<?xml version="1.0" encoding="UTF-8"?><rss version="2.0"
	xmlns:content="http://purl.org/rss/1.0/modules/content/"
	xmlns:wfw="http://wellformedweb.org/CommentAPI/"
	xmlns:dc="http://purl.org/dc/elements/1.1/"
	xmlns:atom="http://www.w3.org/2005/Atom"
	xmlns:sy="http://purl.org/rss/1.0/modules/syndication/"
	xmlns:slash="http://purl.org/rss/1.0/modules/slash/"
	>

<channel>
	<title>SAP Archives - Artificial Intelligence</title>
	<atom:link href="https://www.aiuniverse.xyz/tag/sap/feed/" rel="self" type="application/rss+xml" />
	<link>https://www.aiuniverse.xyz/tag/sap/</link>
	<description>Exploring the universe of Intelligence</description>
	<lastBuildDate>Fri, 19 Jun 2020 06:42:00 +0000</lastBuildDate>
	<language>en-US</language>
	<sy:updatePeriod>
	hourly	</sy:updatePeriod>
	<sy:updateFrequency>
	1	</sy:updateFrequency>
	<generator>https://wordpress.org/?v=6.9.4</generator>
	<item>
		<title>SAP Advances Microservices Strategy</title>
		<link>https://www.aiuniverse.xyz/sap-advances-microservices-strategy/</link>
					<comments>https://www.aiuniverse.xyz/sap-advances-microservices-strategy/#respond</comments>
		
		<dc:creator><![CDATA[aiuniverse]]></dc:creator>
		<pubDate>Fri, 19 Jun 2020 06:41:49 +0000</pubDate>
				<category><![CDATA[Microservices]]></category>
		<category><![CDATA[applications]]></category>
		<category><![CDATA[cloud platform]]></category>
		<category><![CDATA[SAP]]></category>
		<category><![CDATA[Technology]]></category>
		<guid isPermaLink="false">http://www.aiuniverse.xyz/?p=9634</guid>

					<description><![CDATA[<p>Source: containerjournal.com SAP, at its SAPPHIRE NOW Converge online conference, announced it has further unified its Business Technology Platform around a set of curated microservices from SAP and third-party partners that <a class="read-more-link" href="https://www.aiuniverse.xyz/sap-advances-microservices-strategy/">Read More</a></p>
<p>The post <a href="https://www.aiuniverse.xyz/sap-advances-microservices-strategy/">SAP Advances Microservices Strategy</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></description>
										<content:encoded><![CDATA[
<p>Source: containerjournal.com</p>



<p>SAP, at its SAPPHIRE NOW Converge online conference, announced it has further unified its Business Technology Platform around a set of curated microservices from SAP and third-party partners that IT organizations can mix and match to their needs.</p>



<p>Gunther Rothermel, president of the SAP Cloud Platform, says SAP is on a journey toward migrating away from monolithic applications in favor of microservices-based applications based mainly on Kubernetes that are more flexible, resilient and easier to maintain.</p>



<p>The SAP strategy revolves around microservices that are deployed on top of the SAP HANA database. That approach enables SAP to provide organizations with access to a large portfolio of microservices that all share a common data model along with a common set of security, identity and access management frameworks, says Rothermel. In the case of SAP, those frameworks are shared by a broad portfolio of application software that is being re-engineered to be deployed as a set of microservices.</p>



<p>Via the SAP Cloud platform based on the Cloud Foundry platform-as-a-service (PaaS) environment running on Kubernetes, additional microservices can be constructed by third-parties or internal IT organizations, he says. At the core of that capability is Kyma, an open source runtime for extending applications using microservices and serverless computing frameworks developed by SAP.</p>



<p>Each of those microservices then can be accessed via Discovery Center, which SAP has added to its Business Technology Platform. Those microservices are grouped logically together by business function, so Rothermel says one module is likely to be made of several microservices that collectively deliver a specific business value. In fact, he notes, one of the dangers with microservices is making them too fine-grained, which only serves to make them more challenging to consume and manage.</p>



<p>Of course, microservices are not a new idea. The concept of managing and delivering applications as a service stretches back to service-oriented architectures (SOAs) that gained popularity more than 20 years ago. What has changed is technologies such as REST application programming interfaces (APIs) have made it more feasible to achieve that goal, notes Rothermel.</p>



<p>Most SAP customers still rely on monolithic SAP applications. However, SAP is making progress on transitioning customers to the cloud. There are now more than 32,400 customers who have deployed the SAP HANA platform. SAP also now makes it easier to consume application software as a microservice via subscription-based pricing plans.</p>



<p>It’s too early to say to what degree or even rate organizations will embrace microservices. While there is clearly a massive amount of interest, many IT organizations are still trying to determine how best to build, deploy, manage and secure them. As such, microservices in many cases are being employed as a way to more easily extend the functionality of existing legacy monolithic applications.</p>



<p>Regardless of the rate at which microservices are being embraced, however, application modernization initiatives are well underway. The challenge is, nobody is quite sure where those efforts are likely to lead beyond providing an alternative to monolithic applications that have already shown themselves to be too inflexible to meet the current needs of most businesses.</p>
<p>The post <a href="https://www.aiuniverse.xyz/sap-advances-microservices-strategy/">SAP Advances Microservices Strategy</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.aiuniverse.xyz/sap-advances-microservices-strategy/feed/</wfw:commentRss>
			<slash:comments>0</slash:comments>
		
		
			</item>
		<item>
		<title>How machine learning anomaly detection works inside SAP</title>
		<link>https://www.aiuniverse.xyz/how-machine-learning-anomaly-detection-works-inside-sap/</link>
					<comments>https://www.aiuniverse.xyz/how-machine-learning-anomaly-detection-works-inside-sap/#comments</comments>
		
		<dc:creator><![CDATA[aiuniverse]]></dc:creator>
		<pubDate>Thu, 22 Mar 2018 05:26:16 +0000</pubDate>
				<category><![CDATA[Artificial Intelligence]]></category>
		<category><![CDATA[Machine learning]]></category>
		<category><![CDATA[SAP]]></category>
		<guid isPermaLink="false">http://www.aiuniverse.xyz/?p=2131</guid>

					<description><![CDATA[<p>Source &#8211; techtarget.com Machine learning algorithms can provide enormous benefits to enterprise security teams as long as they are properly trained. But there may not be enough teachers <a class="read-more-link" href="https://www.aiuniverse.xyz/how-machine-learning-anomaly-detection-works-inside-sap/">Read More</a></p>
<p>The post <a href="https://www.aiuniverse.xyz/how-machine-learning-anomaly-detection-works-inside-sap/">How machine learning anomaly detection works inside SAP</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></description>
										<content:encoded><![CDATA[<p>Source &#8211; techtarget.com</p>
<p><em>Machine learning algorithms can provide enormous benefits to enterprise security teams as long as they are properly trained. But there may not be enough teachers for the technology to be widely &#8212; and effectively &#8212; adopted.</em></p>
<p><em>n this Q&amp;A, Justin Somaini, CSO at SAP, talks about how the enterprise software giant </em><em>uses machine learning</em><em> for security. Specifically, he describes the differences between supervised and unsupervised algorithms and explains the challenges presented by the former. In addition, he outlines how machine learning anomaly detection is used within SAP to find potential issues, and why another layer of analysis is needed to accurately separate anomalies and actionable threats.</em></p>
<p><em>Somaini also discusses the challenges of accruing relevant data and properly </em><em>training machine learning algorithms</em><em> and why that could hinder adoption of the technology for security applications. Here are excerpts of the Q&amp;A with Somaini covering machine learning, anomaly detection, algorithms and more.</em></p>
<p><strong>How do you define </strong><strong>machine learning for security</strong><strong>, and how does SAP use the technology?</strong></p>
<p>Justin Somaini: I see these advanced algorithms falling into two buckets: supervised and unsupervised. Do we need to train the algorithm or does it figure out things on its own?</p>
<p>When these algorithms are applied for security problems, we hear a lot of these terms &#8212; machine learning, deep learning, artificial intelligence &#8212; but the majority of them are used for anomaly detection, which isn&#8217;t necessarily always a security problem. Unsupervised algorithms are typically used for machine learning anomaly detection.</p>
<p>What&#8217;s really interesting is the supervised algorithm area; it&#8217;s really about training that algorithm with data and teaching it what bad anomalies look like. And you&#8217;re able to use that algorithm to identify things that look similar to [bad examples]. That technology is mostly used in the log analysis space.</p>
<p>So when we look at this for security usage, it&#8217;s not one or the other with supervised or unsupervised. Most likely, you want to identify anomalies, but then you still need to figure out if the anomaly is a security issue or not.</p>
<p>If you have a supervised algorithm looking for things that are similar to known security issues, you really want to make sure that there is some filtration there. The efficacy of those supervised algorithms is never 100%. They&#8217;re usually anywhere from 50% and 90% if you&#8217;re really, really good. There still needs to be a human [who] goes back to those gray areas and feeds the correct data back into the algorithm so it learns. That&#8217;s why it&#8217;s a supervised algorithm.</p>
<p>It&#8217;s important to note that neither one of these algorithms removes the historical methods of identifying security problems, such as regular expression and correlation rules. We&#8217;re just building another layer of the cake.</p>
<p>That&#8217;s how we see it at SAP. With our log analysis that we have internally, we definitely have those layers of the cake. We have legacy models in regards to patterns of things we would look for, and then we build those patterns, the correlations, and both supervised algorithms and unsupervised algorithms to find things.</p>
<p><strong>Do you think we will see machine learning </strong><strong>anomaly detection</strong><strong> used widely in the near future?</strong></p>
<p>Somaini: Absolutely, I do. But I think it&#8217;s different than what we typically see for any technology hype cycle.</p>
<p>We&#8217;ve been living in the artificial intelligence and machine learning hype cycle over the past couple [of] years. I think there&#8217;s amazing opportunities with those technologies and the analytical models.</p>
<p>But the challenges we face with supervised algorithm detection is you need to train it, and also most of our networks are generally different from one another. There are a lot of similarities with those networks, but it&#8217;s hard to purchase an algorithm that is trained on what my network looks like.</p>
<p>So I need to create training data on what my environment looks like, and that can be a very painful process because you need a lot of data scientists and you need people who are skilled in managing these algorithms. It&#8217;s very difficult for a lot of organizations.</p>
<p>At SAP, we&#8217;re a little bit blessed and lucky to have not only great engineers, but great data scientists, so we were able to build those mechanisms for ourselves. But I don&#8217;t know when we&#8217;ll get to a point where those mechanisms and algorithms will be easily consumed by companies that wouldn&#8217;t have to train those algorithms.</p>
<p><strong>In your experience, are there certain issues or threats that machine learning algorithms are more likely to catch?</strong></p>
<p>Somaini: There is a spectrum. There are some very easy things you can train the algorithms on, and there are other things that are incredibly complicated.</p>
<p>If we&#8217;re able to drive the problem into something that&#8217;s consumable, for instance, cross-site scripting injections for websites, you can fairly easily create and train an algorithm on what data is submitted under normal courses and what is anomalous data. You can train it on the thousands of different types of input attacks, like SQL injections.</p>
<p>If you&#8217;re able to take the problem and narrow it down, then you&#8217;re able to build that repertoire of machine learning algorithms to assist you moving forward. That&#8217;s very different from creating an algorithm to identify everything on the network and tell you who is attacking what; that&#8217;s a very general, wide-reaching question that is almost nearly impossible to build an algorithm for unless you&#8217;ve been building up modules around it for a very, very long time.</p>
<p><strong>Can machine learning help with </strong><strong>social engineering attacks</strong><strong>, or do those attacks fall on the other end of the spectrum?</strong></p>
<p>Somaini: It can help, but you need to apply those algorithms in a completely different context.</p>
<p>For instance, at SAP, we&#8217;re deploying algorithms within business applications not only to assist with the applications&#8217; processes, but to help with security, as well. Applying security algorithms into the same business processes can help you around social engineering because it&#8217;s not the phone call to the individual that is the problem, but you can then identify what that customer service representative, for example, does in their ticketing system when they&#8217;re changing the email address of a customer.</p>
<p>When you put those algorithms into the business processes, they can identify fraud, like anomalous purchasing orders or CFO phishing attacks, and things like that. You can&#8217;t stop the phone calls or phishing emails, but you can prevent the execution of the social engineering attack.</p>
<p>The post <a href="https://www.aiuniverse.xyz/how-machine-learning-anomaly-detection-works-inside-sap/">How machine learning anomaly detection works inside SAP</a> appeared first on <a href="https://www.aiuniverse.xyz">Artificial Intelligence</a>.</p>
]]></content:encoded>
					
					<wfw:commentRss>https://www.aiuniverse.xyz/how-machine-learning-anomaly-detection-works-inside-sap/feed/</wfw:commentRss>
			<slash:comments>4</slash:comments>
		
		
			</item>
	</channel>
</rss>
