Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud

Edge Computing: Growth Drivers

Truth in IT
09/30/2023
83
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Dave Littman: In your research, you are seeing a lot of growth at the edge. And, you know, what do you see as the main drivers of that? I guess not only the growth of edge computing, but but the growth of the data itself as well. Todd Dorsey: Sure. Well, in many ways, the growth of data at the edge is the factor and reflects the growth of data everywhere. More devices, more applications producing more data, use of media files and larger file sizes. But of course, the edge has unique environments there. Video surveillance, for example, for security. And there's automation technologies and IoT and proliferation of sensors and the manufacturing and environmental situations. Mobile devices and smart devices and 5G networks, you know, as a result of mobile field forces and mobile field workforces. I think of a recent example when I was at the auto dealership. We had a AC leak in our vehicle, and it was wasn't clear where it was coming from, and it had extended warranty on it. But so we had to end up submitting a case with the warranty company for them to cover the AC outage. But, you know, as part of that experience, there's, of course, video in the lobby and there's a case being opened. And as part of our historical records and pictures being taken and submitted with that. And it's just a much richer environment than what it was a decade ago. And of course, there's no end in sight with the amount of data growing for those sorts of situations. Dave Littman: Okay, great. Todd Thank you. Bruce Kornfeld: David, can I can I jump in here? Yeah, Bruce. Go ahead. Yeah. Yeah. So just to follow on to what Todd just said, I mean, what I would I would just add that think about going to an auto parts dealer just five years ago or ten years ago. None of that would have been there. So I'm you know, what we see is that because technology has advanced so much thanks a lot to AMD and Intel and faster processors and smaller devices and faster memory, the innovation that's happening out there is driving all of this data at the edge. Companies are innovating a new ways to solve business problems and it's just generating a massive amount of processing and data coming out from the edge. And and and that's what we're all about here talking about today.

The conversation revolves around the exponential growth of data at the edge, with Todd Dorsey of DCIG emphasizing the role of more devices, applications, and larger files. He uses a warranty case at an auto dealership as an example of the increasing data richness today. StorMagic's Bruce Kornfeld follows up, contrasting current experiences to those just a decade ago, and credits rapid technological advancements from companies such as AMD and Intel for the burgeoning data landscape at the edge.

Categories:
  • » Cybersecurity » Backup & Recovery
  • » Cybersecurity
Channels:
  • StorMagic: Simplifying Edge Computing With HCI Software
News:
Events:
Tags:
  • stormagic
  • edge
  • security
  • storage
  • dcig
  • hci
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated

            Video's comments: Edge Computing: Growth Drivers

            Upcoming Spotlight Events

            • Jul
              16

              How Privileged Access Really Works in Modern Windows Environments

              07/16/202501:00 PM ET
              • Jul
                29

                QR Codes Exposed: From Convenience to Cybersecurity Nightmare

                07/29/202501:00 PM ET
                More events

                Upcoming 360 View Events

                • Jul
                  24

                  360View: API Security & the Expanding Attack Surface

                  07/24/202512:00 PM ET
                  • Aug
                    21

                    360View: HCI, Cloud, and Virtualization: What’s Next?

                    08/21/202512:00 PM ET
                    • Sep
                      25

                      360View: Email Security & Social Engineering Defense

                      09/25/202512:00 PM ET
                      More events

                      Upcoming Industry Events

                      • Jul
                        23

                        Enhancing API Security Testing: Identifying Vulnerabilities Ahead of Deployment

                        07/23/202501:00 PM ET
                        More events

                        Recent Industry Events

                        • Jul
                          10

                          Discover the Latest Features of Netwrix 1Secure for MSPs

                          07/10/202501:00 PM ET
                          • Jun
                            26

                            Discover Wallarm's Innovative Approach to Safeguarding Modern APIs and Agentic AI

                            06/26/202501:00 PM ET
                            • Jun
                              25

                              Adapting to Emerging Threats: Strategies for Detection, Response, and Resilience

                              06/25/202501:00 PM ET
                              More events
                              Truth in IT
                              • Advertise
                              • About Us
                              • Terms of Service
                              • Privacy Policy
                              • Contact Us
                              • Be Our Guest
                              • Preference Management
                              Desktop version
                              Standard version