โŒ

Reading view

There are new articles available, click to refresh the page.

Microsoft shareholders invoke Orwell and Copilot as Nadella cites โ€˜generational momentโ€™

From left: Microsoft CFO Amy Hood, CEO Satya Nadella, Vice Chair Brad Smith, and Investor Relations head Jonathan Nielsen at Fridayโ€™s virtual shareholder meeting. (Screenshot via webcast)

Microsoftโ€™s annual shareholder meeting Friday played out as if on a split screen: executives describing a future where AI cures diseases and secures networks, and shareholder proposals warning of algorithmic bias, political censorship, and complicity in geopolitical conflict.

One shareholder, William Flaig, founder and CEO of Ridgeline Research, quoted two authorities on the topic โ€” George Orwellโ€™s 1984 and Microsoftโ€™s Copilot AI chatbot โ€” in requesting a report on the risks of AI censorship of religious and political speech.

Flaig invoked Orwellโ€™s dystopian vision of surveillance and thought control, citing the Ministry of Truth that โ€œrewrites history and floods society with propaganda.โ€ He then turned to Copilot, which responded to his query about an AI-driven future by noting that โ€œthe risk lies not in AI itself, but in how itโ€™s deployed.โ€

In a Q&A session during the virtual meeting, Microsoft CEO Satya Nadella said the company is โ€œputting the person and the human at the centerโ€ of its AI development, with technology that users โ€œcan delegate to, they can steer, they can control.โ€

Nadella said Microsoft has moved beyond abstract principles to โ€œeveryday engineering practice,โ€ with safeguards for fairness, transparency, security, and privacy.

Brad Smith, Microsoftโ€™s vice chair and president, said broader societal decisions, like what age kids should use AI in schools, wonโ€™t be made by tech companies. He cited ongoing debates about smartphones in schools nearly 20 years after the iPhone.

โ€œI think quite rightly, people have learned from that experience,โ€ Smith said, drawing a parallel to the rise of AI. โ€œLetโ€™s have these conversations now.โ€

Microsoftโ€™s board recommended that shareholders vote against all six outside proposals, which covered issues including AI censorship, data privacy, human rights, and climate. Final vote tallies have yet to be released as of publication time, but Microsoft said shareholders turned down all six, based on early voting.ย 

While the shareholder proposals focused on AI risks, much of the executive commentary focused on the long-term business opportunity.ย 

Nadella described building a โ€œplanet-scale cloud and AI factoryโ€ and said Microsoft is taking a โ€œfull stack approach,โ€ from infrastructure to AI agents to applications, to capitalize on what he called โ€œa generational moment in technology.โ€

Microsoft CFO Amy Hood highlighted record results for fiscal year 2025 โ€” more than $281 billion in revenue and $128 billion in operating income โ€” and pointed to roughly $400 billion in committed contracts as validation of the companyโ€™s AI investments.

Hood also addressed pre-submitted shareholder questions about the companyโ€™s AI spending, pushing back on concerns about a potential bubble.ย 

โ€œThis is demand-driven spending,โ€ she said, noting that margins are stronger at this stage of the AI transition than at a comparable point in Microsoftโ€™s cloud buildout. โ€œEvery time we think weโ€™re getting close to meeting demand, demand increases again.โ€

Agents-as-a-service are poised to rewire the software industry and corporate structures

This was the year of AI agents. Chatbots that simply answered questions are now evolving into autonomous agents that can carry out tasks on a userโ€™s behalf, so enterprises continue to invest in agentic platforms as transformation evolves. Software vendors are investing in it as fast as they can, too.

According to a National Research Group survey of more than 3,000 senior leaders, more than half of executives say their organization is already using AI agents. Of the companies that spend no less than half their AI budget on AI agents, 88% say theyโ€™re already seeing ROI on at least one use case, with top areas being customer service and experience, marketing, cybersecurity, and software development.

On the software provider side, Gartner predicts 40% of enterprise software applications in 2026 will include agentic AI, up from less than 5% today. And agentic AI could drive approximately 30% of enterprise application software revenue by 2035, surpassing $450 billion, up from 2% in 2025. In fact, business users might not have to interact directly with the business applications at all since AI agent ecosystems will carry out user instructions across multiple applications and business functions. At that point, a third of user experiences will shift from native applications to agentic front ends, Gartner predicts.

Itโ€™s already starting. Most enterprise applications will have embedded assistants, a precursor to agentic AI, by the end of this year, adds Gartner.

IDC has similar predictions. By 2028, 45% of IT product and service interactions will use agents as the primary interface, the firm says. Thatโ€™ll change not just how companies work, but how CIOs work as well.

Agents as employees

At financial services provider OneDigital, chief product officer Vinay Gidwaney is already working with AI agents, almost as if they were people.

โ€œWe decided to call them AI coworkers, and we set up an AI staffing team co-owned between my technology team and our chief people officer and her HR team,โ€ he says. โ€œThat team is responsible for hiring AI coworkers and bringing them into the organization.โ€ You heard that right: โ€œhiring.โ€

The first step is to sit down with the business leader and write a job description, which is fed to the AI agent, and then it becomes known as an intern.

โ€œWe have a lot of interns weโ€™re testing at the company,โ€ says Gidwaney. โ€œIf they pass, they get promoted to apprentices and we give them our best practices, guardrails, a personality, and human supervisors responsible for training them, auditing what they do, and writing improvement plans.โ€

The next promotion is to a full-time coworker, and it becomes available to be used by anyone at the company.

โ€œAnyone at our company can go on the corporate intranet, read the skill sets, and get ice breakers if they donโ€™t know how to start,โ€ he says. โ€œYou can pick a coworker off the shelf and start chatting with them.โ€

For example, thereโ€™s Ben, a benefits expert whoโ€™s trained on everything having to do with employee benefits.

โ€œWe have our employee benefits consultants sitting with clients every day,โ€ Gidwaney says. โ€œBen will take all the information and help the consultants strategize how to lower costs, and how to negotiate with carriers. Heโ€™s the consultantsโ€™ thought partner.โ€

There are similar AI coworkers working on retirement planning, and on property and casualty as well. These were built in-house because theyโ€™re core to the companyโ€™s business. But there are also external AI agents who can provide additional functionality in specialized yet less core areas, like legal or marketing content creation. In software development, OneDigital uses third-party AI agents as coding assistants.

When choosing whether to sign up for these agents, Gidwaney says he doesnโ€™t think of it the way he thinks about licensing software, but more to hiring a human consultant or contractor. For example, will the agent be a good cultural fit?

But in some cases, itโ€™s worse than hiring humans since a bad human hire who turns out to be toxic will only interact with a small number of other employees. But an AI agent might interact with thousands of them.

โ€œYou have to apply the same level of scrutiny as how you hire real humans,โ€ he says.

A vendor who looks like a technology company might also, in effect, be a staffing firm. โ€œThey look and feel like humans, and you have to treat them like that,โ€ he adds.

Another way that AI agents are similar to human consultants is when they leave the company, they take their expertise with them, including what they gained along the way. Data can be downloaded, Gidwaney says, but not necessarily the fine-tuning or other improvements the agent received. Realistically, there might not be any practical way to extract that from a third-party agent, and that could lead to AI vendor lock-in.

Edward Tull, VP of technology and operations at JBGoodwin Realtors, says he, too, sees AI agents as something akin to people. โ€œI see it more as a teammate,โ€ he says. โ€œAs we implement more across departments, I can see these teammates talking to each other. It becomes almost like a person.โ€

Today, JBGoodwin uses two main platforms for its AI agents. Zapier lets the company build its own and HubSpot has its own AaaS, and theyโ€™re already pre-built. โ€œThere are lead enrichment agents and workflow agents,โ€ says Tull.

And the company is open to using more. โ€œIn accounting, if someone builds an agent to work with this particular type of accounting software, we might hire that agent,โ€ he says. โ€œOr a marketing coordinator that we could hire thatโ€™s built and ready to go and connected to systems we already use.โ€

With agents, his job is becoming less about technology and more about management, he adds. โ€œItโ€™s less day-to-day building and more governance, and trying to position the company to be competitive in the world of AI,โ€ he says.

Heโ€™s not the only one thinking of AI agents as more akin to human workers than to software.

โ€œWith agents, because the technology is evolving so far, itโ€™s almost like youโ€™re hiring employees,โ€ says Sheldon Monteiro, chief product officer at Publicis Sapient. โ€œYou have to determine whom to hire, how to train them, make sure all the business units are getting value out of them, and figure when to fire them. Itโ€™s a continuous process, and this is very different from the past, where I make a commitment to a platform and stick with it because the solution works for the business.โ€

This changes how the technology solutions are managed, he adds. What companies will need now is a CHRO, but for agentic employees.

Managing outcomes, not persons

Vituity is one of the largest national, privately-held medical groups, with 600 hospitals, 13,800 employees, and nearly 14 million patients. The company is building its own AI agents, but is also using off-the-shelf ones, as AaaS. And AI agents arenโ€™t people, says CIO Amith Nair. โ€œThe agent has no feelings,โ€ he says. โ€œAGI isnโ€™t here yet.โ€

Instead, it all comes down to outcomes, he says. โ€œIf you define an outcome for a task, thatโ€™s the outcome youโ€™re holding that agent to.โ€ And that part isnโ€™t different to holding employees accountable to an outcome. โ€œBut you donโ€™t need to manage the agent,โ€ he adds. โ€œTheyโ€™re not people.โ€

Instead, the agent is orchestrated and you can plug and play them. โ€œIt needs to understand our business model and our business context, so you ground the agent to get the job done,โ€ he says.

For mission-critical functions, especially ones related to sensitive healthcare data, Vituity is building its own agents inside a HIPAA-certified LLM environment using the Workato agent development platform and the Microsoft agentic platform.

For other functions, especially ones having to do with public data, Vituity uses off-the-shelf agents, such as ones from Salesforce and Snowflake. The company is also using Claude with GitHub Copilot for coding. Nair can already see that agentic systems will change the way enterprise software works.

โ€œMost of the enterprise applications should get up to speed with MCP, the integration layer for standardization,โ€ he says. โ€œIf they donโ€™t get to it, itโ€™s going to become a challenge for them to keep selling their product.โ€

A company needs to be able to access its own data via an MCP connector, he says. โ€œAI needs data, and if they donโ€™t give you an MCP, you just start moving it all to a data warehouse,โ€ he adds.

Sharp learning curve

In addition to providing a way to store and organize your data, enterprise software vendors also offer logic and functionality, and AI will soon be able to handle that as well.

โ€œAll you need is a good workflow engine where you can develop new business processes on the fly, so it can orchestrate with other agents,โ€ Nair says. โ€œI donโ€™t think weโ€™re too far away, but weโ€™re not there yet. Until then, SaaS vendors are still relevant. The question is, can they charge that much money anymore.โ€

The costs of SaaS will eventually have to come down to the cost of inference, storage, and other infrastructure, but they canโ€™t survive the way theyโ€™re charging now he says. So SaaS vendors are building agents to augment or replace their current interfaces. But that approach itself has its limits. Say, for example, instead of using Salesforceโ€™s agent, a company can use its own agents to interact with the Salesforce environment.

โ€œItโ€™s already happening,โ€ Nair adds. โ€œMy SOC agent is pulling in all the log files from Salesforce. Theyโ€™re not providing me anything other than the security layer they need to protect the data that exists there.โ€

AI agents are set to change the dynamic between enterprises and software vendors in other ways, too. One major difference between software and agents is software is well-defined, operates in a particular way, and changes slowly, says Jinsook Han, chief of strategy, corporate development, and global agentic AI at Genpact.

โ€œBut we expect when the agent comes in, itโ€™s going to get smarter every day,โ€ she says. โ€œThe world will change dramatically because agents are continuously changing. And the expectations from the enterprises are also being reshaped.โ€

Another difference is agents can more easily work with data and systems where they are. Take for example a sales agent meeting with customers, says Anand Rao, AI professor at Carnegie Mellon University. Each salesperson has a calendar where all their meetings are scheduled, and they have emails, messages, and meeting recordings. An agent can simply access those emails when needed.

โ€œWhy put them all into Salesforce?โ€ Rao asks. โ€œIf the idea is to do and monitor the sale, it doesnโ€™t have to go into Salesforce, and the agents can go grab it.โ€

When Rao was a consultant having a conversation with a client, heโ€™d log it into Salesforce with a note, for instance, saying the client needs a white paper from the partner in charge of quantum.

With an agent taking notes during the meeting, it can immediately identify the action items and follow up to get the white paper.

โ€œRight now weโ€™re blindly automating the existing workflow,โ€ Rao says. โ€œBut why do we need to do that? Thereโ€™ll be a fundamental shift of how we see value chains and systems. Weโ€™ll get rid of all the intermediate steps. Thatโ€™s the biggest worry for the SAPs, Salesforces, and Workdays of the world.โ€

Another aspect of the agentic economy is instead of a human employee talking to a vendorโ€™s AI agent, a company agent can handle the conversation on the employeeโ€™s behalf. And if a company wants to switch vendors, the experience will be seamless for employees, since they never had to deal directly with the vendor anyway.

โ€œI think thatโ€™s something thatโ€™ll happen,โ€ says Ricardo Baeza-Yates, co-chair of theย  US technology policy committee at the Association for Computing Machinery. โ€œAnd it makes the market more competitive, and makes integrating things much easier.โ€

In the short term, however, it might make more sense for companies to use the vendorsโ€™ agents instead of creating their own.

โ€œI recommend people donโ€™t overbuild because everything is moving,โ€ says Bret Greenstein, CAIO at West Monroe Partners, a management consulting firm. โ€œIf you build a highly complicated system, youโ€™re going to be building yourself some tech debt. If an agent exists in your application and itโ€™s localized to the data in that application, use it.โ€

But over time, an agent thatโ€™s independent of the application can be more effective, he says, and thereโ€™s a lot of lock-in that goes into applications. โ€œItโ€™s going to be easier every day to build the agent you want without having to buy a giant license. โ€œThe effort to get effective agents is dropping rapidly, and the justification for getting expensive agents from your enterprise software vendors is getting less,โ€ he says.

The future of software

According to IDC, pure seat-based pricing will be obsolete by 2028, forcing 70% of vendors to figure out new business models.

With technology evolving as quickly as it is, JBGoodwin Realtors has already started to change its approach to buying tech, says Tull. It used to prefer long-term contracts, for example but thatโ€™s not the case anymore โ€œYou save more if you go longer, but Iโ€™ll ask for an option to re-sign with a cap,โ€ he says.

That doesnโ€™t mean SaaS will die overnight. Companies have made significant investments in their current technology infrastructure, says Patrycja Sobera, SVP of digital workplace solutions at Unisys.

โ€œTheyโ€™re not scrapping their strategies around cloud and SaaS,โ€ she says. โ€œTheyโ€™re not saying, โ€˜Letโ€™s abandon this and go straight to agentic.โ€™ Iโ€™m not seeing that at all.โ€

Ultimately, people are slow to change, and institutions are even slower. Many organizations are still running legacy systems. For example, the FAA has just come out with a bold plan to update its systems by getting rid of floppy disks and upgrading from Windows 95. They expect this to take four years.

But the center of gravity will move toward agents and, as it does, so will funding, innovation, green-field deployments, and the economics of the software industry.

โ€œThere are so many organizations and leaders who need to cross the chasm,โ€ says Sobera. โ€œYouโ€™re going to have organizations at different levels of maturity, and some will be stuck in SaaS mentality, but feeling more in control while some of our progressive clients will embrace the move. Weโ€™re also seeing those clients outperform their peers in revenue, innovation, and satisfaction.โ€

HPE CEO ๋„ค๋ฆฌ, ์ฃผ๋‹ˆํผ ์ธ์ˆ˜ ํšจ๊ณผ ๊ณต๊ฐœยทยทยท๋„คํŠธ์›ŒํฌยทAI ๊ฒฐํ•ฉ ๊ฐ€์†



HPE๊ฐ€ HP์—์„œ ๋ถ„๋ฆฌ๋ผ ๋…๋ฆฝ์ ์ธ ์—ฌ์ •์„ ์‹œ์ž‘ํ•œ ์ง€ 10๋…„์ด ์ง€๋‚œ ์‹œ์ ์—, ์ตœ๊ณ ๊ฒฝ์˜์ž ์•ˆํ† ๋‹ˆ์˜ค ๋„ค๋ฆฌ๋Š” 12์›” 3์™€ 4์ผ ๋ฐ”๋ฅด์…€๋กœ๋‚˜์—์„œ ์—ด๋ฆฐ HPE์˜ ์ฃผ์š” ์—ฐ๋ก€ ์œ ๋Ÿฝ ํ–‰์‚ฌ ๋ฌด๋Œ€์— ์˜ฌ๋ž๋‹ค. ๋„ค๋ฆฌ๋Š” ์ด ์ž๋ฆฌ์—์„œ ๋„คํŠธ์›Œํฌ, ํด๋ผ์šฐ๋“œ, ์ธ๊ณต์ง€๋Šฅ(AI)์ด๋ผ๋Š” ์„ธ ๊ฐ€์ง€ ๊ธฐ์ˆ  ์ถ•์„ ์ค‘์‹ฌ์œผ๋กœ ํ•œ HPE์˜ ๋กœ๋“œ๋งต์„ ๊ณต๊ฐœํ–ˆ๋‹ค.

๋„ค๋ฆฌ๋Š” HPE ๋””์Šค์ปค๋ฒ„ ๋ฐ”๋ฅด์…€๋กœ๋‚˜ 2025 ํ–‰์‚ฌ์— ์ฐธ์„ํ•œ 6,000์—ฌ ๋ช…์˜ ์ฒญ์ค‘์„ ํ–ฅํ•ด โ€œ์ง€๋‚œ 10๋…„ ๋™์•ˆ ์šฐ๋ฆฌ๊ฐ€ ํ•จ๊ป˜ ๋งŒ๋“ค์–ด๋‚ธ ์„ฑ๊ณผ๊ฐ€ ๋งค์šฐ ์ž๋ž‘์Šค๋Ÿฝ๋‹คโ€๋ผ๋ฉฐ โ€œ์•ž์œผ๋กœ ํŽผ์ณ์งˆ ๋ณ€ํ™”๋Š” ๋”์šฑ ๊ธฐ๋Œ€๋œ๋‹คโ€๋ผ๊ณ  ๋งํ–ˆ๋‹ค.

HPE๊ฐ€ ์ œ์‹œํ•œ ์„ธ ์ถ•์˜ ์ „๋žต์€ ์˜ค๋Š˜๋‚  ๊ธฐ์—…์ด ์ง๋ฉดํ•œ ํ•ต์‹ฌ IT ๊ณผ์ œ๋ฅผ ํ•ด๊ฒฐํ•˜๊ธฐ ์œ„ํ•œ ๊ฒƒ์ด๋‹ค. ๋„ค๋ฆฌ์— ๋”ฐ๋ฅด๋ฉด ๊ธฐ์—…๋“ค์€ ์—ฌ์ „ํžˆ ๋ ˆ๊ฑฐ์‹œ ์ธํ”„๋ผ ์ฒ˜๋ฆฌ, ๋ฐ์ดํ„ฐ ์ฃผ๊ถŒ ํ™•๋ณด, ์ง€์†์ ์œผ๋กœ ์ฆ๊ฐ€ํ•˜๋Š” ๋น„์šฉ ๊ด€๋ฆฌ, AI ํ™•์‚ฐ์œผ๋กœ ๋†’์•„์ง„ ์ปดํ“จํŒ… ์ˆ˜์š” ๋“ฑ์˜ ๋„์ „์— ๋งž์„œ๊ณ  ์žˆ๋‹ค.

ํŠนํžˆ ์ฃผ๋‹ˆํผ๋„คํŠธ์›์Šค(Juniper Networks)๋ฅผ ์ง€๋‚œํ•ด 7์›” ์ธ์ˆ˜ํ•˜๋ฉฐ ํฌ๊ฒŒ ๊ฐ•ํ™”๋œ ๋„คํŠธ์›Œํฌ ๊ธฐ์ˆ ์€ ์ด๋ฒˆ ๋ฐ”๋ฅด์…€๋กœ๋‚˜ ํ–‰์‚ฌ์—์„œ ํ•ต์‹ฌ ์š”์†Œ๋กœ ๋ถ€๊ฐ๋๋‹ค.

์ฃผ๋‹ˆํผ์˜ ์ „ CEO์ด์ž ํ˜„์žฌ HPE ๋„คํŠธ์›Œํ‚น ์‚ฌ์—… ์ด๊ด„์„ ๋งก๊ณ  ์žˆ๋Š” ๋ผ๋ฏธ ๋ผํž˜์€ ํ–‰์‚ฌ์— ์ฐธ์„ํ•ด ์–‘์‚ฌ ํ†ตํ•ฉ์˜ ์ฒซ ๊ธฐ์ˆ  ์„ฑ๊ณผ๋ฅผ ์†Œ๊ฐœํ–ˆ๋‹ค. ์–‘์‚ฌ์˜ ๋„คํŠธ์›Œํฌ ๊ด€๋ฆฌ ํ”Œ๋žซํผ์— ์ƒˆ๋กœ์šด AI ๊ธฐ๋ฐ˜ ์šด์˜ ๊ธฐ๋Šฅ์„ ํ†ตํ•ฉํ•˜๊ณ , ๊ณต๋™ ํ•˜๋“œ์›จ์–ด๋ฅผ ์ฒ˜์Œ์œผ๋กœ ๊ณต๊ฐœํ•œ ๊ฒƒ์ด๋‹ค.

๋ผํž˜์€ โ€œ์ง€๊ธˆ์ฒ˜๋Ÿผ ๋„คํŠธ์›Œํฌ์˜ ์ค‘์š”์„ฑ์ด ๋†’์•„์ง„ ์‹œ๊ธฐ๋Š” ์—†์—ˆ๋‹คโ€๋ผ๊ณ  ๋งํ•˜๋ฉด์„œ, ์ด์ œ ๋„คํŠธ์›Œํฌ์˜ ๋ชฉํ‘œ๋Š” ๋‹จ์ˆœ ์—ฐ๊ฒฐ์ด ์•„๋‹ˆ๋ผ โ€˜์ž์œจ์  ๊ด€๋ฆฌโ€™๋ผ๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค. ๊ทธ๋Š” ๋„คํŠธ์›Œํฌ๊ฐ€ ์Šค์Šค๋กœ ๊ตฌ์„ฑยท์ตœ์ ํ™”ยท๋ณต๊ตฌํ•˜๋Š” ๋ฐฉํ–ฅ์œผ๋กœ ๋‚˜์•„๊ฐ€์•ผ ํ•œ๋‹ค๊ณ  ๊ฐ•์กฐํ•˜๋ฉฐ, AI๋กœ ์„ค๊ณ„๋˜๊ณ  AI๋ฅผ ์œ„ํ•œ ๋„คํŠธ์›Œํฌ๊ฐ€ ์ฆ๊ฐ€ํ•˜๋Š” ๊ธฐ๊ธฐ ์—ฐ๊ฒฐ, ๋ณต์žกํ•ด์ง€๋Š” ํ™˜๊ฒฝ, ๊ณ ๋„ํ™”๋˜๋Š” ๋ณด์•ˆ ์œ„ํ˜‘์„ ์ฒ˜๋ฆฌํ•  ์ˆ˜ ์žˆ๋‹ค๊ณ  ๋ฐํ˜”๋‹ค.

๋„ค๋ฆฌ๋Š” โ€œ๋ผ๋ฏธ์™€ ๋‚ด๊ฐ€ ๊ฐ€์ง„ ๊ณตํ†ต์˜ ๋ชฉํ‘œ๋Š” ๋„คํŠธ์›Œํ‚น ๋ถ„์•ผ์—์„œ ์ƒˆ๋กœ์šด ๋ฆฌ๋”๋ฅผ ๋งŒ๋“œ๋Š” ๊ฒƒโ€์ด๋ผ๊ณ  ๋งํ–ˆ๋‹ค. ๊ทธ๋Š” ์ฃผ๋‹ˆํผ ์ธ์ˆ˜ ํ›„ 5๊ฐœ์›” ๋งŒ์— HPE๊ฐ€ ์ด๋ฏธ ์ด์ „ ๊ฒฝ์Ÿ์‚ฌ์˜€๋˜ ์ฃผ๋‹ˆํผ ๊ธฐ์ˆ ๊ณผ 2015๋…„ ์ธ์ˆ˜ํ•œ ์•„๋ฃจ๋ฐ” ์†”๋ฃจ์…˜์„ ๊ฒฐํ•ฉํ•œ ์ปค๋„ฅํ‹ฐ๋น„ํ‹ฐ ์ œํ’ˆ์„ ์‹œ์žฅ์— ์ œ๊ณตํ•˜๊ณ  ์žˆ๋‹ค๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค. ์ด์–ด โ€œ์•ž์œผ๋กœ๋Š” ์–‘์‚ฌ๊ฐ€ ๊ฐ๊ฐ ๋ฌด์—‡์„ ํ•˜๊ณ  ์žˆ๋Š”์ง€์กฐ์ฐจ ๊ตฌ๋ถ„๋˜์ง€ ์•Š์„ ๊ฒƒโ€์ด๋ผ๋ฉฐ, โ€œ๊ธฐ๋ณธ์ ์ธ ์ด์ค‘ ์„ค๊ณ„๋ฅผ ์ด๋ฏธ ์ง€์›ํ•˜๊ณ  ์žˆ๋‹ค๋Š” ์‚ฌ์‹ค์€ ๋‘ ์กฐ์ง์ด ์–ผ๋งˆ๋‚˜ ๋น ๋ฅด๊ฒŒ ํ•˜๋‚˜๋กœ ์œตํ•ฉ๋˜๊ณ  ์žˆ์œผ๋ฉฐ, ๋™์‹œ์— HPE์˜ ํ˜์‹  ์—ญ๋Ÿ‰์ด ์–ด๋–ป๊ฒŒ ํ™œ์šฉ๋˜๊ณ  ์žˆ๋Š”์ง€๋ฅผ ์ž˜ ๋ณด์—ฌ์ค€๋‹คโ€๋ผ๊ณ  ๋ง๋ถ™์˜€๋‹ค.

HPE์˜ ์ฃผ๋‹ˆํผ ์ธ์ˆ˜, ๋ณต์žกํ•œ ๊ณผ์ •์„ ๊ฑฐ์น˜๋‹ค

140์–ต ๋‹ฌ๋Ÿฌ(์•ฝ 20์กฐ ์›) ๊ทœ๋ชจ์˜ HPE์˜ ์ฃผ๋‹ˆํผ ์ธ์ˆ˜๋Š” ๋‹จ์ˆœํ•œ ๊ฑฐ๋ž˜๊ฐ€ ์•„๋‹ˆ๋ผ ๋งค์šฐ ๋ณต์žกํ•˜๊ณ  ๊ธด ์—ฌ์ •์ด์—ˆ๋‹ค. 2024๋…„ 1์›” ์ธ์ˆ˜ ๊ณ„ํš์ด ๋ฐœํ‘œ๋์ง€๋งŒ ์ตœ์ข… ๊ฑฐ๋ž˜๋Š” 2025๋…„ 7์›”์— ์ด๋ฅด๋Ÿฌ์„œ์•ผ ๋งˆ๋ฌด๋ฆฌ๋๋‹ค. ๋ฏธ๊ตญ์—์„œ๋Š” ํŠนํžˆ ๋…ผ๋ž€๋„ ์ ์ง€ ์•Š์•˜๋‹ค. ๋ฏธ๊ตญ ๋ฒ•๋ฌด๋ถ€(DOJ)๊ฐ€ ์ด๋ฒˆ ์ธ์ˆ˜๊ฐ€ ๋„คํŠธ์›Œํฌ ์žฅ๋น„ ์‹œ์žฅ, ํŠนํžˆ ๋ฌด์„ ๋žœ(WLAN) ๋ถ„์•ผ์˜ ๊ฒฝ์Ÿ์„ ์•ฝํ™”์‹œํ‚จ๋‹ค๋ฉฐ ์†Œ์†ก์„ ์ œ๊ธฐํ–ˆ๊ธฐ ๋•Œ๋ฌธ์ด๋‹ค.

์ด๋ฒˆ ์ธ์ˆ˜ ์Šน์ธ ๊ณผ์ •์—์„œ ๊ฒช์€ ๋‚œ๊ด€๊ณผ ์—ฌ์ „ํžˆ ๋‚จ์•„ ์žˆ๋Š” ๋ฏธ๊ตญ ๋‚ด ๋น„ํŒ์— ๋Œ€ํ•ด ํŒŒ์šด๋“œ๋ฆฌ ์‚ฐํ•˜ ์–ธ๋ก ์‚ฌ ์ปดํ“จํ„ฐ์›”๋“œ์˜ ์งˆ๋ฌธ์„ ๋ฐ›์€ ๋„ค๋ฆฌ๋Š” ๋จผ์ € โ€œ๋ฏธ๊ตญ์„ ์ œ์™ธํ•œ ๊ตญ๊ฐ€์—์„œ๋Š” ํ†ต์ƒ์ ์ธ 6๊ฐœ์›” ๋‚ด ์Šน์ธ์ด ์™„๋ฃŒ๋๋‹คโ€๋ผ๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค. 2024๋…„ ์—ฌ๋ฆ„์—๋Š” 3๊ฐœ๊ตญ๋งŒ ์Šน์ธ์ด ๋‚จ์•„ ์žˆ์—ˆ๊ณ , ๊ทธ์ค‘ 2๊ฐœ๊ตญ์€ ๋‹ค์Œ 3๊ฐœ์›” ๋‚ด ์Šน์ธ์„ ๋งˆ์ณค๋‹ค๋Š” ๊ฒƒ์ด๋‹ค. ๋„ค๋ฆฌ๋Š” ๋ฏธ๊ตญ์˜ ๊ฒฝ์šฐ โ€œ์„ ๊ฑฐ์™€ ํ–‰์ •๋ถ€ ๊ต์ฒด๋ผ๋Š” ๋ณ€์ˆ˜๊ฐ€ ์žˆ์—ˆ๊ณ , ์ดํ›„ ์ ˆ์ฐจ๊ฐ€ ๋‹ค์‹œ ์ง„ํ–‰๋๋‹คโ€๋ผ๊ณ  ๋ง๋ถ™์˜€๋‹ค.

๋„ค๋ฆฌ๋Š” ์ด๋ฒˆ ์‚ฌ๋ก€๋ฅผ ๋ถ„์„ํ•˜๋ฉด์„œ โ€œ๋ฏธ๊ตญ ๋ฒ•๋ฌด๋ถ€๋Š” ์บ ํผ์Šค์™€ ์ง€์‚ฌ ์‹œ์žฅ, ํŠนํžˆ ๋ฌด์„  ๋ถ„์•ผ์—์„œ ๊ฒฝ์Ÿ์‚ฌ๊ฐ€ 3๊ณณ์—์„œ 2๊ณณ์œผ๋กœ ์ค„์–ด๋“ค ๊ฒƒ์œผ๋กœ ํŒ๋‹จํ–ˆ๋‹คโ€๋ผ๊ณ  ๋งํ–ˆ๋‹ค. ํ•˜์ง€๋งŒ ์‹ค์ œ ์‹œ์žฅ์€ ๊ทธ๋ณด๋‹ค ํ›จ์”ฌ ํฌ๋‹ค๋Š” ๊ฒŒ ๋„ค๋ฆฌ์˜ ์„ค๋ช…์ด๋‹ค. ๊ทธ๋Š” โ€œ๋ฏธ๊ตญ ์‹œ์žฅ๋งŒ ๋ณด๋”๋ผ๋„ ์‹œ์Šค์ฝ”, ์ฃผ๋‹ˆํผ, HPE, ์บ„๋น„์›€๋„คํŠธ์›์Šค(Cambium Networks), ์œ ๋น„์ฟผํ‹ฐ(Ubiquity), ์•„๋ฆฌ์Šคํƒ€(Arista) ๋“ฑ 7~8๊ฐœ ์—…์ฒด๊ฐ€ ๊ฒฝ์Ÿํ•˜๊ณ  ์žˆ๋‹คโ€๋ผ๋ฉฐ ์‚ฐ์—…๊ตฐ๋ณ„๋กœ ๊ฐ•์ ์ด ๋‹ค๋ฅด๊ณ  ๋Œ€๊ธฐ์—… ์‹œ์žฅ๊ณผ ๊ณต๊ณต ๋ถ€๋ฌธ์—์„œ๋„ ๊ฒฝ์Ÿ ๊ตฌ๋„๊ฐ€ ๋‹ค๋ฅด๋‹ค๊ณ  ์–ธ๊ธ‰ํ–ˆ๋‹ค. ์ด์–ด โ€œ์—ฌ๋Ÿฌ๋ถ„(๊ธฐ์ž๋“ค)์ด ๋ณด๋„ํ•˜๋Š” ์‹œ์žฅ์ ์œ ์œจ๋งŒ ๋ด๋„ ์‹œ์žฅ ๊ทœ๋ชจ๊ฐ€ ํฌ๊ณ  ๋งค์šฐ ๋ถ„์‚ฐ๋ผ ์žˆ๋‹ค๋Š” ์‚ฌ์‹ค์„ ํ™•์ธํ•  ์ˆ˜ ์žˆ๋‹คโ€๋ผ๊ณ  ๋งํ–ˆ๋‹ค.

๊ฒฐ๊ตญ ๋ฏธ๊ตญ ๋ฒ•๋ฌด๋ถ€์™€๋Š” โ€œ์ƒํ˜ธ์— ๋„์›€์ด ๋˜๋Š” ๊ฑด์„ค์ ์ธ ๊ณผ์ •์„ ๊ฑฐ์ณค๋‹คโ€๋ผ๊ณ  ๋„ค๋ฆฌ๋Š” ์„ค๋ช…ํ–ˆ๋‹ค. ๊ทธ๋Š” โ€œ์ด๋ฒˆ ์ธ์ˆ˜ ์‹œ์žฅ์€ ๊ฒฝ์Ÿ์„ ์ด‰์ง„ํ•˜๋Š” ํ™˜๊ฒฝ์ž„์„ ์ž…์ฆํ–ˆ๋‹คโ€๋ผ๋ฉฐ, ๋ฏธ๊ตญ์˜ ๋Œ€ํ˜• M&A ์ตœ์ข… ์‹ฌ์‚ฌ ๋‹จ๊ณ„์—์„œ๋„ ๊ณ ๊ฐ์ด๋‚˜ ๊ฒฝ์Ÿ์‚ฌ๋กœ๋ถ€ํ„ฐ ์–ด๋– ํ•œ ์ด์˜ ์ œ๊ธฐ๋„ ๋ฐ›์ง€ ์•Š์•˜๋‹ค๊ณ  ๊ฐ•์กฐํ–ˆ๋‹ค.

AI์™€ ํด๋ผ์šฐ๋“œ์— ์ง‘์ค‘๋˜๋‹ค

๋ฐ”๋ฅด์…€๋กœ๋‚˜์—์„œ ๋„ค๋ฆฌ๋Š” ์ตœ๊ทผ ๋ช‡ ๋‹ฌ ๋™์•ˆ HPE๊ฐ€ ํด๋ผ์šฐ๋“œ์™€ AI ๋ถ„์•ผ์—์„œ ์ด๋ค„๋‚ธ ๊ธฐ์ˆ ์  ์ง„์ „์„ ๊ฐ•์กฐํ–ˆ๋‹ค. ๊ทธ๋Š” AI๋ฅผ โ€œ์ „ํ˜•์ ์ธ ํ•˜์ด๋ธŒ๋ฆฌ๋“œ ์›Œํฌ๋กœ๋“œโ€๋ผ๊ณ  ๊ทœ์ •ํ•˜๋ฉด์„œ, ๋‘ ๊ธฐ์ˆ ์ด ๋ถˆ๊ฐ€๋ถ„ํ•˜๊ฒŒ ์—ฐ๊ฒฐ๋ผ ์žˆ๋‹ค๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค.

๋„ค๋ฆฌ๋Š” ์‚ฌ์šฉ๋Ÿ‰ ๊ธฐ๋ฐ˜ ๋ชจ๋ธ๋กœ ์‹œ์ž‘ํ•ด ํ˜„์žฌ ์ „ ์„ธ๊ณ„ 4๋งŒ 6,000๋ช… ๊ณ ๊ฐ์„ ํ™•๋ณดํ•œ ํ•˜์ด๋ธŒ๋ฆฌ๋“œ ํด๋ผ์šฐ๋“œ ํ”Œ๋žซํผ ๊ทธ๋ฆฐ๋ ˆ์ดํฌ(GreenLake)๋ฅผ ์†Œ๊ฐœํ•˜๋ฉฐ, ์—ฌ๊ธฐ์— ์ž์œจ ์—์ด์ „ํŠธ ๊ธฐ๋ฐ˜ ํ”„๋ ˆ์ž„์›Œํฌ โ€˜๊ทธ๋ฆฐ๋ ˆ์ดํฌ ์ธํ…”๋ฆฌ์ „์Šค(GreenLake Intelligence)โ€™์™€ ๊ฐ™์€ AI ๊ธฐ๋Šฅ์„ ์ถ”๊ฐ€ํ•  ๊ณ„ํš์ด๋ผ๊ณ  ๋ฐํ˜”๋‹ค. ์ด ๊ธฐ๋Šฅ์€ ์ง€๋‚œ 6์›” HPE๊ฐ€ ๋ฐœํ‘œํ•œ ๊ฒƒ์œผ๋กœ, ํ•˜์ด๋ธŒ๋ฆฌ๋“œ ํด๋ผ์šฐ๋“œ ํ™˜๊ฒฝ์—์„œ IT ์šด์˜์„ ์ž๋™ํ™”ํ•˜๊ณ  ๋‹จ์ˆœํ™”ํ•˜๋Š” ๋ฐ ์ดˆ์ ์„ ๋‘”๋‹ค. ๋„ค๋ฆฌ๋Š” โ€œIT ์šด์˜ ๋‹จ์ˆœํ™”์˜ ๋ฏธ๋ž˜๊ฐ€ ์ด๋ฏธ ๋„์ฐฉํ–ˆ๋‹คโ€๋ผ๊ณ  ๋งํ–ˆ๋‹ค.

๋„ค๋ฆฌ๋Š” ๋˜ HPE์˜ ์—์–ด๊ฐญ ๊ธฐ๋ฐ˜ ํ”„๋ผ์ด๋น— ํด๋ผ์šฐ๋“œ ์ „๋žต์ด EU์ฒ˜๋Ÿผ ๊ทœ์ œ๊ฐ€ ๊ฐ•ํ•œ ์ง€์—ญ, ๊ทธ๋ฆฌ๊ณ  ๊ตฐ๊ณผ ๊ฐ™์ด ๋ฏผ๊ฐ ๋ฐ์ดํ„ฐ๊ฐ€ ์ค‘์š”ํ•œ ์ „๋žต ๋ถ„์•ผ์—์„œ ํฐ ์˜๋ฏธ๊ฐ€ ์žˆ๋‹ค๊ณ  ๊ฐ•์กฐํ–ˆ๋‹ค.

๋„ค๋ฆฌ๋Š” ๋ฐ”๋ฅด์…€๋กœ๋‚˜์—์„œ ๊ณต๊ฐœ๋œ ๋˜ ํ•˜๋‚˜์˜ ์†”๋ฃจ์…˜์—๋„ ์ฃผ๋ชฉํ–ˆ๋‹ค. AMD์˜ โ€˜ํ—ฌ๋ฆฌ์˜ค์Šค(Helios)โ€™ ๋ž™ ์Šค์ผ€์ผ AI ์•„ํ‚คํ…์ฒ˜๊ฐ€ ์ด๋”๋„ท ๋„คํŠธ์›Œํ‚น๊ณผ ํ†ตํ•ฉ๋œ ์ฒซ ์‚ฌ๋ก€๋‹ค. ๊ทธ๋Š” ์ด ์†”๋ฃจ์…˜์ด ์ฃผ๋‹ˆํผ์˜ ์—ฐ๊ฒฐ ํ•˜๋“œ์›จ์–ด์™€ ์†Œํ”„ํŠธ์›จ์–ด, ๋ธŒ๋กœ๋“œ์ปด ํ† ๋งˆํ˜ธํฌ6 ๋„คํŠธ์›Œํ‚น ์นฉ์„ ๊ฒฐํ•ฉํ•ด โ€œ์ˆ˜์กฐ ๊ฐœ ๋งค๊ฐœ๋ณ€์ˆ˜ ๋ชจ๋ธ์˜ ํ•™์Šต ํŠธ๋ž˜ํ”ฝ, ๋†’์€ ์ถ”๋ก  ์ฒ˜๋ฆฌ๋Ÿ‰, ์ดˆ๋Œ€ํ˜• ๋ชจ๋ธ์„ ์ง€์›ํ•  ์ˆ˜ ์žˆ๋‹คโ€๋ผ๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค. ์ด ๊ตฌ์„ฑ์€ HPE ์„œ๋น„์ŠคํŒ€์ด ๊ณต๊ธ‰ํ•œ๋‹ค.

๋„ค๋ฆฌ๋Š” ๋˜ํ•œ ์Šˆํผ์ปดํ“จํŒ… ๋ถ„์•ผ์—์„œ HPE๊ฐ€ ๋ณด์œ ํ•œ ๊ฐ•๋ ฅํ•œ ์ž…์ง€๋„ ๊ฐ•์กฐํ–ˆ๋‹ค. ์ด๋Š” 2019๋…„ ์Šˆํผ์ปดํ“จํ„ฐ ์ „๋ฌธ ๊ธฐ์—… ํฌ๋ ˆ์ด(Cray)๋ฅผ ์ธ์ˆ˜ํ•˜๋ฉฐ ํ™•๋ณดํ•œ ๊ธฐ๋ฐ˜์ด ํฌ๊ฒŒ ์ž‘์šฉํ–ˆ๋‹ค. ๊ทธ๋Š” โ€œHPE๋Š” ์„ธ๊ณ„์—์„œ ๊ฐ€์žฅ ํฐ ์Šˆํผ์ปดํ“จํ„ฐ 6๋Œ€๋ฅผ ๊ตฌ์ถ•ํ•œ ๊ธฐ์—…์ด๋ฉฐ ์ด ๋ถ„์•ผ์˜ ๊ธ€๋กœ๋ฒŒ ์„ ๋„ ๊ธฐ์—…โ€์ด๋ผ๊ณ  ๋งํ–ˆ๋‹ค. ๋‹ค๋งŒ โ€œAI ์ˆ˜์š”๊ฐ€ ๊ทธ ์–ด๋А ๋•Œ๋ณด๋‹ค ์ปค์กŒ์ง€๋งŒ ๋ชจ๋“  ๊ธฐ์—…์ด ์ด๋ฅผ ์ฒ˜๋ฆฌํ•˜๊ธฐ ์œ„ํ•ด ์Šˆํผ์ปดํ“จํ„ฐ๊ฐ€ ํ•„์š”ํ•œ ๊ฒƒ์€ ์•„๋‹ˆ๋‹คโ€๋ผ๋ฉฐ, ๊ทธ๋Ÿฌ๋‚˜ โ€œ๋ชจ๋“  ๊ธฐ์—…์—๋Š” ์•ˆ์ „ํ•œ AI ์Šคํƒ์ด ํ•„์š”ํ•˜๋‹คโ€๋ผ๊ณ  ๋ง๋ถ™์˜€๋‹ค.

HPE๋Š” ์ด๋Ÿฌํ•œ ์š”๊ตฌ์— ๋Œ€์‘ํ•˜๊ธฐ ์œ„ํ•ด ์—”๋น„๋””์•„์™€ ํ˜‘๋ ฅํ•ด ํ”„๋ผ์ด๋น— ํด๋ผ์šฐ๋“œ ํ™˜๊ฒฝ์—์„œ ์ƒ์„ฑํ˜• AI ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ๊ฐœ๋ฐœยท๋ฐฐํฌ๋ฅผ ๊ฐ€์†ํ™”ํ•˜๋Š” ํ†ตํ•ฉ ์ธํ”„๋ผ ์†”๋ฃจ์…˜ โ€˜HPE ํ”„๋ผ์ด๋น— ํด๋ผ์šฐ๋“œ AIโ€™๋ฅผ ์ œ๊ณตํ•˜๊ณ  ์žˆ๋‹ค. ๋„ค๋ฆฌ๋Š” ์ด ์†”๋ฃจ์…˜์ด โ€œ๋ฒ•์  ๋ฐ์ดํ„ฐ ์š”๊ตฌ์‚ฌํ•ญ์„ ์ถฉ์กฑํ•˜๋ฉฐโ€, ๋™์‹œ์— AI ํ˜์‹ ์˜ ํ•ต์‹ฌ ๊ณผ์ œ์ธ โ€œ์‹œ๊ฐ„, ๋น„์šฉ, ์œ„ํ—˜โ€์„ ํ•ด๊ฒฐํ•˜๋Š” ๋ฐ ์ดˆ์ ์„ ๋งž์ถ˜๋‹ค๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค. ๊ทธ๋Š” ์—ฌ๊ธฐ์— ๋”ํ•ด HPE๊ฐ€ ์ตœ๊ทผ ์—”๋น„๋””์•„์™€ AMD์™€ ํ•จ๊ป˜ AI ๊ตฌ์ถ•์„ ๊ฐ€์†ํ™”ํ•˜๋Š” ๊ณ ์„ฑ๋Šฅ ๋„คํŠธ์›Œํ‚น ์†”๋ฃจ์…˜์„ ์ถ”๊ฐ€ํ–ˆ๋‹ค๊ณ  ๋ฐ”๋ฅด์…€๋กœ๋‚˜์—์„œ ๋ฐํ˜”๋‹ค.

๋ณธ์‚ฌ์—… ๊ธฐ๋ฐ˜ ์„ฑ์žฅ๊ณผ M&A ๊ธฐ๋ฐ˜ ํ™•์žฅ

HPE๊ฐ€ ์ง€๋‚œํ•ด 9์›” ํšŒ๊ณ„์—ฐ๋„ 3๋ถ„๊ธฐ ์‹ค์  ๋ฐœํ‘œ์—์„œ ์ œ์‹œํ•œ ์ „๋ง์— ๋”ฐ๋ฅด๋ฉด, ํšŒ์‚ฌ๋Š” 2025 ํšŒ๊ณ„์—ฐ๋„(10์›” 31์ผ ์ข…๋ฃŒ) ๋งค์ถœ์ด ๊ณ ์ • ํ™˜์œจ ๊ธฐ์ค€ 14~16% ์ฆ๊ฐ€ํ•  ๊ฒƒ์œผ๋กœ ์˜ˆ์ƒํ•˜๊ณ  ์žˆ๋‹ค. 2024 ํšŒ๊ณ„์—ฐ๋„ ๋งค์ถœ์€ 301์–ต ๋‹ฌ๋Ÿฌ(์•ฝ 44์กฐ ์›)๋กœ, 2023๋…„ ๋Œ€๋น„ 3.4% ์ฆ๊ฐ€ํ–ˆ๋‹ค.

๋„ค๋ฆฌ์˜ ๋ฆฌ๋”์‹ญ ์•„๋ž˜ HPE๋Š” ์ด 35๊ฑด์˜ ์ธ์ˆ˜๋ฅผ ์ง„ํ–‰ํ–ˆ๋‹ค. ๋„ค๋ฆฌ๋Š” ๋ฐ”๋ฅด์…€๋กœ๋‚˜ ๊ธฐ์žํšŒ๊ฒฌ์—์„œ ์ด๋ฅผ ์ง์ ‘ ์ƒ๊ธฐ์‹œํ‚ค๋ฉฐ, ์•ž์„œ ์–ธ๊ธ‰ํ•œ ์ฃผ๋‹ˆํผ๋„คํŠธ์›์Šค์™€ ํฌ๋ ˆ์ด ์™ธ์—๋„ ์—ฌ๋Ÿฌ ์ฃผ์š” ์ธ์ˆ˜๋ฅผ ๋‚˜์—ดํ–ˆ๋‹ค.

2020๋…„์—๋Š” SD-WAN ๊ธฐ์—… ์‹ค๋ฒ„ํ”ผํฌ(Silver Peak)๋ฅผ, 2021๋…„์—๋Š” ๋ฐ์ดํ„ฐ ๋ณดํ˜ธ ๋ฐ ์žฌํ•ด๋ณต๊ตฌ ๊ธฐ์—… ์ œ๋ฅดํ† (Zerto)๋ฅผ ์ธ์ˆ˜ํ–ˆ๋‹ค. 2023๋…„์—๋Š” ๋ณด์•ˆ ๋ฐ IT ์šด์˜ ๋ถ„์•ผ์˜ ์•ก์‹œ์Šค์‹œํ๋ฆฌํ‹ฐ(Axis Security)์™€ ์˜ต์Šค๋žจํ”„(OpsRamp)๋ฅผ ์ถ”๊ฐ€ํ–ˆ์œผ๋ฉฐ, 2024๋…„์—๋Š” ํ•˜์ด๋ธŒ๋ฆฌ๋“œ ํด๋ผ์šฐ๋“œ ๊ด€๋ฆฌ ๊ธฐ์—… ๋ชจ๋ฅดํŽ˜์šฐ์Šค๋ฐ์ดํ„ฐ(Morpheus Data)๋ฅผ ์ธ์ˆ˜ํ–ˆ๋‹ค.

๋„ค๋ฆฌ๋Š” โ€œ์šฐ๋ฆฌ๋Š” ํฌํŠธํด๋ฆฌ์˜ค๋ฅผ ๋ณด์™„ํ•˜๊ณ  ๋ชฉํ‘œ ์‹œ์žฅ์—์„œ ๊ทœ๋ชจ๋ฅผ ํ™•์žฅํ•  ์ˆ˜ ์žˆ๋Š” ์ ์ ˆํ•œ ์ž์‚ฐ์„ ์ฐพ๊ณ  ์žˆ๋‹คโ€๋ผ๋ฉฐ โ€œ์ด ์ž์‚ฐ์€ ๋งค์ถœ๊ณผ ์ˆ˜์ต ์ธก๋ฉด์—์„œ ํƒ€๋‹นํ•ด์•ผ ํ•˜๋ฉฐ, ๋™์‹œ์— ์ฃผ์ฃผ๋“ค์—๊ฒŒ ๊ฐ€์น˜๋„ ์ œ๊ณตํ•ด์•ผ ํ•œ๋‹คโ€๋ผ๊ณ  ๋งํ–ˆ๋‹ค.
dl-ciokorea@foundryco.com


AWS CEO Matt Garman thought Amazon needed a million developers โ€” until AI changed his mind

AWS CEO Matt Garman, left, with Acquired hosts Ben Gilbert and David Rosenthal. (GeekWire Photo / Todd Bishop)

LAS VEGAS โ€” Matt Garman remembers sitting in an Amazon leadership meeting six or seven years ago, thinking about the future, when he identified what he considered a looming crisis.

Garman, who has since become the Amazon Web Services CEO, calculated that the company would eventually need to hire a million developers to deliver on its product roadmap. The demand was so great that he considered the shortage of software development engineers (SDEs) the companyโ€™s biggest constraint.

With the rise of AI, he no longer thinks thatโ€™s the case.

Speaking with Acquired podcast hosts Ben Gilbert and David Rosenthal at the AWS re:Invent conference Thursday afternoon, Garman told the story in response to Gilbertโ€™s closing question about what belief he held firmly in the past that he has since completely reversed.

โ€œBefore, we had way more ideas than we could possibly get to,โ€ he said. Now, โ€œbecause you can deliver things so fast, your constraint is going to be great ideas and great things that you want to go after. And I would never have guessed that 10 years ago.โ€

He was careful to point out that Amazon still needs great software engineers. But earlier in the conversation, he noted that massive technical projects that once required โ€œdozens, if not hundredsโ€ of people might now be delivered by teams of five or 10, thanks to AI and agents.

Garman was the closing speaker at the two-hour event with the hosts of the hit podcast, following conversations with Netflix Co-CEO Greg Peters, J.P. Morgan Payments Global Co-Head Max Neukirchen, and Perplexity Co-founder and CEO Aravind Srinivas.

A few more highlights from Garmanโ€™s comments:

Generative AI, including Bedrock, represents a multi-billion dollar business for Amazon. Asked to quantify how much of AWS is now AI-related, Garman said itโ€™s getting harder to say, as AI becomes embedded in everything.ย 

Speaking off-the-cuff, he told the Acquired hosts that Bedrock is a multi-billion dollar business. Amazon clarified later that he was referring to the revenue run rate for generative AI overall. That includes Bedrock, which is Amazonโ€™s managed service that offers access to AI models for building apps and services. [This has been updated since publication.]

How AWS thinks about its product strategy. Garman described a multi-layered approach to explain where AWS builds and where it leaves room for partners. At the bottom are core building blocks like compute and storage. AWS will always be there, he said.

In the middle are databases, analytics engines, and AI models, where AWS offers its own products and services alongside partners. At the top are millions of applications, where AWS builds selectively and only when it believes it has differentiated expertise.

Amazon is โ€œparticularly badโ€ at copying competitors. Garman was surprisingly blunt about what Amazon doesnโ€™t do well. โ€œOne of the things that Amazon is particularly bad at is being a fast follower,โ€ he said. โ€œWhen we try to copy someone, weโ€™re just bad at it.โ€ย 

The better formula, he said, is to think from first principles about solving a customer problem, only when it believes it has differentiated expertise, not simply to copy existing products.

US federal software reform bill aims to strengthen software management controls

Software management struggles that have pained enterprises for decades cause the same anguish to government agencies, and a bill making its way through the US House of Representatives to strengthen controls around government software management holds lessons for enterprises too.

The Strengthening Agency Management and Oversight of Software Assets (SAMOSA) bill, H.R. 5457, received unanimous approval from a key US House of Representative committee, the Committee on Oversight and Government Reform, on Tuesday.

SAMOSA is mostly focused on trying to fix โ€œsoftware asset management deficienciesโ€ as well as requiring more โ€œautomation of software license management processes and incorporation of discovery tools,โ€ issues that enterprises also have to deal with.

In addition, it requires anyone involved in software acquisition and development to be trained in the agencyโ€™s policies and, more usefully, in negotiation of contract terms, especially those that put restrictions on software deployment and use.

This training could also be quite useful for enterprise IT operations. It would teach โ€œnegotiating optionsโ€ and specifically the โ€œdifferences between acquiring commercial software products and services and acquiring or building custom software and determining the costs of different types of licenses and options for adjusting licenses to meet increasing or decreasing demand.โ€

The mandated training would also include tactics for measuring โ€œactual software usage via analytics that can identify inefficiencies to assist in rationalizing software spendingโ€ along with methods to โ€œsupport interoperable capabilities between software.โ€

Outlawing shadow IT

The bill also attempts to rein in shadow IT by โ€œrestricting the ability of a bureau, program, component, or operational entity within the agency to acquire, use, develop, or otherwise leverage any software entitlement without the approval of the Chief Information Officer of the agency.โ€ But there are no details about how such a rule would be enforced.

It would require agencies โ€œto provide an estimate of the costs to move toward more enterprise, open-source, or other licenses that do not restrict the use of software by the agency, and the projected cost savings, efficiency measures, and improvements to agency performance throughout the total software lifecycle.โ€ But the hiccup is that benefits will only materialize if technology vendors change their ways, especially in terms of transparency.

However, analysts and consultants are skeptical that such changes are likely to happen.

CIOs could be punished

Yvette Schmitter, a former Price Waterhouse Coopers principal who is now CEO of IT consulting firm Fusion Collective, was especially pessimistic about what would happen if enterprises tried to follow the billโ€™s rules.

โ€œIf the bill were to become law, it would set enterprise CIOs up for failure,โ€ she said. โ€œThe bill doubles down on the permission theater model, requiring CIO approval for every software acquisition while providing zero framework for the thousands of generative AI tools employees are already using without permission.โ€

She noted that although the bill mandates comprehensive assessments of โ€œsoftware paid for, in use, or deployed,โ€ it neglects critical facets of todayโ€™s AI software landscape. โ€œIt never defines how you access an AI agent that writes its own code, a foundation model trained on proprietary data, or an API that charges per token instead of per seat,โ€ she said. โ€œInstead of oversight, the bill would unlock chaos, potentially creating a compliance framework where CIOs could be punished for buying too many seats for a software tool, but face zero accountability for safely, properly, and ethically deploying AI systems.โ€

Schmitter added: โ€œThe bill is currently written for the 2015 IT landscape and assumes that our current AI systems come with instruction manuals and compliance frameworks, which they obviously do not.โ€

She also pointed out that the government seems to be working at cross-purposes. โ€œThe H.R. 5457 bill is absurd,โ€ she said. โ€œCongress is essentially mandating 18-month software license inventories while the White House is simultaneously launching the Genesis Mission executive order for AI that will spin up foundation models across federal agencies in the next nine months. Both of these moves are treating software as a cost center and AI as a strategic weapon, without recognizing that AI systems are software.โ€

Scott Bickley, advisory fellow at Info-Tech Research Group, was also unimpressed with the bill. โ€œIt is a sad, sad day when the US Federal government requires a literal Act of Congress to mandate the Software Asset Management (SAM) behaviors that should be in place across every agency already,โ€ Bickley said. โ€œOne can go review the [Office of Inspector General] reports for various government agencies, and it is clear to see that the bureaucracy has stifled all attempts, assuming there were attempts, at reining in the beast of software sprawl that exists today.โ€

Right goal, but toothless

Bickley said that the US government is in dire need of better software management, but that this bill, even if it was eventually signed into law, would be unlikely to deliver any meaningful reforms.ย 

โ€œThis also presumes the federal government actually negotiates good deals for its software. It unequivocally does not. Never has there been a larger customer that gets worse pricing and commercial terms than the [US] federal government,โ€ Bickley said. โ€œAt best, in the short term, this bill will further enrich consultants, as the people running IT for these agencies do not have the expertise, tooling, or knowledge of software/subscription licensing and IP to make headway on their own.โ€

On the bright side, Bickley said the goal of the bill is the right one, but the fact that the legislation didnโ€™t deliver or even call for more funding makes it toothless. โ€œThe bill is noble in its intent. But the fact that it requires a host of mandatory reporting, [Government Accountability Office] oversight, and actions related to inventory and overall [software bill of materials] rationalization with no new budget authorization is a pipe dream at best,โ€ he said.ย 

Sanchit Vir Gogia, the chief analyst at Greyhound Research, was more optimistic, saying that the bill would change the law in a way that should have happened long ago.

โ€œ[It] corrects a long-standing oversight in federal technology management. Agencies are currently spending close to $33 billion every year on software. Yet most lack a basic understanding of what software they own, what is being used, or where overlap exists. This confusion has been confirmed by the Government Accountability Office, which reported that nine of the largest agencies cannot identify their most-used or highest-cost software,โ€ Gogia said. โ€œAudit reports from NASA and the Environmental Protection Agency found millions of dollars wasted on licenses that were never activated or tracked. This legislation is designed to stop such inefficiencies by requiring agencies to catalogue their software, review all contracts, and build plans to eliminate unused or duplicate tools.โ€

Lacks operational realism

Gogia also argued, โ€œthe added pressure of transparency may also lead software providers to rethink their pricing and make it easier for agencies to adjust contracts in response to actual usage.โ€ If that happens, it would likely trickle into greater transparency for enterprise IT operations.ย 

Zahra Timsah, co-founder and CEO of i-GENTIC AI, applauded the intent of the bill, while raising logistical concerns about whether much would ultimately change even if it ultimately became law.

โ€œThe language finally forces agencies to quantify waste and technical fragmentation instead of talking about it in generalities. The section restricting bureaus from buying software without CIO approval is also a smart, direct hit on shadow IT. Whatโ€™s missing is operational realism,โ€ Timsah said. โ€œThe bill gives agencies a huge mandate with no funding, no capacity planning, and no clear methodology. You canโ€™t ask for full-stack interoperability scoring and lifecycle TCO analysis without giving CIOs the tools or budget to produce it. My concern is that agencies default to oversized consulting reports that check the box without actually changing anything.โ€

Timsah said that the bill โ€œis going to be very difficult to implement and to measure. How do you measure it is being followed?โ€ She added that agencies will parrot the billโ€™s wording and then try to hire people to manage the process. โ€œItโ€™s just going to be for opticโ€™s sake.โ€

Building resilience for AI workloads in the cloud

In 2025, more than 75% of organizations have reported using AI in at least one business function, according to McKinseyโ€™s latest Global Survey on AI.

AI has moved from pilots to production and now powers decisions, customer experiences, and compliance processes, raising the stakes for resilience. Outages, data corruption, or misconfigured agents can interrupt critical workflows, erode customer trust, and trigger regulatory scrutiny. Cloud platforms have become the backbone for AI workloads, offering elasticity and scale, yet many resilience programs were designed for older compute patterns.

But as AI adoption accelerates, cloud environments have evolved from simple compute and storage layers to sprawling ecosystems of data pipelines, model registries, orchestration tools, and agentic processes. The complexity demands resilience strategies that go beyond traditional recovery, ensuring rapid restoration of operations.

Why AI changes the resilience equation

AI amplifies the challenge of resilience. Data and infrastructure sprawl across hybrid and multi-cloud estates creates intricate dependency chains. Models evolve continuously, and autonomous agents can trigger unintended changes that ripple through systems. Traditional backup cannot guarantee a safe recovery point for these dynamic interactions.

Resilience begins with clear segmentation of environments, robust identity controls, and immutable copies of critical data. Observability must extend beyond virtual machines to include pipelines, model endpoints, and orchestration layers. Recovery should be validated in isolated environments to prevent hidden contamination from re-entering production. Automation is essential to reduce recovery time and ensure consistency across regions and providers. What organizations need is resilience that combines immutable backups, automated lineage tracking, and clean rollback to ensure that recovery is fast, accurate, and trusted.

A recent example highlights how an AI coding assistant at a tech firm went rogue and wiped out the production database of SaaStr, a startup, during a code freeze. The AI not only deleted critical data but also generated fake users and fabricated reports, making it difficult to identify a clean recovery point. The rogue AI action underscores how autonomous AI actions can cause cascading failures and why organizations need advanced resilience strategies.

Cognizant and Rubrik: A partnership for AI resilience

Cognizant and Rubrik deliver Business Resilience-as-a-Service (BRaaS), an offering for organizations scaling AI in the cloud. BRaaS leverages Cognizantโ€™s global delivery capabilities and cloud infrastructure expertise, alongside Rubrikโ€™s advanced cyber resilience platform. Together, they help address the need for AI workloads to have resilience controls that address the full lifecycle.

Rubrik Agent Cloud is designed to monitor and audit agentic actions, enforce real-time guardrails for agentic changes, fine-tune agents for accuracy, and undo agent mistakes. Built on the Rubrik Platform that uniquely combines data, identity, and application contexts, Rubrik Agent Cloud gives customers security, accuracy, and efficiency as they transform their organizations into AI enterprises.

Comprehensive controls over data, orchestration, and recovery can further an organizationโ€™s confidence in AI. Cognizantโ€™s Neuroยฎ AI platform features multi-agent orchestration with embedded policy guardrails operating across protected data estates.

Together, these capabilities support safe experimentation while shielding core business operations from risk. Cognizant and Rubrik aim to protect the foundation for the agentic AI era, where trusted data and rapid recovery are essential โ€” helping organizations gain the confidence to innovate with AI, knowing they can quickly and safely undo any destructive agent actions and maintain business resilience.

Practical guidance for enterprise teams

Leaders can strengthen AI resilience with eight practical steps:

  1. Inventory AI services and dependencies across models, pipelines, data sources, vector stores, orchestration tools, and consuming applications.
  2. Tier AI workloads and set recovery time and point objectives that match customer and regulatory expectations. Include model registries, feature stores, and prompt libraries in scope.
  3. Protect trusted data with immutable storage and frequent, policy-driven snapshots. Guard gold datasets and production feature stores as crown jewels.
  4. Validate recovery in isolation using clean rooms that mirror production scale. Confirm that models, data, and configurations work together before go-live.
  5. Automate recovery workflows and integrate with incident response, service management, monitoring, and identity systems for coordinated action.
  6. Harden identity and access with zero trust principles, short-lived credentials, and strong separation of duties for AI platform operations.
  7. Run end-to-end exercises that include technology, security, data, and business owners. Rehearse cutover, rollback, and communications. Close gaps with time-bound plans.
  8. Track a resilience scorecard for AI, including detection speed, isolation time, recovery performance by tier, validation frequency, and control drift.

By following these steps, organizations move beyond reactive recovery to embed resilience into AI operations. Proactive planning, rigorous validation, and continuous measurement ensure that innovation does not come at the expense of stability or trust. With the right safeguards in place, enterprises can scale AI confidently, knowing they are prepared to withstand disruptions and protect both business value and customer trust.

Leadership driven by insights and outcomes

Resilience is about continuity of outcomes, not only restoration of systems. When AI services remain trustworthy during a disruption, customers stay served, regulators see control, and teams can resume work without guesswork. Predictable recovery also builds confidence to scale AI programs. Leaders can allocate budgets more efficiently when recovery targets and costs are clear. Measurable progress shows up as faster mean time to recover and fewer failed cutbacks.

Conclusion: Innovate with confidence

AI adoption will continue to accelerate. Organizations that embed resilience into cloud architecture and operating models will move fast and with fewer surprises. Cognizant and Rubrik provide the platform, delivery scale, and service model to make that shift attainable. The goal is simple: keep data trusted, restore services cleanly, and validate outcomes before going live. With this foundation, AI becomes a growth engine that leaders can scale with confidence.

Take the next step towards resilient AI innovation. Contact Cognizant to assess your current posture, explore tailored Rubrik solutions, and discover how to safely scale your AI initiatives on a foundation of resilience and trust. To schedule your resilience assessment, get in touch at BusinessResilience@cognizant.com or click here to learn more.

About Sriramkumar Kumaresan

srcset="https://b2b-contenthub.com/wp-content/uploads/2025/12/Sriram-Headshot2.jpg?quality=50&strip=all 500w, https://b2b-contenthub.com/wp-content/uploads/2025/12/Sriram-Headshot2.jpg?resize=247%2C300&quality=50&strip=all 247w, https://b2b-contenthub.com/wp-content/uploads/2025/12/Sriram-Headshot2.jpg?resize=138%2C168&quality=50&strip=all 138w, https://b2b-contenthub.com/wp-content/uploads/2025/12/Sriram-Headshot2.jpg?resize=69%2C84&quality=50&strip=all 69w, https://b2b-contenthub.com/wp-content/uploads/2025/12/Sriram-Headshot2.jpg?resize=395%2C480&quality=50&strip=all 395w, https://b2b-contenthub.com/wp-content/uploads/2025/12/Sriram-Headshot2.jpg?resize=296%2C360&quality=50&strip=all 296w, https://b2b-contenthub.com/wp-content/uploads/2025/12/Sriram-Headshot2.jpg?resize=206%2C250&quality=50&strip=all 206w" width="500" height="608" sizes="auto, (max-width: 500px) 100vw, 500px">

Cognizant

Sriram Kumaresan leads the Global Cloud, Infrastructure and Security practice atCognizant, overseeing approximately 35,000 professionals. With over 25 years of experience, he excels in building and scaling businesses from strategy to execution. Sriram is responsible for driving market share (strategy, GTM and growth) and mindshare (offering, partner strategy and market positioning) through strategic approaches, customer centricity and the deep technical expertise inCognizantโ€™s Cloud, Infrastructure and Security business. Beyond his professional achievements, he is also a mentor and advocate for diversity in tech, aiming to inspire future IT leaders.

Microsoft drops AI sales targets in half after salespeople miss their quotas

Microsoft has lowered sales growth targets for its AI agent products after many salespeople missed their quotas in the fiscal year ending in June, according to a report Wednesday from The Information. The adjustment is reportedly unusual for Microsoft, and it comes after the company missed a number of ambitious sales goals for its AI offerings.

AI agents are specialized implementations of AI language models designed to perform multistep tasks autonomously rather than simply responding to single prompts. So-called โ€œagenticโ€ features have been central to Microsoftโ€™s 2025 sales pitch: At its Build conference in May, the company declared that it has entered โ€œthe era of AI agents.โ€

The company has promised customers that agents could automate complex tasks, such as generating dashboards from sales data or writing customer reports. At its Ignite conference in November, Microsoft announced new features like Word, Excel, and PowerPoint agents in Microsoft 365 Copilot, along with tools for building and deploying agents through Azure AI Foundry and Copilot Studio. But as the year draws to a close, that promise has proven harder to deliver than the company expected.

Read full article

Comments

ยฉ Wong Yu Liang via Getty Images

AI is the new cloud: What the platform revolution teaches us about innovation

Artificial intelligence is the most transformative technology shift since the birth of cloud computing.

Two decades ago, cloud platforms changed how enterprises thought about infrastructure. Right now, as youโ€™re reading this, AI platforms are changing how enterprises think about intelligence.

The parallels between the two are well worth highlighting. In the early 2000s, CIOs debated whether to build their own data centers or trust a shared platform like AWS. Now, 20 years on, theyโ€™re asking a similar question: should we build our own large language models, or build on them?

I believe that the lesson from the cloud era still applies. Competitive advantage comes from leveraging the platforms that already exist and innovating on top of them rather than owning the infrastructure. Letโ€™s get into why thatโ€™s the case.

The cloudโ€™s first lesson: Leverage, donโ€™t reinvent

When the first generation of cloud services appeared, their broadest appeal was speed. Developers could launch applications in minutes instead of months.

However, while speed was the most obvious appeal here, the cloudโ€™s real breakthrough was strategic. By handing off infrastructure management, companies could redirect their energy toward experience and innovation.

The enterprises that tried to replicate the โ€œhyperscalersโ€ by building their own clouds from scratch discovered how hard it was to keep up with the pace of platform evolution. Costs ballooned at the same time that velocity disappeared. Those who embraced the leverage model (using shared platforms as a foundation) moved faster and spent less.

AI is now at the same crossroads. The instinct to build proprietary models from the ground up feels familiar, but itโ€™s no more the right move than it was with cloud. Large language models have become a new layer of digital infrastructure that is analogous to compute and storage in the cloud era. They are utilities that are powerful, scalable and continuously improving through collective use.

I believe that owning the plumbing no longer differentiates you, and that it never did. The question for leaders isnโ€™t โ€œCan we build our own model?โ€ Itโ€™s โ€œWhat unique value can we deliver by building upon one?โ€

The power of open ecosystems

The rise of cloud was never about one product. It was about an ecosystem that invited participation. I worked at AWS, and I can tell you that its greatest innovation was an architecture that encouraged others to build on top of it. Every API call became a building block for something new.

AI platforms are following the same pattern. Tools like OpenAI, Anthropic and others are offering open interfaces and SDKs that turn intelligence into an accessible service. This openness fuels compounding innovation in the form of an ecosystem that every developer, data scientist and business analyst can contribute to.

Enterprises that align with open ecosystems benefit from shared progress. They can experiment without owning the entire stack and move faster as the underlying technology improves. Closed systems, though, tend to stagnate. When innovation depends solely on internal capacity, growth slows, costs rise and talent disperses.

From what Iโ€™ve seen across my career, the future belongs to platforms that treat users as co-creators. Products and ecosystems scale exponentially because every user is also a contributor!

The feedback flywheel

Feedback is one of technologyโ€™s most underappreciated engines of progress. I remember AWS famously saying that 90% of its roadmap came directly from customer requests. When I was there, I saw firsthand how each improvement drove more usage, which generated more feedback, which drove more innovation.

AI systems are built on the same dynamic. Reinforcement learning, fine-tuning and user telemetry all feed the modelโ€™s evolution. Every query, correction or prompt becomes a signal that refines the next response.

This feedback flywheel is now extending into enterprise AI adoption. Each workflow, chat interaction and model output is an opportunity to learn. The organizations that intentionally design feedback loops to flow between users, data and developers evolve their systems faster than those treating AI as a static tool. The former will become industry leaders while the latter lags behind.

What does this look like it practice? Teams must instrument AI use cases with metrics, monitor accuracy and context, and close the loop quickly when things go wrong. Feedback is a strategy for continuous learning, not some trivial support function.

The most advanced AI organizations are the ones with the tightest feedback loops, not the biggest models.

Platform thinking inside the enterprise

What does all of this mean for CIOs and technology leaders? It means applying the principles of platform thinking within your own walls.

I tell my clients to start by viewing their enterprise not as a collection of systems, but as a platform others can build upon. Create reusable AI capabilities like data pipelines, governance frameworks and integration patterns that different business units can safely leverage. Encourage decentralized innovation by giving teams the guardrails and APIs to experiment.

In the cloud era, self-service infrastructure changed how developers worked. In the AI era, self-service intelligence is doing the same. Marketing teams generate insights from unstructured data, HR automates knowledge discovery for onboarding, finance uses AI-powered forecasting to model business outcomes, and so on and so forth. Each function builds on a shared foundation while adding its own flavor of domain expertise.

CIOs play the critical role of orchestrator. Their job is to ensure interoperability, security and ethical use while enabling freedom at the edge. That balance between control and creativity will define the next generation of enterprise leaders.

Avoiding the reinvention trap

Thereโ€™s a natural temptation to build everything in-house, especially in technology-driven organizations. It feels safer and more controllable, but history shows how easily that instinct can slow progress.

Iโ€™ve seen enterprises that tried to build their own private clouds fail to match the scale or speed of public ones. The same is true of AI. Training proprietary models consumes extraordinary compute and talent, while the underlying platforms advance faster than any single company can replicate.

The smarter move is to differentiate at the application layer through data strategy, user experience and domain-specific integration. Build the intelligence that understands your business while also relying on established platforms for the generic cognition that everyone needs.

The organizations that thrive will be those that orchestrate AI across their ecosystems, not those that try to reinvent it in isolation.

The leadership imperative

AI represents a once-in-a-generation shift. However, like every major shift before it, the winners will be those who learn the right lessons from history.

The cloud taught us that leverage beats ownership, ecosystems beat silos and feedback beats static roadmaps. AI simply brings those lessons into a new domain.

For CIOs and senior technology leaders, the mandate is clear: build architectures that learn and that use open ecosystems to accelerate progress. Make feedback a cultural habit instead of an afterthought. Focus your talent on solving unique business problems instead of replicating what the platforms already provide.

The question isnโ€™t whether AI will transform your enterprise; it already is. The question is whether youโ€™ll build on the right platform to make that transformation sustainable, ethical and fast.

I believe that the future belongs to leaders who understand that innovation is about what you enable, not โ€˜justโ€™ about what you own.

This article is published as part of the Foundry Expert Contributor Network.
Want to join?

AWS offers new service to make AI models better at work

Enterprises are no longer asking whether they should adopt AI; rather, they want to know why the AI they have already deployed still canโ€™t reason as their business requires it to.

Those AI systems are often missing an enterpriseโ€™s specific business context, because they are trained on generic, public data, and itโ€™s expensive and time-consuming to fine-tune or retrain them on proprietary data, if thatโ€™s even possible.

Microsoftโ€™s approach, unveiled at Ignite last month, is to wrap AI applications and agents with business context and semantic intelligence in its Fabric IQ and Work IQ offerings.

AWS is taking a different route, inviting enterprises to build their business context directly into the models that will run their applications and agents, as its CEO Matt Garman explained in his opening keynote at the companyโ€™s re:Invent show this week.

Third-party models donโ€™t have access to proprietary data, he said, and building models with that data from scratch is impractical, while adding it to an existing model through retrieval augmented generation (RAG), vector search, or fine-tuning has limitations.

But, he asked, โ€œWhat if you could integrate your data at the right time during the training of a frontier model and then create a proprietary model that was just for you?โ€

AWSโ€™s answer to that is Nova Forge, a new service that enterprises can use to customize a foundation large language model (LLM) to their business context by blending their proprietary business data with AWS-curated training data. That way, the model can internalize their business logic rather than having to reference it externally again and again for inferencing.

Analysts agreed with Garmanโ€™s assessment of the limitations in existing methods that Nova Forge aims to circumvent.

โ€œPrompt engineering, RAG, and even standard supervised fine-tuning are powerful, but they sit on top of a fully trained model and are inherently constrained. Enterprises come up against context windows, latency, orchestration complexity. Itโ€™s a lot of work, and prone to error, to continuously โ€˜bolt onโ€™ domain expertise,โ€ said Stephanie Walter, practice leader of AI stack at HyperFRAME Research.

In contrast, said ISGโ€™s executive director of software research, David Menninger, Nova Forgeโ€™s approach can simplify things: โ€œIf the LLM can be modified to incorporate the relevant information, it makes the inference process much easier to manage and maintain.โ€

Who owns what

HFS Researchโ€™s associate practice leader Akshat Tyagi, broke down the two companiesโ€™ strategies: โ€œMicrosoft wants to own the AI experience. AWS wants to own the AI factory. Microsoft is packaging intelligence inside its ecosystem. AWS is handing you the tools to create your own intelligence and run it privately,โ€ he said.

While Microsoftโ€™s IQ message essentially argues that enterprises donโ€™t need sprawling frontier models and can work with compact, business-aware models that stay securely within their tenant and boost productivity, AWS is effectively asking enterprises not to settle for tweaking an existing model but use its tools to create a nearโ€“frontier-grade model tailored to their business, Tyagi said.

The subtext is clear, he said: AWS knows itโ€™s unlikely to dominate the assistant or productivity layer, so itโ€™s doubling down on its core strengths of deep infrastructure, while Microsoft is playing the opposite game.

Nova Forge is a clear infrastructure play, Walter said. โ€œIt gives AWS a way to drive Trainium, Bedrock, and SageMaker as a unified frontier-model platform while offering enterprises a less expensive path than bespoke AI labs.โ€

The approach AWS is taking with Nova Forge will curry favor with enterprises working on use cases that require precision and nuance, including drug discovery, healthcare, industrial control, highly regulated financial workflows, and enterprise-wide code assistants, she said.

Custom LLM training costs

In his keynote, Garman said that Nova Forge eliminates the prohibitive cost, time, and engineering drag of designing and training a LLM from scratch โ€” the same barrier that has stopped most enterprises, and even rivals such as Microsoft, from attempting to provide a solution at this layer.

It does so by offering a pre-trained model and various training checkpoints or snapshots of the model to jumpstart the custom model building activity instead of having to pre-train it from scratch or retrain it for context again and again, which AWS argues is a billion-dollar affair.

By choosing whether they want to start from a checkpoint in early pre-training, mid-training, or postโ€‘training, said Robert Kramer, principal analyst at Moor Strategy and Insights, โ€œEnterprise choose how deeply they want their domain to shape the model.โ€

AWS plans to offer the service through a subscription model rather than an open-ended compute consumption model. It didnโ€™t disclose the price publicly, referring customers to an online dashboard, but CNBC reported that Nova Forgeโ€™s price starts at $100,000 per year.

Enterprises can start building a custom building a model via the new service on SageMaker Studio and later export it to Bedrock for consumption, AWS said. Nova Forgeโ€™s availability is currently limited to the US East region in Northern Virginia.

AWS, โ€˜ํ”„๋ก ํ‹ฐ์–ด AI ์—์ด์ „ํŠธโ€™ ์ œํ’ˆ๊ตฐ ์ถœ์‹œยทยทยทโ€œ์†Œํ”„ํŠธ์›จ์–ด ๊ฐœ๋ฐœ ์ „ ๊ณผ์ • ์ž์œจ ์ˆ˜ํ–‰โ€

์•„๋งˆ์กด์›น์„œ๋น„์Šค(AWS)๊ฐ€ ํ”„๋ก ํ‹ฐ์–ด ์—์ด์ „ํŠธ(Frontier Agents)๋ผ๋Š” ์ƒˆ๋กœ์šด AI ์—์ด์ „ํŠธ ์ œํ’ˆ๊ตฐ์„ ๊ณต๊ฐœํ–ˆ๋‹ค. AWS๋Š” ์ด ์ œํ’ˆ๊ตฐ์ด ์‚ฌ์šฉ์ž ๊ฐœ์ž… ์—†์ด ์ˆ˜ ์‹œ๊ฐ„์—์„œ ์ˆ˜ ์ผ ๋™์•ˆ ๋…๋ฆฝ์ ์œผ๋กœ ์ž‘์—…์„ ์ˆ˜ํ–‰ํ•  ์ˆ˜ ์žˆ๋‹ค๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค. ์ฒซ ๋ฒˆ์งธ ๋ผ์ธ์—…์€ ์†Œํ”„ํŠธ์›จ์–ด ๊ฐœ๋ฐœ ์—…๋ฌด์— ์ดˆ์ ์„ ๋งž์ถ˜ 3๊ฐ€์ง€ ์—์ด์ „ํŠธ๋กœ ๊ตฌ์„ฑ๋๋‹ค.

AWS๊ฐ€ ์ง€๋‚œ 2์ผ ๋ฐœํ‘œํ•œ ํ•ด๋‹น ์ œํ’ˆ๊ตฐ์—๋Š” ํ‚ค๋กœ(Kiro) ์ž์œจ ์—์ด์ „ํŠธ, AWS ์‹œํ๋ฆฌํ‹ฐ ์—์ด์ „ํŠธ, AWS ๋ฐ๋ธŒ์˜ต์Šค ์—์ด์ „ํŠธ๊ฐ€ ์žˆ๋‹ค. ์ด๋Š” ๊ฐ๊ฐ ์†Œํ”„ํŠธ์›จ์–ด ๊ฐœ๋ฐœ ์ƒ๋ช…์ฃผ๊ธฐ์˜ ๋‹ค๋ฅธ ์˜์—ญ์„ ๋งก๋Š”๋‹ค. AWS๋Š” ์ด๋“ค ์—์ด์ „ํŠธ๊ฐ€ ๊ธฐ์กด์˜ ๊ฐœ๋ณ„ ์ž‘์—… ๋ณด์กฐ ์ˆ˜์ค€์„ ๋„˜์–ด, ์‚ฌ์šฉ์ž์˜ ํŒ€์›์œผ๋กœ์„œ ๋ณต์žกํ•œ ํ”„๋กœ์ ํŠธ๋ฅผ ์Šค์Šค๋กœ ์™„๊ฒฐํ•˜๋Š” ๋‹จ๊ณ„๋กœ ์ง„ํ™”ํ–ˆ๋‹ค๊ณ  ์ „ํ–ˆ๋‹ค.

๊ทธ ์ค‘ ํ‚ค๋กœ ์ž์œจ ์—์ด์ „ํŠธ๋Š” ๋…๋ฆฝ์ ์œผ๋กœ ์ผํ•˜๋ฉด์„œ๋„ ๋งฅ๋ฝ์„ ์œ ์ง€ํ•˜๊ณ  ์ง€์†์ ์œผ๋กœ ํ•™์Šตํ•˜๋Š” ๊ฐ€์ƒ ๊ฐœ๋ฐœ์ž๋‹ค. ์‚ฌ์šฉ์ž๋Š” ์ค‘์š”ํ•œ ์šฐ์„ ์ˆœ์œ„ ์ž‘์—…์— ์ง‘์ค‘ํ•  ์ˆ˜ ์žˆ๊ณ , ํ‚ค๋กœ๋Š” ์žฅ๊ธฐ๊ฐ„ ๊ฐœ๋ฐœ ์—…๋ฌด๋ฅผ ์ˆ˜ํ–‰ํ•œ๋‹ค. AWS ์‹œํ๋ฆฌํ‹ฐ ์—์ด์ „ํŠธ๋Š” ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ์„ค๊ณ„ ๋ณด์•ˆ ์ปจ์„คํŒ…๋ถ€ํ„ฐ ์ฝ”๋“œ ๋ฆฌ๋ทฐ, ๋ชจ์˜์นจํˆฌ๊นŒ์ง€ ์ง€์›ํ•˜๋Š” ๊ฐ€์ƒ ๋ณด์•ˆ ์—”์ง€๋‹ˆ์–ด ์—ญํ• ์„ ํ•œ๋‹ค. AWS ๋ฐ๋ธŒ์˜ต์Šค ์—์ด์ „ํŠธ์˜ ๊ฒฝ์šฐ, ์žฅ์•  ํ•ด๊ฒฐ๊ณผ ์˜ˆ๋ฐฉ์„ ๋•๊ณ  ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์˜ ์•ˆ์ •์„ฑ๊ณผ ์„ฑ๋Šฅ์„ ์ง€์†์ ์œผ๋กœ ๋†’์ด๋Š” ๊ฐ€์ƒ ์šด์˜ ์—”์ง€๋‹ˆ์–ด๋กœ ์„ค๊ณ„๋๋‹ค.

3๊ฐ€์ง€ ์—์ด์ „ํŠธ๋Š” ๋ชจ๋‘ ํ”„๋ฆฌ๋ทฐ ํ˜•ํƒœ๋กœ ์ œ๊ณต๋œ๋‹ค. ํ‚ค๋กœ ์—์ด์ „ํŠธ๋Š” ํŒ€์› ๋ชจ๋‘๊ฐ€ ๊ณต๋™์œผ๋กœ ํ™œ์šฉํ•˜๋Š” ์—์ด์ „ํŠธ๋กœ, ํŒ€ ์ฐจ์›์˜ ์ฝ”๋“œ๋ฒ ์ด์Šค์™€ ์ œํ’ˆ, ๊ฐœ๋ฐœ ํ‘œ์ค€์— ๋Œ€ํ•œ ์ผ๊ด€๋œ ์ดํ•ด๋ฅผ ํ˜•์„ฑํ•˜๋Š” ๋ฐ ๊ธฐ์—ฌํ•œ๋‹ค. ๋˜ํ•œ ์ €์žฅ์†Œ์™€ ํŒŒ์ดํ”„๋ผ์ธ, ์ง€๋ผ(Jira) ๋ฐ ๊นƒํ—ˆ๋ธŒ(GitHub) ๊ฐ™์€ ๋„๊ตฌ์— ์—ฐ๊ฒฐํ•ด ์ž‘์—… ์ง„ํ–‰ ๊ณผ์ •์˜ ๋งฅ๋ฝ์„ ์ง€์†์ ์œผ๋กœ ์œ ์ง€ํ•œ๋‹ค. ํ‚ค๋กœ๋Š” ์ด์ „๊นŒ์ง€ ์—์ด์ „ํ‹ฑ AI ๊ฐœ๋ฐœํ™˜๊ฒฝ(IDE)์œผ๋กœ ์†Œ๊ฐœ๋œ ๋ฐ” ์žˆ๋‹ค. AWS ์‹œํ๋ฆฌํ‹ฐ ์—์ด์ „ํŠธ๋Š” AWS๋ฟ ์•„๋‹ˆ๋ผ ๋ฉ€ํ‹ฐํด๋ผ์šฐ๋“œ์™€ ํ•˜์ด๋ธŒ๋ฆฌ๋“œ ํ™˜๊ฒฝ ์ „๋ฐ˜์—์„œ ์ดˆ๊ธฐ ๋‹จ๊ณ„๋ถ€ํ„ฐ ๋ณด์•ˆ์„ ๋‚ด์žฌํ™”ํ•œ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์„ ๊ตฌ์ถ•ํ•˜๋„๋ก ์ง€์›ํ•œ๋‹ค. AWS ๋ฐ๋ธŒ์˜ต์Šค ์—์ด์ „ํŠธ์˜ ๊ฒฝ์šฐ, ์žฅ์•  ๋ฐœ์ƒ ์‹œ ์ฆ‰๊ฐ ๋Œ€์‘ํ•˜๋Š” โ€˜์˜จ์ฝœโ€™ ์—ญํ• ์„ ํ•˜๋ฉฐ, ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์˜ ๋™์ž‘ ๋ฐฉ์‹๊ณผ ๊ตฌ์„ฑ ์š”์†Œ ๊ฐ„ ๊ด€๊ณ„์— ๋Œ€ํ•œ ์ดํ•ด๋ฅผ ๊ธฐ๋ฐ˜์œผ๋กœ ์„œ๋น„์Šค ์ค‘๋‹จ์˜ ๊ทผ๋ณธ ์›์ธ์„ ์ฐพ์•„๋‚ธ๋‹ค.

AWS๋Š” ๋Œ€๊ทœ๋ชจ ์„œ๋น„์Šค๋ฅผ ๊ฐœ๋ฐœํ•˜๋Š” ๋‚ด๋ถ€ ํŒ€์„ ๋ฉด๋ฐ€ํžˆ ๋ถ„์„ํ•œ ๋’ค ๋„์ถœํ•œ 3๊ฐ€์ง€ ํ•ต์‹ฌ ํ†ต์ฐฐ์„ ๋ฐ”ํƒ•์œผ๋กœ ํ”„๋ก ํ‹ฐ์–ด ์—์ด์ „ํŠธ๋ฅผ ๋งŒ๋“ค์—ˆ๋‹ค๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค. ๋จผ์ € AWS๋Š” ์—์ด์ „ํŠธ๊ฐ€ ์ž˜ํ•˜๋Š” ์ผ๊ณผ ๊ทธ๋ ‡์ง€ ์•Š์€ ์ผ์„ ๋ช…ํ™•ํžˆ ๊ตฌ๋ถ„ํ•˜๋Š” ๊ฒƒ์ด ์ค‘์š”ํ•˜๋‹ค๋Š” ์ ์„ ํ™•์ธํ–ˆ๋‹ค. ์ด๋ฅผ ํ†ตํ•ด ๊ฐœ๋ฐœํŒ€์€ ์—์ด์ „ํŠธ์˜ ๋ชจ๋“  ์„ธ๋ถ€ ์ž‘์—…์„ ์ผ์ผ์ด ์ง€์ผœ๋ณด๋ฉฐ ๊ฐ„์„ญํ•˜๋Š” ๋ฐฉ์‹์—์„œ ๋ฒ—์–ด๋‚˜, ํฐ ๋ชฉํ‘œ์™€ ๋ฐฉํ–ฅ์„ ์ œ์‹œํ•˜๊ณ  ๊ทธ ์•ˆ์—์„œ ์Šค์Šค๋กœ ์ผ์„ ์ง„ํ–‰ํ•˜๊ฒŒ ํ•˜๋Š” ์šด์˜ ๋ฐฉ์‹์œผ๋กœ ์ „ํ™˜ํ•  ์ˆ˜ ์žˆ์—ˆ๋‹ค. ๋‹ค์Œ ํ†ต์ฐฐ์€ ํŒ€์˜ ๊ฐœ๋ฐœ ์†๋„๊ฐ€ ์–ผ๋งˆ๋‚˜ ๋งŽ์€ ์—์ด์ „ํŠธ ๊ธฐ๋ฐ˜ ์ž‘์—…์„ ๋™์‹œ์— ๋Œ๋ฆด ์ˆ˜ ์žˆ๋Š”์ง€์— ํฌ๊ฒŒ ์ขŒ์šฐ๋๋‹ค๋Š” ์ ์ด๋‹ค. ๋งˆ์ง€๋ง‰์œผ๋กœ ์—์ด์ „ํŠธ๋Š” ๋…๋ฆฝ์ ์œผ๋กœ ์šด์˜๋˜๋Š” ์‹œ๊ฐ„์ด ๊ธธ์–ด์งˆ์ˆ˜๋ก ์„ฑ๊ณผ๊ฐ€ ์ข‹์•„์กŒ๋‹ค.

AWS๋Š” ์ด ๋ถ„์„์„ ํ†ตํ•ด, ๋ณด์•ˆ์ด๋‚˜ ์šด์˜์ฒ˜๋Ÿผ ์†Œํ”„ํŠธ์›จ์–ด ๊ฐœ๋ฐœ ์ƒ๋ช…์ฃผ๊ธฐ์˜ ๋ชจ๋“  ๋‹จ๊ณ„์—์„œ ๋™์ผํ•œ ์ˆ˜์ค€์˜ ์—์ด์ „ํŠธ ์—ญ๋Ÿ‰์ด ๊ฐ–์ถฐ์ง€์ง€ ์•Š์œผ๋ฉด ์ƒˆ๋กœ์šด ๋ณ‘๋ชฉ์ด ๋ฐœ์ƒํ•  ์ˆ˜ ์žˆ๋‹ค๋Š” ์ ์„ ํ™•์ธํ–ˆ๋‹ค๊ณ  ์ „ํ–ˆ๋‹ค.
dl-ciokorea@foundryco.com

์•„์นด๋งˆ์ด, 2026๋…„ ์•„์‹œ์•„ยทํƒœํ‰์–‘ ์ง€์—ญ ํด๋ผ์šฐ๋“œ ๋ฐ ๋ณด์•ˆ ์ „๋ง ๋ฐœํ‘œ

์‚ฌ์ด๋ฒ„๋ณด์•ˆ ๋ฐ ํด๋ผ์šฐ๋“œ ์„œ๋น„์Šค ์—…์ฒด ์•„์นด๋งˆ์ด ํ…Œํฌ๋†€๋กœ์ง€์Šค๊ฐ€ APAC ์ง€์—ญ์„ ๋Œ€์ƒ์œผ๋กœ 2026๋…„ ํด๋ผ์šฐ๋“œ ๋ฐ ๋ณด์•ˆ ์ „๋ง์„ ๋ฐœํ‘œํ•˜๋ฉฐ, AI ๊ธฐ๋ฐ˜ ์œ„ํ˜‘ ์ฆ๊ฐ€, ๊ฐ•ํ™”๋˜๋Š” ๋ฐ์ดํ„ฐ ์ฃผ๊ถŒ ๊ทœ์ œ, ๋ถ„์‚ฐํ˜• AI ์šด์˜ ํ™•๋Œ€๋กœ ์ธํ•ด ๊ธฐ์—…์˜ ๋””์ง€ํ„ธ ์ธํ”„๋ผ ๊ตฌ์ถ•ยท๋ณดํ˜ธยท๊ฑฐ๋ฒ„๋„Œ์Šค ๋ฐฉ์‹์— ํฐ ๋ณ€ํ™”๊ฐ€ ๋‚˜ํƒ€๋‚  ๊ฒƒ์œผ๋กœ ์ „๋งํ–ˆ๋‹ค.

๋ณด์•ˆ : AI ๊ธฐ๋ฐ˜ ์‚ฌ์ด๋ฒ„ ์œ„ํ˜‘์˜ ๊ฐ€์†ํ™”

์ž์œจํ˜• AI๋กœ ๊ณต๊ฒฉ ์†๋„ ๋‹จ์ถ•

2026๋…„ ์•„ํƒœ ์ง€์—ญ์—์„œ๋Š” AI๊ฐ€ ์ฃผ๋„ํ•˜๋Š” ์ž๋™ํ™” ๊ณต๊ฒฉ, ์ด๋ฅธ๋ฐ” โ€˜์ž์œจํ˜• ์œ„ํ˜‘โ€™์ด ๋ณธ๊ฒฉํ™”๋  ๊ฒƒ์œผ๋กœ ์˜ˆ์ƒ๋œ๋‹ค. ๊ณต๊ฒฉ์ž๋Š” ์ƒ์„ฑํ˜• AI์™€ ์ž์œจํ˜• AI๋ฅผ ํ™œ์šฉํ•ด ์ทจ์•ฝ์ ์„ ํƒ์ง€ํ•˜๊ณ  ์—”ํŠธ๋ฆฌ ํฌ์ธํŠธ๋ฅผ ์ ๊ฒ€ํ•˜๋ฉฐ, ์ตœ์†Œํ•œ์˜ ์ธ์  ๊ฐœ์ž…๋งŒ์œผ๋กœ ๊ณต๊ฒฉ์„ ์‹คํ–‰ํ•˜๊ฒŒ ๋œ๋‹ค. ์ด๋กœ ์ธํ•ด ๊ธฐ์กด์— ์ˆ˜์ฃผ๊ฐ€ ๊ฑธ๋ฆฌ๋˜ ๊ณต๊ฒฉ์ด ์ˆ˜ ์‹œ๊ฐ„ ๋‚ด๋กœ ์••์ถ•๋  ์ „๋ง์ด๋ฉฐ, ํ•œ๊ตญ, ์‹ฑ๊ฐ€ํฌ๋ฅด, ์ผ๋ณธ ๋“ฑ ๋””์ง€ํ„ธ ์˜์กด๋„๊ฐ€ ๋†’์€ ์‹œ์žฅ์—์„œ ์ „๋ฐ˜์ ์ธ ๋ฆฌ์Šคํฌ๊ฐ€ ํ™•๋Œ€๋  ๊ฒƒ์œผ๋กœ ๋ณด์ธ๋‹ค.

API๊ฐ€ ์ฃผ์š” ๊ณต๊ฒฉ ๊ฒฝ๋กœ๋กœ ๋ถ€์ƒ

๋””์ง€ํ„ธ ๋ฑ…ํ‚น, ๊ณต๊ณต ์„œ๋น„์Šค, ๋ฆฌํ…Œ์ผ ์„œ๋น„์Šค ๋“ฑ์ด API ์ƒํƒœ๊ณ„์— ์˜์กดํ•˜๋Š” ๋น„์ค‘์ด ๋†’์•„์ง€๋ฉด์„œ API ๊ธฐ๋ฐ˜ ๊ณต๊ฒฉ์ด ์›น ๊ธฐ๋ฐ˜ ๊ณต๊ฒฉ์„ ๋„˜์–ด ์ฃผ์š” ์นจํˆฌ ๊ฒฝ๋กœ๋กœ ์ž๋ฆฌ ์žก์„ ๊ฒƒ์œผ๋กœ ์˜ˆ์ƒ๋œ๋‹ค. ์•„ํƒœ ์ง€์—ญ ๊ธฐ์—…์˜ 80% ์ด์ƒ์ด ์ง€๋‚œ 1๋…„๊ฐ„ ์ตœ์†Œ ํ•œ ๊ฑด ์ด์ƒ์˜ API ๋ณด์•ˆ ์‚ฌ๊ณ ๋ฅผ ๊ฒฝํ—˜ํ–ˆ์œผ๋ฉฐ, ์•ฝ 2/3๋Š” ๋ฏผ๊ฐ ๋ฐ์ดํ„ฐ๋ฅผ ์ฒ˜๋ฆฌํ•˜๋Š” API ๋ชฉ๋ก์กฐ์ฐจ ์™„์ „ํžˆ ํŒŒ์•…ํ•˜์ง€ ๋ชปํ•˜๊ณ  ์žˆ๋Š” ๊ฒƒ์œผ๋กœ ๋‚˜ํƒ€๋‚ฌ๋‹ค. ๋‚ฎ์€ ๊ฐ€์‹œ์„ฑ๊ณผ AI ๊ธฐ๋ฐ˜ ์ž๋™ํ™” ๊ณต๊ฒฉ์ด ๊ฒฐํ•ฉ๋˜๋ฉด์„œ API ์ทจ์•ฝ์  ์•…์šฉ ๊ฐ€๋Šฅ์„ฑ์€ ๋”์šฑ ์ปค์ง€๊ณ  ์žˆ๋‹ค.

๋žœ์„ฌ์›จ์–ด์˜ ์ƒํ’ˆํ™” ํ™•์‚ฐ

2026๋…„์—๋Š” ๋žœ์„ฌ์›จ์–ด๊ฐ€ ๋”์šฑ ๋ณดํŽธํ™”๋ผ ์‚ฌ์ด๋ฒ„ ๋ฒ”์ฃ„ ์ƒํƒœ๊ณ„๊ฐ€ ํ™•๋Œ€๋  ์ „๋ง์ด๋‹ค. ์„œ๋น„์Šคํ˜• ๋žœ์„ฌ์›จ์–ด(Ransomware-as-a-Service) ๊ตฌ๋… ๋ชจ๋ธ ํ™•์‚ฐ, AI ๊ธฐ๋ฐ˜ โ€˜๋ฐ”์ด๋ธŒ ํ•ดํ‚น(vibe hacking)โ€™ ํ™œ์šฉ, ๋ฒ”์ฃ„ ์ง‘๋‹จยทํ•ตํ‹ฐ๋น„์ŠคํŠธยท๊ตญ๊ฐ€ ๊ธฐ๋ฐ˜ ์œ„ํ˜‘ ๊ทธ๋ฃน ๊ฐ„ ํ˜‘์—… ์ฆ๊ฐ€๊ฐ€ ๋งž๋ฌผ๋ฆฌ๋ฉฐ ๋ˆ„๊ตฌ๋‚˜ ๋Œ€๊ทœ๋ชจ ๊ณต๊ฒฉ์„ ์‹œ๋„ํ•  ์ˆ˜ ์žˆ๋Š” ํ™˜๊ฒฝ์ด ์กฐ์„ฑ๋˜๊ณ  ์žˆ๋‹ค. ๊ธˆ์œต, ํ—ฌ์Šค์ผ€์–ด, ๋ฆฌํ…Œ์ผ, ๋ฏธ๋””์–ด ๋“ฑ ๋ฏผ๊ฐ ๋ฐ์ดํ„ฐ๋ฅผ ๋ณด์œ ํ•œ ์‚ฐ์—…์ด ์ฃผ์š” ํ‘œ์ ์ด ๋  ๊ฒƒ์œผ๋กœ ๋ณด์ด๋ฉฐ, MSP์™€ ๊ณต๊ธ‰๋ง ์—…์ฒด๋„ ์ฃผ์š” ๊ณต๊ฒฉ ์ง€์ ์œผ๋กœ ๋ถ€์ƒํ•  ์ „๋ง์ด๋‹ค. ๋ฐ˜๋„์ฒด ๋“ฑ ํ•˜์ดํ…Œํฌ ์‚ฐ์—… ์—ญ์‹œ ๋†’์€ ์œ„ํ—˜์— ๋…ธ์ถœ๋  ๊ฒƒ์œผ๋กœ ์˜ˆ์ธก๋œ๋‹ค.

์•„์นด๋งˆ์ด ๋ณด์•ˆ ๊ธฐ์ˆ  ๋ฐ ์ „๋žต ๋ถ€๋ฌธ ๋””๋ ‰ํ„ฐ ๋ฃจ๋ฒค ์ฝ”๋Š” โ€œAI๊ฐ€ ์•„ํƒœ ์ง€์—ญ์˜ ์‚ฌ์ด๋ฒ„ ๊ณต๊ฒฉ ๊ตฌ์กฐ ์ž์ฒด๋ฅผ ๋ณ€ํ™”์‹œํ‚ค๊ณ  ์žˆ์œผ๋ฉฐ, ๊ณต๊ฒฉ์ž๋Š” ์ธ๋ ฅ ํ™•์ถฉ์ด ์•„๋‹Œ ์ž๋™ํ™”๋ฅผ ํ†ตํ•ด ๊ณต๊ฒฉ ๋ฒ”์œ„๋ฅผ ํ™•๋Œ€ํ•˜๊ณ  ์žˆ๋‹คโ€๋ผ๋ฉฐ โ€œ๊ธฐ์—…์€ ๋” ์ด์ƒ ์ธ๋ ฅ ์ค‘์‹ฌ์˜ ๋ฐฉ์–ด ์ฒด๊ณ„์—๋งŒ ์˜์กดํ•  ์ˆ˜ ์—†๋‹คโ€๋ผ๊ณ  ๋งํ–ˆ๋‹ค.

์ด์–ด โ€œ๋ณด์•ˆํŒ€์€ ๊ณต๊ฒฉ์ž์™€ ๋™์ผํ•œ ์†๋„๋กœ ์œ„ํ˜‘์„ ํƒ์ง€ยท๋ถ„์„ยท์ฐจ๋‹จํ•ด์•ผ ํ•˜๋ฉฐ, ์ด๋ฅผ ์œ„ํ•ด API ๊ฑฐ๋ฒ„๋„Œ์Šค ํ˜„๋Œ€ํ™”, ์ž๋™ํ™”๋œ ์œ„ํ˜‘ ์ฐจ๋‹จ ์‹œ์Šคํ…œ ํˆฌ์ž, ๊ณต๊ธ‰๋ง ๋ณต์›๋ ฅ ๊ฐ•ํ™”๊ฐ€ ํ•„์š”ํ•˜๋‹คโ€๋ผ๋ฉฐ โ€œ์ด๋Ÿฐ ๋Œ€์‘์„ ์„ ์ œ์ ์œผ๋กœ ๋„์ž…ํ•œ ๊ธฐ์—…์€ AI ๊ธฐ๋ฐ˜ ์œ„ํ˜‘ ํ™˜๊ฒฝ์—์„œ๋„ ๊ณ ๊ฐ ์‹ ๋ขฐ์™€ ๋น„์ฆˆ๋‹ˆ์Šค ์—ฐ์†์„ฑ์„ ํ™•๋ณดํ•˜๊ฒŒ ๋  ๊ฒƒโ€์ด๋ผ๊ณ  ์ „ํ–ˆ๋‹ค.

ํด๋ผ์šฐ๋“œ : ๋””์ง€ํ„ธ ์ฃผ๊ถŒ ๋ถ€์ƒ๊ณผ ์•„ํ‚คํ…์ฒ˜ ์žฌ์„ค๊ณ„

๋””์ง€ํ„ธ ์ฃผ๊ถŒ์ด ๊ธฐ์—… ์ „๋žต์˜ ํ•ต์‹ฌ ์š”์†Œ๋กœ ๋ถ€์ƒ

์œ ๋Ÿฝ์—ฐํ•ฉ(EU)์ด ๋Œ€ํ˜• ํด๋ผ์šฐ๋“œ ์„œ๋น„์Šค ์—…์ฒด ์˜์กด๋„ ์™„ํ™”๋ฅผ ์ถ”์ง„ํ•˜๋ฉด์„œ ์•„ํƒœ ์ง€์—ญ์—์„œ๋„ ์œ ์‚ฌํ•œ ์›€์ง์ž„์ด ๋‚˜ํƒ€๋‚˜๊ณ  ์žˆ๋‹ค. ๊ธฐ์—…์€ ํด๋ผ์šฐ๋“œ ์ด์‹์„ฑ์„ ๋” ์ด์ƒ ๋น„์šฉ ์ตœ์ ํ™” ์ˆ˜๋‹จ์œผ๋กœ๋งŒ ๋ณด์ง€ ์•Š๊ณ , ์ง€์ •ํ•™์  ๋ถˆํ™•์‹ค์„ฑ๊ณผ ์—…์ฒด ๋ฆฌ์Šคํฌ๋ฅผ ์™„ํ™”ํ•˜๊ธฐ ์œ„ํ•œ ํ•ต์‹ฌ ์ „๋žต์œผ๋กœ ์ธ์‹ํ•˜๊ณ  ์žˆ๋‹ค. ์ธ๋„๊ฐ€ ์ด ๋ณ€ํ™”๋ฅผ ์ฃผ๋„ํ•˜๊ณ  ์žˆ์œผ๋ฉฐ, ํ˜ธ์ฃผ๋Š” ๋Œ€๊ทœ๋ชจ PoC๋ฅผ ํ†ตํ•ด ์†๋„๋ฅผ ๋†’์ด๊ณ  ์žˆ๋‹ค. ๋””์ง€ํ„ธ ์ฃผ๊ถŒ ํ™•๋ณด๋Š” ํŠน์ • ๊ธฐ์ˆ ์ด๋‚˜ ์žฌ๋ฌด์  ์ œ์•ฝ ์—†์ด ์›Œํฌ๋กœ๋“œ๋ฅผ ๋‹ค์–‘ํ•œ ํด๋ผ์šฐ๋“œยท์ง€์—ญยท์•„ํ‚คํ…์ฒ˜ ๊ฐ„์— ์ž์œ ๋กญ๊ฒŒ ์ด๋™ํ•  ์ˆ˜ ์žˆ๋Š” ๋Šฅ๋ ฅ์—์„œ ๋น„๋กฏ๋˜๋ฉฐ, ์ด๋Š” ์ฐจ์„ธ๋Œ€ AI ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜์ด ์š”๊ตฌํ•˜๋Š” โ€˜์ปดํ“จํŒ… ์ด์‹์„ฑโ€™์„ ์ถฉ์กฑํ•˜๋Š” ๋ฐ๋„ ํ•„์ˆ˜์ ์ด๋‹ค.

์ง€์—ฐ์‹œ๊ฐ„ ์ตœ์†Œํ™”๋ฅผ ์œ„ํ•œ ๋ถ„์‚ฐํ˜• AI ์•„ํ‚คํ…์ฒ˜ ํ™•์‚ฐ

๊ธฐ์—…์€ ์„ฑ๋Šฅ ๊ฐœ์„ ๊ณผ ์ง€์—ฐ์‹œ๊ฐ„ ๋‹จ์ถ•์„ ์œ„ํ•ด AI ์ถ”๋ก  ์ฒ˜๋ฆฌ๋ฅผ ์‚ฌ์šฉ์žยท์šด์˜ ์‹œ์Šคํ…œ ๊ฐ€๊นŒ์ด์— ๋ฐฐ์น˜ํ•˜๋Š” ๋ถ„์‚ฐํ˜• AI ์•„ํ‚คํ…์ฒ˜๋ฅผ ํ™•๋Œ€ ๋„์ž…ํ•  ๊ฒƒ์œผ๋กœ ์˜ˆ์ƒ๋œ๋‹ค. ์ด๋Š” ๋ชจ๋นŒ๋ฆฌํ‹ฐ, ๊ณต๊ณต ์„œ๋น„์Šค, ์‚ฐ์—… ์ž๋™ํ™” ๋“ฑ ๋‹ค์–‘ํ•œ ๋ถ„์•ผ์˜ ๋””์ง€ํ„ธ ํŠธ๋žœ์Šคํฌ๋ฉ”์ด์…˜ ์ „๋žต์—๋„ ์˜ํ–ฅ์„ ๋ฏธ์น  ์ „๋ง์ด๋‹ค.

AI ๋ณด์•ˆ, ๋ฐ์ดํ„ฐ ๊ณต๊ธ‰๋ง ์ „์ฒด๋กœ ๋ฒ”์œ„ ํ™•๋Œ€

AI ๋„์ž…์ด ํ™•์‚ฐํ•จ์— ๋”ฐ๋ผ ๊ธฐ์—…์€ ์—”๋“œํฌ์ธํŠธ ์ค‘์‹ฌ์˜ ๊ธฐ์กด ๋ฐฉ์‹์—์„œ ๋ฒ—์–ด๋‚˜ ํ•™์Šต ๋ฐ์ดํ„ฐ์…‹๋ถ€ํ„ฐ ์ถ”๋ก  ํŠธ๋ž˜ํ”ฝ, ๋ชจ๋ธ ์ถœ๋ ฅ๊นŒ์ง€ AI ๋ฐ์ดํ„ฐ ๊ณต๊ธ‰๋ง ์ „์ฒด๋ฅผ ๋ณดํ˜ธํ•˜๋Š” ๊ฑฐ๋ฒ„๋„Œ์Šค๋ฅผ ๊ฐ•ํ™”ํ•ด์•ผ ํ•œ๋‹ค. ์ด์— ๋”ฐ๋ผ ํ”„๋กฌํ”„ํŠธยท์‘๋‹ต์„ ์‹ค์‹œ๊ฐ„ ์ ๊ฒ€ํ•˜๋Š” โ€˜AI ๋ฐฉํ™”๋ฒฝโ€™ ๋„์ž…์ด ํ™•๋Œ€๋˜๋ฉฐ, ์ค‘์•™ํ˜• ์ธํ”„๋ผ๊ฐ€ ์•„๋‹Œ ๋ถ„์‚ฐํ˜• AI ์›Œํฌ๋กœ๋“œ์˜ ์—ฃ์ง€ ํ™˜๊ฒฝ์—์„œ ์šด์˜๋˜๋Š” ํ˜•ํƒœ๊ฐ€ ํ™•์‚ฐ๋  ๊ฒƒ์œผ๋กœ ๋ณด์ธ๋‹ค. ๋™์‹œ์— ๋ฐ์ดํ„ฐ ์ถœ์ฒ˜ ๋ฐ ์ฒ˜๋ฆฌ ์ด๋ ฅ ๊ด€๋ฆฌ๋ฅผ ๊ธฐ๋ฐ˜์œผ๋กœ ํ•œ AI ๊ฑฐ๋ฒ„๋„Œ์Šค ์—ญ์‹œ ๋น ๋ฅด๊ฒŒ ๊ณ ๋„ํ™”๋  ์ „๋ง์ด๋‹ค.

ํ•€์˜ต์Šค์˜ โ€˜์‹œํ”„ํŠธ ๋ ˆํ”„ํŠธโ€™ ๋ณธ๊ฒฉํ™”

AI ์ปดํ“จํŒ… ๋น„์šฉ ๋ณ€๋™์„ฑ์ด ์ปค์ง€๋ฉด์„œ ํ•€์˜ต์Šค๋Š” ๊ธฐ์กด์˜ ์‚ฌํ›„ ๋น„์šฉ ํ™•์ธ ๋ฐฉ์‹์—์„œ ๋ฒ—์–ด๋‚˜, ๋ชจ๋ธ ์„ค๊ณ„ ๋‹จ๊ณ„๋ถ€ํ„ฐ ์‹ค์‹œ๊ฐ„ ๋น„์šฉ ๊ฐ€์‹œ์„ฑ์„ ๋ฐ˜์˜ํ•˜๋Š” ๋ฐฉ์‹์œผ๋กœ ์ „ํ™˜๋  ์ „๋ง์ด๋‹ค. ์•„ํ‚คํ…์ฒ˜ ์„ค๊ณ„ ์ดˆ๊ธฐ์— ๋น„์šฉ ํšจ์œจ์„ฑ์„ ๋‚ด์žฌํ™”ํ•œ ๊ธฐ์—…์€ ๊ฒฝ์Ÿ์‚ฌ ๋Œ€๋น„ ์ง€์†์ ์ธ ๋น„์šฉ ์šฐ์œ„๋ฅผ ํ™•๋ณดํ•  ์ˆ˜ ์žˆ์„ ๊ฒƒ์œผ๋กœ ์˜ˆ์ƒ๋œ๋‹ค.

์•„์นด๋งˆ์ด ํด๋ผ์šฐ๋“œ ์ปดํ“จํŒ… ๋ถ€๋ฌธ CTO ์ œ์ด ์  ํ‚จ์Šค๋Š” โ€œ์•„์‹œ์•„์˜ ํด๋ผ์šฐ๋“œ ์ „๋žต์€ ์ž์œจ์„ฑ์„ ์ค‘์‹ฌ์œผ๋กœ ์žฌํŽธ๋˜๊ณ  ์žˆ์œผ๋ฉฐ, ๊ธฐ์—…์€ ์›Œํฌ๋กœ๋“œ ์ด๋™์„ฑ์„ ํ™•๋ณดํ•˜๊ณ  ๋ฐ์ดํ„ฐ ํ†ต์ œ๋ฅผ ๊ฐ•ํ™”ํ•˜๋ฉฐ AI๋ฅผ ๊ฐ€์žฅ ์ ํ•ฉํ•œ ์œ„์น˜์—์„œ ์‹คํ–‰ํ•˜๊ธฐ๋ฅผ ์›ํ•˜๊ณ  ์žˆ๋‹คโ€๋ผ๋ฉฐ โ€œIDC๋Š” ๋‚ดํ›„๋…„๊นŒ์ง€ ์•„ํƒœ ์ง€์—ญ CIO์˜ 80%๊ฐ€ AI ์„ฑ๋Šฅ๊ณผ ์ปดํ”Œ๋ผ์ด์–ธ์Šค ์ค€์ˆ˜๋ฅผ ์œ„ํ•ด ์—ฃ์ง€ ์„œ๋น„์Šค๋ฅผ ํ™œ์šฉํ•  ๊ฒƒ์œผ๋กœ ์˜ˆ์ƒํ•˜๊ณ  ์žˆ๋‹ค. ์•„ํƒœ ์ง€์—ญ์€ ์ด๋ฏธ ๋ถ„์‚ฐํ˜• ๋ฏธ๋ž˜๋ฅผ ์ค€๋น„ํ•˜๊ณ  ์žˆ์œผ๋ฉฐ, ๋‚ด๋…„์—๋Š” โ€˜์ด์‹์„ฑยท๋ถ„์‚ฐํ˜• AIโ€™๋ฅผ ์ „์ œ๋กœ ํ•œ ์„ค๊ณ„๊ฐ€ ์•ˆ์ •์ ์ด๊ณ  ๋ฏธ๋ž˜์ง€ํ–ฅ์ ์ธ ๋””์ง€ํ„ธ ์„œ๋น„์Šค ๊ตฌ์ถ•์˜ ํ•ต์‹ฌ์ด ๋  ๊ฒƒโ€์ด๋ผ๊ณ  ์ „๋งํ–ˆ๋‹ค.
dl-ciokorea@foundryco.com

The hot new thing at AWS re:Invent has nothing to do with AI

AWS CEO Matt Garman unveils the crowd-pleasing Database Savings Plans with just two seconds remaining on the โ€œlightning roundโ€ shot clock at the end of his re:Invent keynote Tuesday morning. (GeekWire Photo / Todd Bishop)

LAS VEGAS โ€” After spending nearly two hours trying to impress the crowd with new LLMs, advanced AI chips, and autonomous agents, Amazon Web Services CEO Matt Garman showed that the quickest way to a developerโ€™s heart isnโ€™t a neural network. Itโ€™s a discount.

One of the loudest cheers at the AWS re:Invent keynote Tuesday was for Database Savings Plans, a mundane but much-needed update that promises to cut bills by up to 35% across database services like Aurora, RDS, and DynamoDB in exchange for a one-year commitment.

The reaction illustrated a familiar tension for cloud customers: Even as tech giants introduce increasingly sophisticated AI tools, many companies and developers are still wrestling with the basic challenge of managing costs for core services.

The new savings plans address the issue by offering flexibility that didnโ€™t exist before, letting developers switch database engines or move regions without losing their discount.ย 

โ€œAWS Database Savings Plans: Six Years of Complaining Finally Pays Off,โ€ is the headline from the charmingly sardonic and reliably snarky Corey Quinn of Last Week in AWS, who specializes in reducing AWS bills as the chief cloud economist at Duckbill.

Quinn called the new โ€œbetter than it has any right to beโ€ because it covers a wider range of services than expected, but he pointed out several key drawbacks: the plans are limited to one-year terms (meaning you canโ€™t lock in bigger savings for three years), they exclude older instance generations, and they do not apply to storage or backup costs.

He also cited the lack of EC2 (Elastic Cloud Compute) coverage, calling the inability to move spending between computing and databases a missed opportunity for flexibility.

But the database pricing wasnโ€™t the only basic upgrade to get a big reaction. For example, the crowd also cheered loudly for Lambda durable functions, a feature that lets serverless code pause and wait for long-running background tasks without failing.

Garman made these announcements as part of a new re:Invent gimmick: a 10-minute sprint through 25 non-AI product launches, complete with an on-stage shot clock. The bit was a nod to the breadth of AWS, and to the fact that not everyone in the audience came for AI news.

He announced the Database Savings Plans in the final seconds, as the clock ticked down to zero. And based on the way he set it up, Garman knew it was going to be a hit โ€” describing it as โ€œone last thing that I think all of you are going to love.โ€

Judging by the cheers, at least, he was right.

Evolving cloud strategy: Why sovereignty and regional autonomy matter more than ever

As enterprises accelerate their digital transformation journeys, they are facing a growing challenge around modernizing infrastructure while maintaining control, compliance, and performance across increasingly distributed environments. The convergence of IT and OT systems, historically managed in silos, can become key to unlocking new operational agility, real-time insights, and secure automation. However, with the creation of data shifting from centralized data centers to the edge, the conventional approach of implementing sovereign clouds may no longer work, and a new dimension of sovereignty is emerging that demands a fundamental change in cloud strategy.

In mission-critical use cases across aerospace, defense, industrial/manufacturing, energy, and healthcare, the stakes are high. These industries require infrastructure that not only meets performance and reliability standards but also complies with strict regulatory requirements. Traditional cloud models, built around centralized architectures, can fall short in delivering the regional autonomy and processing locality that are needed by these organizations.

Data everywhere, decisions at the edge

Todayโ€™s enterprise environments will increasingly be influenced by data that is generated and processed at the edge, such as on factory floors, in remote installations, and across mobile platforms. This shift is driven by the need for low-latency decision-making, bandwidth efficiency, and operational resilience. AI, automation, and real-time analytics are fueling this transformation, making edge-native infrastructure a strategic imperative.

However, sovereignty now is no longer just about where data is stored. Itโ€™s also about where data is processed and how decisions are made. Enterprises must now consider inference sovereignty (AI models processing sensitive data locally), operational sovereignty (autonomous systems complying with local laws), and telemetry sovereignty (governing metadata flows to central systems). These factors are reshaping how organizations design, deploy, and govern their cloud infrastructure.

The challenge: Fragmentation, compliance, and control

As industries look to the growth of the intelligent edge, enterprises will continue to face significant obstacles. These challenges include:

  • Fragmented IT/OT environments hinder visibility and automation.
  • Legacy systems resist integration with cloud-native platforms.
  • Regulatory requirements demand strict control over data residency and processing locality.
  • Vendor lock-in and opaque infrastructure limit flexibility and innovation.
  • Internal expertise gaps, slow adoption of edge-native architectures, and AI governance.

These issues are especially acute in industries where uptime, compliance, and security are non-negotiable.

The opportunity: Sovereign cloud at scale

To meet changing demands, enterprises are turning to private and hybrid cloud solutions that span core, edge, and far-edge environments. Sovereign cloud infrastructure enables organizations to maintain full control over data, workloads, and compliance, without compromising scalability or performance.

At Wind River, weโ€™ve architected our cloud platform from the ground up to support sovereign deployments. Our commercially hardened stack, Wind River Cloud Platform (based on the open source StarlingX), Wind River Analytics, and Wind River Conductor, empowers enterprises to enforce sovereignty policies not only over where data resides, but also over where and how it is processed, analyzed, and acted upon.

This ensures compliance, operational autonomy, and security across highly distributed, mission-critical environments. Sovereignty must extend seamlessly across core and edge, supporting unified deployments from the largest data center to the smallest, most remote facility.

The path forward: Strategy, technology, and partnership

To succeed, enterprises must take a structured approach. It will be important to unify IT and OT systems to enable seamless data flow and governance. They must plan to adopt cloud-native platforms that support containerized workloads and open interfaces. It will be helpful to deploy private/hybrid cloud infrastructure to balance control with scalability. Additionally, enterprises should look to implement edge-native solutions for latency-sensitive, mission-critical operations. Simultaneously, it will be essential to enforce sovereignty policies across data residency, processing locality, and AI inference governance.

And just as important, companies must choose the right partners, such as technology providers with deep expertise in intelligent edge, cloud-native software, and mission-critical deployments. Sovereign-ready platforms, like those from Wind River, offer the flexibility, transparency, and control needed to build cloud infrastructure on your own terms.

As the next wave of innovation moves to the edge, sovereignty can be critical to enterprise success. Those who embrace this shift will be better positioned to lead in a world where control, compliance, and confidence are not optional but essential.

Start Yourย Sovereign Cloud Journey

From edge to core, Wind River enables unified, scalable, and consistent operations โ€” wherever data resides. Build, manage, and secure your cloud infrastructure today with Wind River. Learn more at: https://www.windriver.com/products/sovereign-cloud

About the Author

Sandeep Modhvadia

Chief Product Officer

As Wind River Chief Product Officer, Sandeep Modhvadia is responsible for driving product strategy and product management, playing a critical role in Wind Riverโ€™s leadership advancing the software-defined future of mission-critical systems.

He has over two decades of technology and product management experience. Most recently at Acuity Brands, he led product management for its cloud software business as part of the Intelligent Space Group, focused on sustainability, automation, and optimization of buildings. Before Acuity, he founded and led the product and solutions team for the Google Cloud Automotive and Manufacturing group, launching its platforms for connected vehicles and connected factories. Prior to Google, he held multiple product, sales, and marketing leadership positions at Microsoft.

He holds a BSc degree in computer science from University College London.

ํด๋ผ์šฐ๋“œ ์ฃผ๊ถŒ๋งŒ์œผ๋ก  ๋ถ€์กฑํ•˜๋‹คยทยทยท๊ณต๊ณต ๋ถ€๋ฌธ์˜ ์ƒˆ๋กœ์šด ์Ÿ์ ์€ โ€˜์ข…๋‹จ ๊ฐ„ ์•”ํ˜ธํ™”โ€™

๋ฐ์ดํ„ฐ์˜ ์œ„์น˜ ์ง€์ •๋งŒ์œผ๋กœ๋Š” ๋” ์ด์ƒ ์ถฉ๋ถ„ํ•˜์ง€ ์•Š๋‹ค๋Š” ์ธ์‹์ด ํ™•์‚ฐ๋˜๊ณ  ์žˆ๋‹ค. ์ •๋ถ€๊ฐ€ ์ž๊ตญ ๋‚ด์— ๋ฐ์ดํ„ฐ๋ฅผ ๋ณด๊ด€ํ•˜๋”๋ผ๋„ ์„œ๋“œํŒŒํ‹ฐ ์„œ๋ฒ„์— ์˜ฌ๋ ค๋‘๋ฉด ์‹ค์ œ ์ฃผ๊ถŒ์„ ๋ณด์žฅํ•˜์ง€ ๋ชปํ•œ๋‹ค๋Š” ์šฐ๋ ค๊ฐ€ ์ปค์ง€๋ฉด์„œ, ๊ทœ์ œ ๋‹น๊ตญ์€ ๋ณด๋‹ค ๊ทผ๋ณธ์ ์ธ ์กฐ์น˜๋ฅผ ์š”๊ตฌํ•˜๊ณ  ์žˆ๋‹ค. ๋ฐ”๋กœ ๋ฐ์ดํ„ฐ ์•”ํ˜ธํ™” ํ‚ค์— ๋Œ€ํ•œ ํ†ต์ œ๊ถŒ์ด๋‹ค.

์Šค์œ„์Šค ์ง€๋ฐฉ์ •๋ถ€ ๊ฐœ์ธ์ •๋ณด๋ณดํ˜ธ ์ฑ…์ž„์ž ํ˜‘์˜์ฒด์ธ ํ”„๋ฆฌ๋ฐ”ํŒ€(Privatim)์€ ์ตœ๊ทผ ๊ฒฐ์˜๋ฌธ์„ ํ†ตํ•ด, ๋ฏผ๊ฐํ•œ ์ •๋ถ€ ๋ฐ์ดํ„ฐ๋ฅผ ๋‹ค๋ฃฐ ๋•Œ ๊ธฐ๊ด€์ด ์ง์ ‘ ์ข…๋‹จ ๊ฐ„(E2E) ์•”ํ˜ธํ™”๋ฅผ ๊ตฌํ˜„ํ•˜์ง€ ์•Š๋Š” ํ•œ ๊ธ€๋กœ๋ฒŒ ์„œ๋น„์Šคํ˜• ์†Œํ”„ํŠธ์›จ์–ด(SaaS) ์‚ฌ์šฉ์„ ํ”ผํ•ด์•ผ ํ•œ๋‹ค๊ณ  ์ด‰๊ตฌํ–ˆ๋‹ค. ๊ฒฐ์˜๋ฌธ์€ ์ด๋Ÿฌํ•œ ๊ธฐ์ค€์— ๋ฏธ์น˜์ง€ ๋ชปํ•˜๋Š” ์‚ฌ๋ก€๋กœ ๋งˆ์ดํฌ๋กœ์†Œํ”„ํŠธ 365๋ฅผ ๋ช…์‹œ์ ์œผ๋กœ ์–ธ๊ธ‰ํ–ˆ๋‹ค.

๊ฒฐ์˜๋ฌธ์€ โ€œ๋Œ€๋‹ค์ˆ˜ SaaS ์†”๋ฃจ์…˜์€ ์—…์ฒด๊ฐ€ ํ‰๋ฌธ ๋ฐ์ดํ„ฐ์— ์ ‘๊ทผํ•˜์ง€ ๋ชปํ•˜๋„๋ก ๋ณด์žฅํ•˜๋Š” ์ง„์ •ํ•œ ์ข…๋‹จ ๊ฐ„ ์•”ํ˜ธํ™”๋ฅผ ์•„์ง ์ง€์›ํ•˜์ง€ ์•Š๋Š”๋‹ค. ๋”ฐ๋ผ์„œ SaaS ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ์‚ฌ์šฉ์€ ๊ธฐ๊ด€์˜ ํ†ต์ œ๋ ฅ์„ ์ƒ๋‹นํžˆ ์•ฝํ™”์‹œํ‚ค๋Š” ๊ฒฐ๊ณผ๋ฅผ ์ดˆ๋ž˜ํ•œ๋‹คโ€๋ผ๊ณ  ๋ฐํ˜”๋‹ค.

๋ถ„์„๊ฐ€๋“ค์€ ์ด๋Ÿฐ ํ†ต์ œ๋ ฅ ์ƒ์‹ค์ด ๋ฐ์ดํ„ฐ ์ฃผ๊ถŒ์˜ ํ•ต์‹ฌ ๊ฐœ๋…์„ ํ›ผ์†ํ•œ๋‹ค๊ณ  ์ง€์ ํ–ˆ๋‹ค. ๊ทธ๋ ˆ์ดํ•˜์šด๋“œ๋ฆฌ์„œ์น˜(Greyhound Research) ์ตœ๊ณ  ์• ๋„๋ฆฌ์ŠคํŠธ ์‚ฐ์น˜ํŠธ ๋น„๋ฅด ๊ณ ๊ธฐ์•„๋Š” โ€œํด๋ผ์šฐ๋“œ ์—…์ฒด๊ฐ€ ๋ฒ•์  ์ ˆ์ฐจ๋“  ๋‚ด๋ถ€ ๋ฉ”์ปค๋‹ˆ์ฆ˜์ด๋“  ์–ด๋–ค ๋ฐฉ์‹์œผ๋กœ๋“  ๊ณ ๊ฐ ๋ฐ์ดํ„ฐ๋ฅผ ๋ณตํ˜ธํ™”ํ•  ์ˆ˜ ์žˆ๋Š” ๋Šฅ๋ ฅ์„ ๊ฐ–๊ณ  ์žˆ๋‹ค๋ฉด, ๊ทธ ๋ฐ์ดํ„ฐ๋Š” ๋” ์ด์ƒ ์ง„์ •ํ•œ ์˜๋ฏธ์˜ ์ฃผ๊ถŒ์„ ์ง€๋‹Œ ๊ฒƒ์ด ์•„๋‹ˆ๋‹คโ€๋ผ๊ณ  ๋งํ–ˆ๋‹ค.

๊ณ ๊ธฐ์•„๋Š” ์œ ๋Ÿฝ ๊ตญ๊ฐ€ ์ „๋ฐ˜์—์„œ ์ด์™€ ์œ ์‚ฌํ•œ ์˜๊ฒฌ์ด ์ œ์‹œ๋˜๊ณ  ์žˆ๋‹ค๊ณ  ์–ธ๊ธ‰ํ–ˆ๋‹ค. ๊ทธ์— ๋”ฐ๋ฅด๋ฉด ์œ ๋Ÿฝ์—์„œ๋Š” ๋…์ผ, ํ”„๋ž‘์Šค, ๋ด๋งˆํฌ, ์œ ๋Ÿฝ์—ฐํ•ฉ ์ง‘ํ–‰์œ„์›ํšŒ ๋“ฑ์ด ํด๋ผ์šฐ๋“œ ์—…์ฒด์˜ ์ค‘๋ฆฝ์„ฑ์— ๋Œ€ํ•œ ์‹ ๋ขฐ๊ฐ€ ์•ฝํ™”๋˜๊ณ  ์žˆ๋‹ค๋ฉฐ ๊ฒฝ๊ณ ํ•˜๊ฑฐ๋‚˜ ์กฐ์น˜๋ฅผ ์ทจํ•˜๊ณ  ์žˆ๋‹ค. ๊ทธ๋Š” โ€œ์Šค์œ„์Šค๋Š” ๋‹ค๋ฅธ ์œ ๋Ÿฝ ๊ตญ๊ฐ€๋“ค์ด ์•”์‹œ์ ์œผ๋กœ ์–ธ๊ธ‰ํ•ด์˜จ ๋‚ด์šฉ์„ ๋ช…ํ™•ํžˆ ํ–ˆ๋‹ค. ๊ฒฐ์˜๋ฌธ์€ ๋ฏธ๊ตญ ํด๋ผ์šฐ๋“œ ๋ฒ•๊ณผ ํ•ด์™ธ ๊ฐ์‹œ ์œ„ํ—˜ ๋•Œ๋ฌธ์— ์ข…๋‹จ ๊ฐ„ ์•”ํ˜ธํ™”๊ฐ€ ์ ์šฉ๋˜์ง€ ์•Š์€ ํด๋ผ์šฐ๋“œ ์†”๋ฃจ์…˜์€ ๋ฏผ๊ฐํ•œ ๊ณต๊ณต ๋ถ€๋ฌธ ์—…๋ฌด์— ์ ํ•ฉํ•˜์ง€ ์•Š๋‹ค๊ณ  ๊ทœ์ •ํ•˜๊ณ  ์žˆ๋‹คโ€๋ผ๊ณ  ๋งํ–ˆ๋‹ค.

์•”ํ˜ธํ™”์™€ โ€˜์œ„์น˜โ€™์˜ ํ•œ๊ณ„

ํ”„๋ฆฌ๋ฐ”ํŒ€์€ ๊ฒฐ์˜๋ฌธ์—์„œ ๋ฐ์ดํ„ฐ ์œ„์น˜ ๊ทœ์ •๋งŒ์œผ๋กœ๋Š” ํ•ด๊ฒฐํ•  ์ˆ˜ ์—†๋Š” ๋ฆฌ์Šคํฌ๋ฅผ ์ง€์ ํ•˜๋ฉด์„œ, ๋‹น๊ตญ์ด ๊ธ€๋กœ๋ฒŒ ๊ธฐ์—…์˜ ๊ณ„์•ฝ ์˜๋ฌด ์ค€์ˆ˜ ์—ฌ๋ถ€๋ฅผ ๊ฒ€์ฆํ•  ์ˆ˜ ์žˆ์„ ์ •๋„๋กœ ์ถฉ๋ถ„ํ•œ ํˆฌ๋ช…์„ฑ์„ ์ œ๊ณต๋ฐ›์ง€ ๋ชปํ•˜๊ณ  ์žˆ๋‹ค๊ณ  ์ง„๋‹จํ–ˆ๋‹ค. ์ด๋Ÿฐ ๋ถˆํˆฌ๋ช…์„ฑ์ด ๊ธฐ์ˆ ์˜ ์‹ค์ œ ๊ตฌํ˜„ ๋ฐฉ์‹, ์‹œ์Šคํ…œ์„ ๋ณ€๊ฒฝ ๊ด€๋ฆฌ, ๊ทธ๋ฆฌ๊ณ  ์ง์›๊ณผ ํ•˜์ฒญ ์—…์ฒด๋ฅผ ์–ด๋–ป๊ฒŒ ๊ฐ๋…ํ•˜๋Š”์ง€๊นŒ์ง€ ์ด์–ด์ง€๋ฉฐ, ์™ธ๋ถ€ ์„œ๋น„์Šค ์ œ๊ณต์ž๊ฐ€ ์—ฌ๋Ÿฌ ๋‹จ๊ณ„๋กœ ์–ฝํžˆ๋Š” ๋ณต์žกํ•œ ๊ตฌ์กฐ๋กœ ํ™•๋Œ€๋œ๋‹ค๊ณ  ๊ฐ•์กฐํ–ˆ๋‹ค.

๊ฐ€ํŠธ๋„ˆ(Gartner) ์ˆ˜์„ ์• ๋„๋ฆฌ์ŠคํŠธ ์•„์‹œ์‹œ ๋ฐฐ๋„ˆ์ง€๋Š” ๋ฐ์ดํ„ฐ๊ฐ€ ํŠน์ • ๊ตญ๊ฐ€์— ์ €์žฅ๋ผ ์žˆ์–ด๋„ ๋ฏธ๊ตญ ํด๋ผ์šฐ๋“œ ๋ฒ•์ฒ˜๋Ÿผ ์ดˆ๊ตญ๊ฐ€์  ์ ์šฉ์ด ๊ฐ€๋Šฅํ•œ ๋ฒ•๋ฅ ์— ๋”ฐ๋ผ ์™ธ๊ตญ ์ •๋ถ€๊ฐ€ ์ ‘๊ทผํ•  ์ˆ˜ ์žˆ๋‹ค๊ณ  ๋งํ–ˆ๋‹ค. ๊ทธ๋Š” ๋˜ํ•œ ์†Œํ”„ํŠธ์›จ์–ด ๋ฒค๋”๊ฐ€ ๊ณ„์•ฝ ์กฐ๊ฑด์„ ์ฃผ๊ธฐ์ ์œผ๋กœ ์ˆ˜์ •ํ•  ์ˆ˜ ์žˆ์–ด ๊ณ ๊ฐ์˜ ํ†ต์ œ๊ถŒ์ด ๋” ์•ฝํ™”๋œ๋‹ค๊ณ  ๋ถ„์„ํ–ˆ๋‹ค.

๋ฐฐ๋„ˆ์ง€๋Š” โ€œ์ค‘๋™๊ณผ ์œ ๋Ÿฝ์˜ ์—ฌ๋Ÿฌ ๊ณ ๊ฐ์ด โ€˜๋ฐ์ดํ„ฐ๊ฐ€ ์–ด๋””์— ์ €์žฅ๋ผ ์žˆ๋“ , ๋Œ€๋ถ€๋ถ„ ๋ฏธ๊ตญ ๊ธฐ๋ฐ˜์ธ ํด๋ผ์šฐ๋“œ ์—…์ฒด๊ฐ€ ์—ฌ์ „ํžˆ ์ ‘๊ทผํ•  ์ˆ˜ ์žˆ๋‹คโ€™๋Š” ์ ์„ ์šฐ๋ คํ•˜๊ณ  ์žˆ๋‹คโ€๋ผ๊ณ  ๋งํ–ˆ๋‹ค.

์—๋ฒ ๋ ˆ์ŠคํŠธ๊ทธ๋ฃน(Everest Group) ์ˆ˜์„ ์• ๋„๋ฆฌ์ŠคํŠธ ํ”„๋ผ๋ธŒ์ฃ ํŠธ ์นด์šฐ๋ฅด๋Š” ์Šค์œ„์Šค์˜ ์ž…์žฅ์ด ๊ธฐ์ˆ  ์ฃผ๊ถŒ์„ ๊ฐ•ํ™”ํ•˜๋ ค๋Š” ๊ทœ์ œ ๋ณ€ํ™” ํ๋ฆ„์„ ๋”์šฑ ๊ฐ€์†ํ•œ๋‹ค๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค. ์นด์šฐ๋ฅด๋Š” โ€œ์Šค์œ„์Šค์˜ ๊ธฐ์ค€์ด ๋‹ค๋ฅธ ๊ตญ๊ฐ€๋ณด๋‹ค ์—„๊ฒฉํ•œ ๊ฒƒ์€ ์‚ฌ์‹ค์ด์ง€๋งŒ, ๊ฒฐ์ฝ” ํŠน๋ณ„ํ•œ ์‚ฌ๋ก€๋Š” ์•„๋‹ˆ๋‹ค. ๊ณ„์•ฝ์ด๋‚˜ ์ ˆ์ฐจ์  ์•ˆ์ „์žฅ์น˜์— ์˜์กดํ•˜๋Š” ์‹œ์žฅ์—์„œ๋„ ๊ธฐ์ˆ  ์ฃผ๊ถŒ์„ ๊ฐ•ํ™”ํ•˜๋Š” ๋ฐฉํ–ฅ์œผ๋กœ ์ „ํ™˜์ด ๋นจ๋ผ์ง€๊ณ  ์žˆ๋‹คโ€๋ผ๊ณ  ์–ธ๊ธ‰ํ–ˆ๋‹ค.

ํ”„๋ฆฌ๋ฐ”ํŒ€์€ ์ด๋Ÿฐ ํ•œ๊ณ„๋ฅผ ๊ณ ๋ คํ•ด ๋ชจ๋“  ๊ณต๊ณต ๋ถ€๋ฌธ์—์„œ ํด๋ผ์šฐ๋“œ ์‚ฌ์šฉ ๊ธฐ์ค€์„ ๊ฐ•ํ™”ํ•ด์•ผ ํ•œ๋‹ค๊ณ  ์ œ์‹œํ–ˆ๋‹ค. ๊ฒฐ์˜๋ฌธ์€ โ€œํŠนํžˆ ๋ฏผ๊ฐํ•œ ๊ฐœ์ธ์ •๋ณด๋‚˜ ๋ฒ•์  ๋น„๋ฐ€ ์œ ์ง€ ์˜๋ฌด๊ฐ€ ์ ์šฉ๋˜๋Š” ๋ฐ์ดํ„ฐ๋ฅผ ๋‹ค๋ฃจ๋Š” ๊ณต๊ณต๊ธฐ๊ด€์€ ๋ฐ์ดํ„ฐ๋ฅผ ์ง์ ‘ ์•”ํ˜ธํ™”ํ•˜๊ณ , ํด๋ผ์šฐ๋“œ ์—…์ฒด๊ฐ€ ์•”ํ˜ธ ํ‚ค์— ์ ‘๊ทผํ•  ์ˆ˜ ์—†๋Š” ๊ฒฝ์šฐ์—๋งŒ ๊ธ€๋กœ๋ฒŒ SaaS ์†”๋ฃจ์…˜์„ ์‚ฌ์šฉํ•ด์•ผ ํ•œ๋‹คโ€๋ผ๊ณ  ๋ฐํ˜”๋‹ค.

์ด๋Š” ํ˜„์žฌ์˜ ๊ด€ํ–‰๊ณผ ํ™•์—ฐํžˆ ๋‹ค๋ฅธ ์ ‘๊ทผ์ด๋‹ค. ์ง€๊ธˆ๊นŒ์ง€ ๋งŽ์€ ์ •๋ถ€ ๊ธฐ๊ด€์€ ํด๋ผ์šฐ๋“œ ์—…์ฒด๊ฐ€ ๊ธฐ๋ณธ์œผ๋กœ ์ œ๊ณตํ•˜๋Š” ์•”ํ˜ธํ™” ๊ธฐ๋Šฅ์— ์˜์กดํ•ด ์™”๋‹ค. ๋งˆ์ดํฌ๋กœ์†Œํ”„ํŠธ 365์™€ ๊ฐ™์€ ์„œ๋น„์Šค๋Š” ์ €์žฅ ๋ฐ ์ „์†ก ๋‹จ๊ณ„์—์„œ ์•”ํ˜ธํ™”๋ฅผ ์ œ๊ณตํ•˜์ง€๋งŒ, ์šด์˜์ƒ ํ•„์š”๋‚˜ ๊ทœ์ œ ์ค€์ˆ˜, ๋ฒ•์  ์š”์ฒญ์— ๋Œ€์‘ํ•˜๊ธฐ ์œ„ํ•ด ๋งˆ์ดํฌ๋กœ์†Œํ”„ํŠธ๊ฐ€ ๋ฐ์ดํ„ฐ๋ฅผ ๋ณตํ˜ธํ™”ํ•  ์ˆ˜ ์žˆ๋Š” ๊ถŒํ•œ์„ ์—ฌ์ „ํžˆ ๋ณด์œ ํ•˜๊ณ  ์žˆ๋‹ค.

๋ณด์•ˆ์€ ๊ฐ•ํ™”๋˜์ง€๋งŒ ํ†ต์ฐฐ๋ ฅ์€ ๊ฐ์†Œ

๋‹ค๋งŒ ์ „๋ฌธ๊ฐ€๋“ค์€ ๊ณ ๊ฐ์ด ํ†ต์ œํ•˜๋Š” ์ข…๋‹จ ๊ฐ„ ์•”ํ˜ธํ™”๊ฐ€ ์ƒ๋‹นํ•œ ํƒ€ํ˜‘์ ์„ ์ˆ˜๋ฐ˜ํ•œ๋‹ค๊ณ  ์ง€์ ํ–ˆ๋‹ค.

์นด์šฐ๋ฅด๋Š” โ€œ์—…์ฒด๊ฐ€ ํ‰๋ฌธ ๋ฐ์ดํ„ฐ๋ฅผ ์ „ํ˜€ ๋ณผ ์ˆ˜ ์—†๊ฒŒ ๋˜๋ฉด, ์ •๋ถ€๋Š” ๊ฒ€์ƒ‰๊ณผ ์ธ๋ฑ์‹ฑ ๊ธฐ๋Šฅ ์ €ํ•˜, ํ˜‘์—… ๊ธฐ๋Šฅ ์ œํ•œ, ์ž๋™ํ™”๋œ ์œ„ํ˜‘ ํƒ์ง€๋‚˜ ๋ฐ์ดํ„ฐ ์œ ์ถœ ๋ฐฉ์ง€ ๋„๊ตฌ ํ™œ์šฉ ์ œ์•ฝ์— ์ง๋ฉดํ•˜๊ฒŒ ๋œ๋‹คโ€๋ผ๊ณ  ๋งํ–ˆ๋‹ค. ๊ทธ๋Š” ์ด์–ด โ€œ์ฝ”ํŒŒ์ผ๋Ÿฟ๊ณผ ๊ฐ™์€ AI ๊ธฐ๋ฐ˜ ์ƒ์‚ฐ์„ฑ ๊ธฐ๋Šฅ๋„ ์—…์ฒด ์ธก ๋ฐ์ดํ„ฐ ์ฒ˜๋ฆฌ๋ฅผ ์ „์ œ๋กœ ํ•˜๊ธฐ ๋•Œ๋ฌธ์—, ์—„๊ฒฉํ•œ ์ข…๋‹จ ๊ฐ„ ์•”ํ˜ธํ™” ํ™˜๊ฒฝ์—์„œ๋Š” ์‚ฌ์‹ค์ƒ ํ™œ์šฉ์ด ๋ถˆ๊ฐ€๋Šฅํ•˜๋‹คโ€๋ผ๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค.

๊ธฐ๋Šฅ์  ์ œ์•ฝ ์™ธ์— ์ธํ”„๋ผ์™€ ๋น„์šฉ ๋ถ€๋‹ด๋„ ๋ฌธ์ œ๊ฐ€ ๋  ์ˆ˜ ์žˆ๋‹ค. ๊ธฐ๊ด€์€ ์ž์ฒด ํ‚ค ๊ด€๋ฆฌ ์‹œ์Šคํ…œ์„ ์šด์˜ํ•ด์•ผ ํ•˜๋ฉฐ, ์ด๋Š” ์ƒˆ๋กœ์šด ๊ฑฐ๋ฒ„๋„Œ์Šค ์—…๋ฌด์™€ ์ธ๋ ฅ ์ˆ˜์š”๋ฅผ ์œ ๋ฐœํ•œ๋‹ค. ๋ฐฐ๋„ˆ์ง€๋Š” ๋Œ€๊ทœ๋ชจ ์•”ํ˜ธํ™” ๋ฐ ๋ณตํ˜ธํ™” ์ž‘์—…์ด ์ถ”๊ฐ€ ํ•˜๋“œ์›จ์–ด ์ž์›์„ ์š”๊ตฌํ•˜๊ณ  ์ง€์—ฐ์„ ์ฆ๊ฐ€์‹œ์ผœ ์‹œ์Šคํ…œ ์„ฑ๋Šฅ์— ์˜ํ–ฅ์„ ์ค„ ์ˆ˜ ์žˆ๋‹ค๊ณ  ๋ถ„์„ํ–ˆ๋‹ค.

๋ฐฐ๋„ˆ์ง€๋Š” โ€œ์ถ”๊ฐ€ ํ•˜๋“œ์›จ์–ด๊ฐ€ ํ•„์š”ํ•ด์ง€๊ณ  ์‚ฌ์šฉ์ž ๊ฒฝํ—˜์—์„œ๋„ ์ง€์—ฐ์ด ๋ฐœ์ƒํ•  ์ˆ˜ ์žˆ์œผ๋ฉฐ, ์ „์ฒด ์†”๋ฃจ์…˜ ๋น„์šฉ๋„ ๋” ๋†’์•„์งˆ ์ˆ˜ ์žˆ๋‹คโ€๋ผ๊ณ  ๋งํ–ˆ๋‹ค.

๊ณ ๊ธฐ์•„๋Š” ์ด๋Ÿฌํ•œ ์ œ์•ฝ์œผ๋กœ ์ธํ•ด ๋Œ€๋ถ€๋ถ„์˜ ์ •๋ถ€๊ฐ€ ์ „๋ฉด์ ์ธ ์•”ํ˜ธํ™” ๋Œ€์‹  ๋‹จ๊ณ„์  ์ ‘๊ทผ ๋ฐฉ์‹์„ ํƒํ•  ๊ฒƒ์ด๋ผ๊ณ  ์ „๋งํ–ˆ๋‹ค. ๊ทธ๋Š” โ€œ๊ธฐ๋ฐ€ ๋ฌธ์„œ, ๋ฒ•์  ์กฐ์‚ฌ ์ž๋ฃŒ, ๊ตญ๊ฐ€์•ˆ๋ณด ๊ด€๋ จ ๋ฌธ์„œ ๋“ฑ ๊ณ ๋„์˜ ๋ฏผ๊ฐ ๋ฐ์ดํ„ฐ๋ฅผ ๋ณ„๋„ ํ…Œ๋„ŒํŠธ๋‚˜ ์ฃผ๊ถŒ ํ™˜๊ฒฝ์— ๋‘๊ณ  ์™„์ „ํ•œ ์ข…๋‹จ ๊ฐ„ ์•”ํ˜ธํ™”๋ฅผ ์ ์šฉํ•˜๋Š” ๋ฐฉ์‹์ด ํ˜„์‹ค์ ์ธ ์„ ํƒ์ง€๊ฐ€ ๋  ๊ฒƒโ€์ด๋ผ๊ณ  ๋งํ–ˆ๋‹ค. ๋ฐ˜๋ฉด ํ–‰์ • ๋ฌธ์„œ๋‚˜ ์‹œ๋ฏผ ์„œ๋น„์Šค ๋“ฑ ํญ๋„“์€ ๊ณต๊ณต ์—…๋ฌด๋Š” ํ†ต์ œ๋œ ์•”ํ˜ธํ™”์™€ ๊ฐ•ํ™”๋œ ๊ฐ์‚ฌ ๊ธฐ๋Šฅ์„ ์ ์šฉํ•œ ์ฃผ์š” ํด๋ผ์šฐ๋“œ ํ”Œ๋žซํผ์„ ๊ณ„์† ํ™œ์šฉํ•  ๊ฒƒ์œผ๋กœ ๋ณด์ธ๋‹ค๊ณ  ์ง„๋‹จํ–ˆ๋‹ค.

ํด๋ผ์šฐ๋“œ ์ปดํ“จํŒ… ์—ญ๋Ÿ‰์˜ ๋ณ€ํ™”

์นด์šฐ๋ฅด๋Š” ์Šค์œ„์Šค์˜ ์ ‘๊ทผ ๋ฐฉ์‹์ด ๊ตญ์ œ์ ์œผ๋กœ ํ™•์‚ฐ๋  ๊ฒฝ์šฐ, ์ฃผ์š” ํด๋ผ์šฐ๋“œ ์—…์ฒด๊ฐ€ ๊ณ„์•ฝ์ƒ ๋˜๋Š” ์ง€์—ญ ๋ณด์žฅ์— ๋จธ๋ฌด๋ฅด์ง€ ๋ชปํ•˜๊ณ  ๊ธฐ์ˆ  ์ฃผ๊ถŒ์„ ๊ฐ•ํ™”ํ•ด์•ผ ํ•  ๊ฒƒ์ด๋ผ๊ณ  ์ „๋งํ–ˆ๋‹ค. ๊ทธ๋Š” โ€œ๋ณ€ํ™” ์กฐ์ง์€ ์ด๋ฏธ ๋‚˜ํƒ€๋‚˜๊ณ  ์žˆ๋‹ค. ํŠนํžˆ ๋งˆ์ดํฌ๋กœ์†Œํ”„ํŠธ๊ฐ€ ๊ณ ๊ฐ ํ†ต์ œ ์•”ํ˜ธํ™”์™€ ๊ด€ํ• ๊ถŒ ๊ธฐ๋ฐ˜ ์ ‘๊ทผ ์ œํ•œ์„ ๊ฐ•ํ™”ํ•˜๋Š” ๋ณด๋‹ค ์—„๊ฒฉํ•œ ๋ชจ๋ธ์„ ๋„์ž…ํ•˜๊ธฐ ์‹œ์ž‘ํ–ˆ๋‹คโ€๋ผ๊ณ  ๋งํ–ˆ๋‹ค.

๊ณ ๊ธฐ์•„๋Š” ์ด๋Ÿฐ ๋ณ€ํ™”๊ฐ€ ํด๋ผ์šฐ๋“œ ์—…์ฒด๊ฐ€ ์ •๋ถ€ ๊ณ ๊ฐ์„ ๋Œ€ํ•˜๋Š” ๋ฐฉ์‹์„ ๊ทผ๋ณธ์ ์œผ๋กœ ํ”๋“ ๋‹ค๊ณ  ๋ถ„์„ํ–ˆ๋‹ค. ๊ทธ๋Š” โ€œ๋ฐ์ดํ„ฐ์„ผํ„ฐ ์œ„์น˜, ์ง€์—ญ ์ง€์›, ๊ณ„์•ฝ ๊ธฐ๋ฐ˜ ๋ถ„๋ฆฌ ๋“ฑ์„ ์ฃผ์š” ๋ณด์ฆ ์ˆ˜๋‹จ์œผ๋กœ ์‚ผ์•˜๋˜ ๊ธฐ์กด ์ •๋ถ€ ํด๋ผ์šฐ๋“œ ์ „๋žต์˜ ์ƒ๋‹น ๋ถ€๋ถ„์ด ๋” ์ด์ƒ ์œ ํšจํ•˜์ง€ ์•Š๊ฒŒ ๋๋‹คโ€๋ผ๊ณ  ๋งํ–ˆ๋‹ค. ๋˜ํ•œ โ€œํด๋ผ์ด์–ธํŠธ ์ธก ์•”ํ˜ธํ™”, ๊ธฐ๋ฐ€ ์ปดํ“จํŒ…, ์™ธ๋ถ€ ํ‚ค ๊ด€๋ฆฌ๋Š” ์„ ํƒ์  ๊ธฐ๋Šฅ์ด ์•„๋‹ˆ๋ผ ๊ณ ๊ทœ์ œ ์‹œ์žฅ์˜ ๊ณต๊ณต ๋ถ€๋ฌธ ๊ณ„์•ฝ์—์„œ ๋ฐ˜๋“œ์‹œ ๊ฐ–์ถฐ์•ผ ํ•  ๊ธฐ๋ณธ ์š”๊ฑด์ด ๋๋‹คโ€๋ผ๊ณ  ๊ฐ•์กฐํ–ˆ๋‹ค.

๋ฐฐ๋„ˆ์ง€๋Š” ์ด๋กœ ์ธํ•ด ์‹œ์žฅ ๊ตฌ์กฐ๋„ ํฌ๊ฒŒ ์žฌํŽธ๋  ์ˆ˜ ์žˆ๋‹ค๊ณ  ์ „๋งํ–ˆ๋‹ค. ๊ทธ๋Š” ์ฃผ๊ถŒ ๋ฌธ์ œ์— ์ƒ๋Œ€์ ์œผ๋กœ ๋ฏผ๊ฐํ•˜์ง€ ์•Š์€ ์ƒ์—… ๊ณ ๊ฐ์„ ์œ„ํ•œ ๊ธ€๋กœ๋ฒŒ ํด๋ผ์šฐ๋“œ์™€, ์™„์ „ํ•œ ํ†ต์ œ๋ฅผ ์š”๊ตฌํ•˜๋Š” ์ •๋ถ€๋ฅผ ์œ„ํ•œ ํ”„๋ฆฌ๋ฏธ์—„ ์ฃผ๊ถŒ ํด๋ผ์šฐ๋“œ๋ผ๋Š” โ€˜์ด์›ํ™” ๊ตฌ์กฐโ€™๊ฐ€ ์ƒ๊ธธ ์ˆ˜ ์žˆ๋‹ค๊ณ  ์ง„๋‹จํ–ˆ๋‹ค. ์ด์–ด โ€œ์œ ๋Ÿฝ ๋“ฑ์ง€์—์„œ ๋ถ€์ƒํ•˜๋Š” ์‹ ํฅ ํด๋ผ์šฐ๋“œ ์—…์ฒด์™€ ์ง€์—ญ ๋ฒค๋”๋“ค์ด ์—„๊ฒฉํ•œ ์•”ํ˜ธํ™” ์š”๊ฑด์„ ์ถฉ์กฑํ•˜๋Š” ์ฃผ๊ถŒ ๊ธฐ๋ฐ˜ ์†”๋ฃจ์…˜์„ ์ œ๊ณตํ•˜๋ฉด์„œ ์‹œ์žฅ ์ ์œ ์œจ์„ ํ™•๋Œ€ํ•  ๊ฐ€๋Šฅ์„ฑ์ด ์žˆ๋‹คโ€๋ผ๊ณ  ๋ถ„์„ํ–ˆ๋‹ค.

ํ”„๋ฆฌ๋ฐ”ํŒ€์˜ ๊ถŒ๊ณ ์•ˆ์€ ์Šค์œ„์Šค ๊ณต๊ณต ๊ธฐ๊ด€์—๋งŒ ์ ์šฉ๋˜๋Š” ์ง€์นจ์ด์ง€๋งŒ, ์ด๋ฒˆ ๋…ผ์Ÿ์€ ๊ธฐ์ˆ  ์ •์ฑ…์„ ๋‘˜๋Ÿฌ์‹ผ ์ง€์ •ํ•™์  ๊ฒฝ์Ÿ์ด ๊ฒฉํ™”ํ•˜๋Š” ์ƒํ™ฉ์—์„œ ๋‹จ์ˆœํžˆ ๋ฐ์ดํ„ฐ ์œ„์น˜๋ฅผ ํ†ต์ œํ•˜๋Š” ๊ฒƒ๋งŒ์œผ๋กœ๋Š” ๋” ์ด์ƒ ๊ทœ์ œ ๋‹น๊ตญ์˜ ์ฃผ๊ถŒ ์š”๊ตฌ๋ฅผ ์ถฉ์กฑ์‹œํ‚ค๊ธฐ ์–ด๋ ต๋‹ค๋Š” ์ ์„ ๋ณด์—ฌ์ค€๋‹ค.
dl-ciokorea@foundryco.com

โ€˜AIยท๋ฐ์ดํ„ฐ ๋ณด์•ˆยท์†Œ๋ฒ„๋ฆฐ ํด๋ผ์šฐ๋“œ ์—ญ๋Ÿ‰ ํ™•์žฅโ€™ยทยทยท์˜คํ”ˆํ…์ŠคํŠธ, ๊ตฌ๊ธ€ํด๋ผ์šฐ๋“œ์™€ ํ˜‘๋ ฅ ํ™•๋Œ€

์˜คํ”ˆํ…์ŠคํŠธ๋Š” ๊ตฌ๊ธ€ํด๋ผ์šฐ๋“œ์˜ ๊ธฐ์—…์šฉ ์ œ๋ฏธ๋‚˜์ด ์†”๋ฃจ์…˜(Gemini Enterprise)๊ณผ ๋ฒ„ํ…์ŠคAI(Vertex AI)๋ฅผ ํฌํ•จํ•œ ์ตœ์‹  AI ๊ธฐ์ˆ ์„ ์ž์‚ฌ์˜ ์—”ํ„ฐํ”„๋ผ์ด์ฆˆ ์ •๋ณด ๊ด€๋ฆฌ ํ”Œ๋žซํผ ์ „๋ฐ˜์— ํ†ตํ•ฉํ–ˆ๋‹ค๊ณ  ๋ฐํ˜”๋‹ค. ๋˜ํ•œ ๋ณดํ—˜, ๊ธˆ์œต ์„œ๋น„์Šค, ๋ฆฌํ…Œ์ผ ๋“ฑ ๋‹ค์–‘ํ•œ ์‚ฐ์—…๋ณ„ ์š”๊ตฌ์— ๋งž์ถ˜ ์ƒˆ๋กœ์šด AI ์—์ด์ „ํŠธ ๊ธฐ๋ฐ˜ ์†”๋ฃจ์…˜์„ ๊ณต๋™์œผ๋กœ ๊ฐœ๋ฐœํ•˜๊ณ  ์žˆ๋‹ค. ์–‘์‚ฌ๋Š” ์ด๋Ÿฌํ•œ ํ†ตํ•ฉ์ด ์—”ํ„ฐํ”„๋ผ์ด์ฆˆ ๊ณ ๊ฐ์ด ๊ธฐ์กด ์ •๋ณด๋ฅผ ๋ณด๋‹ค ํšจ์œจ์ ์œผ๋กœ ํ™œ์šฉํ•˜๋ฉด์„œ๋„ ๊ณ ๋„ํ™”๋œ AI ๊ธฐ๋Šฅ์„ ๋„์ž…ํ•  ์ˆ˜ ์žˆ๋„๋ก ์ง€์›ํ•œ๋‹ค๊ณ  ๋ฐํ˜”๋‹ค.

์•„์šธ๋Ÿฌ ์˜คํ”ˆํ…์ŠคํŠธ๋Š” ๋ฆฌํ…Œ์ผ ์‚ฐ์—…์„ ์œ„ํ•œ ํ–ฅ์ƒ๋œ ๋ฐ์ดํ„ฐ ๋ณดํ˜ธ ์—ญ๋Ÿ‰์„ ์ œ๊ณตํ•˜๊ธฐ ์œ„ํ•ด ๊ตฌ๊ธ€ ๋น…์ฟผ๋ฆฌ(Google BigQuery)์™€ ์˜คํ”ˆํ…์ŠคํŠธ ๋ณผํ‹ฐ์ง€(OpenText Voltage)๋ฅผ ๊ฒฐํ•ฉํ•˜๋Š” ์ž‘์—…์„ ์ง„ํ–‰ํ–ˆ๋‹ค. ์˜คํ”ˆํ…์ŠคํŠธ๋Š” ๋ฏผ๊ฐ ๋ฐ์ดํ„ฐ๊ฐ€ ์ €์žฅ ์ค‘์ด๊ฑฐ๋‚˜ ์ „์†ก ์ค‘์ผ ๋•Œ๋ฟ ์•„๋‹ˆ๋ผ AI ๋ชจ๋ธ์— ํ™œ์šฉ๋˜๋Š” ๊ณผ์ •์—์„œ๋„ ์ง€์†์ ์œผ๋กœ ๋ณดํ˜ธ๋  ์ˆ˜ ์žˆ๋„๋ก ๋ฐ์ดํ„ฐ ์•”ํ˜ธํ™” ๋ฐ ํ”„๋ผ์ด๋ฒ„์‹œ ์œ ์ง€ ๊ธฐ์ˆ ์„ ๊ฐ•ํ™”ํ–ˆ๋‹ค๊ณ  ๋ฐํ˜”๋‹ค. ์ด๋ฅผ ํ†ตํ•ด ๋ฆฌํ…Œ์ผ ๊ธฐ์—…์€ AI ๋ฐ ๋ถ„์„ ์‹œ์Šคํ…œ์„ ํ™œ์šฉํ•˜๋ฉด์„œ๋„ ๊ทœ์ œ ํ™˜๊ฒฝ์„ ์ค€์ˆ˜ํ•˜๊ณ  ๋ฐ์ดํ„ฐ ๋ณด์•ˆ ๋ฆฌ์Šคํฌ๋ฅผ ์ค„์ผ ์ˆ˜ ์žˆ๊ฒŒ ๋๋‹ค๋Š” ์„ค๋ช…์ด๋‹ค.

์˜คํ”ˆํ…์ŠคํŠธ๋Š” ๋˜ํ•œ ์ž์‚ฌ์˜ ํ”„๋ผ์ด๋น— ํด๋ผ์šฐ๋“œ ์†”๋ฃจ์…˜์„ ๊ตฌ๊ธ€ํด๋ผ์šฐ๋“œ์˜ ์†Œ๋ฒ„๋ฆฐ(์ฃผ๊ถŒ) ํด๋ผ์šฐ๋“œ ์ธํ”„๋ผ์™€ ์—ฐ๊ณ„ํ–ˆ๋‹ค๊ณ  ๋ฐœํ‘œํ–ˆ๋‹ค. ์ด ํ˜‘๋ ฅ์€ ๊ตญ๊ฐ€๋ณ„ ๊ทœ์ œ ์š”๊ตฌ์‚ฌํ•ญ, ๋ฐ์ดํ„ฐ ๊ฑฐ๋ฒ„๋„Œ์Šค, ๋ฐ์ดํ„ฐ ๊ฑฐ์ฃผ์ง€ ์ •์ฑ…์„ ์ค€์ˆ˜ํ•ด์•ผ ํ•˜๋Š” ๊ธฐ์—…๊ณผ ๊ธฐ๊ด€์„ ์ง€์›ํ•˜๊ธฐ ์œ„ํ•ด ์„ค๊ณ„๋๋‹ค. ์˜คํ”ˆํ…์ŠคํŠธ๋Š” ์ด๋ฒˆ ํ†ตํ•ฉ์ด ๊ธˆ์œต, ๊ณต๊ณต, ๋ณดํ—˜ ๋“ฑ ๊ทœ์ œ๊ฐ€ ์—„๊ฒฉํ•œ ์‚ฐ์—…์—์„œ ํŠนํžˆ ์ค‘์š”ํ•œ ์˜๋ฏธ๋ฅผ ๊ฐ€์ง„๋‹ค๊ณ  ๊ฐ•์กฐํ–ˆ๋‹ค. ๊ตฌ๊ธ€ํด๋ผ์šฐ๋“œ์˜ ์ธํ”„๋ผ์™€ ๊ฒฐํ•ฉ๋œ ์˜คํ”ˆํ…์ŠคํŠธ์˜ ์ •๋ณด ๊ด€๋ฆฌ ๋ฐ ๋ณด์•ˆ ํ”Œ๋žซํผ์€ ๊ธฐ์—…์ด ๊ธ€๋กœ๋ฒŒ ๊ทœ๋ชจ์˜ ์šด์˜์„ ์œ ์ง€ํ•˜๋ฉด์„œ๋„ ๊ฐ ๊ตญ๊ฐ€์˜ ๊ทœ์ œ ์ค€์ˆ˜ ์š”๊ฑด์„ ์ถฉ์กฑํ•  ์ˆ˜ ์žˆ๋Š” ํ™˜๊ฒฝ์„ ์ œ๊ณตํ•œ๋‹ค.

์˜คํ”ˆํ…์ŠคํŠธ ์ตœ๊ณ ๋งˆ์ผ€ํŒ…์ฑ…์ž„์ž(CMO) ์‚ฐ๋”” ์˜ค๋…ธ๋Š” โ€œ์˜คํ”ˆํ…์ŠคํŠธ์™€ ๊ตฌ๊ธ€ํด๋ผ์šฐ๋“œ์˜ ํ˜‘๋ ฅ์€ ๊ณต๋™ ํ˜์‹ ์„ ๊ธฐ๋ฐ˜์œผ๋กœ ํ•˜๋ฉฐ, ๊ณ ๊ฐ์ด ๋” ์•ˆ์ „ํ•˜๊ณ  ์ง€๋Šฅ์ ์ธ ๋ฐฉ์‹์œผ๋กœ ํด๋ผ์šฐ๋“œ์™€ AI๋ฅผ ํ™œ์šฉํ•  ์ˆ˜ ์žˆ๋„๋ก ์ง€์›ํ•˜๋Š” ๋ฐ ๋ชฉ์ ์ด ์žˆ๋‹ค. ์ด๋ฒˆ ํŒŒํŠธ๋„ˆ์‹ญ ํ™•๋Œ€๋Š” ๊ธฐ์—…์ด ๋ฏผ๊ฐํ•œ ๋ฐ์ดํ„ฐ๋ฅผ ๋ณดํ˜ธํ•˜๋ฉด์„œ๋„ AI์™€ ํด๋ผ์šฐ๋“œ์˜ ์ž ์žฌ๋ ฅ์„ ๊ทน๋Œ€ํ™”ํ•˜๋Š” ๋ฐ ์ค‘์š”ํ•œ ์ด์ •ํ‘œ๊ฐ€ ๋  ๊ฒƒโ€์ด๋ผ๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค.

์˜คํ”ˆํ…์ŠคํŠธ๋Š” ์ด๋ฒˆ ํ˜‘๋ ฅ์ด ๋‹จ์ˆœํ•œ ๊ธฐ์ˆ  ํ†ตํ•ฉ์„ ๋„˜์–ด, ๊ธฐ์—…์ด AI ๊ธฐ๋ฐ˜ ๋””์ง€ํ„ธ ์ „ํ™˜์„ ์ถ”์ง„ํ•˜๋Š” ๊ณผ์ •์—์„œ ๊ฐ€์žฅ ์ค‘์š”ํ•œ ๊ณผ์ œ์ธ ๋ฐ์ดํ„ฐ ๋ณด์•ˆ, ํ”„๋ผ์ด๋ฒ„์‹œ, ๊ทœ์ œ ์ค€์ˆ˜, ๊ทธ๋ฆฌ๊ณ  ์šด์˜ ํ†ต์ œ๋ ฅ์„ ํ•จ๊ป˜ ํ•ด๊ฒฐํ•  ์ˆ˜ ์žˆ๋„๋ก ์ง€์›ํ•œ๋‹ค๊ณ  ๊ฐ•์กฐํ–ˆ๋‹ค. ์–‘์‚ฌ๋Š” ์•ž์œผ๋กœ๋„ ๋‹ค์–‘ํ•œ ์‚ฐ์—…๊ตฐ์„ ์œ„ํ•œ AI ๊ธฐ์ˆ , ๋ฐ์ดํ„ฐ ๋ณดํ˜ธ ๊ธฐ๋Šฅ, ์†Œ๋ฒ„๋ฆฐ ํด๋ผ์šฐ๋“œ ์†”๋ฃจ์…˜์„ ์ง€์†์ ์œผ๋กœ ๊ณต๋™ ๊ฐœ๋ฐœํ•  ๊ณ„ํš์ด๋ผ๊ณ  ๋ฐํ˜”๋‹ค.
dl-ciokorea@foundryco.com

Four things AWS needs to fix at re:Invent this week

The mood among Amazon Web Services customers is shifting from curiosity to urgency as the company prepares to once again to โ€œre:Inventโ€ itself at its annual customer conference this week.

After a year in which Microsoft and Google tightened their narratives around unified data, AI platforms and workflow-ready agents, AWS can no longer rely on its scale, breadth, or incremental roadmap to maintain the confidence of CIOs.

Instead, say analysts, the hyperscaler must address four key concerns at re:Invent in Las Vegas this week if it wants to retain its position as the default enterprise cloud.

Closing the integration gaps between analytics, data, and AI

Although AWS is ahead in raw capability and breadth of services, say analysts, it is falling behind in its integration and unification of data, analytics, machine learning, and AI.

โ€œIt lags behind rivals on simplicity and integration,โ€ said Phil Fersht, CEO of HFS Research. โ€œCustomers want fewer hops between analytics, machine learning, and generative AI. They want unified governance and a consistent metadata layer so agents can reason across systems,โ€ he said.

Microsoft, at its Ignite customer event last month, beefed up its unified data and analytics platform, Fabric IQ, with new semantic intelligence capabilities. AWS, too, has been trying its hand at unifying its AI and analytics services with the launch of SageMaker Unified Studio last year but has yet to reach the level of simplicity that Microsoftโ€™s IQ offerings promise.

When it comes to new AI analytics services from AWS, CIOs can expect more of the same, said David Linthicum, independent consultant and retired chief cloud strategy officer at Deloitte Consulting. โ€œRealistically, they can expect AWS to keep integrating its existing services; the key test will be whether this shows up as less complexity and faster time-to-insight, not just new service names,โ€

Lack of cohesion in AI platform strategy

That complexity isnโ€™t confined to analytics alone. The same lack of cohesion is now spilling over into AWSโ€™s AI platform strategy, where the cloud giant risks ceding mindshare despite its compute advantage.

โ€œSageMaker is still respected, but it no longer dominates the AI platform conversation. Open source frameworks like Ray, MLflow, and KubeRay are rapidly capturing developer mindshare because they offer flexibility and avoid lock in,โ€ Fersht said.

This fragmentation is exactly what partners want AWS to fix by offering clearer, more opinionated MLOps paths, deeper integration between Bedrock and SageMaker, and ready-to-use patterns that help enterprises progress from building models to deploying real agents at scale.

More plug-and-play, less build-it-yourself

AWSโ€™s tooling shortcomings donโ€™t end there, said Fersht. The hyperscalerโ€™s focus on providing the parts for agentic AI and leaving others to build with them make it harder for business users to consume its services.

โ€œAWS is giving strong primitives, but competitors are shipping business-ready agents that sit closer to workflows and outcomes. Enterprises want both power and simplicity,โ€ Fersht said.

Although thereโ€™s an assumption that enterprises are big enough to build things themselves, they want more plug-and-play than AWS imagines, Fersht said: โ€œThey do not want to engineer everything from scratch. They want reusable agent blueprints that map to sales, service, IT operations, and supply chain tasks.โ€

In fact, if AWS wants to compete with rivals to become the default agent platform for enterprises, it must hide complexity behind higher-level abstractions and simplify its agent stack, double down on workflow level agents, and give customers clear guidance on safe deployment, accountability, and ROI, he said.

Vibe coding disarray

Like other hyperscalers, AWS is aggressively experimenting in the vibe coding and agentic IDE space, where thereโ€™s no clear consensus on what developers actually want, according to Fersht.

โ€œEveryone is experimenting because no one has cracked the next generation developer workflow. AWS is no different,โ€ he said, adding that in some respects AWS has been more conservative than its rivals.

AWS is sure to be dealing some new innovations at AWS re:Invent in Las Vegas this week, but despite defining the cloud computing industry in 2006, it now finds itself, in many respects, playing catch-up.

End-to-end encryption is next frontline in governmentsโ€™ data sovereignty war with hyperscalers

Data residency is no longer enough. As governments lose faith that storing data within their borders, but on someone elseโ€™s servers, provides real sovereignty, regulators are demanding something more fundamental: control over the encryption keys for their data.

Privatim, a collective of Swiss local government data protection officers, last week called on their employers to avoid the use of international software-as-a-service solutions for sensitive government data unless the agencies themselves implement end-to-end encryption. The resolution specifically cited Microsoft 365 as an example of the kinds of platforms that fall short.

โ€œMost SaaS solutions do not yet offer true end-to-end encryption that would prevent the provider from accessing plaintext data,โ€ said the Swiss data protection officersโ€™ resolution. โ€œThe use of SaaS applications therefore entails a significant loss of control.โ€

Security analysts say this loss of control undermines the very concept of data sovereignty. โ€œWhen a cloud provider has any ability to decrypt customer data, either through legal process or internal mechanisms, the data is no longer truly sovereign,โ€ said Sanchit Vir Gogia, chief analyst at Greyhound Research.

The Swiss position isnโ€™t isolated, Gogia said. Across Europe, Germany, France, Denmark and the European Commission have each issued warnings or taken action, pointing to a loss of faith in the neutrality of foreign-owned hyperscalers, he said. โ€œSwitzerland distinguished itself by stating explicitly what others have implied: that the US CLOUD Act and foreign surveillance risk renders cloud solutions lacking end-to-end encryption unsuitable for high-sensitivity public sector use, according to the resolution.โ€

Encryption, location, location

Privatimโ€™s resolution identified risks that geographic data residency cannot address. Globally operating companies offer insufficient transparency for authorities to verify compliance with contractual obligations, the group said. This opacity extends to technical implementations, change management, and monitoring of employees and subcontractors who can form long chains of external service providers.

Data stored in one jurisdiction can still be accessed by foreign governments under extraterritorial laws like the US Clarifying Lawful Overseas Use of Data (CLOUD) Act, said Ashish Banerjee, senior principal analyst at Gartner. Software providers can also unilaterally amend contract terms periodically, further reducing customer control, he said.

โ€œSeveral clients in the Middle East and Europe have raised concerns that, regardless of where their data is stored, it could still be accessed by cloud providers โ€” most of which are US-based,โ€ Banerjee said.

Prabhjyot Kaur, senior analyst at Everest Group, said the Swiss stance accelerates a broader regulatory pivot toward technical sovereignty controls. โ€œWhile the Swiss position is more stringent than most, it is not an isolated outlier,โ€ she said. โ€œIt accelerates a broader regulatory pivot toward technical sovereignty controls, even in markets that still rely on contractual or procedural safeguards today.โ€

Given these limitations, Privatim called for stricter rules on cloud use at all levels of government: โ€œThe use of international SaaS solutions for particularly sensitive personal data or data subject to legal confidentiality obligations by public bodies is only possible if the data is encrypted by the responsible body itself and the cloud provider has no access to the key.โ€

This represents a departure from current practices, where many government bodies rely on cloud providersโ€™ native encryption features. Services like Microsoft 365 offer encryption at rest and in transit, but Microsoft retains the ability to decrypt that data for operational purposes, compliance requirements, or legal requests.

More security, less insight

Customer-controlled end-to-end encryption comes with significant trade-offs, analysts said.

โ€œWhen the provider has zero visibility into plaintext, governments would face reduced search and indexing capabilities, limited collaboration features, and restrictions on automated threat detection and data loss prevention tooling,โ€ said Kaur. โ€œAI-driven productivity enhancements like copilots also rely on provider-side processing, which becomes impossible under strict end-to-end encryption.โ€

Beyond functionality losses, agencies would face significant infrastructure and cost challenges. They would need to operate their own key management systems, introducing governance overhead and staffing needs. Encryption and decryption at scale can impact system performance, as they require additional hardware resources and increase latency, Banerjee said.

โ€œThis might require additional hardware resources, increased latency in user interactions, and a more expensive overall solution,โ€ he said.

These constraints mean most governments will likely adopt a tiered approach rather than blanket encryption, said Gogia. โ€œHighly confidential content, including classified documents, legal investigations, and state security dossiers, can be wrapped in true end-to-end encryption and segregated into specialized tenants or sovereign environments,โ€ he said. Broader government operations, including administrative records and citizen services, will continue to use mainstream cloud platforms with controlled encryption and enhanced auditability.

A shift in cloud computing power

If the Swiss approach gains momentum internationally, hyperscalers will need to strengthen technical sovereignty controls rather than relying primarily on contractual or regional assurances, Kaur said. โ€œThe required adaptations are already visible, particularly from Microsoft, which has begun rolling out more stringent models around customer-controlled encryption and jurisdictional access restrictions.โ€

The shift challenges fundamental assumptions in how cloud providers have approached government customers, according to Gogia. โ€œThis invalidates large portions of the existing government cloud playbooks that depend on data center residency, regional support, and contractual segmentation as the primary guarantees,โ€ he said. โ€œClient-side encryption, confidential computing, and external key management are no longer optional capabilities but baseline requirements for public sector contracts in high-compliance markets.โ€

The market dynamics could shift significantly as a result. Banerjee said this could create a two-tier structure: global cloud services for commercial customers less concerned about sovereignty, and premium sovereign clouds for governments demanding full control. โ€œNon-US cloud providers and local vendors โ€” such as emerging players in Europe โ€” could gain market share by delivering sovereign solutions that meet strict encryption requirements,โ€ he said.

Privatimโ€™s recommendations apply specifically to Swiss public bodies and serve as guidance rather than binding policy. But the debate signals that data location alone may no longer satisfy regulatorsโ€™ sovereignty concerns in an era where geopolitical rivalries are increasingly playing out through technology policy.

AWS, ๋ฏธ ๋™๋ถ€ ๋ฆฌ์ „ ์žฅ์•  ๋Œ€๋น„ํ•ด DNS ๋ณต์›๋ ฅ ๊ธฐ๋Šฅ ๊ฐ•ํ™”

AWS๊ฐ€ ๋ฏธ๊ตญ ๋ฒ„์ง€๋‹ˆ์•„ ๋ถ๋ถ€์— ์œ„์น˜ํ•œ ๋ฏธ ๋™๋ถ€ ๋ฆฌ์ „์˜ ์•ˆ์ •์„ฑ์„ ๊ฐ•ํ™”ํ•˜๊ณ  ์„œ๋น„์Šค ์ค‘๋‹จ์„ ์ค„์ด๊ธฐ ์œ„ํ•œ ์ƒˆ๋กœ์šด DNS(Domain Name Service) ๋ณต์›๋ ฅ ๊ธฐ๋Šฅ์„ ๋„์ž…ํ–ˆ๋‹ค.

์ง€๋‚œ 10์›”, AWS ๋ฏธ ๋™๋ถ€ ๋ฆฌ์ „์—์„œ๋Š” DNS ์žฅ์• ๋กœ ๋‹ค์ด๋‚˜๋ชจDB API๊ฐ€ ๋ถˆ์•ˆ์ •ํ•ด์ง€๋ฉด์„œ 70์ข…์ด ๋„˜๋Š” ์„œ๋น„์Šค๊ฐ€ ๊ด‘๋ฒ”์œ„ํ•˜๊ฒŒ ์˜ํ–ฅ์„ ๋ฐ›์•˜๋‹ค. ์ด๋กœ ์ธํ•ด ๋‹ค์ˆ˜ ๊ณ ๊ฐ์‚ฌ์˜ ์„œ๋น„์Šค๊ฐ€ ์ˆ˜ ์‹œ๊ฐ„ ๋™์•ˆ ์ค‘๋‹จ๋๊ณ , AWS๋Š” ๊ฒฐ๊ตญ DNS๋ฅผ ์ˆ˜๋™์œผ๋กœ ๋ณต๊ตฌํ•ด์•ผ ํ–ˆ๋‹ค.

์„œ๋น„์Šค๊ฐ€ ์™„์ „ํžˆ ์ •์ƒํ™”๋˜๋Š” ๋ฐ๋Š” ๋” ๋งŽ์€ ์‹œ๊ฐ„์ด ์†Œ์š”๋๋‹ค. ๋„คํŠธ์›Œํฌ ๊ตฌ์„ฑ ์ง€์—ฐ๊ณผ ๋ˆ„์ ๋œ ์ž‘์—… ์ฒ˜๋ฆฌ๊ฐ€ ๋’ค๋”ฐ๋ž๊ธฐ ๋•Œ๋ฌธ์ด๋‹ค.

AWS๋Š” ์ด๋ฒˆ์— ๋„์ž…ํ•œ DNS ๋ณต์›๋ ฅ ๊ธฐ๋Šฅ์ด โ€˜๊ณต์šฉ DNS ๋ ˆ์ฝ”๋“œ ๊ด€๋ฆฌ๋ฅผ ์œ„ํ•œ ์‹ ์† ๋ณต๊ตฌ ๊ธฐ๋Šฅ(Accelerated recovery for managing public DNS records)โ€™๋ผ๋Š” ์ด๋ฆ„์œผ๋กœ ์ œ๊ณต๋˜๋ฉฐ, 10์›” ์žฅ์• ๋ฅผ ์ด‰๋ฐœํ•œ ๋ฌธ์ œ์™€ ๊ฐ™์€ DNS ๊ด€๋ จ ์ด์Šˆ๋ฅผ ํ•ด๊ฒฐํ•˜๊ธฐ ์œ„ํ•ด ์„ค๊ณ„๋๋‹ค๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค.

์ด ๊ธฐ๋Šฅ์€ ์‚ฌ๋žŒ์ด ์ดํ•ดํ•˜๊ธฐ ์‰ฌ์šด ๋„๋ฉ”์ธ ์ด๋ฆ„์„ ์ˆซ์ž๋กœ ๋œ IP ์ฃผ์†Œ๋กœ ๋ณ€ํ™˜ํ•ด ์‹œ์Šคํ…œ ๊ฐ„ ํ†ต์‹ ์„ ๋•๋Š” AWS์˜ ํด๋ผ์šฐ๋“œ ๊ธฐ๋ฐ˜ ์›น์„œ๋น„์Šค ๋ผ์šฐํŠธ(Route) 53์— ์ถ”๊ฐ€๋๋‹ค. AWS๋Š” 26์ผ ๋ธ”๋กœ๊ทธ๋ฅผ ํ†ตํ•ด ์ด ๊ธฐ๋Šฅ์ด ํ–ฅํ›„ ์žฅ์•  ๋ฐœ์ƒ ์‹œ ๋ณต๊ตฌ ๋ชฉํ‘œ ์‹œ๊ฐ„(RTO)์„ 60๋ถ„์œผ๋กœ ๋ณด์žฅํ•˜๋„๋ก ์„ค๊ณ„๋๋‹ค๊ณ  ๋ฐํ˜”๋‹ค.

AWS๋Š” โ€œ์ด๋ฒˆ ๊ธฐ๋Šฅ ๊ฐ•ํ™”๋กœ ๊ณ ๊ฐ์€ ๋ฆฌ์ „ ์žฅ์•  ์ƒํ™ฉ์—์„œ๋„ DNS ๋ณ€๊ฒฝ๊ณผ ์ธํ”„๋ผ ํ”„๋กœ๋น„์ €๋‹์„ ๊ณ„์† ์ง„ํ–‰ํ•  ์ˆ˜ ์žˆ์–ด, ๋ฏธ์…˜ ํฌ๋ฆฌํ‹ฐ์ปฌํ•œ ์• ํ”Œ๋ฆฌ์ผ€์ด์…˜ ์šด์˜์˜ ์˜ˆ์ธก์„ฑ๊ณผ ๋ณต์›๋ ฅ์„ ๋†’์ผ ์ˆ˜ ์žˆ๋‹คโ€๋ผ๊ณ  ์ „ํ–ˆ๋‹ค.

๋ฐ์ดํ„ฐ ๊ณ„์ธต๊ณผ ์ œ์–ด ๊ณ„์ธต์˜ ์ฐจ์ด

AWS๊ฐ€ ๊ฒช์–ด ์˜จ DNS ๋ฌธ์ œ๋Š” ์ฃผ๋กœ ํŠธ๋ž˜ํ”ฝ ๋ฐฉํ–ฅ์„ ๊ฒฐ์ •ํ•˜๋Š” ๊ด€๋ฆฌ ๊ณ„์ธต์ธ ์ œ์–ด๊ณ„์ธต์— ์˜ํ–ฅ์„ ์ฃผ๋Š” ๊ฒฝ์šฐ๊ฐ€ ๋งŽ์•˜์œผ๋ฉฐ, ์‹ค์ œ DNS ์งˆ์˜๋ฅผ ๋ชฉ์ ์ง€๊นŒ์ง€ ์ „๋‹ฌํ•˜๋Š” ๋ฐ์ดํ„ฐ๊ณ„์ธต์—๋Š” ๋ฌธ์ œ๊ฐ€ ๋ฐœ์ƒํ•˜์ง€ ์•Š๋Š” ๊ฒฝ์šฐ๊ฐ€ ์ผ๋ฐ˜์ ์ด์—ˆ๋‹ค.

HFS๋ฆฌ์„œ์น˜์˜ ๋ถ€๋ฌธ ์ฑ…์ž„์ž ์•…์ƒคํŠธ ํ‹ฐ์•ผ๊ธฐ๋Š” โ€œAWS์—์„œ ํฐ ์žฅ์• ๊ฐ€ ๋ฐœ์ƒํ•  ๋•Œ DNS ๋ฐ์ดํ„ฐ ๊ณ„์ธต์€ ๋Œ€์ฒด๋กœ ์ •์ƒ์ ์œผ๋กœ ์œ ์ง€๋œ๋‹ค. ์ฆ‰ ์ธํ”„๋ผ ์ž์ฒด๋Š” ๊ณ„์† ์ž‘๋™ํ•˜์ง€๋งŒ, ๋ฏธ ๋™๋ถ€์˜ ์ œ์–ด๊ณ„์ธต์ด ๋ฉˆ์ถ”๋ฉด DNS๋ฅผ ์ œ๋•Œ ๊ฐฑ์‹ ํ•ด ํŠธ๋ž˜ํ”ฝ์„ ์šฐํšŒํ•  ์ˆ˜ ์—†๊ฒŒ ๋˜๊ณ , ๊ทธ ์ง€์ ์ด ์‹ค์ œ ์žฅ์• ๊ฐ€ ๋˜๋Š” ๊ฒƒโ€์ด๋ผ๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค.

ํ‹ฐ์•ผ๊ธฐ๋Š” ์ด์–ด โ€œ์ด๋ฒˆ์— ์ถ”๊ฐ€๋œ ๊ธฐ๋Šฅ์€ ๊ทธ ๋นˆํ‹ˆ์„ ๋ณด์™„ํ•˜๋ ค๋Š” ๊ฒƒโ€์ด๋ผ๋ฉฐ โ€œ์—ฌ๋Ÿฌ ๋ฆฌ์ „์— ๊ฑธ์ณ ๊ฐ•ํ™”๋œ ์ œ์–ด ๊ฒฝ๋กœ๋ฅผ ์ œ๊ณตํ•ด โ€˜ChangeResourceRecordSetsโ€™์™€ ๊ฐ™์€ ํ•ต์‹ฌ API๊ฐ€ ๋ณด์žฅ๋œ 60๋ถ„ ๋ณต๊ตฌ ์‹œ๊ฐ„ ๋‚ด์— ํ•ญ์ƒ ์‚ฌ์šฉ ๊ฐ€๋Šฅํ•˜๋„๋ก ํ•œ๋‹ค. ์ด๋ฅผ ํ†ตํ•ด ๊ธฐ์—…์€ AWS์˜ ๋ณต๊ตฌ๋ฅผ ๊ธฐ๋‹ค๋ฆฌ์ง€ ์•Š๊ณ ๋„ ๋ฐฑ์—… ๋ฆฌ์ „์œผ๋กœ ์‚ฌ์šฉ์ž ํŠธ๋ž˜ํ”ฝ์„ ๋Œ๋ฆฌ๊ฑฐ๋‚˜, ๋Œ€๊ธฐ ์—”๋“œํฌ์ธํŠธ๋กœ ์ „ํ™˜ํ•˜๊ฑฐ๋‚˜, ์žฌํ•ด๋ณต๊ตฌ ํ™˜๊ฒฝ์œผ๋กœ ์ฆ‰์‹œ ์ „ํ™˜ํ•  ์ˆ˜ ์žˆ๋‹คโ€๋ผ๊ณ  ์ „ํ–ˆ๋‹ค.

๋ฏธ ๋™๋ถ€ ๋ฆฌ์ „, AWS์˜ ๊ตฌ์กฐ์  ๋ณ‘๋ชฉ์œผ๋กœ ์ง€์ ๋ผ

๋ฏธ๊ตญ ๋ฒ„์ง€๋‹ˆ์•„ ๋ถ๋ถ€์— ์œ„์น˜ํ•œ AWS ๋ฏธ ๋™๋ถ€ ๋ฆฌ์ „์€ ์˜ค๋žซ๋™์•ˆ AWS ์ „์ฒด ์•„ํ‚คํ…์ฒ˜์˜ ํ•ต์‹ฌ ๋ณ‘๋ชฉ์œผ๋กœ ๊ผฝํ˜€ ์™”๋‹ค.

์•…์ƒคํŠธ ํ‹ฐ์•ผ๊ธฐ๋Š” โ€œAWS์˜ ๊ธ€๋กœ๋ฒŒ ์„œ๋น„์Šค ์ƒ๋‹น์ˆ˜๊ฐ€ ์—ญ์‚ฌ์ ์œผ๋กœ ๋ฒ„์ง€๋‹ˆ์•„ ๋ถ๋ถ€ ๋ฆฌ์ „์˜ ์ œ์–ด๊ณ„์ธต์— ์˜์กดํ•ด ์™”๋‹ค. ์ด ๋ฆฌ์ „์ด ํ”๋“ค๋ฆฌ๋ฉด ์ „ ์„ธ๊ณ„๊ฐ€ ๊ทธ ์—ฌํŒŒ๋ฅผ ๊ณ ์Šค๋ž€ํžˆ ๋А๋‚€๋‹คโ€๊ณ  ๋งํ–ˆ๋‹ค.

ํ‹ฐ์•ผ๊ธฐ ๋ถ„์„๊ฐ€๋Š” ์ด๋ฒˆ ์‹ ๊ทœ ๊ธฐ๋Šฅ์ด ์—ฌ๋Ÿฌ ์ค‘์š”ํ•œ ๊ฒฐํ•จ ์ค‘ ํ•˜๋‚˜๋ฅผ ๊ฐœ์„ ํ•˜๊ธฐ๋Š” ํ–ˆ์ง€๋งŒ, ํ–ฅํ›„ ๋ฐœ์ƒํ•  ์žฅ์• ์˜ ์˜ํ–ฅ์„ ์™„์ „ํžˆ ๋ง‰๊ธฐ์—๋Š” ์ถฉ๋ถ„ํ•˜์ง€ ์•Š์„ ์ˆ˜ ์žˆ๋‹ค๊ณ  ๊ฒฝ๊ณ ํ–ˆ๋‹ค. ๊ทธ๋Š” โ€œAWS๊ฐ€ ํ•ต์‹ฌ API์— ๋Œ€ํ•ด ๋” ๊ฐ•๋ ฅํ•œ ๊ต์ฐจ ๋ฆฌ์ „ ์žฅ์•  ์กฐ์น˜(failover)๋ฅผ ๋ณด์žฅํ•˜๊ณ , ์ œ์–ด๊ณ„์ธต ์ฑ…์ž„์„ ์—ฌ๋Ÿฌ ๋…๋ฆฝ ๋ฆฌ์ „์— ๋ถ„์‚ฐํ•˜๊ธฐ ์ „๊นŒ์ง€ ์œ„ํ—˜์€ ๊ณ„์† ๋‚จ์•„ ์žˆ๋‹คโ€๊ณ  ์„ค๋ช…ํ–ˆ๋‹ค.

ํ‹ฐ์•ผ๊ธฐ๋Š” AWS๊ฐ€ ํ–ฅํ›„ ๋‹ค์ค‘ ๋ฆฌ์ „ DNS ๊ตฌ์„ฑ์ด๋‚˜ ์ œ์–ด๊ณ„์ธต ๊ฒฉ๋ฆฌ๋ฅผ ์œ„ํ•œ ๋” ๊ตฌ์ฒด์ ์ด๊ณ  ์ผ๊ด€๋œ ์„ค๊ณ„ ํ…œํ”Œ๋ฆฟ์„ ์ œ๊ณตํ•จ์œผ๋กœ์จ, ๊ณ ๊ฐ๋“ค์ด ์žฅ์•  ๋•Œ๋งˆ๋‹ค ๋ณต์žกํ•œ ์•„ํ‚คํ…์ฒ˜๋ฅผ ๋‹ค์‹œ ๊ตฌ์„ฑํ•ด์•ผ ํ•˜๋Š” ๋ถ€๋‹ด์„ ์ค„์ผ ์ˆ˜ ์žˆ๋‹ค๊ณ  ์กฐ์–ธํ–ˆ๋‹ค.

DNS ๋ณต์›๋ ฅ ๊ฒฝ์Ÿ์—์„œ ์•ž์„ค ์ˆ˜๋„

์ด๋ฒˆ DNS ๋ณต์›๋ ฅ ๊ธฐ๋Šฅ์€ ๋„คํŠธ์›Œํฌ ์žฅ์• ๋ฅผ ๊ณ„์† ๊ฒช๊ณ  ์žˆ๋Š” ๋‹ค๋ฅธ ํ•˜์ดํผ์Šค์ผ€์ผ๋Ÿฌ์™€ ๋น„๊ตํ•ด AWS์— ์šฐ์œ„๋ฅผ ์ œ๊ณตํ•  ์ˆ˜ ์žˆ๋‹ค๋Š” ํ‰๊ฐ€๋„ ๋‚˜์˜จ๋‹ค.

ํ‹ฐ์•ผ๊ธฐ๋Š” โ€œ์• ์ €, ๊ตฌ๊ธ€ํด๋ผ์šฐ๋“œ, ํด๋ผ์šฐ๋“œํ”Œ๋ ˆ์–ด ๋ชจ๋‘ ์ „์„ธ๊ณ„ ๋ถ„์‚ฐ๋œ ๊ฐ•๋ ฅํ•œ DNS ์‹œ์Šคํ…œ์„ ์šด์˜ํ•˜์ง€๋งŒ, ๋ฆฌ์ „ ์žฅ์•  ์ƒํ™ฉ์—์„œ DNS ์ œ์–ด๊ณ„์ธต ์—…๋ฐ์ดํŠธ์˜ ๋ณต๊ตฌ ์‹œ๊ฐ„์„ ๋ช…ํ™•ํžˆ ๋ณด์žฅํ•˜๋Š” ๊ณณ์€ ์—†๋‹ค. ์ด ๋ถ€๋ถ„์ด ๊ฒฐ์ •์  ์ฐจ์ดโ€๋ผ๊ณ  ๋งํ–ˆ๋‹ค. ๊ทธ๋Š” โ€œ์ด๋“ค ๊ฒฝ์Ÿ์‚ฌ๋Š” DNS ์งˆ์˜ ์ž์ฒด๋Š” ๊ณ„์† ์ฒ˜๋ฆฌ๋œ๋‹ค๊ณ  ๋ณด์žฅํ•˜์ง€๋งŒ, ์ œ์–ด๊ณ„์ธต ์žฅ์• ๊ฐ€ ๋ฐœ์ƒํ–ˆ์„ ๋•Œ DNS ๋ ˆ์ฝ”๋“œ๋ฅผ ์–ผ๋งˆ๋‚˜ ๋นจ๋ฆฌ ๊ฐฑ์‹ ํ•  ์ˆ˜ ์žˆ๋Š”์ง€์— ๋Œ€ํ•ด์„œ๋Š” ๊ตฌ์ฒด์ ์œผ๋กœ ๋ฐํžˆ์ง€ ์•Š๋Š”๋‹คโ€๋ผ๊ณ  ๋ง๋ถ™์˜€๋‹ค.

AWS๋Š” ๊ธฐ์—… ๊ณ ๊ฐ์˜ ๋‹ค์šดํƒ€์ž„์„ ์ค„์ด๊ธฐ ์œ„ํ•œ ๊ธฐ๋Šฅ์„ ๊พธ์ค€ํžˆ ๊ฐ•ํ™”ํ•˜๊ณ  ์žˆ๋‹ค. ์ง€๋‚œํ•ด 10์›” ์žฅ์•  ์งํ›„, AWS๋Š” ํด๋ผ์šฐ๋“œ์™€์น˜(CloudWatch)์— ์ž๋™ ์‚ฌ๊ณ  ์ƒ์„ฑ ๊ธฐ๋Šฅ์„ ์ถ”๊ฐ€ํ•œ ๋ฐ” ์žˆ๋‹ค.
dl-ciokorea@foundryco.com

โŒ