Intelligence Artificielle

How AI is changing data Infrastructure

The impact artificial intelligence (AI) is having on enterprise data processes and workloads is well-documented, as is its capability to monitor and manage complex systems. But what is not widely recognized at this point is how AI will change data infrastructure, not just in design and architecture, but rather in how it’s consumed by new generations of smart applications and services.

While infrastructure may seem immutable, the fact is even a physical plant is highly dynamic, right down to the processing capabilities in servers and networking devices, as well as the media used for storage. Virtualization has only added to this dynamism, to the point where infrastructure can be quickly tailored to meet the needs of any workload.

The latest twist on virtualization is containers, and as The Enterpriser’s Project’s Kevin Casey showed in a recent report, running AI at scale requires some retooling at the container level. For one thing, AI workloads require a lot of data gathering and processing up front, before you even get to the training. Once the model hits production, it must be supported with performance monitoring, performance metrics and a host of other services. Containers can certainly streamline these processes, but they must be optimized for consistency and repeatability to provide the maximum benefit to the workload.

Read more

Veille-cyber

Share
Published by
Veille-cyber

Recent Posts

Sécurité des mots de passe : bonnes pratiques pour éviter les failles

Sécurité des mots de passe : bonnes pratiques pour éviter les failles La sécurité des…

1 semaine ago

Ransomware : comment prévenir et réagir face à une attaque

Ransomware : comment prévenir et réagir face à une attaque Le ransomware est l’une des…

1 semaine ago

Cybersécurité et e-commerce : protéger vos clients et vos ventes

Cybersécurité et e-commerce : protéger vos clients et vos ventes En 2025, les sites e-commerce…

2 semaines ago

Les ransomwares : comprendre et se défendre contre cette menace

Les ransomwares : comprendre et se défendre contre cette menace En 2025, les ransomwares représentent…

2 semaines ago

RGPD et cybersécurité : comment rester conforme en 2025

RGPD et cybersécurité : comment rester conforme en 2025 Depuis sa mise en application en…

2 semaines ago

VPN : un outil indispensable pour protéger vos données

VPN : un outil indispensable pour protéger vos données Le VPN, ou « Virtual Private…

2 semaines ago

This website uses cookies.