DevOps.com

  • Latest
    • Articles
    • Features
    • Most Read
    • News
    • News Releases
  • Topics
    • AI
    • Continuous Delivery
    • Continuous Testing
    • Cloud
    • Culture
    • DataOps
    • DevSecOps
    • Enterprise DevOps
    • Leadership Suite
    • DevOps Practice
    • ROELBOB
    • DevOps Toolbox
    • IT as Code
  • Videos/Podcasts
    • Techstrong.tv Podcast
    • Techstrong.tv Video Podcast
    • Techstrong.tv - Twitch
    • DevOps Unbound
  • Webinars
    • Upcoming
    • On-Demand Webinars
  • Library
  • Events
    • Upcoming Events
    • On-Demand Events
  • Sponsored Content
  • Related Sites
    • Techstrong Group
    • Container Journal
    • Security Boulevard
    • Techstrong Research
    • DevOps Chat
    • DevOps Dozen
    • DevOps TV
    • Techstrong TV
    • Techstrong.tv Podcast
    • Techstrong.tv Video Podcast
    • Techstrong.tv - Twitch
  • Media Kit
  • About
  • Sponsor
  • AI
  • Cloud
  • Continuous Delivery
  • Continuous Testing
  • DataOps
  • DevSecOps
  • DevOps Onramp
  • Platform Engineering
  • Low-Code/No-Code
  • IT as Code
  • More
    • Application Performance Management/Monitoring
    • Culture
    • Enterprise DevOps
    • ROELBOB

Home » Blogs » IT as Code » Infrastructure/Networking » Making the Move to Edge Computing? Consider This 

Making the Move to Edge Computing? Consider This 

Avatar photoBy: Herb VanHook on July 30, 2020 2 Comments

Edge computing has exciting potential, but there are certain considerations to thrive in today’s competitive landscape

Related Posts
  • Making the Move to Edge Computing? Consider This 
  • Is Your Infrastructure Ready for Edge Computing?
  • Why the Success of Edge Computing Relies on a Linux Legacy
    Related Categories
  • Blogs
  • Infrastructure/Networking
  • IT as Code
    Related Topics
  • edge computing
  • networking
  • security
Show more
Show less

Data is king, especially in the current era of the data-driven business, where a data mindset and analytical capabilities are significant factors in determining future success. With so much data to be mined and monetized, more companies are recognizing the competitive advantages of edge computing, which can also jump-start the journey to becoming an autonomous digital enterprise. That said, a variety of security and infrastructure challenges may prevent some IT professionals from making the move, according to a recent survey by Volterra and Propeller Insights.

TechStrong Con 2023Sponsorships Available

Distributed models such as edge computing have always been attractive because of their ability to minimize network latency issues with large data and put essential functions closer to the technology consumer. Now, they’re even more attractive with new compute and application architectures and so many new data sources—network-connected and internet of things (IoT) devices, social media, customer engagement systems, transactional systems and systems of record—dramatically expanding the volume of data and changing the nature of the data collected. Edge computing also helps solve the traditional issues of optimizing for network capacity and performance and addresses new areas such as the localized pre-processing of all data sources (telemetry, video, mobile, etc.).

It’s no surprise, then, that 54% of the IT leaders surveyed said they prefer edge to the cloud for operators who need to control and analyze data for local use cases, and to avoid the latency that can occur when sending edge data to public cloud-based apps. By moving certain workloads to the edge of the network instead, devices spend less time on the cloud, react faster to local changes, and operate reliably–even in extended offline periods.

Edge computing still has its challenges and difficulties to overcome. Among them are key concerns such as a lack of resources or time for long-term upkeep of application and infrastructure, and managing distributed clusters as siloed instances rather than a single resource.

Taking IT to the Edge – Edge Computing, That Is

Despite the roadblocks, the value of edge computing is clear. This is why many companies are including edge computing models in their business plan. However, the performance, control and governance challenges that come with distributed models of compute, applications and data should be considered carefully beforehand.

Innovative, data-driven companies that want to stay on the cutting edge and are planning an edge migration should develop a plan and long-term vision for their mix of data center, cloud and edge resources that consider their current and future use cases. Partnerships will also prove useful. By leveraging multi-vendor, commercial off-the-shelf solutions, enterprises can be more successful yielding value from edge computing than they would with single-vendor niche products. An ecosystem of seamlessly integrated solutions will help companies harness data and translate information into insight and actions that can optimize assets.

As today’s enterprises seek to become more data-driven and evolve into the autonomous digital enterprises of tomorrow, it’s important to think about edge use cases as part of an overall automation strategy. Companies should consider how edge applications and distributed architectures will support them from a capacity, monitoring, deployment and service management perspective.

Finally, edge computing’s advantages also come with the risk of security vulnerabilities if they’re not addressed from the outset, since the “attack surface” of a company’s IT estate becomes much larger. Organizations must deploy a multi-layer security approach that aligns with their edge initiatives while factoring in service-level needs to ensure assets are adequately protected.

Edge computing has exciting potential, and the enterprises that make strategic investments and take a holistic, outlook-driven, secure approach to migration will thrive in tomorrow’s competitive landscape and years into the future.

Filed Under: Blogs, Infrastructure/Networking, IT as Code Tagged With: edge computing, networking, security

« 3 Observability Strategies to Reduce Debugging Cycles
New Relic Makes Revamped APM Platform More Affordable »

Techstrong TV – Live

Click full-screen to enable volume control
Watch latest episodes and shows

Upcoming Webinars

Moving Beyond SBOMs to Secure the Software Supply Chain
Tuesday, January 31, 2023 - 11:00 am EST
Achieving Complete Visibility in IT Operations, Analytics, and Security
Wednesday, February 1, 2023 - 11:00 am EST
Achieving DevSecOps: Reducing AppSec Noise at Scale
Wednesday, February 1, 2023 - 1:00 pm EST

Sponsored Content

The Google Cloud DevOps Awards: Apply Now!

January 10, 2023 | Brenna Washington

Codenotary Extends Dynamic SBOM Reach to Serverless Computing Platforms

December 9, 2022 | Mike Vizard

Why a Low-Code Platform Should Have Pro-Code Capabilities

March 24, 2021 | Andrew Manby

AWS Well-Architected Framework Elevates Agility

December 17, 2020 | JT Giri

Practical Approaches to Long-Term Cloud-Native Security

December 5, 2019 | Chris Tozzi

TSTV Podcast

On-Demand Webinars

DevOps.com Webinar ReplaysDevOps.com Webinar Replays

GET THE TOP STORIES OF THE WEEK

  • Home
  • About DevOps.com
  • Meet our Authors
  • Write for DevOps.com
  • Media Kit
  • Sponsor Info
  • Copyright
  • TOS
  • Privacy Policy

Powered by Techstrong Group, Inc.

© 2023 ·Techstrong Group, Inc.All rights reserved.