{"id":6015,"date":"2025-05-18T13:19:11","date_gmt":"2025-05-18T05:19:11","guid":{"rendered":"https:\/\/cicserver.com\/your-network-is-the-key-to-surviving-ai\/"},"modified":"2025-05-18T13:19:11","modified_gmt":"2025-05-18T05:19:11","slug":"your-network-is-the-key-to-surviving-ai","status":"publish","type":"post","link":"https:\/\/cicserver.com\/de\/your-network-is-the-key-to-surviving-ai\/","title":{"rendered":"Your Network is the Key to Surviving AI"},"content":{"rendered":"<p><br \/>\n<\/p>\n<div data-module=\"content\">\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">As the GenAI hype wave gathered momentum in 2024, networking vendors lost no time in declaring their products AI-ready or AI-enabled. Some even crowned themselves leaders in AI networking, though it\u2019s far from clear what that really means.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">Behind the AI-washing are three simple facts about the impact of <\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><a class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_link\" target=\"_self\" href=\"https:\/\/www.networkcomputing.com\/network-infrastructure\/network-support-for-ai\">AI on networking<\/a><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">:<\/span><\/p>\n<div data-component=\"basic-list\" class=\"BasicList BasicList_nestedLevel_0 BasicList_variant_unordered BasicList_limited\">\n<ul data-testid=\"basic-list-unordered\" class=\"BasicList-UnorderedList\">\n<li>\n<div class=\"BasicList-ListItem BasicList-ListItem_variant_unordered\"><span data-component=\"icon\" data-name=\"Circle\" class=\"BasicList-ListIcon BasicList-ListIcon_variant_unordered\" style=\"mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);-webkit-mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain\"\/><\/p>\n<div class=\"BasicList-Item\">\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">AI will put new demands on networks, affecting performance, capacity requirements, costs, and operational complexity<\/span><\/p>\n<\/div>\n<\/div>\n<\/li>\n<li>\n<div class=\"BasicList-ListItem BasicList-ListItem_variant_unordered\"><span data-component=\"icon\" data-name=\"Circle\" class=\"BasicList-ListIcon BasicList-ListIcon_variant_unordered\" style=\"mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);-webkit-mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain\"\/><\/p>\n<div class=\"BasicList-Item\">\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">Networking vendors will increasingly use AI inside their platforms to improve performance, reliability, and security and to automate network operations<\/span><\/p>\n<\/div>\n<\/div>\n<\/li>\n<li>\n<div class=\"BasicList-ListItem BasicList-ListItem_variant_unordered\"><span data-component=\"icon\" data-name=\"Circle\" class=\"BasicList-ListIcon BasicList-ListIcon_variant_unordered\" style=\"mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);-webkit-mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain\"\/><\/p>\n<div class=\"BasicList-Item\">\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">The limitations of existing network architecture in a world where users and applications are everywhere and anywhere were already clear before AI. Post AI, legacy architecture will struggle to cope.\u00a0<\/span><\/p>\n<\/div>\n<\/div>\n<\/li>\n<\/ul>\n<\/div>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">The first of these trends will drive the second. Using AI to enhance existing capabilities will be necessary to make <\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><a class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_link\" target=\"_self\" href=\"https:\/\/www.networkcomputing.com\/cloud-networking\/building-resilience-in-uncertain-times-the-power-of-connected-networks\">networks resilient<\/a><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"> in the face of capacity, security, and performance challenges and to make them adaptive as enterprises contend with accelerating pressure to innovate and turn on a dime.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">The AI revolution coincides with other fundamental changes to the way we think about and use networks, namely:<\/span><\/p>\n<div data-component=\"basic-list\" class=\"BasicList BasicList_nestedLevel_0 BasicList_variant_unordered BasicList_limited\">\n<ul data-testid=\"basic-list-unordered\" class=\"BasicList-UnorderedList\">\n<li>\n<div class=\"BasicList-ListItem BasicList-ListItem_variant_unordered\"><span data-component=\"icon\" data-name=\"Circle\" class=\"BasicList-ListIcon BasicList-ListIcon_variant_unordered\" style=\"mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);-webkit-mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain\"\/><\/p>\n<div class=\"BasicList-Item\">\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">Cloud\/edge-ification \u2013 mass migration of applications from traditional data centers to the cloud has put enterprise applications closer to some users and further away from others<\/span><\/p>\n<\/div>\n<\/div>\n<\/li>\n<li>\n<div class=\"BasicList-ListItem BasicList-ListItem_variant_unordered\"><span data-component=\"icon\" data-name=\"Circle\" class=\"BasicList-ListIcon BasicList-ListIcon_variant_unordered\" style=\"mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);-webkit-mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain\"\/><\/p>\n<div class=\"BasicList-Item\">\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">As-a-service delivery \u2013 the same flexible consumption model that revolutionized apps, compute and storage is now being played out in networking and security. Infrastructure, networking, and security are now delivered in a pure hardware-less, gateway-less as-a-service model.<\/span><\/p>\n<\/div>\n<\/div>\n<\/li>\n<li>\n<div class=\"BasicList-ListItem BasicList-ListItem_variant_unordered\"><span data-component=\"icon\" data-name=\"Circle\" class=\"BasicList-ListIcon BasicList-ListIcon_variant_unordered\" style=\"mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);-webkit-mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain\"\/><\/p>\n<div class=\"BasicList-Item\">\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">Hybrid work \u2013 not only are applications everywhere, but users and data are, too. Networking was centralized (<\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><a class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_link\" target=\"_blank\" href=\"https:\/\/en.wikipedia.org\/wiki\/Multiprotocol_Label_Switching\">MPLS<\/a><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">), then decentralized (<\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><a class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_link\" target=\"_self\" href=\"https:\/\/www.networkcomputing.com\/enterprise-connectivity\/where-and-how-do-wan-sd-wan-and-sase-fit-in-\">SD-WAN<\/a><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">), and is now highly distributed, requiring an architectural shift left to the user edge (<\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><a class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_link\" target=\"_self\" href=\"https:\/\/www.networkcomputing.com\/network-security\/sase-architecture-a-checklist-for-sase-savvy-businesses\">SASE<\/a><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">)<\/span><\/p>\n<\/div>\n<\/div>\n<\/li>\n<li>\n<div class=\"BasicList-ListItem BasicList-ListItem_variant_unordered\"><span data-component=\"icon\" data-name=\"Circle\" class=\"BasicList-ListIcon BasicList-ListIcon_variant_unordered\" style=\"mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);-webkit-mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain\"\/><\/p>\n<div class=\"BasicList-Item\">\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">Security \u2013 with users, devices, and applications distributed, it no longer makes sense to send traffic back to the data center or even distant cloud regions (also known as cloud hairpinning). As security has a profound effect on performance, traffic inspection, and security controls need to be co-located with network access at the edge<\/span><\/p>\n<\/div>\n<\/div>\n<\/li>\n<li>\n<div class=\"BasicList-ListItem BasicList-ListItem_variant_unordered\"><span data-component=\"icon\" data-name=\"Circle\" class=\"BasicList-ListIcon BasicList-ListIcon_variant_unordered\" style=\"mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);-webkit-mask-image:url(&quot;data:image\/svg+xml,%3csvg%20viewBox='0%200%2024%2024'%20aria-hidden='true'%20focusable='false'%20role='img'%20xml:space='preserve'%20xmlns='http:\/\/www.w3.org\/2000\/svg'%20xmlns:xlink='http:\/\/www.w3.org\/1999\/xlink'%20fill='currentColor'%20height='100%25'%20width='10'%3e%3ccircle%20cx='12'%20cy='12'%20r='11.5'%20fill='white'%20stroke='%230b0b0b'%3e%3c\/circle%3e%3c\/svg%3e&quot;);mask-repeat:no-repeat;-webkit-mask-repeat:no-repeat;-webkit-mask-position:center;-webkit-mask-size:contain\"\/><\/p>\n<div class=\"BasicList-Item\">\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">Convergence \u2013 it no longer makes sense to think of networking and security as separate entities with different management regimes. Networking and security policies determined by the method of access, the location of the user, or the type and location of a resource (SaaS, data center, Internet, etc.) increase complexity and overhead costs. Divergent policies and access controls also increase security risk.\u00a0\u00a0\u00a0\u00a0 \u00a0<\/span><\/p>\n<\/div>\n<\/div>\n<\/li>\n<\/ul>\n<\/div>\n<h2 class=\"ContentText ContentText_variant_h2 ContentText_align_left\" data-testid=\"content-text\" id=\"AI networking requirements in brief\" style=\"scroll-margin-top:10rem;scroll-snap-margin-top:10rem\">AI networking requirements in brief<\/h2>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">You can boil down these requirements to just three words: speed, security, and simplification.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">These three goals, which were already highly desirable become critical as AI takes off in earnest in 2025.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">The most obvious challenge is the impact of AI on network capacity and performance.\u00a0<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">GenAI will consume a lot of data and generate a lot more. Estimates of the impact of AI traffic on networks vary widely, but with network capacity doubling roughly every two years and the optical engines used to drive fiber networks nearing the limits of physics, AI traffic could significantly increase the strain on existing infrastructure in every segment of the network from data center interconnect to the last mile.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">For enterprises, the anticipated tsunami of data traffic created by AI will demand network services that are faster, more reliable, easier to scale, and less complex to manage.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">Apart from sheer capacity, GenAI applications could have a major impact on network performance. The network will need to move very large quantities of dynamically generated content in real-time. It is already challenging to guarantee performance at the network edge, particularly for remote users and\/or devices connecting via consumer-grade broadband, <\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\"><a class=\"ContentText-BodyTextChunk ContentText-BodyTextChunk_link\" target=\"_self\" href=\"https:\/\/www.networkcomputing.com\/wireless-networking\/wi-fi-7-the-state-of-the-market\">Wi-Fi<\/a><\/span><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">, or 4\/5G. Application performance becomes unacceptable unless you overcome issues of latency and packet loss in the last mile. Add GenAI and the same connections could become unusable.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">The good news is that many of the performance problems that AI creates will also be solved by AI. It can be used, for example, to select the nearest available edge (or virtual PoP) to provide ultra-low latency connections to users wherever they are, taking into account factors such as time of day and known traffic patterns.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">Not only can this cut latency by an order of magnitude and tremendously improve packet loss, but having no physical PoP (and no fixed IP address to attack) means dynamic connections are inherently more secure. AI can also be used to optimize path selection, resulting in performance and security benefits; and to recover lost packets before they\u2019ve had time to impact user experience.<\/span><\/p>\n<h2 class=\"ContentText ContentText_variant_h2 ContentText_align_left\" data-testid=\"content-text\" id=\"A final word on AI networking requirements\" style=\"scroll-margin-top:10rem;scroll-snap-margin-top:10rem\">A final word on AI networking requirements<\/h2>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">AI deployments pose numerous problems for CIOs, from concerns about return on investment to issues of bias and regulatory compliance. Security risks are also increasing as AI makes it easier to launch attacks, and AI tools make new kinds of attacks possible.<\/span><\/p>\n<p class=\"ContentParagraph ContentParagraph_align_left\" data-testid=\"content-paragraph\"><span class=\"ContentText ContentText_variant_bodyNormal\" data-testid=\"content-text\">Getting network infrastructure right won\u2019t directly address all these problems. Not getting it right will certainly make things worse. Organizations that modernize their networking and security infrastructure fast will be in pole position to seize AI opportunities while their competitors are struggling to cope with AI pressures.\u00a0<\/span><\/p>\n<\/div>\n<p><script defer=\"\" async=\"\" src=\"https:\/\/connect.facebook.net\/en_US\/sdk.js#xfbml=1&amp;version=v18.0\" data-ot-ignore=\"true\"><\/script><br \/>\n<br \/><\/p>","protected":false},"excerpt":{"rendered":"<p>As the GenAI hype wave gathered momentum in 2024, networking vendors lost no time in declaring their products AI-ready or AI-enabled. Some even crowned themselves leaders in AI networking, though it\u2019s far from clear what that really means. Behind the AI-washing are three simple facts about the impact of AI on networking: AI will put [&hellip;]<\/p>","protected":false},"author":3,"featured_media":6016,"comment_status":"open","ping_status":"open","sticky":false,"template":"","format":"standard","meta":{"_seopress_robots_primary_cat":"","_seopress_titles_title":"","_seopress_titles_desc":"","_seopress_robots_index":"","footnotes":""},"categories":[1],"tags":[],"class_list":{"0":"post-6015","1":"post","2":"type-post","3":"status-publish","4":"format-standard","5":"has-post-thumbnail","7":"category-blog"},"_links":{"self":[{"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/posts\/6015","targetHints":{"allow":["GET"]}}],"collection":[{"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/posts"}],"about":[{"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/types\/post"}],"author":[{"embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/users\/3"}],"replies":[{"embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/comments?post=6015"}],"version-history":[{"count":0,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/posts\/6015\/revisions"}],"wp:featuredmedia":[{"embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/media\/6016"}],"wp:attachment":[{"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/media?parent=6015"}],"wp:term":[{"taxonomy":"category","embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/categories?post=6015"},{"taxonomy":"post_tag","embeddable":true,"href":"https:\/\/cicserver.com\/de\/wp-json\/wp\/v2\/tags?post=6015"}],"curies":[{"name":"wp","href":"https:\/\/api.w.org\/{rel}","templated":true}]}}