to 10 times better throughput and this performance is sustained, whereas in the case of Aurora, the performance really drops. So that's the first thing that, uh, tend to alibi. Sorry, 10 gigabytes. B B C c. I can come and see the performance are the throughput is 10 times better than Aurora for analytics. We have done a comparison of my secret heatwave in AWS and compared with Red Ship Snowflake Googled inquiry, we find that the price performance of my secret heatwave compared to read ship is seven times better. So my sequel, Heat Wave in AWS, provides seven times better price performance than red ship. That's a very, uh, interesting results to us. Which means that customers of Red Shift are really going to take the service seriously because they're gonna get seven times better price performance. And this is all running in a W s so compared. >>Okay, carry on. >>And then I was gonna say, compared to like, Snowflake, uh, in AWS offers 10 times better price performance. And compared to Google, ubiquity offers 12 times better price performance. And this is based on a four terabyte p PCH workload. Results are available on guitar, and then the third category is machine learning and for machine learning, uh, for training, the performance of my secret heatwave is 25 times faster compared to that shit. So all the three workloads we have benchmark's results, and all of these scripts are available on YouTube. >>Okay, so you're comparing, uh, my sequel Heatwave on AWS to Red Shift and snowflake on AWS. And you're comparing my sequel Heatwave on a W s too big query. Obviously running on on Google. Um, you know, one of the things Oracle is done in the past when you get the price performance and I've always tried to call fouls you're, like, double your price for running the oracle database. Uh, not Heatwave, but Oracle Database on a W s. And then you'll show how it's it's so much cheaper on on Oracle will be like Okay, come on. But they're not doing that here. You're basically taking my sequel Heatwave on a W s. I presume you're using the same pricing for whatever you see to whatever else you're using. Storage, um, reserved instances. That's apples to apples on A W s. And you have to obviously do some kind of mapping for for Google, for big query. Can you just verify that for me, >>we are being more than fair on two dimensions. The first thing is, when I'm talking about the price performance for analytics, right for, uh, with my secret heat rape, the cost I'm talking about from my secret heat rape is the cost of running transaction processing, analytics and machine learning. So it's a fully loaded cost for the case of my secret heatwave. There has been I'm talking about red ship when I'm talking about Snowflake. I'm just talking about the cost of these databases for running, and it's only it's not, including the source database, which may be more or some other database, right? So that's the first aspect that far, uh, trip. It's the cost for running all three kinds of workloads, whereas for the competition, it's only for running analytics. The second thing is that for these are those services whether it's like shit or snowflakes, That's right. We're talking about one year, fully paid up front cost, right? So that's what most of the customers would pay for. Many of the customers would pay that they will sign a one year contract and pay all the costs ahead of time because they get a discount. So we're using that price and the case of Snowflake. The costs were using is their standard edition of price, not the Enterprise edition price. So yes, uh, more than in this competitive. >>Yeah, I think that's an important point. I saw an analysis by Marx Tamer on Wiki Bond, where he was doing the TCO comparisons. And I mean, if you have to use two separate databases in two separate licences and you have to do et yelling and all the labour associated with that, that that's that's a big deal and you're not even including that aspect in in your comparison. So that's pretty impressive. To what do you attribute that? You know, given that unlike, oh, ci within the AWS cloud, you don't have as much control over the underlying hardware. >>So look hard, but is one aspect. Okay, so there are three things which give us this advantage. The first thing is, uh, we have designed hateful foreign scale out architecture. So we came up with new algorithms we have come up with, like, uh, one of the design points for heat wave is a massively partitioned architecture, which leads to a very high degree of parallelism. So that's a lot of hype. Each were built, So that's the first part. The second thing is that although we don't have control over the hardware, but the second design point for heat wave is that it is optimised for commodity cloud and the commodity infrastructure so we can have another guys, what to say? The computer we get, how much network bandwidth do we get? How much of, like objects to a brand that we get in here? W s. And we have tuned heat for that. That's the second point And the third thing is my secret autopilot, which provides machine learning based automation. So what it does is that has the users workload is running. It learns from it, it improves, uh, various premieres in the system. So the system keeps getting better as you learn more and more questions. And this is the third thing, uh, as a result of which we get a significant edge over the competition. >>Interesting. I mean, look, any I SV can go on any cloud and take advantage of it. And that's, uh I love it. We live in a new world. How about machine learning workloads? What? What did you see there in terms of performance and benchmarks? >>Right. So machine learning. We offer three capabilities training, which is fully automated, running in France and explanations. So one of the things which many of our customers told us coming from the enterprise is that explanations are very important to them because, uh, customers want to know that. Why did the the system, uh, choose a certain prediction? So we offer explanations for all models which have been derailed by. That's the first thing. Now, one of the interesting things about training is that training is usually the most expensive phase of machine learning. So we have spent a lot of time improving the performance of training. So we have a bunch of techniques which we have developed inside of Oracle to improve the training process. For instance, we have, uh, metal and proxy models, which really give us an advantage. We use adaptive sampling. We have, uh, invented in techniques for paralysing the hyper parameter search. So as a result of a lot of this work, our training is about 25 times faster than that ship them health and all the data is, uh, inside the database. All this processing is being done inside the database, so it's much faster. It is inside the database. And I want to point out that there is no additional charge for the history of customers because we're using the same cluster. You're not working in your service. So all of these machine learning capabilities are being offered at no additional charge inside the database and as a performance, which is significantly faster than that, >>are you taking advantage of or is there any, uh, need not need, but any advantage that you can get if two by exploiting things like gravity. John, we've talked about that a little bit in the past. Or trainee. Um, you just mentioned training so custom silicon that AWS is doing, you're taking advantage of that. Do you need to? Can you give us some insight >>there? So there are two things, right? We're always evaluating What are the choices we have from hybrid perspective? Obviously, for us to leverage is right and like all the things you mention about like we have considered them. But there are two things to consider. One is he is a memory system. So he favours a big is the dominant cost. The processor is a person of the cost, but memory is the dominant cost. So what we have evaluated and found is that the current shape which we are using is going to provide our customers with the best price performance. That's the first thing. The second thing is that there are opportunities at times when we can use a specialised processor for vaccinating the world for a bit. But then it becomes a matter of the cost of the customer. Advantage of our current architecture is on the same hardware. Customers are getting very good performance. Very good, energetic performance in a very good machine learning performance. If you will go with the specialised processor, it may. Actually, it's a machine learning, but then it's an additional cost with the customers we need to pay. So we are very sensitive to the customer's request, which is usually to provide very good performance at a very low cost. And we feel is that the current design we have as providing customers very good performance and very good price performance. >>So part of that is architectural. The memory intensive nature of of heat wave. The other is A W s pricing. If AWS pricing were to flip, it might make more sense for you to take advantage of something like like cranium. Okay, great. Thank you. And welcome back to the benchmarks benchmarks. Sometimes they're artificial right there. A car can go from 0 to 60 in two seconds. But I might not be able to experience that level of performance. Do you? Do you have any real world numbers from customers that have used my sequel Heatwave on A W s. And how they look at performance? >>Yes, absolutely so the my Secret service on the AWS. This has been in Vera for, like, since November, right? So we have a lot of customers who have tried the service. And what actually we have found is that many of these customers, um, planning to migrate from Aurora to my secret heat rape. And what they find is that the performance difference is actually much more pronounced than what I was talking about. Because with Aurora, the performance is actually much poorer compared to uh, like what I've talked about. So in some of these cases, the customers found improvement from 60 times, 240 times, right? So he travels 100 for 240 times faster. It was much less expensive. And the third thing, which is you know, a noteworthy is that customers don't need to change their applications. So if you ask the top three reasons why customers are migrating, it's because of this. No change to the application much faster, and it is cheaper. So in some cases, like Johnny Bites, what they found is that the performance of their applications for the complex storeys was about 60 to 90 times faster. Then we had 60 technologies. What they found is that the performance of heat we have compared to Aurora was 100 and 39 times faster. So, yes, we do have many such examples from real workloads from customers who have tried it. And all across what we find is if it offers better performance, lower cost and a single database such that it is compatible with all existing by sequel based applications and workloads. >>Really impressive. The analysts I talked to, they're all gaga over heatwave, and I can see why. Okay, last question. Maybe maybe two and one. Uh, what's next? In terms of new capabilities that customers are going to be able to leverage and any other clouds that you're thinking about? We talked about that upfront, but >>so in terms of the capabilities you have seen, like they have been, you know, non stop attending to the feedback from the customers in reacting to it. And also, we have been in a wedding like organically. So that's something which is gonna continue. So, yes, you can fully expect that people not dressed and continue to in a way and with respect to the other clouds. Yes, we are planning to support my sequel. He tripped on a show, and this is something that will be announced in the near future. Great. >>All right, Thank you. Really appreciate the the overview. Congratulations on the work. Really exciting news that you're moving my sequel Heatwave into other clouds. It's something that we've been expecting for some time. So it's great to see you guys, uh, making that move, and as always, great to have you on the Cube. >>Thank you for the opportunity. >>All right. And thank you for watching this special cube conversation. I'm Dave Volonte, and we'll see you next time.
SUMMARY :
The company is now in its fourth major release since the original announcement in December 2020. Very happy to be back. Now for those who might not have kept up with the news, uh, to kick things off, give us an overview of my So customers of my sequel then they had to run analytics or when they had to run machine So we've seen some interesting moves by Oracle lately. So one of the observations is that a very large percentage So was this a straightforward lifted shift from No, it is not because one of the design girls we have with my sequel, So I just want to make sure I understand that it's not like you just wrapped your stack in So for status, um, we have taken the mind sequel Heatwave code and we have optimised Can you help us understand that? So this let's leads to customers provisioning a shape which is So how do we quantify that? So that's the first thing that, So all the three workloads we That's apples to apples on A W s. And you have to obviously do some kind of So that's the first aspect And I mean, if you have to use two So the system keeps getting better as you learn more and What did you see there in terms of performance and benchmarks? So we have a bunch of techniques which we have developed inside of Oracle to improve the training need not need, but any advantage that you can get if two by exploiting We're always evaluating What are the choices we have So part of that is architectural. And the third thing, which is you know, a noteworthy is that In terms of new capabilities that customers are going to be able so in terms of the capabilities you have seen, like they have been, you know, non stop attending So it's great to see you guys, And thank you for watching this special cube conversation.
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Dave Volonte | PERSON | 0.99+ |
December 2020 | DATE | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
John | PERSON | 0.99+ |
France | LOCATION | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
10 times | QUANTITY | 0.99+ |
two things | QUANTITY | 0.99+ |
Oracle | ORGANIZATION | 0.99+ |
Heatwave | TITLE | 0.99+ |
100 | QUANTITY | 0.99+ |
60 times | QUANTITY | 0.99+ |
one year | QUANTITY | 0.99+ |
12 times | QUANTITY | 0.99+ |
GWS | ORGANIZATION | 0.99+ |
60 technologies | QUANTITY | 0.99+ |
first part | QUANTITY | 0.99+ |
240 times | QUANTITY | 0.99+ |
two separate licences | QUANTITY | 0.99+ |
third category | QUANTITY | 0.99+ |
second advantage | QUANTITY | 0.99+ |
0 | QUANTITY | 0.99+ |
seven times | QUANTITY | 0.99+ |
two seconds | QUANTITY | 0.99+ |
two | QUANTITY | 0.99+ |
Apple | ORGANIZATION | 0.99+ |
seven times | QUANTITY | 0.99+ |
ORGANIZATION | 0.99+ | |
one | QUANTITY | 0.99+ |
25 times | QUANTITY | 0.99+ |
second point | QUANTITY | 0.99+ |
November | DATE | 0.99+ |
85 patents | QUANTITY | 0.99+ |
second thing | QUANTITY | 0.99+ |
Aurora | TITLE | 0.99+ |
third thing | QUANTITY | 0.99+ |
Each | QUANTITY | 0.99+ |
second example | QUANTITY | 0.99+ |
10 gigabytes | QUANTITY | 0.99+ |
three things | QUANTITY | 0.99+ |
One | QUANTITY | 0.99+ |
two benefits | QUANTITY | 0.99+ |
one aspect | QUANTITY | 0.99+ |
first aspect | QUANTITY | 0.98+ |
two separate databases | QUANTITY | 0.98+ |
over 10 years | QUANTITY | 0.98+ |
fourth major release | QUANTITY | 0.98+ |
39 times | QUANTITY | 0.98+ |
first thing | QUANTITY | 0.98+ |
Heat Wave | TITLE | 0.98+ |
Scott Baker, IBM Infrastructure | VMware Explore 2022
(upbeat music) >> Welcome back everyone to theCUBEs live coverage in San Francisco for VMware Explorer. I'm John Furrier with my host, Dave Vellante. Two sets, three days of wall to wall coverage. This is day two. We got a great guest, Scott Baker, CMO at IBM, VP of Infrastructure at IBM. Great to see you. Thanks for coming on. >> Hey, good to see you guys as well. It's always a pleasure. >> ()Good time last night at your event? >> Great time last night. >> It was really well-attended. IBM always has the best food so that was good and great props, magicians, and it was really a lot of fun, comedians. Good job. >> Yeah, I'm really glad you came on. One of the things we were chatting, before we came on camera was, how much changed. We've been covering IBM storage days, back on the Edge days, and they had the event. Storage is the center of all the conversations, cyber security- >> ()Right? >> ... But it's not just pure cyber. It's still important there. And just data and the role of multi-cloud and hybrid cloud and data and security are the two hottest areas, that I won't say unresolved, but are resolving themselves. And people are talking. It's the most highly discussed topics. >> Right. >> ()Those two areas. And it's just all on storage. >> Yeah, it sure does. And in fact, what I would even go so far as to say is, people are beginning to realize the importance that storage plays, as the data custodian for the organization. Right? Certainly you have humans that are involved in setting strategies, but ultimately whatever those policies are that get applied, have to be applied to a device that must act as a responsible custodian for the data it holds. >> So what's your role at IBM and the infrastructure team? Storage is one only one of the areas. >> ()Right. >> You're here at VMware Explore. What's going on here with IBM? Take us through what you're doing there at IBM, and then here at VMware. What's the conversations? >> Sure thing. I have the distinct pleasure to run both product marketing and strategy for our storage line. That's my primary focus, but I also have responsibility for the mainframe software, so the Z System line, as well as our Power server line, and our technical support organization, or at least the services side of our technical support organization. >> And one of the things that's going on here, lot of noise going on- >> Is that a bird flying around? >> Yeah >> We got fire trucks. What's changed? 'Cause right now with VMware, you're seeing what they're doing. They got the Platform, Under the Hood, Developer focus. It's still an OPS game. What's the relationship with VMware? What are you guys talking about here? What are some of the conversations you're having here in San Francisco? >> Right. Well, IBM has been a partner with VMware for at least the last 20 years. And VMware does, I think, a really good job about trying to create a working space for everyone to be an equal partner with them. It can be challenging too, if you want to sort of throw out your unique value to a customer. So one of the things that we've really been working on is, how do we partner much stronger? When we look at the customers that we support today, what they're looking for isn't just a solid product. They're looking for a solid ecosystem partnership. So we really lean in on that 20 years of partnership experience that we have with IBM. So one of the things that we announced was actually being one of the first VMware partners to bring both a technical innovation delivery mechanism, as well as technical services, alongside VMware technologies. I would say that was one of the first things that we really leaned in on, as we looked out at what customers are expecting from us. >> So I want to zoom out a little bit and talk about the industry. I've been following IBM since the early 1980s. It's trained in the mainframe market, and so we've seen, a lot of things you see come back to the mainframe, but we won't go there. But prior to Arvind coming on, it seemed like, okay, storage, infrastructure, yeah it's good business, and we'll let it throw off some margin. That's fine. But it's all about services and software. Okay, great. With Arvind, and obviously Red Hat, the whole focus shift to hybrid. We were talking, I think yesterday, about okay, where did we first hear hybrid? Obviously we heard that a lot from VMware. I heard it actually first, early on anyway, from IBM, talking hybrid. Some of the storage guys at the time. Okay, so now all of a sudden there's the realization that to make hybrid work, you need software and hardware working together. >> () Right. So it's now a much more fundamental part of the conversation. So when you look out, Scott, at the trends you're seeing in the market, when you talk to customers, what are you seeing and how is that informing your strategy, and how are you bringing together all the pieces? >> That's a really awesome question because it always depends on who, within the organization, you're speaking to. When you're inside the data center, when you're talking to the architects and the administrators, they understand the value in the necessity for a hybrid-cloud architecture. Something that's consistent. On The Edge, On-Prem, in the cloud. Something that allows them to expand the level of control that they have, without having to specialize on equipment and having to redo things as you move from one medium to the next. As you go upstack in that conversation, what I find really interesting is how leaders are beginning to realize that private cloud or on-prem, multi cloud, super cloud, whatever you call it, whatever's in the middle, those are just deployment mechanisms. What they're coming to understand is it's the applications and the data that's hybrid. And so what they're looking for IBM to deliver, and something that we've really invested in on the infrastructure side is, how do we create bidirectional application mobility? Making it easy for organizations, whether they're using containers, virtual machines, just bare metal, how do they move that data back and forth as they need to, and not just back and forth from on-prem to the cloud, but effectively, how do they go from cloud to cloud? >> Yeah. One of the things I noticed is your pin, says I love AI, with the I next to IBM and get all these (indistinct) in there. AI, remember the quote from IBM is, "You can't have AI without IA." Information architect. >> () Right. >> () Rob Thomas. >> Rob Thomas (indistinct) the sound bites. But that brings up the point about machine learning and some of these things that are coming down the like, how is your area devolving the smarts and the brains around leveraging the AI in the systems itself? We're hearing more and more softwares being coded into the hardware. You see Silicon advances. All this is kind of, not changing it, but bringing back the urgency of, hardware matters. >> That's right. >> () At the same time, it's still software too. >> That's right. So let's connect a couple of dots here. We talked a little bit about the importance of cyber resiliency, and let's talk about a little bit on how we use AI in that matter. So, if you look at the direct flash modules that are in the market today, or the SSDs that are in the market today, just standard-capacity drives. If you look at the flash core modules that IBM produces, we actually treat that as a computational storage offering, where you store the data, but it's got intelligence built into the processor, to offload some of the responsibilities of the controller head. The ability to do compression, single (indistinct), deduplication, you name it. But what if you can apply AI at the controller level, so that signals that are being derived by the flash core module itself, that look anomalous, can be handed up to an intelligence to say, "Hey, I'm all of a sudden getting encrypted rights from a host that I've never gotten encrypted rights for. Maybe this could be a problem." And then imagine if you connect that inferencing engine to the rest of the IBM portfolio, "Hey, Qradar. Hey IBM Guardian. What's going on on the network? Can we see some correlation here?" So what you're going to see IBM infrastructure continue to do is invest heavily into entropy and the ability to measure IO characteristics with respect to anomalous behavior and be able to report against that. And the trick here, because the array technically doesn't know if it's under attack or if the host just decided to turn on encryption, the trick here is using the IBM product relationships, and ecosystem relationships, to do correlation of data to determine what's actually happening, to reduce your false positives. >> And have that pattern of data too. It's all access to data too. Big time. >> That's right. >> And that innovation comes out of IBM R&D? Does it come out of the product group? Is it IBM research that then trickles its way in? Is it the storage innovation? Where's that come from? Where's that bubble up? That partnership? >> Well, I got to tell you, it doesn't take very long in this industry before your counterpart, your competitor, has a similar feature. Right? So we're always looking for, what's the next leg? What's the next advancement that we can make? We knew going into this process, that we had plenty of computational power that was untapped on the FPGA, the processor running on the flash core module. Right? So we thought, okay, well, what should we do next? And we thought, "Hey, why not just set this thing up to start watching IO patterns, do calculations, do trending, and report that back?" And what's great about what you brought up too, John, is that it doesn't stay on the box. We push that upstack through the AIOPS architecture. So if you're using Turbonomic, and you want to look applications stack down, to know if you've got threat potential, or your attack surface is open, you can make some changes there. If you want to look at it across your infrastructure landscape with a storage insight, you could do that. But our goal here is to begin to make the machine smarter and aware of impacts on the data, not just on the data they hold onto, but usage, to move it into the appropriate tier, different write activities or read activities or delete activities that could indicate malicious efforts that are underway, and then begin to start making more autonomous, how about managed autonomous responses? I don't want to turn this into a, oh, it's smart, just turn it on and walk away and it's good. I don't know that we'll ever get there just yet, but the important thing here is, what we're looking at is, how do we continually safeguard and protect that data? And how do we drive features in the box that remove more and more of the day to day responsibility from the administrative staff, who are technically hired really, to service and solve for bigger problems in the enterprise, not to be a specialist and have to manage one box at a time. >> Dave mentioned Arvind coming on, the new CEO of IBM, and the Red Hat acquisition and that change, I'd like to get your personal perspective, or industry perspective, so take your IBM-hat off for a second and put the Scott-experience-in-the-industry hat on, the transformation at the customer level right now is more robust, to use that word. I don't want to say chaotic, but it is chaotic. They say chaos in the cloud here at VM, a big part of their messaging, but it's changing the business model, how things are consumed. You're seeing new business models emerge. So IBM has this lot of storage old systems, you're transforming, the company's transforming. Customers are also transforming, so that's going to change how people market products. >> () Right. >> For example, we know that developers and DevOps love self-service. Why? Because they don't want to install it. Let me go faster. And they want to get rid of it, doesn't work. Storage is infrastructure and still software, so how do you see, in your mind's eye, with all your experience, the vision of how to market products that are super important, that are infrastructure products, that have to be put into play, for really new architectures that are going to transform businesses? It's not as easy as saying, "Oh, we're going to go to market and sell something." The old way. >> () Right. >> This shifting happening is, I don't think there's an answer yet, but I want to get your perspective on that. Customers want to hear the storage message, but it might not be speeds and fees. Maybe it is. Maybe it's not. Maybe it's solutions. Maybe it's security. There's multiple touch points now, that you're dealing with at IBM for the customer, without becoming just a storage thing or just- >> () Right. >> ... or just hardware. I mean, hardware does matter, but what's- >> Yeah, no, you're absolutely right, and I think what complicates that too is, if you look at the buying centers around a purchase decision, that's expanded as well, and so as you engage with a customer, you have to be sensitive to the message that you're telling, so that it touches the needs or the desires of the people that are all sitting around the table. Generally what we like to do when we step in and we engage, isn't so much to talk about the product. At some point, maybe later in the engagements, the importance of speeds, feeds, interconnectivity, et cetera, those do come up. Those are a part of the final decision, but early on it's really about outcomes. What outcomes are you delivering? This idea of being able to deliver, if you use the term zero trust or cyber-resilient storage capability as a part of a broader security architecture that you're putting into place, to help that organization, that certainly comes up. We also hear conversations with customers about, or requests from customers about, how do the parts of IBM themselves work together? Right? And I think a lot of that, again, continues to speak to what kind of outcome are you going to give to me? Here's a challenge that I have. How are you helping me overcome it? And that's a combination of IBM hardware, software, and the services side, where we really have an opportunity to stand out. But the thing that I would tell you, that's probably most important is, the engagement that we have up and down the stack in the market perspective, always starts with, what's the outcome that you're going to deliver for me? And then that drags with it the story that would be specific to the gear. >> Okay, so let's say I'm a customer, and I'm buying it to zero trust architecture, but it's going to be somewhat of a long term plan, but I have a tactical need. I'm really nervous about Ransomware, and I don't feel as though I'm prepared, and I want an outcome that protects me. What are you seeing? Are you seeing any patterns? I know it's going to vary, but are you seeing any patterns, in terms of best practice to protect me? >> Man, the first thing that we wanted to do at IBM is divorce ourselves from the company as we thought through this. And what I mean by that is, we wanted to do what's right, on day zero, for the customer. So we set back using the experience that we've been able to amass, going through various recovery operations, and helping customers get through a Ransomware attack. And we realized, "Hey. What we should offer is a free cyber resilience assessment." So we like to, from the storage side, we'd like to look at what we offer to the customer as following the NIST framework. And most vendors will really lean in hard on the response and the recovery side of that, as you should. But that means that there's four other steps that need to be addressed, and that free cyber-resilience assessment, it's a consultative engagement that we offer. What we're really looking at doing is helping you assess how vulnerable you are, how big is that attack surface? And coming out of that, we're going to give you a Vendor Agnostic Report that says here's your situation, here's your grade or your level of risk and vulnerability, and then here's a prioritized roadmap of where we would recommend that you go off and start solving to close up whatever the gaps or the risks are. Now you could say, "Hey, thanks, IBM. I appreciate that. I'm good with my storage vendor today. I'm going to go off and use it." Now, we may not get some kind of commission check. We may not sell the box. But what I do know is that you're going to walk away knowing the risks that you're in, and we're going to give you the recommendations to get started on closing those up. And that helps me sleep at night. >> That's a nice freebie. >> Yeah. >> Yeah, it really is, 'cause you guys got deep expertise in that area. So take advantage of that. >> Scott, great to have you on. Thanks for spending time out of your busy day. Final question, put a plug in for your group. What are you communicating to customers? Share with the audience here. You're here at VMware Explorer, the new rebranded- >> () Right? >> ... multi-cloud, hybrid cloud, steady state. There are three levels of transformation, virtualization, hybrid cloud, DevOps, now- >> Right? >> ... multi-cloud, so they're in chapter three of their journey- >> That's right. >> Really innovative company, like IBM, so put the plugin. What's going on in your world? Take a minute to explain what you want. >> Right on. So here we are at VMware Explorer, really excited to be here. We're showcasing two aspects of the IBM portfolio, all of the releases and announcements that we're making around the IBM cloud. In fact, you should come check out the product demonstration for the IBM Cloud Satellite. And I don't think they've coined it this, but I like to call it the VMware edition, because it has all of the VMware services and tools built into it, to make it easier to move your workloads around. We certainly have the infrastructure side on the storage, talking about how we can help organizations, not only accelerate their deployments in, let's say Tanzu or Containers, but even how we help them transform the application stack that's running on top of their virtualized environment in the most consistent and secure way possible. >> Multiple years of relationships with VMware. IBM, VMware together. Congratulations. >> () That's right. >> () Thanks for coming on. >> Hey, thanks (indistinct). Thank you very much. >> A lot more live coverage here at Moscone west. This is theCUBE. I'm John Furrier with Dave Vellante. Thanks for watching. Two more days of wall-to-wall coverage continuing here. Stay tuned. (soothing music)
SUMMARY :
Great to see you. Hey, good to see you guys as well. IBM always has the best One of the things we were chatting, And just data and the role of And it's just all on storage. for the data it holds. and the infrastructure team? What's the conversations? so the Z System line, as well What's the relationship with VMware? So one of the things that we announced and talk about the industry. of the conversation. and having to redo things as you move from AI, remember the quote from IBM is, but bringing back the () At the same time, that are in the market today, And have that pattern of data too. is that it doesn't stay on the box. and the Red Hat acquisition that have to be put into play, for the customer, ... or just hardware. that are all sitting around the table. and I'm buying it to that need to be addressed, expertise in that area. Scott, great to have you on. There are three levels of transformation, of their journey- Take a minute to explain what you want. because it has all of the relationships with VMware. Thank you very much. Two more days of wall-to-wall
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Dave | PERSON | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
IBM | ORGANIZATION | 0.99+ |
Scott | PERSON | 0.99+ |
VMware | ORGANIZATION | 0.99+ |
Scott Baker | PERSON | 0.99+ |
John | PERSON | 0.99+ |
San Francisco | LOCATION | 0.99+ |
20 years | QUANTITY | 0.99+ |
Rob Thomas | PERSON | 0.99+ |
John Furrier | PERSON | 0.99+ |
yesterday | DATE | 0.99+ |
one | QUANTITY | 0.99+ |
John Furrier | PERSON | 0.99+ |
Arvind | PERSON | 0.99+ |
Two sets | QUANTITY | 0.99+ |
both | QUANTITY | 0.99+ |
early 1980s | DATE | 0.99+ |
three days | QUANTITY | 0.98+ |
One | QUANTITY | 0.98+ |
two areas | QUANTITY | 0.97+ |
first | QUANTITY | 0.97+ |
today | DATE | 0.97+ |
last night | DATE | 0.97+ |
one box | QUANTITY | 0.96+ |
two hottest areas | QUANTITY | 0.94+ |
VMware Explorer | ORGANIZATION | 0.93+ |
first thing | QUANTITY | 0.93+ |
Red Hat | ORGANIZATION | 0.92+ |
VMware Explore | ORGANIZATION | 0.91+ |
chapter three | OTHER | 0.91+ |
two aspects | QUANTITY | 0.9+ |
Two more days | QUANTITY | 0.9+ |
IBM Infrastructure | ORGANIZATION | 0.89+ |
day two | QUANTITY | 0.88+ |
zero | QUANTITY | 0.88+ |
one medium | QUANTITY | 0.88+ |
first things | QUANTITY | 0.85+ |
IBM R&D | ORGANIZATION | 0.84+ |
Turbonomic | TITLE | 0.83+ |
SC22 Karan Batta, Kris Rice
>> Welcome back to Supercloud22, #Supercloud22. This is Dave Vellante. In 2019 Oracle and Microsoft announced a collaboration to bring interoperability between OCI, Oracle Cloud Infrastructure and Azure Clouds. It was Oracle's initial foray into so-called multi-cloud and we're joined by Karan Batta, who's the Vice President for Product Management at OCI. And Kris Rice is the Vice President of Software Development at Oracle Database. And we're going to talk about how this technology's evolving and whether it fits our view of what we call supercloud. Welcome gentlemen, thank you. >> Thanks for having us. >> So you recently just last month announced the new service. It extends on the initial partnership with Microsoft Oracle interconnect with Azure, and you refer to this as a secure private link between the two clouds, it cross 11 regions around the world, under two milliseconds data transmission sounds pretty cool. It enables customers to run Microsoft applications against data stored in Oracle databases without any loss in efficiency or presumably performance. So we use this term supercloud to describe a service or sets of services built on hyper scale infrastructure that leverages the core primitives and APIs of an individual cloud platform, but abstracts that underlying complexity to create a continuous experience across more than one cloud. Is that what you've done? >> Absolutely. I think it starts at the top layer in terms of just making things very simple for the customer, right. I think at the end of the day we want to enable true workloads running across two different clouds where you're potentially running maybe the app layer in one and the database layer or the back in another. And the integration I think starts with, you know, making it ease of use. Right. So you can start with things like, okay can you log into your second or your third cloud with the first cloud provider's credentials? Can you make calls against another cloud using another cloud's APIs? Can you peer the networks together? Can you make it seamless? I think those are all the components that are sort of, they're kind of the ingredients to making a multi-cloud or supercloud experience successful. >> Oh, thank you for that, Karan. So I guess there's a question for Chris is I'm trying to understand what you're really solving for? What specific customer problems are you focused on? What's the service optimized for presumably it's database but maybe you could double click on that. >> Sure. So, I mean, of course it's database. So it's a super fast network so that we can split the workload across two different clouds leveraging the best from both, but above the networking, what we had to do do is we had to think about what a true multi-cloud or what you're calling supercloud experience would be it's more than just making the network bites flow. So what we did is we took a look as Karan hinted at right, is where is my identity? Where is my observability? How do I connect these things across how it feels native to that other cloud? >> So what kind of engineering do you have to do to make that work? It's not just plugging stuff together. Maybe you could explain a little bit more detail, the the resources that you had to bring to bear and the technology behind the architecture. >> Sure. I think, it starts with actually, what our goal was, right? Our goal was to actually provide customers with a fully managed experience. What that means is we had to basically create a brand new service. So, we have obviously an Azure like portal and an experience that allows customers to do this but under the covers, we actually have a fully managed service that manages the networking layer, the physical infrastructure, and it actually calls APIs on both sides of the fence. It actually manages your Azure resources, creates them but it also interacts with OCI at the same time. And under the covers this service actually takes Azure primitives as inputs. And then it sort of like essentially translates them to OCI action. So, we actually truly integrated this as a service that's essentially built as a PaaS layer on top of these two clouds. >> So, the customer doesn't really care or know maybe they know cuz they might be coming through, an Azure experience, but you can run work on either Azure and or OCI. And it's a common experience across those clouds. Is that correct? >> That's correct. So like you said, the customer does know that they know there is a relationship with both clouds but thanks to all the things we built there's this thing we invented we created called a multi-cloud control plane. This control plane does operate against both clouds at the same time to make it as seamless as possible so that maybe they don't notice, you know, the power of the interconnect is extremely fast networking, as fast as what we could see inside a single cloud. If you think about how big a data center might be from edge to edge in that cloud, going across the interconnect makes it so that that workload is not important that it's spanning two clouds anymore. >> So you say extremely fast networking. I remember I used to, I wrote a piece a long time ago. Larry Ellison loves InfiniBand. I presume we've moved on from them, but maybe not. What is that interconnect? >> Yeah, so it's funny you mentioned interconnect you know, my previous history comes from Edge PC where we actually inside OCI today, we've moved from Infinite Band as is part of Exadata's core to what we call Rocky V two. So that's just another RDMA network. We actually use it very successfully, not just for Exadata but we use it for our standard computers that we provide to high performance computing customers. >> And the multi-cloud control plane runs. Where does that live? Does it live on OCI? Does it live on Azure? Yes? >> So it does it lives on our side. Our side of the house as part of our Oracle OCI control plane. And it is the veneer that makes these two clouds possible so that we can wire them together. So it knows how to take those Azure primitives and the OCI primitives and wire them at the appropriate levels together. >> Now I want to talk about this PaaS layer. Part of supercloud, we said to actually make it work you're going to have to have a super PaaS. I know we're taking this this term a little far but it's still it's instructive in that, what we surmised was you're probably not going to just use off the shelf, plain old vanilla PaaS, you're actually going to have a purpose built PaaS to solve for the specific problem. So as an example, if you're solving for ultra low latency, which I think you're doing, you're probably no offense to my friends at Red Hat but you're probably not going to develop this on OpenShift, but tell us about that PaaS layer or what we call the super PaaS layer. >> Go ahead, Chris. >> Well, so you're right. We weren't going to build it out on OpenShift. So we have Oracle OCI, you know, the standard is Terraform. So the back end of everything we do is based around Terraform. Today, what we've done is we built that control plane and it will be API drivable, it'll be drivable from the UI and it will let people operate and create primitives across both sides. So you can, you mentioned developers, developers love automation, right, because it makes our lives easy. We will be able to automate a multi-cloud workload from ground up config is code these days. So we can config an entire multi-cloud experience from one place. >> So, double click Chris on that developer experience. What is that like? They're using the same tool set irrespective of, which cloud we're running on is, and it's specific to this service or is it more generic, across other Oracle services? >> There's two parts to that. So one is the, we've only onboarded a portion. So the database portfolio and other services will be coming into this multi-cloud. For the majority of Oracle cloud, the automation, the config layer is based on Terraform. So using Terraform, anyone can configure everything from a mid-tier to an Exadata, all the way soup to nuts from smallest thing possible to the largest. What we've not done yet is integrated truly with the Azure API, from command line drivable. That is coming in the future. It is on the roadmap, it is coming. Then they could get into one tool but right now they would have half their automation for the multi-cloud config on the Azure tool set and half on the OCI tool set. >> But we're not crazy saying from a roadmap standpoint that will provide some benefit to developers and is a reasonable direction for the industry generally but Oracle and Microsoft specifically. >> Absolutely. I'm a developer at heart. And so one of the things we want to make sure is that developers' lives are as easy as possible. >> And is there a metadata management layer or intelligence that you've built in to optimize for performance or low latency or cost across the respective clouds? >> Yeah, definitely. I think, latency's going to be an important factor. The service that we've initially built isn't going to serve, the sort of the tens of microseconds but most applications that are sort of in, running on top of the enterprise applications that are running on top of the database are in the several millisecond range. And we've actually done a lot of work on the networking pairing side to make sure that when we launch these resources across the two clouds we actually picked the right trial site. We picked the right region we pick the right availability zone or domain. So we actually do the due diligence under the cover so the customer doesn't have to do the trial and error and try to find the right latency range. And this is actually one of the big reasons why we only launch the service on the interconnect regions. Even though we have close to, I think close to 40 regions at this point in OCI, this service is only built for the regions that we have an interconnect relationship with Microsoft. >> Okay, so you started with Microsoft in 2019. You're going deeper now in that relationship, is there any reason that you couldn't, I mean technically what would you have to do to go to other clouds? You talked about understanding the primitives and leveraging the primitives of Azure. Presumably if you wanted to do this with AWS or Google or Alibaba, you would have to do similar engineering work, is that correct? Or does what you've developed just kind of poured over to any cloud? >> Yeah, that's absolutely correct Dave. I think Chris talked a lot about the multi-cloud control plane, right? That's essentially the control plane that goes and does stuff on other clouds. We would have to essentially go and build that level of integration into the other clouds. And I think, as we get more popularity and as more products come online through these services I think we'll listen to what customers want. Whether it's, maybe it's the other way around too, Dave maybe it's the fact that they want to use Oracle cloud but they want to use other complimentary services within Oracle cloud. So I think it can go both ways. I think, the market and the customer base will dictate that. >> Yeah. So if I understand that correctly, somebody from another cloud Google cloud could say, Hey we actually want to run this service on OCI cuz we want to expand our market. And if TK gets together with his old friends and figures that out but then we're just, hypothesizing here. But, like you said, it can go both ways. And then, and I have another question related to that. So, multi clouds. Okay, great. Supercloud. How about the Edge? Do you ever see a day where that becomes part of the equation? Certainly the near Edge would, you know, a Home Depot or Lowe's store or a bank, but what about the far Edge, the tiny Edge. Can you talk about the Edge and where that fits in your vision? >> Yeah, absolutely. I think Edge is a interestingly, it's getting fuzzier and fuzzier day by day. I think, the term. Obviously every cloud has their own sort of philosophy in what Edge is, right. We have our own. It starts from, if you do want to do far Edge, we have devices like red devices, which is our ruggedized servers that talk back to our control plane in OCI. You could deploy those things unlike, into war zones and things like that underground. But then we also have things like clouded customer where customers can actually deploy components of our infrastructure like compute or Exadata into a facility where they only need that certain capability. And then a few years ago we launched, what's now called Dedicated Region. And that actually is a different take on Edge in some sense where you get the entire capability of our public commercial region, but within your facility. So imagine if a customer was to essentially point a finger on a commercial map and say, Hey, look, that region is just mine. Essentially that's the capability that we're providing to our customers, where if you have a white space if you have a facility, if you're exiting out of your data center space, you could essentially place an OCI region within your confines behind your firewall. And then you could interconnect that to a cloud provider if you wanted to, and get the same multi-cloud capability that you get in a commercial region. So we have all the spectrums of possibilities here. >> Guys, super interesting discussion. It's very clear to us that the next 10 years of cloud ain't going to be like the last 10. There's a whole new layer. Developing, data is a big key to that. We see industries getting involved. We obviously didn't get into the Oracle Cerner acquisitions. It's a little too early for that but we've actually predicted that companies like Cerner and you're seeing it with Goldman Sachs and Capital One they're actually building services on the cloud. So this is a really exciting new area and really appreciate you guys coming on the Supercloud22 event and sharing your insights. Thanks for your time. >> Thanks for having us. >> Okay. Keep it right there. #Supercloud22. We'll be right back with more great content right after this short break. (lighthearted marimba music)
SUMMARY :
And Kris Rice is the Vice President that leverages the core primitives And the integration I think What's the service optimized but above the networking, the resources that you on both sides of the fence. So, the customer at the same time to make So you say extremely fast networking. computers that we provide And the multi-cloud control plane runs. And it is the veneer that So as an example, if you're So the back end of everything we do and it's specific to this service and half on the OCI tool set. for the industry generally And so one of the things on the interconnect regions. and leveraging the primitives of Azure. of integration into the other clouds. of the equation? that talk back to our services on the cloud. with more great content
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Karan Batta | PERSON | 0.99+ |
Chris | PERSON | 0.99+ |
Oracle | ORGANIZATION | 0.99+ |
Microsoft | ORGANIZATION | 0.99+ |
OCI | ORGANIZATION | 0.99+ |
ORGANIZATION | 0.99+ | |
Alibaba | ORGANIZATION | 0.99+ |
Dave Vellante | PERSON | 0.99+ |
Capital One | ORGANIZATION | 0.99+ |
Goldman Sachs | ORGANIZATION | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Kris Rice | PERSON | 0.99+ |
Karan | PERSON | 0.99+ |
Cerner | ORGANIZATION | 0.99+ |
Lowe | ORGANIZATION | 0.99+ |
2019 | DATE | 0.99+ |
second | QUANTITY | 0.99+ |
Dave | PERSON | 0.99+ |
two parts | QUANTITY | 0.99+ |
11 regions | QUANTITY | 0.99+ |
Larry Ellison | PERSON | 0.99+ |
one | QUANTITY | 0.99+ |
both | QUANTITY | 0.99+ |
two clouds | QUANTITY | 0.99+ |
Supercloud22 | EVENT | 0.99+ |
both sides | QUANTITY | 0.99+ |
Home Depot | ORGANIZATION | 0.99+ |
Red Hat | ORGANIZATION | 0.99+ |
third cloud | QUANTITY | 0.99+ |
last month | DATE | 0.98+ |
one place | QUANTITY | 0.98+ |
both ways | QUANTITY | 0.98+ |
Supercloud | ORGANIZATION | 0.98+ |
OpenShift | TITLE | 0.98+ |
Today | DATE | 0.98+ |
one tool | QUANTITY | 0.98+ |
Exadata | ORGANIZATION | 0.97+ |
more than one cloud | QUANTITY | 0.97+ |
first cloud | QUANTITY | 0.96+ |
Azure | TITLE | 0.96+ |
Edge PC | ORGANIZATION | 0.96+ |
Edge | ORGANIZATION | 0.96+ |
10 | QUANTITY | 0.96+ |
two different clouds | QUANTITY | 0.96+ |
Oracle Database | ORGANIZATION | 0.96+ |
TK | PERSON | 0.95+ |
both clouds | QUANTITY | 0.95+ |
under two milliseconds | QUANTITY | 0.95+ |
40 regions | QUANTITY | 0.94+ |
today | DATE | 0.94+ |
single cloud | QUANTITY | 0.93+ |
Vice President | PERSON | 0.91+ |
Terraform | ORGANIZATION | 0.91+ |
PaaS | TITLE | 0.91+ |
InfiniBand | ORGANIZATION | 0.91+ |
tens of microseconds | QUANTITY | 0.9+ |
#Supercloud22 | EVENT | 0.9+ |
Oracle Cloud Infrastructure | ORGANIZATION | 0.9+ |
double | QUANTITY | 0.88+ |
OCI | COMMERCIAL_ITEM | 0.88+ |
Azure | ORGANIZATION | 0.86+ |
Rajiv Ramaswami, Nutanix | Supercloud22
[digital Music] >> Okay, welcome back to "theCUBE," Supercloud 22. I'm John Furrier, host of "theCUBE." We got a very special distinguished CUBE alumni here, Rajiv Ramaswami, CEO of Nutanix. Great to see you. Thanks for coming by the show. >> Good to be here, John. >> We've had many conversations in the past about what you guys have done. Again, the perfect storm is coming, innovation. You guys are in an interesting position and the Supercloud kind of points this out. We've been discussing about how multi-cloud is coming. Everyone has multiple clouds, but there's real structural change happening right now in customers. Now there's been change that's happened, cloud computing, cloud operations, developers are doing great, but now something magical's happening in the industry. We wanted to get your thoughts on that, that's called Supercloud. >> Indeed. >> How do you see this shift? I mean, devs are doing great. Ops and security are trying to get cloud native. What's happening in your opinion? >> Yeah, in fact, we've been talking about something very, very similar. I like the term supercloud. We've been calling it hybrid multicloud essentially, but the point being, companies are running their applications and managing their data. This is lifeblood for them. And where do they sit? Of course, some of these will sit in the public cloud. Some of these are going to sit inside their data centers and some of these applications increasingly are going to run in edges. And now what most companies struggle with is every cloud is different, their on-prem is different, their edge is different and they then have a scarcity of staff. Operating models are different. Security is different. Everything about it is different. So to your point, people are using multiple clouds and multiple locations. But you need to think about cloud as an operating model and what the supercloud or hyper multicloud delivers is really a consistent model, consistent operating model. One way for IT teams to operate across all of these environments and deliver an agile infrastructure as a service model to their developers. So that from a company's managed point of view, they can run their stuff wherever they want to, completely with consistency, and the IT teams can help support that easily. >> You know, it's interesting. You see a lot of transformation, certainly from customers, they were paying a lot of operating costs for IT. Now CapEx is covered by, I mean, CapEx now is covered by the cloud, so it's OpEx. They're getting core competencies and they're becoming very fluent in cloud technologies. And at the same time the vendors are saying, "Hey, you know, buy our stuff." And so you have the change over, how people relate to each other, vendors and customers, where there's a shared model where, okay, you got use cases for the cloud and use cases on-premise, both CapEx, both technology. You mentioned that operating model, Where's the gap? 'Cause nobody wants complexity, and you know, the enterprise, people love to add, solve complexity with more complexity. >> That's exactly the problem. You just hit the nail on the head, which is enterprise software tends to be very complex. And fundamentally complexity has been a friend for vendors, but the point being, it's not a friend for a company that's trying to manage their IT infrastructure. It's an an enemy because complexity means you need to train your staff, you need very specialized teams, and guess what? Talent is perhaps the most scarce thing out there, right? People talk about, you know, in IT, they always talk about people, process, technology. There's plenty of technology out there, but right now there's a big scarcity of people, and I think that talent is a major issue. And not only that, you know, it's not that we have as many specialized people who know storage, who know compute, who know networking. Instead, what you're getting is a bunch of new college grads coming in, who have generalized skill sets, who are used to having a consumer like experience with their experience with software and applications, and they want to see that from their enterprise software vendors. >> You know, it's just so you mentioned that when the hyper converged, we saw that movie that was bringing things together. Now you're seeing the commoditization of compute storage and networking, but yet the advancement of higher level services and things like Kubernetes for orchestration, that's an operating opportunity for people to get more orchestration, but that's a trade off. So we're seeing a new trend in the supercloud where it's not all Kubernetes all the time. It's not all AWS all the time. It's the new architecture, where there's trade offs. How do you see some of these key trade offs? I know you talked to a lot of your customers, they're kind of bringing things together, putting things together, kind of a day zero mentality. What are some of those key trade offs and architectural decision points? >> So there's a couple of points there, I think. First is that most customers are on a journey of thoughts and their journey is, well, they want to have a modern infrastructure. Many of them have on-prem footprints, and they're looking to modernize that infrastructure. They're looking to adopt cloud operating models. They're looking to figure out how they can extend and leverage these public clouds appropriately. The problem is when they start doing this, they find that everything is different. Every little piece, every cloud is different, their on-prem is different, and this results in a lot of complexity. In some ways, we at Nutanix solved this problem within data centers by converging separate silos of high computer storage and network. That's what we did with HCI. And now this notion of supercloud is just simply about converging different clouds and different data. >> Kind of the same thing. >> And on-prem and edges, right? Trying to bring all of these together rather than having separate teams, separate processes, separate technologies for every one of these, try to create consistency, and it makes life a lot simpler and easier. >> Yeah, I wanted to connect those dots because I think this is kind of interesting with the supercloud was, you get good at something in one cloud, then you bring that best practice and figure out how to make that work across edge and on-premise, which is, I mean, basically cloud operations. >> Exactly. It's cloud operations, which is why we say it's a cloud is an operating model. It's a way you operate your environment, but that environment could be anywhere. You're not restricted to it being in the public cloud. It's in your data center, that's in the edges. >> Okay, so when I hear about substrates, abstraction layers, I think two things, innovation cause you extract away complexity, then I also think about from the customer's perspective, maybe, lock-in. >> Yes. >> Whoa, oh, promises, promises. Lock in is a fear and ops teams and security teams, they know the downside of lock-in. >> Yes. >> Choice is obviously important. Devs don't care. I mean, like, whatever runs the software, go faster, but ops and security teams, they want choice, but they want functionality. So, what's that trade off? Talk about this lock-in dynamic, and how to get around. >> Yeah. >> And I think that's been some of the fundamental tenants of what we do. I mean, of course, people don't like lock-in, but they also want simplicity. And we provide both. Our philosophy is we want to make things as simple as possible. And that's one of the big differentiators that we have compared to other players. Our whole mission inside the company is to make things simple. But at the same time, we also want to provide customers with that flexibility and every layer in the stack, you don't want to lock to your point. So, if at the very bottom hardware, choice of hardware. Choice of hardware could be any of the vendors you work with or public cloud, Bare Metal. When you look at hypervisor, lots of choices. You got VMware, you got our own Ahv, which is KBM-based open source hypervisor, no lock-in there, provide complete flexibility. Then we have a storage stack, a distributor storage stack, which we provide. And then of course layers about that. Kubernetes, pick your Kubernetes, runtime of choice. Pick your Kubernetes, orchestrator and management of choice. So our whole goal is to provide that flexibility at every layer in the stack, allowing the customer to make the choice. They can decide how much they want to go with the full stack or how much they want to go piecemeal it, and there's a trade off there. And they get more flexibility, but at the cost of a little bit more complexity, and that, I think, is the trade off that each customer has to weigh. >> Okay, you guys have been transforming for many, many years. We've been covering on SiliconANGLE and theCUBE to software. >> Yes. >> I know you have hardware as well, but also software services. And you've been on the cloud bandwagon years ago, and now you made a lot of progress. What's the current strategy for you guys? How do you fit in? 'Cause public cloud has great use cases, great examples of success there, but that's not the only game in town. You've got on-premise and edge. What are you guys doing? What specifically are customers leaning on you for? How are you providing that value? What's the innovation strategy? >> Very simply, we provide a cloud software platform today. We don't actually sell anymore hardware. They're not on our books anymore. We're a pure software company. So we sell a cloud soft platform on top of which our customers can run all their applications, including the most mission critical applications. And they can use our platform wherever, to your point, on the supercloud. I keep coming back to that. We started out with our on-prem genes. That's where we started. We've extended that to Azure and AWS. And we are extending, of course, we've always been very strong when it came to the edge and extending that out to the edge. And so today we have a cloud platform that allows our customers to run these apps, whatever the apps may be, and manage all their data because we provide structured and unstructured data, blocks, files, objects, are all part of the platform. And we provide that in a consistent way across all of these locations, and we deliver the cloud operating model. >> So on the hardware thing, you guys don't have hardware anymore. >> We don't sell hardware anymore. We work with a whole range of hardware partners, HP, Dell, Supermicro, name it, Lenovo. >> Okay, so if I'm like a Telco and I want to build a data center at my tower, which could be only a few boxes, who do I buy that from? >> So you buy the software from us and you can buy the hardware from your choice of hardware partners. >> So yeah, whoever's selling the servers at that point. >> Yeah. >> Okay, so you send on the server. >> Yeah, we send on the server. >> Yeah, sound's good. So no hardware, so back to software that could transfer. How's that going, good? >> It's gone very well because, you know, we made two transformations. One is of course we were selling appliances when we started out, and then we started selling software, and now it's all fully subscription. So we're 100% subscription company. So our customers are buying subscriptions. They have the flexibility to get whatever duration they want. Again, to your philosophy, there's no lock-in. There is no long term lock-in here. We are happy if a customer chooses us for a year versus three years, whatever they like. >> I know that you've been on the road with customers this summer. It's been great to get out and see people in person. What are you learning? What are they viewing? What's their new Instagram picture of Nutanix? How do they see you? And how do you want them to see you? >> What they've seen us in the past has been, we created this whole category of HCI, Hyperconverged Infrastructure. They see us as a leader there and they see us as running some of their applications, not necessarily all their applications, especially at the very big customers. In the smaller customers, they run everything on us, but in the bigger customers, they run some workload, some applications on us. And now what they see is that we are now, if taking them on the journey, not only to run all their applications, whatever, they may be, including the most mission critical database workloads or analytics workloads on our platform, but also help them extend that journey into the public cloud. And so that's the journey we are on, modernized infrastructure. And this is what most of our customers are on. Modernizing the infrastructure, which we help and then creating a cloud operating model, and making that available everywhere. >> Yeah, and I think one, that's a great, and again, that's a great segue to supercloud, which I want to get your thoughts on because AWS, for example, spent all that CapEx, they're called the hyperscaler. They got H in there and that's a hyperscale in there. And now you can leverage that CapEx by bringing Nutanix in, you're a hyperscale-like solution on-premise and edge. So you take advantage of both. >> Absolutely. >> The success. >> Exactly. >> And a trajectory of cloud, so your customers, if I get this right, have all the economies of scale of cloud, plus the benefits of the HCI software kind of vibe. >> Absolutely. And I'll give you some examples how this plays out in the real world based on all my travels here. >> Yeah, please do. So we just put out a case study on a customer called FSP. They're a betting company, online betting company based out of the UK. And they run on our platform on-prem, but what they saw was they had to expand their operations to Asia and they went to Taiwan. And the problem for them was, they were told they had to get in business in Taiwan within a matter of a month, and they didn't know how to do it. And then they realized that they could just take the exact same software that they were running on our platform, and run it in an AWS region sitting in Taiwan. And they were up in business in less than a month, and they had now operations ready to go in Asia. I mean, that's a compelling business value. >> That's agile, that's agile. >> Agile. >> That's agile and a great... >> Versus the alternative would be weeks, months. >> Months, first of all, I mean, just think about, they have to open a data center, which probably takes them, they have to buy the hardware, which, you know, with supply chain deliveries, >> Supply chain. and God knows how long that takes. >> Oh God, yeah. >> So compared to all that here, they were up and running within a matter of a month. It's a, just one example of a very compelling value proposition. >> So you feel good about where you guys are right now relative to these big waves coming? >> Yeah, I think so. Well, I mean, you know, there's a lot of big waves coming and. >> What are the biggest ones that you see? >> Well, I mean, I think there's clearly one of the big ones, of course, out there is Broadcom buying VMware or potentially buying VMware and great company. I used to work there for many years and I have a lot of respect for what VMware has done for the industry in terms of virtualization of servers and creating their entire portfolio. >> Is it true you're hiring a lot of VMware folks? >> Yes, I mean a lot of them coming over now in anticipation, we've been hiring our fair share, but they're going other places too. >> A lot of VMware alumni at Nutanix now. >> Yes, there are certainly, we have our share of VMware alumni. We also have a share of alumni from others. >> We call the V mafia, by the way. (laughs) >> I dunno about the V mafia, but. But it's a great company, but I think right now a lot of customers are wondering what's going to happen, and therefore, they are looking at potentially what are the other alternatives? And we are very much front and center in that discussions. >> Well, Dave Alante and I, and the team have been very bullish on on-premise cloud operations. You guys are doing there. How would you describe the supercloud concept to a customer when they say, "Hey, what's the supercloud? "It's becoming a thing. "How would you describe what it is and the benefits?" >> Yeah, and I think the first thing is to tell them, what problem are you looking to solve? And the problem for them is, they have applications everywhere. They have data everywhere. How do their teams run and deal with all of this? And what they find is the way they're doing it today is different operating platform for every one of these. If you're on Amazon, it's one platform. If you're an Azure, it's another. If you're on-prim, it's a third. If you want to go to the edge, probably fourth, and it's a messy, complex thing for their IT teams. What a supercloud does is essentially unify all of these into a consistent operating model. You get a cloud operating model, you get the agility and the benefits, but with one way of handling your compute storage network needs, one way of handling your security policies, and security constructs, and giving you that, so such a dramatic simplification on the one side, and it's a dramatic enabler because it now enables you to run these applications wherever you want completely free. >> Yeah. It really bridges the cloud native. It kind of the interplay on the cloud between SAS and IAS, solves a lot of problems, highly integrated, that takes that model to the complexity of multiple environments. >> Exactly. >> That's a super cool environment. >> (John speaks over Rajiv) Across any environment, wherever. It's changing this thing from cloud being associated with the public cloud to cloud being available everywhere in a consistent way. >> And that's essentially the goodness of cloud, going everywhere. >> Yeah. >> Yeah, but that extension is what you call a supercloud. >> Rajiv, thank you so much for your time. I know you're super valuable, and you got a company to run. One final question for you. The edge is exploding. >> Yes. >> It's super dynamic. We kind of all know it's there. The industrial edge. You got the IOT edge and just the edge in general. On-premise, I think, is hybrid, it's the steady state, looking good. Everything's good. It's getting better, of course, things with cloud native and all that good stuff. What's your view of the edge? It's super dynamic, a lot of shifting, OT, IT, that's actually transformed. >> Yes, absolutely. >> Huge industrial thing. Amazon is buying, you know, industrial robots now. >> Yes. >> Space is around the corner, a lot of industrial advance with machine learning and the software side of things, so the edge is exploding. >> Yeah, you know, and I think one of the interesting things about that exploding edge is that it tends to be both compute and data heavy. It's not this notion of very thin edges. Yes, you've got thin edges too, of course, which may just be sensors on the one hand, but you're seeing an increased need for compute and storage at the edges, because a lot of these are crunching, crunching applications that require a crunch and generate a lot of data, crunch a lot of data. There's latency requirements that require you and there's even people deploying GPUs at the edges for image recognition and so forth, right? So this is. >> The edge is the data center now. >> Exactly. Think of the edge starting to look at the edge of the mini data center, but one that needs to be highly automated. You're not going to be able to put people at every one of these locations. You've got to be able to do all your services, lifecycle management, everything completely remove. >> Self-healing, all this good stuffs. >> Exactly. It has to be completely automated and self-healing and upgradeable and you know, life cycle managed from the cloud, so to speak. And so there's going to be this interlinkage between the edge and the cloud, and you're going to actually, essentially what you need is a cloud managed edge. >> Yeah, and this is where the super cloud extends, where you can extend the value of what you're building to these dynamically new emerging, and it's just the beginning. There'll be more. >> Oh, there's a ton of new applications emerging there. And I think that's going to be, I mean, there's people out there who code that half of data is going to be generated at the edge in a couple of years. >> Well, Rajiv, I am excited that you can bring the depth of technical architectural knowledge to the table on supercloud, as well as run a company. Congratulations on your success, and thanks for sharing with us and being part of our community. >> No, thank you, John, for having me on your show. >> Okay. Supercloud 22, we're continuing to open up the conversation. There is structural change happening. We're going to watch it. We're going to make it an open conversation. We're not going to make a decision. We're going to just let everyone discuss it and see how it evolves and on the best in the business discussing it, and we're going to keep it going. Thanks for watching. (digital music)
SUMMARY :
Thanks for coming by the show. and the Supercloud kind How do you see this shift? and the IT teams can and you know, the enterprise, Talent is perhaps the most It's not all AWS all the time. and they're looking to and it makes life a is kind of interesting It's a way you operate your environment, from the customer's Lock in is a fear and ops and how to get around. of the vendors you work with Okay, you guys have been transforming What's the current strategy for you guys? that out to the edge. So on the hardware thing, of hardware partners, and you can buy the hardware the servers at that point. So no hardware, so back to They have the flexibility to get And how do you want them to see you? And so that's the journey we are on, And now you can leverage that have all the economies of scale of cloud, in the real world and they didn't know how to do it. that's agile. Versus the alternative and God knows how long that takes. So compared to all that here, Well, I mean, you know, and I have a lot of respect Yes, I mean a lot of them of VMware alumni. We call the V mafia, by the way. I dunno about the V mafia, but. and the team have been very bullish on And the problem for them is, It kind of the interplay on It's changing this thing the goodness of cloud, is what you call a supercloud. and you got a company to run. and just the edge in general. Amazon is buying, you know, and the software side of things, and generate a lot of data, Think of the edge starting from the cloud, so to speak. and it's just the beginning. And I think that's going to be, I mean, excited that you can bring for having me on your show. and on the best in the
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
John | PERSON | 0.99+ |
Rajiv Ramaswami | PERSON | 0.99+ |
Taiwan | LOCATION | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
Rajiv | PERSON | 0.99+ |
Asia | LOCATION | 0.99+ |
Nutanix | ORGANIZATION | 0.99+ |
Dave Alante | PERSON | 0.99+ |
Telco | ORGANIZATION | 0.99+ |
Lenovo | ORGANIZATION | 0.99+ |
John Furrier | PERSON | 0.99+ |
UK | LOCATION | 0.99+ |
Amazon | ORGANIZATION | 0.99+ |
100% | QUANTITY | 0.99+ |
three years | QUANTITY | 0.99+ |
HP | ORGANIZATION | 0.99+ |
AWS | ORGANIZATION | 0.99+ |
Supermicro | ORGANIZATION | 0.99+ |
VMware | ORGANIZATION | 0.99+ |
First | QUANTITY | 0.99+ |
less than a month | QUANTITY | 0.99+ |
Broadcom | ORGANIZATION | 0.99+ |
CapEx | ORGANIZATION | 0.99+ |
One | QUANTITY | 0.99+ |
both | QUANTITY | 0.99+ |
today | DATE | 0.99+ |
CUBE | ORGANIZATION | 0.99+ |
one | QUANTITY | 0.99+ |
each customer | QUANTITY | 0.99+ |
two things | QUANTITY | 0.99+ |
a year | QUANTITY | 0.99+ |
one platform | QUANTITY | 0.99+ |
Bare Metal | ORGANIZATION | 0.98+ |
fourth | QUANTITY | 0.98+ |
one cloud | QUANTITY | 0.98+ |
two transformations | QUANTITY | 0.98+ |
Supercloud | ORGANIZATION | 0.98+ |
agile | TITLE | 0.97+ |
one way | QUANTITY | 0.97+ |
theCUBE | ORGANIZATION | 0.97+ |
ORGANIZATION | 0.97+ | |
FSP | ORGANIZATION | 0.97+ |
first thing | QUANTITY | 0.97+ |
SiliconANGLE | ORGANIZATION | 0.96+ |
supercloud | ORGANIZATION | 0.96+ |
Agile | TITLE | 0.95+ |
a month | QUANTITY | 0.95+ |
third | QUANTITY | 0.95+ |
OpEx | ORGANIZATION | 0.95+ |
One final question | QUANTITY | 0.94+ |
HCI | ORGANIZATION | 0.94+ |
one side | QUANTITY | 0.93+ |
Supercloud22 | ORGANIZATION | 0.91+ |
One way | QUANTITY | 0.9+ |
Hyperconverged Infrastructure | ORGANIZATION | 0.9+ |
big | EVENT | 0.9+ |
one example | QUANTITY | 0.89+ |
Supercloud 22 | ORGANIZATION | 0.87+ |
big waves | EVENT | 0.8+ |
Azure | TITLE | 0.79+ |
Rob Emsley, Dell Technologies
(upbeat music) >> Welcome back to a Blueprint For Trusted Infrastructure. We're here with Rob Emsley. Who's the director of product marketing for data protection and cyber security. Rob, good to see you. A new role. >> Yeah. Good to be back, Dave. Good to see you. Yeah, it's been a while since we chatted last and, you know, one of the changes in my world is that I've expanded my responsibilities beyond data protection marketing to also focus on cybersecurity marketing specifically for our infrastructure solutions group. So certainly that's, you know, something that really has driven us, you know, to come and have this conversation with you today. >> So data protection obviously has become an increasingly important component of the cyber security space. I don't think necessarily of, you know, traditional backup and recovery as security, to me, it's an adjacency. I know some companies have said, oh, yeah. Now we're a security company. They're kind of chasing the valuation bubble. >> For sure. >> Dell's interesting because you have, you know, data protection in the form of backup and recovery and data management, but you also have security, you know, direct security capabilities. So you're sort of bringing those two worlds together and it sounds like your responsibility is to connect those dots. Is that right? >> Absolutely. Yeah. I mean, I think that the reality is is that security is a multi-layer discipline. I think the days of thinking that it's one or another technology that you can use or process that you can use to make your organization secure are long gone. I mean, certainly you actually correct. If you think about the backup and recovery space, I mean, people have been doing that for years, you know, certainly backup and recovery, it's all about the recovery. It's all about getting yourself backup and running when bad things happen. And one of the realities, unfortunately today is that one of the worst things that can happen is cyber attacks. You know, ransomware, malware are all things that are top of mind for all organizations today. And that's why you see a lot of technology and a lot of innovation going into the backup and recovery space because if you have a copy, a good copy of your data, then that is really the first place you go to recover from a cyber attack. And that's why it's so important. The reality is is that unfortunately the cyber criminals keep on getting smarter. I don't know how it happens, but one of the things that is happening is that the days of them just going after your production data are no longer the only challenge that you have, they go after your backup data as well. So over the last half a decade, Dell Technologies with its backup and recovery portfolio has introduced the concept of isolated cyber recovery vaults. We've had many conversations about that over the years and that's really a big tenant of what we do in the data protection portfolio. >> So this idea of cybersecurity resilience that definition is evolving. What does it mean to you? >> Yeah, I think the analyst team over at Gartner, they wrote a very insightful paper called you will be hacked embrace the breach. And the whole basis of this analysis is so much money's been spent on prevention is that what's out of balance is the amount of budget that companies have spent on cyber resilience and cyber resilience is based upon the premise that you will be hacked. You have to embrace that fact and be ready and prepared to bring yourself back into business. You know, and that's really where cyber resiliency is very, very different than cyber security and prevention, you know, and I think that balance of get your security disciplines well funded, get your defenses as good as you can get them but make sure that if the inevitable happens and you find yourself compromised that you have a great recovery plan and certainly a great recovery plan, it's really the basis of any good, solid data protection backup from recovery philosophy. >> So if I had to do a SWOT analysis, we don't have to do the WOT, but let's focus on the S. What would you say are Dell's strengths in this, you know, cyber security space as it relates to data protection? >> One is we've been doing it a long time. You know, we talk a lot about Dell's data protection being proven and modern. You know, certainly the experience that we've had over literally three decades of providing enterprise scale data protection solutions to our customers has really allowed us to have a lot of insight into what works and what doesn't. As I mentioned to you, one of the unique differentiators of our solution is the cyber recovery vaulting solution that we introduce a little over five years ago, five, six years. Power protect cyber recovery is something which has become a unique capability for customers to adopt on top of their investment in Dell Technologies data protection, you know, the unique elements of our solution already threefold, and we call them the three Is. It's isolation, it's a immutability and it's intelligence. And the, the isolation part is really so important because you need to reduce the attack surface of your good known copies of data. You know, you need to put it in a location that the bad actors can't get to it. And that really is the essence of a cyber recovery vault. Interestingly enough, you're starting to see the market throw out that word, you know, from many other places, but really it comes down to having a real discipline that you don't allow the security of your cyber recovery vault to be compromised insofar as allowing it to be controlled from outside of the vault, you know, allowing it to be controlled by your backup application. Our cyber recovery vaulting technology is independent of the backup infrastructure. It uses it, but it controls its own security. And that is so, so important. It's like having a vault that the only way to open it is from the inside, you know, and think about that. If you think about, you know, vaults in banks or vaults in your home, normally you have a key pad on the outside. Think of our cyber recovery vault as having its security controlled from inside of the vault. >> So nobody can get in, nothing can get in unless it's already in. And if it's already in, then it's trusted. >> Exactly, exactly. >> Yeah. So isolation's the key. And then you mentioned immutability is the second piece. >> Yeah, so immutability is also something which has been around for a long time. People talk about backup mutability or immutable backup copies. So I mutability is just the additional technology that allows the data that's inside of the vault to be unchangeable, you know, but again that immutability, you know, your mileage varies, you know, when you look across the different offers that are out there in the market especially in the backup industry. You made a very valid point earlier that the backup vendors in the market seem to be security washing their marketing messages. I mean, everybody is leaning into the ever present danger of cybersecurity, not a bad thing, but the reality is is that you have to have the technology to back it up, you know, quite literally >> Yeah, no pun intended. Right. Actually pun intended. Now what about the intelligence piece of it? That's that's AI, ML, where does that fit? >> For sure. So the intelligence piece is delivered by a solution called CyberSense. And CyberSense for us is what really gives you the confidence that what you have in your cyber recovery vault is a good clean copy of data. So it's looking at the backup copies that get driven into the cyber vault, and it's looking for anomalies. So it's not looking for signatures of malware. You know, that's what your antivirus software does. That's what your endpoint protection software does. That's on the prevention side of the equation. But what we're looking for is we're looking to ensure that the data that you need when all hell breaks loose is good and that when you get a request to restore and recover your business, you go, right, let's go and do it. And you don't have any concern that what you have in the vault has been compromised. So cyber sense is really a unique analytic solution in the market based upon the fact that it isn't looking at at cursory indicators of malware infection or ransomware introduction, it's doing full content analytics, you know, looking at, you know, has the data in any way changed, has it suddenly become encrypted? Has it suddenly become different to how it was in the previous scan? So that anomaly detection is very, very different. It's looking for, you know, like different characteristics that really are an indicator that something is going on. And, of course, if it sees it, you immediately get flagged. But the good news is is that you always have in the vault the previous copy of good known data which now becomes your restore point. >> So we're talking to Rob Emsley about how data protection fits into what Dell calls DTI, Dell Trusted Infrastructure. And I want to come back, Rob, to this notion of, and not or cause I think a lot of people are skeptical. Like how can I have great security and not introduce friction into my organization? Is that an automation play? How does Dell tackle that problem? >> I mean, I think a lot of it is across our infrastructure is is security has to be built in, I mean, intrinsic security within our servers, within our storage devices, within our elements of our backup infrastructure. I mean, security, multifactor authentication, you know, elements that make the overall infrastructure secure. You know, we have capabilities that, you know, allow us to identify whether or not configurations have changed. You know, we'll probably be talking about that a little bit more to you later in the segment, but the essence is security is not a Bolton. It has to be part of the overall infrastructure. And that's so true, certainly in the data protection space >> Give us the bottom line on how you see Dell's key differentiators. Maybe you could talk about Dell, of course, always talks about its portfolio, but why should customers, you know, lead in to Dell in this whole cyber resilience space? >> You know, staying on the data protection space as I mentioned, the work we've been doing to introduce this cyber resiliency solution for data protection is in our opinion, as good as it gets. You know, you've spoken to a number of our best customers whether it be Bob Bender from Founders Federal or more recently at (indistinct) you spoke to Tony Bryson from the Town of Gilbert. And these are customers that we've had for many years that have implemented cyber recovery vaults. And at the end of the day, they can now sleep at night. You know, that's really the peace of mind that they have is that the insurance that a data protection from Dell cyber recovery vault, a power protect cyber recovery solution gives them, you know, really allows them to, you know, just have the assurance that they don't have to pay a ransom. If they have an insider threat issue and, you know, all the way down to data deletion is they know that what's in the cyber recovery vault is good and ready for them to recover from. >> Great. Well, Rob, congratulations on the new scope of responsibility. I like how, you know, your organization is expanding as the threat surface is expanding. As we said, data protection becoming an adjacency to security, not security in and of itself. A key component of a comprehensive security strategy. Rob Emsley, thank you for coming back in theCUBE. Good to see you again. >> You too, Dave. Thanks. >> All right, in a moment, I'll be back to wrap up a blueprint for trusted infrastructure. You are watching theCUBE. (upbeat music)
SUMMARY :
Who's the director of product So certainly that's, you know, of the cyber security space. also have security, you know, is that the days of them that definition is evolving. that you have a great recovery plan in this, you know, cyber security space from outside of the vault, you know, And if it's already in, then it's trusted. immutability is the second piece. is that you have to have the That's that's AI, ML, where does that fit? that the data that you need Is that an automation play? elements that make the you know, lead in to Dell is that the insurance I like how, you know, your You too, Dave. I'll be back to wrap up a blueprint
SENTIMENT ANALYSIS :
ENTITIES
Entity | Category | Confidence |
---|---|---|
Tony Bryson | PERSON | 0.99+ |
Rob Emsley | PERSON | 0.99+ |
Dave | PERSON | 0.99+ |
Rob | PERSON | 0.99+ |
Gartner | ORGANIZATION | 0.99+ |
Dell | ORGANIZATION | 0.99+ |
second piece | QUANTITY | 0.99+ |
Bob Bender | PERSON | 0.99+ |
Dell Technologies | ORGANIZATION | 0.99+ |
one | QUANTITY | 0.99+ |
CyberSense | ORGANIZATION | 0.98+ |
Gilbert | LOCATION | 0.97+ |
three | QUANTITY | 0.97+ |
today | DATE | 0.97+ |
One | QUANTITY | 0.97+ |
DTI | ORGANIZATION | 0.96+ |
two worlds | QUANTITY | 0.95+ |
last half a decade | DATE | 0.94+ |
three decades | QUANTITY | 0.92+ |
over | DATE | 0.86+ |
five years ago | DATE | 0.81+ |
Founders Federal | ORGANIZATION | 0.77+ |
first place | QUANTITY | 0.77+ |
things | QUANTITY | 0.72+ |
six years | DATE | 0.54+ |
threefold | QUANTITY | 0.5+ |
five | QUANTITY | 0.5+ |
worst things | QUANTITY | 0.5+ |
Blueprint For Trusted Infrastructure | TITLE | 0.43+ |