Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud

The Challenges Edge Computing Brings (w. StorMagic & DCIG)

Truth in IT
09/30/2023
58
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Dave Littman: Right. And but what are some of the other challenges of of data out at the edge and the growth of the edge today? Ken Clipperton: Well, certainly one of the challenges is how do you provide technology-based services in a place where you don't have technology staff? Setting it up, keeping it running, keeping it up-to-date. Absolutely a big challenge. And really, it's about uptime and availability. How do you make that happen consistently and over time at the edge. And tied to that, of course, are budget challenges. You know, organizations are wanting to accomplish more, deploy more capabilities at the edge and there's not necessarily a concurrent rise in IT budgets to support every initiative that folks want to make happen. Dave Littman: Okay. Ken Clipperton: So those are the kind of the three biggies to me. But there there more. Dave Littman: Okay. Yeah. Let me open that up to the panel. Bruce, anything you want to add there from what your clients are telling you is challenges they're seeing that they need to overcome? Bruce Kornfeld: Yeah, I would say I think I think we hit some of them but the biggest things that we see is, first of all, typically the edge sites, whether it's whether it's retail or manufacturing or, you know, even a law firm that has a bunch of sites out there, cost is a huge one. They have the data. They have they have needs for running applications and storing data. But cost is paramount and they need to find ways of keeping the cost down. But high availability is critical. No one really can can afford to run on a single node anymore because technology is so much less expensive. There's got to be ways to build reliable clusters. So we're hearing about high availability and cost. And the other thing that's driving edge, I'd say this this might be a little controversial, this isn't a cloud discussion, so I'll throw it out there, but cloud is very expensive. A lot of enterprises and companies have tried to figure out, let's go cloud first. Let's put everything in the cloud. Well, guess what they're finding is that running applications in the cloud from the edge can be really, really expensive and slow, unreliable. There's a lot of movement these days to edge sites saying, you know what, I just need a little bit of kit, a little HCI solution, highly available, low cost. I'm going to run it myself at the edge because it's going to save me a lot of time and a lot of money and it's going to be highly available.

Edge computing is becoming more attractive to organizations because it can be more cost-effective and reliable than cloud computing. However, there are still some challenges to overcome, such as:

  • High availability: Edge sites need to be able to operate reliably, even in the event of a single node failure.
  • Cost: Edge infrastructure can be expensive to deploy and manage.
  • Compatibility: Edge devices and applications need to be compatible with each other and with the cloud.
Bruce Kornfeld of StorMagic and DCIG's Ken Clipperton discuss.
Categories:
  • » Cybersecurity » Backup & Recovery
  • » Cybersecurity
  • » Cloud
Channels:
  • StorMagic: Simplifying Edge Computing With HCI Software
News:
Events:
Tags:
  • edge
  • stormagic
  • dcig
  • security
  • storage
  • cloud
  • hci
  • backup
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated

            Video's comments: The Challenges Edge Computing Brings (w. StorMagic & DCIG)

            Upcoming Spotlight Events

            • Jun
              24

              Agentic AI Ransomware: What You Need to Know

              06/24/202501:00 PM ET
              • Jul
                29

                QR Codes Exposed: From Convenience to Cybersecurity Nightmare

                07/29/202501:00 PM ET
                More events

                Upcoming 360 View Events

                • Jun
                  18

                  360View: The Data Resilience Imperative – Securing, Scaling & Optimizing Enterprise Data

                  06/18/202512:00 PM ET
                  • Jul
                    24

                    360View: API Security & the Expanding Attack Surface

                    07/24/202512:00 PM ET
                    • Aug
                      21

                      360View: HCI, Cloud, and Virtualization: What’s Next?

                      08/21/202512:00 PM ET
                      More events

                      Upcoming Industry Events

                      • Jun
                        24

                        Ransomware Revealed: Tactics, Entry Points, and Real-World Lessons

                        06/24/202501:00 PM ET
                        • Jun
                          25

                          Anticipating Evolving Threats: Strategies for Detection, Response, and Resilience

                          06/25/202501:00 PM ET
                          • Jun
                            26

                            Mastering Modern Security with Wallarm's Advanced API Solutions

                            06/26/202501:00 PM ET
                            More events

                            Recent Industry Events

                            • May
                              29

                              Dispelling Misconceptions Surrounding API Security

                              05/29/202501:00 PM ET
                              • May
                                08

                                Strengthening API Security through NIST SP 800-228 Guidelines

                                05/08/202501:00 PM ET
                                • Apr
                                  17

                                  Critical Insights on the Discovery, Disclosure, and Impact of an Android Vulnerability

                                  04/17/202502:40 AM ET
                                  More events
                                  Truth in IT
                                  • Advertise
                                  • About Us
                                  • Terms of Service
                                  • Privacy Policy
                                  • Contact Us
                                  • Be Our Guest
                                  • Preference Management
                                  Desktop version
                                  Standard version