Truth in IT
    • Sign In
    • Register
        • Videos
        • Channels
        • Pages
        • Galleries
        • News
        • Events
        • All
Truth in IT Truth in IT
  • Data Management ▼
    • Converged Infrastructure
    • DevOps
    • Networking
    • Storage
    • Virtualization
  • Cybersecurity ▼
    • Application Security
    • Backup & Recovery
    • Data Security
    • Identity & Access Management (IAM)
    • Zero Trust
  • Cloud ▼
    • Hybrid Cloud
    • Private Cloud
    • Public Cloud

The Challenges Edge Computing Brings (w. StorMagic & DCIG)

Truth in IT
09/30/2023
59
0 (0%)
Share
  • Comments
  • Download
  • Transcript
Report Like Favorite
  • Share/Embed
  • Email
Link
Embed

Transcript


Dave Littman: Right. And but what are some of the other challenges of of data out at the edge and the growth of the edge today? Ken Clipperton: Well, certainly one of the challenges is how do you provide technology-based services in a place where you don't have technology staff? Setting it up, keeping it running, keeping it up-to-date. Absolutely a big challenge. And really, it's about uptime and availability. How do you make that happen consistently and over time at the edge. And tied to that, of course, are budget challenges. You know, organizations are wanting to accomplish more, deploy more capabilities at the edge and there's not necessarily a concurrent rise in IT budgets to support every initiative that folks want to make happen. Dave Littman: Okay. Ken Clipperton: So those are the kind of the three biggies to me. But there there more. Dave Littman: Okay. Yeah. Let me open that up to the panel. Bruce, anything you want to add there from what your clients are telling you is challenges they're seeing that they need to overcome? Bruce Kornfeld: Yeah, I would say I think I think we hit some of them but the biggest things that we see is, first of all, typically the edge sites, whether it's whether it's retail or manufacturing or, you know, even a law firm that has a bunch of sites out there, cost is a huge one. They have the data. They have they have needs for running applications and storing data. But cost is paramount and they need to find ways of keeping the cost down. But high availability is critical. No one really can can afford to run on a single node anymore because technology is so much less expensive. There's got to be ways to build reliable clusters. So we're hearing about high availability and cost. And the other thing that's driving edge, I'd say this this might be a little controversial, this isn't a cloud discussion, so I'll throw it out there, but cloud is very expensive. A lot of enterprises and companies have tried to figure out, let's go cloud first. Let's put everything in the cloud. Well, guess what they're finding is that running applications in the cloud from the edge can be really, really expensive and slow, unreliable. There's a lot of movement these days to edge sites saying, you know what, I just need a little bit of kit, a little HCI solution, highly available, low cost. I'm going to run it myself at the edge because it's going to save me a lot of time and a lot of money and it's going to be highly available.

Edge computing is becoming more attractive to organizations because it can be more cost-effective and reliable than cloud computing. However, there are still some challenges to overcome, such as:

  • High availability: Edge sites need to be able to operate reliably, even in the event of a single node failure.
  • Cost: Edge infrastructure can be expensive to deploy and manage.
  • Compatibility: Edge devices and applications need to be compatible with each other and with the cloud.
Bruce Kornfeld of StorMagic and DCIG's Ken Clipperton discuss.
Categories:
  • » Cybersecurity » Backup & Recovery
  • » Cybersecurity
  • » Cloud
  • » Partner Portals » StorMagic
Channels:
  • StorMagic: Simplifying Edge Computing With HCI Software
News:
Events:
Tags:
  • edge
  • stormagic
  • dcig
  • security
  • storage
  • cloud
  • hci
  • backup
Show more Show less

Browse videos

  • Related
  • Featured
  • By date
  • Most viewed
  • Top rated

            Video's comments: The Challenges Edge Computing Brings (w. StorMagic & DCIG)

            Upcoming Spotlight Events

            • Sep
              11

              An Executive’s Guide to Secure AI Adoption

              09/11/202501:00 PM ET
              More events

              Upcoming 360 View Events

              • Sep
                25

                360View: Email Security & Social Engineering Defense

                09/25/202512:00 PM ET
                • Oct
                  23

                  360View: Preventing Data Exfiltration: Keeping Enterprise Data Secure

                  10/23/202512:00 PM ET
                  • Nov
                    20

                    360View: Budget Optimization: Doing More with Less

                    11/20/202512:00 PM ET
                    More events

                    Upcoming Industry Events

                    • Aug
                      25

                      Harnessing AI to Transform the Landscape of Data Security

                      08/25/202510:55 AM ET
                      • Aug
                        26

                        Renown Health Secures 10K Mailboxes & Stops $1M+ in Email Threats

                        08/26/202501:00 PM ET
                        • Aug
                          27

                          Mastering Secure AI Implementation: A Comprehensive Executive Guide

                          08/27/202510:55 AM ET
                          More events

                          Recent Industry Events

                          • Aug
                            19

                            CMMC 2.0 Insights: Understanding Compliance from an Expert Auditor's Perspective

                            08/19/202512:00 PM ET
                            • Aug
                              13

                              Understanding the Limitations of WAFs and API Gateways Against Modern Threats

                              08/13/202501:00 PM ET
                              • Jul
                                23

                                Enhancing API Security Testing: Identifying Vulnerabilities Ahead of Deployment

                                07/23/202501:00 PM ET
                                More events

                                Upcoming Events Calendar

                                • 08/25/2025
                                  10:55 AM
                                  08/25/2025
                                  Harnessing AI to Transform the Landscape of Data Security
                                  https://www.truthinit.com/index.php/channel/1381/harnessing-ai-to-transform-the-landscape-of-data-security/
                                • 08/26/2025
                                  10:55 AM
                                  08/26/2025
                                  Confronting AI’s Challenges: Insights into CISOs' Biggest Concerns
                                  https://www.truthinit.com/index.php/channel/1380/confronting-ai-s-challenges-insights-into-cisos-biggest-concerns/
                                • 08/26/2025
                                  01:00 PM
                                  08/26/2025
                                  Renown Health Secures 10K Mailboxes & Stops $1M+ in Email Threats
                                  https://www.truthinit.com/index.php/channel/1404/renown-health-secures-10k-mailboxes-stops-1m-in-email-threats/
                                • 08/27/2025
                                  10:55 AM
                                  08/27/2025
                                  Mastering Secure AI Implementation: A Comprehensive Executive Guide
                                  https://www.truthinit.com/index.php/channel/1379/mastering-secure-ai-implementation-a-comprehensive-executive-guide/
                                • 08/28/2025
                                  10:55 AM
                                  08/28/2025
                                  A Practitioner’s Roadmap for Safeguarding AI Implementation in Organizations
                                  https://www.truthinit.com/index.php/channel/1378/a-practitioner-s-roadmap-for-safeguarding-ai-implementation-in-organizations/
                                • 08/29/2025
                                  10:55 AM
                                  08/29/2025
                                  Ethical Frameworks and Compliance Strategies for Safe AI Implementation
                                  https://www.truthinit.com/index.php/channel/1377/ethical-frameworks-and-compliance-strategies-for-safe-ai-implementation/
                                • 09/11/2025
                                  01:00 PM
                                  09/11/2025
                                  An Executive’s Guide to Secure AI Adoption
                                  https://www.truthinit.com/index.php/channel/1374/an-executives-guide-to-secure-ai-adoption/
                                • 09/16/2025
                                  01:00 PM
                                  09/16/2025
                                  Beyond DMARC: Closing Critical Gaps in Your Email Security Shield
                                  https://www.truthinit.com/index.php/channel/1403/beyond-dmarc-closing-critical-gaps-in-your-email-security-shield/
                                • 09/18/2025
                                  11:00 AM
                                  09/18/2025
                                  Risk in Real Time: Visibility Into Cloud Based Vulnerabilities
                                  https://www.truthinit.com/index.php/channel/1372/understanding-dynamic-risk-management-in-real-time-environments/
                                • 09/25/2025
                                  12:00 PM
                                  09/25/2025
                                  360View: Email Security & Social Engineering Defense
                                  https://www.truthinit.com/index.php/channel/930/360view-email-security-social-engineering-defense/
                                • 10/23/2025
                                  12:00 PM
                                  10/23/2025
                                  360View: Preventing Data Exfiltration: Keeping Enterprise Data Secure
                                  https://www.truthinit.com/index.php/channel/931/360view-preventing-data-exfiltration-keeping-enterprise-data-secure/
                                • 11/20/2025
                                  12:00 PM
                                  11/20/2025
                                  360View: Budget Optimization: Doing More with Less
                                  https://www.truthinit.com/index.php/channel/932/360view-budget-optimization-doing-more-with-less/
                                • 12/18/2025
                                  12:00 PM
                                  12/18/2025
                                  360View: 2026 IT Predictions & Emerging Trends
                                  https://www.truthinit.com/index.php/channel/933/360view-2026-it-predictions-emerging-trends/
                                Truth in IT
                                • Sponsor
                                • About Us
                                • Terms of Service
                                • Privacy Policy
                                • Contact Us
                                • Preference Management
                                Desktop version
                                Standard version