ABSTRACT

Open source software has become a corporate strategic tool in several ways, used to enhance a competitive position. Private source software is distributed under the terms of a bilateral contract between the software provider and software user. The user will pay the provider for a license to use the software under the conditions set forth in said contract. Private source software is not shared with the public and the source code is not accessible. The advent of AI in software-defined network (SDN) along with the power of Operations Support Systems (OSS) and standards development organizations (SDO) give birth to autonomous networks. Autonomous networks will place greater scale, performance resiliency demands on cloud native (CN)-based distributed applications operating in any cloud deployment. The most common form of cloud identity management is asymmetric cryptography, where the private key is the only source of identification. The key to applying Artificial Intelligence -based verification is to consider more than just passwords and keys.