2 big mistakes to avoid in edge computing

DAVID LINTHICUM | January 22, 2019

article image
More things are being pushed to the edge. Think of the edge as the space between the cloud and whatever device or system is tossing off data.The idea is to do most of the processing at the edge, close to where the data is produced. This approach, called edge computing, provides a much better response time, because there’s no need to send the data back to a central cloud-based data-storage system where it’s processed and then returned all the way back to the device. Edge computing is very useful. Which is why most enterprises are sold on the concept. I’m seeing interest in edge computing move from proofs of concepts to production. However, it’s not a substitute for a good architectural approach and old-fashioned pragmatism. Which is why I’m also seeing huge mistakes being made—mistakes that are avoidable. Here are two common mistakes to avoid.

Spotlight

NEC Corporation

NEC Corporation is a leader in the integration of IT and network technologies that benefit businesses and people around the world. By providing a combination of products and solutions that cross utilize the company's experience and global resources, NEC's advanced technologies meet the complex and ever-changing needs of its customers.

OTHER ARTICLES

Accelerating 5G vRAN: The Case for GPUs

Article | April 1, 2020

The pace of 5G rollouts in 2019 surpassed expectations, and in 2020 the momentum is only increasing. So far, 5G usage has been predominantly 4G-style mobile broadband (MBB) services driving smartphone traffic growth. By the end of 2019, global mobile data traffic was around 40 exabytes (EB) per month and by 2025 we expect 160 EB, with video-related streaming accounting for about three-quarters of the total. Beyond MBB, 5G will allow service providers to address more of the IT value chain as they accommodate and enable an emerging range of enterprise applications and services. What will it take to spur this next wave of 5G across a broad spectrum of use-cases? RAN virtualization is a key element to the story of 5G reaching beyond MBB.

Read More

Security that’s Designed for the Modern Data Center

Article | February 26, 2020

The last 12 months have been incredibly exciting for the security business at VMware. Last year at RSA Conference 2019, VMware CEO Pat Gelsinger outlined our Intrinsic Security strategy in his keynote presentation, “3 Things the Security Industry Isn’t Talking About”. We also announced the VMware Service-defined Firewall, a stateful Layer 7 data center firewall. As pioneers of micro-segmentation, the Service-defined Firewall extended our leadership in protecting east-west traffic in the data center. Later in the year, we announced two major acquisitions –Avi Networks and Carbon Black. The acquisition of Carbon Black brought to VMware an industry-leading endpoint security platform, and made the entire industry take notice of VMware’s intentions to transform security. With Avi Networks, we acquired a software-defined, elastic, and high-performance load balancer that comes equipped with a full-featured web application firewall (WAF). Maintaining the momentum in building out our security portfolio for the digital enterprise, we announced the VMware NSX Distributed Intrusion Detection and Prevention System which will bring advanced threat controls to the Service-defined Firewall.

Read More

Successful Cloud Migrations Made Easy

Article | March 16, 2020

TransAlta, an energy producer with gas, hydro, solar, wind, and coal facilities across the U.S., Canada, and Australia, leveraged data virtualization with the company’s cloud strategy. A few years ago, TransAlta decided to move 100% of its data to the cloud. The company centralized its data to reduce infrastructure, simplify data access, and scale storage. The biggest hidden challenge many companies face when trying to be completely cloud based is connecting the applications they accumulate over time. Whether they were developed and configured for on-premises environments, have specific security requirements, or are too old and complex to connect to data in the cloud, this presents a challenge.

Read More

Oracle Unbreakable Enterprise Kernel R5U3 Released With Better ARM 64-Bit Support

Article | March 24, 2020

The Oracle Linux team has released Unbreakable Enterprise Kernel Release 5 Update 3 as the newest version of their optimized downstream Linux kernel catering to cloud workloads. Unbreakable Enterprise Kernel R5 Update 3 is based off the Linux 4.14.35 upstream kernel but with extra patches atop. The focus for R5 Update 3 is on offering better 64-bit ARM (AArch64) architecture support, on-demand paging support, an XFS file-system deadlock fix, virtualization updates, and various driver updates back-ported to the kernel. The Unbreakable Enterprise Kernel continues to offer full user-space compatibility with Red Hat Enterprise Linux for which Oracle Linux continues to be based.

Read More

Spotlight

NEC Corporation

NEC Corporation is a leader in the integration of IT and network technologies that benefit businesses and people around the world. By providing a combination of products and solutions that cross utilize the company's experience and global resources, NEC's advanced technologies meet the complex and ever-changing needs of its customers.

Events