Many applications require artificial intelligence (AI) these days. However, developers frequently underestimate the many crucial, upfront decisions they must make to ensure their implementation works well within the budget they have appropriated.

The first decision must be whether the AI will process the data it consumes in the cloud or on the network edge. There are speed and cost advantages to deploying AI at the edge, but the cloud has captured the imagination of the majority due to its massive compute power and storage capacity. Whether using cloud or edge (or even a combination of the two), there are aspects to consider.

Data Volume Introduces Latency

Uploading vast amounts of data to the cloud can often introduce very high latency, in many cases surpassing hundreds of milliseconds, which can seriously impair operations to the point of rendering them ineffectual at best and total wastes of time and money at worst. The ability to handle large amounts of data almost effortlessly and consistently is a key—but too often overlooked—factor in the effective deployment of AI.

Moving Data Around

In terms of bandwidth to move data around, you typically not only must pay for a lot of it, but you must also pay for it to be available at peak performance 100% of the time. You don’t want to be paying to process bad data. It costs the same, but bad data can be very expensive to root out and discard without ruining the good data.

Veille-cyber

Share
Published by
Veille-cyber

Recent Posts

Le règlement DORA : un tournant majeur pour la cybersécurité des institutions financières

Le règlement DORA : un tournant majeur pour la cybersécurité des institutions financières Le 17…

1 jour ago

Cybersécurité des transports urbains : 123 incidents traités par l’ANSSI en cinq ans

L’Agence nationale de la sécurité des systèmes d'information (ANSSI) a publié un rapport sur les…

1 jour ago

Directive NIS 2 : Comprendre les obligations en cybersécurité pour les entreprises européennes

Directive NIS 2 : Comprendre les nouvelles obligations en cybersécurité pour les entreprises européennes La…

3 jours ago

NIS 2 : entre retard politique et pression cybersécuritaire, les entreprises dans le flou

Alors que la directive européenne NIS 2 s’apprête à transformer en profondeur la gouvernance de…

4 jours ago

Quand l’IA devient l’alliée des hackers : le phishing entre dans une nouvelle ère

L'intelligence artificielle (IA) révolutionne le paysage de la cybersécurité, mais pas toujours dans le bon…

5 jours ago

APT36 frappe l’Inde : des cyberattaques furtives infiltrent chemins de fer et énergie

Des chercheurs en cybersécurité ont détecté une intensification des activités du groupe APT36, affilié au…

5 jours ago

This website uses cookies.