Book Image

Edge Computing Patterns for Solution Architects

By : Ashok Iyengar, Joseph Pearson
Book Image

Edge Computing Patterns for Solution Architects

By: Ashok Iyengar, Joseph Pearson

Overview of this book

Enriched with insights from a hyperscaler’s perspective, Edge Computing Patterns for Solution Architects will prepare you for seamless collaboration with communication service providers (CSPs) and device manufacturers and help you in making the pivotal choice between cloud-out and edge-in approaches. This book presents industry-specific use cases that shape tailored edge solutions, addressing non-functional requirements to unlock the potential of standard edge components. As you progress, you’ll navigate the archetypes of edge solution architecture from the basics to network edge and end-to-end configurations. You’ll also discover the weight of data and the power of automation for scale and immerse yourself in the edge mantra of low latency and high bandwidth, absorbing invaluable do's and don'ts from real-world experiences. Recommended practices, honed through practical insights, have also been added to guide you in mastering the dynamic realm of edge computing. By the end of this book, you'll have built a comprehensive understanding of edge concepts and terminology and be ready to traverse the evolving edge computing landscape.
Table of Contents (17 chapters)
Free Chapter
1
Part 1:Overview of Edge Computing as a Problem Space
4
Part 2: Solution Architecture Archetypes in Context
8
Part 3: Related Considerations and Concluding Thoughts

Summary

The chapter started with a discussion of service delivery automation, which is a rather broad term for automating human tasks in a business and is relevant to edge computing. Whether it is DevOps or IaC, achieving scalability through automation ends up being one of the major benefits. We saw that from monitoring edge devices to updating the applications and models running on those devices, there is an opportunity to apply automation.

The latter half of the chapter addressed the security aspect by introducing the onboarding of edge devices with security features before shipping them. While it seemed like we digressed, it was important to talk about security in the context of automation. Automation allows enterprises to build capabilities that can react with minimal human interaction in a more secure and trusted way.

The final section dealt with the most interesting and relevant topic, namely AI. It seems AI is omnipresent in edge computing from AI applications deployed...