Kushagra Sharma's Blog Posts

Kushagra Sharma is a Product Manager at Cisco working on AIOps products that help teams operate complex systems with intelligence and scale. He focuses on translating customer problems into practical, data-driven solutions at the intersection of AI, reliability, and software platforms. Passionate about clear thinking and strong product craft, Kushagra writes to share insights on technology, product strategy, and building systems that actually work in the real world.

What Is OpenTracing?
Learn
5 Minute Read

What Is OpenTracing?

Though the OpenTracing project is no longer supported, learn how it worked & how to migrate to the newer OpenTelemetry framework.
How Splunk SOAR is Helping Organizations Achieve a More Resilient Approach to Security
Security
3 Minute Read

How Splunk SOAR is Helping Organizations Achieve a More Resilient Approach to Security

We worked with Peerspot to capture some of the ways customers have found success while using Splunk SOAR as part of their security stack.
A More Resilient Digital Future for Our APAC Customers and Partners With Splunk + Cisco
Leadership
3 Minute Read

A More Resilient Digital Future for Our APAC Customers and Partners With Splunk + Cisco

Splunk's Simon Davies, Senior Vice President and General Manager - APAC, shares a closer look at what the combination of Splunk and Cisco means for Asia Pacific.
Explainable vs. Interpretable Artificial Intelligence
Learn
4 Minute Read

Explainable vs. Interpretable Artificial Intelligence

Let’s break down two common terms in AI: explainability and interpretability. A complicated concept, yes, but we’ve got you covered!
Technical Review of Splunk AI Assistant for SPL
Artificial Intelligence
5 Minute Read

Technical Review of Splunk AI Assistant for SPL

The Splunk AI Assistant for SPL (SAIAS) is a generative AI-powered assistive app that accelerates user day-to-day tasks.
The CVE & CVE Management, Explained
Learn
10 Minute Read

The CVE & CVE Management, Explained

The CVE is a go-to public list of vulnerabilities and exposures that threat actors can harness. Get the full story for managing CVEs here.