Mobile-Edge Computing – Introductory Technical White Paper

September 20, 2018

This white paper is authored by the founders of the Mobile-edge Computing (MEC) industry initiative. The objectives of this paper are to introduce the concept of Mobile-edge Computing and the related key market drivers, and to discuss the business, consumer and technical value/benefits that this technology offers. The paper discusses the enablers, the requirements and challenges for Mobile-edge Computing as well as the objectives of the MEC initiative. This white paper presents the high-level architectural blueprint of Mobile-edge Computing which, together with the scope of work, will form the basis for the first release of the work in the initiative. In addition, it highlights the relationships between and the interfaces with other industry efforts.

Spotlight

VSS Monitoring

VSS Monitoring is a world leader in network packet brokers (NPB), providing a unique systems approach to enable network-wide and link-layer visibility, access and offload for a broad ecosystem of network monitoring and security tools. Deployed globally by 80% of the world's tier 1 service providers, F500 corporations and major government agencies, VSS Monitoring packet brokers improve tool usage and efficiency, simplify IT operations, and greatly enhance tool ROI.

OTHER WHITEPAPERS
news image

Dell EMC Unity: Dynamic Pools

whitePaper | November 6, 2019

The Dell EMC™ Unity product line is a simple, easy-to-use, and intelligent storage system which helps meet the needs of IT professionals in large or small companies. The systems are designed with flash in mind and leverage the latest cloud-based data management, efficiency, rich data services, and mobility technologies. The Dell EMC Unity product line comes in a variety of deployment models from purpose-built all-flash or hybrid configurations to converged infrastructure and even virtual storage appliances.

Read More
news image

Why improved VDI UX makes good business sense

whitePaper | May 31, 2021

Read this paper for three ways that GPUs can add value to your virtualized as well as stories from customers about how their businesses have benefited from GPUs.

Read More
news image

Virtual Desktop Services (VDS) : NetApp Solutions

whitePaper | August 12, 2022

The NetApp Virtual Desktop Service (VDS) orchestrates Remote Desktop Services (RDS) in major public clouds as well as on private clouds. VDS supports Windows Virtual Desktop (WVD) on Microsoft Azure. VDS automates many tasks that must be performed after deployment of WVD or RDS, including setting up SMB file shares (for user profiles, shared data, and the user home drive), enabling Windows features, application and agent installation, firewall, and policies.

Read More
news image

How Virtual Desktop Infrastructure (VDI) Can Help Your Business Survive the Pandemic—And Prevailin the Future

whitePaper | December 6, 2022

Growing demand for remote working solutions in light of the pandemic is bolstering the case for virtual desktop infrastructure (VDI) adoption. In this white paper, we discuss why VDI is best suited for today’s business environments, especially since remote work is poised to play a big role both now and in the “new normal” of a post-COVID-19 world. We discuss VDI’s main advantages, its shortcomings and what can be done to address them.

Read More
news image

Avoiding The 9 Common Hazards Of App And Desktop Virtualization

whitePaper | June 4, 2021

VDI can change the way IT delivers desktops and apps to users—yet the success of an IT project path has many potential hazards along the way. These hazards can stop IT at any stage of a VDI deployment, from initial planning to the rollout of production systems.

Read More
news image

Zero Trust Maturity Model

whitePaper | June 13, 2023

The Cybersecurity and Infrastructure Security Agency (CISA) leads the nation’s effort to understand, manage, and reduce cybersecurity risk, including by supporting Federal Civilian Executive Branch agencies in evolving and operationalizing cybersecurity programs and capabilities. CISA’s Zero Trust Maturity Model (ZTMM) provides an approach to achieve continued modernization efforts related to zero trust within a rapidly evolving environment and technology landscape. This ZTMM is one of many paths that an organization can take in designing and implementing their transition plan to zero trust architectures in accordance with Executive Order (EO) 14028 “Improving the Nation’s Cybersecurity” § (3)(b)(ii),1 which requires that agencies develop a plan to implement a Zero Trust Architecture (ZTA). While the ZTMM is specifically tailored for federal agencies as required by EO 14028, all organizations should review and consider adoption of the approaches outlined in this document.

Read More

Spotlight

VSS Monitoring

VSS Monitoring is a world leader in network packet brokers (NPB), providing a unique systems approach to enable network-wide and link-layer visibility, access and offload for a broad ecosystem of network monitoring and security tools. Deployed globally by 80% of the world's tier 1 service providers, F500 corporations and major government agencies, VSS Monitoring packet brokers improve tool usage and efficiency, simplify IT operations, and greatly enhance tool ROI.

Events