LinkedIn and 3rd parties use essential and non-essential cookies to provide, secure, analyze and improve our Services, and to show you relevant ads (including professional and job ads) on and off LinkedIn. Learn more in our Cookie Policy.
Select Accept to consent or Reject to decline non-essential cookies for this use. You can update your choices at any time in your settings.
Product leader with dual expertise in Product Management and Product Marketing, driving strategic go-to-market, product development and revenue growth for software platforms.
Is it that season already? Tech predictions? UGH. But this might be one of my most important posts to read as we look into 2025.
There's something in Gartner's "Trends for 2025" that deserves a deeper dive. It's something we all need to be aware of, as this is where the tectonic plates really start moving under the influence of AI.
It's no surprise that the trends fall into 3 buckets: AI, Computing, and Security. But it's the first one on the list that I feel most passionate about.
#1 on the list is "Agentic AI". If you follow me at all, you may have seen me talking about this coming shift already.
Let me cut to the quick on what I see ahead:
Today, Reactive AI is an accelerator.
Tomorrow, Proactive AI will become a transformer.
Beyond that, Agentic AI becomes a predictor.
What does that mean?
Well, in terms of software development, if I want to engage AI to assist today, I have to specifically lean in to it. I have to push a button and prompt AI for help.
What's happening now is that proactive, Agentic AI is starting to emerge. AI is running in the background, real-time, all the time, watching out for the actions I take in a given environment.
What that means in the world of software is that we are moving from pushbutton AI engagement to real-time AI assistance while coding. Real-time suggestions, real-time detection of vulnerabilities, real-time secret identification, real-time compliance! Essentially, Agentic AI becomes a real-time protector.
A use case I look forward to is the real-time security impact. Maybe the next log4j hits. AI will be able to see the vulnerability when it appears, then the AI agent will spin up merge requests with the fix for every project it affects. For those of us who dealt with log4j the first time, this is a dream!
Looking forward, AI is moving towards a predictive model where it can anticipate malicious activities related to emergent threats and be ready before the threat appears. Whoa.
What an amazing time. Stay aware!
Want to learn more? Check out GitLab's direction with GitLab workflow. This video is eye opening if you haven't watched it yet: https://lnkd.in/gsMTk5jX
You can find the Gartner Trends article here: https://lnkd.in/gnwxnPHc#ai#genai#agenticai#devsecops#gitlab#gartner
As we all know, on July 19, 2024, CrowdStrike faced a critical issue with a content update for Windows hosts, causing crashes and blue screen errors. This incident highlights the importance of proactive measures in preventing and mitigating such issues. I have created an article and scenarios that demonstrate how Artificial Intelligence for IT Operations (AIOps) can play a vital role in achieving this proactive approach.
AIOps leverages advanced analytics, machine learning, and automation to identify and address potential problems before they escalate into critical system failures. In the context of the CrowdStrike issue, AIOps could have:
1. Predicted the Issue: Analyzed historical data and real-time system metrics to predict the likelihood of a content update causing system crashes.
2. Automated Root Cause Analysis: Quickly identified the root cause of the issue, reducing the time spent on troubleshooting.
3. Proactive Remediation: Automated the remediation process, ensuring that the fix was applied swiftly and uniformly across all affected systems.
By leveraging AIOps into IT operations, organizations can significantly reduce the risk of critical system failures and ensure faster recovery when issues do occur. As the complexity of IT systems continues to grow, the role of AIOps in maintaining system resilience will become increasingly vital.
Read the full article to learn more about how AIOps can revolutionize incident management and ensure the reliability and stability of critical systems.
#crowdstrike#servicenow#AIOps#GenAI
🚀 DevSecOps in 2024: Buckle Up for Blast-Off! 🚀
As the tech landscape 🌐 evolves at breakneck speed, #VAST is not just keeping pace but setting the pace 🥇 in the #DevSecOps revolution 🛡️. This year, we're witnessing some groundbreaking 🌍 shifts redefining how we integrate security 🔒 into our development processes 🛠️.
🔎 What's New at VAST?
At VAST, we're harnessing enhanced #automation 🤖, leveraging the power of #AI in security 🧠, and adopting cutting-edge methodologies 🔪 that are central to the DevSecOps trends of 2024. Our commitment to revolutionizing #securitypractices 🔐 ensures that we deliver on the promise of DevSecOps – building secure, efficient, and reliable solutions at the speed of #innovation 🚀.
👀 But what exactly are these changes, and how will they impact your DevSecOps strategy?
Visit our latest post 📝 to discover the latest methodologies 📚, tools 🔧, and cultural shifts 🔄 shaping DevSecOps in 2024. From enhanced automation 🤖 to the rise of AI in security 🧠, the trends this year are not just transforming—they are revolutionizing the industry! 💥
.
.
.
.
.
🌟 Ready to Elevate Your DevSecOps Strategy with VAST?
Visit our site www.valueaddsofttech.com to dive deeper into the DevSecOps world.
#devsecops#devops#development#operations#security#automation#enhancedsecurity#enhancedefficiency#shiftleftsecurity#CICD#continuousintegration#continuousdeployment#threat#threatinteeligence#analytics#cloudsecurity#softwaredevelopment#devsecopsstraegy#toptrends#toptrendsin2024#Valueadd#VAST
8 Ways AI Can Maximize the Value of Logs https://buff.ly/3Wnsrvd
Logging is essential for successful DevSecOps teams. Logs are filled with the information needed to monitor and understand systems. Tracking down a defect? Trying to understand a sudden burst in questionable logins from a new region? Need to figure out why an app is crawling? Logs are that single source of truth for understanding what’s really happening.
But there’s a problem that comes along with logs: the sheer amount of data. The information logged by services and applications just keeps on growing. And growing. It doesn’t take long for it to become more — much more — than can be managed. The data becomes overwhelming. Alert fatigue sets in.
Want to learn about AppSec and DevSecOps?
Want to share your own knowledge about application security?
The CFP is open 🥳
We'd love to have a diversified and learn from different angles on security topics so whether you're an engineer or ops with a great story, please submit!
Announcing DevSecCon 2024: Developing AI Trust!
This free virtual summit on Oct 8-9 is designed for DevOps, developer and security pros of all levels. Expect insightful sessions, visionary keynotes, and explorations of the latest secure development tools.
Walk away with critical strategies & the prescriptive #DevSecOps approach needed to build and maintain trust in the age of #AI-powered development.
Sign up today to secure your spot and stay up to date with latest speaker announcements and other #DevSecCon fun! https://snyk.co/ug6p4
Building the Future with AI & DevOps @CloudDev | Generative & Agentic AI Specialist | Kubernetes | MLOps & Cloud-Native Systems | Revolutionizing AI Architecture | Join My Network of 13K+ Innovators! 💡
🔑 𝐒𝐭𝐫𝐞𝐚𝐦𝐥𝐢𝐧𝐢𝐧𝐠 𝐀𝐮𝐭𝐡𝐞𝐧𝐭𝐢𝐜𝐚𝐭𝐢𝐨𝐧 𝐢𝐧 𝐊𝐮𝐛𝐞𝐟𝐥𝐨𝐰 𝐰𝐢𝐭𝐡 𝐃𝐞𝐱
Managing authentication and authorization is a critical aspect of running secure and efficient machine learning workflows. In my current setup, I’m running 𝐊𝐮𝐛𝐞𝐟𝐥𝐨𝐰 on 𝐊𝐮𝐛𝐞𝐫𝐧𝐞𝐭𝐞𝐬, and Dex has proven to be a game-changer for handling these tasks.Deployed as a Kubernetes pod, Dex acts as the central authentication provider, ensuring secure logins and appropriate access to all Kubeflow components. It integrates seamlessly with identity providers, offering flexibility and scalability for managing users across various environments.By leveraging Dex, I’ve been able to enhance security while simplifying the user experience, enabling smooth collaboration within the ML ecosystem. Whether you're running experiments, training models, or deploying pipelines, having a robust authentication mechanism in place is vital.Excited to explore further optimizations and integrations to make workflows even more efficient! 🚀
#𝐊𝐮𝐛𝐞𝐟𝐥𝐨𝐰#𝐊𝐮𝐛𝐞𝐫𝐧𝐞𝐭𝐞𝐬#𝐃𝐞𝐱#𝐀𝐮𝐭𝐡𝐞𝐧𝐭𝐢𝐜𝐚𝐭𝐢𝐨𝐧#𝐀𝐮𝐭𝐡𝐨𝐫𝐢𝐳𝐚𝐭𝐢𝐨𝐧#𝐌𝐋𝐎𝐩𝐬#𝐌𝐚𝐜𝐡𝐢𝐧𝐞𝐋𝐞𝐚𝐫𝐧𝐢𝐧𝐠
Get the scoop on the #OpenText DevSecOps Virtual Summit in this blog post. This event will show you how to leverage #DevSecOps and #AI to improve software delivery speed, security, and quality, as well as best practices to revolutionize software delivery.
--
1w@