Harnessing the Power of AI to Improve Operations

Harnessing the Power of AI to Improve Operations

I’ve noticed that, over time, IT operations often become the foundry of ideas for an organization. This may be out of sheer necessity, as this function sits at the intersection of two intertwined threads. The first is the inexorable progression of technology: networks get faster, servers more powerful, and architecture more complex. At the same time, because of the power of these growing capabilities, IT becomes ever more central to how organizations take care of…

Read More

Optimizing AI Workloads with NVIDIA GPUs, Time Slicing, and Karpenter

Optimizing AI Workloads with NVIDIA GPUs, Time Slicing, and Karpenter

Maximizing GPU efficiency in your Kubernetes environment In this article, we will explore how to deploy GPU-based workloads in an EKS cluster using the Nvidia Device Plugin, and ensuring efficient GPU utilization through features like Time Slicing. We will also discuss setting up node-level autoscaling to optimize GPU resources with solutions like Karpenter. By implementing these strategies, you can maximize GPU efficiency and scalability in your Kubernetes environment. Additionally, we will delve into practical configurations…

Read More

Breaking through barriers: Upwardly Global helps work-authorized immigrants secure meaningful U.S. employment

Breaking through barriers: Upwardly Global helps work-authorized immigrants secure meaningful U.S. employment

As Cisco’s commitment to our purpose to power an inclusive future for all drives us forward, we continue expand how we use our technology, our people, our resources, and our networks to address inequities and open more opportunities for more people. To power this kind of future, we work closely with nonprofit partners who provide people with equitable access to the knowledge, skills, and resources needed to support themselves and their families toward long-term resilience…

Read More

Product spotlight on cybersecurity

Product spotlight on cybersecurity

Cybersecurity is a constant priority for business as new threats emerge each day. Security magazine highlights a variety of cybersecurity products to protect data and businesses. BEAZLEY Quickly Detect and Respond to Threats Beazley Security’s Managed eXtended Detection and Response (MXDR) service combines human intelligence with advanced technologies and external data sources to provide clients around-the-clock protections. The MXDR provides total transparency to cyber operations, and uncomplicated endpoint-based pricing that includes unlimited data ingestion and long-term retention…

Read More

An In-Depth Look at the Cisco CCDE-AI Infrastructure Certification

An In-Depth Look at the Cisco CCDE-AI Infrastructure Certification

Since OpenAI’s mic-drop moment at the end of last year, it seems that AI—and generative AI in particular—is suddenly everywhere. For network engineers, we see two big areas of change. The first is AI in the network: By integrating AI into networks, we can make those networks more secure, resilient, and higher-performing. The second is AI on the network. The networks that run AI workloads and support the training of generative AI models need to…

Read More

The Transformational Opportunity of AI on ICT Jobs

The Transformational Opportunity of AI on ICT Jobs

AI represents a never-before-seen opportunity for technology to benefit humankind in every way. It’s changing everything – especially the way we work. Preparing the global workforce for the advancements of AI technology is not just a business objective at Cisco. It’s arguably one of the most impactful ways to power an inclusive future for all. It’s why our Cisco Networking Academy work is so crucial – 20.5 million students trained worldwide and counting! It’s also…

Read More

The path to reducing software vulnerabilities leads to AI

The path to reducing software vulnerabilities leads to AI

Tool proliferation has created a data volume challenge that is making it harder than ever to understand the security risks that really matter, which in turn makes it harder to secure the software development and deployment lifecycle. As threats continue to mount, this challenge will only get worse unless there is a better way of separating relevant risks from the background noise. Fortunately, AI now offers a solution Data, data, and more data Cybersecurity threats…

Read More

Introducing the Coalition for Secure AI (CoSAI)

Introducing the Coalition for Secure AI (CoSAI)

Today, I am delighted to share the launch of the Coalition for Secure AI (CoSAI). CoSAI is an alliance of industry leaders, researchers, and developers dedicated to enhancing the security of AI implementations. CoSAI operates under the auspices of OASIS Open, the international standards and open-source consortium. CoSAI’s founding members include industry leaders such as OpenAI, Anthropic, Amazon, Cisco, Cohere, GenLab, Google, IBM, Intel, Microsoft, Nvidia, Wiz, Chainguard, and PayPal. Together, our goal is to…

Read More

AI is coming for company credentials — Here’s how to fight back

AI is coming for company credentials — Here’s how to fight back

The GenAI explosion is something to behold, with advancements in the technology emerging on a seemingly daily basis. But the cynical security professional in me also sighs, “This is why we can’t have nice things.” Where businesses see AI as a tool for efficiency and market differentiation, cyber attackers are in mustache-twirling mode, devising new schemes to exploit undefined learning curves.  As someone who spends each workday trying to make identity and access safer amid…

Read More

Unchecked AI threatens consumer privacy — Regulation is crucial

Unchecked AI threatens consumer privacy — Regulation is crucial

As artificial intelligence (AI) becomes increasingly embedded into society — at home and in the office — through virtual assistants, automated services and workplace productivity tools, there is a pressing need for regulatory guardrails and governance policies to protect consumer privacy and data rights. Corporate AI adoption presents organizations with a rising threat of potential privacy violations. Shockingly, 45% of surveyed organizations have experienced unintended data exposure when implementing AI systems — a harsh reality…

Read More
1 4 5 6 7 8 28