At Google, enterprise tools are scalable, intelligent, secure and homegrown
The development and deployment of the Kubernetes container management platform is just one example of a technology that Google Inc. developed first as an internal tool and then made available in the enterprise community where it took off like a rocket. One container survey in 2016 found that over 50 percent of respondents did not use containers at all. A year later, not only were more respondents using containers, but 71 percent of them were using Kubernetes.
“We’ve been running containers for almost a dozen years,” said Jonathan Donaldson (pictured), technical director of the office of the chief technology officer for Google Cloud. “Four billion a week we launch and collapse. We understand uptime and scalability really well.”
Donaldson spoke with John Furrier (@furrier), host of theCUBE, SiliconANGLE Media’s mobile livestreaming studio, and guest host John Troyer (@jtroyer), at Red Hat Summit in San Francisco. They discussed machine learning tools and enterprise security practices being used inside Google today. (* Disclosure below.)
Machine learning for image recognition
With Google Cloud, the company has a prime opportunity to hear from its enterprise customers on needs other than container orchestration. The chances are good that Google will have an internal product or process that just might be of interest beyond its walls.
One of those areas involves machine learning. In January, Google announced the alpha launch of AutoML Vision, a service to help developers build custom image recognition models. On the Google Cloud website, an example of AutoML is posted showcasing the work of a data scientist in Japan who used the tool to correctly identify where three different bowls of Ramen noodles were produced out of 41 shops.
“We’ve been using machine learning for almost 10 years inside Google,” said Donaldson, who highlighted uses such as Gmail applications and data center power efficiency. “Those are very mundane things, but we have a lot of experience with that.”
Another key area of enterprise concern is network security. Years ago, Google made the decision to forego virtual private networks and built its own identity-aware proxy for enterprise security called BeyondCorp. Access controls were shifted from the perimeter to individual devices and users, using two-factor authentication and location awareness.
“We look at security differently because of where we grew up,” Donaldson said. “That’s in front of a lot of the Google Cloud Platform technology today.”
Watch the complete video interview below, and be sure to check out more of SiliconANGLE’s and theCUBE’s coverage of the Red Hat Summit event. (* Disclosure: TheCUBE is a paid media partner for Red Hat Summit. Neither Red Hat Inc., the event sponsor, nor other sponsors have editorial control over content on theCUBE or SiliconANGLE.)
Photo: SiliconANGLE
Since you’re here …
… We’d like to tell you about our mission and how you can help us fulfill it. SiliconANGLE Media Inc.’s business model is based on the intrinsic value of the content, not advertising. Unlike many online publications, we don’t have a paywall or run banner advertising, because we want to keep our journalism open, without influence or the need to chase traffic.The journalism, reporting and commentary on SiliconANGLE — along with live, unscripted video from our Silicon Valley studio and globe-trotting video teams at theCUBE — take a lot of hard work, time and money. Keeping the quality high requires the support of sponsors who are aligned with our vision of ad-free journalism content.
If you like the reporting, video interviews and other ad-free content here, please take a moment to check out a sample of the video content supported by our sponsors, tweet your support, and keep coming back to SiliconANGLE.