Personal devices are increasingly being used across enterprise IT, from smartphones to wearable devices, and these are becoming the true edge. This episode of Utilizing Edge brings Field Day delegates Mark Houtz and Jim Czuprynski together with Stephen Foskett to discuss the personal side of the edge. Mobile Device Management (MDM) has been used to manage smartphones and similar technology is used for personal computers, but it seems inevitable that there will be a mixing of business and private data. The mix and match of personal devices at the edge is sure to be a topic of future focus.
Although blockchain technology has been tainted by scammers, the core idea of distributed consensus is relevant for certain edge applications. This episode of Utilizing Edge focuses on practical application of blockchain technology in edge and IoT, featuring Jason Benedicic, Alastair Cooke, and Stephen Foskett. Two key concepts in blockchain are the distributed ledger and consensus approach. There is a lot of work being done to apply blockchain in medical, finance, IoT, and proof of provenance. Although many applications can rely on authority or quorum, larger and more heterogeneous applications might benefit from consensus instead. The other aspect of blockchain, chain of custody and immutability of data, is potentially relevant in preventing supply chain attacks and dealing with transient devices. It’s important to remember that many of the things that have put people off blockchain, from financialization to public exposure of transactions, are not necessarily required in all blockchains.
Computing and sensors have been deployed at the edge for decades, and this is certainly true in the agriculture sector. This episode of Utilizing Edge features Edge Field Day delegates Ben Young and Alastair Cooke discussing with Stephen Foskett the evolution of connectivity and orchestration at the edge. Governmental policies can have a huge impact on the deployment of technology, from connectivity to environmental regulations, as has the emergence of inexpensive sensors, batteries, and processors thanks to the mobile phone industry, along with solar power. Cloud-inspired automation and orchestration is another key enabler of technology in agriculture and at the edge, with zero-touch provisioning, management, and central maintenance. Containerized applications, caching, and cloud-derived control planes are very popular at the edge, though not exactly the same way as in the cloud.
Industrial control and operational technology systems face the same forces as IT applications and are rapidly being integrated into comprehensive edge infrastructure. This episode of Utilizing Edge brings Andy Foster of IOTech to discuss standardization of industrial IoT with Allyson Klein and Stephen Foskett. There are many more similarities between industrial control systems and information technology systems than many people realize. Both are impacted by standards in commodity hardware, networking and communications protocols, and cloud integration. And OT and IT are colliding at the edge, with a massive opportunity to leverage data.
Media and entertainment is one industry generating and moving vast amounts of data at the edge. This episode of Utilizing Edge brings Jimmy Fusil of Tsecond into a discussion with Alastair Cooke and Stephen Foskett about the unique data challenges in media and entertainment. There is a great need for local processing, secure data transport, and efficient storage utilization in managing the ever-increasing volume of data generated during film and TV production. The podcast explores the continued relevance of physical media, like tape, for long-term archiving, while also emphasizing the security measures necessary to protect creative privacy and prevent potential plot leaks in the industry. Fusil also discusses Tsecond’s groundbreaking product, Bryck, a portable NVMe storage device capable of holding up to a petabyte of data with a remarkable 40GBps data transfer speed. The discussion highlights how Bryck’s high-performance storage facilitates on-device data processing, ensuring quick backups and maintaining data integrity. It’s critical to consider edge storage solutions like Bryck in many data-intensive sectors beyond media and entertainment as well.
Edge computing comes in many forms and brings many challenges, including bandwidth limitations, network reliability issues, and limited space. This episode of Utilizing Edge brings Brian Chambers, Alastair Cooke, and Stephen Foskett together to discuss the state of the edge in 2023. Industries like retail, multi-tenant environments, and industrial IoT find practical applications, but defining the edge remains an ongoing exploration. Implementation varies, from repurposing existing technologies to adopting modern approaches like containers and function as a service. The debate between virtual machines and containers continues, driven by organizational comfort. Despite constraints, edge environments offer greater control and accountability. The future promises more innovation and adoption, cementing edge computing’s significance in the tech landscape.
In this episode of the Utilizing Tech podcast, Stephen Foskett, Alison Klein, and Gina Rosenthal discuss dark data in edge computing. Dark data is unutilized or unknown data collected by organizations. The distributed nature and use of third-party apps can make it challenging to handle dark data, limiting insights and posing security risks. Establishing a stronger IT-business connection is crucial. Observability solutions and data analytics can aid in discovering and centralizing dark data. AI has potential for data hygiene improvement, but human-driven cleaning is still necessary. Despite challenges, edge computing offers better data management due to controlled deployments.
Although we use Intel’s NUC as a shorthand for the type of hardware deployed at the far edge, this recently-cancelled platform isn’t all there is. This episode of Utilizing Edge looks beyond the NUC, to platforms from Lenovo, Nvidia, and more, with Julian Chesterfield of Sunlight, Andrew Green, and Stephen Foskett. ARM-based solutions, many using the Nvidia Jetson platform, are particularly interesting given their low cost and power consumption and strong GPUs for edge AI. A hyperconverged stack runs all of the components required for high availability, including storage and networking, in software spanning all of the nodes in a cluster, and this is commonly deployed on low-cost devices at the far edge. The trend to deploying applications at the edge is driven both by new hardware and software capabilities and the changing expectation of consumers and businesses.
Perhaps no company is more important to the datacenter than VMware, but how are the company’s technologies applied at the edge? This episode of Utilizing Edge features Saadat Malik, VP and GM of Edge Computing at VMware, discussing the evolution of VMware at the edge with Brian Chambers and Stephen Foskett. The discussion delves into the evolution of VMware’s presence at the edge, highlighting the differences between datacenter and edge environments in terms of people and technology. Malik emphasizes the importance of outcomes and product-focused mindsets in edge environments, as well as the constraints posed by limited physical resources. VMware’s technologies in connectivity, storage, security, and management are showcased as key enablers of successful edge computing. The episode also touches upon the growing significance of AI and machine learning at the edge and the need for standardized solutions to drive edge growth and transformation.
Datacenter IT is used to having tight control over infrastructure and applications, but this is challenging to maintain at the edge. This episode of Utilizing Edge features Pierluca Chiodelli of Dell Technology discussing the modern edge application platform with Allyson Klein and Stephen Foskett. A typical edge environment features many different platforms, devices, and connections that must be deployed, managed, and controlled remotely. When looking at the modern edge, Chiodelli recognizes the different personas and needs and constructs a plan to achieve the required outcome at this location. Modern applications need specialized hardware and connectivity that must be supported, deployed, and managed.