January 05, 2022

January 05, 2022

5 Cloud Native Trends to Watch out for in 2022

With the emphasis on cybersecurity, I expect to see open source projects and commercial offerings squarely focused on cloud native security. Two areas will get the attention — software supply chain and eBPF. The software supply chain closely mimics the supply chain of real-world commerce where resources are consumed, then transformed, through a series of steps and processes, and finally supplied to the customer. Modern software development is about assembling and integrating various components available in the public domain as open source projects. In the complex supply chain of software, a compromised piece of software can cause severe damage to multiple deployments. Recent incidents involving CodeCov, Solarwinds, Kaseya, and the ua-parser-js NPM package highlight the need to secure the software supply chain. In 2022, there will be new initiatives, projects, and even new startups focusing on secure software supply chain management. The other exciting trend is eBPF that enables cloud native developers to build secure networking, service mesh, and observability components.


Second-generation AI-powered digital pills are changing the future of healthcare

Many chronic diseases move along a dynamic trajectory that creates a challenge of unpredictable progression. This is often disregarded by first-generation AI as it requires constant adaptation of therapeutic regimens. Also, many therapies do not show loss of response until even a few months. The second-generation AI systems are designed to improve response to therapies and facilitate analysing inter-subject and intra-subject variabilities in response to therapies over time. Most first-generation AI systems extract data from large databases and artificially impose a rigid “one for all” algorithm on all subjects. Attempts to constantly amend treatment regimens based on big data analysis might be irrelevant for an individual patient. Imposing a “close to optimal” fit on all subjects does not resolve difficulties associated with dynamicity and the inherent variability of biological systems. The second-generation AI systems focus on a single patient as the epicentre of an algorithm and to adapt their output in a timely manner.?


How Walmart Canada Uses Blockchain to Solve Supply-Chain Challenges

A public blockchain network — one that anyone can join without asking for permission — allows unlimited viewing of information stored on it, eliminates intermediaries, and operates independently of any governing party. It is well-suited for digital consumer offerings (like NFT’s), cryptocurrencies, and certifying information such as individuals’ degrees or certificates. But private networks — those that require a party to be granted permission to join it — are often far better suited for businesses because access is restricted to verified members and only parties directly working together can see the specific information they exchange. This better satisfies industrial-grade security requirements. For these reasons, Walmart decided to go with a private network built on Hyperledger Fabric, an open-source platform. ...?For Walmart and its carriers, this meant working with each carrier’s unique data (vendor name, payment terms, contract duration, and general terms and conditions), which is combined with governing master tables of information such as fuel rates and tax rates. The parties should then jointly agree to the formulas that the blockchain will use to calculate each invoice.


Property Graphs vs. Knowledge Graphs

A property graph uses nodes, relationships, labels, and “properties.” Both the relationships and their connecting nodes of data are named, and capable of storing properties. Nodes can be labeled in support of being part of a group. Property graphs use “directed edges” and each relationship has a start node and an end node. Relationships can also be assigned properties. This feature is useful in presenting additional metadata to the relationships between the nodes. ... Knowledge graphs are very useful in working with data fabric. The semantics feature (and the use of graphs) supports discovery layers and data orchestration in a data fabric. Combining the two makes the data fabric easier to build out incrementally and more flexible, which lowers risk and speeds up deployment. The process allows an organization to develop the fabric in stages. It can be started with a single domain, or a high value use case, and gradually expanded incrementally with more data, users, and use cases. A data fabric architecture, combined with a knowledge graph, supports useful capabilities in many key areas.?


Executive Q&A: Getting the Most from Unstructured Data

The world of ten years ago was dominated by structured data. After 2012, though, as sensors became cheaper, cell phones gradually became smartphones, and cameras were installed to make shooting easier. With this, a large amount of unstructured data was generated, and enterprises entered uncharted territory, making progress slow. Some of the inhibitors to progress in this area include: Complexity: Unlike structured data which can be analyzed intuitively, unstructured data needs to be further processed and then analyzed, usually best done through artificial intelligence. Machine learning algorithms classify and label content from it. However, it is not easy to identify high-quality data from the data set due to the large amount and complexity of unstructured data -- this has been painful for developer teams and a key challenge to data architectures that are already complex. Cost: Although the enterprise recognizes the value of unstructured data, the cost can be a potential obstacle to making use of it. The cost of enterprise infrastructure, human resources, and time can hinder the implementation and development of AI and the data it analyzes.


Google Cloud Attacks Supply Chain Crisis with Digital Twin

“It’s a digital representation of the physical supply chain,” said Hans Thalbauer, the managing director for supply chain and logistics for Google Cloud. “You model all the different locations of your enterprise. Then you model all your suppliers, not just the tier one but tier two, three, and four. You bring in the logistic service providers. You bring in manufacturing partners. You bring in customers and consumers so that you have really the full view.” Once a network of supply chain players has been built out, the customer then starts loading data into their digital twin. The customer starts with their private enterprise data, which typically includes past orders, pricing, costs, and supply and demand forecasts, Thalbauer said. “Then you also want to get information from your business partners,” Thalbauer told Datanami last year. “You share your demands with your suppliers. And they actually loop back to you what is the supply situation. You share the information with the logistics service providers. You share sustainability information with the service provider.”

Read more here ...
Tejasvi Addagada

Empowering Digital Transformation through Data Strategy & AI Innovation | Data & Privacy Leader | Speaker & Author

3 年

Nice thoughts Kannan Subbiah on property graphs & knowledge graphs. While they have become buzzwords, I would emphasize the problem to solve & the approach to simplifying the complexity of a business-data landscape. A strong metadata management operating model can make it easier to define a semantic layer that makes data across domains simple to understand & interoperable across domains. Sharing similar thoughts - https://www.dataversity.net/data-democratization-and-the-data-fabric/

要查看或添加评论,请登录

Kannan Subbiah的更多文章

  • March 19, 2025

    March 19, 2025

    How AI is Becoming More Human-Like With Emotional Intelligence The concept of humanizing AI is designing systems that…

  • March 17, 2025

    March 17, 2025

    Inching towards AGI: How reasoning and deep research are expanding AI from statistical prediction to structured…

  • March 16, 2025

    March 16, 2025

    What Do You Get When You Hire a Ransomware Negotiator? Despite calls from law enforcement agencies and some lawmakers…

  • March 15, 2025

    March 15, 2025

    Guardians of AIoT: Protecting Smart Devices from Data Poisoning Machine learning algorithms rely on datasets to…

    1 条评论
  • March 14, 2025

    March 14, 2025

    The Maturing State of Infrastructure as Code in 2025 The progression from cloud-specific frameworks to declarative…

  • March 13, 2025

    March 13, 2025

    Becoming an AI-First Organization: What CIOs Must Get Right "The three pillars of an AI-first organization are data…

  • March 12, 2025

    March 12, 2025

    Rethinking Firewall and Proxy Management for Enterprise Agility Firewall and proxy management follows a simple rule:…

  • March 11, 2025

    March 11, 2025

    This new AI benchmark measures how much models lie Scheming, deception, and alignment faking, when an AI model…

  • March 10, 2025

    March 10, 2025

    The Reality of Platform Engineering vs. Common Misconceptions In theory, the definition of platform engineering is…

  • March 09, 2025

    March 09, 2025

    Software Development Teams Struggle as Security Debt Reaches Critical Levels Software development teams face mounting…

社区洞察

其他会员也浏览了