From Academia to Cisco: How I’m Inspired and Empowered as a Woman in Tech

From Academia to Cisco: How I’m Inspired and Empowered as a Woman in Tech

Graduating with my Ph.D. in Electrical Engineering and securing a post-doctorate position, I was well on my way to staying in academia and becoming a professor. After a year into my post-doctorate, I realized I sought something beyond the satisfaction of publishing in scientific journals and peer recognition. I found myself standing at a crossroads, contemplating my next move. That is when an exciting opportunity at Cisco arrived. The position — Wireless System Engineer —…

Read More

Cisco and Nvidia: Redefining Workload Security

Cisco and Nvidia: Redefining Workload Security

There has been an exponential increase in breaches within enterprises despite the carefully constructed and controlled perimeters that exist around applications and data. Once an attacker can access the network, it becomes an “all you can eat” buffet as they move laterally around the environment, taking control, and either exfiltrating sensitive data, or locking it up with ransomware. Enterprises traditionally use two approaches to mitigate these risks: implementing intrusion detection solutions and defining micro-perimeters around…

Read More

Leveraging a digital twin with machine learning to revitalize bridges

Leveraging a digital twin with machine learning to revitalize bridges

As you drive across a bridge you might think of the impact it’s having on your commute, but have you ever considered the impact you’re having on the bridge itself? Until recently, this impact was largely left to projections based on historical engineering practices, rather than real-time data. In this blog, we will explore how Thomas Braml, Professor of Civil Engineering and the team at the University of the Bundeswehr Munich have used Cisco technology…

Read More

Securing AI: Navigating the Complex Landscape of Models, Fine-Tuning, and RAG

Securing AI: Navigating the Complex Landscape of Models, Fine-Tuning, and RAG

Almost overnight, Artificial Intelligence (AI) has become a priority for most organizations. A concerning trend is the increasing use of AI by adversaries to execute malicious activities. Sophisticated actors leverage AI to automate attacks, optimize breach strategies, and even mimic legitimate user behaviors, thereby escalating the complexity and scale of threats. This blog discusses how attackers might manipulate and compromise AI systems, highlighting potential vulnerabilities and the implications of such attacks on AI implementations. By…

Read More

Innovation and partnership for the AI journey ahead

Innovation and partnership for the AI journey ahead

A Cisco study reveals serious gaps in AI readiness around the world. But opportunities are massive, and Cisco is ready to help. Technology change is never easy. AI is uniquely complex. With… Read more on Cisco Blogs Source link

Read More

Time to Simplify: A Fresh Look at Infrastructure and Operations for Artificial Intelligence

Time to Simplify: A Fresh Look at Infrastructure and Operations for Artificial Intelligence

The hype triggered by the emergence of generative artificial intelligence (AI) feels a lot like the early days of cloud, bringing the topic—and the need for a strategy—to the front of the IT leader agenda. But while AI is poised to change every aspect of our lives, the complexity of AI infrastructure and operations is holding things back. At Cisco, we believe AI can be a lot easier when we find ways to avoid creating…

Read More